Analysis
-
max time kernel
137s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 04:01
Static task
static1
Behavioral task
behavioral1
Sample
3bd5f16105852d04b432981be1abaad9.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3bd5f16105852d04b432981be1abaad9.html
Resource
win10v2004-20231222-en
General
-
Target
3bd5f16105852d04b432981be1abaad9.html
-
Size
415KB
-
MD5
3bd5f16105852d04b432981be1abaad9
-
SHA1
ca045020c1106af5cde412bcbfb87fbffaf07eb6
-
SHA256
3e8c98e18615bd1e45186eeb2979b0d13d3e30f38d2846bfd74b599b9efe71f0
-
SHA512
1a8dbe0c5548ec8b82bcf3cd1642d91f32fa92a83172856ca58dcbe24febb795899ae8f31b0442448ddd7a84fd89fa2a5f61ae5daf8e67ff0701685a695fa8b8
-
SSDEEP
6144:T4X01BCK5C8jUL0uIULF1X5MzcCqdbAwjbaqBesNVcxxixRJaX8EP5581pBw13Zo:TExI9jUSvadhS0esExUzEX8EPj8JYpHI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411095305" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000eee936808936a5fa9cfbb89159e875024a3de7fdd40941129bd62b6695b4ce3d000000000e8000000002000020000000d51d91cdc7bc53d3af581bcfaf455f1b8649758f0257ab3d60afd77eb96f036b20000000391a9f42daea8aae5bd01b55b509ca6be737f35d081eef7c38df60f6bd69afb040000000a130920c293aef453372e5c07a08618a2edeefae6c348fe331dd6428912b227844cb5313b93ddc3207004facd02d0604088239dcf5a5e409ceee9a6cfb8c6a74 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9064a2682644da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000b2d4c06cf5ce46d1dbab7d38f3dc4cc8324ffa6944eeed012a4aa4bb8c593110000000000e80000000020000200000009283b433e906234f16cb039fe5d779da05bfa5b7092a4a1fe643bd35ad00a42e90000000948001a43ec173736e8a25a2d61738385e83c9def8b99ed4a0b0ccafe690af94c6a6f4e0a83ab2d656d12870d9110b8bc89ef6a9053032fe12437e865fe173992f71995a901c727a3984458d2dd4f6a0bedbd82389acf895c3a502177591a58b61788ff18236240b1e98b4282af08ae3201beb8f51d8833fd92493a5f6aa331c658c2b2829c2c263b7afa595ca43f2bd40000000627df3d7952b0b7088163ea76bbe4edbf68f0d60db201435758ba0e93fdf1843eec6883f4496621cdeb7a1e54fd44bde255a24f4ce4ef17b5b5794d14432b754 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{90A0FA61-B019-11EE-94C2-56B3956C75C7} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 1536 IEXPLORE.EXE 1536 IEXPLORE.EXE 1536 IEXPLORE.EXE 1536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1536 2992 iexplore.exe 28 PID 2992 wrote to memory of 1536 2992 iexplore.exe 28 PID 2992 wrote to memory of 1536 2992 iexplore.exe 28 PID 2992 wrote to memory of 1536 2992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3bd5f16105852d04b432981be1abaad9.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD596b405d427fae93dfa3d415a18040508
SHA105a5a9bbdbc805bb1d493f3fb4f2d58b5f3bc417
SHA256babe9ae8722a3b0832d8f2b2417f9c05885e7b4b8b5037b0c437a4e847b23110
SHA5123c983248a01fa14265716093fe52d91866c91a353212d52c9cf529c46b27330cf8dda51ab56ecb65d962cb636383645e2a0ea872165e9f2277bef344d20383c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD58c660eeb582ee0a0fe4314039baa77a8
SHA18157d726105b4d4c7d05d9302a6b972471104ac7
SHA2566270d821db2201cdd50a8954b0bdcc647bd95976d92149c92991f21d24e648da
SHA5125c9c96191c2739da14ebcdbe0b59d2da158f24693136838411d21d3db5339816f0e3b4ef58d2f6e7fe9b7078fc3577eaa0ce471b7aa6a528b75346f6948d8fa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b0878d315b3f64442c8bc3eea71fea4
SHA173b0133a9af5879aa7b5b50a58be9d77c674532b
SHA25650b1ce81b731053ff4a00b7db0693f23d9c970949c9e4322a74e3fe15968395e
SHA5126482bfda275af5e6d478b47bfb36172d146e37425359634fd887758499c6afeb321f904eb6a8fb37d8a99cff02f2372eba37870fe8348242ef90d3d1d51defef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576d8c3e06f1674e4fe0a1585406860fe
SHA17592b4feb71d1f4dcdda76b8e1e38cbd36261d87
SHA2569b578fc0a7035d3a1d7eb5d5048a4ab973d32895cc85158d98be2b2b0967c577
SHA512e1e366b2f4581e0ed86425358b05be176a4934dcc3873492adf2df1b5600d8a1f17215cb7ffedcf2b32bcf0ebdd998bf3d88eace00abbbc9c918610c075553d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57770d48eb78bd2c11c416549ef9da95e
SHA1b64aaaa08c12be4d1ab0132a4660ba95c1787b7d
SHA256dca3e248d9afd202f229eec11656225a1eb771850426373b704519c56572b011
SHA512204eed286f0e615df5b8ec67f818dd48993997c0346054d3bd3a12c1b1594733f5e10e0393690c3833cf45517e88e6d9a2c84f843fe0d4ae0f947c2862cfb7b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5555a6736af3ff8ea98cab40047d0486f
SHA1b838d13da09982aec8c1b7c39cb73e07f9ac7312
SHA256978583831d4e9bf5fbb7627b7f5af089c8c26d4c76bb5a027756d7d5321879ad
SHA5126eb0b3ded35d9a7b81be9e45731a1755ac8b6c90a2bf24f295a0b5a24c2467e13470de12138dffb9d8f322479f7129c5e2108ea19d4547d3b0ca3f49a226431d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570c2d8be67d9b76175db9af02570f64d
SHA1d71c45637e21a826b2daf8cfb1df656830b4dc1a
SHA2566fee09c0698ed90ffb9532dae3c022e4b1f415f00763eab139e1581041dc3f5a
SHA5124cafc0f4953e942323c274ae413997a958f1acdd5de35b5cdd608536654630a43cc20df879cedad622f32097f8bf64ef1e2f25a9471ee72cc96e528f3665663b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539037ae4dba67960dec6e2393e73ecb9
SHA1b20f3554aa86321b7a3750185b0b2cd4ce4f92c7
SHA256c46155fc3af11ab928b17c893ebaf25764171f2ca86aa455061448c7d5852e37
SHA512f095a3fddedcd7b1490e577eea909202ec210b61e43c728224d0219e1ee3e2a1065d3d60df7cbb55a7786f82c460f4641f2b24663e400a19dcc4bbc8d0605854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b0bab2c7658794b6ba52a6db3f0c17d
SHA1145c4aa671b48788bba4428f69c0968e2b417153
SHA2564a2d775939e287ddb7136809235db0bf8f98b50d5d48b1b711720c2e82b51188
SHA512b893191a71ac55f1e4468989cce83560fcad3843f30f324daeb923a54f65392eae96bb84a9cc436342f54e65145cf863da3f2123901beb8acd8259e14e04eb62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55675dec484a271ea6f2a1422f6aa056b
SHA1f92eb3dc7e8dbd66526567a892aae2282dd0f500
SHA256856a1eec926a479ef6ec81a6527ec2b22c557064f5f992d170aeb8c097f5e5f4
SHA5129b6c79f875db8b4eba85ebef5b7cb8c756d087130064c354540dc92cb03bde4208cdef8d9dd6d345c57037f5e38b067216b0fce7bdf6c5d72345d4cf6595cac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565be03ecff6eea5881d9d8d20d4ad176
SHA1a78fb77f33268bf2b3f6e0fbc84bb6a4efe9d2ba
SHA2568f100892586652d0e7c46d2e321af34becb5c98002ef344f90c42f84f322a6ad
SHA5124eddef71468942e94c165823096b0a30b0143c62dbac0c352efecca07bc332c2cea799cdb71a2bf75fd3d6a0f9c5c0d828232ffda1483faaddd4ab238019a825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f76c8000f8fe93fbf7e9085796929e61
SHA1a1269e29b4852c1f4ff5c8717d245827e5ef9f9b
SHA25615d0cd34b0c3d1b0975f174186e3265ca7191c99c521de9e57e123a2e996cfcc
SHA5120c91b57900e66ead05ccdd6f5259793123dec443631253345cfc3d9823d1da2a36bde053ddbc9ae77ad378ef1e6ce973dec4949fc1a3f5bb017c10fccf878dca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581eb258627f21f73f645caee8fc4eb15
SHA1a98606ed49cdb18139a26953634da11a115b4181
SHA256777a1c4e27b226983d5850a29c9215a2cc4b49266cc84012e0aa893425683ff4
SHA512e91a885108023e2d63ce83b4af96466e6ae1e3df3a515bb0f330d8d1678095428e399baec072090f224b5b04634ccf9a992126dc52621b17bb4f1f278a6db4ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5868557420ee0d20bba2f4fb624ff9ff8
SHA1008848b4100ee0ae9d81e9442cfc5b32977ac3ca
SHA256e23c9dd21bb9cd6bc583cb61b80a2ef715934a272b8fb58f35a034727684d9c5
SHA5126377206b0de511a7793d35e7fef278871eddbb413fe8818504e54d50d332978eb1c810c4dc2709b06f0bec23d1db0799a269564d10dfad7025315d6707e46ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bfa95c162162a3d0ac85e7a8079302c
SHA14a5064956aca0db8c7ee1c5bd518ede34cda12bd
SHA256ccde9bbf1013979570ba5448f1c56822f8c69f4cee05106dbdf25e51cbcb6170
SHA512c4c224b72c943799be00ab78feae34d6f251424b80b2d069dffecf0d84cc1067644248ddcddfdb57726f31c54627c799d99b940c2a078bb487520ea5cf848d0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5399bad710552147e13f5cf81d84636ea
SHA14df788109a91b666f4580aafc2e3d398f0a136a6
SHA25680f406cc2acc7e70136590cc0a5351787a69c18c0831d7f190ff69c2c6f60f45
SHA512831f3e7a39f354fd78b9c025b634b5a644aceb0cbdfbb05d8c25a637b5b99164f802c22398109c4a34348eecf652deeb27d142264bd7dceab34e01f3acf68bc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57794e01555ac11a0b5b3a9b85714a4c7
SHA1cf49e6dce7e4cb308804e8451993c5040d197b68
SHA25645481c75aabdc3c37ca3fb416cc885f3cca033ef2e2b50cef4d376a4f8ba5551
SHA5123dcbd647263c1da37edb623664607018aef1f7ae7aa8d15b88ae1d430568c0a913a44d5ccae04592951e5d9f87daa355007d58942520533fe972464095f8a151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3e86938cdda01e635965a43f9032668
SHA1dc97645b81da0ccfa9cd3112a7240e0da121cd6e
SHA256f98916fa4d599f8330b33bca382ae8fc6040ba01a88c6a3393826f3b20ebe045
SHA5126c979e283e13095ee426b2d3cd1cbe9882461ac28d65e77f550a2cc7ede49931494d873ff45f09fada0bb2383bb0a0eca8454617d6f6e821023eec513447e287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c546e67d47125eb215c8f54f93a078b5
SHA1bfcaf50b6942af4a857482a50faf14dab465bf52
SHA256704a14bcabd5befb33f08b0dae0e44040889d15ba763ece4149254cbc99b3433
SHA51219f455ffc2101bf87cd72e4d51001fe0af13f2e385c04e003229693c412cd6bfda489ecaa89fa86e919fc20f3066be034cc6419f84cf571db887049459c262d3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06