Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 16:03
Static task
static1
Behavioral task
behavioral1
Sample
a1411080c550e0db959fcb91b8e4e3cd_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a1411080c550e0db959fcb91b8e4e3cd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a1411080c550e0db959fcb91b8e4e3cd_JaffaCakes118.html
-
Size
21KB
-
MD5
a1411080c550e0db959fcb91b8e4e3cd
-
SHA1
377859772595906004f12ed84dd06b55e690ad95
-
SHA256
6775ae8292777ab107c12f52c108de289daa488dfd39856a742cf57ebb6ed869
-
SHA512
82d836a124d3157a13365fe9063e1f0da007894aee8d47e1d58d76caf6bc67233095cb1819776c2262d5405c7d76ce007eb87847d77ed20450a531f5e84a1b66
-
SSDEEP
384:1g8FO34nUyq5nmK+06tm8t8FV++pCCEgEUe+SfNN3Vd//:Y34n1q5Kzo4YezfNh7
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424370079" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005315d7a28f0fb146afd6ff985496cbb20000000002000000000010660000000100002000000023b3d3c7197d3ed854baac257d232453cde80a51ec29bb315d24147702af8e92000000000e8000000002000020000000225920bb0a4e33cb271d672b8ffc35867cfb9a02789d2b51b4466f432023889420000000e70817049cd3753361666ff6b038fec772793133d642971836fa27e9c7816ccd400000002bc0197f5394505d7e0521ff16871bcacf52ea97ddd08d8f85436d124403c2f98973760b2889dc79ac737b6160f13603bb0e5e0c0f0f76d12d5c7e22912481c3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10574f28e2bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{505C15E1-28D5-11EF-BB01-66D147C423DC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2212 1732 iexplore.exe 28 PID 1732 wrote to memory of 2212 1732 iexplore.exe 28 PID 1732 wrote to memory of 2212 1732 iexplore.exe 28 PID 1732 wrote to memory of 2212 1732 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a1411080c550e0db959fcb91b8e4e3cd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2758d8bd42f90980c90bd9f9f56470d
SHA13c8bc722ab49295dfca93f6d3d9f3a48c62049ad
SHA256424c4202f68912c6febc7d4c3ef418bc4c322677b62d12c1f286f3068dca80ad
SHA51253bbd65f22f84eb6dbd219079bdf028ffda5b29d590dab4d0d8cadd855dca3fd63668802f728fb101d67b56e9bf846f6d9ce9121c9e61d8cfbed4c6bf7cab64a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efa6b64fb460bd5c2e2565198d72da6e
SHA157006f75e01c91e5ae66487e41e0af5b43f21e20
SHA2568db6e3c527da1272dc580d773800235440b8c604a1238285c80077bd4cf261b8
SHA51227fa1bc0d8dad72d92e4e90cf7354e68da1892c20c59a1a6bba440d1f808f251ee9badc886231008b6fa7d8e60e4d895eb92bc80e8a06442645346da9ccade1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566bf3e3e14b9787a9db4ae72112510cc
SHA1d8a1e2d0d16ad0c207e0051d9fa7cc1e50a286d6
SHA2567b07f78f5e88387e1a1482df70f021ed07e4318a8872e2a3d8768acbd6ebb338
SHA512befcb43a72a3f2082f930923a1efc8c9c31c40450729b890ba803771539727ee23a208f299a816bc908b314fd58501a4feaa85e71973215cba4856676318035a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5130493002cbbb1070ce2040d03014460
SHA134566206e0f5e2c09c88050528eac2759f36faab
SHA256f3d8ebf9b02dc4bcb73c89b7d65c189703f41c9f00d2d3d84880d4c1a78a062e
SHA512e7ebae782289d65ac8907b33d0a013186c2a993cfcf0fddb6612f75c45b17de741cd17e43d4b6b062378dbd27463adeecc53efaf88290ac3f23089e5f4d7643a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f38d5ec32192a0169768c69c219ab7d8
SHA12632ee277330f7b0a2b20903c4a1b24e0f4d6b18
SHA25606b82a784c057891d6ea412a8221001db926bc3a569d991c8024513d7b7814cc
SHA512a92411b98bec58f2809cf396de71b2a31191a19f90e17ade993d72cf82ad6896e0f9f570ede5a958faa6b21c3e1cc60b442038469e60a48ba375b5b86d4fbfce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec8542fc92668b5c74e905aa3109749c
SHA12e7e1daca65548a49f346ab1089c34f9cc74f72e
SHA25627fa7cf51c0cd302ec5475da31c4f898b9b751d147ae33f59609a5ef83287f83
SHA512ec651436da42aa93ac9806f6ce7a0431342ae0464c7f8bc4e87fa9095e30fa0466838c6b6d59b47e6c5eb27ac5a49a77a58cd1f50ff2913ffd46dee273350a80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c365ee0e9dc67729eee46e2d3c9e6406
SHA1c7ac92a4cdc0abd889ca9778c83db8758e3328ec
SHA256e97d8d086c8299a0eac26ed0895cfb9aefb54f8f87da657defb7ddff7fc2d5ed
SHA5121e8ef0c474ec8335a8a50f2a11756510e15d571e9083d052f19952c403fc1aad956ed99d141e33ebfe6cd7d1d7e92cb5ba43f9c3b6eb7df5f85a6c73db6e8e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceae2a4b2281765e073522bfe779feb8
SHA1b04d2c12c5b2cfd519813e0a82b63ac5523bac1d
SHA2567aab5c7eee6847679a936696f9f77fabc50a84d733a019a18b8ec3df06da4908
SHA5124dc62da9f9784ce0328b46ac6182eb301a698cd17324473a915cd5edc11de844a83167100ec36872676bffcb762253da7141a5933806df4342f0a32c4866c392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597aec22914d9672a782f6ba282042e7
SHA15bb6086b672358973bc2cd6c0855c6ff7ff8adac
SHA25641393215b46082d98225ef930bbd2f2c5193504229385aea41f5fb5edebf1bb4
SHA51248dddd555256f0d322b6f935ea4d051e29d8a04724e000d3a351c214eec31e1d3696339181f38a2ccfdf6c78b096e18fbb3ec02bfe7de4f9a6b482cc506c386b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d903803872ae24394ee0f223412df4
SHA102aeb49299ab4fda3bfa2905841845e35a2dbb7c
SHA2565c59dd1f79f43c3bc3b2710850c03408f3b4fadac62410fac65a7dc2bf1ce61d
SHA51269836cd5e3057a0984418c9e7e2b4514ee85522d202f852717932b89d28726784d58f0ae223f10aa5b9566f9ba49fd1ff813bcf818c2d361bfeb4591a48359db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4f3d01beadd51abfb944149fed11d15
SHA178fa07a3f13bedb990129f775a11761403f5d23b
SHA25610319456d9ae42dd4ccf27cfb07b739c910cd53a0bd36b662e8e0c07db8487be
SHA512c6f9e36ae0fd19abd5a0b2245c8f5a8aa011b7809b5b5283a53b5603b4124b18575bc59741c2ddff08c676c77f20fcddbb84102cd6e7db12da29f47bf3bed19a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fd6dc955eca033f567084b311c49bf8
SHA1520de20b5bf20c23beb836f1bdf4b69eac8e2ec3
SHA25667b5599e59addf93899d5c53d8e629a3d0f42af4ac69789f3d0167ea3962c4ed
SHA5128256cbfc985a0f359fa40ff53e04b88307cccce26f6109140e56c2528a586d02fd87ee137a2d7eba773bfc051dab93dce843216f3dbee37f7870b4558c6abea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4d5e6d8752115a947b3a948c0206212
SHA16aba4a2f7abeb8e93e175f7d47578075f4b56563
SHA256ee8bfa851b0e39b64bacdd8c684336841aa2ebcef46072474fed0366cd4e3a6d
SHA512b03f23963cd2e26c23d12d83b9bcd9062bed2582f912a45d473c1d4ba1b2918283145fc12bdf89e65fbfc3669787e27f0bd70770f410882a4840f97c1b5077cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dfce2983c194be5f3e74e9acf5bfbf7
SHA115a0bb1c783447d40522b6e9ac6126d3e72f1dc4
SHA256f0bbaaf424f4e2c5543149be80a1f28adcd0677756e0b6ba62b80411a11d89cd
SHA512245ce4198aab6e5a214f10bbb768bcf61fb38809bfc5d1c915a278b145e634e560f58c4b522d86fbebd464cc503394ab843977b3957cba0eff3fc249941edba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d83a6b4193c962bb460689cee4de621
SHA116064bbe6ccf9fcce6889143913f09dcb7de9c86
SHA25634c5f3ae969044965f9ede7a0530834f1457769f2882349fd176d3fe726b410c
SHA512e480e172a8d842f4017ffafdcb5d3fe121d4b539a7f79c09150b3a09096b8ad621b3beefac317f7938cf5767c7a9b90fd7689e15fab2e4325c9e33f2f5e519c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5251e2257cee7b968cf49012fb18995f4
SHA1cc82577f2fe9256c92a510e938c2b0367b1f2273
SHA2564d7ce515f4624425df6306b2586da0152efaeb442275cc1d29629ceaf1ab0490
SHA512a2100cd065ca3fbf7b3acf446c08c24b7bd5554d37adbb1a52070ac4e1b73b10eab9a55dcfcb713ab0c5d3641552f44b61f80931b584c2ea72e20a6097936a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65fcb1498abc9437fb4d4a45515f124
SHA106417e55b6206e9d7e4cbf688a0817115024280a
SHA256697d19a0d7f53d8ebd0d1fd08cfab94ea14953c78728c63fd261a45ebcc5687b
SHA5129ff94b96ef02a65ee25cf83942477c2511cc147313fc0c9b35211086b198d7ede3a8f499925db7046cf6156b38a2cf1fd3b85095d0ed42f2ebdfb7827c684028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555af43d19c11300972df8a161f44da34
SHA194c85d8ec1f1cb2cccc99a4bef3fa2543b38b5cf
SHA2560b43bf7d6df8560d8a56f218ddc1b3e6d797ccfe4e0e6f80374e7365c975cfec
SHA512ea610971ef44d0005c7f4f39b685d4b508b4371cbc35d42f2d7dea6b26431711099934e40518f8d019c00d7e603d6d41ab3f88a4bb7be52877234c512310b817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594db9533b030d881096d7a9208019b73
SHA1216cd68bdd43258c4f56b2c2f3b8a79e9faf7976
SHA25622249b1b0bf7497c753b3dd8a6c57ac1984f7ab3ec7b6a9890d0107801a0e965
SHA512314ab8bb4cd0b3b54051915d535f891620aac81b271831b1d2aed893bae66ef3bdf202ba73066e5e8a35fa792fcb4efa4e11cadb4a469d689d7cd25005bfaac3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\bxYsjBuKw[1].js
Filesize33KB
MD54d638ce4dd9b9b12c52ae8318827515f
SHA1e1c26c6becd9b44711fb85b64ae66df54aba1891
SHA25678feb6ec409aa8ce11bbc8890f01f95c48363a872f87e7c518c872155530211c
SHA5124bcde825eec97e1ec76a34bdf31930f5e2a938a2c265e88bbbbc1b80d9b45a43f010fdfa00c49b42d347d13b01e8e0bb9ea75faee624162890627c818fe7b545
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b