Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
5e0723dcdc7a1558c61323879b88b763_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5e0723dcdc7a1558c61323879b88b763_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5e0723dcdc7a1558c61323879b88b763_JaffaCakes118.html
-
Size
52KB
-
MD5
5e0723dcdc7a1558c61323879b88b763
-
SHA1
c87cd8c26c74b2d3d18c2acbbed3ff7cac8642c0
-
SHA256
09c32d9a08f5ed82b59f0cc95ea2e5306dbc671812eae41bf00455504b904aa3
-
SHA512
20d0535ac4096be7ce972bd19675194637a07bc669b40eab2a5bb14361d22bfef972858327e1c8ebb418c15f78e6f2b4cf01ce18ac74f92fb6122707db93e01c
-
SSDEEP
768:NZFY6Lv/KpyfCQQY4aPGcZy676RGy2a/G:9Y8v/KpyfCQQY4aPGcZyoWGy2a+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000009ec1074edcf9a929e519b4e9ac6d20a08f687d6ebb27d491c7e7fa582b2e4772000000000e8000000002000020000000c8a33592c51c51cd2b1c2a6514256f0e63e67bf78d5bd4fb60de3138b711def02000000023a107723dd6eb4ba6362fb4048ba7bac3a378d35ba10a54676554042d7a98a940000000b3c972955b7a5f44779e3c1566667d3d5ee00a8daec341bb1d027373a08407d786dc93e2edbfe7fcd616fc830feaec8756988b1e8c9021983268bb9bcf685d11 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c479218daada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4CE82551-1680-11EF-9F9F-D600F8F2BB08} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422354444" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2600 2172 iexplore.exe 28 PID 2172 wrote to memory of 2600 2172 iexplore.exe 28 PID 2172 wrote to memory of 2600 2172 iexplore.exe 28 PID 2172 wrote to memory of 2600 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5e0723dcdc7a1558c61323879b88b763_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58813c2d3115dff3d633b7ec1bdbee73b
SHA16b6d67a9c9fdbd04b9d1f9765e22565d61b503a5
SHA256cc700b75165db7a82a9f6dbc426c8fe64b5a73563f82fc1b70b3aea79257d39e
SHA5120f0bf31419a8ced68bb22c3d9d418a56abc1e9883bc37aa5c8f7db08d261a377ab23e340e858613f7bd0e92c0d516098d6f12e192cf380253f8f6e57d557ce02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b07c271790550e43ca40e803895d8dc1
SHA119f6b6eee2d316dd041029f7aecc329747eb7b6c
SHA256cb2762c51e57667fd924dc70918069a5b1fb6159131e10138d8218ec5aa02871
SHA512decf73e0d894f05ad90301e58743515315f237881ae66e9abd357f316e110b4194af979af7ce4a4ce3c851504e2952440ff28e14790612a9068931d5f28f0735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5014cb36efc4ed1bda265d8b234a87497
SHA1783558d7998b806ff67b8b9e3c1c7e71e948d7fd
SHA256f03ac002d810525d740ed8d716a478a85d33fc61fed341eb205c9199745f53f3
SHA51260ff585ad6f629fa75d6b2bdbb0b9c1032186272049cc35939dc479312da7c07425f576340eb52951c03a7c63a84873bf62ec4126bda5ae6adcd9b2773e3f865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bde2c06562c8322c41a03628839d53c3
SHA169f4913eef742970ac40b56f83698a5fcf89c70b
SHA25675f05edb63822671ad2ee9f6fb523a4ad55acf0e9b979ae2b7935f74c123366f
SHA5123d1648a27cdd0d42e7f180f9a0c9dd7a54e3e893dba99572a58176ae9a99edd2eda74ace0739d833c7d832ea8f5015f3dfaf77e98c19cec7df22452356a5a3c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52aae6d419c510542882496727cb12f17
SHA1eaaf048ae920cdebf80131c8df68a5b26ef43188
SHA2565887893330e6856b7e2389bb2fbafab0922cb67ee12fe6d4db5edf562974fe65
SHA5123129201c0122b0eef0972afed9d53797c37e29ce78c4b5a39a1281986151a99380b364f5db3d6f458ca018c44c930783f4dae2eda37c9219aef0390b271320a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570f3b30e514aa163c03d3870c0ea31b5
SHA12bd477921b42963fef27c853de163e2cb55861e1
SHA2569c362219fba127a617a7c4d65e3bce65556fa0a9d271b0b1b4213d157b1c92f6
SHA512e8e0a3560ce41430f7678742b5bab5dca821d33fb7362cb9554b705126044bf83e5148a8438b46a5abd65277a929c3024da24178e3cf68b3392d3b339b63283c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff09e574d62a6da33c50cba3a1cf437b
SHA1a54b42900b64bb7d5ec8adc3121681ae78029193
SHA2560319c41bb1668ef622202168620ce1a185a5ba505295031a7c61f341ca843ac7
SHA512dd4302575cecfb26078555797556648cef1882fb301db6f44d2cf6965cf310811e4d1a9f2043fc5d5775c497fc91c3bd6b1f70228058f75f77488ee35518ae4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a9c8e74e54ba75739c1b7688ed1495e
SHA1fca28d9f02cf23dcbd835fecc12ab112a315fd40
SHA25640b6a60086cc5dc16a2ad7e815e50ce1f10a9597b958dc1ef5ac5745e9cd0d59
SHA5120068810fd9e826dc33604f95d7a37d88736a0772b0a2a74e3a19a0ea52d5aba3cbacda30dc1bb53d59ce72847c2bdc98b023d62b3f92e8387eff676fbcfeb090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5762c093e3718176ffca629182f207a5a
SHA18543f93c67fec8ab1c3b11c4168be3acfbd9cd29
SHA256b503d736b06f381db6f684c283ce14af22cd82a3682fbccf12d9cbd85b723e2b
SHA51271f8fbf4a2ea17fb2ed9a3291e784a87049dc938d2d5965dd4fdc42da1fa124731b08c0300f3e8d712742c901bbcecdd177c6b2ed157a71a2d1276f601cc0852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543fdbec007713c29aa30940ea1e18b70
SHA17615c663b838320893534021624a624738b8b6b6
SHA25693202ee850ea6f5d0434627ef5cce6c45e41c24ac8c730f427da8ddd921aa32f
SHA5124048c531f9207f62ab9c1c4974c7b0f6dcfe86cab0d000d374b397c50421c4597e8d5dd1d0be0ba82da529c671d917150e92fe5e0fa4728330ae9f5cbc6d94c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578e2a11308fc74a42e6bae347e0c33ff
SHA1eb351bed62d482b04f787b1ae2520989b667572e
SHA256180fde8691c015def62da83a8b391626923d8b996e3463d3e43e6997000947a5
SHA51214e93a648add56ab65e118b451cf79f10772741b23f370eec6b7d9da5288a21ff4015dbbb25e3e9e3ac8058a7c95f36d9617142f5987a61ef858d22c9a3a170d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9c4e7a2cc22f28e2f1bd9839ee5bef1
SHA19addbfe33792dd75a08932fdfe700460315b924c
SHA2561d05786f35c33ef31328b233ff6f0a5377e1a88f5322088a456934731fec6614
SHA5125ff37c763821549335e5817b2e0c9a8e631e8f66df81a157ca2a4371c5cdb82c6f58eed123504585681c7d65e914f587b2cc2edccd29ac54644097ae3c44b715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dff75d9dce02634f03cc45736b3c503
SHA106f0c92252cb43dd49c8f6b804c9ffac7aa23c89
SHA256ef43f6ce04a1f42e1a60b294924ed61bb504ea2398003d69e05dd95562010f97
SHA512706d44455256d8fe11adc2ab5d2a9f86580541b290775eb898f873b1f4a1ac8659a48fadd876f8d8e45881a9175aef4b180298bc9aa6a40c66530f79b02ee4fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2189ee798da674ca0fee91e1a9cd02b
SHA16c49616108880b923a396cd9bdfd880b5889cad8
SHA2563e83903742b56650368a84ce1872adeb46d8392364abf42e379d98ac78858fdd
SHA512ed2678f1d3ed66d7c02d38a1e5bedb1739f4ba37481ba3163a47ab2c87501eb0c986444fecff74c9f67f109b22856548928d40a70b912ab0ae6d61dfd7a10b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52032159f883fa468c721bb766e87e953
SHA1df1da0bc485c83dfb2663e5aae094c5c951628f3
SHA2560492c4ad7aa80d9dc2f7d8f93eed2bc89f179512537a99dc96fce51ffa67b912
SHA5129bce8e021556b0b86005208aad7913f9c628b26c46504a00022d33569a90f07dbb6535df403eba5660ec3e6089a17e7a5ce9371f86565ef5df5664a7f6e129fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55517227eb7b375e75232a199e1586442
SHA16cf2d3de437b4eef9d88364cdca57b9b9f38cc81
SHA256fc9e4c740a1fdc22df624b89a2fbe648ae3839ee865bb4d1efd8ce18bae43212
SHA51249d8695dd47148daeb73799e27ab849ebda43cff08c4b44de6b59bb03d47e979dc39b8c27eb1281173003d7858f349d97162a27193a3473c92858add888b1471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f3466fa493ecedf0aa472dc841cb4f5
SHA124245fb141552ff643e82d0e315debe30ed42a43
SHA256ff4a4e265094fd461131aefaa466b72990e7d8ce0363d80604a4219afc6664ba
SHA5121c8327c80bb3e86cb7393e428711f849b5f471334dda012e566886a2dc0edcb7d5fedce999ed24310bc1f5832c393eec0397f04229d103350b94f6acd517ae76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c15a50625d4d2807288884a067656492
SHA112697a73ebcd738b9fb64297b69f05ba46bdbdbe
SHA25669cc229524539e23ad8261820a4dc6f0b5811f318e700089c1071f1d67d4cff4
SHA512bd84eb4170ece88e2c788906cab590cc8a7b0f21a20b0eae027c7c78d131ee1b303a6251fa60607c6b4b999459b1c3093a6f4ad2af9adb9da1622f5ab1058040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5740fb605865c76697e764511fdde7be0
SHA17f143b957efa389770d99b9f84e2b27b8ca187ef
SHA25680853eaa424a392a23fcff757dc48aafbc3709e29d5694b82c6b3ccc4a5aa92b
SHA512912e6780208846da2d6e706714fd3e8fa4e0dca2e11c051339728c6047e4a063641e7e802c5a53dc86d3a7f3aaa68e3f2ffadca2942ee7e5ed59548cd4caed18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f04483e9ff8f8421d271172014cab6c
SHA1370de6aae7557175b1d824e28faff38f830e6464
SHA256aeb1fe0f6f4cf030b84b9e10c481e3073af8cdcb002a3dd5f99d349324e552b3
SHA512ad6a14325f18b58889b112244d68f32f4517d033dad150580854e9572fca2dcf42d9d6db8993256bf779e230343a3a5b41530f6cfa9f88b3c7e16d025e37640a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59efec5a3659be69467812b1cb789e73e
SHA1623de66692cf20bf6c8923a1586ef0e6ae7092ff
SHA256d4e76fab867a6e532d928dd41e6857fa3adfd20d8a49818ea16a31aa01191945
SHA51290dc47acbacb788ebff53898b618a226f6ce9dd149e4a287b2fd025a53839f8253b2af520aa94fea7ce51f983867cb9db32b5529b13864546db0a6cf34c32010
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a