Analysis
-
max time kernel
122s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 11:34
Static task
static1
Behavioral task
behavioral1
Sample
1b2f7a512748cde0dd74a6e2342b2011.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1b2f7a512748cde0dd74a6e2342b2011.html
Resource
win10v2004-20231215-en
General
-
Target
1b2f7a512748cde0dd74a6e2342b2011.html
-
Size
8KB
-
MD5
1b2f7a512748cde0dd74a6e2342b2011
-
SHA1
eb64670e8de722a4c8e13f37ac8f34b87c3239e1
-
SHA256
b2ad21f4b44806acea636b85fa741283f11ab005d3a08bc72dc31ccfd7e13755
-
SHA512
8e9156d260838040828485a6f507ee3cc574e11edd123fa99c0924f9e52bd73c6a7d94e92fd578c377de52df22c84c48cc52d7c59f08b402d60a6e751f55bd20
-
SSDEEP
192:ln8uqnGDSSW0nqYBQkPkGpvWIJ98GECKS+gRJQh8poqG/vtuQu6GH90oFLIy1u:ln8uqnGDnW0qYBQkrpvWIJlECjfQSpb6
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a099d0aaa537da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0EF9231-A398-11EE-9E63-EE9A2FAC8CC3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000abc575bd75e684634357835989fc6c1b1d7c454467435791a5ee60d78ef8f36d000000000e80000000020000200000008a4656edb9bf1be0178551bc024d5b0addca4731a37307b1fa084b994859bf9e200000009c9cbc4edb529551571772e6788d4a1e6b8f3dca0e90c8f156c1ac066096b0d740000000fe9231b61feafcc547aa6c672729611ab07c06334e43fe5199b307125e09c7d3ae8b58635a6e10a26da45e021d5dfa709641f1cc3f4ec820cd9ed08837233bd4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa000000000200000000001066000000010000200000004b11df6daa93dfc4407066c03332cc3d005e0e776a430cf2e428d1d15e7def18000000000e800000000200002000000018e580b04a2b3cce00d1af6ec2e3c31947901a1a49cb58ad1ec3e349915b8782900000009c7417ea3cbd12d4cf43c2bf08ded9371d89a753881af2572ce72223ea147fdf148183061a0dbcfaafbd93bd4f82b9b50f4d9736a0942421207547eab3feeb11ff4601e4734d08eb828a5d6489b18b54800a5a05f525422c67fa78ae9d8140f1ba1f7453b49eee2306589246bcdf5a6479a96c96a21ba059035c2021a9ca1575521434ab5c8f585f3aef6b62124c0612400000007f42b13831a83ea27237878ee8538ab8ff7c3337dd9062d123b3b217eb177cd47ce5fbecf334fd6418bcd920cc4f56d87df4edfd329668238b578993368f7f87 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409720601" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2508 3040 iexplore.exe 28 PID 3040 wrote to memory of 2508 3040 iexplore.exe 28 PID 3040 wrote to memory of 2508 3040 iexplore.exe 28 PID 3040 wrote to memory of 2508 3040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1b2f7a512748cde0dd74a6e2342b2011.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541ca89d176b75d29800dadff464ac953
SHA10cb23413bfa1fd809e2ecf14df9698ca72f9f637
SHA256f5fa1358f2ca4255431eb6dc7a2d308ac4e307df3628907d32a1601bd64e0aff
SHA512949e261bb84b1b693ac21d00cc8d0c481ad7738325ff214168d4f0a13f87d4b6f35a265fe2c13fb4d6960b498c1468b4edc0aac909965e619c16b76aa7396db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51faaf412f4c59d1aceb717cf0ca9df22
SHA18eb32dc7b6abc160e2ed858cbf3ebf3732d1963a
SHA25669c707255df3e2c73292a03c6ca3f86deb4b0b8078b5d6ccf8f9364234aa77a7
SHA51274ff7eaa449e0bb1e79c7c1b5184b686f3f84928b23a24201c7249c476421d794f858919e41b74b877c788edd933596239d20e6748c24de4109b65adf5ac4248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5f83f42156d4c8717f69bbc4c94788d
SHA13edb5351d85460c4fb524e498d77f9ce3fe667ef
SHA2563130e38238a969fd566fd1aab7f75778eb944b5bf71d6b67466c3a2cc5473375
SHA5123bb1f9159dd9249bb02a3c799423ef4ebf8ba942d263940db3d08107c230d32f18bf7e01eda89ad203de3cabc9170eab5974eb82f655c72c697f75ac54ffd36d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a651c3ca9d0554dea9910231f1062e7b
SHA18679b8e2189d9ce2f5c9da583920ebf002465190
SHA256b03129a8976186ea1451885f83e446c423123efd2afe73be478b2d49d8ba64b7
SHA512f943b4690a9911cd6700949786dbea1226ac8c1dd1743d8d161ac15b5c7a3eee4bbcefaaa68e803c8cb7ebb3d55283635c88351ad4f3e1be406eebe48aa1bb9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a4569118f36891abbcfa850b613f0a1
SHA17b96d35b69b1d49d0062a29ea229bbb5c0d058d8
SHA2567d9592c3eed0b9f9f6a374ea892e03039314ae11f3b813281372e7391d2e4f93
SHA512b95d772e0d01d80e8f76d7b35ec729d8abaf6ceb0b665a8c8d4b472dfa5498abcb2329a5c77001c0a4ac055dac66f4a8790feb9a283f9ec29e72bf4e54e6cd8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d504716fdcd579f30d2db23b03537339
SHA122b3a05aac7e5b111db849c9123abebacd7b4c24
SHA2560189e547902fa84a81fbfee6a28dfbee0db8b2ac9922579f8ac1a97cab7b403c
SHA512291807e3a1bbb72dd077b2fe81019d5696457a46b81141b0d10d5dcbba5e42b72c6d9d1ddd31ebff55d0b01e6de24d941dce9b792ad6aa69bd355b5e8a96b0e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f2a1fcca3faf42e1e1f32c7d21b4fab
SHA1d6fa0aa08c270ec5c5b208a0e259f575ce95c139
SHA2564855f67edbfe2ba67ff3971c654dbffd082cbfa1e96d3f0ef018bf3b10622b3c
SHA5123cd2fe7fe82869f1e3b1a1bb5911933e51a15b5af1999465feb0997848aa03900b39295945acb33ff9026eaa5465bd6388ecc42cfedd9bf700f42c94eab8e3ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57de6a5f099f12365126f15ceb0b86ecb
SHA12a4660b778da3e9c0d1ce39f46451a27eff24012
SHA256bd67899ea79ad3d487214c8a3abfa3a6de6557b505abddd1cca20b88daeea7ba
SHA512feaf349c92385caf4af5d4022fbfba89949d3bf223bda8e29157e645cfbbf2ddaed37a53527514044dfca4f62b27cdc233b183c83a75cda25210333fe0c8450b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db38bf6ccf9d4034647eec263cafb18e
SHA15be0d495fc7859571f1470954b41f35659f0fa0f
SHA2562ebf7d12638347377e2dc504e92489957756bfc4d4c176ff0e1d50b310a0792b
SHA5127f52ccbcf17eef6c0083f1ccfb92850c48184efa2e29edd172f00522100ca3deda5723a81dc7115489f8c66367964bfa09134810d667d8c6952bf27435f9250c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb4b1ace33f45540b9e42e9266112148
SHA1f668a21fa65a5d2f32426e5404a656c85225705a
SHA256200d4520b6fea97f2152d00a6509d15d89053c41ec6082ca5ee089cb99b3db66
SHA512c8f18aac09e5f6b8c804d3b0bcbeec590eff5570decef1e6964ab4107a6d2f914cbd42f7d8fe6b3fde66407bc3c2945fcfa70eac6e8ee8c9e2451a32486f5a49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ac80a43bd5d4267f2b18681c7de1e48
SHA1419da552ba628ea90860f321239062f9137522dd
SHA25633d2117bd0350bd6dd5cb2f7757621119755725dd9dc036f3bfc2f154fa813b7
SHA5127b087564b21f23ad0f9794f75b02e113a4e1869c6bf4db5b38e474c8bce64ddcf9be50a27608216181269077c111b8b74182a323453388ad7ebb031b9bee6a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dad4d6d40b44c643af0c77e543fb309
SHA19e9f95f440e41c3bdf8946ce4cebb310d2269fd1
SHA2565b25712e232ddf19583274374716933c014b2aa1f5731a5cabb6c2b59642a5a7
SHA512d7441824d567bf8e40bba8865749833c439cdddac18b19bae935edd91338c2f4d5288d87d34a8be97b36a703dc70c64bcbcc29dff44aa09c32de9d118479ab78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517f4e6cf0ac1051942cf3e23cccdf9b8
SHA1342c003019ed0794644598dcfe395a13558e2500
SHA256fbc60c61014697033cf2248fe1cbf6df40280e2389501a97d3ab257ac1e80ee0
SHA512e7fa0b60e59773f6e3714f61733aa50dd37aacc3c66562ea8719f40423259f88d46d1e27fee4d47ecdd205967fd8f7e1931ad8b4eac2bcc27a8bae68e86623b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faae69fc2142422252479f9fd9e21e6b
SHA174bc871452fb9c17fd16bd03906f72c639f7ca7d
SHA2568eace25f72aaca69ae3b925d0cdeb0118100b769c61702343bbb2679f8c6e666
SHA51286c058e5c6d69c58dd921044d7c3d7477fae3235f7ef28941503c4e49a52e08663104ed296c5d03aad3db03f9df4a4166877f263184cec2dc73d9e03fa2678f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4a8c0da1043d75ba99788424f75d6f0
SHA11122005924fd6ac6bd5e0a719b42b3ecb7840f53
SHA25629100612ad79c0003e5a4de122071e21cce26749a9f16128807abf9fe71a4b06
SHA5127a8153ea501218f700e2304bd276f35db1f9fea0978b3041e50638b58f349fdb29cf72f8e9e2220927b4a40145eb8e4f9f2e79e366acc77b14153124b16c232f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a08b212c09d570014371be83caafd08
SHA1f93967665a28a6b6d6f353ad249cd81f5a46593d
SHA2564399e97af87498476e71b2d774c83ab6a2c90b92a0b4883a0dc88f3d3e096315
SHA512c08f787fd2c816b93ce892d708b1a06e280d41aa2ba100fafda5183cae4d2777861ae4ea90297f9cf65f1061d9876d8a3f481a11ed0c4ad520ac639f9e7cae70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f510fea403fc23463567813e2fbfbece
SHA1a2fb651dec1c77fdda1aa4a7cc3b2b8a00db721a
SHA256eb691205090104838250acb5adeaaa29aa84089573297c8a32ad09ba7da08a36
SHA512f2e7210234defcb2f36670b861f40d26b8a8545a48cfa384325cf7e376817fe45bad4526d5a91abb7f7f58239c8a5afcd042872f055da788f2a0df6a5e0ca29b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b32912649db8325ca9db3436ef9ccd1
SHA114510861b9d9ea32c4dd639d9b9b77a02741e035
SHA25615ba2232344e34ef9b7229f2c53cfc049b1e4a5bfe9cd160e217521cbb0d4742
SHA512cf4897584dbc647d7331047e29a3c7cc01713ac627fe345fb321543f566bd501f594fd4fefc18b54622f8947626e3a92153e418dea53170944a10b7bfda1459b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1fd546e248ceb6b0f896d05bf3070c0
SHA190bdde400956425cf8492722a37389f322ef7b06
SHA256c1f54624b6fbe9d5b0f5c79dd801b532a0a784213eb25e35415cf84430f0b705
SHA512f202d6da7396fdf114efa92eeb10097076de2ff504c72b70a35c1ff04492a4bf3b747fe751db174a3c69019fe4c7bdf7fc0140498d9e57da7f61b3bac9c9b3e9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06