Resubmissions

20/05/2024, 15:56

240520-tdqwzsha3x 1

20/05/2024, 15:56

240520-tdcz5aha2x 1

20/05/2024, 15:55

240520-tcxm5sgh9s 1

20/05/2024, 15:52

240520-tba3ragh3z 1

Analysis

  • max time kernel
    28s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2024, 15:56

General

  • Target

    c7T33m3O.html

  • Size

    2KB

  • MD5

    d8cff787a0fba5e2a3634dd14e6ace3f

  • SHA1

    b65dc66ddb9ee42c8c2ec612d6e2f026956e6e93

  • SHA256

    93a9c55184cd518c7dcb34612569b798abaf509010c922c4f30309a1dd47b9f6

  • SHA512

    07c2781b895c5fdbf5e758df23c77ac2634f3bced9ebebd6de35d23c8e87bb4e46a20b98601537c0787edc1fac39146e1db4bb3148529940a47d053a69b2c3ea

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c7T33m3O.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2800
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef63f9758,0x7fef63f9768,0x7fef63f9778
      2⤵
        PID:2744
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1112 --field-trial-handle=1388,i,13838201190875935422,17559100349553353354,131072 /prefetch:2
        2⤵
          PID:296
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1424 --field-trial-handle=1388,i,13838201190875935422,17559100349553353354,131072 /prefetch:8
          2⤵
            PID:1880
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1388,i,13838201190875935422,17559100349553353354,131072 /prefetch:8
            2⤵
              PID:2132
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2244 --field-trial-handle=1388,i,13838201190875935422,17559100349553353354,131072 /prefetch:1
              2⤵
                PID:2140
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2256 --field-trial-handle=1388,i,13838201190875935422,17559100349553353354,131072 /prefetch:1
                2⤵
                  PID:1996
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1504 --field-trial-handle=1388,i,13838201190875935422,17559100349553353354,131072 /prefetch:2
                  2⤵
                    PID:500
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3324 --field-trial-handle=1388,i,13838201190875935422,17559100349553353354,131072 /prefetch:1
                    2⤵
                      PID:2844
                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                    1⤵
                      PID:584

                    Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                            Filesize

                            1KB

                            MD5

                            4729bdc0e745b3293b606e2af8a3986f

                            SHA1

                            5c5bca22089d566d5f4e2836ea97026952ae1b1d

                            SHA256

                            ab2d2c145ab00319ef5b1c4fe09623700a26c25fa009dc18bc3cde11c5bda0ec

                            SHA512

                            381e495c91ce282e54940596b53998e152e196eb257853e3c0d97a3e4a26cbf7041cfcaf179ad213d93058aeee9987292dd2302a1219b23a2190aa898910466a

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_05B056B983E25E9B4D43BC3D9283D686

                            Filesize

                            471B

                            MD5

                            90c7b1af373a051ff74c4f7612f63713

                            SHA1

                            247ec890aa48570cf533863b0d4b97b4a15dbcb7

                            SHA256

                            e2da41a166d740bc272014d5778bb07977822958a74e7adf62ac7345844b29c6

                            SHA512

                            87404d0d1957d5ccea542c0e67d4f86e1d50f88f4c9b52993ef2aebd642e3a9efe7d8911cc0bb17162bae7870f6575b4ad9f50994397af2f33d6c34042c62a11

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                            Filesize

                            68KB

                            MD5

                            29f65ba8e88c063813cc50a4ea544e93

                            SHA1

                            05a7040d5c127e68c25d81cc51271ffb8bef3568

                            SHA256

                            1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                            SHA512

                            e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

                            Filesize

                            724B

                            MD5

                            ac89a852c2aaa3d389b2d2dd312ad367

                            SHA1

                            8f421dd6493c61dbda6b839e2debb7b50a20c930

                            SHA256

                            0b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45

                            SHA512

                            c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                            Filesize

                            410B

                            MD5

                            4a7dc5e8e6459c108ace5a9bebcdcd0f

                            SHA1

                            d630fac53d0bf6965882d7913b881bd855e179d6

                            SHA256

                            bcefc648ad7e942c44e2d848d89deb11a8469a4853c9db6229658be82d6dceb7

                            SHA512

                            a8e19d162b4c6c1ebfa846ef77b37ead3c4dbf32229d8086351ab960feab75df2ff7d8671a07c9d73faaf5b7c63d37bad4be7ce29d77636da8f0e91bcde02532

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_05B056B983E25E9B4D43BC3D9283D686

                            Filesize

                            410B

                            MD5

                            6607636b087b27abc289104297aa7a18

                            SHA1

                            55e258454450810ae259cd8d0788f425db2f4c1b

                            SHA256

                            987dd4b10598795a9377a64dd6b046f4da65614ee55edb0b0a18ed747982432b

                            SHA512

                            231bd2191c90aede31a642fbdd59becbf7119dd45159e0ae4694a7d584c220d7de3f66a46914c39fe28dd8806ba9647658c9d3cecbd57c1f833bd131996a63b1

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            f2d5f5c05fc7665acd3d82483fa36309

                            SHA1

                            0bd04d6ac5ffaac11801701268695591c6f407ba

                            SHA256

                            0c39f05a01f00fa2042358376d911b4e8cea0a15967af2ea5e0bf6dc976b6324

                            SHA512

                            7add2b3f2c7a2568638ab6d51170b776a95dbde1b6e07c67a7ddd9a1d974dca1cdb023578cea952b27523498dc774f48d0ebf96e6ae9c760b941d6298ae0a493

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            305d479a395f92af5e5a4a239473d472

                            SHA1

                            4989244adc587f615ca15cee44e215cf185b6dc4

                            SHA256

                            bbd58ee9c25aae772d78b582917e97b54ff1da8cbae24de97f5a5a83ab0dac08

                            SHA512

                            73a5289385031cebe15c207506cdaa1a80b6342546d2cc2046495d71543b6bda1b7dbfb7199d5e26be42ceb9e8242a88252a1400278119a274deb93a345affe2

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            c5f06ebb88f8028234b9136fb04948b5

                            SHA1

                            b6e4b95a5ea64ec0af421105fc6b34ce412afa27

                            SHA256

                            ac0b69bf5e6fabc3fd2ad88beeefd11ef7c4662b50b0addfa574b43b774f3c3c

                            SHA512

                            37d54bd248f25b790aa71a32afd13e33926b3d8e29876581abb7ccadcad9798478f86f5973f8fc4c60ef0aab00272df72b41b306d120a07eb009063810f6ac62

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            18580ab0526095744ac34790523490b0

                            SHA1

                            e58558e4a59008bcc9a12f84c0a9f2ebb32e71e6

                            SHA256

                            610b43f747381953dec29aa39a44f85281f6cee1b77c6a3c15d751cec2e54052

                            SHA512

                            98350aa9db37c22852a672f7ee69cea007261aaa38081d95436e8eb8bb2d67a6925a3e3f2795a3991298e733dbf9eb9f0c0a6e272def1a674dbec4a0f38a1efa

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            c49c1419628f18c2a3906ea2868a96b3

                            SHA1

                            688840c50113ffcf194fd18ca3d4c7a1b2466c99

                            SHA256

                            65170886730f1fd707fd3270c4f8e6fef4b72276f8366021051b66778e582bec

                            SHA512

                            bff25ad200e3e78e9a0a1c3e0d54651de181bec58d87223909b69dbd1c40b250743f380bf21e9a5838c886369c4d1066b3cf24549933b291c60003fd0015cad1

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            a9236d4054450a27c320dca3afd53272

                            SHA1

                            a03f9d8379c68dfb9aa1d685f30eae65bc67ac9e

                            SHA256

                            42c15906cb3ce4a2afd3ef22d1bb3b9e9908a92f62b52f0782229e00541c3cb4

                            SHA512

                            11e4f3955c9d83f61233cc00d37fd5f9c5e96f877ddc6839301e3759554eac8b19061d1da09ce0d8453d73a4b181d5112b727b0074f84b20fcff3795eb6ae7cc

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            cfcf3ddce969fb33de0110a5afd18c4f

                            SHA1

                            c1125b0a195aad38e3f4d6ca60049ae81b424364

                            SHA256

                            071b3b2eeb0410de775874de418636fbabfab036bc7484ea2f81f7da82856db1

                            SHA512

                            1337947ad7644246b81b396e1d4330041a7f8113ec1dd2515965e9fc2547b00a4652b1b98fdd37786d74ed97257f185cabacec33d4597fa513822ba918b57330

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            79269e704aa975a5840bab4ec623b31e

                            SHA1

                            d5db96975525f5bbf9a091c75e9fb13536e542b1

                            SHA256

                            fe05c2918d84923acd9ce992b9dccff24e89aa6ce2ce1297990c055e24cc7fa2

                            SHA512

                            36fc0ad912e003264f610d932ac7601773383acb7002ea66948da4ecd8e7af352f420df1ab970170a906ac8d69850acbbf343b64f62998df2a015a449b4b642c

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            278daa74f5978f2cf9c881013a1c5ece

                            SHA1

                            586be830aa3d5d91a7a1d52810a28ac9c58eb7e5

                            SHA256

                            43495f7486ba154d15af0df6d2ed1df91c2649167326d15db4f0ae3ffcac1b8f

                            SHA512

                            14e826e867fce4d1c61e7f49103ebb23732a8e106c8a19f6d8e7664c1559399ba9871aa0f5b518a578fe2ec1375bfd5438bf3349c075fc689571285754edd5f6

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

                            Filesize

                            392B

                            MD5

                            3e31b0dbe364b21437b23586e2eb3bb3

                            SHA1

                            efb1aba65af446b5d1c3299bab4cff6f7bfaf393

                            SHA256

                            0fbd1d9a9c001a9b3c19a79fab15ddc88d375371415a8fdca65bcdc7eaef2d05

                            SHA512

                            dbe7b364974591dab88af7a49996304b66d8ff2a76c3fb15a1eaf6a95f9ec903a77de9cb595513ed8007cfd7461d66c2af5dceefb85a316955a07fbe2b31bd44

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                            Filesize

                            264KB

                            MD5

                            f50f89a0a91564d0b8a211f8921aa7de

                            SHA1

                            112403a17dd69d5b9018b8cede023cb3b54eab7d

                            SHA256

                            b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                            SHA512

                            bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                            Filesize

                            16B

                            MD5

                            18e723571b00fb1694a3bad6c78e4054

                            SHA1

                            afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                            SHA256

                            8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                            SHA512

                            43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\JXE2K9CX\localdatez[1].xml

                            Filesize

                            116B

                            MD5

                            e087e959ea32f17c9da97079cdf7cd83

                            SHA1

                            531d76bdf2d98d5ff0db3e480b0954299100e966

                            SHA256

                            844b5e480a2409b048968d8750d23805ef377ed738335f82a379d884637dfaa0

                            SHA512

                            be79605466b2410dfd295c85506659cb97c8ba4b5d65f4d1553fcc7147531df20bc65058ebc388d2b104653cf37affcf1a07af4a34308fd82e277a0125b1b170

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\style[1].css

                            Filesize

                            41KB

                            MD5

                            b306b35cc07c52008a160182777a6153

                            SHA1

                            5066133aa455a9d74b7011927bcefaf5d1a5c736

                            SHA256

                            6be2c850110ff11fb7d4645f6d8da5cf7f5d8ea74f0165f7ddeb55d91ddebc72

                            SHA512

                            1ed0bceb0672662fe7ed0b78284918a60d15f1caebd6905e06479895c28fa7783b1e5232ac11778fb18f4c2b0985ad9bb49dcab13aaffa275a8817fae43a0aac

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VIF0OH2A\bootstrap332.min[1].css

                            Filesize

                            102KB

                            MD5

                            c754e3b21934db32b402584dbceb3ece

                            SHA1

                            fd0746b2194a23efcfafa46db3fa57f1141242de

                            SHA256

                            fa576ebe176ba69c9ee4c794795cfb4afe59ef68f78b6085f6f2deb993dfd26a

                            SHA512

                            5c70e921d8d7df94dac74a27e322fad0cc93d1bb317baddf689fdcdb0784c22e7aa9a32a839b3dde8f9594e9889a2c7a9bc166718b5ed29861148412e33174aa

                          • C:\Users\Admin\AppData\Local\Temp\Cab31EC.tmp

                            Filesize

                            65KB

                            MD5

                            ac05d27423a85adc1622c714f2cb6184

                            SHA1

                            b0fe2b1abddb97837ea0195be70ab2ff14d43198

                            SHA256

                            c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                            SHA512

                            6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                          • C:\Users\Admin\AppData\Local\Temp\Tar3296.tmp

                            Filesize

                            171KB

                            MD5

                            9c0c641c06238516f27941aa1166d427

                            SHA1

                            64cd549fb8cf014fcd9312aa7a5b023847b6c977

                            SHA256

                            4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                            SHA512

                            936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

                          • C:\Users\Admin\AppData\Local\Temp\Tar32BE.tmp

                            Filesize

                            177KB

                            MD5

                            435a9ac180383f9fa094131b173a2f7b

                            SHA1

                            76944ea657a9db94f9a4bef38f88c46ed4166983

                            SHA256

                            67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                            SHA512

                            1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a