Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:06
Static task
static1
Behavioral task
behavioral1
Sample
68cc8d008f2135a013c11dd8611abf68_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68cc8d008f2135a013c11dd8611abf68_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68cc8d008f2135a013c11dd8611abf68_JaffaCakes118.html
-
Size
78KB
-
MD5
68cc8d008f2135a013c11dd8611abf68
-
SHA1
50900f1c5a652c187ff554dc8cba615faf4ce2cf
-
SHA256
9c6b5f86fdfbd0daca190b8e7d0ce94c8de880c8e4247aca105a0b16f7092a4d
-
SHA512
c2cdcce57d92aa35cee49a097019eb8ddf0db7d95b3446b13a0053ff771afbe889e557c21c1d0f214a2a5cccb83625138c56a915eac232aa98e40f933760f65d
-
SSDEEP
1536:qL/w3eVMf/stMf/ESuqIL16/pXSRUSgyFvTzrrBNWSfE:e/ij9IIRfSBFbzrrPWUE
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B7B81B1-1887-11EF-8962-7678A7DAE141} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422577431" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000c44c17236852d43c502c65a2a46172ad0bb6b8b4655f656b88a85e3fb4ab4d7b000000000e80000000020000200000004526963d932ca777d8c8d4986302853cae0837ac3333e2d14a22ebed9d3aeb5e900000009840bced516b424bfb1c21d23ecf00ee41e9fe62ffd21affeddc46cf6b4fd26d21b8920efca4f16d592c6446e22256ff2cd909e397b3ee0367d143a9be9c28949b9193bf7eafd951d605f1d7f00bca4dc969ada3ec6d1fcde7100be4f8be42bc169a47a8ed611950cac13c4b9420b22bce51b27a1cd67b9be2053701ed1cd007831399493c033213852ce441ff66e1a040000000a83f7359673b36f74740bc3ba6889f34ee25bf6cfca74e53f46d8bb6232df2bf4072517b7ad16b4648c11b57b55c448aca57d4c41bc4869cb04409fc2659e8ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000546a4e83721697ae09456fe3559cb05b57eca26951053dbfeb5859150cf63962000000000e8000000002000020000000c5132c7eeb7ff487f383d6de77106f2f467cf3f38c5382d42924ef4a17f39c8c20000000800c607b7f91ec5e37789794c05a4e41f7a73c658765e038568674bd5ff61da340000000c5227a030ccbe0c3354f79f711450c7a148d63221956a3fa4c033931ff9a08f15bad5e17e85a87a22e17934769558bffef744b9da471744dad4b1c4ecdbf99e3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 502b355094acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2400 iexplore.exe 2400 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2400 wrote to memory of 2604 2400 iexplore.exe IEXPLORE.EXE PID 2400 wrote to memory of 2604 2400 iexplore.exe IEXPLORE.EXE PID 2400 wrote to memory of 2604 2400 iexplore.exe IEXPLORE.EXE PID 2400 wrote to memory of 2604 2400 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68cc8d008f2135a013c11dd8611abf68_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580be9b9dfbe87943273545777d72f22e
SHA1dd93c700b206c3208b535bbf9794ddc504ef1bed
SHA256947300764760d722865f47229c30db21ec8a5aec1b7edfa13478569404d91d73
SHA512131adec97dcf36cb32a6f6f042f21128282d2476bfd4a78cec7b1888c9076d662ce7f1d9e707e1ca0c975cf92957da2f8284bb8acde5ed2b61d60fe2f2fdb8ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd2a7045e08cd51697706827296ce245
SHA14393468d11fa9ffa424e36bddd55abce46469c59
SHA25617b78a7d5644b90911f277aa1c8ba460d27f73a4a24f6c01a7fd94dee8993f42
SHA51241962dd1067a8543e38c08d5d83353aa5e37245d1c42001859ed034d816e902518851aaea96d2b161c537d9086f10484f987fea3ed3732f93e7e504d2c464254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ccfc9f1ea8531175d9c445f79b7d6fe
SHA1d915154875f26ad4d46e29b2ec4c80faa8490c9a
SHA256d4109fdc6d5b0fa4fd81483a941e7869b709d9b8f017779d94b241ad86884382
SHA51250d3531e912f4c4930fcf200422aa0f016871b5d4c9a292044dc77f81f92d2491a4f6a8bf6ecafdb4b70b85233e09b8d759837ec873bde2da21188e8f731911a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bb5d354cf8197991baf8026af15bc1b
SHA1f7990bc0afef653e62c12ebdbb6afbf6bb00a420
SHA25632a52b325faad91bc56c590289ab060b1be84e84cdc604b65f2f9e397067d471
SHA512a4e8cf661764694f14a07d0c9398350b100b2b91721486a6f5fa0b29e85b39d0fd0800e923e71c014223e46100bb49bfc419a4ca73bee67c6890de7da91697b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed2af6182fa8243b9d33485b5377375e
SHA1d44816beea1138c846591bdf47b88d231343ed65
SHA256af574d63824b02b282f624cf3e7ea706b76590be56ad33d9ed8179ce1060a22b
SHA512ba19786733d1cb1900a5cef4f74d3d091140538766dbaab0ed5ba7e4c51e6f4fee704aaa1647a7424cc93648cbf19586d79b11e6fd120d38427bc2d52aefc067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c257cc3b0e2f8eabc6ddbea68b93713b
SHA1255d8e02b181d366e5a08079fc168633ea10db47
SHA256ecb923a562728a7c33883469f5062bcb949c7e0a1c9d0f9bcf208eeb47eb3c41
SHA5124c70ec9ac42f8ec2d9ce9a827077cf5b652e91b29b2de20598aefa97a6bebdaa04b3f3551c1ccb52ee9025dce6db7c5ce6b5578380c1c52bd771b21db7a9a530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e720af9dae7d758d4378bbd27fc4914
SHA10366e1178ff7a3ce82cb29e52bb3d273180cfaca
SHA256969c7f59f7c4cd45600d5ce9f04eb42491529316202c26a5fad32b33fb7334d2
SHA512a2fc851a353b51be24ca4cdbfce2119ee96be7365ebb8193eb319c1557086ee18faa11ca25f9815ba81ef7c1232591ad7c7887135be60ec53395ad32cfe062ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a779d87d444360ffd67bc3ecf0269a0f
SHA18a1416f8549d8fc013731cb1d6c3c5f89dbec676
SHA2562e5227044358986a2f56db9deae473888c54d85ac6353bb32cc004fcf98ae0d9
SHA512ef24147dcdfaaf612aeee4f266094884ce50f2bdc0616b6c8edb54847ab42d82645e18c80940e00f0b794751c86a9f3494bfe41e74d98e47019d324e626a514b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58007eaa1f99cc06ee6830f7caba2267d
SHA154e789d79d1f18a398f180517d5fca0616486045
SHA25667f71c76eec4b043edd10d393e36315adade56d082236225258b5b0e4d66f128
SHA512506635c1008a58b04b5729ae3a0520998133af2d47114ed071f173ae4b271845d9f1254029c9bf8df40a885aa304388b013f706e396e28f7efdba63fdd0abb56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543230546766a86a2b6714c8dabb90525
SHA13fbe060a52fd11ef80d588f18c44661ec5247855
SHA2565c3a12d2260419cd65f70e61e33df3c7678daa9432df2bf7758ed4750ff9a640
SHA5127cb10713ca367af22d9f28c661b0d0ac3bcf6dd52f67baed888dd23a6e6c4295c5ac432a1f137472db1ec4c9befed881065d61f2e3bffe31b22f70f4d580deb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569a1200b1cb0347c1c04bf358382c698
SHA1d4e50e74a3e30517dfa3d54e37382e9432f4092d
SHA256f606db83e1723890ec3a707b81172e4bd3c0db4de967a96856008d3c99280a81
SHA512f3c12ddb39891ac14174aec01a1c90d6450d48507d8f108058ffe3ce259b4354e0d2e0997ac950cc7bb5e233197990b676e19f293c9c68c7a325e21a06b9519a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db382b520c299874ae1ed1094bf9df79
SHA1379693bde54b2b85b4374692b2ec39562c2fde7f
SHA2567791183da77c5863e406e5a8ef71b3436c8ca7d23384ed60f02bb59779163ef0
SHA5124140c87fc20819b178bb4d91cbd45bd97cd2483e9946cfde4ca62844fcc45c1b3884f7739654127463e6be00ce5509a780dec34cd6660992f460b4f1ab853bb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae9588256f804ecb4dbef857e38163b6
SHA1c95040baa857d7a0fde12cd7164570165aa1da2c
SHA256ce2abd23eb19d924c6eb5e515e3fdcb5ccad27d9f838d0a261d2a567231895a6
SHA512738d894de1cc43c322e2f7bf607197ab65e0c1d5b04669dfd19771124a5f22cfb96b30b3ed4374f3e298ded3165d8cd2bef8d08293f1a4ea4847f511d508600b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1f58cd5435d8828b3e332f44da1ddd1
SHA152736858c44d3027cf999ed7277acc6898b04e61
SHA2564bc16ff3a2c7d540294fe232730b156fd8146c9a85e3531356edd75538eba92c
SHA5121fad954d0ee3b931152d00a942d8ae0b361a4c1cbe44449f817ce2ba8cae26957759260f01f1ad885e6c23dd87f092dd4691679ef006d690abcdaa0d1ba6bdea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e4e6da50e796c590ccf6663a846d868
SHA1d0e75d38194447bcccc0406c36348093f9ea0a20
SHA256cd8313e76dfa8c5a81411c10430cd0ac229b3ab078b70d7237897b12ee69b410
SHA5123c54ad5084f9a0205d760bb3df88847022d40fb931666fcd0484637fc552cd46ae25eea3d532bfece75e204f746d751167d74486ac0a6c3c0df56a29ed992d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5693999a3713c8828e488ed9acc2c2079
SHA1878a96a258c488cd6fcef139f03b192f322ba4dc
SHA256049c970e878c3756faede656e1ecb4610d89d63d41241f5e004ebe342bf91e39
SHA51232e5a63fe5b4c4421c17958a5d77ea3d5b6efca7cbc7c9ed7e6c9b665ce3162571faa0f802f7be4a2616d0229930045cac562ff3783d89d4c5ac721656ebd5a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc71e86b0382ce35adcb5b7a23965169
SHA18ba80a4259cc91995ad442d9630907e2c909a16e
SHA2568fdb0e016066f4a0eef0d9c5b711a611caa146235f43d94b0ac2bb7cc35c9980
SHA5127621c167ade588207c27e77c053cad25219eb83509cb1894030e645c24cbf09f519dcfe7b58d69388fa9d8b53c7d3bece328ed88bdf4022b72ad649960fe2d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b4512aaf2671f391d2ff3f1ea253cda
SHA15f1edb4dd7fa015835ee3230934c0e84834b51e5
SHA256a1952d07042a3f06233e3c1230094ba15cc953b78ba4c93b05c221fbd9c48027
SHA512218833accb3dca6bdcfe3587e0572a9b5e4739fd013ad46320f9c4364c51e3fe2791867f41cb824ee7a2b80eed7caad412949ef5a0e814c10ac0d26633ed7407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e802822802a239307205966554900625
SHA1d0a7e1c2c6eeab5639f98268dd1a974477e0d8f2
SHA256cd59f2c4605ed8ec806e0e1f0cb6b746c30c7e954ba4950ba8f546a03765ba89
SHA5125f3b0dc9b5a9149350ef65deeb43dc9f4994050335a9bcc2bc0068ddb570f5261f0d405a0a92641205a129138f892bbb77f9126bf6224b946f71f1e444edfed0
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a