Analysis
-
max time kernel
1561s -
max time network
1562s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 05:54
Static task
static1
Behavioral task
behavioral1
Sample
1mq6lgmybl4pkiny.html
Resource
win7-20240220-en
General
-
Target
1mq6lgmybl4pkiny.html
-
Size
27KB
-
MD5
7c6b74c629112bee0f93ba1019d24d1d
-
SHA1
a74e3acca3d1468c73641979152a5a20ac272a14
-
SHA256
ad403140f5c205a8079f5737243e909d3e5b7b513ba2afe7b085f077873693d9
-
SHA512
53bfc09038e37d74767ca7796599bd5c31503221318dce3bd297bcb45c7c68304917f0b2efbf62f34060f847228c6ea96771668b7f9e6c3d7f11cbc019aa63f2
-
SSDEEP
384:3JjueA7gvkeqUGg0OFg92WT6rHF+Iw3SMMlJRmqFlAcV:31jkeqUGIw6rH6MlJjt
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000005f7c770b5652e5feb7089c5392abc613ae828adcf7d90e10b10fac9dafd3d6f7000000000e80000000020000200000002db1123057b411c623b58a78cf829a95439aae91bde1dbcace5d69556776daff200000001502771e809884784740fd441d62a2e2a80088db03812f549f33e09c85951239400000004a82a8d87f5928e564992855b3969bf9d997ede43682f4c95305b2676f81d05ae8d69846dfcf2ed79515f5c1c947bfa625c8182b259fc4aa0c7760cde9d8aa1f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F8EDBC1-077F-11EF-B73D-E693E3B3207D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000ddee32007c6371192b859e36831132b7d6d7529a32b00899f8429dfc2c4e5613000000000e8000000002000020000000ce1f6700bc60d7e5e3ecc55d48c2d7270766625041903feded66c8b4e30d38bb90000000e452cd239ae17e4744e9710151b35812b94d37da61059159318dce62e4f287072d2b7eb3f98e746d4a3afd43d14f5b2525b08afc5d807000e9a51525893b7899cdebe37037a980854f7b3bedf6d17ec8cce680792eeb1f6a9cc2a538146222d17d7cbca2d21c8dfab74624f97531e5486ab11b3df055e2601f18da72faec487f2fcb919c8723c6a07c510f34ed64096740000000dab7792f427d78aa21df0084e444ce053a142df57f451c5261e5a76639c4a4e0f4fbab4abdb936a38d8f6ea651f67a6525eb1dc08ebfa83ca1e6737468833920 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420704859" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906d21648c9bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2496 iexplore.exe 2496 iexplore.exe 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2120 2496 iexplore.exe 28 PID 2496 wrote to memory of 2120 2496 iexplore.exe 28 PID 2496 wrote to memory of 2120 2496 iexplore.exe 28 PID 2496 wrote to memory of 2120 2496 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1mq6lgmybl4pkiny.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afa3d2caae6296d312080835c5a96a42
SHA1ece70ee67b5203f0f883e6846d6d3c2c1b9ad786
SHA25658cb67940f5da5d6f7f795f16f98a1ba383305aae53fe2ae3810112fe1e7410c
SHA512b3091a6b1cf625b463d9bf2226209b1904207a5afe7550a32df7d80d7573beb403c9b0ddd77631f0afad0ab579e0d9f4406e4fe6779541f781136ffa6138edab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9581e2f3d7c26dcdb07b2e632d951c3
SHA1421df1afbf445eeceda8cafc715388bdb5000a96
SHA25602ac3cc097b555efdb9f624b55504c2e8f8fda3288f488a88754424bc2829257
SHA512c5efd64469fb35f2fa898d643949b034c133e4dd7385a67de98bc1e3f57d6400b8d2f1ae0d22f0b14fb33c38fd1fcd81dd04582e683f911040bc16f565a8f93e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d2293c4c74abe7f058ae7c775d4528c
SHA129c9c0602e6b9d35e8f66b7a1581ab7c66a842cc
SHA256a49228fc620915744d5217160cef205e19616f3fa85894f9a476c2ff8cd41523
SHA5129853aec7c60d18c1236b9e03d174859a76a7a80015da110a21f52079d7ffe602a65453a056326f8f9230bb0f77a0e5ce3f5265e08bb1e511e1cde29f21c961dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d95cabfebfebe06587d19d89516eb619
SHA1e7033605a35c4334dee71f0eef1adf8f1451b39c
SHA2565bf77915977735a424285697685bff19899aa326289c5fa44e48ba3a1abf6fd9
SHA512eda548d973efa6c424d363a8fdd3c8fc977050bc9e426ddff76b60826a1122efc9cedb40eae621827d47d31559f9bf56d54a859edda33a554c4f01de10023c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57979cb0dbee1fdcf2b16266d33b6e45f
SHA1ac8ce976675535e858386780a4fea1617e991ac4
SHA256e755344e9cddc08a3c92722d6cb7dd2155fe43f14ca79775031a4c94132ddb62
SHA5125efc14b7d74ff66440688236f987c494e860cee270e2554c63ce5eaab583a1764a1e90804149871497d76ce6f3adc7dbca64419f71199a8db0a7feb2d9767a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3fca71f99ea00067a693f105eed469e
SHA10b78f473001fc3507c94ad0613852b59ecabf5b3
SHA256cfb6298ad41f9f195fb59baa9ca50a912b750b53665e709e4f3d1d18e4ec6c16
SHA512d59a64945a4087101ca095e604aa6c935bb383de826c687e5dd0a7e9fe8ac954990306e6cf46f7ee6bd72aa4d447684a298d1ce4e2da9ec2136e637610068020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a67e9ef09ee2e2668819570de9bed541
SHA1cde8b2ffddc9d8c1f04f4d3bdf1734198551bebb
SHA2563936823a772f8d4955cf00ac401993c59ac87000001f2569b9e983b2f19c18f8
SHA512f51021d30cd71b975f06299f6d8c4868e8cee01a83f3205559be076ff754dca6ad0dcc7c7a63b538d92d695ac0ab385b4804a7d365eea7dcfab99e3054e33380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a6fcc74c7361a8f1828304d511b09f5
SHA13fbfdedf14b0940d3fef2ee00dc1b48b1ba39979
SHA2565d0719c5e8cea26e4a2c82a021365291e67d4ee092d4bd760a8b9fdb75a079dd
SHA512e80b5712c601320efcc40f03e57b985899981e30adaf24b7611f80d539779e0aa2dcbd28ff9c35d62b698774279b36495fce6a71fb90d4db4c44aaa4463ead40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5323947e9b560f16e709a4ea2857730c9
SHA18dd9114a08ea2637e2ae77b5f878fd19592c70f1
SHA256fb3da57062aa62f5aaaabd264ee3866109139492e90df9b5793fd583d44b0d48
SHA5125dd106dd6e384173df9093dd58bb127e10760fb757efd62b4b4fbe8b7703b9492416ac7f5b5deac50825ef0fd167eed99f597288f9ddca895b24e161438bfa7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee4f25da09a0bf882ca16125e756ebba
SHA14fefdeb257feb3af538b13e818ff20c3f08b9e5b
SHA256b490359674ce059959d59b971722664f803ae425e3cea835ccf59ab3a510e140
SHA512bc3c9bd0404196489ef8a19ac7de9e131d1b18c8db8d72326f62382cc48a955a67e416b96e464aa0cc9bf44d9ec7c8ff9fd0b1316e0eef6ae032c56cc2e0adf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5156bd48c4105f16ac76b4ee4828cbbd0
SHA1b98e7450fee65bb56b8e11b569ed26dc5de3a372
SHA256573e388336f0d7e621fd742e0335f4aea8b3ec11d3863ea34e1c525c21cbbd5f
SHA512ed61e017ca3723574da18c705984ee3f6fd14e2b36cbb5d2cc909d0f83fbc3af013a1c7da2230a5d60fbfc774f6f275269b604aa8da8b2789cbcc3c070c7ca02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551bdd1021a0e1896f902c2b284421668
SHA19fc39f11223870108ca010edf4d4bda573f53684
SHA25642f2b782f78d4cc219740a229f42cc0c35a03bc9436c511daa3608c2c917a3d4
SHA5128fd86e9972821aa126876109b902816fc36e90585612d4be773d780d757eeda13c61bb867fd5ef501737621448b876a154aef63adefeee8268ebf678c4b1fbeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b2371f8545a11ff50487a04168425e4
SHA1849429c41cb11350e3c341d0ea7cdb98232ed64a
SHA256fd5685ea66ec797ac080f786f7977d07814569532df7c021be11742c86106c0f
SHA5129644403df3180e568664bfa89ad31eeb3a69e9efb094b2a343b4fda53e1aa2bda2c2b9114dacb79fdce751317f23734fbb4e787f9bdf3e7755dd99ac09284cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5623bfea13b17b657cebd9cbf1c0af5ea
SHA1ea19d21d9f42176fe6235abda78bc942b03011a5
SHA256a5a3b9b17da054e4d995484ae92e7d863b4373f47e0f6747b68e7c9625183340
SHA512264499c63cb80b73bc3e6776055acc31e236bfe738c19ad20e14296ddf74862b4c6fcd55f432269a3cbd8436772638454695f406b2a49afd89b5c0fe29c035f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d5b4d47fe780b6fac23229fdf5152ef
SHA1bec900a850cf2c927b28242e512aa363ffbaed72
SHA2568c90c6444a9cbd8266df94a7fc100bcff0458f3d50c9326efb52c817f4a14550
SHA512042b10e5a34e7846b9ef5719acee2af0a7183a8be2dd0f12aafcafcff7cc420d74760fc0506a0b83154fc804b90d7b3b8a126e1d9c3dcc098bd18dfb6d5d4639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba651946240840bf1c4d2e7513a661ac
SHA1624b740a16f170ea014b249fe8211d63ca632800
SHA256e244461ae114d0a023e05e48933f5e6d1c13ac02bc34546861ed2e8dcdfc3109
SHA512a5f8dfaa67a44cc50120e5b8a051082dc5a3e34d4f609f51be51c5dfddd1624cbd29a4d07dfb6558973cd30a35a4da11cb4f644f0c90d70b2e6e521ae95bf823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fba4d61261b19bcce32167a0f80b5e64
SHA17eabf3cc6fe32c4c61476dae61bdce7d99e9815d
SHA256e37d2f119130b92e4420bbb6c4fbf3aa797e2d378ac836b920cf42c82e09a1f8
SHA51225226b909b9d76953e409c1e864eed27402b3f0730a9a0e683c2761954b145ce28ca81ef73eaa7440282b36b28b100bc1931da5acdfbed820530f2bd73f80539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5127207e97a428a8b5e92019f4cfd6c05
SHA1fac032ebe457710ee7214175ee56aaaba2bff749
SHA256b0b80f10db395143442abc194a020e78f906218e2a608dc1081dda90f075c4fa
SHA512df5d74eece2e365f5f8bc23a099b5750e06ad8b5a9f241522f8eceb4553c1f8fd88fc3a66ebc39ef3fb47c5d7a91e4bf454b71d0d0a36e8a9645ba652992d9d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551e574407d6b46f67c8a456461798971
SHA1e703775f60fe3178a874e16ca4d3cd16efc08da6
SHA256aeddb77007e47d6ca064d205ef561a1393350a0c505590909a430e5b809bb357
SHA5120dac8e4d0a037cc77b3178e81d683e6caa6f9c8c065488380a0ba6f38727eb4f737a08c738f93ba5f9653f6a023ad77ebdc2ce0103607a00c39cff8f3b83a22f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a