Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 08:27
Static task
static1
Behavioral task
behavioral1
Sample
0061f6e6b98610cb9481a466496250b3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0061f6e6b98610cb9481a466496250b3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0061f6e6b98610cb9481a466496250b3_JaffaCakes118.html
-
Size
27KB
-
MD5
0061f6e6b98610cb9481a466496250b3
-
SHA1
92bbe80d8fb582e6b257346065a2a97f8ba19348
-
SHA256
d26c808ebde5d00217f1d0271271bf41e7c54f5f6d36ee10ca0f41b6b79907ea
-
SHA512
1ffd8b3e2d3a6800b51a6f423bb71d6f6df2a2a961b09782b7e9fa395b63292e11690c638cb414f0302bfc68dc192cda78e0c5ffb46105d6f7765415f746828d
-
SSDEEP
384:KnYqVeuVkiGLs6i6OQuIfN8u0jqXsDxIKJX:0YqVeMCLPi6OQff7sDLX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433846694" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C7A3AF61-7F05-11EF-BBA4-FA59FB4FA467} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c70a9d1213db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000c7b46a2a29aba0a68536398fabf8bae72ca6db7f4094adeffb7f204aea4c0cab000000000e8000000002000020000000f352df4a5059ac41a220e66f4974ab178368de3905185d8d9237b9a6ea8fd0d1200000000339d671e33f12cb955dab62612449542874d152d43112779c9af4ba5007408c40000000ebe905d0de8138b6cd52413930cd3ceec16ac135e96593629e8b9bbd649f09f597fa5f6e85000e9685ddac6b9c0ab9107016bda634e666048144971634f25397 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2760 2644 iexplore.exe 30 PID 2644 wrote to memory of 2760 2644 iexplore.exe 30 PID 2644 wrote to memory of 2760 2644 iexplore.exe 30 PID 2644 wrote to memory of 2760 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0061f6e6b98610cb9481a466496250b3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f35af738e51779d0d851330371365bd
SHA189698bd9160a6d793666891036edb4b807bc9d23
SHA256289369d24c488674c888ade43d318e2c2e688f0f447c4c254f725c2701ce5b29
SHA51296af922b88b2dadefe49f585725afdc0e1d10f2c070b3318ae6066e2a1d329a7e71efba2a50c72730e2a7aaa5233c2079471faf1d945f8e8e3946c7bcc5b38a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d0b9401cb3d7a5891e8bfb7a69e16fc
SHA178fcaead3ec9565309f1e386c60636010ab90ca4
SHA256b6021d99240e6ffac0f81562d6daf19dc8da95bb64dfcd8a1c3896ae2feb352e
SHA512e9b43f8547d9fd5fe141aab7d8e0cc787065efc7d0bc9b1533c9bc6cefaedea3ce068bd979a4657bc63fb3eb0fd83866cdc808cd9916459ce1d64c30f9bda615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ee5c8c6f0f511f4a67045e36bb0ce9f
SHA1cf90bb15c645d49a0ebd50eff1d6db8f2f0b389e
SHA256b5d4e5467baf008a94924a6349cd02dd0d3ee23ed4d177cffc4ccded33e0149c
SHA51210ecd518e5ebf50b97a47e854fc228bde1f6786bcc26da61ad80d1d949cbf5772e2687ae77077878934714530a1c57d1f5202bf17cdc5b3bd007111c84e65692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2ca7b6883524a08cae513a13c01ca5b
SHA19cb902eca72e0117cbd55c15c638be39d4d060f3
SHA2561f6714a873f5020c1fbbaed58d7b4f650097af813302a500a66d517f22401eec
SHA51214c264d98b47cae5c59fded123439835cfa6abd513d5c3ea8bdb4b2eb55416ed58b95faa63e8440f0d2b1d4f58213a42307190794369b9717320be735c232a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548441b928d12c51cba7052b529026d09
SHA18519b5671ae9924bc4030b7769975b8e3dfe2622
SHA256fe2b9d1702fd47194da8d4b28c1ce91661175785d05ed5a0e0021b39a714ccf7
SHA512843c19b219c3b12c52d42e6d98237bfdb4da92f14255fca5cdde04ca4abc68c777f40f81a2a0e7b46b36cd192fef1c927df1e4e7628a441c6b7fe641c74d51b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5436aa9655208db67d5bba1282e13f6a8
SHA1e7b5b05737c1712e8b3bb872a524fabfc212f61c
SHA256242633d2f631dafefa11feb931d7cd4d1316ef23bb2e3a0d4790d0b307dd15df
SHA5128089bbe66008e7f37274e4471bd2095c64149387cdca44fdf830b2e82034da395f2faaf05c0a00749f8fa086c5fb59a76b1a765ec999e0fc59d3b279c3b256b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510381ae0b7a3ff676b41dcd195d23e11
SHA16fb852bae78492bf305b87947456e845109fc212
SHA2562b8587d99e2f3bb543d73c94edc9ec9628cb9daadf805e81ab2ff82a03c7fa5c
SHA512608f2c7c6cb2ddb093a5a6f8cd55863d6526598b49f27268970a9316d89f25ef9e74eef64fa74dd77f9bf8594d13dea5ea20ca7138f0932b7d17a07191b7a4b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51da56427e34a7734f175ba0a4b00ebcf
SHA1baaa46be6b5e68446997a9ca00697fd5b7437573
SHA2569b57255e0d6b82fe7e8643447591bbef35962dd8ebd97f33440a3e31120891f8
SHA512f4f623debfb651b510d3c3827a58f8246700e3089152ce4f34d7941cdae6125b338e506bd5e293f3f92e238832b860c932c59477b3b1d59945736e03c231bd7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549cc2c1931281271d6666b2d6f0d1a2d
SHA1905112226bb5d7543e069522bfb9c9a86427c69e
SHA2564d4b515ae955e2ca6f5322cbaff1b8d11b586ffb48c3a3ed30f1cf7a3c17a685
SHA512ae1cb05d504870570c83a57b0901cb02b36ea137c5e21588406f887628661a20d3ba4b5c112e5e54e2cb89f7c2e5d35d616dd20760f6788f7af66e81ff455bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d39800afb3ad55c21a07e545a6a1b8
SHA1dc0168ff6d7eccf8f4f45dfd629f7c5b00c97c46
SHA2560224763497090db6fead2558b36d3ed957a16f2972123c595431d51cfa6bd283
SHA512609c417963cdfa8a810b64a67ba007f021937e9a69304e9dc751e31909665a895abd17c87a464c497a478a42da040e51b5c1a36f855e024f263285c30513cfb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534401d6ba37ba38dc3f993707882eb47
SHA19917090cce8d88c9cb9e19edef30cf7c74bece44
SHA2569b9a1245d33e8a727e686d9ce8c1fb060867f05c7fd8f9fbc975e9cf931b4793
SHA512b4191d1d2e320c952f71d0c57b35474f35f699e902ae40da43a9ba39fe12ba1df8128b5a08320d6185e87a2e0110549acd269f11d41cb5187dd68ec44bfda173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566a8b08fb4d2f8591f463d5089705ac7
SHA17164ca0cb02526bd3a7e485e5c7dae18065d0ded
SHA2566e5fae621f859a6bac5fdefd182ecca72e02092b0cb7ac38f16a2bf66c6753f9
SHA512591b3b7437a99b284afc10c8356f468937f872a365768ccd83bb1a54942c29c7afb2a6799b23a9ccf0ce0f3df2d8bbb4d76a7c4eae896d9a23e7917f045355b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a97cbd17d1626ad8108c7bb8c192709e
SHA1b0e1d73989ef54bef0916a04af01534a23170f5d
SHA256855b700971644ecaf7febd485e0b571b67eab45f8f46c5c2319dacb1cdf97ebf
SHA512de441a63e70f9d6232687aecd3438a777a010f57b9f72ff56e61dd23085dc78d6cb293edc219b6061be9923f77d542ddb43b16d18b3d1b7131a704c9be9b90ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3a8153acdc1d14be54cf4cd682ddfe7
SHA18979cf27bce0468bf8065ee4ca856b840ee6096a
SHA25645004dc0837a89aeb651040dd40c9dab3b5ba64883aa47903bd7e2e9774c5538
SHA512a7947554ccebb5d236c53ee1410f5a7bd0de53ebbd468d553c7ccf554a2083736918ac45653c541260f11e0de8504fd241bfe9518d7efa5bae9236510985b5c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58629cd5c43418345b05418518455da9b
SHA1e69e52c6e26748bb4d58411403b1bc49f9e11e40
SHA256c6663dd0057f963c3dbf15500b27bd4b4fb6020c34b5957d61c4408b3d2d6f12
SHA512a384e8e462cc4e5b8e7588d7c94cce25cd51602cd4b66f4cd2ae52ef9abc43eb2c7647c990326bc360f3e1e9ba70ed3580589fcb4eabed49f54b19b783136b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae145bf96b6137bce70a27ecd531c62
SHA1ffd9a0c66bdf55b9e638418cf420b7167be92845
SHA256d5711313fb9cb7b6da78a76522491dac2b02ee394a3d2e88560a542caffa56ae
SHA512cc643ad86adb40d8cd49d20dd8f54bd8ee6800f8309fb12bf59bbadeb8cb30bd4a28a1b25be3c4b1cca5d7ec5b305668cf256acdfd4960d29e7f3fd8d6aee4df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513f440710e2036c23ef8d0b8ed24bb93
SHA1ddd5756406cab1c692cb3c1186878de87b7b6823
SHA256f43e63ce1133a492390ef9c2432b1dbe1340f0ba9122b034c6a7f6865c53161a
SHA512d6481f72d30e164bf54bba531ee8b2ec7e155a2b2b84d2ae02ea91db93acc273f4cc8dba27926a6b196535682a2eb637b9c45c85f365c707ecb5790ef368dc6a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1LNUKNV0\cb=gapi[1].js
Filesize66KB
MD5aa012028297a26c039c37ab25a4bd17a
SHA125f23d01b5f580c00778e1c010225e5b8c73b66c
SHA25655cd2316edf7159b623e4ec2c9e3a334027c01e2d1cc386f833ebcd35ed87b38
SHA512d346eb082674fc26d562da9a12f36ad2cc7db1f1b35c891a8734284cf1bd052a967137c1281982070688b2bb2e06c7f4967d1c9397311a31a11a8560b9c45fd5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IAE3FJ0M\2254111616-postmessagerelay[1].js
Filesize10KB
MD5c264799bac4a96a4cd63eb09f0476a74
SHA1d8a1077bf625dac9611a37bfb4e6c0cd07978f4c
SHA25617dce4003e6a3d958bb8307bffa9c195694881f549943a7bdb2769b082f9326d
SHA5126acd83dfd3db93f1f999d524b8828b64c8c0731567c3c0b8a77c6ddcf03d0e74ee20d23171e6ceac0c9f099dce03f8e5d68e78c374da2c055973f6ac2db4e4f9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\rpc_shindig_random[1].js
Filesize14KB
MD5e691b2e17de9ec018eca758518bf5dc8
SHA13238d543acf53b803dfbd260405fa558717daaff
SHA256438d41bec769ff386a2c1555b6bf9105362f67dc3e711c81c6092ee7fbf6ad2e
SHA5125589a5cb408ee8e0fd473de24224ba8fa1453eba5df6e591570810f992160d4f3e8f60f8ba74d9994861759321f5bfe0c4a608636913a8407b5184008457afc8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b