Analysis
-
max time kernel
156s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 10:54
Static task
static1
Behavioral task
behavioral1
Sample
libstream_out_gather_plugin.dll.svn-base?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libstream_out_gather_plugin.dll.svn-base?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
Resource
win10v2004-20240412-en
General
-
Target
libstream_out_gather_plugin.dll.svn-base?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
-
Size
7KB
-
MD5
9fd5b941b03eb71db42a9f04fef66fdc
-
SHA1
de88443a394c17d4afbc00c4325fff9fa7f4e360
-
SHA256
5cb62c457aa0d9cbee4bdf0e4e97627b41ee9fc5e50b2cb2d2bbb29329996b46
-
SHA512
e1d5aed0a3f1fd7b27b6f489c09bee5225b22ab25884a7ef191c809f6a5ce518f6653e8a0bdf606052be9fd90a67da4ba6d925b795e7b2e78a83097cc48e9282
-
SSDEEP
192:Z6vTPMcMHyTvgvxviQvgvCjvMXtvtv5B/lo3yvCvHvCv3vivHvYUQE8uI:Z2PMcMHyPpXD/7E8uI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc50000000002000000000010660000000100002000000025adedbbd1a79e60e479b640cef9416cc78559d1c3d03a6e22bc5ad649b56c26000000000e8000000002000020000000e84f36ceb3f6349b3d076c6d88830172993568999fde66b10c7f8b251e36be6120000000ab8d1c375ae2e71cb116b6792a8cac925b491489b437c46bab83f5858db629354000000024fbca75345f104c87882dc70dc725dd432d5f3c2017d79eecb015f336361a14b0884ec7a3d66b9464455a30529f1d12093ead723d201d616e3e3dcd799bdd2b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7EDCD7C1-FE3B-11EE-8119-4A4F109F65B0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc50000000002000000000010660000000100002000000022957e0cae761fad7af1a0560b9293748897f95af251b425ea74cbf3e32fa337000000000e8000000002000020000000c4ee48fc1707ad5d525d205f24f018584f52fc889cd1fee153a1978a284ec43690000000debef5b251c9c8b63928d5b7d8042d1c06bc32e7370d11bc469d659b347f2c038819e91a0298a8500022d92b3d3e135cee1f9d03117832e05b4e5214adbbbf8ec4862854a084a7019c9fa4dd4b8b3bd59e48f1a765b22c06cea375e168871ec8bd19c26ca6ad1baaae3a6bf158a318a2da3ff250d7213b62af848558af97cbfac589faa6632731e5693d5e9fa104df124000000036fd0d24873e2800f3f46cdacb1b1c35caa10754a78170dc4548af084dc80b00e9e907bbf70e15be0fb0eea48e9d04c3ab8851b7b5244804f9a6d51e23b2ecc7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419686067" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4070f4534892da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2508 iexplore.exe 2508 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2644 2508 iexplore.exe 28 PID 2508 wrote to memory of 2644 2508 iexplore.exe 28 PID 2508 wrote to memory of 2644 2508 iexplore.exe 28 PID 2508 wrote to memory of 2644 2508 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libstream_out_gather_plugin.dll.svn-base_id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b7cb398d9d0e96673137b3a3987131b
SHA18a00b690c570824a125bae3ac382407c8ee3a143
SHA256b9ca262d9397f8ac4ece13a2bda54dd471a01b3f6c85cf1c1b6352a6c5745390
SHA512f28219866c499c6ee5bcb7df5df9c690c7025e7aba6d6f711b946d6b67038a798294df83d0681f8553601e8680f3ae7c154eb80bda08d38f6269731cc699c11c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5444bb8d1cc4a5146397ad3184dd04383
SHA1985f96d91dea58f22c19163d5a8721a173a50998
SHA256b4a33668fc00958d6476873b59dc1ff8954cf61e12b35386b6520857f856c70c
SHA5122c053af69b00f6b35af731ff433520168650dc23510de88c02a3371b24c3bf70c558182c722b111339e2d7edb1d6047371fa604add7284282230a33aaaaa3694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5155bd1584ba7ccb5b22f029c8c7f79e5
SHA147bf969b52efb9cdb9e74d35d565c33228a69da8
SHA256def0720aad20e0d5b7f9cac1557f5296b8b10b07b9610d470360b649d21cad89
SHA5127a92abe619414cf0762c323f6b843cb8039dc08b77aab6c3b80d3c60986957076c6139cbb74564ccdb77db17cc36a5912ea8a5a5f8818735570af3c2c2c315f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512ddc7d4652ae0c7940f283d29abe6fe
SHA16cf51658f7622c3a00bf8da837133d9927969285
SHA256d6d22373a6e59e0064bbcae33f41bd2dda033dc891de8cb9347d2628f55ba2e8
SHA512002484d7acc829bb087e96c12a27e65679b5ec9901fbfe0bc64b7acf9bd88660fa2faca2001216c68335d05de5beb832e21a8b5ddec1064bf6e790c28382cfe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e652475ca971ae17a47155d76653be8f
SHA1c0d38a525f8fc8d85332dbf0bbe55b0cb92a2ff3
SHA256111d05b5b4d26b770755fdae77bf2a1cb5198a410fc14a8d3bd857230523ebdd
SHA512bba1455d2b515792134916a6bbd7123021023456064ccb9c22d0576729d2117663a6d9607b81a872783fbade3dc9fdc9859a67e56794d03d8751d3fc87916cba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521cb02883306f5f83f7ff5b198a41afa
SHA14245210e5796f63665151311e9153b57ac1c7971
SHA2567f70e7c7e097f9fe9743c2236045d9059b7044ce06945fc6a07213722757a4f0
SHA512f9bce1ee8d95c984967a7db0fa93529f6d2f2207d8e3bc4ace7c0956ff5dd14a97b232f325da7ffc6259ad761f12cc852115848f1a344cf6afa8a37d292e246f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52826eaf98536da756ecb918dfbeb91b2
SHA180e7a37680b6381a100c3bd6c0dca96d1e78034a
SHA256de5ccbd5afa7490330db392ac813f716277a785fd27bdbd6506490cff757322c
SHA512749d5ec5e54159880b8bb30eb237538d6d9fdd8e9753fb14c529b7f646fda982e468af69a350bff8b2343043b44f3b1bf80c9e7bf4af0c2e4059496428c17b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5391965ea2b558521727f2405db144cb8
SHA1c3fc5e66e9180df3e3fd37543e6714fd70372511
SHA256bd4547f7a4f75591cd10e1b06d5e3220e3da2224f443c2a9448b646c40894664
SHA512404c15bd5b15c797fefa5b908841e781cfbf766faf8bb64b8cf2f23769fd401bf9e38cd5652bcd946e1b7ce72f33836fde87dc5e2fc17ecadda4342956285b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4125dec91ab2494ec1d042dc9b87c15
SHA1160c2dc4808da5bc4bca498bca3b99abb0d4b008
SHA256367fc2636d09415ae252d47a6e970df333d1c353599e4fdd9a2a2c620abb8c42
SHA512ef1ca7cb163cf1a0db1cc8cbe36b11f082ce6aa8b9d700a0b49589828004c826fe842a9c8dd8ac7c70cfb5ad45d30d27f26e0454fabba8674afdbe199f5b6706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e90df19a845c7794ac380b6ff943d8e
SHA15992e087e17d5281f06b8fb531a9ac7152c516e2
SHA256b9a1cef007b63c453f3b41f717df939655e5fefffe3fd50a19bdb8e7e742684e
SHA512f6acce47b9d44c53454c474bc475bef1f87307b26567d4a70d8dcefee88f8ee9a9543e0c680e10e25867808b2d8eb661958bf2035d5ccedb752dc10749978e8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5108c182bef7a063413d6f9c293ba86d4
SHA1d1d35234d6bf99e2011d4f2562ee77ca6d3e5f07
SHA256c4834d15b1cd6da8993bfd4e59dcf7342c927c76dc732c669bdac411f9c7c84f
SHA512fe0c4d73c7c2b0d21fd283da24c5fcbfdb7d224e30908273baee8a767197021b679049825b4ee393fed5ca53616a65d9b43edeff1dd18ffb657c0cca6d4cd0a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a3a77ca4e747369e938263f5b7002b0
SHA1cc22b72c59e357044738360b90c25611eb0e07b2
SHA2569ff031ab12cf379505f3c4beafec3b5ead6971dc2c084d6df8257fe510323715
SHA512fb8433ebc3f6d25e7473179ddabeb3a4ea52ccc7da6d857326bf0da41aa9b45ebd3952ea714ceaa2249d902c01c5e6a3c6b8c7519dbf9199ec2d3511512b6b3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5249e2cde8d2681174cee8800a588cff7
SHA19e2055b3ead4b32bb4ed977630b479374e50039e
SHA25633567920a16b3c167e83e037e3c63b4c00a5dd1b7a8169312a068e216f6d408a
SHA512271bd3046fb78de11f9507f9a6ed3f06c3bb577a1d3e11f025f423bf0c2002d6c38870431b24a94201843a2ee33860c99defbcf822d0a43e0b7e1a5a9b37dd60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543ac1263787cc0c510db0616b14ba13f
SHA1c5f3c6088d71071167e082828811d74b762dd224
SHA2563abc9acc32186ddfd9da43586f72606454a35238f4e1e80c95575e4d44c9b50e
SHA512623c0cf6a195cceda367b7937be7e7c3dc033049bb6daa3bf1a2c99502e6af1ec04c3f8f6462ca4f62a248f782a1d0ad7aa6032910f0f6c1f299a47cd319f266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5439a4aa2444a4b0b14f6aa1e022fce95
SHA102013c280b418d76fe043d3909e2af4b797d2636
SHA256aa17151dab34abdfdc7bdd4b62ac3e670569d4cf458563c7ff48711c60f2087d
SHA5126eae50c5fec475fa3c4f83de1ed4ab325a5e72847e6c0beb3fabac4a67176b792b05d0ed3857b5e630cad84d19128c095b7b3607c5b4beb3ec2376fb6a0d09d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534ef6087ed30bc5f9b8e4d3eb3342ee3
SHA10b3cf93ccb2c070009ec25d1510235abcadcc42e
SHA256e7b7dfd6412e35ca23edb61b3cd25b09b1643167f716053b7280ba0128a84d59
SHA512e67027662928fb0422d92bb7f04d31bf7b04de3793b9941a1318a2fe37edd692b6bd587c102965df60b1235ffbab4b66422059bcf309bfc78fcfde1ee927f6d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b0483674623f253b3e2f80080f1ff12
SHA103ef074044652c8a8e8f843dee43e86785c1ae1a
SHA256ca6814694bd65a982d7f319dad5c1620dd449b6fd7071eb284ed5cfe134b1d20
SHA512a3e438226cd6226d1dfb4aaaa2754cfc9a1382e1a077a7fe450d8d83e24535bca56b75bd7e562da674d3a250b176470997fa894e1085ebe3914490fa70df4b10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543a3ecec548b13279fb6eb7924c4ed1d
SHA1341e9b2f0d48d1111095b30a230ec7047386b72d
SHA256c936d6fd02d8f75a97b9a8b3f1c518d0988e5dad65faa137d3f028b978688b3d
SHA5123f6eaa522fdb0af982a76e7338039a8192e5a371739c5d06333267e639d8a6eee2d788d9ff70bca6fb8b693a33240310af34bd10ea116698645159ef89acc8ab
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a