Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe
Resource
win10v2004-20240226-en
General
-
Target
6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe
-
Size
1.9MB
-
MD5
1e4ab972a4f5977387011437c4dbe618
-
SHA1
a7c033be7d29c03c4d617d6268637341a827f12b
-
SHA256
6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220
-
SHA512
bb4e5c26bc68007b343974e9e6687c3b51613b191b4a6f58a9ceec8ffb4ed2fca2e6172b3f601ec5bd94a540846c12348811ab6eefdf046973209b54abbcdecc
-
SSDEEP
24576:GkXbZMzUN+ZysTspK8kCBHcdjW1kMrLbgBwnRTvOksAhyTDc/VkTJSML2crAM0aI:jskL1LrLb52kmTD6oJSsrAMgduf8hMs
Malware Config
Signatures
-
Detects executables packed with unregistered version of .NET Reactor 6 IoCs
resource yara_rule behavioral1/memory/2984-1-0x0000000000390000-0x000000000057E000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor behavioral1/files/0x0007000000015c85-29.dat INDICATOR_EXE_Packed_DotNetReactor behavioral1/memory/2864-50-0x00000000013C0000-0x00000000015AE000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor behavioral1/memory/2796-62-0x00000000002A0000-0x000000000048E000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor behavioral1/memory/1148-75-0x00000000001C0000-0x00000000003AE000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor behavioral1/memory/2344-87-0x00000000012E0000-0x00000000014CE000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor -
Executes dropped EXE 5 IoCs
pid Process 2612 taskhost.exe 2864 taskhost.exe 2796 taskhost.exe 1148 taskhost.exe 2344 taskhost.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Windows Portable Devices\smss.exe 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe File created C:\Program Files\Windows Portable Devices\69ddcba757bf72 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe File created C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe File created C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\da35c6ede7dee3 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1764 PING.EXE 568 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe Token: SeDebugPrivilege 2612 taskhost.exe Token: SeDebugPrivilege 2864 taskhost.exe Token: SeDebugPrivilege 2796 taskhost.exe Token: SeDebugPrivilege 1148 taskhost.exe Token: SeDebugPrivilege 2344 taskhost.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2712 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 28 PID 2984 wrote to memory of 2712 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 28 PID 2984 wrote to memory of 2712 2984 6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe 28 PID 2712 wrote to memory of 2620 2712 cmd.exe 30 PID 2712 wrote to memory of 2620 2712 cmd.exe 30 PID 2712 wrote to memory of 2620 2712 cmd.exe 30 PID 2712 wrote to memory of 2696 2712 cmd.exe 31 PID 2712 wrote to memory of 2696 2712 cmd.exe 31 PID 2712 wrote to memory of 2696 2712 cmd.exe 31 PID 2712 wrote to memory of 2612 2712 cmd.exe 32 PID 2712 wrote to memory of 2612 2712 cmd.exe 32 PID 2712 wrote to memory of 2612 2712 cmd.exe 32 PID 2612 wrote to memory of 1460 2612 taskhost.exe 33 PID 2612 wrote to memory of 1460 2612 taskhost.exe 33 PID 2612 wrote to memory of 1460 2612 taskhost.exe 33 PID 1460 wrote to memory of 2724 1460 cmd.exe 35 PID 1460 wrote to memory of 2724 1460 cmd.exe 35 PID 1460 wrote to memory of 2724 1460 cmd.exe 35 PID 1460 wrote to memory of 2628 1460 cmd.exe 36 PID 1460 wrote to memory of 2628 1460 cmd.exe 36 PID 1460 wrote to memory of 2628 1460 cmd.exe 36 PID 1460 wrote to memory of 2864 1460 cmd.exe 37 PID 1460 wrote to memory of 2864 1460 cmd.exe 37 PID 1460 wrote to memory of 2864 1460 cmd.exe 37 PID 2864 wrote to memory of 1528 2864 taskhost.exe 40 PID 2864 wrote to memory of 1528 2864 taskhost.exe 40 PID 2864 wrote to memory of 1528 2864 taskhost.exe 40 PID 1528 wrote to memory of 840 1528 cmd.exe 42 PID 1528 wrote to memory of 840 1528 cmd.exe 42 PID 1528 wrote to memory of 840 1528 cmd.exe 42 PID 1528 wrote to memory of 1764 1528 cmd.exe 43 PID 1528 wrote to memory of 1764 1528 cmd.exe 43 PID 1528 wrote to memory of 1764 1528 cmd.exe 43 PID 1528 wrote to memory of 2796 1528 cmd.exe 44 PID 1528 wrote to memory of 2796 1528 cmd.exe 44 PID 1528 wrote to memory of 2796 1528 cmd.exe 44 PID 2796 wrote to memory of 3060 2796 taskhost.exe 45 PID 2796 wrote to memory of 3060 2796 taskhost.exe 45 PID 2796 wrote to memory of 3060 2796 taskhost.exe 45 PID 3060 wrote to memory of 1244 3060 cmd.exe 47 PID 3060 wrote to memory of 1244 3060 cmd.exe 47 PID 3060 wrote to memory of 1244 3060 cmd.exe 47 PID 3060 wrote to memory of 2316 3060 cmd.exe 48 PID 3060 wrote to memory of 2316 3060 cmd.exe 48 PID 3060 wrote to memory of 2316 3060 cmd.exe 48 PID 3060 wrote to memory of 1148 3060 cmd.exe 49 PID 3060 wrote to memory of 1148 3060 cmd.exe 49 PID 3060 wrote to memory of 1148 3060 cmd.exe 49 PID 1148 wrote to memory of 2788 1148 taskhost.exe 50 PID 1148 wrote to memory of 2788 1148 taskhost.exe 50 PID 1148 wrote to memory of 2788 1148 taskhost.exe 50 PID 2788 wrote to memory of 880 2788 cmd.exe 52 PID 2788 wrote to memory of 880 2788 cmd.exe 52 PID 2788 wrote to memory of 880 2788 cmd.exe 52 PID 2788 wrote to memory of 568 2788 cmd.exe 53 PID 2788 wrote to memory of 568 2788 cmd.exe 53 PID 2788 wrote to memory of 568 2788 cmd.exe 53 PID 2788 wrote to memory of 2344 2788 cmd.exe 54 PID 2788 wrote to memory of 2344 2788 cmd.exe 54 PID 2788 wrote to memory of 2344 2788 cmd.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe"C:\Users\Admin\AppData\Local\Temp\6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Tuv5MiIr10.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2620
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2696
-
-
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe"C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qlEmwzstBs.bat"4⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:2724
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:25⤵PID:2628
-
-
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe"C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HqVvjk53aP.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:840
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- Runs ping.exe
PID:1764
-
-
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe"C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\U9jP4iZUUm.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\system32\chcp.comchcp 650019⤵PID:1244
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:2316
-
-
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe"C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3IMqqsTTOd.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\system32\chcp.comchcp 6500111⤵PID:880
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost11⤵
- Runs ping.exe
PID:568
-
-
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe"C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe
Filesize1.9MB
MD51e4ab972a4f5977387011437c4dbe618
SHA1a7c033be7d29c03c4d617d6268637341a827f12b
SHA2566c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220
SHA512bb4e5c26bc68007b343974e9e6687c3b51613b191b4a6f58a9ceec8ffb4ed2fca2e6172b3f601ec5bd94a540846c12348811ab6eefdf046973209b54abbcdecc
-
Filesize
203B
MD534005ba5e4cab9e54eab2010f092d7b5
SHA1c6bd917ed46c00ee729af0e5485567c7b75fb04b
SHA25619129cf5c9c8107ac5862ae050744ae2a8bf56b440033cac76654746fcfd3e6e
SHA51244e9fd5239e8a2bd266066cfb7679be4cd4ca7f12aafee583f7973c92346fcc082b705ebe40befd8ad1eb72c0af05b49a048236d0852754d6791804988c78db7
-
Filesize
203B
MD587f878afcc779f28b3b15de83d210e3c
SHA12623eabd9463b1935175f7e6f3d091d002849159
SHA256025414b7edd285cb1eb5200f7231f540c837fb72952e12a619879d9f080ae2bf
SHA51211e7f50b4a9adcba93f847415806b7af7867b45625f4106f2522de69385e026d0ae83f2e0a4a972e3c077c7862584858bcea6b4ef6f840740d0a4df866855eee
-
Filesize
251B
MD57fbd1b3c88a5e533861935e489240392
SHA1af17d3d0e968a9da241c981ab208d1ca60250a1b
SHA2564e3c025b6d7650dfef7e0cf09b615a2cf77a4e3cec63f0949200ae0501fa9b99
SHA51217d8c810fb9347aaca257a140282b4522d5e29b2c9776feffc544170b3e3288f0d7a3e1b0709f9e76a5013b4f42c17f4fcb2e803162443df7e237be8b3cb6467
-
Filesize
251B
MD5803d0a47381869b1d4f21c171c9967c4
SHA1549df33ea9a91d187a4cde7ef65fb48a9be2678e
SHA2568ab8d111763410f22bfe8eb058b57f0bc2053d40ffbf4e4359b644562acf0fc9
SHA512f9aea4d11d2d524249a59bd03cf8094c5ea450377e90423e376fbe21e00b5a03b53a03df557209532d7d672fc75b04110f0c77d746127c5ecc616b25f612c071
-
Filesize
251B
MD54ec58dd64f41f665f6910968ff628820
SHA1ec2b6951c5e1de51ac27b0a782063a381c71d295
SHA2564d6e56f6aac4b044d11dfb6f602d186cd2cc7cb70f479a2b13474f76cec17e76
SHA5123308b087c68bb7001ea0bba2221ca3b01926c27a11650099981952e3e03c3039dc42893d6a63dc3462ddd4c8e71038f18d51dbd173b15d7a2330829d1ed5e35a