Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 06:17
Static task
static1
Behavioral task
behavioral1
Sample
b6a20549f1abd63c13312c3693c52b4e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b6a20549f1abd63c13312c3693c52b4e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b6a20549f1abd63c13312c3693c52b4e_JaffaCakes118.html
-
Size
25KB
-
MD5
b6a20549f1abd63c13312c3693c52b4e
-
SHA1
cd61ad03394dca46fc73e0ca1dcaab7b0393c9f8
-
SHA256
96248091c5281ed650c90c56efae0385d71255908dc3d9f1b8e69c0854093704
-
SHA512
8fd20072a2fb00742bae91e4b715a3c7e62b66b535b76d201d780b8dc669507ae593c45132ae7268dcb3565313e8c6677a3241d897d990fb4fef816b0e89b39a
-
SSDEEP
768:QqGynR6dkqGLJZH2JaGRXamidaGnEmehH2cse:QzynR6dkzNZWJRigGEFhH2cse
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0b3f9065bf4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000008920f385a9821fa9a8dc8d6c61b7cd21d6011d5521679150f2e6009803fcd4a0000000000e8000000002000020000000e8e7e50b7e0a405f1ac447c9f305e7da34971f49e160abdd3a2c387d998d84ea20000000d85021ac9d161a0e0752d5003d859e30a410a63c17264c17435c5e5ee3445aa4400000006e0c55ab6fa36d1c97c9e6b962012de2a5cba979ecc1d54ac31d204748573d24689af92eef83e40e1a86f4790c37289e3f5e39455ebe65a629e82b7465ef1887 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000002ee768a76c16ee44b8629bc7226146fa6af08ab3301d9deaa95789a8d3305a4a000000000e8000000002000020000000f2556134e202708a7ce12607a40a079f80a110d6f3a99ce79fe84c8e5924f0869000000083e78dd465ef8d5eb9d4442e973487427cf2f39213d0a1593f252ba11e49f06b0127a3724309f3beb41d50717f714e32b1c0abbbf5237b236e0d5886f0ad828549c9dc1462aaa366bae35cc5e5061e045b05d52c918ffe83c273b6842b0e8def95d0597df57ecdd0e7bcdc333ccaace0e516ec7065e2e90565129e420a4fdb778e253bdcbf77ce85e27610c3e9c496dc40000000a1e0318db8386c74d307aa966e9896ca9b4e514dd6189928009acabf3f838f639069c62d5c7f7ecbf97c9a914c0668980f669d04358c0e0ae4cdd18c05f00d45 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430469311" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{327F3DD1-604E-11EF-AC6D-CE9644F3BBBD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1288 iexplore.exe 1288 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2392 1288 iexplore.exe 30 PID 1288 wrote to memory of 2392 1288 iexplore.exe 30 PID 1288 wrote to memory of 2392 1288 iexplore.exe 30 PID 1288 wrote to memory of 2392 1288 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b6a20549f1abd63c13312c3693c52b4e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d021c929de6e264a40e5e2c6e616204
SHA1173230e9e28ab7a2ea9b65de343cb432091a9b6b
SHA25659e1ba6a4a0442c3cc873527e05a9a01057345c24604e7942f429d46f5378e81
SHA5123d889989208e6aff58d3d50fda2aa2dd25c15a702ea40b35df7e9a6b4680fb6334e81d719d753e404977245b193dacd313b4b0549cb8d578b5ee9a152078a6b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51797c25f885bc1472cf54f4205de9f84
SHA1a0f0c2e1a0e551932384a3c83e4a7ca64b3be139
SHA2569d96d654da772418ce51a3ff0ab030cd629e644e7fe78653b17774e7caafacde
SHA512ad5a7b38b9802c9c120fccb43a8e289531382c4149fe866eac85449b6fc59dad6911886bd5de24d5a1fb3d58e870df48e293abd4906eec08d39a7c0ccdb4d732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f55fd018a60ed4e83fe45bcc00cf870
SHA11d30c236edc8a5042f26b42f029e9f1d230a58f0
SHA2563672155221691a3b93e2ace376c0191ee3d5a52269fef8cb0807c9f2d28405da
SHA5120b314099849c3b27f876df866135070355a3a4f0d656db0e68130163173c8976b6ebb40cb40ff1521355e77eee691629f68376b73576b6b8512001a6e194e2b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ec1df5703a7422df343239a39248682
SHA1ec6ea5e9431fad73c9c3b7213de75886391c90ba
SHA25602d7e3f05979a73899a8083b6d85b8b5a574a9af1ac34103108a4d9eb3117752
SHA512f115dc8febc99c881f8940d8f578db78124b7a89d0d275aad70e427ef6e00be49976f38cad560145e3e7982425377902fadc289257916c5f1f76bc9b4d85a418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5982926b76f6bc7375d817a3c0eef154c
SHA10553c0001169ebc5955bed1143c72675116169b8
SHA256685d3107a4d97e9c28799ec66d134b05057be9f87e164d0da704855c42bac27f
SHA512988bb2c5dfec8370592ebf163bc74a987737e589a8c7b068ad0e7f584bddf8b8d64ba2e717f466d703e93872c730e17e049f89831361def143aeb8cd4482588f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bfe3d3b06fb4f96e723e3b854f9a38b
SHA1c2227e723b9cdb74c4208657adb635ae430d5cb4
SHA2561394641eeb5017e7170de12ef97f54e87d383f999ed103503700f42356f222ec
SHA51210b5ff751e474c6b9b7535255f673f3b0a04a8b1c602741f23a8e3fc04bbc5e81ae526c5a622497f173c257518b435fef7951ad18f4e36bbf367cddd9d8807c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2e1d3f82a0c7f78a68c53523c096a09
SHA13054a7c318a9845f131191f0bd2878583957df47
SHA256dd7b9834f94c3c48daf3a1143d8162d1b0a491bfebca528bba8db7bf97d744bf
SHA5122f33721a18601993e8361793c7dee4c6e1f1dfba85ec3db45b2d7aa8a023fb1ba2331515be71291a01cff759ab07da7db10ac3cbe23269f63e5d8425568d1400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5216ca95322b1095a2c205fe367c1058c
SHA1041484f86b85a8c22ebc04ca566df1b2228deeef
SHA256ea617f69b61c6abb3ee6cdd68f687fa74226b2b8b0d044fe4a3f065466806f4e
SHA5127138811e71c98252df844c350078736b9d16a99ee28801b5889ae21806f06a58d77a83ea2621e0604e74073db6553e36644c55fa3840df8083042c0ccdfed8d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a15c24d1cdae78adfaa490836cd39b21
SHA1eb19ac62033c67d6136afb2e4d521c13106ecce4
SHA256f26f78ff46c6b765fd7b270301b927f27527978527ddd063b8c7baaf172ee810
SHA5127c1e0610237cffecdc7c55a811ee9f694f3722af92435a9f7bdd72c39ca27738afa2e24a528f567e5145f3f46f9bc51089e59d37de6823668d70329c274145e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5723648e5f530da22890aa32ab0f44f7c
SHA1c86d0645f25c4cad2dfcad08b08d22b9550fabc8
SHA256e3f37bd460e258aeefe4829fd7d484afcc20940ae3ad7465005f515aa5f7bda7
SHA512b9db45ebecaf97d020916e698cf576c321081937495dd9f1c5e206d15dc5c3423021ba138aee524314cf3b589cc4b88eea655f1e1356214e637036930704b78d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ff5f89620718e83d91ddd4fe3e27736
SHA189180dac059c73c5bb55d3cef1f13e5c428f576e
SHA25609ef09dfd08f3d25f5626963eb10d7e9582b92135d5988f689466408d8b08b13
SHA512d7d69ae3d817a9d16289d156e5b15d5566368af1a029837babe58c9be0be4f96f3bc3846cb7b095899f75513548d8a6d11153b73c7e2707eb949baa5216597e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505a5069567a7b2f92c3d060d919bc208
SHA102ad36a0f802a296879b7f0518370b91f0ada577
SHA256f81be6d7210a77a167fa5dfdd9c6b80c5d101511c7647d84f61b99ddadb48282
SHA512f936ce040a2c8f565368799f6e29161df95a586ef74dd5daed2ae3d7bf6cb28d542ed04589f4ead29dc3fc5991bee84e09aa9da02e266b61207de0445f45838c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5628125f9e77fba8da5a53d650f7f2276
SHA1396a6f0696312b67cc1e7af18563d5e64be7ef9e
SHA256b40eb8bf55602e7132b769ac85bf67364be3633485b6557b441c7276c6f71744
SHA512ad876367eadbf03648c9cf820eacf7831823c49492e463a4ff108989b2e862c7bc29e5d031eb3c376acd62aabb14957a616f06d0ae670e7f7e4ba716bad25b98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5711447bc3b1b2bf718782c0370b31a4c
SHA16be67ec103f4a8e25b42b10a1bd44a7e0af82911
SHA2566c489b6efed71aafcb54045bd4e729bfa851c72535c027f049f5c72e25bcc02a
SHA5122c5685bee110dcba6409f289f7ac0de02aef9c66b700361246de2cf80b3859de746c624756b3e6d2a734e6abf62053bf0b365e2a5ea98a19f9cdfa61946ad306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586be6450b1c4712ee6eef1c83c7c1ca5
SHA1a12e461c8e083c40df8ca0094745d3c63e673cab
SHA25687e052c484ca99c9ad6264abf94f1fe41ff530875c0ad2db194a0a1b3b7f8b72
SHA5126cef3fef5505444dfffd0fb6803c38c8b9e1efe41d839e08c6f49a8cfd196d1fc95045e52030c0e322ca427e527314f79297027349ad963383473d24225f890b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8df8a7f178a4777a723901ee26d8347
SHA1a0c8a02dc3820093c89d1bb47fea9e9b160c86e2
SHA256b002368641214dd01c38450ffb71628b72487886a41fee8459e4c3f9c6437247
SHA512d8a46648b8a384332d81ac666d29cf5aa26b122312c31cdb93b531baea0b5ea19a714973cd01dacfb56b7b22dba45e1b995b1427307c941ac89de3ec2b29cc57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533ad69dcfcd23cd3626e7169da9124e7
SHA1fcd6e9eda25f500e08ead59003293ceb9197ab91
SHA25638584e388163e98fbb5d7029613f931c2449eed1dd2b4643768c180452542411
SHA5127a424349e74391d97afce4415b9e895527d3565496e6bc35010709332b334d6dad7540301698c3a1491c7cae119b5b6de953d465bc7175d3a3b7a89aa3fcbaf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c96a14425d849011d0247e9c18949b0
SHA14a45c5a395b96d83948ca17e66d96f828d859687
SHA2565d94019dc51adf9f85749afcedd5a711872d842690f25c3390becaa9cc2f1cc2
SHA5126df3e955a8781654775c7c8ee8fdc5e72a0c2e21591a3ec477b8125ec893e59b32719bfb32be24785d2ed60ac8588005617e63fa851bc9055cb95da29bbf803f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4167e5728423b128031645ec01b3f14
SHA1d86b239029d64ee1ea3a58b6b110aa4e2e2c0649
SHA2566aa80f82c466b165cbfab703c5a58ca28d0eab23f94ce2f2a23b37466877eefe
SHA512e0a18e334ec2140f95c0c63815b68e98dace0b339fc6bc4af9f523c9fe69455064030e7ee4483f5f03713b1b0409a5672b203f3faf4f88e931aaef60e1fb72a4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b