Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 23:08
Static task
static1
Behavioral task
behavioral1
Sample
a0941caceef4b0bc20a9cc8c5ec41b56.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a0941caceef4b0bc20a9cc8c5ec41b56.html
Resource
win10v2004-20240221-en
General
-
Target
a0941caceef4b0bc20a9cc8c5ec41b56.html
-
Size
120KB
-
MD5
a0941caceef4b0bc20a9cc8c5ec41b56
-
SHA1
85c0c767dce4fa1cd84cdc5980fdb06ab1938d64
-
SHA256
a8bfa043c6a19de04696673ab6180db4baf4b9c798ed9a2aeff951af59c849a6
-
SHA512
6e1c1c0e60767a668dec70b8033710c0a4bfc294f4c4240f8d1ace83c781fd8fa698386a44dd4db7fabea5eaa1e24a5d16a91fbdf7921f1768c8415a81f5b9f4
-
SSDEEP
1536:N4QMMNna/QzYLJJkcOrVMh4wj9jiL6XoEP9:nMMNnacYLrOO9jt9
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000009d646fb906212247ca16c6f44cb2eb3033d2db49eeca9849177a79f8eb298514000000000e8000000002000020000000e46b5ba4de8f4157f7614f334189654ca65e9757b26de341f1419eac05563b3490000000cfb93173a3fb2e876ff26d995ba95b67af30cb8f29d505ec9046d587a5b2c52dcf6f4475d1f419c99b792bb857adb1a5c46be8d33df7da099506f8064382dadce536685b2d5da6d1206fb271bb8b356e7fcd3435fcaee28e028b001b6cfe8207070128204bfd4634cda49cf38f414b24acc5dfd0cac864490dba5201d96ad9ac1d765ad547d269d8dbe28311db3687d840000000228cf58081a61115a6d76304e11371ec1535c9e6f468b46e8fd285218082d8842e757c40025b79cea0c0fa4ac0dc49dc4eb2b1ea7fb1b4e56e2f5fea145c8dfa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000e9e6e333412025927a6eb1b0bbf8bd3178778c35c18be568c7821d9c1d130e29000000000e80000000020000200000001ceb1ab6f38904655a9126a75ca8a722b17063e8375663f0b7b1171e618763082000000013aca62a768985b2ef5b94ff775549f23212d3b769d2abe7a567500752588a7140000000d666f29889ee0c6db51f06f1ef9ea0ddd09f2ace48e35c90412bc901753cbd18394ac25997dbde1e938698cccef296749e23a7b4d7502ed8b828729ac2e563a5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001e4052ad66da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{66A30C91-D2A0-11EE-BF93-66356D7B1278} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "414891553" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2520 2220 iexplore.exe 28 PID 2220 wrote to memory of 2520 2220 iexplore.exe 28 PID 2220 wrote to memory of 2520 2220 iexplore.exe 28 PID 2220 wrote to memory of 2520 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a0941caceef4b0bc20a9cc8c5ec41b56.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a048b7247191a1c4f057d9c0cad9697
SHA13d91dce9d52aac0b4966debf8ca712ba7c9e1e6b
SHA256dc3533375a918f9c75e037df015efbe89dfe2b1b409d0a546a001eb6002c70ab
SHA5129639762f11270e5c62f03c3fbce0dec2d22c43f0aaf816049bfebbb468a7b3f7936f6bc5ab55d05a47be5f8dfbd13f5fc883d3845dcb701bb52dd656f3d5858a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ce998d64ded0c0552e45dc7a4ca5400
SHA1936c46e04ac0c1dd49a2ab3d249dadc6758afdec
SHA256c50e7d32aceaa9e7a591edf6e7ff06a9c09e9d878c67141e09b71fa1085f5c45
SHA51280f11ea360700839a7c00c8a7320f68fe84bc1ba75da5ba9ecb80d557dd227a37714ceb629de4638f05512726a8b415cf750b49116924f067a08a90fa50496cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d769dbe6c97f802bf1d02626288cbb94
SHA1502370bd2a796925d733921c8ceb2f574bca98cc
SHA256f85cf993149142b03d3647a9c4663e08c66c1df27f43db7791bf3b984703586a
SHA512e8b4dfe640ff3a45de0df8477891c9f4fc19a08d9522f72452c2d11abd7088e7d56a2d6491940a0c0ccad6e0b2df2749c615d62b8a6a2244ed8042d9c30ba35a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b741a83a7ade1eda386de6a64c715f99
SHA1b1964c16d00f35445ec23c4cbca45b0312393cf2
SHA25651a7206c4219b7e2f54571970977aac62a4a6380a9ad2d31f8d32a15ce0c8cdc
SHA512227b83babc772cebfd1be215456f15499281c4c92ee376a2c5b75251d85e0e5f1271178c845d8e61f55bec3f7937e9822defdc2e48d6ab2a46daf386e3fff4e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506fbd8d89ca467b46dc26725ff3fafad
SHA174073b74937622968968c7daa03db7a492c61521
SHA256eb52e3aff228adb2d0fef1339e5704a3a6a286a932b370779f8d6b18998c286b
SHA512ca7d5648603dc40c81e454e236381d319d2e1d93e09037df2df5b4b149895051f0291774c98687e33916472079e60b9faa446201fc3bcfe4a31a97dc184c1435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcc879ce267cc971b6da0624c208bac6
SHA16bfd103f9aff4de53b948a4509cb9cf98fb07e1b
SHA256688bdb67ae094959f4f85f38d0b97d10e187dd52a74fa5f370d10ad91266dd5c
SHA5125ffd541a8eed902c8b91a1cc0a5d5164506c163b196d4f1ec1105207940780f94ddd8de1ce12ccd782bff79ff532003f1afd11ce716de0dd4d2cadb2fcb24479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d32cd095dea860f7c3bf00389b46ca2
SHA1d35dff0d1a0b698737c9b243a5a77d96a34241d7
SHA25601211c1dcd5670bed82cada4893f29501a86c2736eb0aa7735abe60d8fd2f811
SHA5122356e089e290cd0dee0905436ed91b1d6afac2c2cf08f63f997b84c5c718a17953b6837674f639d8f676a277aa23e707b0e4cfc4dff6f13a7e558a2af2e31aea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a456e57acc1a7f07561eee0b41b49468
SHA1d12ef9e243010f17cbf47faa209a34ad51ed2a4c
SHA256c50f696068216d136aa1399f894be1edff45ffcb68a4d98c6ddc35bc7f7274a1
SHA512c0b929103dd3244a2d0cf8b9c998a0badcb097a4ce2f0b2634057c63a3fbbf045eada70bd253e458e4f115e193334ae79ea15ee293953f124ac0e98d592a13da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521b1ac4353199a3e96ebde6203a14dc3
SHA139edb2d8a24a9eccc9557ab93250987694ad8ade
SHA256e6c5aeda1eee231a0285d266bb845fb2d1c94c8b2ec92fcd4b5db05c51ea12ae
SHA512f0bccd5999904a47cf0fe104ae0afe49446c2fc085527592b91026acdad8b729c56ba0347e967d585519e9564d4edfaacbeb7e23eee06eac805cd4ccf97578af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c82b7cece24f7e5db685baf187c5d54
SHA13c3ba5452b442b6020bfc186eaabe466c0af9a8e
SHA2567d7ace7bc7f0af98d051dbef8c3014191786d50ec85007313941cf427e5603e6
SHA512c6ba7c47deb48a45725b28f920e11e636f9850d0541ca31f1814b2d8e45ab1b7727734d341091f9305ac6a011800bf3fc3d66548c1c9d94a5cb326fe6814e714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5200c4dde864397233954dee63a78ed43
SHA175dc6e01919f0c7dbf3ebe54ab77be3e1969a369
SHA2569864d347b864dc6845dbded3c1b85735dca0b61855e5e2adb7773ea2124e0a40
SHA512ddf9f33a985bd03dece74416821d06468d520ddd6fc20691d33bb0acf4e7e41eb1562fe404dc58a0d59fe00c960fdab09ad073d370935ca9491ca994df1dd7bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b770ad094603df7724c2e09a43a5f5e0
SHA1c8156280920fdb9e2fa77e4f26f326accfd353bb
SHA2560f619e5171ac7819a7389d2e408bc9df5329bc3ebc859949ca28bd5a6fd089d6
SHA5123f20213aed17bf76a14257d0ad8061175ff280f152246dbeefc65c003c277aef45aa2c5834e69dd5e8a9a60e6c8fa112e218d00748ec55aaab76ac4babe9b59b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589197e9e7f43ccce7c062be2891a1e00
SHA1bbd1080560f4458d99a97a6a793eb7946807de1d
SHA2566c78e0ffa000f3332265d993d3b27667af3cfa6ede4e71e080420bdc49b843f4
SHA512d3703fd40e53343bffed86ecce45148234575c7a332e1110f6a8906134bb9801a06de3464f88c80a972d46d0d21f3d370f0c05c5a07d04233f79645cc9ad72f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5655a8d3b44cbc122360b119e9704988f
SHA1ab423cc1f69dea1e65efc39d03b14a5ad1ac913a
SHA256eac968283f5c54b1e9663cd749e38a6f593433251c5664209cf01602af6147f6
SHA512f647f7b45951f809324cf8e36f05f0b350636856623edeffcae41be63d9b2021c913efd66d126d272b577b0833aeef245fc5475c3a4d340e57b2e6f11d29fcd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bcede4b1288fa0348b409eee0e84650
SHA1840943bb17bc2df12f4134749cf5896f6d741d73
SHA2562fbee8cd73fd5d56bc73fda5be060d330c29a088e665bd54ee5f14853e0e7921
SHA512b557e6e00378577b2b721f23a87a63d65b0a46fde4874806ae41612c44088f9eaaa1553a04268497e0233d21897211cc60791daa4d81d60a0e21a91e266b1bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bcd6a8f3ba60e6d91702e4a97f2e4c1
SHA140ef9177108cc27435293c6dc1b649879be76d7c
SHA256b8b2279e5169fe91a083e675938d0b5a5db24b7ae916f15c35a99874bf9d571d
SHA512b2cff009c9fcde7bddce4f67fa7c46060b1eebc9c40861524f865179d2a38301156a4854000a7894a23f0dabcefbd12b430c801b34a4165009056e19c51463d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4de52282be7aac95b7a3e0ec721c172
SHA1f55ea4c9cd4c4148d2b4d6bdd2169558e27641bb
SHA256dc0c546557ec8a7e89643386c4dcd83aa785400b8037391597189b186ba2b3e2
SHA512029045ae4eda3caeb2768ebac2e25c3a6f11edcecb1fbd73ec02cf6ee544aef72aa30e3fa643886d0e69d926975c4a981ed4cede19afe1af45b1844ecd57079c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53914b0593f4628c6183e26eeaae15b41
SHA12ee221b1ca8e28e05cab46c548afac722d9496cd
SHA256fab3d4d77540cf829074c8dddcdc361d9d53da1d7f5740c82c45837896896955
SHA5129e65428f6f024dfcd1506060249a99b7e7436ec6482488f2b3d8869ea9296dd2538c139c412ee82a77af20b80d7cc32e80564015a90b4aa82775e3f6a32b84cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50734682bbf2a4420c901f4c132e6c9ff
SHA18d3c872cf52e32e3312fdb2879eb2e197ba07d4c
SHA2560c958685f3ed7be7be78c2e3c9df8253555278185cb024233a2368c551745111
SHA512a1c442a08907f07b006b71dc0e81eefc4cb570b73e7d608b8282c06fd5ca1c84c3c1d4bac348966210653d15b863a7e75ca1751079be1fe248f1befdcdfedca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50716265b7a18022a47437ec931ed463c
SHA16d63afe589c35a293ebe11fdc4136a6b0040152a
SHA25688c27a1d7921ffb9a0ff1a9261354abdf527fe5169a2d5f2b8fb5e37869b6dac
SHA512319ce85b44d84a964488eb807397f4db4b1a07af5f30648580760a90b31932acb3ccc693eb3b8fe415d04c8b0cbf172d1bbd174e39dccb23def759ba32f5cf7f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06