Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 12:34
Static task
static1
Behavioral task
behavioral1
Sample
6f98a3fc531754664060cb7f059862d7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6f98a3fc531754664060cb7f059862d7_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6f98a3fc531754664060cb7f059862d7_JaffaCakes118.html
-
Size
189KB
-
MD5
6f98a3fc531754664060cb7f059862d7
-
SHA1
47f86ed68e90978ed228ed6144b29aa0cc9e49d0
-
SHA256
25687bc9432f419307200fbfc6ab2784c94292f75099be7c54d54129412b4a9c
-
SHA512
c05fc6d50f7db0d336f7d46c3ac96894972487c685d489187def24c2e193b7c9ecdef9501647a5b782c5d86c7bb14753714ea97aa9f930ab5cfdc89713e7bca7
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fc//oHAmsYL13DEUMd0ScFcZeRZZ/p:szr9LECX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000eed6d9d6569af2321d4473424bd110fde3c037461ff8777bf1370351f5d98ffd000000000e80000000020000200000002bc69a32cfe0b12f943df888e2ee1b21037cd73f49b2d679c8a24f57fe2b2e0b200000001c8ebf26054f7dd660fde98393416994ba3fd3520849f135a9b60597bb018fae40000000a56d8b6ae036b44dfcf217892992bfb0d6abed55ad222527a75307cee053c27ded474fef321a9fad885d4673e68c4968af18eb099d726d1044a10b2fbf0feced iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000311b4725a4ea83f4a7fc8b9775adc4b1146b3f86e092e8faaa8d088b24bc0b53000000000e8000000002000020000000f087594c6ff8a44ce270ccc66cf54e33533a04a4f1b2e965fa259c8ec72405b990000000acc92675867a51545362ad39798bed911ce74b7c2529b444bd3452a8eb9119d961c4af276455d4f9347e1df0aa2073db55125705ddb1ffced70c28e2e38ceb63395f3844abd0fceec5d5328ceec0582268abfeb67198626acfa45b6ed2829e030c28a86460738f1e870b72903597422e9f4d5a93552b1df8a302f563509e723302d2eb2ff676fe1bedfc470970cf1b114000000022d7c0edea44ffc89c42c1591d4383847b6c1271afc3add819e9abedcfb16f136f205278f23193ede5455cf37ef8941dbf1af15331e9eacaec87810355611d3b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428072772" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701cee3f8fdeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{50C0DF61-4A82-11EF-8FF0-DAEE53C76889} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2136 iexplore.exe 2136 iexplore.exe 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2404 2136 iexplore.exe 30 PID 2136 wrote to memory of 2404 2136 iexplore.exe 30 PID 2136 wrote to memory of 2404 2136 iexplore.exe 30 PID 2136 wrote to memory of 2404 2136 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f98a3fc531754664060cb7f059862d7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7d8567c8cb968ed02f26e3ae93bcb8d
SHA1922f7d440f2ed9aab156c49060e29b05f2fc9c4c
SHA256b814770d7d06533e791bba347d5561b86874563c172e2c6988ec945d7e77df93
SHA51251737f0b4cb0c7b5d3a095917f44f7271cfd20a443549ba520d11d8daac5a9a66ea97a6d4a3181cadf77644371808003ac694ed652af64f630e5ba8ce2e2c8e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f30c1224c5ec67161704c0b3c2ef6aec
SHA1cfd4e23ef7caee5878f4ac56dfa0be9f448a505e
SHA256396a7b3adc761112d3fab40524c56551727b3499d343c92ee58e16f13f9d3c9e
SHA5129c0614c2a43bdf69f453b13d50101bd4bb107442b519d3caf7d8212356b45515fa88bd746f6f89f8c0cbd3386c9bb7417b8551e77413e5c69bd23454b681b908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aefac540c0aee0d02abe5cbad861a24b
SHA1b9e7da3adda59208e32717aedb4f3a51541a810e
SHA256ae734b4854c3b0e3c21575b4477a16adbe00b5cf0886f1a8600c8ac7c7118c37
SHA512ddb00971a8f93ecf8c04740672d1078aa015d65081e8464930d825720a976e5a009fa3aa0026d55179f8cd15a74444f4ab769f9188199e4fb2a677da94945918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556e3685be081654f43535b5dd4858f21
SHA16db23b1577c90a941d65acab77f19c3c3f1db5b8
SHA25666908faaaf334df0de0db864ec04c8d5299ff64d9f43040f356f6826fc6d2539
SHA51229fa44622daaf93aee15f0077a7ca5d339bbbbb2990e64569291c9554ff7f216724fa2966c2a7128d761ae1b5cad0712f91b9a8de876a22bc26f99bb346444e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5221a8a3695f0d1cbfbd240b693922148
SHA10a520c877a995c9689be7ec735e94bd60ce8ba83
SHA2568b0031d3f9a6395689dd3a26642b8fe7c47cf7efdf18f1d432de17bb147400e0
SHA51286ff043e876bd31e18e92c131dae12dafd5d99a2308fd1cf1bf16fbe44c6b24f10a456878cbea2977440a4ded3b65fef98893a35af71fc2a509887a4ca81a2e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5125539e4c2ddd93a143ff98fd3a2740a
SHA127e3e01f745ae8056dae700e019d6ce118774bdd
SHA256a417296840497d5fcf32dde1898d24470f58abb62f2c754f7e9d04557a6dee29
SHA5123c472fbde8a2156ed3688b06b0044bd184715312b9fab3bf76fe7703f0456015b378f9eff8b418e2fa047f198d214fefae2541b8dacf87e271529fb031638f5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ad7ef4353bdcb1da3f27bfaf06bd764
SHA141321f5775e74c5a7c8735033ca0238468696c06
SHA25695c2ee8ef6e9a18600315ba4ee4ee65326ad9eed71a59758e7fc56f869254401
SHA512351e7f313f28ec0b34d1c11e17e8a2ecd8e66d3783e8103e76e1531f5470216053edf88bd4d515934f4ba0f86e4c00b6133e6fc8a6baa9f5da756fbcf8356476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55742d08a503fdde10799b993ff2152bb
SHA1e06aab198052b4686dd41145e8e41548cf111099
SHA256430dfd5df92f9c5446b649e364bf1d9c9e448e317bfb268c034fdc13707fe4b7
SHA51294892491da2ad522ae96ecbd25d3417ba6591d9bfe91fa4b1e8823068dba0489b06992e31e199d9967189a1de5c37a0bf61f38f3bb5097238640d155fa146b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5724494d11fe4a8ef926bfc3784bfb607
SHA15c49f1515216d046c2ab02c8d8bcbf7be6b38278
SHA256cc6afbf3ac7c3879f560b00e3cb82c973ec37c7567a6787fececd887d5fababf
SHA51242a5ed20a792496dd41392f63ec5c33ecfe0501a368cb4d8065a117ff465be3ec56de0827d713ca046951c6a83a6b6183786803009d25f9cf4bdeca2b814a7ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e8f24d752fc5b72b07a81c325337cb8
SHA13550482da6b7b3fbd4038a0f09390a5d2fc86c69
SHA256edb47bd4ec0bb0a508e411ed3a4b006357e330f4d72aa395f785d8743375cf21
SHA51291009eeea959ad68b3c3ff1877d141f78d482754e7ef4ca221466a9d4eb87593d5dd3ae944603e287e518d9e9bcec8b8f86985613f1153a1d0722fab794b774b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536264dca6b7ef0e892d3b978258185ac
SHA12f1562a090e7c6866530cfdecf8f5f36b45a8f50
SHA2560d79cf376768c3428e4ed023b6b97c9612f42a132e68452751b2ef273ab15958
SHA5124e78ce5020231ec7b56383f5b3535723e168d44bcdb3be4422d3fa5e9d3f1040133e65bfdc67e34aefe070088a18a8b4f227eb132e1a40355b71df5b294e14cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5464ce6881a53ff258fbfebb61d6c77e6
SHA16550e37dcb1f133ac238456d213357510c009d30
SHA256767bf2d36159f9c8532ecd3d750a33313d24c3ec63230f8a0537a05aef6a1587
SHA51263fe8382591ec5fc7805e105a412d9e427d1657747026d6c7bc6745e93dd6800f9187e1ae777e5022c94ad975d18b7d097690e94c841717e3634d8895d23cb60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eb14f79b4788c62fd54be7adce825eb
SHA18ce0ec5569009ddf973734a08f3aac7a96fd2e45
SHA256b57053d47d665b94e59ad39f84185bc529c8e4648400a48abeeaa4334fe50f10
SHA5124430bca106c0489ccfd0dce297c1313fca29c124e190505810f4072d04aaf117515abc1de005fe9b4e041ed515b3185b5f401b3dec37deef01c1df9f4307bb3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea768f50d77fdb79da626983159406cc
SHA1c94fbce7978ad1c7bf5de513797912f70acf135d
SHA25684f9956a26b5cedb9ce081ffbcff4d70f28a3b74754bc267d94a7617d9df75a5
SHA512d05a1643241514118cbe8d32c4a69bc1ff673933b84f679e85028df5020a316212a690dbc3673dd74396526d54a92b8b20ccfd52e2a7c86e7a3867b99e7de803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e2578c7b165cddbda034d96a579831a
SHA1947c5a27b64e7334f5dc285a36e908b8d1a4986e
SHA2567f245b134a5ff43226febaea584ce1d6e45339779a828c7441e34249decfdb7b
SHA512d7e5e8eef8e46def5e9599e900b403afd9efc90fbf89b9f9a739f296224cc9d552a0e45f5eeafc7cc8897b8d9154179755676c48e5aa9cfbbdd28381b3d06887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d262e026461965432b832fdd5b7d8e0a
SHA1333c4d35911d8befb724977efece44a68d55c18b
SHA2562a64cd8eb43ccb4e43c176777c47f2a5d20b96123e729dcffc005d8ef9f5aa3b
SHA51251435682a17ccf13fe8308d7e195c6462fdd5172f2613cc5ff3124a016daca6066db51af985120c1399f397c1ada46039c349bc2ebc683f2eeb2fc7a57c35f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5844ee5a77acef6ad53b258c53c82e1bb
SHA19284913090a7f58d48959acd1ce6b05fb5313897
SHA25638b69402e63f72cc9f69403172d36458fcf4e81f0d3259eb25bf32590ac974a8
SHA512bfd1306adc50a92a300385a49ff4dbb2f64ef4d42f1d53087239bcc910250eecebcd9889d7c04cb0607dea3bab36aac9eae80764c4cf97a7717439a5dbbf3092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5620eb223d96f7348ba8a4897afbb313a
SHA1bb8909b05b95e22124f123e671ae8b1973dfa344
SHA25693092213f2f1cd032ae296096a7067417a78883ccba6e8f8bafd389740623ec4
SHA51206078dc48e9b6160a2d8f66948987a50483c197d5869942d21bb2492fafc94076ba14b05e0e7a927ffec5da3629beab9cb9a5d9b62463f4b039da7993e9754f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7469f6aaaedbede1afd0a6b9a0ba77b
SHA121f54369f29f382dde64a3a69bd5b293a9e4ac5d
SHA2560bb9c5b567b8ee7da65be429039eb2d08b193320b1347bfbecfd68659e666a3c
SHA512a961bd574079f1329563b6deb308d67b5e0f0d9bde74e1c3aafe8c0c974060e22fe655bb6eee31d0a27623e4088518db0a49ef8f0123dbdf1271fad6b9c27f16
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b