Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 16:41
Static task
static1
Behavioral task
behavioral1
Sample
3ad183b832800dfae6ccb942a5ec5950N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ad183b832800dfae6ccb942a5ec5950N.exe
Resource
win10v2004-20240802-en
General
-
Target
3ad183b832800dfae6ccb942a5ec5950N.exe
-
Size
328KB
-
MD5
3ad183b832800dfae6ccb942a5ec5950
-
SHA1
028177a8c5063004da143355f4083490beb6a912
-
SHA256
e0514a53dfcdb50a33e666a9d70003eb7c7fdab77afb96947e6dd924f79e7c67
-
SHA512
ba5e6cd32dd9028fcf60a47ba4c586bdbcbaa239c232f7dc14ff93fe6758f1788843f98ad82fca96674156dc4a168d8f00b99ebe62c1d5f7339d787c398b83e2
-
SSDEEP
6144:J2XgY8FFX7Z6A/P352p4gFs/e8PeAZuon2T5T7UcIGMAQTeJ:J2X1cFx/PAp4ks/e6Fn2dEZGjQSJ
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\conhost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\conhost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\conhost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Executes dropped EXE 4 IoCs
pid Process 2608 3ad183b832800dfae6ccb942a5ec5950N.exe 536 conhost.exe 860 conhost.exe 2148 conhost.exe -
Loads dropped DLL 6 IoCs
pid Process 2984 3ad183b832800dfae6ccb942a5ec5950N.exe 2608 3ad183b832800dfae6ccb942a5ec5950N.exe 2608 3ad183b832800dfae6ccb942a5ec5950N.exe 2608 3ad183b832800dfae6ccb942a5ec5950N.exe 2608 3ad183b832800dfae6ccb942a5ec5950N.exe 2608 3ad183b832800dfae6ccb942a5ec5950N.exe -
resource yara_rule behavioral1/memory/2608-463-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2608-505-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2148-1062-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral1/memory/2608-1065-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/860-1073-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2148-1074-0x0000000000400000-0x000000000047B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\Console Window Host = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\conhost.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2984 set thread context of 2608 2984 3ad183b832800dfae6ccb942a5ec5950N.exe 31 PID 536 set thread context of 860 536 conhost.exe 36 PID 536 set thread context of 2148 536 conhost.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ad183b832800dfae6ccb942a5ec5950N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ad183b832800dfae6ccb942a5ec5950N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2712 reg.exe 2680 reg.exe 2888 reg.exe 2672 reg.exe -
Suspicious use of AdjustPrivilegeToken 59 IoCs
description pid Process Token: 1 2148 conhost.exe Token: SeCreateTokenPrivilege 2148 conhost.exe Token: SeAssignPrimaryTokenPrivilege 2148 conhost.exe Token: SeLockMemoryPrivilege 2148 conhost.exe Token: SeIncreaseQuotaPrivilege 2148 conhost.exe Token: SeMachineAccountPrivilege 2148 conhost.exe Token: SeTcbPrivilege 2148 conhost.exe Token: SeSecurityPrivilege 2148 conhost.exe Token: SeTakeOwnershipPrivilege 2148 conhost.exe Token: SeLoadDriverPrivilege 2148 conhost.exe Token: SeSystemProfilePrivilege 2148 conhost.exe Token: SeSystemtimePrivilege 2148 conhost.exe Token: SeProfSingleProcessPrivilege 2148 conhost.exe Token: SeIncBasePriorityPrivilege 2148 conhost.exe Token: SeCreatePagefilePrivilege 2148 conhost.exe Token: SeCreatePermanentPrivilege 2148 conhost.exe Token: SeBackupPrivilege 2148 conhost.exe Token: SeRestorePrivilege 2148 conhost.exe Token: SeShutdownPrivilege 2148 conhost.exe Token: SeDebugPrivilege 2148 conhost.exe Token: SeAuditPrivilege 2148 conhost.exe Token: SeSystemEnvironmentPrivilege 2148 conhost.exe Token: SeChangeNotifyPrivilege 2148 conhost.exe Token: SeRemoteShutdownPrivilege 2148 conhost.exe Token: SeUndockPrivilege 2148 conhost.exe Token: SeSyncAgentPrivilege 2148 conhost.exe Token: SeEnableDelegationPrivilege 2148 conhost.exe Token: SeManageVolumePrivilege 2148 conhost.exe Token: SeImpersonatePrivilege 2148 conhost.exe Token: SeCreateGlobalPrivilege 2148 conhost.exe Token: 31 2148 conhost.exe Token: 32 2148 conhost.exe Token: 33 2148 conhost.exe Token: 34 2148 conhost.exe Token: 35 2148 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe Token: SeDebugPrivilege 860 conhost.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2984 3ad183b832800dfae6ccb942a5ec5950N.exe 2608 3ad183b832800dfae6ccb942a5ec5950N.exe 536 conhost.exe 2148 conhost.exe 860 conhost.exe 2148 conhost.exe 2148 conhost.exe 2148 conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2608 2984 3ad183b832800dfae6ccb942a5ec5950N.exe 31 PID 2984 wrote to memory of 2608 2984 3ad183b832800dfae6ccb942a5ec5950N.exe 31 PID 2984 wrote to memory of 2608 2984 3ad183b832800dfae6ccb942a5ec5950N.exe 31 PID 2984 wrote to memory of 2608 2984 3ad183b832800dfae6ccb942a5ec5950N.exe 31 PID 2984 wrote to memory of 2608 2984 3ad183b832800dfae6ccb942a5ec5950N.exe 31 PID 2984 wrote to memory of 2608 2984 3ad183b832800dfae6ccb942a5ec5950N.exe 31 PID 2984 wrote to memory of 2608 2984 3ad183b832800dfae6ccb942a5ec5950N.exe 31 PID 2984 wrote to memory of 2608 2984 3ad183b832800dfae6ccb942a5ec5950N.exe 31 PID 2608 wrote to memory of 3000 2608 3ad183b832800dfae6ccb942a5ec5950N.exe 32 PID 2608 wrote to memory of 3000 2608 3ad183b832800dfae6ccb942a5ec5950N.exe 32 PID 2608 wrote to memory of 3000 2608 3ad183b832800dfae6ccb942a5ec5950N.exe 32 PID 2608 wrote to memory of 3000 2608 3ad183b832800dfae6ccb942a5ec5950N.exe 32 PID 3000 wrote to memory of 2064 3000 cmd.exe 34 PID 3000 wrote to memory of 2064 3000 cmd.exe 34 PID 3000 wrote to memory of 2064 3000 cmd.exe 34 PID 3000 wrote to memory of 2064 3000 cmd.exe 34 PID 2608 wrote to memory of 536 2608 3ad183b832800dfae6ccb942a5ec5950N.exe 35 PID 2608 wrote to memory of 536 2608 3ad183b832800dfae6ccb942a5ec5950N.exe 35 PID 2608 wrote to memory of 536 2608 3ad183b832800dfae6ccb942a5ec5950N.exe 35 PID 2608 wrote to memory of 536 2608 3ad183b832800dfae6ccb942a5ec5950N.exe 35 PID 536 wrote to memory of 860 536 conhost.exe 36 PID 536 wrote to memory of 860 536 conhost.exe 36 PID 536 wrote to memory of 860 536 conhost.exe 36 PID 536 wrote to memory of 860 536 conhost.exe 36 PID 536 wrote to memory of 860 536 conhost.exe 36 PID 536 wrote to memory of 860 536 conhost.exe 36 PID 536 wrote to memory of 860 536 conhost.exe 36 PID 536 wrote to memory of 860 536 conhost.exe 36 PID 536 wrote to memory of 2148 536 conhost.exe 37 PID 536 wrote to memory of 2148 536 conhost.exe 37 PID 536 wrote to memory of 2148 536 conhost.exe 37 PID 536 wrote to memory of 2148 536 conhost.exe 37 PID 536 wrote to memory of 2148 536 conhost.exe 37 PID 536 wrote to memory of 2148 536 conhost.exe 37 PID 536 wrote to memory of 2148 536 conhost.exe 37 PID 536 wrote to memory of 2148 536 conhost.exe 37 PID 2148 wrote to memory of 1888 2148 conhost.exe 38 PID 2148 wrote to memory of 1888 2148 conhost.exe 38 PID 2148 wrote to memory of 1888 2148 conhost.exe 38 PID 2148 wrote to memory of 1888 2148 conhost.exe 38 PID 2148 wrote to memory of 2236 2148 conhost.exe 39 PID 2148 wrote to memory of 2236 2148 conhost.exe 39 PID 2148 wrote to memory of 2236 2148 conhost.exe 39 PID 2148 wrote to memory of 2236 2148 conhost.exe 39 PID 2148 wrote to memory of 2156 2148 conhost.exe 40 PID 2148 wrote to memory of 2156 2148 conhost.exe 40 PID 2148 wrote to memory of 2156 2148 conhost.exe 40 PID 2148 wrote to memory of 2156 2148 conhost.exe 40 PID 2148 wrote to memory of 3052 2148 conhost.exe 41 PID 2148 wrote to memory of 3052 2148 conhost.exe 41 PID 2148 wrote to memory of 3052 2148 conhost.exe 41 PID 2148 wrote to memory of 3052 2148 conhost.exe 41 PID 3052 wrote to memory of 2712 3052 cmd.exe 45 PID 3052 wrote to memory of 2712 3052 cmd.exe 45 PID 3052 wrote to memory of 2712 3052 cmd.exe 45 PID 3052 wrote to memory of 2712 3052 cmd.exe 45 PID 2236 wrote to memory of 2680 2236 cmd.exe 47 PID 2236 wrote to memory of 2680 2236 cmd.exe 47 PID 2236 wrote to memory of 2680 2236 cmd.exe 47 PID 2236 wrote to memory of 2680 2236 cmd.exe 47 PID 2156 wrote to memory of 2888 2156 cmd.exe 48 PID 2156 wrote to memory of 2888 2156 cmd.exe 48 PID 2156 wrote to memory of 2888 2156 cmd.exe 48 PID 2156 wrote to memory of 2888 2156 cmd.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ad183b832800dfae6ccb942a5ec5950N.exe"C:\Users\Admin\AppData\Local\Temp\3ad183b832800dfae6ccb942a5ec5950N.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\3ad183b832800dfae6ccb942a5ec5950N.exe"C:\Users\Admin\AppData\Local\Temp\3ad183b832800dfae6ccb942a5ec5950N.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DIXYV.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Console Window Host" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2064
-
-
-
C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:860
-
-
C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- System Location Discovery: System Language Discovery
PID:1888 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2672
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2680
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2888
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\conhost.exe:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\conhost.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2712
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154B
MD50d0a854e96bddf0e7df7f5f024674226
SHA1f45ca9c7f935422ddfb0550febdfc7a09baf2d98
SHA2565bab0b5c3ef8a28a7246854074a5a469c602a10ac803d18f2102399597d35907
SHA5128b6db387b3bb5774c691bcdd4d9f3a147e1556eee89fe1de929464510c01b14495157c14cbb355fc850b79dee500b8be7ae7a0c3b5ea0916d6eb9154f9ae73a8
-
Filesize
328KB
MD53ad183b832800dfae6ccb942a5ec5950
SHA1028177a8c5063004da143355f4083490beb6a912
SHA256e0514a53dfcdb50a33e666a9d70003eb7c7fdab77afb96947e6dd924f79e7c67
SHA512ba5e6cd32dd9028fcf60a47ba4c586bdbcbaa239c232f7dc14ff93fe6758f1788843f98ad82fca96674156dc4a168d8f00b99ebe62c1d5f7339d787c398b83e2
-
Filesize
328KB
MD5f60d7c831554ebb5c8167a55648ffa16
SHA1048ea8e6d6514c290a4b9537b0dec90516fc45a4
SHA2566285d4e4fb5545eb8d866768badfa315de56d6dd29ddfc504b4cb42a980cf29d
SHA512fa198e34729b6a7fd502f0746707656e3e9baf0f5e528f9201d9c8d76d3025f5ce09a7cf5ae8feadf715e0df0bdbc4a6f6baed489adc3c5ef5889f88d77299ac