Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
6556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2.exe
Resource
win10v2004-20221111-en
General
-
Target
6556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2.exe
-
Size
106KB
-
MD5
2d4b5f6215d072e80a6003cdb93aab99
-
SHA1
d2f7954874849a6887504047a0c9c59bdb40b874
-
SHA256
6556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
-
SHA512
017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
SSDEEP
3072:A2/d+dMEQ3lovUKWEk8sCugOdhoqX0uhCJ555555:A2SMV3losj5k
Malware Config
Signatures
-
Executes dropped EXE 9 IoCs
pid Process 892 sdktemp.exe 1512 sdktemp.exe 1984 sdktemp.exe 280 sdktemp.exe 796 sdktemp.exe 1712 sdktemp.exe 1528 sdktemp.exe 1872 sdktemp.exe 824 sdktemp.exe -
Loads dropped DLL 18 IoCs
pid Process 1972 6556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2.exe 1972 6556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2.exe 892 sdktemp.exe 892 sdktemp.exe 1512 sdktemp.exe 1512 sdktemp.exe 1984 sdktemp.exe 1984 sdktemp.exe 280 sdktemp.exe 280 sdktemp.exe 796 sdktemp.exe 796 sdktemp.exe 1712 sdktemp.exe 1712 sdktemp.exe 1528 sdktemp.exe 1528 sdktemp.exe 1872 sdktemp.exe 1872 sdktemp.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File created C:\Windows\SysWOW64\sdktemp.exe sdktemp.exe File opened for modification C:\Windows\SysWOW64\sdktemp.exe sdktemp.exe File created C:\Windows\SysWOW64\sdktemp.exe sdktemp.exe File opened for modification C:\Windows\SysWOW64\sdktemp.exe sdktemp.exe File created C:\Windows\SysWOW64\sdktemp.exe sdktemp.exe File opened for modification C:\Windows\SysWOW64\sdktemp.exe sdktemp.exe File opened for modification C:\Windows\SysWOW64\sdktemp.exe sdktemp.exe File created C:\Windows\SysWOW64\sdktemp.exe sdktemp.exe File opened for modification C:\Windows\SysWOW64\sdktemp.exe sdktemp.exe File opened for modification C:\Windows\SysWOW64\sdktemp.exe sdktemp.exe File opened for modification C:\Windows\SysWOW64\sdktemp.exe sdktemp.exe File opened for modification C:\Windows\SysWOW64\sdktemp.exe sdktemp.exe File created C:\Windows\SysWOW64\sdktemp.exe sdktemp.exe File created C:\Windows\SysWOW64\sdktemp.exe sdktemp.exe File created C:\Windows\SysWOW64\sdktemp.exe sdktemp.exe File created C:\Windows\SysWOW64\sdktemp.exe 6556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2.exe File opened for modification C:\Windows\SysWOW64\sdktemp.exe 6556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2.exe File created C:\Windows\SysWOW64\sdktemp.exe sdktemp.exe File opened for modification C:\Windows\SysWOW64\sdktemp.exe sdktemp.exe File created C:\Windows\SysWOW64\sdktemp.exe sdktemp.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1972 wrote to memory of 892 1972 6556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2.exe 28 PID 1972 wrote to memory of 892 1972 6556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2.exe 28 PID 1972 wrote to memory of 892 1972 6556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2.exe 28 PID 1972 wrote to memory of 892 1972 6556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2.exe 28 PID 892 wrote to memory of 1512 892 sdktemp.exe 29 PID 892 wrote to memory of 1512 892 sdktemp.exe 29 PID 892 wrote to memory of 1512 892 sdktemp.exe 29 PID 892 wrote to memory of 1512 892 sdktemp.exe 29 PID 1512 wrote to memory of 1984 1512 sdktemp.exe 30 PID 1512 wrote to memory of 1984 1512 sdktemp.exe 30 PID 1512 wrote to memory of 1984 1512 sdktemp.exe 30 PID 1512 wrote to memory of 1984 1512 sdktemp.exe 30 PID 1984 wrote to memory of 280 1984 sdktemp.exe 31 PID 1984 wrote to memory of 280 1984 sdktemp.exe 31 PID 1984 wrote to memory of 280 1984 sdktemp.exe 31 PID 1984 wrote to memory of 280 1984 sdktemp.exe 31 PID 280 wrote to memory of 796 280 sdktemp.exe 32 PID 280 wrote to memory of 796 280 sdktemp.exe 32 PID 280 wrote to memory of 796 280 sdktemp.exe 32 PID 280 wrote to memory of 796 280 sdktemp.exe 32 PID 796 wrote to memory of 1712 796 sdktemp.exe 33 PID 796 wrote to memory of 1712 796 sdktemp.exe 33 PID 796 wrote to memory of 1712 796 sdktemp.exe 33 PID 796 wrote to memory of 1712 796 sdktemp.exe 33 PID 1712 wrote to memory of 1528 1712 sdktemp.exe 34 PID 1712 wrote to memory of 1528 1712 sdktemp.exe 34 PID 1712 wrote to memory of 1528 1712 sdktemp.exe 34 PID 1712 wrote to memory of 1528 1712 sdktemp.exe 34 PID 1528 wrote to memory of 1872 1528 sdktemp.exe 35 PID 1528 wrote to memory of 1872 1528 sdktemp.exe 35 PID 1528 wrote to memory of 1872 1528 sdktemp.exe 35 PID 1528 wrote to memory of 1872 1528 sdktemp.exe 35 PID 1872 wrote to memory of 824 1872 sdktemp.exe 36 PID 1872 wrote to memory of 824 1872 sdktemp.exe 36 PID 1872 wrote to memory of 824 1872 sdktemp.exe 36 PID 1872 wrote to memory of 824 1872 sdktemp.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\6556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2.exe"C:\Users\Admin\AppData\Local\Temp\6556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\sdktemp.exeC:\Windows\system32\sdktemp.exe 500 "C:\Users\Admin\AppData\Local\Temp\6556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\sdktemp.exeC:\Windows\system32\sdktemp.exe 540 "C:\Windows\SysWOW64\sdktemp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\sdktemp.exeC:\Windows\system32\sdktemp.exe 532 "C:\Windows\SysWOW64\sdktemp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\sdktemp.exeC:\Windows\system32\sdktemp.exe 544 "C:\Windows\SysWOW64\sdktemp.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\sdktemp.exeC:\Windows\system32\sdktemp.exe 548 "C:\Windows\SysWOW64\sdktemp.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\sdktemp.exeC:\Windows\system32\sdktemp.exe 536 "C:\Windows\SysWOW64\sdktemp.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\sdktemp.exeC:\Windows\system32\sdktemp.exe 560 "C:\Windows\SysWOW64\sdktemp.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\sdktemp.exeC:\Windows\system32\sdktemp.exe 528 "C:\Windows\SysWOW64\sdktemp.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\sdktemp.exeC:\Windows\system32\sdktemp.exe 564 "C:\Windows\SysWOW64\sdktemp.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:824
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175
-
Filesize
106KB
MD52d4b5f6215d072e80a6003cdb93aab99
SHA1d2f7954874849a6887504047a0c9c59bdb40b874
SHA2566556bbc9e435ccf1a585ae5d200bca90f8d582794dde4b9eda8e81ae60381cf2
SHA512017fb4ea915f94f653050f359f3b539866007e5cf3e92dd06d9ef442a6fbbd06026cb6cfc6c3a2289ee80733c948d07f27fe243bd328b2b37836913a6fbe6175