Overview
overview
10Static
static
10The-MALWAR...er.zip
windows7-x64
1The-MALWAR...er.zip
windows10-2004-x64
1The-MALWAR...ot.exe
windows7-x64
10The-MALWAR...ot.exe
windows10-2004-x64
10The-MALWAR...ll.exe
windows7-x64
10The-MALWAR...ll.exe
windows10-2004-x64
10The-MALWAR...BS.exe
windows7-x64
10The-MALWAR...BS.exe
windows10-2004-x64
10The-MALWAR...in.exe
windows7-x64
7The-MALWAR...in.exe
windows10-2004-x64
7The-MALWAR....A.exe
windows7-x64
7The-MALWAR....A.exe
windows10-2004-x64
7The-MALWAR....A.exe
windows7-x64
10The-MALWAR....A.exe
windows10-2004-x64
10The-MALWAR....A.dll
windows7-x64
7The-MALWAR....A.dll
windows10-2004-x64
6The-MALWAR...et.zip
windows7-x64
1The-MALWAR...et.zip
windows10-2004-x64
1The-MALWAR...r.xlsm
windows7-x64
10The-MALWAR...r.xlsm
windows10-2004-x64
10The-MALWAR...36c859
ubuntu-24.04-amd64
8The-MALWAR...caa742
ubuntu-22.04-amd64
8The-MALWAR...c1a732
ubuntu-22.04-amd64
8The-MALWAR...57c046
ubuntu-24.04-amd64
8The-MALWAR...4cde86
ubuntu-24.04-amd64
8The-MALWAR...460a01
ubuntu-24.04-amd64
8The-MALWAR...ece0c5
ubuntu-24.04-amd64
8The-MALWAR...257619
ubuntu-22.04-amd64
8The-MALWAR...fbcc59
ubuntu-22.04-amd64
8The-MALWAR...54f69c
ubuntu-22.04-amd64
8The-MALWAR...d539a6
ubuntu-22.04-amd64
8The-MALWAR...4996dd
ubuntu-24.04-amd64
8Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-09-2024 20:01
Static task
static1
Behavioral task
behavioral1
Sample
The-MALWARE-Repo-master.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
The-MALWARE-Repo-master.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
The-MALWARE-Repo-master/Banking-Malware/DanaBot.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
The-MALWARE-Repo-master/Banking-Malware/DanaBot.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Dridex.JhiSharp.dll.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Dridex.JhiSharp.dll.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexDroppedVBS.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexDroppedVBS.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexLoader.bin.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexLoader.bin.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
The-MALWARE-Repo-master/Banking-Malware/Emotet.zip
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
The-MALWARE-Repo-master/Banking-Malware/Emotet.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
The-MALWARE-Repo-master/Banking-Malware/Zloader.xlsm
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
The-MALWARE-Repo-master/Banking-Malware/Zloader.xlsm
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/001eb377f0452060012124cb214f658754c7488ccb82e23ec56b2f45a636c859
Resource
ubuntu2404-amd64-20240729-en
Behavioral task
behavioral22
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/041bc20ca8ac3161098cbc976e67e3c0f1b672ad36ecbe22fd21cbd53bcaa742
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral23
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/0ab8836efcaa62c7daac314e0b7ab1679319b2901578fd9e95ec3476b4c1a732
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral24
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/103b8404dc64c9a44511675981a09fd01395ee837452d114f1350c295357c046
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral25
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/2378e76aba1ad6e0c937fb39989217bf0de616fdad4726c0f4233bf5414cde86
Resource
ubuntu2404-amd64-20240729-en
Behavioral task
behavioral26
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral27
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/3205603282a636979a55aa1e1be518cd3adcbbe491745d996ceb4b5a4dece0c5
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral28
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/453468b86856665f2cc0e0e71668c0b6aac8b14326c623995ba5963f22257619
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral29
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/5fb29fb0136978b9ccf60750af09cec74a257a0ca9c47159ca74dbba21fbcc59
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral30
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/6fe6808b9cfe654f526108ec61cb5211bb6601d28e192cadf06102073b54f69c
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral31
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/7745b070943e910e8807e3521ac7b7a01401d131bf6c18a63433f8177ed539a6
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral32
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/7f18e5b5b7645a80a0d44adf3fecdafcbf937bfe30a4cfb965a1421e034996dd
Resource
ubuntu2404-amd64-20240729-en
General
-
Target
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll
-
Size
628KB
-
MD5
97a26d9e3598fea2e1715c6c77b645c2
-
SHA1
c4bf3a00c9223201aa11178d0f0b53c761a551c4
-
SHA256
e5df93c0fedca105218296cbfc083bdc535ca99862f10d21a179213203d6794f
-
SHA512
acfec633714f72bd5c39f16f10e39e88b5c1cf0adab7154891a383912852f92d3415b0b2d874a8f8f3166879e63796a8ed25ee750c6e4be09a4dddd8c849920c
-
SSDEEP
12288:2oXYZawPO7urFw4HLLDOeLSwg4ULeHOuCqA8:2oXYFIuh5HjhSwiJ8
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1244 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zoekctxdbskyzr = "\"C:\\Users\\Admin\\AppData\\Roaming\\qAf0yl\\perfmon.exe\"" Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\4QmF\Magnify.exe cmd.exe File opened for modification C:\Windows\system32\4QmF\Magnify.exe cmd.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Modifies registry class 9 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\MSCFile\shell\open Process not Found Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\MSCFile\shell\open Process not Found Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\MSCFile Process not Found Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\MSCFile\shell Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\MSCFile\shell\open\command\ = "C:\\Windows\\system32\\cmd.exe /c C:\\Users\\Admin\\AppData\\Local\\Temp\\4QFxKr.cmd" Process not Found Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\MSCFile\shell\open\command Process not Found Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\MSCFile\shell Process not Found Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\MSCFile Process not Found Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\MSCFile\shell\open\command Process not Found -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2712 rundll32.exe 2712 rundll32.exe 2712 rundll32.exe 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 1244 wrote to memory of 1976 1244 Process not Found 30 PID 1244 wrote to memory of 1976 1244 Process not Found 30 PID 1244 wrote to memory of 1976 1244 Process not Found 30 PID 1244 wrote to memory of 3024 1244 Process not Found 31 PID 1244 wrote to memory of 3024 1244 Process not Found 31 PID 1244 wrote to memory of 3024 1244 Process not Found 31 PID 1244 wrote to memory of 2276 1244 Process not Found 33 PID 1244 wrote to memory of 2276 1244 Process not Found 33 PID 1244 wrote to memory of 2276 1244 Process not Found 33 PID 1244 wrote to memory of 2252 1244 Process not Found 34 PID 1244 wrote to memory of 2252 1244 Process not Found 34 PID 1244 wrote to memory of 2252 1244 Process not Found 34 PID 1244 wrote to memory of 2260 1244 Process not Found 36 PID 1244 wrote to memory of 2260 1244 Process not Found 36 PID 1244 wrote to memory of 2260 1244 Process not Found 36 PID 2260 wrote to memory of 2184 2260 eventvwr.exe 37 PID 2260 wrote to memory of 2184 2260 eventvwr.exe 37 PID 2260 wrote to memory of 2184 2260 eventvwr.exe 37 PID 2184 wrote to memory of 1732 2184 cmd.exe 39 PID 2184 wrote to memory of 1732 2184 cmd.exe 39 PID 2184 wrote to memory of 1732 2184 cmd.exe 39 PID 1244 wrote to memory of 2532 1244 Process not Found 40 PID 1244 wrote to memory of 2532 1244 Process not Found 40 PID 1244 wrote to memory of 2532 1244 Process not Found 40 PID 2532 wrote to memory of 1972 2532 cmd.exe 42 PID 2532 wrote to memory of 1972 2532 cmd.exe 42 PID 2532 wrote to memory of 1972 2532 cmd.exe 42 PID 1244 wrote to memory of 580 1244 Process not Found 43 PID 1244 wrote to memory of 580 1244 Process not Found 43 PID 1244 wrote to memory of 580 1244 Process not Found 43 PID 580 wrote to memory of 2288 580 cmd.exe 45 PID 580 wrote to memory of 2288 580 cmd.exe 45 PID 580 wrote to memory of 2288 580 cmd.exe 45 PID 1244 wrote to memory of 2352 1244 Process not Found 46 PID 1244 wrote to memory of 2352 1244 Process not Found 46 PID 1244 wrote to memory of 2352 1244 Process not Found 46 PID 2352 wrote to memory of 1984 2352 cmd.exe 48 PID 2352 wrote to memory of 1984 2352 cmd.exe 48 PID 2352 wrote to memory of 1984 2352 cmd.exe 48 PID 1244 wrote to memory of 944 1244 Process not Found 50 PID 1244 wrote to memory of 944 1244 Process not Found 50 PID 1244 wrote to memory of 944 1244 Process not Found 50 PID 944 wrote to memory of 1800 944 cmd.exe 52 PID 944 wrote to memory of 1800 944 cmd.exe 52 PID 944 wrote to memory of 1800 944 cmd.exe 52 PID 1244 wrote to memory of 2536 1244 Process not Found 53 PID 1244 wrote to memory of 2536 1244 Process not Found 53 PID 1244 wrote to memory of 2536 1244 Process not Found 53 PID 2536 wrote to memory of 1108 2536 cmd.exe 55 PID 2536 wrote to memory of 1108 2536 cmd.exe 55 PID 2536 wrote to memory of 1108 2536 cmd.exe 55 PID 1244 wrote to memory of 328 1244 Process not Found 56 PID 1244 wrote to memory of 328 1244 Process not Found 56 PID 1244 wrote to memory of 328 1244 Process not Found 56 PID 328 wrote to memory of 1056 328 cmd.exe 58 PID 328 wrote to memory of 1056 328 cmd.exe 58 PID 328 wrote to memory of 1056 328 cmd.exe 58 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Banking-Malware\Dridex\Trojan.Dridex.A.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
C:\Windows\system32\perfmon.exeC:\Windows\system32\perfmon.exe1⤵PID:1976
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\l5hL.cmd1⤵PID:3024
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵PID:2276
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\1ab5MJK.cmd1⤵
- Drops file in System32 directory
PID:2252
-
C:\Windows\System32\eventvwr.exe"C:\Windows\System32\eventvwr.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\4QFxKr.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\schtasks.exeschtasks.exe /Create /F /TN "Gugio" /TR C:\Windows\system32\4QmF\Magnify.exe /SC minute /MO 60 /RL highest3⤵
- Scheduled Task/Job: Scheduled Task
PID:1732
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Gugio"1⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Gugio"2⤵PID:1972
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Gugio"1⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Gugio"2⤵PID:2288
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Gugio"1⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Gugio"2⤵PID:1984
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Gugio"1⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Gugio"2⤵PID:1800
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Gugio"1⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Gugio"2⤵PID:1108
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Gugio"1⤵
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Gugio"2⤵PID:1056
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD59818458013aa957cfae58ec744e8fb5a
SHA1d68981dc9b8ffb7acd27e40214057bbd95000d53
SHA256cb6ef21e54cde404e4d88f1f36262e133fae6da2d0eb8c0d515edd53c5c6603b
SHA512b0a4215d76cb93a7d3ea5b2a58ff8cc7772eb791ee3d391bc282eb352a270bc57b40f735f85835341d3d60ec5e36c41c455ed214483b9273b04aaaf88f70598a
-
Filesize
121B
MD5819e3a2901d6e1c85bd5dad94758ce17
SHA131a02a71fcd19400b0c75bc04d4dcebf3a9148ec
SHA25640bdf3586e0b23cf8654ffff3f74f6c4be324ea90d594a8a4768c30c09098cdf
SHA512d310ec18878c1c6f4260cb107b0832c95ccf237e4c87f5858a80cb48a2e570032b62dd6443ab777ff034e2a5a2fece8259f24448605c2a27765871409f14d85c
-
Filesize
232B
MD5346eaac10f27ee818583dab257c085f0
SHA12170d98a0c11859288af7ab61c93ef9e88996160
SHA2562100d0a70eefe559dc0e1ae7a1b0b86ffa32ffbade1054c8c9d1bf5bd8ed197e
SHA512b53839d68f8a6d02cb9ffccef84cf10482795d30790f9b01d9f0b1106592484d4259c29a29f1b7537d39c7e7a17b0c8d2609c54b8062bd0e36bb77df3069f308
-
Filesize
628KB
MD5e5a83a5c4fd6b3742cb1bdd4504e115d
SHA1d538fddf3227eb990bb713ea251661d6c9b75938
SHA256b90abdce3910b2be736a67db788444b0131e6116e8894258b52d0102cac65b18
SHA512e24ab7578dd045451ff68400405e6361d28fb1a12175bd0c3afe2ffb3520559be3879cbafb955ed6916939b6023aed167d75a775567cfa152d2d64563543515a
-
Filesize
632KB
MD587301407b8c71c9c44acb0440fbffad5
SHA1d8c52cadd229765f4c86e06185c813c34bbfcf8d
SHA2564cad76f0400499a3c4d0d7ecdb6e3006e33501f490059751b46ca6e06383e685
SHA512e5b83565267fa32081f2de632d68c9a1baab6af82107bded737d6e7bdd7e245a645e7e83a5e419afd80d8041bffc2b1f2222c0fcd43e757707e4df274279d51d
-
Filesize
884B
MD5686acba2c190cd0f636b355d21bf2745
SHA17a49dfe621466ec1dba5f023da8d7be2448581de
SHA256d6bdeab505a66b9c5b11ceffab89a986287979571effd59846734a475358a8d4
SHA51241e01b7cffa9c089d90df9b6e86b45f25925736f694ca39064830595eeca030b9010c1b429dbc8cf4062b73d6cf3bd182a1dc1e115928e2958005279c5b62bea
-
Filesize
168KB
MD53eb98cff1c242167df5fdbc6441ce3c5
SHA1730b27a1c92e8df1e60db5a6fc69ea1b24f68a69
SHA2566d8d5a244bb5a23c95653853fec3d04d2bdd2df5cff8cffb9848bddeb6adb081
SHA512f42be2a52d97fd1db2ed5a1a1a81a186a0aab41204980a103df33a4190632ba03f3cbb88fcea8da7ed9a5e15f60732d49a924b025fe6d3e623195ec1d37dfb35