Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 21:50
Static task
static1
Behavioral task
behavioral1
Sample
7e85317433d66ce91d8b8944947ff0f6_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7e85317433d66ce91d8b8944947ff0f6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7e85317433d66ce91d8b8944947ff0f6_JaffaCakes118.html
-
Size
43KB
-
MD5
7e85317433d66ce91d8b8944947ff0f6
-
SHA1
a6689ab6d6b91be82d2ee795ad0140118a3e86d7
-
SHA256
1fe6b3d709173254a9f3cb517709eba101edd28b678ae5cbfaa7fe446b4f7045
-
SHA512
7540fd40cb9cab6356a6bfe79ff0bfc936d4c3e5c5af7e1b21ecd9ee700f66a6d1c02f3abc2c9c59228d10ee7ddbcfcd70d680021ffd35eedeab45fbffa828a4
-
SSDEEP
768:1+iJPKw022X+zqh+DNjZAAzxuGc/cx7lT2semy7g1mmtHb:1+iJPKw0f+zqh+DRZAAzxuGc/cx7lT2C
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80bd302949b1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423094908" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{53CE8771-1D3C-11EF-8CD1-FA3492730900} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001e2ac87b9e6af34fba552c4bf32b9815000000000200000000001066000000010000200000008988bafd4cbd08e5a7b3373908e617900e72d04edbbc55194151776d9cbd2527000000000e800000000200002000000034f02594d0344f3eb8be0ac6121d78dc5ef5b489cec438e7c0aa8da0525f1e9a20000000b051a2676fc9ef43044263222133c500179fc9840cc379af0f01f8d1a7b779fb40000000842183a1dae5bd4c0ae0befb9bc175c389319b4d2967381deb1e4511389373f4f3dc0a66e5b6d38b85daee3445871bb70b3ef39c84f792f0609769ab1c5d545e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 1680 2176 iexplore.exe 28 PID 2176 wrote to memory of 1680 2176 iexplore.exe 28 PID 2176 wrote to memory of 1680 2176 iexplore.exe 28 PID 2176 wrote to memory of 1680 2176 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7e85317433d66ce91d8b8944947ff0f6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5922027b8c88abf160b6e0c1f1c5167d8
SHA152ca8a9d7e75654b142b882a0d5c5ca9e76e427b
SHA256080a0818fbcc67fd4831bb46a93a177064ec88c41a1623e78279d82a2a8674da
SHA5126e0d8182bc44aac5aa999bfcb6b1b92e077574e9306208f6a2142428bc411d55fef2fd93c2d16b3ef8813a432d65b53d89899d643099f7b9f00f8b62655d396c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d497c98932be282ec339fc9f7fc7c31
SHA17e8a6de912b383c7755a501493a5658954389f49
SHA2560825c6ce4a7ae83fb5fa8fad74d8845a6a822b9c856f02e5f521560d6dd36133
SHA51289828118ada7840718edefee91953f422f9cd6c0a29694c7af1a50443bcafd72c884183b4e3cd0fe91a474b3f92bce2ac80a7a0bc29ae790346f741b0f072a50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d48f9221e38f9d6476adf3486cc39ba9
SHA1c6fc66580100674107ad04a318b111e1ad105262
SHA256b590140f2f968f7f3300fa7e8d48181a8e7122f1a74c1078bc1edff0f91f683e
SHA512d6b6badae8a1bda12ea4bdb92ee72b7dba7bba5294e705b287564de7bc68c65d2d903348cae34ecec225ff3f16e6fe7baa3b5a35f172e6a84030f75c00402802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5dbc6f4620af8d10b97cc9f4ea9d3b3
SHA1c1635cdc0118bb469da402c1fa51d5378626fa0c
SHA256f1e6d63d242172f80eeef279f2f03941449051c9585131896722d29f5106739b
SHA512ffbe2ce7b0a96832303af1e5c4e8da1e429907ab0b0f32f557919453345632adf226eb84f62347af1b246ad1f37f38a852f358b367047f7962e55c21703cea55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8a704e85aa9b62a49017a408464b503
SHA13610b42de3250ae2b1d57274c923b568f0ad265b
SHA25645fc1f6394942ba66d0e5a536a199e7382cf55c524cc5d8caa8b1db0cfd39d8e
SHA51242f49b85115800e325ebf4f7667a6d6293ff4ca2d47afd6a374082be797231f5c83481b2dad1abf88543e2c88b2c64f8a153a36b9f15112be1c276ceebae2ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b9954a739d04c42f53861ed01f5a678
SHA1ef4976d812072355f1bc75707829e1c5e7aec189
SHA256c7407b3c44d13484382ce89631bd8c5d83731bc57a8ae85050dfc235654782c9
SHA5125c2aa7b7d6def751102ed2217b48e3997e80456fcb524cae5c171a662339d29a6274741e9bf635205b2d1bbc4a2217466f2af79a629d0d4aa5b30a1af8e580c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d71a06fdce02dcc805700f356207dca
SHA187bec144cbc4baac540d2529cf14083b9519522a
SHA25693d769a7d079d7f60083c5bc7b0bffe9cc2ce41f2d8cd994716c1968169176e0
SHA51294c50be4960127f71096cb864cbfe54f495aa3854b54c789ab2a922090af356d952c1175e54d97a7603a994d2038cf774b3b5d7e8e9fe29832a2608469ef25ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501fa7bf648516b1f7b96d10d6460b9cc
SHA12273b6832d70fc9419c2a7302451151f37f5f62f
SHA2562c84240c9b3512d9a52d61b6ca2a7ccebde631454ed5b23e508ae4571f3107fd
SHA5125a6c98fe91d526f6671727f5857cc54194f6ef16d74567785b1b96d11f81c85696422fcaef9a2c76029bb6f4e44ea44b8fd06dd6434fc4a65c0662cf9cef39bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5675c3b8c079fc58d419e1364c9f89501
SHA1c079997e186296337ceb85d07689343017d1c53f
SHA256c3090f2e3878df3554f9e2284e7e99fcbfd6f701783b8e7c6d73e1f145f43fa9
SHA5123f1915014c1b54094c7493d5327d1887d3a2645818fe219f78a25f44df83642b94f5303cf20b67ba1cfa6e13b59cd2b6189fb3707da10465d86f52a01bcc2431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a5bb98357f5879a582aae89cb5048c3
SHA1c780f03eaaa83b46b282fd61a61b331fc0f9dff9
SHA2568b25e6707d10498a41713145627155647803b196853b6955944ac45abcea4de6
SHA51239210f3f0cff7219234baf9c4a87c17fb51a08f15876a2354a115ba4d3b8466870effd2c6ae44b5ea26c4c6ddc1305e009ffdaef1e573c6d7dd7437708fa10d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fdfc1a7f5c89277f4ac4ee326356d7c
SHA1318975fc8840552dd431e7a851dee347745757f7
SHA256885f0bc0d1e41b5e1c51cf18dc6b52eace6255c359c9082b548a9a897d605877
SHA512fb9ece4b0cf722676c56ba5bcd16612df23f8a084920e1e12baa0cfa413bf5edf608ab33c3d3f4a5bd8a22f67cc0d0b980885d3bba1cb380fdbdfe76d1261db9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3f9285c953fdb209cbc965351a46d3b
SHA10963f2abfd7befb28a0ed712da9fc6116da66f28
SHA256499a7d81b50f4e5b1a952c4a3ad33b556e732e65e755c1b13d663521103ea1db
SHA5128d1201d8c7de04f0e8b50869cd5ec30c559c464a86de4f698bcc543065acf2878848bb2718c354467f671b5b91b5ffb435e1a479895537535f862050cc1fab61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53677863d340e070f55b425e67df9c6f8
SHA133c7443e2f9bb3e12787b7827934e32718b4bcba
SHA2566a3c5a96684c0395be63f517e91a6390189f8be2c3ef174de662be061e80fa31
SHA512f998419b2b76a920062686ca6966ee4b18de429f2b5b0bba5c77f01264af3263f0c1c5cd431d368c51a89e38bce8864e2ed6895c3c9f5f230264916a808c9f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d16b5c02c3c59c6d9c1676c220c3ef
SHA14edbb41603c56fdf08d1097a9ff72d13b06fe53e
SHA256737c2ffc202cf9eecc75c8d45bc9764bb37549ed906e6857ffc4a068a4bea772
SHA512090fddc9c2cd25d5a62265bc09e11e333c65a8598f4c2989cc726017b3cd284a440dbb391c200f9b7158b887ead7b408257382f9afd2e0f42c613112a5d60651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c8a84a95af8e3580b5d363ff7e4e04c
SHA1140724ab5b4a625c56a0183328b5e996444646ed
SHA256f17203f0d71cfcc5bd5f070d68e11008bdaaf32bcbab17ddff9539a6555c133c
SHA51274fba424b11723f1ee83e66ca3df89ade856435cf388e04754959af7c72fc3ed07817d6883d0a6940f395e54af0812414af695d535fd4dccdf4a9753a67eb1fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548193e9a5daa3d09267701f5e0598df1
SHA1df11f721794ce5652b920a6ca68dc6d8dcda872d
SHA256c9bd009210fbadf3c2d80f637c0fa36ab3d12f18f947a01cc354e37bf320a5ff
SHA512a0bebd72f02eed062ce3f681a27754d44395bfa0091d6395d9660684faf5a058bbca576daa309b76e5859d7a582e7c9e186b387cc83899d7f6906afdeb732dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a38f14f9b98dfc65bdee9193a9face07
SHA1725011aa28aa7a78ca043a701acd151014ccb0f4
SHA256837c828fd4c90efd4929cff157ede14197f425f2aef1ac596dda235a80ce848d
SHA512b60147979d6e3711d7d0d4801be1f57cd7e26fc3228e7f14532ad0fb56b227bab5e293715521b1c0f050a08e03426b49da611cf178ea86f9306462696e5507db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578c00af36cd5c883bb988900610fb6e9
SHA1ddd5f52d880ff49688888b340c4ad8672f6badef
SHA2568903cf112d0635ce594c303647d6e1b86feda4117b5983e4d1ed0103e3216281
SHA5127148ae797d39ddd0d5fe30a8dbbda57bec145a7ba36ea0192aaf0adeb7a4797b48815490ae83c0b8a65b8e4a30579b91a35c42ff67706f359b8efd1ff13bd1ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad9035815db9a48a799ecb73d8509e72
SHA106ba07142fecdd2153a64abba2aed804c3a26f70
SHA2566a553b12a95f62424d060aa52d269b2d6b65d12eedafa031633f4dd72c7d1a30
SHA5124eef85d737dc87d20c06e3b685c3cb2a4d37a5f247d6a2cb6d1484c0e1fce97800bbed2d5ea48482292ba7bf8deeb035a0bb786c87c38786654d8d8cd8545c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5512a7d108a1765f83c15c8c45ff80f4b
SHA14824f4e7794eb5793ae48b8ce88435e3c2722dd4
SHA25609aa8fd6cab8d665865de1a817f93ed49c52a8a2649a015a526c687abdf412aa
SHA512c7aabe44d39bb79d3bb66137d5ce750efec7ab22df11d62601d0274cf5becc75a6f6fde9ccc2c55cd19bf5b51a4c9bc75f27f30d324ab432c937e4d7a047dfe2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b