Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 22:13
Static task
static1
Behavioral task
behavioral1
Sample
sb5flHwTC-yxh3ysR2Y1SJzSkTc=372.gif
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
sb5flHwTC-yxh3ysR2Y1SJzSkTc=372.gif
Resource
win10v2004-20240426-en
General
-
Target
sb5flHwTC-yxh3ysR2Y1SJzSkTc=372.gif
-
Size
43B
-
MD5
325472601571f31e1bf00674c368d335
-
SHA1
2daeaa8b5f19f0bc209d976c02bd6acb51b00b0a
-
SHA256
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
-
SHA512
717ea0ff7f3f624c268eccb244e24ec1305ab21557abb3d6f1a7e183ff68a2d28f13d1d2af926c9ef6d1fb16dd8cbe34cd98cacf79091dddc7874dcee21ecfdc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007a63d22a1691fa4183233f69a46b252900000000020000000000106600000001000020000000f87ed6bdf84f3ee29d0ee5ed842931142e3c4ee110507e768769ecaa1fa5e775000000000e8000000002000020000000a6588a88e77a64e5af4e44e3a245f21ac2beba15538119b845dda9b58e6217279000000013a5a35e01e9f5034f7898c14d99c38003b9b3620ee0c2f8cd033ed32b477a996832869c37fa87a32fbd3bf461f47a737622f8cfa4b629b5fd60654664ba256d30af5a9666e11c532a55c7993b3fe15cc266774096243321ee065c8655a2d349e4b6cbd5b6d69138301751d62bfe61c5c656fca141e43ce852f8a75451407a0fab760181d192de81f75f6f01012fb8f240000000c1c76ce34842609ed40ab87f20083cada59ef1e7bfae6fe1ae9aee7959328c90c31d1cd33d46c40f192f6317b9cbbab7f5ff3fb6181c0361e61e0ffc9c745acb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422491475" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59B36481-17BF-11EF-9A72-56DE4A60B18F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007a63d22a1691fa4183233f69a46b2529000000000200000000001066000000010000200000006f9134eac977c83a3ce5756e196c752532986d088c1d1732820c6d7a0ce70c82000000000e8000000002000020000000842c1152785b0efc6f3b32673d5ee4aee0e7c7363572c8dce0b37cfe68446a37200000007b221ce69a0bd2a3f88aa2d1d206f213b55259ef42519571db4f4a0076c4a076400000000681476c114f7e3d149ed6ee13253b7042f4a83883fcfda51dad4110e6d008e0ff5379bab9b0ef8fab29f8188e63dc95d49289ea3e12b15dda1ffe94d31d6136 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c83d2eccabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 840 iexplore.exe 840 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 840 wrote to memory of 3028 840 iexplore.exe 28 PID 840 wrote to memory of 3028 840 iexplore.exe 28 PID 840 wrote to memory of 3028 840 iexplore.exe 28 PID 840 wrote to memory of 3028 840 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sb5flHwTC-yxh3ysR2Y1SJzSkTc=372.gif1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:840 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527cd7478c4be4b98f8180442966731c5
SHA1750b1dcbd1954239d07fb4517d5dbe27452b064a
SHA25688296832d80f305016cdeb6668de233cc577492203b139b45abc48202d4ceafe
SHA512ec447907a025ad273fe0d77b718e55caeeabf685531b99d6d2b7c0da3691f70bdae69bddfd0b4c98f3c40df3c30f9b8a290316045be4696ef1b51e51268c44c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e914733f2b23ad7711f398cbbc58d57
SHA1bc6c02c2268557c5c96592683857e279f47ca649
SHA25620a322ef1aa43445d16a0f1dbfc0592d6d34c40db58ca084cae84d67e202f314
SHA512868e16308dd81cc841f8f5d7d90d8200aefae1055c115044d879001d30feac143094038ceb301e7ede66ab1672c7a6556f1853e1f6b832efa1af041a193f5dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53aa1c220d531e585c8abf3897d8008c4
SHA1eb85ecfea9ee3c33027e84d90ee1b4b83d280a4d
SHA2565b3a220b714854ef099b6cfad6fe56e869c34363627d52fa8d9f72b3653c018e
SHA512459e37975442b9ab51e26776bebda90e5c074fa73ef23cac2d092aeb3808ef9ddb8ac1a9e98027d55b9da1e48288f0669cabefdde5ec161d16a0449a742a2b3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5261a82b8a197abc1c41e81dc46141152
SHA1ef54918661df012039e1f34719c5f1a280c5aaf6
SHA25622d1617216aa461fc4a78b40ca1cbb73677aab26aa1328cb2e1610235088770a
SHA51283208e434e2af78af395ec689d11f2ddc1b5bb9f40cc30b7cf0e61678ea48c2605950974b728ff90e05e0d539c57f0d04a526ff9dcb68d97751c386ccf0898a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ba9e5c7a87099b2e2e1afe287f19fd2
SHA12df0135ead65078754823ff081cb9f6369c72aea
SHA2563cad87ad2047747e877a31045e034f7e39d5b9b1f303d6347dddb9a5d288f63a
SHA5122e2c47f4c01f2add85f86c7b9ce1e4c1684ecaaca92e4671a06a22950a5ca776f2557511beeef9e33a1cfe12c2d4199cd857e8b88cf13e2404d40fdbcba89d3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523d1ab060f563f429661d774c2f3df57
SHA1cab49b75372e8706e494f06aaace87bde5c9f771
SHA256e93b978b42aea15a2b1606949761e9853cd8656b340ebafcb73f02220562c8f4
SHA5123ed6060fa1dcdeab27f2079fcc43200ff94d93fbf5e807bc3b1fc0cb0a8883add3a679e4415ad0c4de6f55fedf13445ce452f6c57ff8c9c607991de4e0332386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3862b0ddad0a6ae0eff91c84c5b6052
SHA1d429c4a6d5add5daa30869f910d9018838bf4852
SHA2568e7e11d2c82e04fb18c3c5371b37c0a46c18f045e4b371cf2ba09d6e7291569e
SHA512e2a42060beb600ec2b3816f0dc6961729dc30a42fc7d35fa78c7f920b8383215e1c2bd4ee5101ab5adfdb05a9b3b7022c4168e882396a87e4f4c9f700669569a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573ad580b982b4cbad078a7422e1755ba
SHA11da4245c93deaac9e935528e5635547f8cac51be
SHA256e1b2395c680de4af2b5ec848a97750946b3fd436adc0420015ef15b305c83424
SHA512f5d050cce0d17402f897d4128a8bea4078835feee253caf280764ccdf14acf754ea98856a7316d393b3acdd762da15b090dbeab4d2a72c79d10278355a4c15cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c1e9de35b857d070d7b4a189b313462
SHA1627477155025de2685d3214699d72c2bf62f3770
SHA25696fc10dac533fa07bc8c585560e7d7e4a1b86630492155e95d1eeeb4f1e1829b
SHA5120997820f38c10be5a905d73ba0e854cda1dff7f5ad2f0400dcf203583d744197e88249670b9c3f8fa9a3b469263105381b1263e24073a511f5d1df8737dc6827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e15825a9b04721e5f6ac78ecc6a7a96
SHA18f354bd62f5ff1a18fc0c8cf3433af54909dd7ba
SHA256ea518c7ab409d1321811aeee883bf13fd466779c12ff2b1bb7a2dc179a970cdf
SHA512eaf943eed547d843df5e7dc95b9e2a4378b7f9c8ebe85384bc7391e2d07584d7b5d47812dbf9739f08877572c0d6352aaac1e5e8beb2a9cc8bb29962672e41f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e56f5be12993859bca0304828173c1de
SHA172bbb405800c8c7ef8592bbbb9286c8b19d53efc
SHA25684fd2cf1f1f0f734f7652698ef69030a6f4a712f5f620f9361c9c2f549ee3c28
SHA512e487a6d96ff4d262d85ebc6d4206055a50709a4f628d45754b66fa695f898c1f28df25b9e1be0cc3377ecfd261eef41d87201ebfbc407046b625f6b392c8c0ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5feb504def2bc491a21cf12a85eae0714
SHA15d877beecf8d208aebe36598b2e2836f64c24180
SHA2567aabbc21be60d1d18cff8aabc11047345d3b248036b2591bbcdec3fc3c197c39
SHA512b458faa185f992165e2f58678973d1bdcbc1f464f8f07b5bf6eb48bb8d30c91a5f9ab921f64b30d4484f66944e9e418600101cde405f3c9648d2926e6ee121be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fef79f5d30b9aeb050ad1a1e71bb97c
SHA145e37ed27eef0ce0d576e8675666787951d4292b
SHA256ce29f592f70edd0490e3550f5611aa227ed2a4f7301b7cce0c85a748d41635cc
SHA512ca2e93469e0e8f3d8dd05b06f107bb64157b3118b01727dbdb44f664ccc47e9afbbbd5b4be90b5f0579949dbaf633d148c8e0002dc8b3a69c3d1f9012d3893a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d6e539a48a8407a84737bc13db7f8e1
SHA104d318020f924e51ba0ccb40a6ed74f714ec22dc
SHA2563dcfd291188079da141453cb0df1165b4a3855d8c43901035df96eda138302e3
SHA51239eab5c8f7cec1778b452850755b7a1a0f9fa44ee28e9b5747f7c3bba4e2e3c8319da1fef9265e6b1e6905193e50023705fe2cd012135ea7060e746bcf5ee663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cb74406397e56b0dd685413c51929e0
SHA17ae7bdcdf95411763ad2926b2223620f3dbe8350
SHA256ef93ec47ca9f67bb6cc86b536c0c432288235b916829133a476f1a44f2229cfc
SHA512e5063ceb1e130d1e399579febe3db5e044bb76bec673c4c6c1dccb48ff75d79be10be4c7aaba20ffa1951da21cc99225d49974894ffc73074e6f3cef17fb9042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b77e34cbe404cae060eecf740143867
SHA10c569249d0c505a544935b030089629cf3677cba
SHA25622cedfc82981e7023080b53aad93bcffbc638a09726ba87fa683e23f1f555467
SHA51287990a8bb97cd21d0111995ff8485e2e0a837e08eee1455218182365efa43bd6e1921ed55fc4c3128155e19143082e596f339aa817446a55809193002eaf8f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ba5bb78bfe4203ea44498de7d42d74c
SHA1476e7bd6bd1093be09454fab2c00843c75eb456e
SHA256a60508331722f89961166dff4deedb904ed3d14755292ba6f2f38a670df3244f
SHA512ee9af3d746d93563c8f8bfe25f37c8e7f70ab250d3f690af3ec7c8aa83b894ba0594b40d0816be17bdc95122de9f69b0ff546508302570eaf2188a0c22aff70c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e4fe91e15131e933bf9aa578427540b
SHA18847cd07e0981506762bde1d6064728bf05ef4b7
SHA256e3e8b8f088954179b5038574375694aeac6bd84c5ae097f7336a27acdcd32c53
SHA5125685ae8191dfebce1621ef3f0da66672620d2a5e164f1b50468561cd85a496c2efe976aaae86212d0334ea015d1a15b390c00667a131c98d2bf969976ae40ce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb97794ff6b076af335bb1d5c8eb2037
SHA12b373466f99f924f88eff67af7e242e0bbb35fd3
SHA256e03029dd13e2a2a5e701649869ff49458e69b4a52369c73866c89f154b181f3b
SHA5122077f5a861e74e3a29cf953f1e5f1f6e2e6aec1b1a8916862350bf28d984e69a3651c758cb193b5881ad997cc6c5bbc0a3f20c3aed908eed4261db97ddeac978
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a