Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 16:06
Static task
static1
Behavioral task
behavioral1
Sample
9260e2f4d15837113cb2dee52b5eb3e1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9260e2f4d15837113cb2dee52b5eb3e1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9260e2f4d15837113cb2dee52b5eb3e1_JaffaCakes118.html
-
Size
229B
-
MD5
9260e2f4d15837113cb2dee52b5eb3e1
-
SHA1
b20ea8be6e823ceda09cbdf7806404d89a29ce4f
-
SHA256
07f274c7bd931b2bff5dd381b7381513baa593e8e58d10b50c1cfdbe57b1f3f3
-
SHA512
a06d035d79e40c48d29a8ab861cd919cca137311a67b92462aeae1c3c620031e99e30439e3ed1b460dc3f5ff490645eb4831c4d007ecbd58aa4aa2cc341500bf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36164841-21C3-11EF-B2DC-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c66e5c05d3481945a272c9b5520ffbf600000000020000000000106600000001000020000000148ea19bef858eec82884aabd0d77a9f2649926a84b310e5df619dc53f38d5a2000000000e80000000020000200000000399c1a814542bfd25286df8d88fc1eefe718c2a3a3fdd72c132113cd616a49920000000acb259391c3cda99e4edf166bd9917b16acfaa3e73004bee43ec8b6efb85ce2d400000000ba1b169d92bbb03c99793828336758111d94cb84b14153246b58f5ccf5dd8b44818fe38a2dc5d793bac012ad6ed856558c0c7824014b0d8692cd95bb053676c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423592647" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 407e330bd0b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 1744 2888 iexplore.exe 28 PID 2888 wrote to memory of 1744 2888 iexplore.exe 28 PID 2888 wrote to memory of 1744 2888 iexplore.exe 28 PID 2888 wrote to memory of 1744 2888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9260e2f4d15837113cb2dee52b5eb3e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e049a5b8ea512922f8f6ba2e6559bc18
SHA185a33149ec66b1fe37bffaf8165615dab550de74
SHA256a62e3fd2a32d98ccee19a2241fb2eb5abcdc43be1345650aa91656630cacdaad
SHA51241f398873c461fef3995308e3751cea5576943730f8102546981db471eeb93051f25bc16bbf1daeffd79c3cac7e2fba694446e0f4c12ae6f893e102d7ad942e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52e871c052e13ff01af4e55aeaeb715e7
SHA1cad11b5a8f92b4cdfa3806ce7d746f7100a57153
SHA25618b5102bfae77baa6bbe37786e67a0d051022cf394bf5c4a09ffc583553fed1b
SHA5126076a28c89c34ff561a50f8e29da0c777ab4a38e57ac228f514ca2ce10bd1641ff6e28a71da80d118a59f37b9e7a9832cff74afaf1c8273ad59d3de2ae705522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a268ab2a3d5811b30ab5a923f1c5c9a2
SHA1172745faa0afd4566915f4192da6f71ef9e82988
SHA25624873b4f9c38c4950c8e756a589b8e0c81b3a80c2af0acec93eb735468fa7c1a
SHA512893d1f59ec41021eff66d725728bc7c5cffd542813e4288d7a7387cee0ea5e584706590b1a9435b0967a9f3f2437d777503e9cb1c54ea31bccb881ea0f7db52f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55bc74b3cc52d1bb5e7440b6806755132
SHA11bfaef62cf47e26255574f3ffe7331944deb86b7
SHA256461d0bc2abf22ef766a6c5a260aa5e1a376d45f67cc4323ebcd68cd498ed99f2
SHA51220f8a6a86279d1d73026e27d60417f44b3991b3086009b58d15dd0cdad2ff9586d8dbced72d9b2d295de515f567497afa76b69b74c599810ba1d5215a2e4e80d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f77ac93fc07a7dbd9b92039e59791bc3
SHA121997675919452d866c24960bd0068916b3f171f
SHA256596c0290fbf19a9271cc7efad1b1b5dc986a36d29259e3ae805fab2c04f3ab22
SHA51287799f83cb5589d5d82fa85b198df5c30f2311df4e8b8a21d61b9464f6fd569633fda75c59cd9c3d5d733dcc9263054847024b7d4fb570117264f564d5435b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cdc382c746de95dcc9c66140da749218
SHA1a6e16891b9e223a8ef3fc45b48de5b1bf84295f8
SHA256031396124829eb21fe59c0ee4ad5a07b559f65debe436099a7f917d35b11e24f
SHA51298232823a9778bc9d43a20c5aa71b877c7e08a27a5efc1877ef222355bb43a1079d8728d8220452ba0664ae83604217ffd1c3c1b04d7b202a45cef90dc096829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fdd386d8829dce14ef6b1a6acf8db790
SHA1f781d57adcf60e26dc7aab1a9bc57ac4670932df
SHA2561fe7803b991de030920cabb10d569f8b31d20ef486312520d1d5ce578109bcec
SHA51258ffa8922378650380e7a5b6a329e50cf1047992ac58916ef2a6287cd7d1943b9b42a8ad55472730562cf3474b84e09a8cbde8721ce3972467297f89eb196b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b7a3d8eb154be3814b200300360666cd
SHA1f4bcea38f3d5d714864ef95ce97b9553cd7c4d6b
SHA256b7a166b361a62f08e62e8f3ae2c1f7d0a47d301f8a71d1f875cc680f73382bce
SHA512b412ab66182dc5e2aca9aa4e2bf99bca36a8e75f2176be5f3a5b30a7155b6f5cd4ca28adc7d5605efaf6cb9f53a00b404d7024f1b8ae3bc404b2d33b83695f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5582c281ea7ca6e12309cf105a274be18
SHA15d8a6ab98297ffb2007ae677f10e4d3282067ab7
SHA256e8f70617d225591db2b411762b63d729d70e3024e68bb995507bee2c4ead0bb4
SHA5124d9e689aa8c04e39d6764f9f892503d104a7a05136bd05a539f9184cae98b5db3d6c5cc8fae23957576cfdc2aedd0006779ab3d6187e8a923dc6e9795aa11565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52b407187bab6af0a685db5e2ee410566
SHA1d66a23b9a74cda5fec9f03cd849fc12ca641c2d7
SHA25690793fc2fc4a2ee01adb4a6749e77aa2b0a62e0005116f3e27db80552bb13c78
SHA512eef1d481a364c0dc7165c329abafee96aa8b95be4ad5386d0d64cc8d00ef7282e93b977b2ac2dffd6c868b93df0a81a7e0e27407dc171f49260e4d96bc13e381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD598c23f81b22aa14535332f493d59b28b
SHA19950feb0912b82710872541137e382c7768f73f1
SHA25607f332221294a6443bd835814a801c632d9afd0830b64369f9a58648aa6e0d53
SHA512916b6d2d7d36fb17b4d51277cd2b4641051c52b2d6bc5f3413c2e79a0972e1302009271cff0b70ebd413bf5ab34beab2d408f0a78cc6ebaf40fd2ab82766028b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50a38b08325cfd489c74600aff1467a68
SHA127e484b3d174c51b035db2fde40c5918fa5629c4
SHA256bb010438a906903d4d38a7bf427991fd1add2cba888d79d4de301fd212c39877
SHA51279322d8a93b9cee1260a9a7bfb3cd60c3f2f378d700e6a7d7bd9a42631fddf4746b35a0bd80f36037e823ddf3f6d15e555e9b6f46ded0219f9e04a40e7e0fe0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54ca4f54bfd49a94581fd03ae6ee0df30
SHA1d54ce01133cce65033c43c501eee877e33863e60
SHA256df8acbd9ab04ba9ea1b1de3651b057670c582d846572e38fdeba9fa172d218e6
SHA5125f6dae9d63ba7e8365b15648a133f37ed035f6e46763c3f1b5c9d6cbbcaa26be38d7c7fb16848bfd0624eb1334a558546062e1fa29c7fbddfda438a1bdd55055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5984889e32015d8fb7a1049417b2f80b0
SHA136c4345777d0930df024bad9e3bb64d5f19526d4
SHA25611da1f26d714b2ecae7893a2ce4d8a2db2951ddff2386602309b030511155be6
SHA512ad999a6acc772bd4ebbb8bf506b5c0dc0755099b24d417e7a9c6f6bc2b11e705e27ef2bb38d1381b6d3293c27972ce296e8b0074449aaa4872eacfc32ad61102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57f665440483b82943692dfb2afc746bb
SHA12f70b637c7d8935c342b8cf3af17efc18a13c212
SHA256c1617b5f275d3ce7225e452a46a8aa93d132594c26595733feebb5663f8cc9a4
SHA512bb3afa59546b0fa5378d94e87683cd9c120c914b7a658cf9fbdad3d287ca14d87a5aacb4b8fbac71eb741bf85ad9ce3f5384fe23a8aa2f52c327ead1239844fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55703186923373b4c4bc21a1eb91e81f9
SHA1a32e84eaf18f3c9138eaf6e85fbdab11f137b68c
SHA256e27c94337878eceebe5e8321e84d2669ab0e1b4cd641751fe6cd6072b1a1b7ec
SHA512195767fec182dc6d54c3786fc6cee8e52ea5f3cbd10ecb6e508dc1a5bcd6c6d3f02cdc15a6edeb7afd983d94e6eaab8e159d8c1e812a2700d39d5a5fd689dfe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b1e15ffcdfc15a49d395e30191904182
SHA16dbc36ac5c062dc62ff109455f1c8a4af176e03c
SHA256c0dcb3edfdc361ada64539a6e0f20053490c7c074afd26b330bf8c04ce01efe2
SHA512e6c3c02416f6c9a539f975392b084ffef6dcc056a4629479c075fb48021725a8d466469c45bf1673df2a11f1e0cf334c744e2aaa97b632e80bdf79209a16fe88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD585ca1cc638268defaa29cacb06648d6e
SHA134889e3e97ed538c15e4a0e7b2e31293665aa5f5
SHA256b5d6b238ab2b7646111c59fb536822aa075a42de939f82e83787b8b54fd5324e
SHA512338b927fc18460018aa60d9efbaa86357f2f78e16e45bccb4e2f6cf357d64ab1be1ef9ffd0ba2fc83e800bf7ffbfa84a5dfc75f63bec8faf5b9345014595c0b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57b38f137fa6f94425642218a61b2430f
SHA139ac06272deae554ed9d370bb130fc08511a1184
SHA25610823b8433e9c903b6d2e2ea7ba0ad1dfa2de0dcf95286157e8f2a11d4f5db04
SHA51267588967ed2a6b63b0700d113ba73d53a6b26664788ff67ac09b22ae36a211f68b328c75087794f23ace3bf39e64e20707ed1261bd924980f45a147749c7fa15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5469da0ac0903ff42fda5327102c59afc
SHA1f88bca937106269cdf291317b8bfdbfc833645e3
SHA256e9262584ae516204810e6c8af2ae3a0e4b5d2bdcefa461eade890c96876e534e
SHA5123a2939e55a65782fa3ef21488c45018395471e790085f72520013f8e8add1a8bb1e99cc46d905fadf57415805b632cd773f1ac773ade2d3eb22b4b09812539f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57ac02a3772c3e35ac1e62b9555463705
SHA14365df6b261a24fe78500b4efeee93621b6fc52e
SHA256175921456f27fd3a405db227aa9bd23482456093f143705625f6eb22c05d00b1
SHA51288f139b240fe97e734beed1721942f9c1e19af4b444f87f1ae250327ea23661a4c7b52ce6bd98395fe63f6ef49cc4478a2ef1a9fc3d5338ccf8f150aaefc2453
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b