Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2025, 13:06
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
General
-
Target
random.exe
-
Size
846KB
-
MD5
c3d89e95bfb66f5127ac1f2f3e1bd665
-
SHA1
bd79a4a17cc8ad63abdde20d9de02d55d54903f9
-
SHA256
5d07ad572a6a37d07d0b7ca990087960ad8850d7cfc56b8c7270c826c70fb56b
-
SHA512
d85116e24cf07f3063837fab1859ae6d9313dd269e28844900cbebe7521df8c65db97bc122bb097e9887d686bdf8f786b93a06208d762fded9035d2c6448a111
-
SSDEEP
24576:+VIFvGC3R+NVgcijiCnjWii1bAL3ztlmAQJut:Cg2VghqVRKz6AQwt
Malware Config
Extracted
asyncrat
0.5.8
Default
159.100.19.137:7707
yBu0GW2G5zAc
-
delay
3
-
install
false
-
install_file
svchost.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation random.exe -
Deletes itself 1 IoCs
pid Process 4376 Macromedia.com -
Executes dropped EXE 1 IoCs
pid Process 4376 Macromedia.com -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 716 tasklist.exe 1820 tasklist.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SchedulesAb random.exe File opened for modification C:\Windows\ContainsBefore random.exe File opened for modification C:\Windows\TokenDetroit random.exe File opened for modification C:\Windows\AttacksContacted random.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Macromedia.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2144 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 716 tasklist.exe Token: SeDebugPrivilege 1820 tasklist.exe Token: SeDebugPrivilege 3856 MSBuild.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4376 Macromedia.com 4376 Macromedia.com 4376 Macromedia.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4828 wrote to memory of 3568 4828 random.exe 82 PID 4828 wrote to memory of 3568 4828 random.exe 82 PID 4828 wrote to memory of 3568 4828 random.exe 82 PID 3568 wrote to memory of 716 3568 cmd.exe 84 PID 3568 wrote to memory of 716 3568 cmd.exe 84 PID 3568 wrote to memory of 716 3568 cmd.exe 84 PID 3568 wrote to memory of 1344 3568 cmd.exe 85 PID 3568 wrote to memory of 1344 3568 cmd.exe 85 PID 3568 wrote to memory of 1344 3568 cmd.exe 85 PID 3568 wrote to memory of 1820 3568 cmd.exe 87 PID 3568 wrote to memory of 1820 3568 cmd.exe 87 PID 3568 wrote to memory of 1820 3568 cmd.exe 87 PID 3568 wrote to memory of 2296 3568 cmd.exe 88 PID 3568 wrote to memory of 2296 3568 cmd.exe 88 PID 3568 wrote to memory of 2296 3568 cmd.exe 88 PID 3568 wrote to memory of 3168 3568 cmd.exe 89 PID 3568 wrote to memory of 3168 3568 cmd.exe 89 PID 3568 wrote to memory of 3168 3568 cmd.exe 89 PID 3568 wrote to memory of 3684 3568 cmd.exe 90 PID 3568 wrote to memory of 3684 3568 cmd.exe 90 PID 3568 wrote to memory of 3684 3568 cmd.exe 90 PID 3568 wrote to memory of 2560 3568 cmd.exe 91 PID 3568 wrote to memory of 2560 3568 cmd.exe 91 PID 3568 wrote to memory of 2560 3568 cmd.exe 91 PID 3568 wrote to memory of 4468 3568 cmd.exe 92 PID 3568 wrote to memory of 4468 3568 cmd.exe 92 PID 3568 wrote to memory of 4468 3568 cmd.exe 92 PID 3568 wrote to memory of 1084 3568 cmd.exe 93 PID 3568 wrote to memory of 1084 3568 cmd.exe 93 PID 3568 wrote to memory of 1084 3568 cmd.exe 93 PID 3568 wrote to memory of 4376 3568 cmd.exe 94 PID 3568 wrote to memory of 4376 3568 cmd.exe 94 PID 3568 wrote to memory of 4376 3568 cmd.exe 94 PID 3568 wrote to memory of 4744 3568 cmd.exe 95 PID 3568 wrote to memory of 4744 3568 cmd.exe 95 PID 3568 wrote to memory of 4744 3568 cmd.exe 95 PID 4376 wrote to memory of 2144 4376 Macromedia.com 96 PID 4376 wrote to memory of 2144 4376 Macromedia.com 96 PID 4376 wrote to memory of 2144 4376 Macromedia.com 96 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104 PID 4376 wrote to memory of 3856 4376 Macromedia.com 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Turner Turner.cmd & Turner.cmd2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:716
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"3⤵
- System Location Discovery: System Language Discovery
PID:1344
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵
- System Location Discovery: System Language Discovery
PID:2296
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7646613⤵
- System Location Discovery: System Language Discovery
PID:3168
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Fm3⤵
- System Location Discovery: System Language Discovery
PID:3684
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Tunnel" Addresses3⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 764661\Macromedia.com + Totally + York + Drunk + Baghdad + Benz + Glasses + Pac + Tender + Racing + Deluxe + Derived 764661\Macromedia.com3⤵
- System Location Discovery: System Language Discovery
PID:4468
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Complement + ..\Soundtrack + ..\Plumbing + ..\Hills F3⤵
- System Location Discovery: System Language Discovery
PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\764661\Macromedia.comMacromedia.com F3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "AchillesGuard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GuardTech Solutions\AchillesGuard.js'" /sc onlogon /F /RL HIGHEST4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2144
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3856
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 153⤵
- System Location Discovery: System Language Discovery
PID:4744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD547840b8162b9c6e7fe90ab0603d61f93
SHA12bcfbadfa40e35f1ef64e4a048f2df2e03ffbb5a
SHA2565e0f8bf19cc0e550fbc57f447e5b07597b9a2b04a71a4e67b10eb616f114d90b
SHA5129cf08d2f0bc4987b199bd893d398950a71a3a4a0f568da94aef236a9928b0b07b6ea54dfae967e36c2c518a7c715a52d083c50ddcabe3a439c87e6153caddb00
-
Filesize
50KB
MD5eaa9eac7b30831d5657349c116a0a4a2
SHA1641e627a4c59abb2a3f1648e3cda6a8d9e1f4fcb
SHA256c17f2fd61daf4ba0aa1e46fb3c1408d300d1bb46b02f7363452baad47d77f5d1
SHA51261b39232328c7a9de8b83d35ce98ebc819d89043595afb9d36714a7c69966901d671af0b25d0a1d0becfefde5cdd59e2340e69cecbab1b0f686c61e35fd0c964
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
764B
MD541c199d56ee88613939ba36689b5272f
SHA1c8ea27720461568200a6b1e65b26fcf34e0c40fa
SHA256bc9e83d6b316359195dd0e515be2163998a0100587f2f8a2105352afc8ef48e4
SHA51266511d865cdeb5039a660cd9551477c126d36eccaafa189c4c3dd97a31d4009a772e4138efc05ea0a840310c2f7b9a8ea1257432c310b706a06d9b052d306df2
-
Filesize
122KB
MD5db32131c3970c57d0ad200b8c586b9c8
SHA1adb5d20e012b668ad6cc77c166ade302607795dc
SHA256edd149ee8fc4e9ba7b0633b0b34bbc60f49fd4af949bbd06cdc46effcf9ec4a5
SHA512d57b106d8cfee5459492e945cfd2d1c28727b5f8e1e48c7ec39f64d1f1c0856d7a898b2e6abe964abca2df610e4d6384c14696fe79d6da87c6ac52dbc85e4783
-
Filesize
64KB
MD5ec2a94df8c01a560e0604c640b26ccdd
SHA11ac09f3302b2df40302a050cee5ba5b119291215
SHA256f0d88e80b23da7e59e76dd18d6b39737c577df9689ae49126ccafe5fbaeb5b5b
SHA512bbe7b24db1451d425e3b241075ed6dc564d798fa504b3e0d75edf876e582599d1709836062fbc7d5175d85eb179b635db3c940a89c20863f9dcd739b0f8b44ec
-
Filesize
59KB
MD5dfb8e34f07291b05901c0d2a71e19442
SHA11b54535721482c0a3db1760541367a03deedc8c5
SHA2560cb98ad246cd2531c12ec31fe31a0c5afbef269c9c913eb06de547d3730ddcc7
SHA51209b5f13637608bcd1862b0d56af361c6acbe5f0100314fffe48a7f2266fb8d2bcc60ee9da5716ce20b73fefac9d6126f3488b12a44b2ac6f396f9051b5700379
-
Filesize
131KB
MD57aa824f055dc532c3e713734d5733577
SHA1d354d68335a862ab729ffae878b6f8a3cc774d97
SHA2566812a48a86b7a9ca84cffe83f8678db2c495b09866fbe1a204f9bfe39854cd49
SHA512e10d26b7d3156b9cda0d66cfbf31aaac7238e77d0fd0cd0c4e415f71867a0b3ca5254acbeda09109fb6f7bc2f92bb89682e52e7906af5ceb245db3c7a565e33c
-
Filesize
30KB
MD5f1548e92e0b2ffc07e003c7fae9ed9b9
SHA1575ba8922ebbec527d150ec7c65992feace266db
SHA2566b5b3edb8182fc38389ea991a97bc5bd798349e19aa9cacf413f415a3afbc0b5
SHA5129f7dd7bedfe3ae8d4c8caebe241ca25a6f77d52c085b5aadc8ac5ea91ffdfe06c1c776854d2a953e11eed4437c1a851f6fa3388988e2220e57e23bbb7130b470
-
Filesize
109KB
MD5e31afb9405514fd5b7ca3a02c5697de3
SHA1d0c67c8ac6be3ba39586c2364a80d82ea07e9898
SHA256d857088b8baa02a812fbeda516c74dc40907ddcd3e4d6a5be91b6c23042bd620
SHA5120a6ba0aa91608b66fbc90857fd784a381619eb1781472b711f9c4123beec84e9ccbd269c062fd9071c1a0d5d5bbc694d700d562cba34076df6ed06b9ab146b88
-
Filesize
478KB
MD5d772c64b8f02e063f7f8b1cea9509574
SHA12aa72a8f3e6474e0d9d23cbf88b72cf60415a82b
SHA2565c61934f8c63bd21694d648b69f70f426e8a462525c0ff6e4484464267961461
SHA5126a497260969280d67c2ebbaddd24312e10fb4bfeecbc7f3f85d7ca6ca7c9afcbf1a2257f566a6cedf685abf9ec2c28ab7f643b173c52c6089578b7615d382c5c
-
Filesize
120KB
MD562ee0376f7b66f93856090027793c5ae
SHA1358d6750df4765fea465451f1024892c132a8b5e
SHA256312044d1badf072170a55deab7e126bcd766826ce201febc4a8dd74a7783f391
SHA51274562de1769ffffdffc5518428bcdb5eadbd972f69ca37fa0971bf89f30ebaf41dacf2fe0b5373ffa0e1fe792f1bcb0aea0085ed0f94097cbfe5c23f3ee1edeb
-
Filesize
31KB
MD556f234f3854b87f2da60d4370c80f4ef
SHA17196616a8c40ffd498de9fc18ef0b4182a410c5b
SHA256e652ac7a40a3c797a190dc16d1741910d3785609289fef8379d488abec53ffc6
SHA512a3ae351b9c35df7634ac622509a25bc2006f20b643c48efe521278ee6a1c40e69ee4c981bb9d53be783d203e3ddf87479846baeeaaabb026ed411ba3b7163176
-
Filesize
87KB
MD544af3d9f2851fc9d3758542d4b83beb0
SHA100e5819a99f6bd7b8a91c56a20b4a04603ba1fdc
SHA2566ec134b5a0eac1fac5216470cef1fd3a4d1a8d061d429030a9d12f7978aed5a9
SHA512633b59dc281727cd5321b8135d0b5929bb0d37b7123913b777ddf2dbc7f5d3e71e4d7377750c97d4398596edb5b18f53d514356833613e5b0713bb0438a96e6f
-
Filesize
62KB
MD5d0a3f0692a9b5c96b6c1dfcb8192fdc6
SHA1ca70a2d0ca34f6b06f4de3bd035e14183102a571
SHA256bd20e251d01cf8ab324683f697faee6aa0dab7484609d5db9d5c98f84af49d72
SHA51252290b8a0e714c0a5f03504e521c4e5511f53217985032db83a205b6b22baf18f5cfb23c353dc7aded90c43ff925ac8ef80b94bc086f7a8de4f93cbc13f94095
-
Filesize
62KB
MD5354d8dade537bd6b724e2c0385910994
SHA13fbfaf7a3806875311b74f8152d803a6385b6956
SHA256ccb09907d574bb0f0e90db133039589205342f74d6410592841f1fb49b0b8678
SHA5121a4869a55a65b2aa8f80e9284955ba66636da8dfbdb528d5b31b2ce469181403577708ed2c899c68c61ab9b9d33c140a8b8aa0c52ce94c375812a9e537527363
-
Filesize
78KB
MD543beeaedf4525e9ee2174012ee5ad60b
SHA167686a082061f90467fbd0536443175f5a2e77cc
SHA256d672d30549406465eadc12703e91bf70014e81c60ef68d6b60f77b23c313e6b5
SHA5129561e01bf0d52f2b32ccbff5c1bf74f97b414b6c89753c963d0302963534e3acbbc171670d0bd3d9fae0ea0b19de58cc04bda5b3864b7aff07dc3d1c85e4a5ac
-
Filesize
70KB
MD56f2d9e28fc8288ba6a6858607da20564
SHA1195eee4913f5a2d43ef717d7e4afed13f28c9ab9
SHA25678e49500799a356e0ead812924ee64ba4a89031845df0c4b4d3a7c704d2ea84a
SHA512fe930932d16863726ed3afd771d0a7d7ef0501ff5057325d0e7cb3466ded3783168736ef2b3c46774c7df09b441b82b455288b7eeb80c6ac39e0b64197d7cd95
-
Filesize
50KB
MD5c4af150b901a67bd95170ce3449b5c95
SHA195daab7704c8f186c963260596f274b0ae6f4fad
SHA25653c65f7778006abe3ff0f8b696b80f22eea2f642313ef7c8b489aae884645852
SHA51230078fdf0a5e69aa8df65f275ac26f75fb1ce548b231367cb7ef94cd1deddd3f5171dbe56f924c5c79c587f187f7563ffc482e6690b2e275bd823e231a66b42d
-
Filesize
17KB
MD58302276f879565bfcf18de8278fa2df2
SHA15ade1c7516c3299b9a3572766a6512ef079f1aa1
SHA256dd59aeaa649c3116f43228bf8da6614ae31d57e2da00777ab3b3e8dacd14258a
SHA512515352faf704f9026bf22df113089d13ff0c9de6059efc28fef9d1371ca49618a55fa19c414a8493cf354e525b288bc342732d88aa3fe3143e3fea58107dbade
-
Filesize
79KB
MD54bfd15f3a354c7a93533787429a3a645
SHA10a114c1d163c1417b97f21e21b48778b87fd9ad3
SHA25631d5191e194b80b12101da35ab1a87a1d99db2ef2ee884855a02dedda29c5632
SHA512333ac5f64e86f67a472bdcdcb69ce85fe670da874bc7f5c18398e390b5ecb767e945c3ab13e9ba7ad65ca4c7e367c3cdf99e52a478d3f9e1ac0f6bcd0decdca6