Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
xOQi1hUA.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
xOQi1hUA.html
Resource
win10v2004-20240802-en
General
-
Target
xOQi1hUA.html
-
Size
16KB
-
MD5
04de0eff03e181af96013f011b74f211
-
SHA1
c0ba3ffaf37c111ed651bfd66eae189e7c8da5e7
-
SHA256
afa4220e6a182a6d3ed6ec767e95aad4fdf16656c54ad26c7265199c0f75db46
-
SHA512
07afead805ebac56c82b8f4c66812595b705a476e1754cb4c5ab8ff3e752dbfe80fc99081f82fb0490750b455b98539d64319657f77bf6aa91226d6c17635b4e
-
SSDEEP
192:PNxqvrHA1oqTJkNr+f23v/ysTGI7UAFGZt865X2m9SfysN:qTg+oJkNifoKsTlUAFGZtr5mnNN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000075614c1e624a65ae87a324c546eb0d5cfbb47cb49642dbfccece050aaf6e3b12000000000e8000000002000020000000f97d8632d6e3f1622dbf1b3ba892cff8204c5dd54e9113651164d4acf8bc850d900000001a5f317f49f12ef06b89b9346ec650df946d0c0ae6c74335dbc931aaaa83424475c8328cf0154796adcf6ea0ab825b39c382ef337819a89dc546e061f1c640e692ea36f968cb703cd65769a305c242564109ad006677ab613cfd43fc020d274b86dec42db5b1f01a35821cf8fe9493accfdc8f580c3e66da3c18152953b05311849afa53b782eebdceb250320b9f41dd4000000048d6246f38ace725e4202d5ba585c43bdccaffcf7119fe20a29addf805292142f368d95d75a905e67faf7cb6c587127b5235c63c47365dae702f523f4f8eb9b7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000d62b63ca726af59952c0ff4b4e86975789f57e02c0a21534fe1f1a2eacb0a21a000000000e8000000002000020000000e55222df831296a4cb1c5885e39d83d8134527487889407f192c8a88c35135ac2000000083d98fd9885c4c77f78a95e73f3b5bd2b79f025407bac1caaf704e2fccd400084000000046970169f14cec3db05d789a7c28045b8338a0fcf8024b3958ff75b14f82f008649aa5e9ea7644824662ac1faee660fa9d06d931fda34a888c8c41857485596d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6008f7473307db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432541313" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{735DDF11-7326-11EF-91F6-D6EBA8958965} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2604 iexplore.exe 2604 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2632 2604 iexplore.exe 30 PID 2604 wrote to memory of 2632 2604 iexplore.exe 30 PID 2604 wrote to memory of 2632 2604 iexplore.exe 30 PID 2604 wrote to memory of 2632 2604 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\xOQi1hUA.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e13f7f1a667adc96eab0ad83bab050dc
SHA1caaae72b1a064a1a684d23a3dc3b65957c79c645
SHA256633d04b27563ee6eacdd29e37b242ab9dcf1fb396229f9671140ca5a4783287a
SHA512e16bcb9bbcb35998fc28b8a22e3473e1e5cf2b18f305b2cc2f156e47337ca65e0573fc77fd1404214832b4392f73cd765c08b3a28929b236f38f13197cbf0173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566703c6196bfc1d67c950e77de68f471
SHA1c3ac289df26c7760efc7d7fb121bf63006158aa0
SHA2568ad2c52b14ceed88446443fcc180119468704fdad9008392ea99b71e954d1c59
SHA512ddf53ee31519e4c9253c05b575f4335ad462a793eca1f06bb3dde79c4bd0c9bf5b2764e98487a1cd97b275a378365bbb4b7bc010d696d5ca94d1c59c83d15323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9a68f424d61eed06253b5442b534f6e
SHA1e7fe7d4a2d0cb9ef6b6255e694e38250674a382d
SHA25601f2cbdbce89960fc7783dbaaf7a6d42108a70f1bdacd0e3efdb5c886d895b7c
SHA5128e45721d09313fe9396bd16afa0a9b8f895a324b200b4ab71b8101b947d228dc5d78602b74554f804d8e0ca51c7595868a0484bfcd8b4918d77ec5c499fee481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac992101786bc100463c0b0b3e9c44d2
SHA186240feac39684d978a79a8237179f5da2ac90b7
SHA2566b59fc8534f2303fc1b7c6364dafb1eeef87c91338c1a4b7184f4b7ead441540
SHA512db758374a6cbe1e852045757483ba7090ad4d9e920843f96c24e40e2995f8f4a1a957a84c434fb61708f608171057cdc951d18dee50f9f4b16a737499d899a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55971ef1150b12eef5614ab34710fce8e
SHA119a6c96d9b15e0e9780e66522068a6f98092853b
SHA2561a7c05908dc70018ecc4e8781aa8825b7f965d4d314ac2f73d7e79dbc538f44f
SHA5128baf18ba60c4fb7d8524e6d723e944583397a19dff9bb6dce7103734e4ec693d8fb416a864684925fe9b049f05555e83e62f34ef0985644f209036e9fd3c022d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be5bbcb3477f190097e4d885ecbf65af
SHA17cf1ed83024441fcf7f37c086536f6a9b38ba96a
SHA2564a308f1857ef6cdfccf50e89dff9f2f287c57490dc5ec59d80de43c91dae5e92
SHA5126c92ba14039f6814a66136a3c70e0e2584d3c71949dee24474ca1aaa67c03159e38f0e0b2f77bad964645134c467528397adf734995088c54d18b0bebb7b58df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7842e16cf192a45f5a504a1b43a95b0
SHA1bf822fe76be099f105828ac7096c0c877f19625e
SHA25684626ff354c1116ff52fb72196b5cbd228af7f541abfd0f377d37d4410f15fce
SHA512fa859feec0e6a3fa46584457c8ea8963fba1f761fdf123c906c8c1895a41ce9005a6b9874aea0948625c0e0da7f97fca96ff7adc70b5d576744f9649f08e3fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52adc6ca6612a8c8ad1fa5efebd6fc61a
SHA15a3773b423eb7c3e023ee556d05476b0a51dbda2
SHA2568b038bb3abd904bf746055ec115005dc0d528ca09581bb4fe9f16a90b0a79370
SHA5121d5a50429c814c8979270a064cd5615ab8e7ddfdc9e53d4f5ab8ae0f3ccd42ce1fa34660c0a5954db59f28e6ba4c5e4b975b220c1702a1287e96e89d165321d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d3019ae68b394b10142b9dac2d656fb
SHA17a746f4427b5b7560a11f5e807144491bfced2de
SHA2560ebf50b5ed7c6ecd6feebc4beaac02401e85f4cfa57939e380ef322bcf97143a
SHA512fdb78df817ac2d16a12c646143bd7d61489093528b5f78d49cfb1a92173cf51362c7d22bd8f53a81a1c6bc8d71a266d4a7883afd8c9f75710a4d342c4ddc300b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59374bc6ff1220c1ef33dea0ffa13eda8
SHA1705a30209a42415d0d8cadca6445373569edc587
SHA2561ab6b140432100730d546c495669ad6ef51eecb4bc606a316efb17002df602b3
SHA5122bca1489054cfdb3cfc4ec7d8faee885e242913f6172be9ac8f95ef17bd3a18f5526aa0f1cc905d5d5d77642816a638435a122f8e62939106df3193465b8faa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acb5e699f81a3ebaecd5c7308d838535
SHA13c89578ef711df457bbb5dd8733970994d33e966
SHA2565dc631c1f12b331772646bcc70b938d521cd161dbe4a6874771265966ba97823
SHA512de59585e765de4ff4e69f16df2dff095c6d43ae31528da6d05bc7a3794f145a5bf88f293afdba8dfcd2a4cc32bef03ade765adbc2fcb9a67e701aece88ca3e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b40c7a408aee4a3841d5780176e26fb7
SHA1c9196dd28fe402765006c0ef8d00bcd3d9f26638
SHA256c58d1e92dd8529a7e711c1385d8869cf9400f6de3d71336df213859ccbb981e8
SHA512a197f8f7cf3c230569be919fde57b8e2b9fe78f64ced8ca5b846885e917dc805604f36ffe8e002a79c6523a009fbf5d6e7a483fc3dff59a2be156fbe7dbc402e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ec56e1c75502f8cca04e54c158faf53
SHA13b1d83ca5b1027cd41ff03255480d7b0248a9c3c
SHA2560fe87ce1b1e1484efdaa7bfcf1f7f9aca40855b39f10ad4bc746f09bb6143d10
SHA512bd801075410801cdea1289e7a9d0c7c80bfa962f3a9203db82f950ab8e3f1cf85178762c487e509a817be5c71ba84a47b00659565ce6cdd0af3e1a59bef33bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e6b1e18f9e1b9a2bf390b18df793636
SHA107d54891c0f974770252e7f288d5ec11a56e7ef3
SHA2561d98e7c88ac904cce87aa425b7b9e14cc3512dfedb8af87abc972ea07770b077
SHA512d8d601429015563452399032191e0b7eb8ab6209442a2e8d9d2f5ab6a94f027709222fac97d6ab58e8aab2fc485fce61962e8919282e0efe50990746a8703d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581ee3d87a13d4e92e099221ec2aec3b6
SHA1233036420a3e2cee972b4690c441c22603b149f0
SHA25614801fe4f5a443bb9eb9dc9ae52428b10d7597d01d8cd5f120358bd90475ad13
SHA512e814b7deb53f94a84616ca9a20e78fefe2d9cf83b5aef247a10b4c1fde939d5efd56785bd197452d7d9f3f59aeb4a24f5303a52e6955164d31ec4f7e49221f75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc810350379d9281186b6fae45e5ca1f
SHA1fc61a56d3cb61e97b752bc10975153aa8397a495
SHA2562f18285ded5b83a894fc35e610b7f72f9078a3cb521b32bdae929f08f45fffbc
SHA512a1daffb3b7c13206323cec6cf3efd349cd8edd4f8d833de3ecde51f33b794a5c40946fc6d49f90e4a627a00c013c4442540f2fcf6bbd5e96681134231a58f53b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505bff35b67d9c758aa577d09f22e9a39
SHA1037f532172a24f7c38111cfe2cdd622dbff18961
SHA256a58a5d0f359579bc07dc67dc22ca67ab23725248be88536d5fdb0c8e1c9dc8ff
SHA512cf0f52fabe41c6e5e78ebb6d690ef4e2eebd0302fc14c0df340d693246cda557d47996049829ff9348998920f1bb3a955c6194d1f44e4f2448160ae2e38aced0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536640c9a8e8d29f1937c5d7c68a9b165
SHA1386c646de1260728788658f2d266ce7758399174
SHA256ea158534ee44e70f3a70c880a1e1adeebd8e00a3103af4b1bde04ca51aff3efd
SHA512dbf821248c254e27b52afe14f40cdd411bf130a246ecfff20bcca80d0386526904999afc63188351c2f4c247f0553baa24399e6d877c7736b07f078901e4fe44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d02f7a7c92ba516bfeab4a63c899c8c
SHA1f707c19d9625bd240cf7201fc33b3699eb9c9dc8
SHA2568781abff6b7a9ac3a06d1141d6a4a4676eb159955f5a78496f1de758a4c9b6e3
SHA512b6c7164a28ee5b5367f04b936a6d4ab049c81afa5426a690ff58d7d74f7edd52219c66bbc8fc607b40ab86e6f3b56097336cc094780f0aaa7e65d71748585179
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b