Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 23:32
Static task
static1
Behavioral task
behavioral1
Sample
1a35799644c9c8581680fb7adc699d16ec86f9fb84f687b18184cbe8f32f6a1d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1a35799644c9c8581680fb7adc699d16ec86f9fb84f687b18184cbe8f32f6a1d.exe
Resource
win10v2004-20240802-en
General
-
Target
1a35799644c9c8581680fb7adc699d16ec86f9fb84f687b18184cbe8f32f6a1d.exe
-
Size
1.1MB
-
MD5
24a3e222f50c9876a0afdf7c1ea1750a
-
SHA1
7b9da1981ed4a45f3cb0f6a05b11443330e6513f
-
SHA256
1a35799644c9c8581680fb7adc699d16ec86f9fb84f687b18184cbe8f32f6a1d
-
SHA512
6d8900df30e57c368e638158ab423ed0d9c6e19a38684a06fafc3876bee0ea591a9334d724c215b714b29135f494d0cf3645ee2147062e2197a8fb71118192bc
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qo:acallSllG4ZM7QzMv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2808 svchcst.exe -
Executes dropped EXE 10 IoCs
pid Process 2808 svchcst.exe 1232 svchcst.exe 2024 svchcst.exe 3008 svchcst.exe 2604 svchcst.exe 1732 svchcst.exe 2100 svchcst.exe 2308 svchcst.exe 2208 svchcst.exe 2872 svchcst.exe -
Loads dropped DLL 12 IoCs
pid Process 1156 WScript.exe 1156 WScript.exe 2668 WScript.exe 2128 WScript.exe 2128 WScript.exe 2092 WScript.exe 628 WScript.exe 628 WScript.exe 1608 WScript.exe 1608 WScript.exe 1836 WScript.exe 628 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a35799644c9c8581680fb7adc699d16ec86f9fb84f687b18184cbe8f32f6a1d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2068 1a35799644c9c8581680fb7adc699d16ec86f9fb84f687b18184cbe8f32f6a1d.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2068 1a35799644c9c8581680fb7adc699d16ec86f9fb84f687b18184cbe8f32f6a1d.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 2068 1a35799644c9c8581680fb7adc699d16ec86f9fb84f687b18184cbe8f32f6a1d.exe 2068 1a35799644c9c8581680fb7adc699d16ec86f9fb84f687b18184cbe8f32f6a1d.exe 2808 svchcst.exe 2808 svchcst.exe 1232 svchcst.exe 1232 svchcst.exe 2024 svchcst.exe 2024 svchcst.exe 3008 svchcst.exe 3008 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 1732 svchcst.exe 1732 svchcst.exe 2100 svchcst.exe 2100 svchcst.exe 2308 svchcst.exe 2308 svchcst.exe 2208 svchcst.exe 2208 svchcst.exe 2872 svchcst.exe 2872 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1156 2068 1a35799644c9c8581680fb7adc699d16ec86f9fb84f687b18184cbe8f32f6a1d.exe 30 PID 2068 wrote to memory of 1156 2068 1a35799644c9c8581680fb7adc699d16ec86f9fb84f687b18184cbe8f32f6a1d.exe 30 PID 2068 wrote to memory of 1156 2068 1a35799644c9c8581680fb7adc699d16ec86f9fb84f687b18184cbe8f32f6a1d.exe 30 PID 2068 wrote to memory of 1156 2068 1a35799644c9c8581680fb7adc699d16ec86f9fb84f687b18184cbe8f32f6a1d.exe 30 PID 1156 wrote to memory of 2808 1156 WScript.exe 32 PID 1156 wrote to memory of 2808 1156 WScript.exe 32 PID 1156 wrote to memory of 2808 1156 WScript.exe 32 PID 1156 wrote to memory of 2808 1156 WScript.exe 32 PID 2808 wrote to memory of 2668 2808 svchcst.exe 33 PID 2808 wrote to memory of 2668 2808 svchcst.exe 33 PID 2808 wrote to memory of 2668 2808 svchcst.exe 33 PID 2808 wrote to memory of 2668 2808 svchcst.exe 33 PID 2668 wrote to memory of 1232 2668 WScript.exe 35 PID 2668 wrote to memory of 1232 2668 WScript.exe 35 PID 2668 wrote to memory of 1232 2668 WScript.exe 35 PID 2668 wrote to memory of 1232 2668 WScript.exe 35 PID 1232 wrote to memory of 2128 1232 svchcst.exe 36 PID 1232 wrote to memory of 2128 1232 svchcst.exe 36 PID 1232 wrote to memory of 2128 1232 svchcst.exe 36 PID 1232 wrote to memory of 2128 1232 svchcst.exe 36 PID 2128 wrote to memory of 2024 2128 WScript.exe 37 PID 2128 wrote to memory of 2024 2128 WScript.exe 37 PID 2128 wrote to memory of 2024 2128 WScript.exe 37 PID 2128 wrote to memory of 2024 2128 WScript.exe 37 PID 2024 wrote to memory of 1940 2024 svchcst.exe 38 PID 2024 wrote to memory of 1940 2024 svchcst.exe 38 PID 2024 wrote to memory of 1940 2024 svchcst.exe 38 PID 2024 wrote to memory of 1940 2024 svchcst.exe 38 PID 2128 wrote to memory of 3008 2128 WScript.exe 39 PID 2128 wrote to memory of 3008 2128 WScript.exe 39 PID 2128 wrote to memory of 3008 2128 WScript.exe 39 PID 2128 wrote to memory of 3008 2128 WScript.exe 39 PID 3008 wrote to memory of 2092 3008 svchcst.exe 40 PID 3008 wrote to memory of 2092 3008 svchcst.exe 40 PID 3008 wrote to memory of 2092 3008 svchcst.exe 40 PID 3008 wrote to memory of 2092 3008 svchcst.exe 40 PID 2092 wrote to memory of 2604 2092 WScript.exe 41 PID 2092 wrote to memory of 2604 2092 WScript.exe 41 PID 2092 wrote to memory of 2604 2092 WScript.exe 41 PID 2092 wrote to memory of 2604 2092 WScript.exe 41 PID 2604 wrote to memory of 628 2604 svchcst.exe 42 PID 2604 wrote to memory of 628 2604 svchcst.exe 42 PID 2604 wrote to memory of 628 2604 svchcst.exe 42 PID 2604 wrote to memory of 628 2604 svchcst.exe 42 PID 628 wrote to memory of 1732 628 WScript.exe 43 PID 628 wrote to memory of 1732 628 WScript.exe 43 PID 628 wrote to memory of 1732 628 WScript.exe 43 PID 628 wrote to memory of 1732 628 WScript.exe 43 PID 1732 wrote to memory of 1608 1732 svchcst.exe 44 PID 1732 wrote to memory of 1608 1732 svchcst.exe 44 PID 1732 wrote to memory of 1608 1732 svchcst.exe 44 PID 1732 wrote to memory of 1608 1732 svchcst.exe 44 PID 628 wrote to memory of 2100 628 WScript.exe 45 PID 628 wrote to memory of 2100 628 WScript.exe 45 PID 628 wrote to memory of 2100 628 WScript.exe 45 PID 628 wrote to memory of 2100 628 WScript.exe 45 PID 2100 wrote to memory of 1836 2100 svchcst.exe 47 PID 2100 wrote to memory of 1836 2100 svchcst.exe 47 PID 2100 wrote to memory of 1836 2100 svchcst.exe 47 PID 2100 wrote to memory of 1836 2100 svchcst.exe 47 PID 1608 wrote to memory of 2308 1608 WScript.exe 46 PID 1608 wrote to memory of 2308 1608 WScript.exe 46 PID 1608 wrote to memory of 2308 1608 WScript.exe 46 PID 1608 wrote to memory of 2308 1608 WScript.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a35799644c9c8581680fb7adc699d16ec86f9fb84f687b18184cbe8f32f6a1d.exe"C:\Users\Admin\AppData\Local\Temp\1a35799644c9c8581680fb7adc699d16ec86f9fb84f687b18184cbe8f32f6a1d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- System Location Discovery: System Language Discovery
PID:1940
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2308
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1836 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2208
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2872
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
696B
MD5ee35194fa07bea6145178b37a18edb25
SHA17cbe9989cbc0090cc0ab534c7aa77d64d959e489
SHA256e323603a594cf3a7e03aea20d2ab69a17040a02f256ac1e3fe02f8a36889a483
SHA512d292e22575da17d694a33d6132cea65ca1c58a16bd2532dd24db161d2a77cf233039ed1b66b48868210f4d0ffff16678db3be341eca044432b8087b520e59f71
-
Filesize
753B
MD5cd8aa23be3a9863ba03e655fe37228ec
SHA1cee00c589a756181a470ba09339023090a68eca2
SHA256a22d903ce616f45fae3c15edc05aa25db261a5bed0d86bee651c6c12dcf09d35
SHA512a90dbe2bf41c6c9c5d86793c05a54320fc89a21eaab5a268b828de1777f28b0a6cc13d3ed6a385c89afb7fbdb49df79583d04939a5366ca9ce6eaf909c6810b8
-
Filesize
696B
MD599190cc32e9995c46b8a5b9b268a5bbe
SHA14ad00bc8655bced61776b40f2cc5bf0180a175d4
SHA256308f79dad8498e1020104d40c992a2a6b9d4841f2c9c705e4b4401c48764a096
SHA512f6447cdd779f7e95f6e84469388e55d7c18249f434aadf7cb7d4ec18cded20161a1cd8bb8830186c55ce8a945ab7c7cff08f85787c2616d447a90cb6f4622571
-
Filesize
696B
MD5ebf405e49dade13da94f737cdc03dba1
SHA18a0c39e59beed0deb4e726566b235c42c70942bb
SHA256d15af3885670c4fea9dd97da21025faa5fd2b42bddc310bad2893e23a3ed2bef
SHA512bbdef781757a387898665650d8f951e7fc495770d34595d9badbe5a39d46ec49a06ec00cbe28ed5e2677e5eeea518241fb638580668baca8d7728c44f2069ea2
-
Filesize
696B
MD573dd42e0ba8cff47f0542d7d8aa40f90
SHA1ffbb1b56415be5abcf4613aed3136768f2edbc38
SHA256c73b4e554a4ae515ae3aa320a19d752e3d848d00ed0cd8f084081ed530b8fc3d
SHA512efd0075f9e70dd557271bdbcd782a083ae2cde8cd5674bf7f8cf63064847951adfcbaa9c9cff91c57d19c7308d0b7bf4754bfbe8fce6ec0e41d920bde7f5a67e
-
Filesize
696B
MD541bdc303960afcda8ebae4f3e29f0b52
SHA14cbf649fb04c836614138308a06ecd48dcb2882d
SHA256da674cdbd4dd762cc32ce0bd2ec36929a626e0e87f7ab7a4a1b1e1ce0123d999
SHA512800b5b01cc41e7633f203579e7f6ec0a9f6408f7af79dcfa74596be9264dbb8baade6b1439dedb5194496aa27b8b0e2680ce65ad91032138ea0ac2c8a0872cf1
-
Filesize
696B
MD570e226fbd8b4b3f2ddf8a8753a77586a
SHA1a81a39d08f77479d0ee65599dd2749031c32fc19
SHA2563eb2bfca11e83ada63c9e426764e07267c058964f959ca5e0c3f0f8933e40026
SHA512f8c3f2f4172e8cabb856cbc2527dae48cba6d740a8ad9844bb32013ccba200b4c03dfdbe3713d9caa5f7416b8729cba4d516a73989b388c952ab08205b3cd4b8
-
Filesize
696B
MD50d7287608e57c918d75f595179c5fa29
SHA1d16c5add83d14855a0d674ca2d287ef0233e7062
SHA256539b077eb4ef610403f7c3cdec3fd11482b2a0c4f3c254c2e8f6f2a51905c9d1
SHA5120050624a5937e196a1e7d08318d9a499ea706cf8023bf7c6b1ba42a671e98e202ab83723740e9aab99bd6c17c3895ca1f2b17f6e94dd81d1d01c064b997c8bff
-
Filesize
1.1MB
MD58c1b97d7eecc76dcc463c89ac1d9baa7
SHA1022b94d803b6a536dc1cc4eba4b68b0b2ea1400b
SHA2565997cbe0987a2ad67d39a4a4c549c973bca16f8b168925401cb1bf10df9a5dac
SHA51266485044f9e31df78f31d30f86d72a89971bb71ed90a2117e0c208c9f2e9a8d7d3d3585f2d5f7e31ace6b63c08e20eec499a9ca9924d9fcbcb246392a351775c
-
Filesize
1.1MB
MD5a57ec54d8d3d3696ffef4c1cc5f7f10a
SHA1d0ff8f96e1cc4d6aadf1758ba4f14cbc51e60388
SHA25615c0002fe2003482caabd16d3a807683aa42c515ca6f9aa9f693476c1cafd15b
SHA51278077891f5d102d9ff8cee8b6385edefd69c723d95b7ad19a5cbcdf12c613e3ac269bfadb3b0488e6b74c8fef872d5be0f0d7a937eb1383638d2a274983f5171