Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
b1d5f2eb26c23d0d5ed544a50fd1839d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b1d5f2eb26c23d0d5ed544a50fd1839d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b1d5f2eb26c23d0d5ed544a50fd1839d_JaffaCakes118.html
-
Size
20KB
-
MD5
b1d5f2eb26c23d0d5ed544a50fd1839d
-
SHA1
2f813289e93c675d1f49bcd81c3afd960f8c6e96
-
SHA256
c2c6dbbfcb509b85174404b745f4269886d1b9ae5ce3247899a6fe08f70ee071
-
SHA512
46a57fb3d9d808d20f3e042448c85d56c624752cd1efc67e64fcf36d72817177a9e5e705257c568af4e73f6dd8d5b3ec6304e69288a993442b7b78e3e9f463d4
-
SSDEEP
384:dU5A8XllgUOttR4uty4TGmQMvsU949ad+NBxqPNBa:dKN4TGmrsU9Qadoxg0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000c7edf2c23e6fe28ffc9d5e1f5337646ec49d86c0c2637a3379201abaa372fb5c000000000e80000000020000200000009a08752f3f13050253e756c7859c453d488bc4ad708c9d63794899f845d0a7a820000000d586d31fed88ea83a06a03cc5eac92896fb49cb1cf07ae1450f3d3d1861f5ba540000000b5f3a031b6ef70224c46d378eca5b6c5499d2be4c0aee5170fc0d0a2bf17cd018c7a8348912ddbf8de7611fb6c0b028591d8b29e760f39e0728d402ef7391581 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C66F2D1-5F67-11EF-B44F-526249468C57} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430370249" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6001e06074f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2724 2280 iexplore.exe 30 PID 2280 wrote to memory of 2724 2280 iexplore.exe 30 PID 2280 wrote to memory of 2724 2280 iexplore.exe 30 PID 2280 wrote to memory of 2724 2280 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b1d5f2eb26c23d0d5ed544a50fd1839d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58efa335ff340aca188d5e57c584bf4f6
SHA1893dd9d0744f0eb510550bc927e3157705f022ff
SHA25600a1f7ca23140680fcf673f5da76e353cf5d3376fcbf33fc4cbac3e9e70167f9
SHA5126a0684d7d0c6959578869016aaaa4bf0f4d6a1f49b77777c6f8b925495a5e5769de7b6d7619912f4991d3fa3c8bc05ed2b8ed74d1e3e1d172f4609b9b08b9b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5299ebbec86f48a57dff83c5bd8bba121
SHA132a7d0f591e73095712e2aff803921401709c99d
SHA256218bd4e6acf604255f4bd6a08631c202bf6aa58ab64f0cf27c55d6cdeb2a6a03
SHA512642c04f4db14403e8fce7f862969601577f0b22cc5344cbb2b5ee53bed08462621ed6ac3238b2ad0967caa877b1135b8b0c3b17c3e8d23bd635c27548497d89d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b52158dd30cbc462dfa4134104d0fdb0
SHA1408b8be294c032bd1b1ce1b3ad7bc916fc0a6801
SHA256ccd2937dc177ec9e9b92d4553fa9b54171de1ddbc7eed738d58fde0342b23498
SHA512259f281c148a9fbf9fde0412b92ad75f4effbe603e988e42b6ed8eb3a20a1fb876a60e39ca199cb3b670eea8c7a6e2d78fd75ee55abfa185f6583e2b2ce5a49b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f7d097c970a0aa5d8a045650bcadd1e
SHA146ffb0ec52f6a958999fda3137cda4ba89b56d09
SHA2560fda7129245f2103672af721bc68273f58a4ca412bf9ade20f53f57d0bea206b
SHA51281c34d7459405f8653e8aed6f6f75fda0905a64a9a890f074baa9e1991a5e9231e0934410cc8f7771ce9b2a8e3f997729c26c4b69754c9389d0af275fcefa821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d20d20f7a70133dd3bd03325779ea7e3
SHA11a27eb58605dfce8ab4746bf5f93f53920a99054
SHA2566b24946b3bf030742ce41a6686ac6cf953a6bbdf758252805efc023e75246686
SHA512291f7d4ecc9362a1624db4e17101d0aa911ad10ccb4fb54918cc2cc23840f8f9f823970a59dc3d2327df277b2d7d6a14e6def4f452f02a0c4a9b66a39f53b2db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5112c65d13ad03c884615182292204f4a
SHA1dc7d508c5a3b53605de2664a07e612a349f9c538
SHA2568c372f4e637e6b15c26960ace40152f26795fcabd5bdb0768b2c28f7200ea4ef
SHA512a3d4a09923810f7fd461516c4686e55c31b6c9dc92266a4ecbfab99bd8438c5c152849314973a948746a0c3399641132d74f39f77fd07c5ae25ebb29963b5f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e2b434d50d440f23e79090bbebccdbc
SHA1066f1f1433f5cb4811df6ca2a02cab36e73f0c93
SHA2563f42f7995c45afdf10fb9e55ca35e1c2a9213a393abcec691634519d35734b13
SHA5121285304be9ecb3c67d939a6c7caa48a53416b41efbe09cda8a0837d32992863459d4fa1ff75406481f8f393f40e1f0cd425dbdc851f8b6630da406ba0126a84a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55abfe94d41c511caa1759a7439e4e894
SHA170e9ae7073014960dbcda0bb0f010016ac792213
SHA2568b8275fc0d3bc87f94e6593ec2c8d518bc10cff16baa2f5351daa4ba4f366963
SHA512ca27d9bcf2d16bb97032d086bff970e2aef1b2742254b88bd8d63c879e9c042d6eeb58b3ba00191c673e0e27935ca553d0e8fc196a91909baf1070469c0ff274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5351b8cb63d5dc1514a1c14d512fff754
SHA1f7c79a4469e5c5987a76eb2cdee9205bfe6ca218
SHA25686e4408393b0e7244250209696122c76dd50ad140bf4f6a3600e5199dd12bc64
SHA512c2c130cf6807d10627887ca93926bbc842e300a1e7330ec6ff263b920e3cfae9076c212a1d2ab0653919fd06e8553cd79b9c3236a163d2b5ab100d79f0dd01e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53872c8235ef70b2fead2963e6371aab5
SHA106f4c4d24275778e1f62408aad5e8e2633690e01
SHA25600fa1357e2d0f89505c8b954427a593016776edb85b9ed58a0fc8cce3f7d8d85
SHA512b7d193aeeb7d1c5a0fcbfcacca7d6f611d272acc79ed7fef2d23b20b2113d0c2fa9d06d3d193fcf25f69f9366e74782a97963c8bf223212c1fc53dbdd30e6185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54abdda66bc547d109ce8fce5cfef4e3a
SHA1970e943562ccc7afbdf4b0374323f9cf5f4e132b
SHA256195451b0cc37137a10ccfc3bc71abc347eba39725a9dd837c0502492f044dbd6
SHA5123167a88155a9b69bbd414bcedadf73a2a28133e97c4c1cefa7ef1c9c0576ec5b63be359659498767677d158989830b7068916687bad53b811456b66eecde8031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a308f453f6e5e340bff51abd6ab1445
SHA1414ce5412a383654adac052b6a3f7ca1b9dbadfb
SHA2563c73ed5d6114415416ad0c54e35c10cc0f904091dc008c4e8222ce08d1b67d55
SHA512825119de238e7e0b812054afac183c4c9682e922245deab32740231dcb017a4d46e75f37c8e734c35cdee1afc3ba240abfdcefbe7986db45cc4883b790eefb03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5843dd3354807b525c8b1762b0c5646a4
SHA17fb89e8c2d15369895371f2cc6086909899ff114
SHA256871ca8a7460ae9c97394693e5f03ee86f62f79d61265d914b4588c1516cefdfb
SHA512adf3ad2464cbe1423fbb796fa595c18b61ade4d260e402cba5ef138964b44804a067148a950579d28ed9d20935351279f13163d5d55b5d523b17f7ec326aeada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e12fbcdeb9a7edf97caaa29af988f009
SHA1bdb6ee2cc1d22c57bd8d1dace05f964793b01737
SHA2560f2d54658e07da2bff85f384386f97de43527a0d791d5e31b5c5c3f26acb70cb
SHA512b3aa2d8a58965dfc47311f09361df5a54e9e1e248866c3b227b17c669a0cf80b6d5ef16fd3467216027a9cc90d7326689857d164f1b75b1d8fd82fa19e0fde5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5415b0e7d4a61275070a2c3b462f27cb2
SHA1db21d6ff4d8fd05badca2e51c98f3978453a2fe4
SHA256693e364c5cf4c5decccdb75f877f453257fb2124d71fee244284b6eb31c6e878
SHA51203edf677f437cbf8fd0476bd6ed4c7783f008414703b1047a1f661a6008a0e04d3db230d7f03cfffa3d225504d595d1d506548fbb0e039f8d9a5294d9c67dbe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dc1cb7d875ddab006595658c7c16f6c
SHA18bffab918c34c3284abb91c392070ac815219ac8
SHA2565902abb3f01b7c8c68363ff0ab9bc5b3c510d6d97601839785e1487a7cf65ee8
SHA512ae3ee7b93a46234bb91206405bace8b0748697bce65c0d9f4582eaccbac27f4c0870e6a8dc7f3a997a948c0e4b3b1f6836059dda962d520271775339a8102cc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eda5e75891c558acbb0683b5ec292c6
SHA171880152903b9c498b6f2e5287abca1e7b03c2bd
SHA2566b6bb0d649ed02b7f27d1e812e98515e2c5e426b4c4ce110cd2735dbbbd856bd
SHA51210139be3f33da867a6d34a7676fe65998cff9f109bbca8c55e0fee8269cab03dbf9692dc5b5e87fa1156cc7d2cc8f47dc3692108d226e3fdb0000002f59a6abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5791eb2de43a7cc1c44f68d7393201021
SHA12136fb1f9e37e2ee1735e0873d7ff4cc1245b547
SHA256d4e37d9599d4aaf5556929be2fdda040fdafff2a9a36a8bce1ce7fc9752aa499
SHA512c0ed400177aa175f1f7f18ee3cab05cba374373de51361978a80cabb30f4e52d4f751978b267c80861fe5d5a123a967b4a843a941041fa736d7ae2b79bcefb39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56333f59f5cb7f8ff760647cb7eedf15f
SHA1688b600640dc03708ecaa7e90e9c1d148ac0ef7b
SHA256bc307db28c25278c3a06a6ffa26f1af7553d6f1f9f0ac53e7cc3fabd8a67942b
SHA512e7e111ecf769351200b5d519988936fc81e3e58e4656e51a5dfce5494b684f2b7c934673fa1040b9ce551c586dd2c958240d356ddba9fecc4e6addf11d087e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c02e27281a2b038042915b79ade022d3
SHA14ca300909977b2a9ace92490a1d618516f63d5ee
SHA256179534aa9663af6f5d298220edef030c8576ee95709f8863d442709aafaa11fd
SHA512def834e1b802e58b90445e4fbbf06d18f64fbe7b1c0adc67e6e5cc63e58442a451e8d722963c5e53a6aaa837e242bb803e3f0eb39e63b39af9bc2860c2590bf8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b