Analysis
-
max time kernel
117s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 21:02
Static task
static1
Behavioral task
behavioral1
Sample
dee55b1f541b6c22787603dbe24ca147_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dee55b1f541b6c22787603dbe24ca147_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dee55b1f541b6c22787603dbe24ca147_JaffaCakes118.exe
-
Size
128KB
-
MD5
dee55b1f541b6c22787603dbe24ca147
-
SHA1
42c47851468e37cee982e95ef345ab5555728bbc
-
SHA256
dc3b82fc2b1852077ff8c3bdca338c00d96d900f32c824b1bbb57334f88ce79f
-
SHA512
e37367a94dfadf3624469d1b322edfca09f7fc87cc062c8b9be94502d54fb17f855cd2359ea0058ad08f72aec32f428e9da3fd39d1e05f193f9313aef959c48a
-
SSDEEP
1536:dyO7GMR1PaIhihjl1NuCSxOPJkhMVQv+41a02wwHvefzdaCl1N+8hihnPaMRV:dy+G0P6+hSkhMMn1a02wwHGfUCkPaU
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\System\help.html dee55b1f541b6c22787603dbe24ca147_JaffaCakes118.exe File opened for modification C:\Windows\System\help.html dee55b1f541b6c22787603dbe24ca147_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dee55b1f541b6c22787603dbe24ca147_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20ef4a3e2006db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000e3a22de814447763bb78ae894f53416e8bba6a02676fcab81cc8213ad67de783000000000e8000000002000020000000981336029daad231fc863a4a0aaa3370d3b902dd2d6c512217366d33dd1e49cd2000000027581e3bd12a0a81cc7e7c42c93b83023510ad066da8fcfe34030c475d66cbdd400000005fdefcd07e33706cea42a8a2c1907f147fd4dfec18e5a0957c432789afa6f0448d1669f0a0023cebd825e71b7cad8e5a6ef5f709eb947357aedafabf801ebb45 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432423215" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B8A1A01-7213-11EF-A1E2-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3012 dee55b1f541b6c22787603dbe24ca147_JaffaCakes118.exe 2692 iexplore.exe 2692 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2816 2692 iexplore.exe 31 PID 2692 wrote to memory of 2816 2692 iexplore.exe 31 PID 2692 wrote to memory of 2816 2692 iexplore.exe 31 PID 2692 wrote to memory of 2816 2692 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\dee55b1f541b6c22787603dbe24ca147_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dee55b1f541b6c22787603dbe24ca147_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3012
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b53b07694cbf53ac59796d2faa3388e9
SHA10d5685002117edffaf25a366bd153539490e4345
SHA256d3c7ad4cc9698ee17dee02a2e20d92fe178f270b0cdcd28511d1c316c6cc1f15
SHA512409e4a294838d6f38c40da5a9749511a232be29b055da89dcc4498b1d7741b94f78ea0ea957137ee988a3b4e52d2d70106e50f1d9b2ceef27b35f8d141c9904a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddfcbad962bb6489f6a36eb84eda2216
SHA14d2e4a329dc57cf2fb4d9a87c823ff1a9d683b1c
SHA2561eca27217dd94f7b18399ab127fe02c2d0fa5a4299e3c014d184bd0e4a663e9f
SHA51211abda0e385088a83b3525305a41ab221de83245f7d19234d46a9b9b2a7110fc7c608587ecbfb627941632d565c1da9ed0f0fed9a32980e2525944ff31d11848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d49a20b866eade2b9ab66a3474d5e5be
SHA15daa3eaa98410fe083dcfe1d01f73c109dc4154d
SHA256c9b9dee0bb037aeab6b0d73da18b89fcce92234dfd7f068ab8768155d9334b79
SHA5122f91450e3d5a439d076fb7c33ae7824030f525a8dae4c0db4c451f59382fdc01e7c90f8b1ded36a428677091657fb27aed51d05dba138ed080b8364c522ca995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df9497ed3844686e7088b7ceff346462
SHA140e9d1bfe4a013d915074f975a3c39d2644bcff1
SHA256b0860c481dc0cf8a561e7870da701daefe14c0b525274deb8c50dcb8fee2152f
SHA5128b0b586aac479cc42dfcce9493034b8e9c491e048880fb0826b740a71f4a9844d89765234841caff1575451300cbaa2cb0c425edd11a7af5907704ae9539790e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55080b4d34b423f9b47774300490c088e
SHA1b01d764140559d4f108de6a049d9e6df5e4fcbe8
SHA25685935942c7902af0d5cdcaa05903c765ee9f0a8ae082313b7ef74f1359d4b0d1
SHA5126d172d0e7e0cd1c14d3c371c6f3e5b56e1046aa180739496d1efc30f900871b39a6ddc51c5a44aef59ea17d429f56a305adc97947e9d7f7470fb105266690996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504fab620fbfa279e5740e880cd1ed7c1
SHA1caf86a77daac3922e8e6bac9d497d5c7a6ade962
SHA256bbf61c2810982c08c2dd2e15fe785c55019de3151d0441f4e2bfdcd20725f97d
SHA5129e4c428a0f81126df985cf9b234e993df4255ad25918d15833b3d1a3919e60efc378b46595498d7139d7827eab63af797804ccd64bb3b066b4b5c3afaa32adcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548c8be2dbdf89369170be979c3c70557
SHA16cad88f1cfe0d8b18a2e31bcc5fcc6f73f1218e0
SHA256eb6ec195320b5c63a9c6744da0f8b58d9490ca7fffdc310452eeceda61438b09
SHA5124fe8b9c79760070ac906ac6f21c74e57b057224f91eac855e8c3d434b8ab534c2543e591c53aa93d3476c612aed2018728931d62e1830970b0804b999222be2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7eee263cd761532df07b588ed415b67
SHA173bbb2cc138a0efeef102f164d099ef17577ad1b
SHA256226bd0caa0178258409cecd360f2593579c5ec172a6f81c536c91f40a307c2f0
SHA5125c98d6180b48ae83e1aa5fb9a8fd9fc236dd7218057d629ab8026e00804132ea7ec19ef619b1a523e7f9f544ea018ee4fb078ffd6c71a40f588f7a848fa86f50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d00fc2a2d6105ee101c8c0ffbe271799
SHA105b19dbc284b4adf5a82ab9577cc2abb16743c50
SHA256ddfcc29f072f1c0bcc76224e7cd6125f466543b62506141811a580ff3dd10f64
SHA5125635b7346ba5ff41803a31a92aaf299dea8349d4b891be6863cbf5c4053cc4ed1f8fa0054034efd3ca01bf9dbe4545f271018be3841bbf4ad7b1b725a86432e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5865bfc2e63ad2f99eef1ba3003ba94
SHA1c445b57f945bcc14585163e0a1d077a286914b24
SHA256b3b39873a4eebf8694781dbe6e43ce2148f96518b93bcd80f79067aecf109824
SHA51254cae130245aaf6a5fc01b6229efd15b6d4ed11fcfc835c561a2f4adac8945c203dc9989e0c5f60def79eeb49d7092acc010032b851c0668a163428e7654ce7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578d1c4a4a1a1fde159e93de2a6456a79
SHA1b9be2bb62d1bd076c869d5da4dd98ec645ff628b
SHA256735436cf70659979edbf6d2db31b97881f2f5741f63a95af92ab5cf0b8806ba2
SHA512868136c596aedf8b84d00a8605180d748110f94efbfbd06e1369d3177719844c79dcc518b5e209722387c46d7d4a5ae16c5061c1316455b94edf50cbe167882a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537762c1734971630d6fc44d7843b027f
SHA137e68960973089c29149f7ae27e7160cd20c96a2
SHA256808ae85d9946435c480ea3fb76532b417bb745f50c04e9655ce1d6e14e6ed22f
SHA5126aab71e5cf6538267e4bc10db4b70397c74ce4148650ecc771604f45deda90c463104a8377aac91dd52474c030f3b9fdb14fff6ddfe53d81b4d5cc11668686fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ca9cb3582b71153e565566637dadf23
SHA1328259f588bb08ecf4e972dc50212643c86a1f75
SHA25666d099f1355306aedb9318050ea431ee0e2ea34414d0294894999e7bf9b416f7
SHA5126815de65c089994cad8dd7e2645cd29ed32d6a1e385aef17d8a95e495e9be1e6b29f9f1d6f8ae109e43315d3cb4f342bfb02f256042927c38d3547ba2b1098ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b253bbb0dcacac6900ff9e1dbc41e462
SHA17af9737613c09a122549160c8d3c46e57b42dbc9
SHA256b2d5718a989ea7f81e15030f8346d4a54ba49d3776e84cde6df23c12209f5516
SHA51298410a967832071dba207da1dedf6bbf188769562203f7dbad5f258d0168b130d9788fb3ecce0568ae4938dcccb560f502fc99f5a93fe03d3469d11f5b453cf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c96f869e7103b0b1e131c36edf37e43
SHA12a513a39161a81ac6cdf3d2d1103a221886250f2
SHA256a746732eed62f128925511e161f3f3ece2c9a34ac034d6e2fd9857ede50c6a99
SHA512184f06717ab28fd18dcbe10310ae7c222c09e29719fe4d324d4637d8131b2dc61536704fccda8ecc3435e6004aec89621d0c750864658385787b5dbd47d4cfea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1dedd195e2bfe3def7ac46d25c26d7d
SHA11e92aff5d6661507fb4ccb1a292de995aa5a7883
SHA2560eb08d3538a2fedc863d9c04474a92a87326265d15f91bf571fdb7738e01719e
SHA512a512b898cb7ed01e8facec074357880897490e16f10c0d6b704eb1337e45103878d91956db67655a73ab51376161dcb42806a5d5ee79f7897fdce2dd74e70d26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e997a1c78b258514f0a6a89f97d52eaf
SHA1667f0faab830776143240dc5476a8902d5ba7e9f
SHA256ca4721ef75bb433634072a73986f278c09f1303ce747a74ebff58bf83c1f66b1
SHA5123d8b5ec85a7d8e211574f2798f0d57661c1ed5ced12f0c216edc950f007feab16b15b2d1d02efe76c557ed1f5a3ba7348a7803e222021946b0696f2940250565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b7b1608ae4d880d7fe4eaaeb00743cd
SHA1edc707d801e8cf367eb3f91c6655532b2ad0cbac
SHA2562342886edbdac8d187d9e9eb33d56c19fa649abe74a0bbcc1782f18dfc4b5f15
SHA5121767b08d3e5526f9d5fa78d63e68aa423749885744e7a1678aba291f7683f2419f5a4c5517d76d6182abc0f1c37d5c39775b1f36cefe694d61cfbc4fd00d95b5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD5331235db18360f3a4e383ba08b2fa5a9
SHA15f4f0cbde4be6e5370bd8745dcd1296b43450039
SHA256370dcbf2c744af931b7d405145fa4b3131ffcdfca5e627a3ee00d9dafcf0f6ca
SHA512a11ba56ae103fccb81e717339a3544ffe1223a66e636427bd8215d9736e8ddf58c351d00bdeef6016eead7d7887175c5e1fd392522d4541a6a00b7f0b01b42d1