Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 09:15
Static task
static1
Behavioral task
behavioral1
Sample
aea8b9cd92632a440b7673a2d3b05bb3_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aea8b9cd92632a440b7673a2d3b05bb3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aea8b9cd92632a440b7673a2d3b05bb3_JaffaCakes118.html
-
Size
58KB
-
MD5
aea8b9cd92632a440b7673a2d3b05bb3
-
SHA1
cbb2681429c646f4a2bde67cfd579ba2f8c1b63c
-
SHA256
fb5c6cb00b081468aa7dc1db8a40873363a9a0e9ac3f4d8d3008843700fe5c0c
-
SHA512
ba19a3901969debf7926fa5c9f559c1eda14dc93708455a5b06cb0b6ff316cb8e8d9b6035e1e6a7b1d608ca48efa62bf63f03a0474af08bc90be4820ab12154d
-
SSDEEP
1536:7M2iIPi0rhkio1OetFRRMRvtHDhxWsMj32ZafnMxBy1DZq6JEKVTsLQ6PoDB:7Do1OetFReRvtHDhxWsMj32ZafnMxBy1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000cb94fc463043052bb5b0c6a6e53b6bdc34336dcd9c65217251a589f83d35a53a000000000e8000000002000020000000cec5b584b6cb9877f39dd8caffdea635a178dceb7dd3bb74084e31635ace9430200000005a82fdf9636cdf56add3cb4dae23a3d1f5bce31a34808acd442763c2711962f940000000bdbe8abd0b171050ccc7d25f5ee0f7b6fa84bf1f410fe4562b361933b36e897a8ad78c92c9a98ab92db64c43abcce6f60f001105a48ca680bfa7a6c1e640e862 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430307225" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CDEDBC91-5ED4-11EF-AD83-5E6560CBCC6E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 604d309ee1f2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1988 2548 iexplore.exe 30 PID 2548 wrote to memory of 1988 2548 iexplore.exe 30 PID 2548 wrote to memory of 1988 2548 iexplore.exe 30 PID 2548 wrote to memory of 1988 2548 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aea8b9cd92632a440b7673a2d3b05bb3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5922902fcafa29ff0cd71b7f3a946ff
SHA13bb9e30aee7cad2fdada3519257d8990853cb406
SHA256fa2552de23574049cb3e196b446720b1e2c381daa8069af4adebaa51daeeca71
SHA512cb65d0dff9b6b8e9b8fdd6e848b5515eae478d6308d30b4ad039a663cf46a4575f67b519ee6f500965ea1cc8e51c04f8fef38c5ef4dc9e4b5c9dadd2afb89844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5164bcf86310c951840debfba3f9f644a
SHA1f6338ec8e5e0d65e66701bbce9ba734dfd0859cc
SHA256f301e54f4434ba58b11ff18907506977e5cd2680688bacef25f0cc84b942c6d5
SHA5129c40908a09bdd2b3d012cbcb4a409f7f29e0cab7e3b625e6611a627916a975523f13a14be5c673a5e5b1830678ede38ce9045c7b471dc521f03863966a9908c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5723e3c2c8f1fcba4c949ca192e26c62a
SHA148a3cbf292190d601727239c925590ae6f3f6acd
SHA25635695b73dcaf0352f1b9d56c61c727c3923af3ec9720a30be8ba2d75ce54487d
SHA512a8993e4ac168a8aaa5e076ad8792aa29ac95c7bf8d1e1e1ee2d3402648f7598b441c4929cb9ad55be21644ace6c444d685499eebffb003a61f4bee24e039e2e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ef0f0f6e81be162272b7101562b0aaf
SHA164d7fc3eacaabd6b633a42c252bb49aaf7e20655
SHA256276c1e335c5fd955aa4f34f41db733c387c1de753b333d068c838622668ee181
SHA512df0ab18b48aaa3086943c7b43c298825858636ed22009ccee137be4766a7067105d07585fcad7e7290cf122697c919540527f9dd97d897d568810828a687dc03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54abf01bd5f11ad1fe0f368a51514e3ae
SHA12fbc2512d0788f90ce388cb68cf364f6210e27de
SHA256dcee095eb9077c58f737903f4f1696278d8b0198efa23876d66f4d9ab3a2f32e
SHA51245007bbd692e1cab30167d55a3ba9e3ab27b4989eb2fc68bc3f84bccf1b4da489b6a143467f2a1b6c871413e70cf92dc9a2319d5e72eba581b47199ff6b81930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c0a31ab22fd5ce7bfec0569f2d965f4
SHA15f2be6e313f350733c4698ebe7bd72af0ab37048
SHA256622c0896ce44f75e6febf388374cd6c77b98859418c645f2d002f369e50717f9
SHA512de55c29ebfff65392a9fd4e6d56183a1696b5e1ae0b88d3e1f8ec104fc1b88dda3f94e734fd3505353ea1d5171534e2d3a0f725f6287b5497db4644063f8bd8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507b32f89dabb8c6806c5dbb5da5416ca
SHA12f119c84b4860cdc510c59bcd045d6dcefdd28f4
SHA256073439e4e03f50a1f21f32f3d4f6f2e31bba48a57f2a0dbffd6f2c9b269338c5
SHA512ac2df6ca0582be877c23bba6edc67587485c173feb759039877f181968829c838775a56e42c156d728510650ffa513734cd2ea0270663bb255082a1de68ca88b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b591958edd0a8d5fe6c1691ed0824034
SHA1385201b27c450182190678a2cc0391e2d2d91fc9
SHA256102aecef5c06ee822a79aff1637ec975a8ae97bcf2cdd49b839ec3a6ae038c28
SHA51211c38b333c5beeea8a747928e3297c766f8e592012153079c60cb48d2efe32ca443090a6f0f868792fd9d05bb9db91bd1f905ff0c8a57def7640da9daf34d704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566d0803e2242d52dcdc05152e7cc05d7
SHA11780061066cf2212a148fea569bebd4ed88d366d
SHA256d7b6ddb11bb67f2d3e275fbeba929a7fa9e9cedd3e17c6526e846c64ea13cd40
SHA512ef90f2f0df7e6dceb35c33dccade8bf6bbdca673e8c6473d7e58ad688bdd6a5d4c1bda4d3c5150b5eb94921d20509b137df93cdbb4fce32418a7f924c893f0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59048818a3bf88dac6e5167455ac21d4f
SHA171710ee990cd57906f6d7cbfb8a16cd198081f9d
SHA256821c77a36ace6c2503039060302c502c392318f9933440299cbdd7d3884fb0f6
SHA512649f616a27e65ab9d442878ac465e730f599aaba21a324fc9b276116bd381849662c5ae594f6cc56042c4935e7a07c9167e2a1ed40e619fab780a1f8b7a21db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53425aa03255a16021bb7fdaf41afd5d5
SHA1311f11598dc3c0e6230051e67308efbd7036945f
SHA2567a57740bd1521546549e3e3393828d275fd87ec5a7f50972083902dde0583001
SHA51246fd153e2e2aae3a18e721ca16851df9b1ebb15a75c3598e6bc4b5be0a8f9b6398a6fa557cb73fb478d33b47814ad4f459b0525d16fe475863fe23bce8f8639d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af403facb57772fb7d37f763f449f72e
SHA1c57456d7af3bbf7aef15a1343777b3f57be55eae
SHA2569cdc9f3e776d8ce54922147ccd9fcabb949edda5aabb775b03235e036d2b6229
SHA51220bc82a03402a3c13dd4bbea2b41afd78b19d592fc302ef26cd0f782815dc03407c803d0c8d5c4c1c73faac2631df33d0798f1382e409d7f2922942bb4592512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55555978431264c8eab2cce29846f0b35
SHA1daefefd04b72d67e5b876d1ecd5837e2a4508486
SHA256095b9cdebf3958f9acf3a7d49119f44ed2731d60aff9a59fa2491878fc3a93dc
SHA512d2cd00688fe3fe4c5ea52794b2a8ce00738c05b9fe18f802a5499cc1d2da4edc3f391149f8ad0dc05183acb708faa3449ac492b620e4b3fa22d77d059e21ffad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528cac7c560dc952e83f17b7234d5b163
SHA176bef2da658ac2312545b1df465be317a11b6626
SHA256d69c08efc18f50a57d2882e54a2109e5249f8cb7e6ca1d1ea96a31fb6690c2e8
SHA51203b75eb86a9a18263b5074a2082b1a658de55569c2092b50f443680b72246d2e612d960711aede6f5e53a283dd1956fe03ceac9b15d471a5af5110a86e5f3339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a06bf608894aca8378cd00b9939276de
SHA1221dde184fae7eafb78a415b0eae32613e1f6dd6
SHA2567bdd15ef78d9a6fb419da3c7154151fa3d3d21d89e418e7663ee248693c711f4
SHA51280106b6a1cccab36f1b5d859cb32563f3388539389ffd9895252ec1fb34c7ef5101109e11efd7c37f83e3ba9eed44f0031306d9b275375f6b358f3b1366cf0e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa226ab4020ee49948326ca8bdca56f6
SHA179db095f03b358935b40adb2472c49227b5deb45
SHA256bbbea7d192b4ad9a72e9834fed30f4283d490c80a162724afff78d468b089f3e
SHA5126ed343580eef59bb5075a629e3335b78572d95595d4d3dec9262d2bd69a4cad9333ae9d76a2703116f06191f93dc1eca8b13ea147e3a022d8342e00812de01f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f9af883d5b9b3ef37c088e2778c542f
SHA108068183f9291dfd454f41cde4304ded1b6a2f4c
SHA256883ab6b39ad360acd2afb745d1ffc3717e925bf1f6bdadeacec391abdb07476e
SHA512baaf5d55a4cc73a947b02ffda930256b38b9cf32184b03a6a07562f95c536ab74730ce0bfca73e6bbd67d90b1ac73959dcb0e2b6d3dcc744908a8e4ba0eb608e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af95c06e46213058f5145eed0a155da3
SHA1e058b936dd26b44aae700e4ee83c2a61c9992d33
SHA2567789560f900b90a9c1d990fc77edc18327b57f204a0ab23a897678eae5370e7a
SHA5128cb983d2655a353940cc045f4e493af74644d6f8cc457c7281ab9293b103f056b0b69f3f6b7afb9b7c27292361cb1cd97b94bb2b678c7b646ffad745b5bcf92e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550156ff98056b679e2f12f3ee557aacc
SHA1715e5ebef549275002fc34aba5287333fe961bcd
SHA256ddf76ab90da1c11ea152be6f6420afe59c0813e03ade4dd9316feaa8343f9d40
SHA512a639e196b9a1eae54fc3b240d50737a7be2d8b264e7eb04f40d79b220f910a7d3f924a26c9d9ba91cfc0bfcd5c98eccad7be6d98839c20997959558883766277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f5f4bd804402e98e6950756b8231cc9
SHA157b8b40d9f8ff4dea323833a0570cae0f6477bc9
SHA25650694b4ce029533ae1e0b2207c8b8c369d8dbad004fe9b0a0d70cadfd81143dd
SHA5129b0feffbe2913ca563627ddbc35ebee5c2438b2f917566ed6893f07044e9c2511ce55d10563571f8525d3b3188c60dfc4d959ca4e0d7e31d1742d142eb78ade8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b