Analysis
-
max time kernel
121s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
1eb24179df4c2609698712b3e79c4ace.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1eb24179df4c2609698712b3e79c4ace.html
Resource
win10v2004-20231215-en
General
-
Target
1eb24179df4c2609698712b3e79c4ace.html
-
Size
5KB
-
MD5
1eb24179df4c2609698712b3e79c4ace
-
SHA1
a2c7f8de6cadf3471f426b0f0af22d2cc8f031f2
-
SHA256
c1bba7d4e1b1406083ad0842230a41db578bd15f39f30866ef848ff625008a64
-
SHA512
5fa50ef705476b3bd3af79df9cfa0086367e5babd758b0a2b6ac3f1ebdc2d0ec91902b3bfaf7a80a89d6da3e8988da67357f246fb9aa9451a16fd590ef372aab
-
SSDEEP
96:Z+Xr5k9ZBDZU4xmwZihTYFblXXr5k9ZBDZU4HKkWVTATxXr5k9ZBDZU4cS/+xXrl:kSihTYhScVTATrSSSFVut
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410551975" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb80000000002000000000010660000000100002000000050b0b75d37a3b527d9974a16a5103b21e73b3a10c09a42eff4a541bc6f351e1f000000000e80000000020000200000009711c85322131163b8476928e56c784e3479f49d6ac563d808bd9dd9f61fa4869000000080be403ba701c016d715368fe395fbf32311119c4068b316ad87c5a2005d3577302a47efa43d4f913554f5cfea6799d6ca3452fe8d45a1526735326016dd97ea9edc0954b2d46f617625b88be1f7071633b030a9509a59c7cd0e928b1bca6a902d6956a6ef0874a18dd34685dc781d8dad4d278f0c500bf858127270fd7077bd6f350fd7745c838a93add41480442dcf4000000050898a1c812b222e5f014f9bce98ea1bda01802c07d3abe6fb560c10c21af8c798be12db404e82d50d482e91091064c45b8c90291ec328d0f24534714cc6de40 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000c4f3f6357b30c00bf499d59fa390ffa186bea6ba86499bd5f9b4b1fb6b773b52000000000e8000000002000020000000f59cd536e51211f09e1a134cf8fe45bffab1ca11ee8acb92c691036dd8264a542000000026ce22798e461776086f43f7ef045889cb8df55cab02b1c951892ac49fa5579040000000c17a3d0cb47df63db94a2ac8a8e8a2900444da2cfdd36522c8ff4f1a328390500d374fe0918f7d71cc0617bd17ffbb7868b0b4651d3a1b1393c31dcde8bd6685 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70236c5f353fda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{84D92181-AB28-11EE-BC40-6E3D54FB2439} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1472 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1472 iexplore.exe 1472 iexplore.exe 1260 IEXPLORE.EXE 1260 IEXPLORE.EXE 1260 IEXPLORE.EXE 1260 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1472 wrote to memory of 1260 1472 iexplore.exe 28 PID 1472 wrote to memory of 1260 1472 iexplore.exe 28 PID 1472 wrote to memory of 1260 1472 iexplore.exe 28 PID 1472 wrote to memory of 1260 1472 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1eb24179df4c2609698712b3e79c4ace.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1472 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578a4d04546b23cd209af2d2f5bb402d1
SHA14c0865509fde3c5634d9bfcca44f6471f75160df
SHA2562291a98fca3ce7ffcf60b7dc6fbcf131f3e24602c68fad1e9544d273b150ed39
SHA512366f04ed42f186519a8f6f4fe6250f4ff8651dc9000c77c6b11caaa44d8ea6cf557364b7458fae8da7e2fd0e250fb465aeb43b0d0f30c1b3940820e0acbf3e93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f38471e711a1f83a2dc90289a70302cc
SHA19b7f5f083500e35cb0cd8e8bb692c83b0c343a18
SHA256bfd9538b9ed677fa7915596d40c537a384a20022869c896fb7b5369f9f24d87d
SHA512faae83c8034f6a0811a1f114133aa8dd08455bbdb7ddaec65e058c5110ed7e539b66276d3cceb9b095d7667d7ebace2ce081da452e1fd0e838f97ef0307bd7a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5887b3e268a12e44c159fa74c1f767d86
SHA1e36a03481eb588b3382ebb62616b06a05583d652
SHA256fd09e02cc69a8297e67bcc9dd93237a95841b0317ae480af7a39cc938cccbb79
SHA512d737c3b6591c02d349779e417bbb662e56338b33756ddde2e43dbda25b532d835cc9ffac29e20cc07ebc9c717693636528ccc4c592a90c3e0e81848ba0b9275b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1a0ebc76dce1141cee0a8e53df1e49e
SHA13bb713858951ca647260e7a9e0d03152216b2b78
SHA2560598a4782554b800e0925b0e59eca20079a491abdc5514f4629f56536b49c434
SHA51271bd2c140e9ab443b192c9278093ecccb8f52b22afc7dd03d858e2f6532eda0b251c0501f46a3f35ff914158a9582ba4ff2f071565a8ba957ffa2762a948dc1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bda73b4309f1925f0defa368f199dc24
SHA1109617f875add723506860876beeb29daf501370
SHA256f420492b2d4fcd2c0ca8afafc0e549a9525410a85f5da11cf7e50731726f23aa
SHA512fec7dd134351e20523d2b91e50d5bddaf51123f9213e84dbd8748baa2d5336e5fbe4b3df83c58b9b2df95d24b69096858f5eaf247d42419fffa3d21bdaa8d936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb071f9a7c71a9745b7cc9af8a1208f2
SHA19e144ade4a0b40abae0e120d5f78dd1661996e20
SHA256cc4f6763918e987799a9e221d43f8539fea786d6c7ea7f2ae1eed476463d0199
SHA5127c8b8c4967fd9a23dae67ee9e1c85c851c93facc89f596c1477130d294d8391a018dc51095029880d37e31854bfb3804348d26d507918e41eb27d36bf80eb9fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c4f0a920632741332a7372fed8fc906
SHA160b6b6f846c7a338129e632bcee77a30301bf4b0
SHA256ed9c07ec204b89abf50695b00e04b26e67c5ea0a9bbb5134fe64ca6bffc9e756
SHA5123d4bb04e65d46c7bbbd07ac26579e9dfb52fe578a0825c43a5c69ac8fab1acc5e37972ee65f6f5b9c1bece432a86d129341fe367606c98be56f6da4c6d7492ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7b055b6b650759a719f546ac47fce70
SHA1c48515148745058312b9657482af4809eeb9cf2b
SHA25631be0a210ce77e600c8eae97e50a3802588db84bcd1e3963196bfb112195c06c
SHA5129b08de4e021cb53c75b06620eff7850af8324c1aedc39a4a612eb271d4d1315bc5d183a65280d1c0aaab30f6f1b9157696aa852c1278fcea1b9d396549045eaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0fe58ed9bd041eecb8d60f5fc3a4037
SHA1e6e952475a46e0a618fa4e599a79f3bf7815bd8e
SHA2566b38f9e178ce246062bfed5fd74226526bb98bc91e10412201f96db0dbd4f430
SHA51251773b4bbfd923879fc20075affa64bfabd0d7f61f3e0f9e47e18b6f5dfcde378bde374485e30d7b63dd99c3eb50f63cbc1fda106a897cd9b8ee55bcb290ff49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae7b68de9bccdbe03df4b7c3e3793442
SHA182329207281a1aecc880cad8304745ab720a36aa
SHA25683d7c634367a57c9065ae19dfbe536a285d27efeeb9ffc1674e0909d7e029064
SHA512c7cf069e448a6fc48b40e76910c4c5a80726cff791cc7e0a9ddf8a18ef469dde3648c8ae40ffc76c8e7b7f24eab30e3a9f1d30bb982ace7c80288884daf68d1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cde496e13d6a6e8d548785b083e357b
SHA10504c05b3eff37989d8b19246309dd196b4cda6e
SHA256fa56e2c01e67c05dfb10193e7ab74ec30f490f4e985a92b7234c71eb5a65e519
SHA512af241f1524e75db2eb094101338c02ad62bdc8eb7becd46e33ce76d8c584c5ceed87f9837637f0bed7496f87fcb2c755d271378b5569eabf702f3ff530bb3f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a01b75a647b5cd7470a87477cee781df
SHA10875cf6a45471053af09af3fb4c7c0a0bb6c78c9
SHA256d29b7ed377cc0195d857f3537d9a904fabb8c7e965b03c784e7a9d201fc4458a
SHA51235f0d15823d7dec23eb33d09fc1c9734696c23447ed5155751a84443fbeed36b5715c89f721d7723a7932f969d6912b66b45a7555fedc9281a6e0e3f6233d38f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eed5b9528423a6ec3c0131b20538650
SHA123ed5f40d9e4c99d96ed165dfe8c6e946d1c817e
SHA2566c2c57ac7e354e713b4d1e0d5dc677d6c73371e034b4ba5e340c1bfb9e20fddc
SHA5124a526ee04632a3f0765bdcbff377f1b14971a3399cd5bf0a6592845809140913c9084494c65f3aed428c26812d83d52d123967bb9e06415f13e4de32713bb849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5096bb45cc9a5c5bc063214e45fd89b7b
SHA156237e4ca6c17cc9444bbd1425633a3cd2a27a50
SHA25663029ffebf09c67e471e0ef244da3d4d89fbe7b217ca35e377217f9fe9b60bb0
SHA51244cfbe06289e9ad3c588fde75c4a8bde05a8ad2fbed3ff0f41ea02c6ba67c31ef4a7a990e323814941f07e1467bb00e6412ed14d9ad1bb9566d4cf67cda2b0cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a7df341040868f7c22c02842d046332
SHA18ad378cc7a5aab97af8cfa1cad707dfb3862774f
SHA25662de23426f82dba709b770b5383eaab2500a8eb91a1f73871b1de0fa328403ed
SHA5120e2e492cb266b7137ee673350210ecd84a828d770aa34e67b0f6ec4b81b9e3b233ffdae17352e5f7b37ea4a0762f059de8c9780e82f7e4c9e467424f5c0b89a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5270b6b77f40fbf3405a9fad281f3a0bf
SHA1965f8c8de3bea30c6f62aeca860a4c735df5b54c
SHA2568752a9529693dd218d1b9bd11fa386e4b5c966c82466dd51f0ed5cd50754db06
SHA512c3a1af25aa07b2f11503356859436780a545ebb6221aa85c06b3add5a5718c0cb4846e29ffe834f237802082f6f7a81a8058f29af59ed51c7d1c37ce37bd4f27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d7a585d131f8fdc1eb33aaaf685312d
SHA1f53241bb9f789285a5669133dff78f3fcf35c4d1
SHA25688e86cf08bf2ab96e3137ae5f56eb4eb60a1d04d6916c6dd11e565a0173aad34
SHA51257172da1ae857d3fb404847268045a40fe263fc738c6002828897cf0b47a8620da4710366338d1fdda167965f41f181a5bdd9d677d90fe0cbe6f5d03f307fdb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4b2bdda3a0d00ee2ab0603bb4d12ddc
SHA1e381b4062f8333e5e3d3c8c2b1e2268bcd124a91
SHA2562c0a124c8cf56db4e9da16fa2c877581204bb9fa3173a6266136e6a5bf7985d1
SHA512d75c01ce9a40ac3a97eb2818b700ada239ce5a692d7732062a38eeac7df404ed67d9502dd9efcb6bc1067669464245d2c96a2f4412733360f0f063a6e4c17d1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5358fbceaf92f163c3bb74c8014796f
SHA1fbaf7ce6778b4c9b7884cdcc0fd7070cf8d22e10
SHA2565a849db4d07978781caa36c9dcfad98f9da7658a23222d4144b9917a44c028f5
SHA51222450b07e2441ec83a45d0ddaceec4326c84b5546a83fddfbedb665c8cc663b87aeea35ecd91488f5833e4382875107b6f6ca0209aa41e8b3719519c41120438
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06