Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 15:26
Static task
static1
Behavioral task
behavioral1
Sample
78a053151ecc95a4e6c73e242860a47a_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
78a053151ecc95a4e6c73e242860a47a_JaffaCakes118.html
Resource
win10v2004-20240729-en
General
-
Target
78a053151ecc95a4e6c73e242860a47a_JaffaCakes118.html
-
Size
132B
-
MD5
78a053151ecc95a4e6c73e242860a47a
-
SHA1
5dceb4a05eb33ca2ab82422d516533c92620b354
-
SHA256
71474b9f4e04f9ee2a1aba09ac9b7786a414d81969db8b37f2f19724ccfda89c
-
SHA512
6dbdd0391f2c6ad5018e3d687d3f8671c5db16957a4817c83e4e6f8d2ebbb30053e97999b53f78f575b0657c7ea9b3da762bcad0c3105dd3b4bae614d9b65652
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000a84fa416e29b99d15bd1d0b2876f0433f891e0665a4d71bf3410d3701b66c4bc000000000e80000000020000200000004c92ee3675417c7d46f4e53a4bb2f5932f3c8f115ad814dde175a5de19ff210120000000592165be832a29f12207f4148d8717ab9a5ffe6a102c92a5197796b0d6c3683c40000000a71072a582fcf8252f3fe745ef618cec069da700ad24d3009f5447879efc96a2aeac672e5c9981f1a3eba151f74671682afd5d96cc77fd479e656c543742f3cd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428498864" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6490EE21-4E62-11EF-9730-E6B33176B75A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000a2d1fafb45adecf321d3297f5a5ec98d683ee5612225541bb0077f541f1e390d000000000e800000000200002000000016504e98a1e1f1c16e30ff32124e05b82e554c606322c88389f642ec95253458900000006d29938a1a79e3d1fa35f6bffdae2c447b10f60f0343178b91b7b16f218cb3e94fe667ed613eaafaeef72853a83daed163b6fa2cdae8d7dc7f7e3184d1ac9a517a4205fc5bb67b7fa2ad3828f71c957a3d27c75ce9c315ebdf9d95a9891bf50fd399281424553561c70dc132396c2d0c63cfa3b6fb46fe26ae161c142c9f0fc654355670658e12ee2173a62033c5f2ad4000000042fa1aa8b7cde49e04408bad1402ee68935e3fd668e507939000929d7e09497757cc48383685b529c80a964705224db5f44fa946012c2c6b950d15bc39dc7911 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00cdf3386fe2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2244 1720 iexplore.exe 30 PID 1720 wrote to memory of 2244 1720 iexplore.exe 30 PID 1720 wrote to memory of 2244 1720 iexplore.exe 30 PID 1720 wrote to memory of 2244 1720 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\78a053151ecc95a4e6c73e242860a47a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e83b939afce6bccdc3f2ac8ccd546a6
SHA14eafe71b2a64e5052bc4236281b1d064e32ae9f8
SHA2568ccb8234c7965448ce6af59f22367cb4f8b96b15f3eed4bb386c4a8a93f69bd0
SHA512256dd05b375aedf6bba6b12a811a94856b17a657683bbe9c820e2a47b765e390a245911176b1e4f9460638913ef261fd9b76a8833e8065b7fa9ed6edcbee2c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cf7fa6edb8d065191435c8f51b07e2a
SHA1fe844a6f42283c415a98142edac10ab6451d8a55
SHA256b4f22776586aee4ea8c1d6fb0e6e489a9dc901e447596d8d89e277fccebe6d46
SHA5121a9260c2d6392da609366934e5d6e1497c61fe141340755d4c98810cf278ec9f25534b01cda823088325fbff5bafe3b61803ba0976a3bbfb2fdc190b2f021ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5630ba41f1efc36fa5642abebc74322aa
SHA1deb41eb483a6bb589ae4f8167996f66726e77352
SHA256212e95077c444593985bae7202d9d01600932a09031d06d0421c38e185de59e6
SHA512772fd05b4f55cda892ca7bb7bc2aedf848c62b747b9e752d8effe49c8430893a372f628abec2124f023a2347e0086ee0dc86e9218111fadb5c1da1619894a582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f274bea23ee0fd87a111b922bc663c2
SHA1caeca30f51da6ed5d32e9420ecf40fffa1060b46
SHA256fc94142739becbbdf46009bbef0ce9d8c4b7ff98263754a1931d1b0e75a8c2b6
SHA5121e0b504768a9d4caea5a3e0a52cd0488da475c722fa7e2206aae2150f6be135adc619b56838ff02912e93b98dffbc4ac3e606597bbb979050a038dd6042c2e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51907387304be4140f8e774f611c1c073
SHA18b4da65d451d0cd7f5a40e3082c84055503f41b7
SHA2566b1748ce3fa4bbc79a7d671357eb484feb753631aeb876265840b89047161006
SHA5126c837f05e8fb9a3e98f6faed6c33eba7424bffbb228aaad76fa0fee3b7353ea597711ae5d6de741216ee9282f1e7c853ade59b4867b74d773f9ab781b496ec88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f972ccb96b68e7e02ba7c88cab0dbe3
SHA1ae70566831401a71417538fac8bcd0cbaa4ec8fa
SHA2562457b24df1cf58340c5869a46aadb0284176f270ddfa7dab89d73db26249c881
SHA512ca2f63abc5b96cd0b621efd75cbd0e5437dffe8162ed95a822b8411a7cd94d774a911e4ce0d515ae6cce8a9b0a784f4dfb6a3655a353563f7776373ba35df153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c4a5f750e3de6b4bae13f79f9cd845b
SHA15fe03d59f3c6a63bb8aa974e0371aae53089ff56
SHA256094684fc4c10bc58ce2927166075689742dffe2f4c8f36e9c03821a71faf52dd
SHA512bc7d93c641e079514aacda3bc09946959b5594dfb4bd086dcc5dea41d53f3068e54496885ab938bca8b7ad806fd56b147d75fefb317ce9bc23a5edcde351dee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d137c4a13b83638424191c58032898df
SHA18023256a49de2f6a75d32401ee28c77f509c9c53
SHA25688ea5d910f761f540176f796a750534e99995b9abb2cbd0683075c4a9ff5fd26
SHA512d091ad651ecad7588800e9f4c140865d4f97158ee02e30d05f9d6232860b8b96717e47038119d69ae585bd20d49195a60a02750ee5331bef8ed1c0f7c76a1a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597dd09991cd8a7732f77cf53377996f3
SHA1aebd8ee0cd0ed65119c5c49a112c580dba48267a
SHA256390c17451391e448975cc7a239c2677b58d8445af250618b98d24bec7cf442b3
SHA51200e8633ee258cdfbde36b1559eb1092e809efd1e821c2e1eb864c8c2e3662d393e2920760025115c48cf3fa4165b9ea4296c38bc8585be9cbe8cb0d5dec49278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555448ec5030e05eb508195a6318e0bdc
SHA120ef85277a865c476e4d62f86e3b050a547f0de1
SHA256082fec9918230f79f1bc65ba2e4db30886a326520cda6b2a8f2e63c9325cce81
SHA512e93eb2a8acc6d9da591e3c17571e1649ed026ff6ec5cb20aeccc04d1a08bc713fb3749ddc0d85d5eb86c0fca15390a4f556cfce307a06d8f3e8e1f7eb6da783f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585793dcf58131d9bcee658a3def058a9
SHA1edb9d75a784189dfcc402f0e355980a6dfb27da5
SHA2567134f69e0f1febe5425d7d3deb6f65cb91309c1c69218a976f2ed9c9babff4be
SHA51247e2e9d3510aafcbad16a957405f5dea6da7d45df4ad1714b9e2566ee2e2fc17e82056d507cf1f24adf9da87749c5ce5dbd9896c8318089cb89dd2d25467cfdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5332bd97c75a9383ce16d9f66d52ec449
SHA1bb3fc847411c945353ad0e6bd40f15913b1b5337
SHA25651795d9be6a519ff43ebedfc89773c55de49afb7ff1a053395a1ebab39010c92
SHA512a770beacc1b89dd48a2fb7aaf66a2c4da6b696594ea9270a21777eeb2a08b0e1cfbc3f405491f85e17c14e4114fe6448ac0624c9196adaba16eb5b977ba0b72e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b64cc895bde494afdf182e9d1012e54
SHA1aa4dcf426d7b7ecb8cf2ec08df213460b2aeaa00
SHA2562799428e06305eca00940bdd36340f5a35f1972dc098ca936ba78f987ce88a3f
SHA51203644434143126345cf7c5179285c222a0c88eb82ec1b9f06763ab82b988132969cc123315b006cd9e8ac80a432c25f4c998016c7f624b2ac4ecc8e1d3a717ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504db35f2112afe39edc9d9c41ab5cf84
SHA121c61bdb94a7c736e990d7af947ed45514b0a5da
SHA2568e384321cfae710bb02aeec14282c835e5320c8c90abf18e07023d9f8d910641
SHA512bf9baedc58136d505dfd06cafbadfe198be7d0401ec8df2bbf84ac9d2253047cc8f5ee02188b2b6a79c8d7cdc6ee8f8b1b4e3b1d6eed6bf40efd0365d88ac9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bce1b511cf8f425319b6c5a31eb18aeb
SHA142a2fd115b71b1efaa5f0274663253ce2740c542
SHA256950cc4af973fc77f2b9b5bb1c7624c4bad4125454af43c4e43d5e3fb305ef818
SHA5128d8908e9d385f3978c10127eede11f4ef4fdf80713bc11417462be49c853f9511cd46e2a8a9fe12a7860e595844e63887544051b3dc6406b9f5c0e43a901449a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511c639569b7ebdcb832dce9f6b3ad39a
SHA180ffa2736f9b09b0a0ce8efa581f93589d82feb6
SHA256228bf3733ea5e6bffdd7d3ef97cf2220051290dff72bec886ff488e944e42065
SHA51204005fce094aaf88563070970313236c952561ef8f5e3462366ab341bff66cb5bf1e00320abf332c54d108f4dea1bec1f56447f86632c7ce652b38b555e0733f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a72d10cbaac34692d47d2daf7ab0c15
SHA1e237384c0f0963cbe19c22eda4a4da40502dbf16
SHA256da3ef64cdabcecf5dd14b2de551b0b30189e074d3d9f113d2357aa06a88f1dbc
SHA5120bf98078caaf658c0cd89ba7117f617cd103fdbc7bb44599bffb685bf02e3c344400d9a2ec03598dbe2039a31388ca4bc1b65944cdec973ea722433734bbc3bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58227eea32ade7da24f6899b6ae63989d
SHA193f8843d134ac4a1cd32f3c9e9f84828248003dc
SHA2566301e4cdf4e8266479b09ab46ee4d308533c4a36e6bdfd70c38ce0950ee4b1da
SHA5128432b399babff3fc1141571ad3a14ccf54e4af8fc1391683e4ba8029f86b8fea716907f7ef4625931c64549ec81081391f3610978ad7911a79b51def09679346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a994e2cb02083c89fa96aac5e3e9c18
SHA1b54097ab60cd53dfda9367f30318d0121e622d77
SHA25607a1c4bc851a2a2010d897064561d229fbcc38ebd5fde8b8e3979ec7617fb315
SHA512b8e7b1438c92d81948af45c0fe157f60d2f55b0cdc40f9fd295aae4c46badbc1c73169dbc61a349692eec960e7002af2778aa3ee950d0e4b40f56c5e73cd4870
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b