Analysis
-
max time kernel
1561s -
max time network
1566s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 14:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.com
Resource
win7-20231215-en
General
-
Target
https://www.google.com
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103236eb9e44da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14698EC1-B092-11EE-8427-464D43A133DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411147066" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000c17c624703fe15bde2518bd6792bb5bfe970daa1c39324863adca2197c511faf000000000e800000000200002000000013775fb0b5c9ceea92358d23476985afa4155039f4f53594712f1773ea621dbe90000000b1f67975e46d7ef6e06380f62be671c57714dc49505121872acc1f77f2d90e7989e858c205974ea5906aad54226d060f2b6e117f34cf8e375851fe23f3e309be37d1e8807c8e88f23a69f8bff33475ef0f5e18ffdcf9221507876a3a5d654be5256d2cce717252ee63f463999a15063b1d73af1b0f51c94c290ada8efa1700523e1e4fabd54899040d7626ff212f81b440000000541c0c4ece67c95afb51c6ea666c0020e9fd5a1d7372ef5b4d10218cdd7fe1393e4d6a7dbfbc21429bcf13d72e45cd005a25f6c2852619c8060b0388603fd037 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000007d726f16c9375830ca7abd0ae593ba003f3938df902f64bb1e70a58f80ceff03000000000e8000000002000020000000be001a428c50dde2178e5839eea92850a4ed84bc8ff00e2f925ff5ea637e4d4b200000001f1f24e3c29cad485408c639c8950f05cd0384d62e57225b7fc0dd6efee0b4e7400000009a6b67e8d06431ed0b1fad3dbea394cda40008ba1910d2f878d4ed0d1d82fc160d42502198ead41699a4174908136389a74e79f9f538694300fac72a46d19377 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 3068 1984 iexplore.exe 28 PID 1984 wrote to memory of 3068 1984 iexplore.exe 28 PID 1984 wrote to memory of 3068 1984 iexplore.exe 28 PID 1984 wrote to memory of 3068 1984 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.google.com1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc2dc8d0fbb1a5a5282320c94df5a3ff
SHA11a1b898e0b4ca7bdfc55b2f1a77516f9cb071038
SHA256afb949c7c23b59ef08ff4a08a53cbfa2cafdb38ae63c06187ff03917c5b7f160
SHA512a698f7e1a0641980deac88dfcfceca66049cd36b02f7e378cc0a4a9049d5381edfcdfad916ab3bcadd01d7212d129b2ec15c76813953845c8f3869a51f394c1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562fe0bf228bdad7d0910153140fe1be6
SHA14cfef96ec60e6ab719044f6526875241b35e80c7
SHA2560c0dc44bed64ca2df7669de36e0fad8f98dd7a75637afeeefefe19ee0ba83ca8
SHA5126e1f4d640bc8b4b41dc712b3ea968896be6fccaba19ef9e27ff11d1a86d1bca1a274ad46dbe8876ef0075eb1b4824a8157a87845ce1e87fb44eb2a3aa4b21dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8c258d3bc9b8b3be6e63be49427849c
SHA1792c3aab2ede2ee33db6185d4946928532bfe1b4
SHA2561715f43ebb531923c31af00068a5a12a5fe576960ab3f872f92c051242667f8c
SHA5123f67dc47c615cc811a0ea0f7c5f3bebef024a8bf8b2b776d9bb6185638bd8b8679c7020392ba91c8142b7d8a1077343022924c2dba397944a51c21f25111d0f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571e4a328fde618e01e554a9601ab5725
SHA1e6cfd84ceac7d417dabc3de39f44bc615728d711
SHA256fa518aea8e627150caea80a34b79fcafd9cea74bfab795cb3a55ce71256d37e5
SHA51216df5de1cd66b19b2c8681f1e73d8977e698056d9c342e5603aa4bc95e3b3eb2355609e1daa44c82856fae2ecbdcd77196f98fb45707d63baa10b315e7132d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5141276db1fa9adbbdb23b04d51210176
SHA19fa30045ea287ecf7b44081add86d35cde7b4131
SHA2564ed3153be678fba1a4cd030cedf64e08dc7e59b08f1ef519efcb3d720a8463b1
SHA5122e45fa22897e8bc569bec64b7606ab599ffdec13c942f88cf695621444726d367c061cbc11f5ec29442b845a3f83b28bbe096f62a657aa3426131ca0fb0f42e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f338523e7fe14fe0fec66310c84f01f8
SHA1f6d5dea2c7f422f5c7f9f4973cc9c711f2ac05f6
SHA25604e9bdc49ed1193f00c57f992f8bbb1249d655818f3ee531eacfcf93fdea5fdb
SHA5126700ffa54a1b171afd9441ac57391c191907dcb8cce0be68a277ffe11d6e193bde149ac6165abeae5098722fb2eb919a4226333d240f15493ee3e70f074ed057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cacd61568936c383d1dc551a527fa3c
SHA1e06408a0eb417e456c683b71b646624a3a36f9ac
SHA256dee65acff75d66d86aa777f53395a3d5389c8decc012840c83266fc544178e68
SHA512effa1a4dbc2d958f6795f2ad87363cdb5eefc625c507e3d516a610d6553251def64a316dc4cbafcd4ef86ff429ad3c46bf5d525dfc417e8d2288d6c9c63bd8a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d92d93a6071dc8ddecb3b4436a35e27a
SHA1ab0cb4b3753833db4b1e764cc398f85e0004f508
SHA2562459e46d8a477d6d41dbc9bfdce49aacf9269e16d906fedccf2eacda83fd5e84
SHA5125f9707c82bb2b1269b1dea2ab2e1d8318b0ee8b6643e894c87e7ccfe8d78803f8b4921ee2a21b42e4497392e7579ee9f7890661a8eccf0de07442a7a4d566dc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503a1eeb928f8a9586b359be6f1d47d2a
SHA1ed45b3153c63a7f1fd65b8aabe0f5d630667dc58
SHA256d497c8e18f2550eb1418d77f7d3956a6d6c0e71d6ff9bd8e019932e404629bad
SHA5127905fc527771f7518da578514117badc97dcd44ac930dbe2bcf64c6ae10bcf8db39973f11d8d6188c0418a0970b37ac391381dc00bdd31cdb2764af658c152b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57992364dfe092ec1838d894e8a44ec35
SHA15b7edb3fbff08d090e89f51e2ae55e20d1c34a70
SHA2566e1869811c05913a809c88d0555f4a8f48d732d09973f9bd3531ba2b8583345d
SHA5124c75f489357a4c460709afa5b97b7caaff35febc98729bb35b83cae8a59f9139f3191f442149336e6260ec5d645a8a1c845f19a9b61dbb8ce74dd865a60b638c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527b6b3bcb038695b21bb49e4bdb0f7a8
SHA15d8fdde0f7a3a35d62f8e42c1df9df0163f87c7a
SHA2568b0010e17dd740b5734c5265e96fa7e8d364793a639547230f51a2a6f433f126
SHA512cf1ac0d7e43e03ae54fe0a6161937adb4c42a1f6e9dc8159a6cd35c9e683f07d8cc1706d4fbf9cf7c9aef31c46635029e9e0d1fa166db3ede91bf320621a1c06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfcffedb846c10f901a2d85e5d7a8b84
SHA198e32ed70bd901745d69d91a37065e0a1b68b3e0
SHA2565f6ce7c38e4d5e80430ac7743d7bf222be60958e2b4e5c5da98e0be1c1193b2b
SHA512cf6efd2e605f4463327ebab4381836234e2b46c22f4c4d6af09d680c6d68c4761d3af85f4bc156e6ecf97d6171e98ade3950c6265236a8a4888fb1f96b05caed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e606295f61ca7b73b9044a237175e55
SHA1233315e09720d8609121f765335b6f279224d750
SHA256b59776e8dc1248129f5cdca44bf3b0c777248bc58b5a12f2fdedd206df3f22a8
SHA512f7f96e3035bdccec4eb8ac72797fb51b65458de4f67767fb89249c33a197525f10545e30302c32d2c0bd2370cff78a2714eb824e2d49643cb2a8d54058ee26da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529e4ce13de6c7a9db0e8eaedf7a0a32f
SHA14a4f4ac8eefd786ee6bf84f02f7f60a84687c0e6
SHA256152f6ce33523981d534549435c219f0061dd1031eb8041be694b65a08ed422f4
SHA512c478fe20e584ec335f9f428f313323c2979f107e71676548439a9037c3fbc72a2761ef8bff6182bc27e70e117e523cc409a4fae2965d0951e68bcdfc4e1890d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5616d22198a8781195a52a742113941dd
SHA1f767be4354b0437ff0a72b8f5a4e6dd362736151
SHA256918c6e3611aaaeb5671e6f0171001721175491d83720b4d254dba6c8af436604
SHA5122701e724ee045764b636d7ab01c9df15f221b34d4dc376114f31c9e5bf32905bcfb494bdce16e1eeeabe1cc8a47bd7b3eeb898e332df3ef5a195887630070363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519627080060d07d86d0d5528667f51f4
SHA1730ae970f448b93b302cb3c1607e06c2df4b9a88
SHA25613ea57fb452002f1214ac1cfa0a9efcdb167008c8ef3a574f3387a01198ddcee
SHA5122d7c424635ba4e16e1598a06142e00efa25873310f64538e7f710182dd71e413b8139b1d8430d82c7c632ebd774723b6904692a15efe68a62035c6a8547cfedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540237b32836e96e38e3b3917aa049f35
SHA139bbc3f92dda13607357b5c00f75aa67aa7d1e6b
SHA2564ace315f4d1dba90dce586fa7f518f9cb908f1350d9ebb62e4cd702e0175d159
SHA512aa377587f39a4bed6c428ee2dc34e5f53012608be1f52aa1939a71076a9c98416dc89b105429f7ea27214ebc8c4771bf9807afced516c9e269574a80a1d19801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b69867cc27b2f5b35cc504974e5d739b
SHA1a8aa8100f794da89a8a713de5fcf89e3f9e8eb10
SHA256c228625867b6054fede4f9cf104aed4aec205c6e7baf1a9f2e72c0b3e72dbf11
SHA5123c2841744d8acdcd78f2e031859b2640b857994e6ff1914421db62921cb6e655df25caa5dc461985da5dac813aa8143b69bb0e9a21b5f3d7168c6951ffbd1520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2072a89e2c97a0cd0348c1d83cf85d4
SHA1d435eaaca721c372f8dab7b721ad6e32e48de3ab
SHA2568d7b1766e381d8fa9f807625ab884740a90f5b23a311afd50d8b3077ff14b288
SHA512826190240729080cd0015d59fc1438b10b5f14722feb30e3919eaf0c50e06cadda1d76f5b53cebef66f203ea8abbd7b4c3ab0a6f69b3397520b3e2265463abbf
-
Filesize
5KB
MD51a8eeb71ddba601e7538cc5a755d58d6
SHA1f75ca1f7e2136864cce16096959622293e0ab6c0
SHA2565d8d7abd60c3872856388c39a4978501ea661b11b7fc885a255d819fac0a0d1a
SHA512123cf04714a7681efb4186de9a5c5a64b04cc3fb24f696fcfcf1b7ad6df4a988271cd28a981ca0c475ad430214e6db8c5c7edaf2278d2f961673dae7a85c1199
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\favicon[1].ico
Filesize5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06