Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 22:16
Static task
static1
Behavioral task
behavioral1
Sample
IY35VO.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
IY35VO.html
Resource
win10v2004-20240802-en
General
-
Target
IY35VO.html
-
Size
15KB
-
MD5
462c1e307023e5326297ad2394669fb2
-
SHA1
301f2dee7671091c92aaaaf5b79fd4711002e255
-
SHA256
7fe612a0a1943fdb3ea6cba3f8d694c760bebb5a3da7706de7196e5971c1a98c
-
SHA512
4a306c1f65af259a34cded79292fe0fd283d87c3924616537c9c8d434e56694023c049cfe2e6f1dbfb6a4cdd65e6f66e20bfd91e059394a0c128a8169b953db9
-
SSDEEP
192:PNxyShvK9moqTJkNrv23E5ne+fmLGNy1+MJWHZfJ9Sdy3VN:yShi9boJkNz35nxfRNmtJMZfeUVN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0de93ad29e5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428798848" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000049d3e2dc0cab83aa1b56369da30c4f8b5214b60f277f6d3ccd4d467d60cd99c000000000e800000000200002000000053e411d301b7e5cf69048cd699ba890e7d8645d9be9361b5d588defbe3caba739000000098d014333e65791677f4d3ca53b8b77de0cb2a364f8b7c403f242965f4f601856c8ae574c0814885b3a80a78b83f1e931e82961d2125148396130ebff1ff331ca51933c44670c391e096397035d972344594e0288d450acbe208a2c1f06287232e4b225c583d8f6179305cbd666811f6d347cc99eafcb6dae769137b587d0ff34e080c41321076fe27fea2aaba87fc77400000002cea2b8fef8124cb0fbc03195ab10771d4ff16f3f6f0ed761e9b69db49ef445a2b9a75e8b8cbf1bb2c069d4883c337e2e35b71ae14daa834b1460742719e0e77 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D8F97541-511C-11EF-97E7-D22B03723C32} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000df527777faf973ae4db80416ce0e29efd7b47a5f27481ae091b1d0b63c1373df000000000e8000000002000020000000b0bee3f6da34bc8b2dd4cbaca39b3868f253972234d6197961b766ca6530476120000000e2ba158c4ed62a612e40a03619f06976a9b171f03429017de534936285cb978a40000000f4e7b3a217dc04b5a279df3a81ade139fd9c16d5092fad788083567da1c9d91181a416d807a46c9f1552797f676e2ae9019bdb588cc358d9cb9971d4e6f99e5d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1836 2308 iexplore.exe 30 PID 2308 wrote to memory of 1836 2308 iexplore.exe 30 PID 2308 wrote to memory of 1836 2308 iexplore.exe 30 PID 2308 wrote to memory of 1836 2308 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\IY35VO.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5473c69fe7e9379389a5234b780e98e0e
SHA1c4c74b48d70c36cf000503bd482f534714b626fa
SHA25608e1bd81244aaead572a5b2c94de0dc5c2ab35ca13fc1623acee0b5797c6ed31
SHA5128acc940df263802a43f6d53c838733d26503fc0f3a261c83102737062a49e18ac47797ff23bcec7b2ba73e0fc27daee3965fafca8aec7b36bed64c3a70f90dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c99e2d65c6577963ab95530f7dc4abdc
SHA1c8407fe947541022d1e111db5c780bfe06b4d243
SHA256fdfcdd70cf93604e919fc4567f4317a84c5bdf9c60e9a0a270d3f5fd84bc4f54
SHA51287d12599fac1b2494a76a4dd33fca5da4897b4db469df92da2f300651d1eae2d401e10a2596808a735f2b2a66f03ba639d3343c3dc931e144b1740fb0696418b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a235563cf86c568b0a9eb85d1da8dd3e
SHA11ddbb46c8757c38240ee1e93d410820ee128af35
SHA25664e4ac4703c9173cdc2b3ed2c44646232f7fd4d998cd8ff22aa6e7f5d27dba99
SHA512dcc17598220aa3ef54fdf11fd6a0cf879b3af201c25a4a712852b1b1833ca4647085a9eca0fbc79936507a131aeaea8c19bb305a106b3b918d3fb2bfc7581188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0f7db247edece87c71627b16a2ac2a4
SHA19f69b02537a2d9bd038cf597f20f1cf0db521f66
SHA2567c40978dda2f54f9db52cd74c9dfbf732ab9da9cb5bae95dba695c81a1fe4dba
SHA512886cd91cd59e51bde99b05b32f8aa7bb97c291cb315b9a93a4fd7f307ba2385bf016353612dbfeecda5a03157d9b03c03be08986a9f916f0863bc2ff116fe80a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542b67ba5ad3ffeb5d2b02984d4ff071b
SHA1d325508d2dc35edd4f6b0d164e731c6454aa5194
SHA256aebd4d37aef925847e9c6e12a512029665c36e4eb01c666c566b8b272fa023b9
SHA5126038919664f4d5136b9424fc2aca35de5b94b604aa0e3be0ff3ffd1a4fd1fb0c04853cf43d21d3ca0e16e4a0c02e8943e008963d43c14848f891aa1cb9b84989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a202b444d0b92d2ac3ac7778ca16f85f
SHA1afb1bee8cbeab629bcdce22607abc01ab4e4aeb2
SHA2560f595120333709d55ff72e621dc0585c04e25890c125fe23638b78e8ea09ae9f
SHA512c67a4e731bab11ef8b96beea8c8733536784d294797b0118297742df272ee7a123da277bce6ff310665b4847b779e238f10019080d34a09e019b1c4ff6647310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fed6c882e90f297d8bf877ba21bd454
SHA1c65a31e3298e1948a5d91e5fb2fe2dba671069e0
SHA2565a3810e6771373cd82ac2badf3d90a57ecd9c0eb93d1f7b313c6e786b71af62b
SHA5120f16d39ad30301ffe4971cd013638e805b366f51d7f5ae3ab0805c2b58941f8f5ac54fcd9a4b9dcd1516b7d275f664f9a8af01dc9afae071f4300f4543955cca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2c40a14a0c1e2ecc27c9b3b81c6bfe8
SHA1c6f9f33befd589deaf150c61d6a0504c43aba579
SHA256fa4744caa40d48c8e034863af0747577d5ae4b62cd9016a3e4491090bec0aef0
SHA5123dd7d0763d92c761f83e9c8452c94173f67562772625e6dc191adf20cd098a057c7743ba3d94f4878b2c1d0c1ad07efb502bea893bd168b44ef80c601ca80def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9dc00837da42c692e6b6c9ed5f926ba
SHA13580af48bc1fa511b71c1262088070a815ff22d6
SHA25636e7cfd555d84b5fa6d3fb8b574d5db78cda3df2f11bcdda2bd0550cb3c3cef9
SHA5122aa51218c787057011f7b695188854553c00ed117f6380dbcac68d1d6a8b6af0fa2d2445b749f3853b343926a4d5851712e8a1c032f53881025b57877c7a58f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4d47d8421f413d3b4a9f19ccb7a68b8
SHA1bbf533dfcc59ad069e1481d920c02c2a636d7f9f
SHA256e611f57c28062dbf3d9e32cacc7881b118b870957afca90ad41bbe79009d9e2d
SHA5125fef7aa1627e71921f847c3eb75de3abbd977f817b33ff5b7585a0a39ceeba215e558feed257caf74d2c08acfc6a1ce4c59b4ce5ebb289f8a9a4e35ae7f3c687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8063f3d1fef613f6378209af0b380b1
SHA1aa6aa943d13dd9905e6d7151dca55215afff83d2
SHA256b5c40c2c717393f32eeca598607e4fe8d76ed218ea7f0caa0ffbb2ff5bc15c18
SHA512e4abacebf5e38dfaeab6b8c993eb306b2423400f29f77c65ebc900dfbaefadd3daacb79be38d93ba2aab462dc6202c6873b813ad9f853c8578ead0201320874f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9ab74be198e91409130c8de69982ee2
SHA1aa259072e4d287928a8c250f4b117185ba68670e
SHA256fabf5d72c9c1721a844081231a7ed946f31f6d314999f6f6b8839094660650d3
SHA512e02bd10e2fe213ebe36edba57d78c5ceee95be7bceb92c7247be75854c191a95094d507c8101f3deb472032ea85ffa5eb9d6b8bb6f700a8c0b1a08a7255f6ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f39ce47301f495f6c26e06da3986114e
SHA1a6297a800b6feb5fac092b4d7daf00adde8e2cb0
SHA2566568ac76ad1e11c7bdafdb5329c563b1774f0a5aeb6e1be3799ea877f2c6af60
SHA512eb2e59d493faa12b33bf6fcf8c12ed24aa2f9aeca5065acc7a9db1d30aa6b5832994bf5e4fe7a58d93e289012c3252316feab17e882e7747d6699ab5fc03c72f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea80ead534213e9784112da7c253c1e9
SHA1da53a5285714053f2b6cc9566611a550670f5350
SHA256b7b8ddcf93b5aea649bd86432e92a04ffc241f15da331c680d3860e9ecf5e40c
SHA512aa14b77787a47ff06ff8e905a03540e6b5c36f334a59cbf52545abd770fbf799947382fa936626fa1bb153cd757a4c148a7460080b96c0cc0902c8025bd867fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5780101b74d8e78a81852c1d587df1ba3
SHA16f9f8e6519ec4e07fc1ce5f11564df4c2044e7b2
SHA2560d89939238b817c093f08d043a9606ceb05dd9e72ff7a675503bfa665226fb95
SHA512b8812711fbef6bf1525089ddbb7054ca761ab909f3492455cd8a032ded5cb750b0c1f2593b898388220459e6ffba193b12548ee522087b4591b9ecc23e2118af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a3b8ab035bab819849b78fc357d2729
SHA1db523988b46f96b503eefe04b83c1fdaa6c448c5
SHA2567a5cf4b86368d8aa33878fcfd39dad1a24d676172dd87aaf327aac02b5d1b979
SHA512ddbe08c6a80d7194b31f57d2f3bb9c7188f924ba66f27aa1272f83be1b8ff3679efe4e9bca50e7b025e92b57d22f4665c2c8a3e94f7ef2ab570bcb65a3c63284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1e2cbd3bd619e531d391ee7ac914ca1
SHA1aff5d4484a985998a627ab3ed54460223b1ea293
SHA25613f9c26eee888fac390eeddacc9ded5462898b7abcfe7b317cddc1d0103cdeec
SHA5126a983547eec7ca998a45e8e26ec8ead36c277801ef0bb9c60dd203a45654bdae8d40850c0e058474242339ac814c25651f9aa17c323c79a7708b3d3f85e4d7ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5604d887f9bb549c495015b612f82c5ab
SHA1817a3f1e61042a26afe3fc41ff1e08c29e376245
SHA2565cc70948d3f23d7737345bf238c60293ba678a1ae392ed8681a135a9e0e0b84f
SHA512325080e1fe1d063dd481088fa3838d52126527656420f0720baf2878d300959889260f1223638b78db1354828c9099341a5568d80dc374b1dd4f65f31fc300d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8fddddb24b11bd7f7cf612837a6ba87
SHA17bed7d24fb9775e815b1c41aaef14bfc00b7110c
SHA25683a1d8f197ebbaa0de6fe91b919c01e6388d26f5f1c0bee64cb4ccd30c240b95
SHA5126d7922159b5596318d4fcc464d78b35d47b120cd925f5b76aba8865143506009ec3947c25bd03790371000cb9b42c11dd2ff8371960b3c8bff30c3c11cb919e4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b