Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 05:05
Static task
static1
Behavioral task
behavioral1
Sample
6a56abce93d0eba768e9353f458ca9f4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6a56abce93d0eba768e9353f458ca9f4_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6a56abce93d0eba768e9353f458ca9f4_JaffaCakes118.html
-
Size
43KB
-
MD5
6a56abce93d0eba768e9353f458ca9f4
-
SHA1
237433c12d86c3bc67d71264a3ffe38a76f2f44b
-
SHA256
531c1a68c2716daa716067da7d0447c5247c6af42b1575a675b168132ba584da
-
SHA512
5065fc0354403228390b6b1e80bb80fa530ff1b736693c137cd0d0884ccf99a9864e2e7d67f11d6f3adcb718e51d9d16e040620d00d32fd7e51b22b3b51b792d
-
SSDEEP
384:hCGAh/guo8tqhi0KJi9iWKjLeVUNPp3d0lDaxtEfRK:hCGAd5o5i9+qLeVYptKQtv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000001f5310347be10463f0c27c408712ad8d0964a9c9b312485b9a26c27e67d84b1000000000e8000000002000020000000f64e000ad21ebaa81e86a3663aea5c9c5720fa8472734003401a74910ab48edd20000000a1bb78f4367cf16659687824490e7328dc655d6b1cd151ac8faff0979b36584d4000000013cb19a6baaa72df18012942cc2283905e74e81b2ac65504d6a9772b745d9450ca83b57a961c5794706144da13f6ceabda78ceafc17c8fe4f55a5c47cc690bbc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7075112787ddda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{52136801-497A-11EF-8BC1-6AE4CEDF004B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427959386" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2712 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1940 iexplore.exe 1940 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2712 1940 iexplore.exe 30 PID 1940 wrote to memory of 2712 1940 iexplore.exe 30 PID 1940 wrote to memory of 2712 1940 iexplore.exe 30 PID 1940 wrote to memory of 2712 1940 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6a56abce93d0eba768e9353f458ca9f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4d3b0f227656f8337d685059a4cc0ca
SHA1a9eea9127e2f887a9838a10a02f3b8a33498adb6
SHA256f7570d49d367ba046674d80c7e841ce8c2cc3ac1456d7fffd913d4c742784849
SHA5127e93a695eb0bba797f82de7bba51a7e82d25fef430235c3392325831d4fd0ae74d8b7856f2c7cdff65ff46bba21dda1e7255514a815ffd69014e8a514c7c59b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d020a2e194a4a7f4fc0ef12c71be5a44
SHA106cd4f431d9d974bd0bc1f8f27c5035f26ad13d0
SHA25611b908d3d00ab9d24b474c6012e1cef8870d7de4b0df37c074b2cdd3c4d71006
SHA5128cbafc1d044a75f8ee5d26d35f3b7398fe86794701791445af2bc04496e4cc16e1cf1e3073f63021eb6e44df480caf41630bf770dade9707d5a773e8ee9d816e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535ef13a1f1d560ca6d702f133e069b9c
SHA1754658c43e09947da72bc24b8d6799032085eb62
SHA256bc95a102f509eaae2c4a2d90f0c7be1874380a70d08763e07814dc7c42dbe9a6
SHA5125a563de0f48ee6fee74d7c6d0db1863ec15a75daf19171b1e741c987b25574774b490da09468a75cd96c71b2acdfad01febc534f4bf2861a92f79589c801c73c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583bd293db94c90cd796cbf8bd43671b7
SHA137b95ff02453e4c1b4c6216f0d9ef34e55a0a22e
SHA2560d7e1aef95decaa7f21f89f1caad71d04677588bf53cc39dc8c61292430450ea
SHA5124d7e3853471715478157493d83f360fe4433bfc294fd61cacd085430362adff68953ba939776942149fa8b529fdfc32d100a4ccb412b29af5b26310787628366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0fda4c608af1fa9850eb262853888e1
SHA1761652f2b83da78b7d57f9b2b58754aa6196419e
SHA256a2bdd227b7d5fbbb15a87806acc85e8aea8d493b58b0c9f7ff53a947c510aedd
SHA5121d68c664e97b7fedbb7f5770787eee78efe0eef0965c224454dacdda6d411fe79e8694aca557d22e3cd3b6903456055eda272cacf76d2a4d2bb9d3773b830c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5327c7e88a44887b1dffc433811481add
SHA159b4dbb03686ba66fadf360ba55e87c8a91dc351
SHA256c0bd9fb5d4c5937f1e75fe300d57b5ce0d4b54a3a6c299cb4a653b4c4bd4c0ed
SHA51234eae6aa1328bba6edece23f39affaa815aa9886a3793c8db2234987f0f905799b43d9967cae922b9a6c7649859f90ddc8da108fad02133feef56be4bb41bde9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599bc4e60d7326ae186b0f32030bfceed
SHA1d6a6e74920772d8879343de3d71f373a77ea0c32
SHA25695dfb0bbfc9b40019e063baa0f6e64b664bb24058c49a22d6ed8371416452446
SHA512c22216126591849afaf6db02bfa6daa09435775962b074423f2a9ebcda076305035202c24a51c97ef22ae6ea6dec3bb2ec95b897c049c736ccb19a405a553bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b097b22092769724d8890320be041750
SHA11463d710d12b1659cd74e78b2bda2c4ecde53b51
SHA256a8d05b9df3ebdd52e12200fa3e7075971a5d6a035a460ceae400327e2ad2e9a5
SHA512863c68e3229874f775443f4c47ab1a95c2ab87c7aa7347b84a3117651f227d087b45d0c4f7b06a09e577cca008a31b9880b4c908fe3741478286ea39fa722763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503a0d6ca082156433acd3ddf180ebc8b
SHA1794463f6337f281851451a7fe040665cf743b1d0
SHA256f91ebf2baeced435554db10b89619c0627c50df26cc9671e43069c14082f6cf7
SHA512677f1f0456a42b7d10e64b9bd18b3fc0cdfdceb9b013dddad17f7ba8be9861353e488ae5567d6f5dba610d7a7343af315cc34d16cee4cd88b7c55e1000192b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8299a46cebf0f4dcf6e29c81f734b79
SHA1c2e5ae422baa69a1af1eb9eac71506b9414b5595
SHA25688c4a738582003ef9fb1d9e3575c1272d5f31bbf7318177ae7881f231e20090a
SHA51260571a6522b91871c8fb7c798b16179fdaa704cd3ed3081e79cf65cd4357db026159b0c10d607843e1e1ce6ef9408b24c5312abee3232a7692a21b1e5b7b87a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd478fc7c030ac6ec063d757d23145d8
SHA184ae117fc580d541bc23b1e445f39fa123d0a11c
SHA256cf979d8adfe8e4b79c959ad5cac28237f4a98fb5b96a6bc3c4556a7481d26683
SHA512945c2fbf99fcf7141e908a8ccf0586ea67a13fdaf0cef3b5224b9b0983bfd573cef09ce162ab97bd3109dc0b29fc8c37e1cb5df0f4948a973e2ee3d0931bc5d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b00838c12f23c0bf8b010d50fc47c5d9
SHA16eb12c3f2ddd0b7e96a985df4436a90dbc05f6bc
SHA2560d542b4dfedea7f184a4ae79bd94561225d909cdc912e81afbc566d413b2790e
SHA512d27747e8e508e34634dc398c2a133f472981074aa8732dca89f9691ce491f228d6f0610a2e967fb9e02b72ec02a0378c002331cb56d4e838f0032eee005b920c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cf8b0f8c4272245023a938a7fd33d76
SHA16f1a05ebae10095d9df9dea796a6e3d0b287e04c
SHA25612aaaf365b0a1db397747b319a2e32577179738006ba9c49677184beebfa2a66
SHA5122626a93db86bd0b8e41db7a7a5c85d1b49cf718f6d3cd8426d0eed7e13fc34f780bcf3ec12bf42db5b07f9c66b5780068e2996499fdc1ca150508e897a0a1ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ab3274945c633b5c347877467192c94
SHA1da756fb75e528ddc8d398698e6930a106ecc2207
SHA2569e2940f47a6ef416b835688a63e71dfe5ce6a8b094557c33929f0ccfbc3dea5f
SHA512d93ff4c5f8e92290eaa7ce4c0baa4ba5564286f0bc54ac34504d68dbc800656bc4b88c318c99b64fe4a6062cbd63f4421021dc14516d62be6586f25be1664ce5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5494200d7b4db35e3fab07865f578d2ce
SHA1f2eaed4099cb22fa499e449e0a5e863d0c69a75e
SHA256fc3cb8a56c30c26bc1d88be449423aa5c58e6ddb76c6555a63659a717f7571c7
SHA512217d33884902cb28ce1ce682309e17214c371a83c095744bb1a5c5b73fcfeb051a7c2ffa82d81510ccab6b9029753b6ac447f5219d9bbc11943b303c250ab07a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd4d632ccfe089d90cadbada760b210e
SHA178d6418b10f62d7fea6c0abe55157666988628e1
SHA2564a13899e512eb7a62764bbbcecd3859df1943bf0580c1b6ef95061c9e1435279
SHA512302b94c14483106dfc13db293e70f24802f12791216c341effed7ff8cb3f0aaebc720ed0fd11cb19c8af999280af32fc656c92db036d9e92232a39c74a9372c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0bdcd6040d91e0ae5359dae83997316
SHA16cfd789150f69d1925e045518f49c6c5fdb994d2
SHA2562cf168dc1e1ebfa69aebd53ed631f4f6525b9ca17c08047b20cfab0d00cb2b48
SHA5126bb8837ec7e210772c2edc74efd46efc6d0bd73bae765149e275460778cf8f1d799c587a74c2bd30f51d775e5aabf7e2b8e0fbcab86b15dbf9ff1f104338c2bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557c971889360419a6e59e87e7f66f1c2
SHA133c17ce4400c964ad80a495fc0c982c5ba642428
SHA256dd9f902c88b7bebe890677c0b10e407728fe5710c829c1106c946e1e11622087
SHA51255b671049172ff9667d0c24700f9e838ee58ccd74dc2a785bf0d9428820ceb3ca122a3b89a3e2724f1f086e9eec389124873a5b02b00923baadd9d1f9395b1b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7ab11f5a6e62612ff83be900fe328b1
SHA1467bde911667ffaa39390c2689ace02ce466d08b
SHA256a0c08aa0f6312eb67b0e9070ec36d9f554fc0c2843ab8e68ffdda34a11cbe2ff
SHA512e99b61fad529d7f4089379843d82861ade5d0d382af4f2e53d391a70eb87ff33ea24aaee0986ea824f2a06bb4765498ae6c65f8f15f815db7731abe8ef3cefab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b30b5cc7a1c179ae7802b3235fcdcb7
SHA1cff95dec8bed12182d3c6d7f2ecfb9877d842ec6
SHA2566dd0f59ac248741815f5ce19bc2e40a9515e9f560c2a205fcf4fe6a30ab442a6
SHA512dd7210faef6897cd08a21919a8bfc2e934420cc0cc949c0e085785d849c5689a783b870ee4df405a2204e89dcf2546dc71bcf3885b9aa97f2b2fc4b5c70a1e1a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b