Analysis
-
max time kernel
187s -
max time network
220s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 20:30
Static task
static1
Behavioral task
behavioral1
Sample
f60d4321685f791408d2469b6e47af40.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f60d4321685f791408d2469b6e47af40.html
Resource
win10v2004-20231215-en
General
-
Target
f60d4321685f791408d2469b6e47af40.html
-
Size
64KB
-
MD5
f60d4321685f791408d2469b6e47af40
-
SHA1
258c79a7aab3a50b1a12005e790f312fd8952532
-
SHA256
9592b140381f3fa2ebdbfbb955e42323ffc6c1749fdbb4b508c3c7202d8923ed
-
SHA512
f99c1751a70b9e54a23daa8fae413561f1448bc4b92d77b9893f44b3f886ef32b1b661658ed9fca85fe1efb0f58b108de8b5cfb483b293077c02cce6e374280b
-
SSDEEP
1536:FTupBkacZeM7zi3v3D3ocyPeMWMxR3odthrXGz5taSr:8pBkq3v3D3ocyPeMbP3odthrqtaSr
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410990541" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c19300000000002000000000010660000000100002000000083b8c57f7711f320234fe7014605756f86522b084ad34804df1c0ad736ff4436000000000e800000000200002000000090a763ca0b8356c8d8fe7be8b720c9ee2e44476c2ed74cbdeb7c6abbf4ec14eb20000000a68827bbb4a0e9d4e39df70b4fa85ddfd39f40fdf2927e67fd04cef2bf932ce6400000003eb6db0020919ba0adeb655f371657046029aca4a628d8abd41cad34feb3acd26e8399bf681df777ed6ab490f874fc157d10f085660b9c7e7dfef365a65236f1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9BFD1001-AF25-11EE-9C4D-6A53A263E8F2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3050eba13243da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c193000000000020000000000106600000001000020000000e2b07b8d5c519a01bd80479e14352a893378ce7b6ba29c1c57065d42b973728a000000000e800000000200002000000012d0bec3b1f6a1f59500fd2e48b4ba8c091a3b9276edefe42c6df5eedb7ab38990000000c515b3c7cad4f82eb70ee7d3ef9527c4bb7d1086c3d592646bae1d5d11a0905c5280db8540476944009901d7ec54fc38873c401f43aa3947e68f435bdd876b6f341955f53a0fd563247d6fcfde4ef03d09c115818db4ff6ae8e49c3b6c9de8e5e063b42c741780139097ee52388f0b5186f63a36aaf1ec37267db4378e0a3d248a19599fae21a85a063122184ae3f90240000000c504b398637fdbc730770926889c686cf172f52e9aa8f4e3777d17411d059ee51b1e644e5d291ba20bd94baafcd8bddacd120ffde6d287d8b30bbfed3744197c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2632 2844 iexplore.exe 30 PID 2844 wrote to memory of 2632 2844 iexplore.exe 30 PID 2844 wrote to memory of 2632 2844 iexplore.exe 30 PID 2844 wrote to memory of 2632 2844 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f60d4321685f791408d2469b6e47af40.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1f4869473a37940e10973a37b6959f2
SHA124c55c7dda36aaa798c0307fc084e34363c04345
SHA256a784379aecf77e50a28e938fe54974c610e2eccd5e229040219e506a60d344ce
SHA512b44eba8113d8d0fc34b6fe05d020220b9d306e5d926b0cc0ab1b473b1f641cb1df6ab38ead11981a6003c54da4af34c3a60d09de07a74c9aa806d0cd49850922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb0f6a5c22530168b1dce8e61dc031ad
SHA1c71a9aa427b984f78a8070be4ea3a60a796c25dd
SHA2567e2793833533e80c0bd6231309219a3fe01dbb39c6a0c6abb3f7903f52647422
SHA512802dfd1147fc957d58aff4dad16efd8807d75d5859662e91c7d4711bbf9eddd2696902a2439ddf3cdc7262bddc0c35dc25a5461f84f95ad6cf4d283531e189bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56af2c058c36d1a61db55db6cb8f8db1f
SHA1c0f39b4d8b04d8dbe91e0808a7a1dd01916edf0f
SHA256973a20e67b6b58ce46228775b239c9252b7989077457bc681558b683621acb14
SHA512d996803f9ab2c88d60299ff39d154ca9894764be96c3c90aea4c9e8bf709b60fbeb2faf0b5a788ce953d7d73f36e889a1d33860e14752626f38532c7ee5c1ee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544141d439067973885e1ee046a56db73
SHA133d1a50a9fd41f2a7ad54220ee8d0996b787798c
SHA256107391621327b1e6407f8fdd6df53607083593d6df3fab32661f56744eca14d2
SHA512a042e9efec15f56a63c3e523ae7fd8a9e7b4566540bccf075da310c966c9935d666c03cb2bb1e3f76d16ab0d7f3b6ed32fc83631eab7e5e42fb58090fa9e424a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572affa0a4c5ba999ad60fe64a74f861a
SHA16d9d41965914991132dd3b8e0d7b4d3bac31bf03
SHA256e3d866d283be610b4adecc38a7384a669452d1690adaa6b2a30b2cb12e520109
SHA512a5badfb110bec4078b07ea6ac8bd76fe4f2770534f54d5ec8ef9da746a379968204eadd7de6b2c22ad9ec5f0bfd58712087c4f8248a98d8eac6ae58b58caabeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ace6d2f797e70a244f85f0b29bf4658a
SHA1ad2289ece590044ce8e4abbe26889ff6a1b16a10
SHA2564faaa589a1fbc782e98d7d26fa0e8ceab82f7b6b8a1b62d562633420b7f1cb5f
SHA5125f027625bcb24f44ebf81457c0edd6625f921f3fd9809b6b7f780ade6c80f464cabd0b6ddf5ef59a9539a19bf129533645ba9a89586f000494067d3f4f66941c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50487600aa8e70b9d591a7113746af8ac
SHA19e769c7f004ac87ea7e1119fdc7a47957543f4db
SHA2561273e84d22cd3544e54582bf8f5b504a6a38201d51ddf5ec4b365025e4489fc7
SHA5121db39a81ad29b5e0c30df5be8a7afef5b96d3ec5565faf84be20fe0242a3409ce60e8416312a15acb40d91e1b2a2dc82bab260e764bbdf46cb0f5e0f2b854dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca65ddb5c0f2c9825f1790e0c5bba5cb
SHA132c6d9ac6ca0c1b619ae8a183081f223b141c31b
SHA25653d80bc0c11bd779f49e9eae472327c26016bd6cd9057a83f4ee0e169ad09888
SHA5123507cb58b281b8b624c47f51c55ace2bafe170a3e163471579bbc8b82993b06ff686aace121370948842e9fd59272cc6ae7976d3ff632d66afca658d5193c534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9ab857179d95754ce0c42487bb02c6d
SHA1b681440015392e3c8b4b24f89e1e00f427e1dc77
SHA256a88a06f1fc3f62721ee3aa87e15bf1f7727d8a21a3d6d0eb0bc0e63309b1824b
SHA512aca9468e3409f74e34d253e054b9b47c5450b07b2f0c2c9bd9114fe09edce7930b2496885a9134e3307fa850ed7f2c44299cec3fac307539dac51ef618bd3d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dfe32f1e8f98c36cefa5ac6b967906a
SHA131d89dbdd62b355834427045767478363bb0725a
SHA2563811f14f3f4768f82e68004a5cff8b710d1f104a846c5eaf86ebcde6ca5690c7
SHA5128c4ffe32f1a0516f55ba0931870dd556f6d1ea5e11eaa1fd0fd44af0b786264522e05847ba11124e40194ff74c8ba14737f3fc7e8dbfc79661f4e3124394f148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcc6a16886c77b453cf63c32d13c3214
SHA1e89e3cc3fa5655203ef573637433bc2e3d373d41
SHA256e9ac1dedd4cd5fc333db879de8551d5d97c0dd7ff11a16289b59ea52c725bf64
SHA512c9013406a86ba99d029836716221cdfb543eddd91df6bc09e2204ca67435f5252bb1d8f7a955b510553158761779b998344774b126f2a08502b6cbb1791d306b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fa8c98e634d49e75c7c11d5b0141cc7
SHA1f85d6eb05c816b89c0b6e185acb1128e24a1be3e
SHA2564db567b956e297a4fa330eb3b027c9f1b27b67c435e2a0672cedf552b0574a64
SHA512b133ebd77fed96802a5b54131bbf3aad81bb6409b2a0c3d96b81f35d292bff100cd963194ba8758183a55047a3943efa2d315ac26934d11bde46cc06a3b83bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e5c8f48e9db29bc95db66ef13e22352
SHA114ad16a9525fd4a71803c69849c21a8eb6fd5b9c
SHA256bee745ae9302a54ce2c8d0de8aa276a2d462d683399f0a6daeb4d255d49887fc
SHA512b18deb69dc1ced5ecf070813c6ee8388cdc7b7263707ac7dd32fa963e27576f429b22458752397e364f3cd4a2aa158e6a36b94aaf1b91bc590de8bc00964eb34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59aa28287406e0640524f46b58436f783
SHA15b9ba9afd11c0cfae90f4a1fb01b37eef0dc45fb
SHA25655789e29cb6b833d2dc539cc1b7b700761ba55dae86244eec043f457e79fba3f
SHA512f432445bf8412ca033a94d5be23e99782d90b6a7e5eb329c00614aeabd28b26e717f1bd6b1236fb97112ae872a0645b7af9fa6782d5ec5f7fcd4f9b4d0fb65ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b860e82861dfe7ef052bfae1e85a071
SHA18ec0305220fc8514b821fc89f1f97de61b091a1f
SHA256584ea065600156d158d69b279832ff6353c9a647aab4f2ff4206ddf36c02d186
SHA5121160e514dbf1509fcd27e316054ea152d29185587bd8bc8e1bb2ee47513c79ce0d7bb2f7be0fbe15259edfe60d2f680a23f076d8d55fb9ce44e2b0fda595c12d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdcf89d7813f4d82b875825b3c739ec0
SHA1908d2411072f3f1f3d4e969ca7251fe0e37f41bd
SHA2561662d314dd3f0708e36459ddb933508227d09bf1a41698681e34b43f16088d40
SHA512a4698905a139b8c4267572b380e5441bd7b1d92e9ba63e6a528a4f74b3b07d0195bec35d4213298c0756a7cdb9096d8395ada723ea12b652f5945acceb6c9b58
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CFHPCFFP\cb=gapi[2].js
Filesize64KB
MD5ee01651d160cfc55249d6011a3c45916
SHA179d6121df6575974ad21dafce33ec98e3f2f0a7f
SHA256639d75299973c7d3794eb7eb129e3b5a6139f9f521e1f14383abd0fd501219c9
SHA5128a39dfc1ff2c58ac106225976aafdaf7befc0a28903a0c65e2c272e1967c3336af2b477ec12604400bb8e16aecee6567c9cb9d157e3d54649e28b9b2f920432f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CFHPCFFP\rpc_shindig_random[1].js
Filesize17KB
MD5f019fdda31635d2a31b151ad8ad56c7a
SHA16adcbec55f66ffaef83d9a134423aa98eb2a2189
SHA256c7fc0b1526533002c956ebf8e8c42c3ad3f96c41ace73fb4063cc89051944831
SHA512fc278c12316e098976833882a38c788d812f9d36bd1b9b2b8c87dab4dc906af26a860df95436ea1b7d509236d44d0533d475a153437f8f5d42653fc28a77ad64
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CTTGCPI6\478691279-postmessagerelay[1].js
Filesize12KB
MD592169c8a0fbf6e404267d0705cdbdf42
SHA1a5cd88b74ca5ced239cdbfb458fe25540d671f46
SHA256dba668b49a111527aac8f616b9053ea57c944e01a84ebdcd02a13da921223384
SHA5128c5d35ea512fa7be367cd9a9ded2f23822dcce730e5502a355ed0d48949ef763eab13be0d50a66de6b0f8419d6a002c12c4ddbf20d97f5393ba922e48a4f02e2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06