Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 12:19
Static task
static1
Behavioral task
behavioral1
Sample
348e5871ad399e3ce57992c43a6bfaf4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
348e5871ad399e3ce57992c43a6bfaf4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
348e5871ad399e3ce57992c43a6bfaf4_JaffaCakes118.html
-
Size
29KB
-
MD5
348e5871ad399e3ce57992c43a6bfaf4
-
SHA1
9c76fbf3bbbaa639fd2917fbcc4b05ce8145c201
-
SHA256
8ce0002e8e648995afb98b61695a5f6b585e03e46abe600d27e21424cc9d795b
-
SHA512
2e4743dccd79b53fa048cf079c9cd7649da069a3d35561892517b83d2e9260f06b8907fe085ea0f6dbf152e38e67d93f970329ffc453234d04bdcd4d4810d067
-
SSDEEP
768:a1eT7VhL3BjI6CNL+um7LvYxr3jIRVhApoEimED2VzfyxApsnobGR0MG7xsEqFEc:a1eT7VhL3BjI6YxrTqooEimED2Vzfyxl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000335ba895c1cad1a6b1396f0b6f053bdfa6615d0ca3eebf836552e42d4c65b1c4000000000e8000000002000020000000be60f439c5857364e20803761b0eed10b42117a43f5406951092ac01f4b436ec90000000fcb8879865a114fcf5c9fbdf755809c4e1b194cbb64ab91c06033aaf177e3b2906e0e707d3422040832e84d91610977020b9b63d446308230aeec1c9f951377fe9a384965178ca0b41bd889b02f3d6aa60382841abaf4ccf8325448da8afb3feaba1bc3855531b20f9e2fa4742ba3a11eba3ec741c7278aa873b95850361103c7b7cc35f44045c8798eb0cdaa3c45414400000004ae3250bdfbbf61c902a1138068b67c10983c559e40d8f734067db7907af6be9370e7e3c5fbf8b123f3ea601564c8e8ebaeb5673c8a16e3d76e9ac2e361adcda iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000008614615d363ee765c1a9f80cb2bbaf9eb8b2d7f41acdf7c937c53e53a4290d8000000000e8000000002000020000000a05dbd21a74612126e6c6614e5f207e403016ba6446e9fe6c1ea3afe279bc5e3200000005f82239c68286028da29449764da4289f8139142399a6dfe4aaa08d1fb90372940000000fd1bb148714b7a0be391c43a1e25f759e665695798cbea7e6a33ec1c38527a4840d4eeeeb38728eeeb6e97956b7e1a5644d8726577c722146259d8aed4e0f0c5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421591848" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BDA48DC1-0F90-11EF-B6D8-6A387CD8C53E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60c39a929da3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 1208 IEXPLORE.EXE 1208 IEXPLORE.EXE 1208 IEXPLORE.EXE 1208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1208 2232 iexplore.exe 28 PID 2232 wrote to memory of 1208 2232 iexplore.exe 28 PID 2232 wrote to memory of 1208 2232 iexplore.exe 28 PID 2232 wrote to memory of 1208 2232 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\348e5871ad399e3ce57992c43a6bfaf4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527c48ccc9d25d4014afea314fe9452f5
SHA1a53f68d6e283322135bf746334fe5305a8b7c1dc
SHA25614b66aa7e0a4f517ed23584254a8d3a5978e4e929e52cceedbb2048788a9d4f3
SHA5126d2c39771da98694f12e0da82ec14c00e840b1be7f7f4a62dcafe66da2a96d114b4ef52947d53688d6bd3783ed5d36afe479826806e05d871d53deacb3c010b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599c1b3120a8ad70cc830a0e15de51bbd
SHA1586423559ba63dd0f98871a95945c6e3cfcd1089
SHA256322f049ac75ce2ba8eb1ef20566788c77d42f3ab3bee4ba8f8afe76dfc186c85
SHA51273a7baf71be3b2f27ffbc4249dab5ef4789f4b54c2d47e3a940899e72458764a94ef79eae2a9d967595d25d7ca7b3de73990c165e99d7f6acf3d23850c5f8f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573d60c9882583177eac772ef04cf7cc4
SHA13c91ef7179453fdbe618fd54cbdbb1c80eee71da
SHA256a3d13ec6ed9ddaab22a7d458541df095ce66092c6370c266267e353c57b6ac1a
SHA512de72b659502795d1aecf2edd0b91501ec5fa20e156ee3c6824f4027b0992412c5fad1a243374714a55da333801da5b71840b00806d59b84af297c3b0c746293f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509fc0266137e0082e140659918d1fac9
SHA1d68daa766028db9852381e8dba7fb01a54adac7b
SHA2566f8c2092cda510068b8b7a482f1af8140549a4479b0833b2ea4a82d7b1ae4ff1
SHA512666692e53a422df0e7c5c26442480d8ce6d7ff8567e2baf6067b69d5b738adce00804669becb73303236fb5e2252d07bb8e8aa237ac78b1002a15f5d9e4166cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed66d2c92094624c3b7ae1d58ec5ed7c
SHA1744b889eea9c3583d37e581ba4f5021dbf9d241c
SHA256e2d5769e10bd7c2a321b87ca4547ebb9b3975fab6f23cf83051588c2cec25f3e
SHA512de14acec0edd7b510623cef4c60cff9bfb0368296bf2d34eed806ce9f766ea098db60f1ee738b73a20d80de4b4d796e7705c7917fe14adb72b1c7f1adb83c756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5453e9a605f0039cf728dea95a7b8b460
SHA152afb2f3a137451e065f5953286874a7a5f91db0
SHA25621f3ba44bc344a033f65998c2ae12fbd0b5287752805f750960ffec3e7b7748a
SHA51272cbe195cfbe59c4cf3013dfdbfa2f7237a5abd6fdd33ec1465d0534ecd2c42810382a70703ecc27c9dde4d376f1447159213ccf6bedfc6a3c84cd8d05442aea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d64257b9d54b47f6b7411ccd3a5fa4a5
SHA1a948061aafc0b0023e3f9cb1c91cd2a64e9eea2e
SHA256da65e020faf81b96a5f81267a6f108691631339910fcd5dba0470473e0527934
SHA5125a90d6f88977b23a0f6df51ed960651b5b88d3470c9abae525bf11fcb61c9ec3fbf55b74ddf79d6d0d81d0a6da1482b81dbeb0d74623942b5b23ddcdb4edad3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b403e3e2a5c159c5ace843d8e579a9d9
SHA1c2df54be6155523b9ce71888d6b6e3255a6476bf
SHA25613ce190db3963727dd4634b5359e6ee3aff8cf0e7014f28983eb19ee20e00713
SHA5125dc400020517139595505a393ec3d62a906cf24f602203f1a27a892c2b4d014554758a58e86174ba3481272186271139b8e183c0874fb9b6f055aad82e2c845e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5936ee60f807021d93861af5ffeaa6bac
SHA171d9580117e14830774b6e2eeef35db58ba3145a
SHA25604b8078b407a683be3ce8720cf955bf3f6e75e224b92c915d0be8d1067968f96
SHA5129ba401c4f0e8dd119ea304ff9074cab95c81b0b6827e7ed8c07f936f2260409d2da207995b46078878e73d8bbb14022d4a59bb1f94d8441167579795cac6025f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541584f202d41f21b80dd278377916559
SHA196fa65734e89525e240a840d042499b102022cde
SHA2569b58334fcaf18d9203f4930920ca7a6ed4724dc9119f364b659278ff93cb25db
SHA51283f0ed4a4a523ca1e51a429d0c2d16b5dde40bb1f13d98124d40742e17cd9ec58985599e86f2b15f317919473b14571e6d0a60ef48c2a064cb56d47e2d1de29f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575655a70e579a10c290535a19c5729ed
SHA11f14c1643b42e1719a4f98e714adfd6a18a4e053
SHA25688c3e104523c25262d02dfcbce16099417709acb88c1a205d7f663781aefe338
SHA5128c50b74fdde0622767724de17163be6cf7106662ca39e1ba64d2b703570bbfb1af83073402d02651e4dfac7dbb6bd5b8cc15c3bc2863fc4f66ed855ce4bcc382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b43744cda5184adadf6972270619852
SHA1e70577fb950036457f89afa1ed40ba2c7ba20009
SHA256f8942c816428b2c3bde3657a26484ebcee435bba4e2372e8968b540f96788d84
SHA512e176c07172c2806b5555ae9c402f1299d79ccb0b3a270e98bbcea2d9c81b08f750cf4d22c588ef4a0bdaf452ad2a82703d55d55f312a6e9877222faffc620b45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5742efb2afde98d60dc4e2263efa97904
SHA13ef2c8d81d224124feb1653dc884a3c5f32ee698
SHA2568c27fa7dd3e9ac5b35e1897d8308052273389b38f505945b27b5c3429ff6b67f
SHA5122fda7de39486ad52767693f1409d61f0b8d9d6a1f268de06ba4aa3c1a1451cea8d2df8fbde78763690a35fbc34ec11b981c0cc1916548c3fbbf8049c870385fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcb27b80032a741d0e9fb52203dcaeda
SHA1892e077ba40a7d2c6ef1bcc4be425943faf00f90
SHA256d6576d146445d321e2d4d8070893d5a3791da6612aba3c05d269ade21c31e536
SHA51238e121685da4b6128bae2f17ef5d28a013dbbcb01a0c8f966c4f3ff780606ccf2d7c4de311cdb64af468d35451c8c6716eee8a6cc5ddbc23ac489f78283843be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559313cd1c7e962da38d076490bde3dcd
SHA18c8b6e42aecef7be4af1764c28e97fc0ac5a8d40
SHA25665cc1814802c13f686f46c04238df7c79f4389d384923b6af080e6262fd9d9d4
SHA512bcb84457e9586450f178b34786481485be342c8dd15893278c5bf60061ff3355922777025293f96398d2f5af2ba0c1f75fcbf069272baee7ba8238fd5b918153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524c4c845d7af2c8e6d6cab6cdc51e517
SHA1bd4c1944ccff72a3ad861d2fe2e0f645d9dfb03b
SHA256944a0c4ad8e79f0f4e9d7e1f0bdcdec4abab6581bf5233585040b0b04c0709d5
SHA5120675b5629bbba734cb83285f3e32775dc109e6ee6d643a8a441f311c34f0612bc8777ebcef4658aefb2ee0249dfa7e2030943ec45bb2613ee77fe1ea00c6d132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c4707d8ca87537ec00086897be95d69
SHA15b1cc318db13443ab4baa9e703c3380bece348e9
SHA256f430a9d7a4650cdb9e0fe6ebf635aac945bc286cab9cfd9cfcb513670199f5de
SHA512fbe10bca810202596032970c8804d144baca8efe5631d88d2160b499be083738f047a7d7fa4e6281ce8cb2fc0e87d6caffa6b444319eb3949bbcf3879d5c938a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b570a0c101c6a6ee0319aa302757fe6
SHA1f0d843effbbd6c7e1462dce618a2f246107d07fe
SHA256136e1e2a75add3992c5e72d9c999136bfae9c55f9ec3feff890b9d9f11ca56d2
SHA512b3928e54a1c562c847c97d693800fdea1ee3cd93775e5ff5ceacd256358703a9a3e1dc9f934acf1c400bf478d596824001b54f4a9cf1d194be5b3a626a57ddfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511c8b43dd0c4d653b542400093ded137
SHA18508703af6b542fac970194d5183da305e7ce7fe
SHA256f1113bc07eb7d0edddfc95dd56ce40411b211535321de5f766e036c942a9a5e3
SHA5129199337c50dd52cb8adbb9e5903aacaf9a3ec4d08365930a4f86d4364d1ef51e7a9778885dc6a4891c61142184c8aafea87bf4bb35fa2173618a7dbf86d30335
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a