Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 16:41
Static task
static1
Behavioral task
behavioral1
Sample
3ad183b832800dfae6ccb942a5ec5950N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ad183b832800dfae6ccb942a5ec5950N.exe
Resource
win10v2004-20240802-en
General
-
Target
3ad183b832800dfae6ccb942a5ec5950N.exe
-
Size
328KB
-
MD5
3ad183b832800dfae6ccb942a5ec5950
-
SHA1
028177a8c5063004da143355f4083490beb6a912
-
SHA256
e0514a53dfcdb50a33e666a9d70003eb7c7fdab77afb96947e6dd924f79e7c67
-
SHA512
ba5e6cd32dd9028fcf60a47ba4c586bdbcbaa239c232f7dc14ff93fe6758f1788843f98ad82fca96674156dc4a168d8f00b99ebe62c1d5f7339d787c398b83e2
-
SSDEEP
6144:J2XgY8FFX7Z6A/P352p4gFs/e8PeAZuon2T5T7UcIGMAQTeJ:J2X1cFx/PAp4ks/e6Fn2dEZGjQSJ
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\conhost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\conhost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\conhost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 3ad183b832800dfae6ccb942a5ec5950N.exe -
Executes dropped EXE 4 IoCs
pid Process 1188 3ad183b832800dfae6ccb942a5ec5950N.exe 1532 conhost.exe 4596 conhost.exe 2156 conhost.exe -
resource yara_rule behavioral2/memory/1188-7-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1188-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1188-12-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1188-38-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2156-58-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2156-55-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2156-54-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/1188-65-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4596-68-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2156-69-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2156-71-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2156-76-0x0000000000400000-0x000000000047B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Console Window Host = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\conhost.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4756 set thread context of 1188 4756 3ad183b832800dfae6ccb942a5ec5950N.exe 97 PID 1532 set thread context of 4596 1532 conhost.exe 104 PID 1532 set thread context of 2156 1532 conhost.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ad183b832800dfae6ccb942a5ec5950N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ad183b832800dfae6ccb942a5ec5950N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 3896 reg.exe 440 reg.exe 4036 reg.exe 1108 reg.exe -
Suspicious use of AdjustPrivilegeToken 61 IoCs
description pid Process Token: 1 2156 conhost.exe Token: SeCreateTokenPrivilege 2156 conhost.exe Token: SeAssignPrimaryTokenPrivilege 2156 conhost.exe Token: SeLockMemoryPrivilege 2156 conhost.exe Token: SeIncreaseQuotaPrivilege 2156 conhost.exe Token: SeMachineAccountPrivilege 2156 conhost.exe Token: SeTcbPrivilege 2156 conhost.exe Token: SeSecurityPrivilege 2156 conhost.exe Token: SeTakeOwnershipPrivilege 2156 conhost.exe Token: SeLoadDriverPrivilege 2156 conhost.exe Token: SeSystemProfilePrivilege 2156 conhost.exe Token: SeSystemtimePrivilege 2156 conhost.exe Token: SeProfSingleProcessPrivilege 2156 conhost.exe Token: SeIncBasePriorityPrivilege 2156 conhost.exe Token: SeCreatePagefilePrivilege 2156 conhost.exe Token: SeCreatePermanentPrivilege 2156 conhost.exe Token: SeBackupPrivilege 2156 conhost.exe Token: SeRestorePrivilege 2156 conhost.exe Token: SeShutdownPrivilege 2156 conhost.exe Token: SeDebugPrivilege 2156 conhost.exe Token: SeAuditPrivilege 2156 conhost.exe Token: SeSystemEnvironmentPrivilege 2156 conhost.exe Token: SeChangeNotifyPrivilege 2156 conhost.exe Token: SeRemoteShutdownPrivilege 2156 conhost.exe Token: SeUndockPrivilege 2156 conhost.exe Token: SeSyncAgentPrivilege 2156 conhost.exe Token: SeEnableDelegationPrivilege 2156 conhost.exe Token: SeManageVolumePrivilege 2156 conhost.exe Token: SeImpersonatePrivilege 2156 conhost.exe Token: SeCreateGlobalPrivilege 2156 conhost.exe Token: 31 2156 conhost.exe Token: 32 2156 conhost.exe Token: 33 2156 conhost.exe Token: 34 2156 conhost.exe Token: 35 2156 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4756 3ad183b832800dfae6ccb942a5ec5950N.exe 1188 3ad183b832800dfae6ccb942a5ec5950N.exe 1532 conhost.exe 4596 conhost.exe 2156 conhost.exe 2156 conhost.exe 2156 conhost.exe 2156 conhost.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 4756 wrote to memory of 1188 4756 3ad183b832800dfae6ccb942a5ec5950N.exe 97 PID 4756 wrote to memory of 1188 4756 3ad183b832800dfae6ccb942a5ec5950N.exe 97 PID 4756 wrote to memory of 1188 4756 3ad183b832800dfae6ccb942a5ec5950N.exe 97 PID 4756 wrote to memory of 1188 4756 3ad183b832800dfae6ccb942a5ec5950N.exe 97 PID 4756 wrote to memory of 1188 4756 3ad183b832800dfae6ccb942a5ec5950N.exe 97 PID 4756 wrote to memory of 1188 4756 3ad183b832800dfae6ccb942a5ec5950N.exe 97 PID 4756 wrote to memory of 1188 4756 3ad183b832800dfae6ccb942a5ec5950N.exe 97 PID 4756 wrote to memory of 1188 4756 3ad183b832800dfae6ccb942a5ec5950N.exe 97 PID 1188 wrote to memory of 3704 1188 3ad183b832800dfae6ccb942a5ec5950N.exe 98 PID 1188 wrote to memory of 3704 1188 3ad183b832800dfae6ccb942a5ec5950N.exe 98 PID 1188 wrote to memory of 3704 1188 3ad183b832800dfae6ccb942a5ec5950N.exe 98 PID 3704 wrote to memory of 2620 3704 cmd.exe 101 PID 3704 wrote to memory of 2620 3704 cmd.exe 101 PID 3704 wrote to memory of 2620 3704 cmd.exe 101 PID 1188 wrote to memory of 1532 1188 3ad183b832800dfae6ccb942a5ec5950N.exe 102 PID 1188 wrote to memory of 1532 1188 3ad183b832800dfae6ccb942a5ec5950N.exe 102 PID 1188 wrote to memory of 1532 1188 3ad183b832800dfae6ccb942a5ec5950N.exe 102 PID 1532 wrote to memory of 4596 1532 conhost.exe 104 PID 1532 wrote to memory of 4596 1532 conhost.exe 104 PID 1532 wrote to memory of 4596 1532 conhost.exe 104 PID 1532 wrote to memory of 4596 1532 conhost.exe 104 PID 1532 wrote to memory of 4596 1532 conhost.exe 104 PID 1532 wrote to memory of 4596 1532 conhost.exe 104 PID 1532 wrote to memory of 4596 1532 conhost.exe 104 PID 1532 wrote to memory of 4596 1532 conhost.exe 104 PID 1532 wrote to memory of 2156 1532 conhost.exe 105 PID 1532 wrote to memory of 2156 1532 conhost.exe 105 PID 1532 wrote to memory of 2156 1532 conhost.exe 105 PID 1532 wrote to memory of 2156 1532 conhost.exe 105 PID 1532 wrote to memory of 2156 1532 conhost.exe 105 PID 1532 wrote to memory of 2156 1532 conhost.exe 105 PID 1532 wrote to memory of 2156 1532 conhost.exe 105 PID 1532 wrote to memory of 2156 1532 conhost.exe 105 PID 2156 wrote to memory of 1092 2156 conhost.exe 106 PID 2156 wrote to memory of 1092 2156 conhost.exe 106 PID 2156 wrote to memory of 1092 2156 conhost.exe 106 PID 2156 wrote to memory of 3316 2156 conhost.exe 107 PID 2156 wrote to memory of 3316 2156 conhost.exe 107 PID 2156 wrote to memory of 3316 2156 conhost.exe 107 PID 2156 wrote to memory of 4456 2156 conhost.exe 109 PID 2156 wrote to memory of 4456 2156 conhost.exe 109 PID 2156 wrote to memory of 4456 2156 conhost.exe 109 PID 2156 wrote to memory of 4140 2156 conhost.exe 111 PID 2156 wrote to memory of 4140 2156 conhost.exe 111 PID 2156 wrote to memory of 4140 2156 conhost.exe 111 PID 1092 wrote to memory of 3896 1092 cmd.exe 114 PID 1092 wrote to memory of 3896 1092 cmd.exe 114 PID 1092 wrote to memory of 3896 1092 cmd.exe 114 PID 3316 wrote to memory of 440 3316 cmd.exe 115 PID 3316 wrote to memory of 440 3316 cmd.exe 115 PID 3316 wrote to memory of 440 3316 cmd.exe 115 PID 4456 wrote to memory of 4036 4456 cmd.exe 116 PID 4456 wrote to memory of 4036 4456 cmd.exe 116 PID 4456 wrote to memory of 4036 4456 cmd.exe 116 PID 4140 wrote to memory of 1108 4140 cmd.exe 117 PID 4140 wrote to memory of 1108 4140 cmd.exe 117 PID 4140 wrote to memory of 1108 4140 cmd.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ad183b832800dfae6ccb942a5ec5950N.exe"C:\Users\Admin\AppData\Local\Temp\3ad183b832800dfae6ccb942a5ec5950N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\3ad183b832800dfae6ccb942a5ec5950N.exe"C:\Users\Admin\AppData\Local\Temp\3ad183b832800dfae6ccb942a5ec5950N.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YKSKT.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Console Window Host" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2620
-
-
-
C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4596
-
-
C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3896
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:440
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\conhost.exe:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\conhost.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1108
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD53ad183b832800dfae6ccb942a5ec5950
SHA1028177a8c5063004da143355f4083490beb6a912
SHA256e0514a53dfcdb50a33e666a9d70003eb7c7fdab77afb96947e6dd924f79e7c67
SHA512ba5e6cd32dd9028fcf60a47ba4c586bdbcbaa239c232f7dc14ff93fe6758f1788843f98ad82fca96674156dc4a168d8f00b99ebe62c1d5f7339d787c398b83e2
-
Filesize
154B
MD50d0a854e96bddf0e7df7f5f024674226
SHA1f45ca9c7f935422ddfb0550febdfc7a09baf2d98
SHA2565bab0b5c3ef8a28a7246854074a5a469c602a10ac803d18f2102399597d35907
SHA5128b6db387b3bb5774c691bcdd4d9f3a147e1556eee89fe1de929464510c01b14495157c14cbb355fc850b79dee500b8be7ae7a0c3b5ea0916d6eb9154f9ae73a8