Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
92d55ade3ab8e2ebe1131f7f05b33738_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
92d55ade3ab8e2ebe1131f7f05b33738_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
92d55ade3ab8e2ebe1131f7f05b33738_JaffaCakes118.html
-
Size
979B
-
MD5
92d55ade3ab8e2ebe1131f7f05b33738
-
SHA1
dc0e2d727d022edc7125f0259a7fa45fc5ea04c2
-
SHA256
549dec8a2d372a5314e9c2acd49d9b4b47ea68ba17d48ad9b9a3c31b6ac9bbb5
-
SHA512
0e7536063288c294944affa251daca40375b791682ae8e864120255ce15e647f6837637f07144141666c0fff3f8fbb944b7c7991ed304981977ee8d45d5ddab5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000545a2f625582e344834d30d36072a24e000000000200000000001066000000010000200000004c6ca702ee437e48b1aca7465f668b6373b1730de704ef94809aba117651b321000000000e8000000002000020000000cbbfc0aca75a24b5378cadff776ec66eea93e3db25a26cc0f46a6cb6343fb42b200000004e0325d7933ec0e99ebe7a559349d12dd058981be9f3fde0aebd66e66708c9aa40000000790cc8f4fe27489c82e4076254a7c6d4ffae154828008bd26c33a97b2e2bc22b2abf307b038cb3f9529b0a4d8270c93bd62d7e9e89c95ebc54421726a1e5f9e8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423615818" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{29D3CB31-21F9-11EF-815A-6A55B5C6A64E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0dd5eed05b6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000545a2f625582e344834d30d36072a24e00000000020000000000106600000001000020000000caabc11da888c179f28d055bece011143b12530bdf8e4b514303e9e675d688ca000000000e8000000002000020000000c21bc4eb8458e528618a78f821f400f9e532cb51f79686133b2bc293e30ab377900000009cb09f1f01a26306744c57a0e05b3571ca163c1311a32d62e2b1fdd6850e0ff8ed971e9fb881e3c7064cb4eeadab241aaaed4521d5c1236d0780d2ac7fa42d5799156918815a214212ac2ad58f98ed9574fae9eaa8a32dc0bbbd08d0479f49da8fb1cddc58cf573c27f38df74eb4ee82fa13b062cbc42f4570564d362508a2ce4de185d49c1448d04ca41f2eec7f340840000000c94b41a4ba6719c25301116eccbc5830a84948d1d40e901315151cfab581ebf6c4d5637ac0791df7ced9e4e90cb6efd4d9044dde4fd2d25186d1962dda9fa72a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1132 iexplore.exe 1132 iexplore.exe 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1952 1132 iexplore.exe 28 PID 1132 wrote to memory of 1952 1132 iexplore.exe 28 PID 1132 wrote to memory of 1952 1132 iexplore.exe 28 PID 1132 wrote to memory of 1952 1132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\92d55ade3ab8e2ebe1131f7f05b33738_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0f0f6f1613418609cd3d52251623dc5
SHA11abca4cfa69a0db94a460fb85c84cad79e7f1d04
SHA256155c3f4ac0167cdfebc3d51a7da500a7c5a62a2bb6b797a32b8d9037061199ef
SHA5126455ea0b0fbc1675810b189d14f275182e296985569a6f8b3b800546702a6fcfa80ee6829a3fb1095ef10407c2fb6d671ecaffb48ed4907ff5847f463c68dd80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b422afcdc751ba839129372cbf5e04
SHA19719897bdd730fb5d3cbf989847666211b9c8eac
SHA256bb742d90776a3a50f8f02c3492e45c8ef05e67d79a767ad91870647bfa934863
SHA512106dfeb5f191e846f508eba5fca891ca9de056446d948d78b25934d4eba2666a93eff557c1e2b1ef057a71f54c1b482bd307cb346d15688d643da959e3aab098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54426f41389eb3e2ebd391b408218c030
SHA18f409db02970e36a06d7e0fe935b12c7ba9e7951
SHA256ec588aef4eff4811f317da802d92a3f6e1af0b5e09f0f271f6bce8439e953a0a
SHA512c3fc5a25e8f6ac9e9b37f619e742237643cc283012780cfea507e91100c2a5c806f5972c6a431c5347947250771460155c736f27377829017fc060b974610079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6b55b72c68bf90b4d5be4c8f172ae4e
SHA1dac8791549e5d67cb28296bccb62f1960d4207a9
SHA256c25438e566ea20b5844cca380ed8ea7fed21f4e68d8cf1e6193f5b82b96049a3
SHA51220425f91e0c5e934e2df1e2ab6940227be488a79d084bd106313977fc54a360c59673b3dd0c8ea0462b61cda6016b8bb4c7ab2bfcf3c4650ae41960ac99a5dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee8558ae88fabe83a32490afc9a507fa
SHA1475169a29e24b13edca8226a76e864dd97e8d7c6
SHA2566ab0d677c9d97c8b175b98fcc108f7e13a2c007c197c369172f1c8a0032c39c5
SHA5120ea6140f9cd6d5e0877ecc199dda90ea2b95aceed46d95ed033b4d51b10aa7dc093da659d261828f9ba6fa8e98c0e50c3decc03c135e554954e0b4f7dbf535fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d995b10def1c2169c59db9a85c2af37
SHA1b5c569a3e6e185e22e59a6801bd59df35a741b30
SHA2561f7e4121ab7ef059b3de741b1bca45ccc8e3f11eb72f0b289aca2f47b3c5a340
SHA512eb8025df629afd469132d0d10484445721161e7f28e0d67ee5a028d2d925751c69ea3777d422d5b510174b9168c286ef31e7550a7ff2d1d4c0199ec6c657888f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6f147c40ae6e56f960c4781818452db
SHA152fa46f4038f8266bd310fa78ab104ee0e8b843c
SHA25688e61f3d16cd8d8336077a52cdcbcc2f99684e6873cd070a36f6810762345158
SHA51273c45c42f568609534d92438ebb087d292c208a6ba37415814b33f11ad043eaa4422deea8f4987f236b8e4d498cac08d427755a7821257b9dd89a595e438c3c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9df559b1b7e9ee75647e0d476677908
SHA15f2708c28b80302fc05b7c5344a52e36b9492124
SHA25645b358578b2236ffc409ef063094941bebe1a59a2fea0aaf50f124db8227b7b7
SHA51213b710983ea7a836d830b8af3affe931691536aa65747ecd62a54f8cc733515b21df4ddda96f1bbda1b33c8eceab27774ac578b3c20bb88f41206d7cfeb219cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57344702a23630f9df278816fff858531
SHA1a491b763453404a065f09a84447ca09a15c9a92c
SHA2569fac6610649dda352a986fb2f703ff990abd163fa1f4d3215d38e1dcb114376a
SHA512ea6d4918320256284161b284efb30c606d7d5728c1bf5dec2a4526c894f311a7529bfd86e893afba38fecf71923fe62e0063939becb52be01616a58d8eb7c08b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaffc727a64832e970d67c00ad0a7344
SHA10c97c8fec4e1a3bf733b048f8e7dbc12032d02f7
SHA25650792074fc0996c02e690513958b9ac7e860f61ed75531cfae1cf7e07267275f
SHA5128a1a1467590f436ac19b827defd4b25c10971fa1aa7331a6e465ff6bfcd9103e621f9e2b1d144a89682004f1a393c2a28e06f372874513433cab76051302f05f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa1fdbbd32cfff1d4ea603aa204285be
SHA1630d4725d5796ba75f143cd3d27877c375c91e20
SHA2561b9e0491053c325c2fdf532b43bfcabf7e856a0eee99cee1727657900ce40f2e
SHA512d56abb8e0cc230c000f2f91c314d3366dcc273dd504cdc744eabe9a134dd4cd92a1943008f22d42faedde0325d773038db984fb5d13b83b71aa6470f89f61618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50888d12c84945afe41ce27af3c0f7679
SHA1efa220b11a439369d9effaa5192cd618dc8999d2
SHA256d5219f26fdda0514f7e3407d0b606b462f7b273044e3aed48e84e9c18d28e82b
SHA51292ec603a0430535dc481cd13d64a3fc6d600dfc928515be53a7640631a3980636d59ae3e1efacc0152379be884a03bd4694c9b79d36b34624225581d033c9578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58673da917023901c3a428112de5f0506
SHA1da4a61f80d618a83d22a3808c89e2f939840bf65
SHA25625a8d1671440f6d5c6e7b9618440bdb4adb608007efa1c540437192f64b717b7
SHA512a3d90fd6d33b55225f5b5aa0f24fcf55b737eb5003444b2eaa50427e1774d6c46f95c25b4b3db329d09e71da5a11a82edd4d8a5bbfafe9057651e7ef7a426ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0dbef0faf6e143ff78f84c8c85da023
SHA19dceb53624d3fd8cdbe2096ab8576bda49ff77c6
SHA256495fa596168b2d7d8f65501abaf1c3bee921a08e60eb145c4ccb5645411d68cf
SHA512ac911696ee4e0974496de277e6bdc7d50aa17fadebe2620eee267322e1b072a086651ec1d564cc6554decaae814240194873e207d1fe15eac2a05f86d069f6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be807c8c4c51d2fb870641c22abfa9e1
SHA1a9cf451d38c87ea8f9948f5242a3cd7aafe5aeee
SHA2566c85294bd3c240e915a4f1bb557a18380e6010002ffbb5e4ec6a3ffc15b06f20
SHA512a73b42c2aee9f4613dd63c2911df966bbec13207831f5ea7a7e6089449061e22a929a9d5b7941ab8240f8995d31f70c42fabff19cfe7159b225cd13972f7d2bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d60a62f667ef79c353864f421720da8a
SHA12274cdf8f54425b632025aeed00658e4b7c83e0a
SHA256af5ae72281411424b24f60297b9d0c70959dbd2c089f14947d8f972b05d533ce
SHA512b4042378fa4f69d0d71581283d3dfc98500ef4f3ba3e1900f74553c8dfc77b8611bb8b0455e971bda161822270aeb850b0120dfdc13c16b51d993e3f33cb14d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faae472b669a70a3c684d065d2c817ae
SHA122a0a60c8d1ecdb553a9db7d4ea24a88865adcde
SHA25673e0767d8c462063f41de272e1a35cf97690e40d45f07f9ae782c3d3ac764d64
SHA5122b6660503dd7bef7b0b39d1b4e927e5024f1a4ce0c4c3334f2f9205b37f0e796cf0f7e9e9d4a1f6e321bd131d47794b019d6f36255ec6a6cc7d44efde1095f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aeaf41bbf75b04fced07b07204001ef
SHA131caa0dfbe7ed936dff104ded4d5841693bad7f6
SHA256de24594559ff84a6d4a20eff7290045bf815d353b54e69066b2dbf7eff648155
SHA5127c9723817356e76aa9a085aa3140c88a3fa1551aa56dd0e750671d7675d7b63f04d8aa0631e398d9a84e94e1c2674d89271846b87291a1fae8573a6bf636dbb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545e9b229a818b97a8797b764deb3b18c
SHA187bede85d7f1d22416600648a9c2779a44a2227e
SHA256d2a5e4fbe16bb9d01598bb74c37a381acbafc4e54361329fd33edb298f2de026
SHA512234483acd6a0c2caf01fbe68b229620334efad08d877b483763c4c7f2be120707a661a7bab9444e4ec27b807642b7cc1ee6b955f2525459496cd0f14ac2a7f1d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b