Analysis
-
max time kernel
121s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06-01-2024 22:21
Static task
static1
Behavioral task
behavioral1
Sample
475096a88ddd423675d5bf9dcc121cfe.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
475096a88ddd423675d5bf9dcc121cfe.html
Resource
win10v2004-20231215-en
General
-
Target
475096a88ddd423675d5bf9dcc121cfe.html
-
Size
9KB
-
MD5
475096a88ddd423675d5bf9dcc121cfe
-
SHA1
ba58a0d0de77911a2a1c549a68a4a1d1b7dc9446
-
SHA256
f657cc6bd3e019a98ed7da0728bd0f6e09546aa6f7ed69fbd0ca64debe63af31
-
SHA512
5aee5c5015f7f525d4c4f78bc97baf169177cd8e1a4da813f2518211c88a0e9cee29c0747fe0e2738b835241fc57e895364c8fb71c604b54846ac660370cc8ce
-
SSDEEP
192:PlXSe5vWvdid0joR+psG2NgzsvZpd4AIhCmhZZ77/TU:VfvWvdiqjoRGzVwhpV4ZZ77/TU
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000b81bad8e0d365749ec340adafc80b5da306cea64303effa5096d291256756c76000000000e8000000002000020000000843487fd103ee9e9ed36a272789592ecafe5d6bc83b10e0f6a18c0fe61d4e9b9900000008abb2e19d2646352578cc4df277b943fd648428e909ddad9229823afe2ae5fbe89c4852856faa65948c019bff84e1e7c3902eae4e1858f26179c2471f7c93b6e42bd3a24e9a0ca5aa8315a6e37a3df8bbdc9491487bdefd2b27676cf6c2cd3c93973a3c7f06cb10f43cbad49c556d4004d383f01b71a3a9ebc776b0bb5b058ef831789a3589c1e2bfbe26c3da6af7e5940000000fd761ab2601b3e5c144d8e097765a3002429e716998e0d16f9c6c7512167459e57f08f217b019f234d301d999e2c86a75bc8230b819abb16f2889714ad85fbe1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410741556" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E9980041-ACE1-11EE-BB9C-CE9B5D0C5DE4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000e17659c4c3c9e6303773d078a1e12bfc7d8b8f4b43fb83c49d5e5176a57330b2000000000e800000000200002000000016ae659ca4eea9b4577ba6adb734ff308a38f4395fd7545f158467a43c828387200000008723809fe6d1eba3feae4b812049999ed7b01742c08f6e518effbefa0fa8cf56400000008204e558f61af0a420c72deb1d730e70e0472f6e5f90817b2e5acd386d642822773c3658705b0e5d4383badea526749c10972092365c97f67146f89db8ce6049 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905814c5ee40da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2672 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2672 2132 iexplore.exe 28 PID 2132 wrote to memory of 2672 2132 iexplore.exe 28 PID 2132 wrote to memory of 2672 2132 iexplore.exe 28 PID 2132 wrote to memory of 2672 2132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\475096a88ddd423675d5bf9dcc121cfe.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbe3521e0a611b3ed086b5d03d514151
SHA12c485ca9f41adecc63b051608f2d638488064d67
SHA2567e7a9c21bdffc2e9a7675bf561b720a41e2496a99cc55d8b0a9ebcd0e1a81232
SHA512a183a02a99bc58fdaee1038cd8ea2736dde0025f5f0b511af83b35a9405f7453b6eea327ed747b8aa042e756d7634757ab6515aec8e4548f56987746d0aff29c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537a22f4b39eca0ed535d032098b34b7c
SHA1a03439863748fd7d6616df70016a6ec35d3fc322
SHA2569763572783d2a9fb5000e9f750dc25d3222feda438aa050655ad9e245bad3a58
SHA512faf214ca3f8f80138f3ef2aa562865c192662c0706e65beaadd1739c22b10bcfad455611c082c26bd2d34e9f590b9867d9c1293b7cd9cfd6cc4c81dbd81ecb18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b660b163cdd4a46edc6df3b7afb2382a
SHA1d075db98a32c0ab92bf7a8db09dcfbe002c7b20b
SHA256460e86006e2e0e3cef95a2d886b2a89665dc044ae8dfe5d6cce5bda385a38abc
SHA51249740765e5328c59d567b21c85bf288dccda20b637ca31e59bceb12fd667573ef2f663ab9b922ec49946ad5e4be11559d056909ac0417071d71c04735bd28829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fef9c6c5785d371b90bcb5424ba8fa43
SHA1399c5417ce15bc16bbf3165b5e81e4aa89628de6
SHA25632382a6db6a8afc95607101c8050b8042662bd772f8ca5d4d05a96180336468c
SHA512dd73596f7e84afc9b98ff111872b68aff2c42f86ab3d725c6d8b5d5e62d70d3da47b51c9eecbdc28d63e649afc75bf7967aa4fdeade39b213a73d186790a0f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501e5cb88556b52f3165b942e9ae1df10
SHA19125179f8013c6fc32f882611705848626cb1950
SHA256f05a79911954e0bdc63aee59812fd974cd89e7a70dc04dbf26dc2bedff2dab71
SHA5122631247bdcc8808c2c3c4ff01e13b0642140ba41bcc212c444adf967a939a1ba93aaccd5fd51da631dd128485df816922fea0d51347b02503d26719126692db9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5089df003baa0b9b4c6a7375af997c578
SHA110e639cbe95b472d538818f289971f60f4f6b21f
SHA2566be63c60a411ba37e9ef7982ef1bc78ea063006c1219aab02181f3ac56f1ef2f
SHA51259b5d881f05d5ec0443ccc960817c0db49aa2ba9f541ca923b98fba8b6d1923a4cf7401e8fb8e3c9bb93013da01ca6c223cdb8ba8475a70e4440112e2657d221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5396ef5ae14139659a802cd59787d8ea7
SHA11bd7faed5c9aac11a182830030382d464ffa1826
SHA2569c68cdfd3605ce6419380fc493dc2a87427a5c29e335cfa26ffad1e61f520e2e
SHA5123806ac1e8bcb88cdf05e1dcaf4ea8b5ea880ed71e838b971f056cf54a82982c1d9364928087b21d55eebecf36c59f8b189ff78cfa54dae54e2757b55d4c31195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51726d5e8b25b4442b927fdee22b5cd14
SHA117cef296563d58f9ba843dd6b8d4e1308fd643a5
SHA2562e21c0f57bd4920e4a5edc933f2fc3f267269868fa1584153fb2aa2077249d57
SHA5125aaa48d956cacad37168d0c77ec1ec2dfece77f8bd2d68ef80257036cbc7eca451eec95e50ff73d8399c13813df8248dd6dc1a31fb390e878fb4500655be8734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d364ef05edd7f743335693ca240712df
SHA13c5b66d73faf21523e35052601de2fee9f1b20a1
SHA256360e19adc18a40e1df83b68fc7b038617c3af3c8c64a1547715eb013a3cd98e8
SHA512f5b8f4b42fe857a13d60a47486d8f82fec28f53d73886cd46c0f4742dd818694d911a29d015f1b4f807ecf3155cae2fa52c45c6d3a49088d7d526285d9f93c43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e07ee3f3d8d496aeadf81c7c754ef39
SHA1d68e4f26710f57e957026b930a6885fe26a86652
SHA256d128a8df80dd3b6bd917531975e16e2c6b7a4665ca26b6f4b0fcadfa777e3e3e
SHA512b09652e3d97d6cedff131fd6541b915230e2705ead51383f5d3b1b6e8f51634d6064d2415211bfc1523262920e36cb32713b0e07fd171933ba7150f57946fa06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59459845a4e9d783be3d4564bf038ea35
SHA1b819e4e7ab63d2d290c428fb7de90fb4686f0ed7
SHA256d94a8e624d85f98f66e5b216d5f014a7ff24af0adfd227cd60b0d79f49306d73
SHA5123477c8cf3b76af1e46263d8b20be7832dd7d1961bcea8534fcda883d83a73ef319a566f61c57d5dcafc6349e5c5b6c10cbbcd90b622c9220321b9f10140fe2a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ed6a83c28d79a5c9e5b7a4fefeac984
SHA18d321831d9b234b8065548d6958802d56adecff5
SHA256d85f8c5b4141fa4a04439569cdcd515e082e7c7d5b73228ac96b681ab3addade
SHA512f27a178ae74afc3ba37dbae3fd37e00ed4913e6b5f979bbc7d55f01e0510aad1ae821365538024c1422a59977cfc896c362cf27be4c9334142c723d39e786576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a61b5ad67cea727ae735060d2e656e2b
SHA14ec222eda58ff5fe3d97f3a78513132bc0dfce6a
SHA256127787057b17b108909d4165107b9639a8cf64bb9fa81e90ffe472a63d583479
SHA512215fd06c5d29a47c2f6645969d6f91d5be6c91fcbe6c9edda56f0fdc0b5bba30351d7a91fdb4fc8f9b597f52fa7f71b6ce689aad9705763eacaabba34ec283af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59775e6c94093b6b640e81c1fa48b1c47
SHA1ecb2537b27e07fbaa3b36c88764f06c717268435
SHA256db4d93e19ba79304d58407e40821d40beb738845a611f7ff891e8ae9ca6c29f1
SHA5128740ee3b38587473e96460fb944befe7b7370371da623228b35b3ae3dded157bd9deb35e294a8cf948e787714a10a8e57c3d039fa44ac1bf0b54ac8ca1fec470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c96cd68c21b0149dbeee735e7f84a29f
SHA1b75b9de5be19a5b58b256490c3af2895da9b1b9a
SHA2564a3a6d12f4a5ae66159f9fadd43cbb76b5430f84e53a6b85029f1de11aba8edd
SHA512e34f6ba43a3c39df18e6e18d498d43ed1bf75b75c910dbfcc2102ab93195c2d630c6698fda32b3223dd01432cc331d3c98640308cc04ea6bab13e928dd74a225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab1b0e6a3682c9f4c567af579453d2d7
SHA1bacd2759ca27c4a36fcaa6e4300f0ee7fbe0af8f
SHA256a2f8afc78ea8c94369364a8655075f19b53d58294cd4c335541f89344d970a86
SHA51284a9add045ec6e67473e9783e17c6393efafeab877d34fe92ba4f7d30822fe98ca1e5a06d91388a0492ef5dcee603a6af08494e89431c4858183c5be197bc187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532d3196716466c4215005e50dfd82c8e
SHA1e840d0ab86c25eb59d0b319a6781146b68a7af4d
SHA2566ccbe6fc3598e7dfb2e7f41964bc2cf5b038ab4354f40b0c10104425c7b82b4c
SHA512d42cb98f736f3fb15f600f0a0bd1fd2e80a840e1f5f4f7eb757a5f9121d94e475b18ce1962cf8d06ac40d64b040a2bdf2be5d693ca2c15a5601529a079e08a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5180573c47726fb94482c931d3ade2337
SHA1e18ccf793fc215bfacb965d2c3980188121ea380
SHA2562110c472031e30d5f72d86c30eee6688a0c20b395dd65f649732c1457360b843
SHA5128fe324db22b82f373c8eded8e9be490d88e5f720da81f6910ed5f5c10559ccf3322cc3c14e4196c3c466875db34f0cf1af74036a5e594510c47285f4a498a900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50db39507c11d945c3098888bdb212194
SHA1c660c5c48176c60d34fb677b40c4b8b54ad5b664
SHA2563c76dba50fcb36e42005fd7a9377431ec7b1dae65a47ad2a6f95b263abf9ed02
SHA512ed276eaa28aef6fe0c3ad9c0b971245f08478e92d4dc71b03144c788379d25fbe76d020a78bc9509d7e62db6ceb2eb240076097535fe10032fc6b1aaac6dbfad
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06