Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
33bfb064ad879053f687dea598fc877f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
33bfb064ad879053f687dea598fc877f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
33bfb064ad879053f687dea598fc877f_JaffaCakes118.html
-
Size
94KB
-
MD5
33bfb064ad879053f687dea598fc877f
-
SHA1
84a8bb8b2df77f49f3864358c2959163a260246c
-
SHA256
8c6b57d69d9e4992cd39d7a7651dc58bf9581804ea6bec60d0e9e370d4216ac2
-
SHA512
3d6f6263ea5ff3a754cd26f0829e17ea89e62963806d08d083439a990a9cf19e231eb0c50329319b9a848bf3d8aa623e5d6f7861e2496ed7c26a2796afcb2674
-
SSDEEP
1536:WMLiNVlSFLwh8oxffaU7L/k6UrNRzECNyvDZd3gBdkrY8mgHC+qpEyW:WAiXpwBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000788c6f855233716d9519ab8295a9f3c37dec1ebb66ce35d81edf3456bcac3a62000000000e800000000200002000000012f23af7c71d2affe2f1dbe6e89f89272da54ca084bf169d67c3bcf054670ff72000000000edd75d2c4a5d898f41f7cc3af993f9becdd2d107e7f752455784716c7c55474000000082bb4bde3ce6d913e44ebf464a9f6fb482b5cc8416bec20f4a68b1c0effebcaaaadfe0f39ec45eada71658ca7a3e45b6e26ec6672b22fd70337bcf2796467da2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606f587d80a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A706DFE1-0F73-11EF-9960-CAFA5A0A62FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421579356" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2744 2172 iexplore.exe 28 PID 2172 wrote to memory of 2744 2172 iexplore.exe 28 PID 2172 wrote to memory of 2744 2172 iexplore.exe 28 PID 2172 wrote to memory of 2744 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\33bfb064ad879053f687dea598fc877f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571c0910b1f67b4209fffe98c2cf9fd87
SHA13c677ee566ef65495979db876383732761f0c165
SHA25659aa7ce1d0f21ac58b0fb7c4c40fca4c011e034d9d7ad1f745637bad7174aa06
SHA512da26422414af66f04d23a4df1e8dfa8ec16d3bbeac3737312c391d58237efc30d412730d516146953cd2a653a191681c21c846d3898673856decdbf5e6150277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6614c4a4d7caacfed40952381db8891
SHA1010c2eae3998b764f3af91732bd2a151afd81372
SHA256e78e623e5cea095eeb336def2c4b19b5e818dd494e2614d4a5dd813d455fcdad
SHA5127856d9fa8977e1d87085a4de44086a4316fc46b776a0e27ed9db6be005cb323f2ea79d9668b6f40cac7ebcd92aa1b8856e3684cee33ececd85bb18819a591e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eea9e08b0f200e9af5b5c2871f2df981
SHA1eb6290ecc78257c8bd9081594c391110aafb5b3d
SHA256b6a1c4c99ab0a1571656ffaee0beeef316e18b6e22ea54391b2d2dabc3708372
SHA5124dbb89017760c32f4b3b78b3f88f35af83b14f2cf9ed388a4dc3514ff9640c8bcdd12ff01ca4c0bb425f285c045ba9c69c0c561a84b91a0cb9f12650d179ff6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545fd484198cf0212c9bc3c142056d851
SHA139ea356f65ffcde88b25b7e5f23801a5e437dec8
SHA2565b2282ff5ad99c61c48c30fe79b021949261bcc62384dd104d0feaaf14e02ddd
SHA51209b060fa8278fd03e4302ce846fa1ef42cf5ea2460902ed27821d52aa7a6b222795a5e62235aba6ba2f4f9b874af1e5cb18e731916cbe85b45980529ee624bb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572c4ab98d2ed7bf1fd586fcc0d54de64
SHA1ec38bb51137172ab9ecee31410255658795e0d66
SHA256daca50fc01063943d98c48f5ff3a886a07882d338b927a0b4dac2b5e61c046e4
SHA512b961b0f0a8be1c7f996b6f95a297495004492dea1db9047bfa250c0f45bab9c574e754a0675d283bdd89edfae133eab819d209df2a9f91602c7c6a5debb8b9fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dfc310f664d1a92e7ffadbffd78d0c0
SHA1f2d909bf328d4fd9ab13bb15160349eaefd36dbf
SHA2560513123997cbb155d64f40093d91603eec5640d2992749a25373665fec594f2d
SHA5128b88cfaef7b67ee560092f93ee16207f53e9bbf7496470865dee4390811d6cacdab1b0115983b9697c80c6d889e8acc559fab03353ac7e29976c27b2265daf1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5feac5fcaf1516ed387aa25717a64b492
SHA1a9abc4c4e9419ead3bb0faec40db30cd7b05e5b1
SHA256cfe1780b39c2f620a80638a4af5ed5adacf40bf603d6c628f563450cf25236d0
SHA512a98c0197ba5cfb49322938f3cfd3ad09743e5105f13621f1f1e66fcf93a41889fa4ae7af10c7eba3b4296f5385844bbb49451f2e572c9db554aed011d4f350a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5230be16adfa9d0364a66ae30262f4a3c
SHA1f76399f8853438059fa100b9cdb014bf2d74f9d9
SHA25668acc2005f85c3f55c57a9755927b47a3843484c0e3d491252dcc761bacde0cf
SHA51220cf8273f4ce6389ea5bfaca01d50dbfc1e72a06cc46087f5e8ff6c131602688fd02708fded850e0cef8cc4d93aba2e92a2a4246952d0ccbef62df56baecd979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528cb4ff254a0242e12b7bc3652dc8759
SHA1017a625f692554fb8cbefda9367de690329e9e6c
SHA2567c6ca8ee25699b330530bff100e5ce3a86678b36cc0f2cebc4b7af59a2a8d270
SHA5126c30a4dea0c40616515bbd02a6bc26b270aace4888305aa3e8cde9dd9c69e93594d3983d5121353dac9bb1e779f3c19e75acce6c8228f9cc3b08a45c4726d834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed557a40680221aa9bb958828057144f
SHA181bd250fb2dc50cc16b905d9e66269b10544f726
SHA2566b71f6c1ad25427ede91d8b696ba14cb03de8bb403b392b91ef381e71347de30
SHA5129f188daefd3152dc209d7db9b71f4e7c2ef00fdbebbb7be0f6937d4b167b1e6b158f4c21662e78cb7872ff83531be6820eace6328d78386cf49430f7130dbc75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f721533e164e88a62166b3087637def7
SHA175f56ce6c855a7af15b22284f7bde288d4f1ccfc
SHA256bfdb77c2d4e2876629096e0fe685485d920d6a738e0459192514fdeb61c3e422
SHA51281eb2ec0dcba64510b96af877a5d3f8f15e3797acb25f968f453718af20ca3189aea056f36a64e29ed943437c331f2ccd7ba2772aac990fae42ef531e8331b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f9e0979d711b6de02c4d202441a7541
SHA1c44d80447b253937e3cbfa34a7dfa08eb33a8952
SHA256f8c088e84b09cc461a1ed37c8dd7905c4a9bce42d0118933971e291221e5963e
SHA51245a6fbee7210d4231a4af2d2ab529ff498250cd2cce58a2d39938f9747e9fceb5d1613ecc1088da0c577da8f20070b0f6b8d70bbb7a0620da273e1edbbcea47e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56326a2e47ccc6a55684bb7ff19913334
SHA1d9b063f35634d2745dd9519d2030d6e3ced8f7b0
SHA2568067a4946d831e2d9f6824cfa0345b6c160c8dcc764c51fbda65f1fa99ce418c
SHA51216fa430df92470961fa50ad2e7820e460b3aa2014abe0a89a70c008d94f00eadf8b7854579d060ccbf9a54fd35ded808b268ef88f0e492682ea57e952eb6f2bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5d13ba7a9870d13fd65ba1b623ec947
SHA16aa8601ac01399164951fdff573868a1f0707ae0
SHA2565bed572decde0b54158081452250d57dee48c1eeec2767850b2750522a637af3
SHA512752d571abe2a1319faa33201256a56646ae205213d0df9372bfdeabcf863cafaa13945ac87e7477d8ad3d17699f112d074ffb9a83a26bdb6ac886a00b518dd7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a73960f22959017314a229e9620bf8e2
SHA181fcdf055709ef89d15f2f4b26dcc7aedf5a770c
SHA256dfbf060263d729c596ab7f7c077f1a250e5f662aeb9da79f23a33fe17d6e1acf
SHA512f1e3fabe923a1896fbad9ee1df0c7032617ef830c49589bd699029f8a0c2474f7f5af01c4072c9fd7b87e2114964be43d8b905a4160059775ccdaf9e211ae7b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5955bc9052354cc79e961c9474a84604a
SHA18a922b1df9a47c326f52ab6e73a6f10b467c359d
SHA256d0f513815e8351871b58c876826748055ce888b3c58c11a427aa3d950e829704
SHA512363ca61b8ed48bb6ab0b2ca919ce48a78766431e7a303849858997cb781d9aedad945c5d9edcf0486d9f0940b4a4b8f34eb7dd43bcea030ba9e3cd04b0945c93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcc509282b6a80df8a62fb3f55ebbba3
SHA19def31ddcb148f34e1cf328fe58d65a90a457d37
SHA256a3ac957ec02da8e89cd9c57f23e294d9f6e21b32c9b20ff356482dae0feffb6b
SHA5123b727068b450fd8580fb441e9680d64b45d59ccf6e9fdeb18623a631038abe80caf8bd67e076dd1558377600ad70313f0f4d577f52b64765b01ff6c8bc36ba92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3b0d0d1cd8a010fb3843d700ce9f7a7
SHA1a175070fbe88c21097985dc75a37540a2e5bfaab
SHA2561b2b53742bcbf36c00852dc41752f4c35bb77ba5fbcef73f5d5ede0af2a40a72
SHA512c9017aa8c9eed581d0e6c443972e5c24aa5298059bff9af1e94de6622e4bf6f6683d9a5d936a0a4d30df69c97ad370144f80ba2d90015f302a4aa74cc5d02c7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f7461555ee079ea10c90333ec1a7caf
SHA1db73009ee3ce6e0b15d9e053ad649bed68d6047c
SHA256ca43c160eb694bba09e18b29b442c9503e81d50668490fb6d13f379b8df3d266
SHA512b7e3c33a84a076bee96b75e3b74d861fb53817fe28509e8019176454ea178d5bb3ca9b8035e2dcb758d5c25ca8e59aeadbfa67c44eef554e66cdbc4287cb5357
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\fonts[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a