Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 16:20
Static task
static1
Behavioral task
behavioral1
Sample
74f4796d556e748b08e1aa34a4554575.html
Resource
win7-20231215-en
General
-
Target
74f4796d556e748b08e1aa34a4554575.html
-
Size
23KB
-
MD5
74f4796d556e748b08e1aa34a4554575
-
SHA1
e70cdce5811923062dc2ec31c73a32fcee411f1c
-
SHA256
f6da88c73907ab6cc7a9d461d8201f1f77cf060dcadafc2bbebed5cce6fa4716
-
SHA512
8525b531f997edec011a0d6901806117c82c032137feeb614f561aea541114a19c609447a022dbbb83b223acaa22cd690a9774b86001ec471beacb5395c86258
-
SSDEEP
384:JynA4ywIW6p4dDDztvukeKXXTuHwNyFvuJKL24UTpNyOcn8tvG5nTDuU5esT8a:A1CWbtWkekcqOeKc7wV
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000516f92e4b2167abd9f4dc3d16d66d7b1393f9c175b9c65f946d92ecba9b72b56000000000e800000000200002000000098bf037cae8e0823cd32ffa3956dc6b07947a5c4dc233c11a2a0e8ef6ca405f8900000004eb5b708ef75127c13527f6078c2a778c8d9b4e74f90a6522b4494ad3324f2c41d67012bae66ef4aa3dacbd3e2a63a4f7ac3e1bb403de7a33d6c16c4f88e506012cb55ff201ba4cdac00ac1157cd24021275f25da55ad5b4f0b970975806ec3c9b6f1d479335f222e5cec8f4c2a2aebf7788736b10ffa46548d7326357f65d647a47340edec47ba76826c13ce7759658400000007150fb13fbcf0bf8b1ca2e4a2a3826e6a306b5e8bc5af043ce63bef07286153e64e6e5a08537761c9697bbd6c8a636f585ad2618afe1ffc4f2d41ee4551ac691 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000007d95ceca6f709a83581061236c37d7241f27afbfba4f7e39074de411848bcd12000000000e80000000020000200000000f3c9288142aa01e78418da6224ff85eab1523a5c663eee68ee18aade23e6c03200000006f505150f9145f213717e22ba55a39d4dd8251ea6a2ec0affe4e52ee9e72b0f240000000c70bfa6918d3f850a0fc09818d2f25173b066832b059363f9a7f4d3f90729dade3dc0e90c15a86912e01c95dea2379a6a7f00cafa72217a2be6a0c7e0df40653 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 003e1f86aa4fda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412361514" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1226911-BB9D-11EE-88F9-76B33C18F4CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2224 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2224 iexplore.exe 2224 iexplore.exe 1888 IEXPLORE.EXE 1888 IEXPLORE.EXE 1888 IEXPLORE.EXE 1888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2224 wrote to memory of 1888 2224 iexplore.exe IEXPLORE.EXE PID 2224 wrote to memory of 1888 2224 iexplore.exe IEXPLORE.EXE PID 2224 wrote to memory of 1888 2224 iexplore.exe IEXPLORE.EXE PID 2224 wrote to memory of 1888 2224 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\74f4796d556e748b08e1aa34a4554575.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e7476710454421d4b05b0d51926ae7cd
SHA1a69b0cb9e2dc1ef127322b91e3cb530af3cabb18
SHA2565c648009bd8559754ffc916128f5eb81f28622f89acd693020407bb5cf74f64c
SHA5127c5878af9fcad90af115f6a4ed47ddfebfea2e3a93dbd03608e75cdee3f234086a05fdec83c0594096f4200f8ac62c83350615c8fe1af51c3453590034823fd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD553f7ab8ae7e7b775e8af89f2c2697052
SHA170be447628707812ab1fc957ae0525ab35cc5a4d
SHA256055366309364a1f21397adf80087622b64701e8b3e62573de2ba6d1c882d2c85
SHA51202c1569ff70778ca9dfbaca5351a308b19e092351a2d899094ad7326f98f364710d953f618dea4d21ac51e096decaa82f7b73adb19419a9317e63230b3135f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b345f6eb7a378b4ac30a856d3f65cb92
SHA17766aac70cf3ad6b0b8f96dba1f3bdd1a59dc040
SHA256f2a7d07ebe0ea977c22be6db9a565148faf914d73f8368075b74a0ea28c74a07
SHA5122969efe8a6d64d03210cca19e1d9aa1b048768679b1c25fe15f1ba8c25a6a8b17faf04834ad2bb82d1f25fea2cebb155772cb85114e7f28ad17081e184fd4422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD568297c93302727d2c3b87538cd8a8bfe
SHA1e65333ac56dc6663a28b780047226edc2e6441f9
SHA2560411d68c9c1c18e4902369c7befbe7470bea740b356b112f7f052e33fb97a6a4
SHA5129dfb5e6f189f17ba6c3423dc535e66292c415517b21cd2aab310da5268c618be6476ae7c27905ef046c4fc11a922b5525f07afa144cd0c0869d1d5bee768ac7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD538cce57ae846b30e5941f91f5f1cc1fd
SHA1cee1255a415a4116c2785da21215cefdb1dfbfae
SHA2563eaf1349902f900b23317a0f93752c2f9e01b69630349dc9064d56622001193c
SHA5122d2459a1b4caf683550d5a9d7d6e5a6d81d0fcf8c13ef1cb85db207e0cb90c65a055713213b5dc13bf51e149106d79b98da7670549f51eff3a6ac4ab7678d08d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f285092fffc59bd3cf4d6900b7605c76
SHA1c434524d1f13e639d95e69cf3297a917eb7112b5
SHA256c9bae3649ceeefc6c0099023c67c7d635c8916ad0713fe67a727a21a266bdf75
SHA512681f583adc86572841eb88eb530994ed7f0065216437998a0f9f08c75a7f747fb7b580127d998bc8f8cc641590cbdc56c57fb62b6bf4bc09412938d21be643b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e106c13cd602eb1a43f03185ce8bb6fe
SHA11305bb9e3221375f1f08737af9a8cd08d811248a
SHA256629cb1cfdcd76ac74e3110c5198525c235f54e97f97fa8d2e50ace1261b4cbc6
SHA5126698d70a336a66256768d9971c426cb10c94fce33f92e106947ddf9e15b285c98f9e65aeff40c54e4ed370c6551f15d71f898e56f122a79472d374c124a9372c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d9755885e90f1da4f8311873b38f1c6b
SHA111ddb6bbe55be4ace6b8cec3c7d5af0ce82b8d8b
SHA256a89c898873e3b84f9279afac418339fe53846e89a1b8304660968de39b76211e
SHA5129a08bda54c817e8bd3f2cb6bc5c4dcf0ad4cf80ccefc08c54a2b55c5754329d9ca55714346e1bc8c7c18f860c074228c3e9a515bf13b717e376ff994a46da370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cca89e83ca046b497099976b8dbaf702
SHA184a992014eacbacd92ff361f92f84bf85f0e2a71
SHA25634f1ada23caa9f02ceed45c788fbed99f9ba9491aa8ccd5e50b07e51012b683e
SHA512d9c5127baa2478c5a3081c687021fad8198b11acb0ce678dd136fb29dc07f84ec036accebe9479558508632261c1b24784007871ecb4502e6dbd454a8fad6e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5855169427e12da9c08515ef4cb9aded3
SHA143925f91441a948f2cf545158b678418fd2af40f
SHA256111bde29b473d9e35d74d6d3e4b7105c7b222cc7eade5d98130503e61ba56387
SHA512dca01ffffdef8c3bab6b12a1857231bf8bd75bb6abdf77910b44ac99295faf2864bad79169353270c8732a802b90978b89456829f910bb8864331a24605e58db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ed44cf9d336002d21a069ea592a1542f
SHA1992c624192760972e8f029ebcb9dfc4ade33bc8c
SHA256508b91fca010dc1f204d0f91333d0680c943a6dcf0451f54e664d06a6136fd4f
SHA51290e00d25eb9686b3926936f0d1ce5f65c1dc7f08be5546e2364a5a229f708315c06073d678174dc028e238c31059133694f7da7a28e6959183b4348e61f8afb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5874d0e4e82eaee59d861982364877a4c
SHA1f9b91e59fabd3b86435b92d3db1673d1436aeea9
SHA2561e72ae6bdb8188e65844043f2eff3bde631d1fa34a13df3a8a7b626eae99d520
SHA512e17a1b6470af28bbc7cdefee43c35b5cabadc259b85f299350ca641583070f52085ee6a2a0485228b1bc8f4763f8fb130c59acb28a9f615007aff2a52bf41d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57ec713a03de3bd9b66d22cbe0b239d2c
SHA1efc33ea001019a80632a52ea8fd4999aae12200a
SHA256c00f0d3c43fe03c899855c501b1711c2a94c7b95021bcb734eff0b3adae9153c
SHA51281947b49fd76e60f148763199f9ae00586bbcf78fb62fe7cf7806f11627285f34429940b36796119458d228b17b3917c9be89a0cc1a236cc8eeae5afce07db84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52239a990f67e3dc52f777a517a9da28d
SHA197bb3c9b1269a8ef734b877b7641f1988ed7aa01
SHA256503436c0ff8d1d0e00b1e6e6de1e80b1d8e9ba19039443317c8454f420ef7bc9
SHA512eb08afccf2a6162c4cfdf1dbfc8564a01ec46b553cd3306946867f735c70181e305131a0136a5b6b53a0c821809316c7a6ba687fd266d23c66c4560ccae72cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58eaff1bec6bae1d9ce311f61f12c7810
SHA1ea0790de758f94a2d3dbb92562de92a84ade1fb7
SHA256acb9631f9d6cb668b737fa00285ad498588a6c8c06e3f1e59c5c5fcf37c0112f
SHA512548dfbabadf66ae11a760306a8b98549091bb1859e18117aec75feb13d995147cc9e4525301ce2edfbc89ee1ce84aa73b0ad49ef4adb60052853563a5b60248b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD559ee619aec24bf1be71be86375b19528
SHA182a43e4c4006a924dcdf0260c7f2208cff619b80
SHA256e5ff8670e94461789f61a19e25581e50e8512461de0a709c668f0d02f8e1ea3b
SHA512ec631dbf927385f3d299bc900a8469da053128bcb086fd718610262ae04bc621e58ee902e17696d734c7494e6321110f1362a225d15a1fa9ba87ea8a24bbeb03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56dfc4e4e72cf506aec38abd21785551c
SHA157cc7b427ec8df1a8e1c5b6ac529c62be710b347
SHA2562cf0282fc0517e4868b65f2938c81075e761a4db25ef4dedd4f9548ede9546db
SHA512d3604bcdf51a95c1a621a7e22aef1e3d6843f50b83db096113515946e03fc11d5348bd0bc08f4b5ea0cb00ef542c2225d7d3496f87bc09442bf4e808c2df9e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD577181d134c6f70a8c9d5de5ce93901ed
SHA12460fb16b2379cdfc5c4c7f87296549480c7c445
SHA2566fa08030cbbaf1280bdf163a37baad3b311447ec16e7ae90efe3fb5924cb38dd
SHA512541336a47f6c96541f016139016c1e4465cfb25eb5024655eac12e365f21f3244e5c8eb94396d37cdf8c2c219b1d46bd5388204534f5f6022d8610d55d4a2eaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD534d65c039c4e2e62efa1bba78360247f
SHA1fd10e8e405550f812567f290f5e0d83ce2b09c56
SHA256fc288a0a46580a15a10a4c7ed0a4ab104e82da6bbb10d14fa2b2f7386719bd8f
SHA51290ad6d77cd9442380afb1e208641a8e683a8fdc276ba8edc8fd040ab5cb40d6bdbb3ffba4b86dd7d25f0e1ffc23add1d19e04a3d2ed1d74c78633adf01a42bf0
-
C:\Users\Admin\AppData\Local\Temp\CabBA6C.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\TarBB59.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06