Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3Bloons.TD.5.v4.0.zip
windows7-x64
1Bloons.TD.5.v4.0.zip
windows10-2004-x64
1Bloons.TD....es.jpg
windows7-x64
3Bloons.TD....es.jpg
windows10-2004-x64
3Bloons.TD....es.xml
windows7-x64
1Bloons.TD....es.xml
windows10-2004-x64
1Bloons.TD....eb.jpg
windows7-x64
3Bloons.TD....eb.jpg
windows10-2004-x64
3Bloons.TD....eb.xml
windows7-x64
1Bloons.TD....eb.xml
windows10-2004-x64
1Bloons.TD....et.png
windows7-x64
3Bloons.TD....et.png
windows10-2004-x64
3Bloons.TD....et.xml
windows7-x64
1Bloons.TD....et.xml
windows10-2004-x64
1Bloons.TD....op.jpg
windows7-x64
3Bloons.TD....op.jpg
windows10-2004-x64
3Bloons.TD....op.xml
windows7-x64
1Bloons.TD....op.xml
windows10-2004-x64
1Bloons.TD....or.jpg
windows7-x64
3Bloons.TD....or.jpg
windows10-2004-x64
3Bloons.TD....or.xml
windows7-x64
1Bloons.TD....or.xml
windows10-2004-x64
1Bloons.TD....ey.txt
windows7-x64
1Bloons.TD....ey.txt
windows10-2004-x64
1Bloons.TD....in.exe
windows7-x64
1Bloons.TD....in.exe
windows10-2004-x64
1Bloons.TD....in.exe
windows7-x64
1Bloons.TD....in.exe
windows10-2004-x64
1Bloons.TD....pi.dll
windows7-x64
1Bloons.TD....pi.dll
windows10-2004-x64
1Bloons.TD....pi.dll
windows7-x64
3Bloons.TD....pi.dll
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
Bloons.TD.5.v4.0.zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Bloons.TD.5.v4.0.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/wattle_trees.jpg
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/wattle_trees.jpg
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/wattle_trees.xml
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/wattle_trees.xml
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/web.jpg
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/web.jpg
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/web.xml
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/web.xml
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/welcome_sheet.png
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/welcome_sheet.png
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/welcome_sheet.xml
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/welcome_sheet.xml
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/workshop.jpg
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/workshop.jpg
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/workshop.xml
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/workshop.xml
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/z_factor.jpg
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/z_factor.jpg
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/z_factor.xml
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/Textures/Ultra/z_factor.xml
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/api_key.txt
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/Assets/api_key.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/BTD5-Win.exe
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/BTD5-Win.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/BTD5-Win.exe
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/BTD5-Win.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/steam_api.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/steam_api.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/steam_api.dll
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
Bloons.TD.5.v4.0/Bloons.TD.5.v4.0/steam_api.dll
Resource
win10v2004-20240709-en
General
-
Target
Bloons.TD.5.v4.0.zip
-
Size
396.7MB
-
MD5
c9cc4e664a084d40ec2e9df0d496d7e1
-
SHA1
c989a26e8eb664eaa920ccab1abd305d71ee31a2
-
SHA256
31a51057a99052cd148fdd04a14156f0a7c2036e37fcda9fae3f1cc17f37f49a
-
SHA512
60dad4d0ad928f741d686cc0ec7b196d57c1559e9a7f8825f2b2aead23425e8d29e30f9e2c11697a1247f0986f08f88e294a51adcaeda531d4f565f2772a0a89
-
SSDEEP
12582912:Ae6QiTiW0dLA7Tv4+RK9N4ahZfTOvTKjfsk/YkUXCie/B0:AeN0nv4+RKn4+fTOvej0k/YkUXCiS0
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_Classes\Local Settings firefox.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: 33 2284 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2284 AUDIODG.EXE Token: 33 2284 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2284 AUDIODG.EXE Token: SeDebugPrivilege 316 firefox.exe Token: SeDebugPrivilege 316 firefox.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 316 firefox.exe 316 firefox.exe 316 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 792 wrote to memory of 316 792 firefox.exe 36 PID 792 wrote to memory of 316 792 firefox.exe 36 PID 792 wrote to memory of 316 792 firefox.exe 36 PID 792 wrote to memory of 316 792 firefox.exe 36 PID 792 wrote to memory of 316 792 firefox.exe 36 PID 792 wrote to memory of 316 792 firefox.exe 36 PID 792 wrote to memory of 316 792 firefox.exe 36 PID 792 wrote to memory of 316 792 firefox.exe 36 PID 792 wrote to memory of 316 792 firefox.exe 36 PID 792 wrote to memory of 316 792 firefox.exe 36 PID 792 wrote to memory of 316 792 firefox.exe 36 PID 792 wrote to memory of 316 792 firefox.exe 36 PID 316 wrote to memory of 2244 316 firefox.exe 37 PID 316 wrote to memory of 2244 316 firefox.exe 37 PID 316 wrote to memory of 2244 316 firefox.exe 37 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 2212 316 firefox.exe 38 PID 316 wrote to memory of 1888 316 firefox.exe 39 PID 316 wrote to memory of 1888 316 firefox.exe 39 PID 316 wrote to memory of 1888 316 firefox.exe 39 PID 316 wrote to memory of 1888 316 firefox.exe 39 PID 316 wrote to memory of 1888 316 firefox.exe 39 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Bloons.TD.5.v4.0.zip1⤵PID:2012
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2900
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4901⤵
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="316.0.611137371\664430828" -parentBuildID 20221007134813 -prefsHandle 1244 -prefMapHandle 1204 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef870335-ff60-454d-852a-9fb22cf96b5b} 316 "\\.\pipe\gecko-crash-server-pipe.316" 1360 ffdc058 gpu3⤵PID:2244
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="316.1.2137957350\1712296566" -parentBuildID 20221007134813 -prefsHandle 1496 -prefMapHandle 1492 -prefsLen 20928 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {29d44e1c-115f-44e9-82e9-f12f71dba66f} 316 "\\.\pipe\gecko-crash-server-pipe.316" 1508 40eb858 socket3⤵PID:2212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="316.2.499810342\1318049110" -childID 1 -isForBrowser -prefsHandle 1896 -prefMapHandle 1892 -prefsLen 20966 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e271d615-5233-4a5d-826a-7c5ea6692931} 316 "\\.\pipe\gecko-crash-server-pipe.316" 1908 18158258 tab3⤵PID:1888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="316.3.1553171318\79851517" -childID 2 -isForBrowser -prefsHandle 2420 -prefMapHandle 700 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef6710e7-6902-42e3-b1b6-4961f2ecd3c8} 316 "\\.\pipe\gecko-crash-server-pipe.316" 1676 1b5c3058 tab3⤵PID:1624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="316.4.8305043\595622829" -childID 3 -isForBrowser -prefsHandle 3024 -prefMapHandle 3020 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f7b82545-617e-40ba-b31d-46c30dc8b107} 316 "\\.\pipe\gecko-crash-server-pipe.316" 3036 1cb36e58 tab3⤵PID:1860
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="316.5.1073690874\367873895" -childID 4 -isForBrowser -prefsHandle 3368 -prefMapHandle 3360 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5d764229-5d87-4ee9-b778-9ac68a249eba} 316 "\\.\pipe\gecko-crash-server-pipe.316" 3496 184cd058 tab3⤵PID:1648
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="316.6.160359491\1455301522" -childID 5 -isForBrowser -prefsHandle 4000 -prefMapHandle 4004 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {32b312ac-cbdf-4afb-9101-e99bb96ce2c0} 316 "\\.\pipe\gecko-crash-server-pipe.316" 3988 1cb38358 tab3⤵PID:1684
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="316.7.233677811\1911567913" -childID 6 -isForBrowser -prefsHandle 4184 -prefMapHandle 4188 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {28ea82a2-a121-4517-8bd2-7e192ce7acf8} 316 "\\.\pipe\gecko-crash-server-pipe.316" 4172 1f823658 tab3⤵PID:792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\nndpnsl0.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD5c2d20f43f6bb08fb28bd7a4977d57e56
SHA1d5bf03517bcd76e7ba99337a80ee0e9ff6498e3d
SHA2562f9d28fbf23a4f11335b6c6fc81418cfe8688298fe473a63a2cf6198c8e85a5f
SHA512090bb5eb4ff931d37c3da8dde6bdf08e983e08c9613da1d91ef5cbeb2da318a274701b420572657e29e7fa700e543fca1b6f5e7b424e2232bc51de584f84ea43
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD50e16d54d0e6d34c4189e20801f4ac296
SHA134ce1f8a6edcbbc0d1595293a39187e885cae1b4
SHA256287ab7c171fd95250f7db5867d3e1ed02b21ff399fd828f604fbc00f5d17b6b4
SHA512cece598a23e797cf0e651f7c74ce504d9f6b72e5608b190deb76895a0b4a202a1c8c317214640e1244fffeb2143c58fe5ca4e254092b8b4a61f6dbc1de2a9c31
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\datareporting\glean\pending_pings\364c78fb-fe0e-4b6f-b31d-ced21682e1e1
Filesize745B
MD5f0efbcc4499e69eab27b3ca236821923
SHA1fad2b20416a24a8c5882cd5789a902957b636376
SHA25620796a32e03070124f9c41e1663a01798cc5b03874944ae8ddee69deab664282
SHA512d9f633a647d1df15cb73a167625f872f1e26a8cdea3a908f0efdc357a88bd067e9694f3ad474531876ecbb159c3ef19ca9a431f163693bfb99f520273006811a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\datareporting\glean\pending_pings\84097ca1-f311-4892-afbc-52042358d835
Filesize10KB
MD579c04e54bff2c3b884f40c6c2d9d56f8
SHA1fc61ecc8ba6dc5a9dd2835571ee59a45ad988db5
SHA256daa7fb144d8b8f29d3fd7f39c247a96dac8c613b3603e9e68c69230fc7f53276
SHA512735042056f5a06c238d6dadd5fead013e2d6c20bf8d7dde3f19b76088cd48c325681e918eaf0859fa0233588ada5bf9c28e837220ff2bb116f870d9112d3cfa5
-
Filesize
6KB
MD5be5142952eaa3b2577e69b4e119fd870
SHA1effee38eb0337d678d3ac1311ee5cbc80b6291cf
SHA2562a275b38b7f947ec05025100cf09ddbe99f968cbf2e6a4d9ba1c0e43b96c6d37
SHA5124a38d3b0d2c4170870c02486edfe962dede9b19f69b415c72ae1c080f9ef762393906d0d376b7cb47187bfe4df584dea1306bf4f0705df5cca4bbdcf28d179cf