Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 11:22
Static task
static1
Behavioral task
behavioral1
Sample
e25d67da944837341fb5d3490beb1998_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e25d67da944837341fb5d3490beb1998_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e25d67da944837341fb5d3490beb1998_JaffaCakes118.html
-
Size
310KB
-
MD5
e25d67da944837341fb5d3490beb1998
-
SHA1
04ee0e4e1d506fce4d123d46b87c71ffc76e6e64
-
SHA256
bd32995bce7de12ce7d8be456db5f29bc947d08f37c78c8e8ef95ecb207fc3bc
-
SHA512
1157cf3966045e6ed58185a7b2aa05a167e7c46fdb47d98ef7bd621d057d5f147e97e66092d7708da4e17928525d5f6f66119ee8a29a24f59ec4f6006ddcfb56
-
SSDEEP
3072:CyU7or4wb/dN1t8aNrPeBC/MD6nlwoqTiS91hh6t1oo+HXp/:Ak/t8aNrvNSb6t1o/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30bc17936107db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432561202" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB8FD761-7354-11EF-9C86-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000da733153b628601229ec96f3682b48773d9dd171ba8ae9c6a818f65ee961e02e000000000e80000000020000200000005b2a8d2e47807b31d014351d2412c0b28ca25f9f96586aebc3015bc282019a02200000003e59d310b61ef828a139aeeccf6ba2d530893d7b280f557bc6f64084c1686c174000000089f6b7ce45086eb9b0a6e92e71f0f0819436efd3be584694c6fd7c2e3345cba2c8279d220afa0c65b0d2fa654b2fada8b0a24056290beb9e649f6d4b7729fc45 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2492 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2492 iexplore.exe 2492 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2396 2492 iexplore.exe 30 PID 2492 wrote to memory of 2396 2492 iexplore.exe 30 PID 2492 wrote to memory of 2396 2492 iexplore.exe 30 PID 2492 wrote to memory of 2396 2492 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e25d67da944837341fb5d3490beb1998_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5eda32d5ea5634b11d880649677923ce2
SHA1d55cdeeedd7a287dda5685b157948774de43ca17
SHA256cec3dd969d66313d6427f461ab02cb402b40cccb880254ab268c7f94f1f8a881
SHA512b4fe2f8de56490a056ffa639934f6e5d0dee659824da194f6d360e1a74480b31e92de1194b62f35c5083b2d1de4544f5723960a4c6e072e09a47acd625c230c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_4B65292BF8E4474E2D57D38A629C5318
Filesize471B
MD5b3cdccdfed4af363603d7aab1e519336
SHA1e7e6805086a33e4716622e21c660c179f8a31d01
SHA256b29b85eeceab42625bb27e0ce29040b2af640c0944b43ad983d56ed9da672801
SHA5125144b5e53e6dd0c10727c9f2ba41193c2382f1c9e169b1925cef56b04616d0288d951b0182a36faca276810b2f976c0fe2c8a7df4a7afe7fed9797fe36129947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_F968CA97A68F4E6D5C104EC7FE3DFDEA
Filesize471B
MD51c9dcd69e02bc3ba38616c62e5474e8d
SHA10ff3bb37c6218251c7943df522f70b9ec7a7f291
SHA256e4c4194903f99e56fa5973d78781263d7bcb5441f66cff16f9af90482ba006eb
SHA5125f7d738c33f7ff783afec329b63b477bebd5edacaf8d73baec4f3eb6379e2ced9e0bfbd04dcb50e02f3213b3d788257c84f6183ba9fc2f9a9d2be18e5048c421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5d3d32b69a3e8626e0eca42898bab3249
SHA10679771d86117bce0946ad9287b5061c3092e8ff
SHA256990839d1905282afbd3309115757698fdeecb636b2bc8115d9e139566db9b653
SHA5127feac319d17ad34934bf18d1356b3d7ae5fbccb77bf7f466f21aaa6a9dd30883b0b31392d67155e68d23f5c338803c670198046cabdb76d7eb492c469af37303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD535a1e0055ea2784bbb530e2a582053e9
SHA13a3c91b670b9e6c1b7536f8bf31b3eb731fb3486
SHA256c753fe9e2a3a6eef8768378235cd52b1934bb5c91f5d4d640e476e6d84473436
SHA5122c665ccac4649c56c12194a85a12bd1dc912587c7b2b96597b2872cb6a878dd65cc4f3bd6f0383fb518589ef6b3a0cd7c97396564d92a47673544c6497e40d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD53daa74338b35267c66b4c45340bfdf35
SHA1ff28a01b41a41ff2f11aaa82d8cf9aeefddcf84e
SHA2563e413c06f52c33ccf03b6ca4f0a869c5ff19b923b779353f00f6fb4376f57770
SHA5123dc9956a9cc8fa168e3f34db1e76f395bc521204359a0eba438e03ca84ad9ef3fc26c29e8cdd1bc1a0f5cd160fa4ad0b76eab0407de050bd93bf33d09795d2d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5bc2e955d848d6032928b39b4cc829ad3
SHA18b2adb89a28077bcc6ca776f3ebae24759eac076
SHA256b3096802144fcce4d8f4e9274e9b94cbff936eeefbe85550fca91c3cfb8ddf57
SHA512884e779fd7bf9a841613e27457f5896074e5201da790c5328950c7c68987bbf628b4c12ece7f1839943835c03a1f9464f8b9783cc4ebd2ef552f93eb348bcc07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5af0ba787c416bffe4c65d7ee5902de34
SHA1435519a3b7508a2f4b9014b0e4fe659fab94425a
SHA256efc3f08ee19488e844dacf90953203d5f08596fe8dc5f840486ad8f40bb139d5
SHA512df75cd536e44b85ebf55901bdf5eeffc58a70234b5b069a1f7fb5a0e48f76589daf6e4070ee4f43d287a7c48ebb53861dbfad182b9d28da29fa9684c73d2ea00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555c22412d090a60f77f4840dc4860df7
SHA16d16fa342299ab8d4c5c24df33f8c5cefa4df1f5
SHA2565aab940dcd1542900646dd31a61b4ce08c610ab8be5063fe3b251ef87417e905
SHA512c3675fce95cfe84711e8f3f45675e659acee444f131137c6f482195bab5ec0a620dd8f2decce9ae90237f27f0d47ebb5a2f6eb4945e1f43aad5767cacaa064c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c97ada5c6b0ceb0c79b2580205b5f76f
SHA17583b610cd4ce51c91419cbd11652fa05b63b209
SHA2567fa56a10d0695fdc51c4eb6513e1b47e97c9ba48e7f903478c30dd19fb494edd
SHA5126069d0507d950f417df0d00f73b11fd0f628fdeb4cff074db9f820d6f16f5cb9414ec6d68ab058aa0d3a35bad3924fd19df7acb96652aa456cda090c9e01160c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aabe53df2e8098ead102af4589b87e59
SHA1bd2436da84468a7c108cf2bdb451e88d1f86fc0a
SHA256adad92e0770088a6a1d0daf7b16cc694c9334812db8009639900969614158043
SHA5121a8526b66577a8d8214b56f758ed248a1e55e09979d56746f04d8078bf2493691f4f603dc7afa14c6a21a6c5a6dedb8f3b223b9787824faf4bfede54c6fbffa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b7c73f902748f94f9b6d5854c90f9d
SHA13bb1733049a8910bc063f632dff6562c80715ab9
SHA256224950bce20976b3226df304ebf80bdf93a01e8702688465605d7913d6d7af16
SHA512794e84e415f23c84f774132db417a750a79bb132338c3f3443bdef52006d7927e147c27d314099628946d0a4c515cd2d013523fab1716672b23cae091925fdad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59afd53e9de0ff0096037fed9829cc731
SHA1a5a80bbf426a87d80640a5191d31f0e33db6e2f6
SHA2561ff9e4d644a57ca0b7631aff10d5c9be4240dd854bfa184fd1c70a66ec5de45e
SHA5128873a893c0b1a6e397fadd8a8dabfe63da024a8925e5c5a407cc4acbc977710f52b4c65192a428db7f7c5a1175c30fa0bfcfa7606a255eec6cc7cac324f56954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57273de4519df7a03222d03281d2ea2f5
SHA1861aa814bb2c9153c4db2ebee68db6f5f2d3f5e4
SHA256536b23c7a69d4692b328000007cfe2266d35a020db5bef182850885ad87cd98d
SHA512bc59121d9551afbbac88009cf3ab5439eead83980828f6ab3672e302e78f12fa7c441f1830add183b102f1e26ef0d807b8eee607327e5edb7f57407dd823a878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d97e0aa82b826ce42ec3bfc0ae18c06
SHA19409f045089eb47eee59ae11a01b1ed3158de46b
SHA25627c36e515d6986be84b8be723f549fb31bf6e4a6cbedf433674d3cdf54fe4e7d
SHA512f8264c61f6e29be13526bd59082998c87a43d01576c300077bc23db037771ffc3487cc14f8c12716bb22759ef2150b39479023296d8cfc8368a5db1440d11646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52923e04d67c9db3963482b967a2e8d83
SHA1ed45763f9aa64cda1a7e438983bc5715e14af0ab
SHA256b0f3c05e8e9f4e0fd2c6b5e7360dd9b69f9e04dbb53b76fc379c33bbf344c0bb
SHA512f6a8da2d5d16035ee7566886b75f00330cdfe21845cd4d716c08a3f8630f2615d7c7dee25fef25723ce4d67e9bf8b4741518992298f98c5bd8660be75268b166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d1abee509f77d5dc0dd858806181e52
SHA1bd96585377f5982cc48f4fc46b84cd20d0f78a8c
SHA25617ddd52cba3dcb9fc65bca97fc84bf9fb430af98907c202c613e029ef0cb432f
SHA5127b4352bc59b3dbbea2a486d0cb5e745d9114c2d140fa0030d75b0ef34a254bbb9d3d4ad66818cf51f764ca8e668993347a3bbb95cf1c09628869bf9d5765a86a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556e9e87ddd9949d6ca1a1af5dbfbb79f
SHA172cdc4f379bc41cbcbbf5991e341f156bb07c4f2
SHA256c6ac6353c4228e8b38f6606f1b15eb25f3d85dc6e950360addc18a7c229570ec
SHA512c7831db3dd8ab1f3bbadb624ad7fca5afdcbcdb35544a5fb1ab65d164ecc44005977063e6f06c85dc9b565f34db3b1fe04e89572f65007f18ccb296f6dfdc7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595900a2e3c40332b87c5dd66b7ec1ce6
SHA1e48a543d5de8757a8ac2b5736b676d957e52b75a
SHA256d89949470e95f4ead3d2b449c827f30edb28bb63c55f52e72861cc80dfbbcaef
SHA512b15807a1e2d1c269c6f2d4344065a8245dafba1a84fcf5fdb8926ef6e882559eb0b49fe065b46cf1c78d2d98f21be118cf976fe1e4d27d37e2894d9f971e8751
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b