Overview
overview
6Static
static
1URLScan
urlscan
1https://grabify.link...
windows7-x64
3https://grabify.link...
windows10-1703-x64
4https://grabify.link...
windows10-2004-x64
6https://grabify.link...
windows11-21h2-x64
6https://grabify.link...
android-10-x64
6https://grabify.link...
android-11-x64
6https://grabify.link...
android-13-x64
1https://grabify.link...
android-9-x86
6https://grabify.link...
macos-10.15-amd64
6https://grabify.link...
debian-12-armhf
https://grabify.link...
debian-12-mipsel
https://grabify.link...
debian-9-armhf
https://grabify.link...
debian-9-mips
https://grabify.link...
debian-9-mipsel
https://grabify.link...
ubuntu-18.04-amd64
3https://grabify.link...
ubuntu-20.04-amd64
6https://grabify.link...
ubuntu-22.04-amd64
3https://grabify.link...
ubuntu-24.04-amd64
6Analysis
-
max time kernel
137s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 19:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://grabify.link/VBKSOM
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
https://grabify.link/VBKSOM
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://grabify.link/VBKSOM
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
https://grabify.link/VBKSOM
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
https://grabify.link/VBKSOM
Resource
android-x64-20240624-en
Behavioral task
behavioral6
Sample
https://grabify.link/VBKSOM
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral7
Sample
https://grabify.link/VBKSOM
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral8
Sample
https://grabify.link/VBKSOM
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral9
Sample
https://grabify.link/VBKSOM
Resource
macos-20240711.1-en
Behavioral task
behavioral10
Sample
https://grabify.link/VBKSOM
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral11
Sample
https://grabify.link/VBKSOM
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral12
Sample
https://grabify.link/VBKSOM
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral13
Sample
https://grabify.link/VBKSOM
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral14
Sample
https://grabify.link/VBKSOM
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral15
Sample
https://grabify.link/VBKSOM
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral16
Sample
https://grabify.link/VBKSOM
Resource
ubuntu2004-amd64-20240611-en
Behavioral task
behavioral17
Sample
https://grabify.link/VBKSOM
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral18
Sample
https://grabify.link/VBKSOM
Resource
ubuntu2404-amd64-20240729-en
General
-
Target
https://grabify.link/VBKSOM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0a0b202b7edda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000080042f5bf334e9194153d661345896268df26daac3a5933513a9362926ade975000000000e8000000002000020000000c3db8ec371e5b52610a737d96498a2165c903d94af47b1bd20d71a49aeeaacaf900000001d0446a4c28fef6b853bd03186e5ce76415493b84d2a0edeb103973b38d78515a9d4f483339f08a22e97dc7b4f140a100befd616f0a06f36830e98a141c4c4cd1cdb300c74422cd86d1ae89f0cbdbb593ae36f31cd4bfa6f3757b0c7fda8b7324db862c782dab86f29fbd5ad3be3d801414f0f3bbbfb5bf6ccd490e96f5386ff138f2990243f1d1907fc77674f4bda2f400000000b951355094f91d9551a0ef787334155803e5265c59004421be3cc8c027a039610e1a8943bc042aa512bd19be2dbd5094fad6fe1a9b1759d556d61250b59a2d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000005c16798b9f5b67f586df58e804a980253b63db728ee27b51d3cc4820d6bb8c7d000000000e8000000002000020000000b293069516e2f53581f29304176c63c2ea5e53386427c57904c69fb9a3e89fc220000000365a29b96c1ddf619f13e7e80d5c379e11348cc939e2846936defba926a6e04540000000330b3a609bd73ee052756448bf130f39e755e2989f4a7bba81371f5f3c2c5f79354b4fac64d8e6e57f8776ed119f8b34c94686e0785daa8fbaa66f86e0f39c16 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429739142" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{217DC651-59AA-11EF-A205-6AA0EDE5A32F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 1856 IEXPLORE.EXE 1856 IEXPLORE.EXE 1856 IEXPLORE.EXE 1856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1856 1724 iexplore.exe 30 PID 1724 wrote to memory of 1856 1724 iexplore.exe 30 PID 1724 wrote to memory of 1856 1724 iexplore.exe 30 PID 1724 wrote to memory of 1856 1724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://grabify.link/VBKSOM1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD55b389996f481da58d9628adb4894b6b7
SHA1a2b8c2b1e2c123d536f56e044c2994a53b2eae31
SHA256afb0100bdd73e4112d5715b9fbca31ddb8ee3953d35a1bb73d833f52da3b9142
SHA512bf7e285a4a8eba97eb0725ad24884cbf73fe46f5b55e084414d3c34e69f178b5f4e824cb1a4c0311fba16d8af797279a73ef030ce6af82d35bb9d29121154386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eb75a4e7a19b0b854f328fc1cd306db
SHA104663d16fb921bf74b2ffd27aeb55ad51cd922a6
SHA2561eb1bb031b9102c8f2fcc80e08060a49c1d9d79e02eb13f96692d2ce154cd320
SHA512b8ab7b0b97a27542f20a2f64dadfbe2f61f2a2f7011ccc4c459f412878bb1ed47fcf314c5ea972fb9e25e92fef65ee32e1f188793f76d34dde3d1db04a803084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb379dfc4ca0ddfb7e10a9f59f72dc1a
SHA13d14e526526ecdf8e5a97342a59d367b01fe9cc5
SHA25649ed67fcd7597167189c122ec2bf8f928b0640b9d6c165d76bd1880eaf602243
SHA5129107d7eeb80adde8f875526f04900413f832c5e63da80fff8a8939601690779273fa2487e4da2791c63cabe30f41bdbf46afdc3e5ed4d7c3175b0da0102f7500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dd511c52eb9df7d6bbf7b5bd52b4a20
SHA1dce9622153f7a9222cc4614fcc203fa7d50e9b12
SHA25692610449c82693f139d621615a66bcd61961863f2235357607c961bcc30565be
SHA512cfb60f4d5ff3d6a9316e92596c686854827920e9eadec7e652bf7b49ea9b1f192b8bce858a2f038123aab60c25636fca18ad29a8add2023deec8a5a7f66e497f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a699d0acd4857bc3291c928339fe564
SHA1aeb50b24de60f69a92019d764cf65404f1932bb9
SHA2563b063bfb75fd13aec1b7e493d0aaba45f00c294a4f9b154d0adc24729e2b4ac5
SHA51284e33f126ffe7d75849fd3b3425abd7ffb5df95f355197502d705944b7b49ad11138542b538fdc7c4b1946b3570f0ee012b923a1e78e5bbc7f3dee5658f2a13f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce4bf677c07f769199cbd97780b92af6
SHA1459abe0fc79a8b0e5c15894fd902ce65f850e3a4
SHA2568e63c4a7c1f367891d38d45dd3c133dc8664cc4d23392f31d2ed3099d835bfdd
SHA5128e9f5d37b80169945946e689207f27e26f5485a94b0572deef17760e3d26ea997403481eb48b5dc50db71fbd10ea4d5dc164eff3f99d47725abc6d44ff2759dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51881f4c1eb9b6751950540b3f7101396
SHA1b37b93f05ea411f8f32d830d76d54ba43b22480e
SHA25672a5331c3b5371eef26ae9682b61b00f57cfbc9c314255f1f696c27852552234
SHA51265d03cf814e8ffd469fe9d5e522331839aa92e068b6d92e571e857bb86d1cbd913e612b5e9e0351c237e501d50b3b36d8f296db63ae0567180e1948525d7f076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad2170626ebebf13a99f17bd0bba95e7
SHA1d5b09f6c5f983b0ae40df442fd7a2466332f11a8
SHA25673460a07ab107fb8edb7ee4f95787b74b789bc96f16f2f75dc7a5078c5077ead
SHA512b366cde4ee229aad97dba1bb1eae56eeb7b13129d5e60f5f118e93071eb8ed2945ce38ea19de2c3c6b2888a542acf8a10034a1c2e83c8fa20540fd51c6e50f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9f2d2b968cd653a822eeeeebf73759c
SHA18b1a0d480bf79ef28d11a043b1592750b9606441
SHA256be41222d538d98b14a37ce282a1f76f79017d60ebdde775e179ebb99497fad44
SHA5129ffb54f28e90050df626090c7792850a8a43ef4858f4251b612b6e83090b0756b140572b9b85828ebdd822567502392c47944b890d85c76127359172353570d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ab63ec11edb302bd220a747bb79330d
SHA129a61ef460c15153dd4a2151034bc50fa8d9e6bd
SHA2560f4b9199d299fbba87f546c3ba0ad51de5f3a0666ef75401852925282bd9637a
SHA512357e9a8c26310bd19cfae8f0615709663cc207572d269a47c1d265a7c8b8a549336e7596d1d3c6475feb53d6a98a4f6cbbdaeab06fba34a0b37cf65b546375a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dee560702f3c5e7a1a28ffd7d483dc5
SHA1c161f69d627895c22d8ecb14ce7dc18cd69ef7ac
SHA2569c249a499ccf5ab2b3d9568cd0aaeba7fdbe18b433346f4c910e8f5ad7c19eaa
SHA512631c1977574ca9632be158098f7e109cc227af4ecbe6c461243a6344a4ac974273b5d4956896c738e60a58ba7de2cb052a54d563c3aa7adb3f66408c8ee0509b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD585e82cfd586b2b53e6b7930aac36a02c
SHA1cdfafc0d0b1c2320cad8c0181bb9047cb28fbc65
SHA256cfc8aaab80e3ebad560bc905e99a8bd3e5fa82bfd6658c95a68cb5a85b94a757
SHA51298bc7d6313144d79f68c44932118dfe4d3fde5a3082bd9453a9c50908337f9c5a39411b1fd4f8ef31c4911ea1a366011b9bf60e4f449dc0a327c8d805b328cc6
-
Filesize
22KB
MD5a072022f29857b567e3579ab8e962612
SHA1cc171193ad4ad216db48897711c24a8960ca7214
SHA2561fb271232069bbb51c9738ce18bd9daa6c4b5e0497f3ead1a5834946281b905d
SHA512508c12721a067ecda3f1961f72a50c17c6f0e2cf5d70de03f857a1a49cff7b8ea72d09b72f953819e77d4455ef7c8d39266f996e2adee469a11e96deb55e1194
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LPQ313RR\favicon[1].ico
Filesize21KB
MD52e3ddf160b20974e2bb405b8f6422342
SHA19ec93050ac2b80092dacc65d8b882d7f920e2b16
SHA256b00b8cd633d0a635c5840a2ae401724999d670fad974758220521143263b8d21
SHA5129471576f8b283e5689cde21bf1542b1be7fb90ea28a6d762f481ce0739dde46d2289728386b91ac0c14aefecd6e2e974e36e5c19a360e9aab73098020489feab
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b