Analysis
-
max time kernel
1558s -
max time network
1560s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 00:29
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20240802-en
General
-
Target
.html
-
Size
734KB
-
MD5
7bc54cb965a6a313debb21b8a768abce
-
SHA1
3805e440611de7ec9eac4af9c2295d84a4e7807c
-
SHA256
ec1e14b301443ec9fd2b8b11c2877b1f308e98dd19826f33940aa7fe809e86b9
-
SHA512
28520751b317bb96bcdfc95b40e9d9a424580064e136659efde33e7b36e5af88b79e43c786dc47e1b3a88a2ae9230df10bd18d72f84bfa561a1f281555918466
-
SSDEEP
12288:fTuQKdGBKLgEYqEPu+1sk9wYQpVyQXhb6rVj8oSi/24CQyV115coiEjgNiIXEkz0:fQTzh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{63C9C661-6CD0-11EF-B233-C2666C5B6023} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000001d1b9d820db9871a452cd9f2dd949323767775abf8cf439261671af2c41ee077000000000e8000000002000020000000647efb8c4e19a5e398661cc20d2a5f2ee6455854019b422ce7e98af9497f82fd20000000c14c6f1d32e11f47ce2a1c231af3d08d9cc87cf96282190355ca9c524f910b1c4000000027f3daf916c20fc299e73a79b0804e7241b41f0efc2343b8c3873b51eebc310d3be4574e748f326835c33c936a6fe47c2078cfcbdb9894c55e6547fa724ef11f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431844657" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d089e53cdd00db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000008459c92f462ae27fca90c6b685646ec8c7e74644610be642a7b07988d060ea81000000000e80000000020000200000002f11e3dc2e2c1347965f373a58f65f3859b5a5e370a3c8229798b6706c4443e6900000006bfd7e974d6e817f89e86c8b811f27db408060cb3ede348a8dbe8517233ab7eb54020d8d7e5a623029eb6411f7f63c6b22a695d66b36bf6caf7c751b765921b6d30e0d240065286546ea64591465d477815971eee8003a6fe002078a54f6cf6496b7c7dfac990c6b9fee425c69ed52e9ac86e5da7e3795d50f7846a178398d3ac70ed4fe1ea40353f3e3259a9d5763cc40000000d3ff4372b95df6081b9f24aec0d5cae7405768c7d0dd48a17cdb3e1f99baed987bdd7d0cf438bfb751b36290874f2a3432b91b6a8f61d14ca49883cca2502905 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2284 iexplore.exe 2284 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2524 2284 iexplore.exe 30 PID 2284 wrote to memory of 2524 2284 iexplore.exe 30 PID 2284 wrote to memory of 2524 2284 iexplore.exe 30 PID 2284 wrote to memory of 2524 2284 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575dc53a9b03164064e5b1e4b9c7bba59
SHA11d7e7babd68f5384a3d5b38b3c91e59e75b83fc9
SHA2562ad690e788bf1b618be9f5eafbeea874629ce1447fc6a773c145f0983a26c402
SHA51218f20ec55cffdd28f522ac384f4eb047b223bccaada5c59cf7217c939e2f3416a4e7abad5f7a93afe28fac5ba451bdaa61afa9d995a10f2abbca139e2053febd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4b42626bb7342182b7154252a946e8e
SHA1ddf55482e86f35264efde854a56ff32bf47c8e96
SHA2561b495d2378cf599a66a342bbbcefd3aa5a4c33bae4f21e79ae9a8547fc278bda
SHA512d3fb592fd77f9d4aee6088349b3934da7a9ebc374859e65a5f9c281c5c230413a4e99ddea9fbf4315c1e164dd072dae9b9b1c0528bf0fb2b8710e04a7662a6cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501c4ff6456f3879164c8f49cadae9775
SHA1f140d2d52dfdbef9a83b6df222a4bef697aaa381
SHA2569b522c2d27c153172333751d1b9a73738e00ec59697a98dff037264b08cdaff8
SHA512fb324322aff3a1cc8692c5373351ddedfe289edc9ca32af5f54787cf296e2a8af886e8f70b9692cdfd9d85e87243b1eece784a67132ce3b010f36e1cea2914d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513e2be1256a2add94fc25f1a6274bd89
SHA15e4b2c446f38ac6c6540ea944de830d68c46e8c4
SHA2565d9932978ef6258366a5a4fcb30118fd24ed524b46a2fe5a5895be828e3234b7
SHA512de081651881af284cadd02b537e86b1e5c0a7ec85a80e4ba9ab060923c3bc3fda1edd2b7667aec696c444636a6ac57c91e3f2d8b6b2aa9558ce558e899d8656d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b581c8d43c61dcf3feda71f49a68e6b
SHA1f25a053181a4f36667b5c37d8ef655f1714abfa6
SHA2567894c13cf5e800f7142671d9059830dd442c2e0cd9006416b75db90c904472f4
SHA51294ce253a93a875c61dae0194fc41a9bc653e6083c20b340edbdf7593f55fdf21af6bff0f6d74a122490b250d401fc0d9a72fca6ce8ba1fa83dd8f34124655b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8934577b116598ab4c6ac434bb32829
SHA1f0bc1d813cc04451fe7b26049d7eb272966b49a2
SHA2565ddc14266a9f0c31716b6059a6307b3e5e5869acc653385ee6a14a750fe17dcb
SHA51274ad6e46099cad9888d18decfb4fcb60d8be256653162ae5648b73b195103fbd06f59defbf482eb8f4dd65b398b1a3cc64262c34d430d331843780f254b337af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa10340a8b24eb40df2f4b4c19d0a98a
SHA1aa7d3a21d9bdbfbea09345a6bdeaea5fc88d5711
SHA256d45747cf09aa00cf356b2e4b69a5537132273ca2c78f2b9791e6d8e84a77b859
SHA5129c33aebe8e0ef39fa70c448457b8a12e565ad167d68c0ab9ce01b729820a08fae126f5ded90982d45c651ef1169bf629e11b4fd69ce2f336167a68328d8291e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53abd5fc7d8c3deb9c8ed8704e4c57fc8
SHA1d1989489a4dfcd9519321cf2fcc17e1e5344724b
SHA256c9ea4024af1da3ff7ed9d60397a67701d7caf0cd4316d0f7381e2590790a95ef
SHA5123863da71aeb7d3cce890edbde6ca892d80dcdd903780de6e80a8832eced70c1ea09012f16cf288c2139115cae711ddaacd98a33122a30eb413d95ab7e3608c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4d919e685a1d77fd94ea8fdd66a9ff6
SHA1a76514d214300609bfad741c7c52d4c674c173b1
SHA256edef112655b6e49f3d684839670bf4c8cc25b7bef6dbb21c5104a1c8975072f7
SHA5126df9bc4f0e78dec49d4fbbdd3613fa786bd247e1ac21fd9c4b23aa4dd67c3c6a77c7c5080f0107b3943af70dcb24f3b58045290e2aaa12e5b3ece5ba01b66caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5556dc9102e4122b0ea39f2fc590a292e
SHA12f7f6fc3dba1df5856919a5d4ab84fe7a70db1e8
SHA2567906319232aa89b4746d42c259eff8d839f25df9f6887b7c02172662f92f1923
SHA51257791c80a573a843b7dd1ecb6caaf85b53f96231f3e85fa16c0081d6064ee24e3243d3c64894f5176aaf3ce94ca135500f191e2bfc90d5d0ac988daa4dae7766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563d824c921298f71d494c3a7e5408cc1
SHA10cb78fa9a2a66f4fd099bbe03ddb4008289f89b5
SHA2569bc95e9cbf32c4b15641de2babc63c5ad22fae3d48b3ab517ed603e21e70f492
SHA512deb40e5b593bcd955026b9d430b7cfb8541765d0499297cfbfb55659a281c94882f7dd89d100f2f9e7751bf6e46224c44cdce5e151a46f4d6207a2d1aa66d593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c362d87cc59f9a5ac1452e537457b1c4
SHA1cfd9c334ee3ea4d9dabb26a1212facebde728c38
SHA256b7eeb5e8f7655e02e02a0ae0b188eacc335b50f75fdcd96cad8acacc821a3942
SHA512c7631c247adbdb4d73df73c9a727f81134fc49efcd2900ddee74168f4d37ffa69bae5344dd3f60d2a8436e0e793d596db140b070fdeae42539617291bd479040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bac7731a57edaa6a26c64c38fa4004e0
SHA1356d69eb2427f7f75a65167ba7306e0f07b1e2c4
SHA2569d40df3f1a4e7df7840462e82c391042f0d1c83a17140da85fdfea545b1b06d2
SHA512c4f5dbd34b2810f20fdb2abc1dd1f1b73e53b38fe702773334be6fbf938917f00c3565f196e965513e1774cfcfa4da7c185cf1a78fdffcd7e02fe5797b726e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55652ca9e0198838855a37ea5aed56ac0
SHA10c7c629aaf765abb845b5548177eb8297a30aabf
SHA256d1b6747a8fa9db62115653515b203d26e62189e3ff2610967d7d1efc3d403e8c
SHA512dce95775641957e0581f28132f827eec0708f576606d01ae9f34cf5d47deba06f73e015e2c0191ecd92330661c861078aeb4106b1459f367abcf2973b7d6757c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51de06ab4cdd1432b52c1dabd3a69126c
SHA14f3dfdf5577fcdb9a021b76d4d2682228245a3b6
SHA2564306486ecb87df98446c1084d17b417fafbd60635d39cb2bed73ee68913438e3
SHA512373ebac3d7b4503adacb07461f86cdb8ede008403335ecf5eb926eaeba3c79efe61e8e7012c88c96f91142075887b13bec706457ab0c1ae0b01d3f9891558571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5118859f13561ba4863433202ca70e1f3
SHA16195b204309476e429a6c2a04d9ef1b8277fbf6b
SHA2569f70d047895813fce03075f6ec1aaaff082b3c1d17af1749df1f4a41b268f638
SHA512cd11fb32f38ddba10ee1c490582ace85eb69cbbbea3e0903f8fa9f32b487aecab160091ff178e65f65b75c080b16f537af2328edf76934519a77b399e2d9ba55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555e5aecca7e132cf2fb9736665100c29
SHA124a106098a2c228a25c87ba672584db3ce577055
SHA25695654b421da6b7e6e6c8fb056e05746f5d149c2d2ee8332b3df3003fc0b980ff
SHA512df3427603f1f7d9554498ad3e3a84f0f6157bfdd64f31144e6500ff07a532a5676ca8194a4f33a7d0f504661865e9e65048c37db9b99a11d2c157b4860707f23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d961ddc5181ee6ef7e1d586e7d1b9c
SHA14c760274b3a35cdfc0525c93ce8fc83075cc758a
SHA256a1f703cad784b6c48bdf7a0c75bc5d2c18a9e4959ab2f41e3dac7bb0ad1a3c58
SHA512eb25f16afba475d7084f62abd212860047d99b13d53a1d7d7ff0af2cbc23ac3febd4f6ff388ec92885b10356f6a6403340411a7a4d8390cb13dce0d18e82a685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574449c88c317ee7c951a92cdf75d8ddb
SHA107e4840822bda569d7d285eb5071dca747be562b
SHA256c5e927dbab19f57a386990f8cbe2ba235d43abbad516c125c14f9a549beaefeb
SHA5120c63c029258378156d86f61baf5f3bd467e35588a7612166a7408f03226f841b8c87d04dfcfcc49ceac76267c540b6baf1ebf62690a8467076d2d034595bafb6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b