Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
79s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe
-
Size
80KB
-
MD5
13616e15e6e161bf2c187d4ccff0a74a
-
SHA1
5dc358621f84c54e25a5127e6c75873b302878c0
-
SHA256
c16db5977b4fc0999e81d73641a520b05384431102acc29a3976b47bbad97751
-
SHA512
e65ec8a0258f0046801e84785355c379aaf375b05bf0759bb49d8a89fc289a1ff446d978842f03de96aa76eb07484c92bcf9e7118665f2c2ffc60384c078e41e
-
SSDEEP
1536:nc2hl9N/IolKfGsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG24m:nc2N/4usrQLOJgY8Zp8LHD4XWaNH71dc
Malware Config
Extracted
C:\Users\readme_for_unlock.txt
https://gdpr-info.eu/
http://s4xpejatghnopeieoqvjqsnfl576jekizgmw52s7ydth6wgyi2wh2gid.onion
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (403) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 1976 cmd.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\L: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\N: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\G: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\H: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\Z: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\V: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\Q: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\R: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\O: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\A: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\J: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\B: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\M: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\E: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\I: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\P: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\S: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\X: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\T: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\Y: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\U: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\K: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2724 vssadmin.exe 320 vssadmin.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = c06b3643ea75da01 iexplore.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80C8C781-E1DD-11EE-9034-729E5AF85804} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\crYptA3_auto_file\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\iexplore.exe\" %1" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\crYptA3_auto_file\shell\open\command\DelegateExecute = "{17FE9752-0B5A-4665-84CD-569794602F5C}" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.crYptA3 rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.crYptA3\ = "crYptA3_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\crYptA3_auto_file\shell\open rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\crYptA3_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\crYptA3_auto_file\shell\open\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\crYptA3_auto_file\shell\open\CommandId = "IE.File" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\crYptA3_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\crYptA3_auto_file\ rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 912 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2436 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 2492 vssvc.exe Token: SeRestorePrivilege 2492 vssvc.exe Token: SeAuditPrivilege 2492 vssvc.exe Token: SeDebugPrivilege 2436 taskmgr.exe -
Suspicious use of FindShellTrayWindow 46 IoCs
pid Process 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 868 iexplore.exe -
Suspicious use of SendNotifyMessage 44 IoCs
pid Process 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe 2436 taskmgr.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 868 iexplore.exe 868 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 912 wrote to memory of 1112 912 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 28 PID 912 wrote to memory of 1112 912 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 28 PID 912 wrote to memory of 1112 912 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 28 PID 912 wrote to memory of 1112 912 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 28 PID 1112 wrote to memory of 2724 1112 cmd.exe 30 PID 1112 wrote to memory of 2724 1112 cmd.exe 30 PID 1112 wrote to memory of 2724 1112 cmd.exe 30 PID 912 wrote to memory of 2104 912 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 36 PID 912 wrote to memory of 2104 912 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 36 PID 912 wrote to memory of 2104 912 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 36 PID 912 wrote to memory of 2104 912 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 36 PID 912 wrote to memory of 1964 912 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 38 PID 912 wrote to memory of 1964 912 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 38 PID 912 wrote to memory of 1964 912 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 38 PID 912 wrote to memory of 1964 912 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 38 PID 2104 wrote to memory of 320 2104 cmd.exe 40 PID 2104 wrote to memory of 320 2104 cmd.exe 40 PID 2104 wrote to memory of 320 2104 cmd.exe 40 PID 1964 wrote to memory of 1976 1964 cmd.exe 41 PID 1964 wrote to memory of 1976 1964 cmd.exe 41 PID 1964 wrote to memory of 1976 1964 cmd.exe 41 PID 1964 wrote to memory of 1976 1964 cmd.exe 41 PID 2644 wrote to memory of 868 2644 rundll32.exe 45 PID 2644 wrote to memory of 868 2644 rundll32.exe 45 PID 2644 wrote to memory of 868 2644 rundll32.exe 45 PID 868 wrote to memory of 2164 868 iexplore.exe 47 PID 868 wrote to memory of 2164 868 iexplore.exe 47 PID 868 wrote to memory of 2164 868 iexplore.exe 47 PID 868 wrote to memory of 2164 868 iexplore.exe 47 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2724
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:320
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" ☀瓚⛌瓚❰瓚=ř睭=)/c START /b "" cmd /c DEL "C:\Users\Admin\AppData\Local\Temp\2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe" &EXIT2⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\cmd.execmd /c DEL "C:\Users\Admin\AppData\Local\Temp\2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe"3⤵
- Deletes itself
PID:1976
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2436
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\UnblockComplete.asx.crYptA31⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\UnblockComplete.asx.crYptA32⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:868 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD5f88abd46fb92908160d5c799f89fe431
SHA1a92c782d4203ed7674bf238fbdc5152399a2e60d
SHA2569d389159d53f4952738e65125d1e487ffee54a375b1e851ccb6083be23a095b5
SHA5127801be4fca712aa553a940d56f779ed4e59c34a225d7bea2674f83d384d1ff645809bd7d4ea9f6ea7127ac46f1ff1410801fd7ca6ce9d809e74ad6b9f9cd58f0
-
Filesize
2KB
MD5405c5458425f5bdb2cc6ca2351ba883f
SHA14f8890c8ee0ea19a7c8986073d78e6dbf396b59c
SHA256fc9dddc880f6b0dd15957f82df4468ae63dbaf67542372357ba7a992ff426a46
SHA51221c5539122414dca1dafe6ad65122c5296514edbe528414e4871e04eaa9390c890dbaa6fb3bb794455da095fc24390c708527c2eb81a230b551d0527bb419402