Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 07:17
Static task
static1
Behavioral task
behavioral1
Sample
29d109031c84e77166002e2bcf871480_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
29d109031c84e77166002e2bcf871480_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
29d109031c84e77166002e2bcf871480_JaffaCakes118.html
-
Size
53KB
-
MD5
29d109031c84e77166002e2bcf871480
-
SHA1
93700e570d648340d54e7da9636db828d1727b90
-
SHA256
42a553fa471cd49ca34ac56a204f6139525fd14b8b444fb23457ffef188031f3
-
SHA512
d18ee610b2f0fa4a4c32d65f338824d6f2e9f127feaa69363443300ec270eb82b60b54bf2db7c77b294085b3b675c1a4b18c71039b1e818b04b3e94b9d95b5f3
-
SSDEEP
1536:CkgUiIakTqGivi+PyUCrunlYP63Nj+q5VyvR0w2AzTICbbwoE/t9M/dNwIUEDmDi:CkgUiIakTqGivi+PyUCrunlYP63Nj+qo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30a2f9ecb2d0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006633a477551b3b42a6b207f22cc1732900000000020000000000106600000001000020000000b59ea5e441176e13ab76daf4936f17cee92e70758b3f7fe8a960a3200a9b8f82000000000e80000000020000200000005ad9093286fb3a22aa4bacad2fce16a388af5610746f4b790ce91bbf100bb69c20000000242b8bd83cdbba4847ba7f104685f110167868a5656fa903167b609f6d5d950340000000c276d69ca1101f4894130d47f58b6aeed63a74ce5e0bbcd956874be55d6ff2f3df581041ae6681ee30fb3c20ef2408fdcba4db68e8a80ac76e25bea767ffbac1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426548817" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1597F2A1-3CA6-11EF-B238-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 3024 2000 iexplore.exe 28 PID 2000 wrote to memory of 3024 2000 iexplore.exe 28 PID 2000 wrote to memory of 3024 2000 iexplore.exe 28 PID 2000 wrote to memory of 3024 2000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29d109031c84e77166002e2bcf871480_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a0de91fb7258fd42eb20ecd8095a139
SHA19c8456301c1f626c49962a90f343bdca5ee5d729
SHA25664f750c5b550871169f3568d2a130e22edbdf9d0fd6f6497a5d261e623b3f50d
SHA512ae3511de86970a27434916aa73f408dfb4af53d8391f098b7930ad078725d592ebad04dc04449e1450ce65e99d47704a7ed52136875bf3487ceb06ebfb6165b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529cb17e416c7a965ae8765ec73bdac55
SHA1d85a50d63e327baa8210de74af49266a4c183b67
SHA25607700b2a9fe289c274a8750f9f6c74895229eed2e67e61fe69d4a676f8684c8d
SHA51271682133fbcba02e6967cb39d0102df29228a6375075b8b7c6f63afcc1f49d04a5b8521264e0878c4ffeab89ce449e00e53331878f44620529d03e92c3058526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd2d919b27947ece9d220ce394d600a1
SHA1b4183ef1bced1d6b537d3e18631867e7ee75d170
SHA256bc6e688b2fd43771ffdd3df3981781e7f96a702998aa9a946fbb5bc0e4f5c6aa
SHA512d41cf622121d42f0c752176c70e003163a4d05e73e7645a02ab8a004dcb444aa907a269838b8f7001e2eb2feebed0ade662bba18ab19f25e515d40e9c3370a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ffea01e0ccbea44003add63ef6311d9
SHA1fb076ce7f70e47d40241c75cf69410d09273b05e
SHA2562efa8efefee0777a10680708fa193dbcff7b0ca4725383d3551ab9fc07da6035
SHA5124f53a7eadb676f338e71b65625d99612d3009ba084517badc08f3a1903242c3a012704741a068ebfc7560d758165ebe9dfb745492936692f1d73b9dd1ed18608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb074633d7f5250905c71586d6a4274e
SHA130ba7a34095b16ba8dd553cb06ae54771437d9bd
SHA256ff86ef31a98baa9a4eea1362594069266652a67b84b454263fbf0e56466f5e62
SHA5126a8de738f9c6d5776c733922c77af36240fd5fb670102d38020ac9d786ff615e7eecc5ac0d8a95687fcc1bce9b9bc965f62fd2562df500f207cae88d0d655b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4d6e6d42473299db52fe7ff5f539a6a
SHA15c21e32742113307d416742c49b4cb00cc926685
SHA256fe4c324071690ba78ef8ae3d927414abfd65618236db9abcb96135c76dc4f076
SHA51262e8e7795dba18e99575fa96560dded469435ec41968529465f43de81df00cb0f8b4478c409dda4f19f55cbae738554c50a3ab498e89e47283f5bfb56852c108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564b836f45ae779d48b8ae4f0d0d783f4
SHA167c1ca9ec7fe0f5e5daff50ff802e0b5fbe3482e
SHA256b803fba8f45104487bc3bb21b87109124b087d17e75591f4c82fc65080f75e71
SHA512948be8a503b7a2b137882b9c1d67c38e500d515abe260cee3eb17a4479d27103a8a92588896bae6f43ea692daae2f3f9e0350a88bb4feda1c76c3bc2dd9af60c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51715962f3c038603bc54644ee75c2d20
SHA149b59741d9d0db638d5aad4d436f6d0a4f639ac5
SHA256505b94518cea53a8e66a3c48d02ad0e08878e7d437938a57c78a8e8402b51324
SHA512f2b58e9ed0b3ceff91cb868ef8dd299c1b8e3a99e2b8acce5ad26b5d2cb0ebf307a3225c45b5ea64a90aec8bcc70ba18eeb1f4c3005492b42a707e9701ddf0b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de7089236b379e3624998f07cf67916
SHA16f28003201d204a13b57ccf45be836c8afc35b2e
SHA256c05d2e49f6e35aebb297a1a99ac836c5428b482de655b63c63c3ab824edaed05
SHA512fe0208cf4a40cf103d9e384643aa0c4f54be9edf850dd3ab8d9c2feec0b6c4e65da09bf475274c860e2d3bf16277c8a98fe951ba3ec95aedf25ed6e7c54e8171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529ad898429b8fd45c84b4fb6b15525f1
SHA1824dc90971bcf52b1fb06c7859cf6ab9251660fc
SHA256a45190c46e1349cb8100fd3fb75b28effba7d2670e261778ec1d0b4baff635b1
SHA512f6188cea82de4d5bcab1bf57ae56e4c1923396dc77ba6cc9a4fe3d4709049729da24b8dd864469956f283a92b0ee31897a961112de0bcf65e2e8e53aae227815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549c97f89d16b3ef388601229a51eb26c
SHA111d47369447872f6de0b748af470a30b03481a4a
SHA256e160b95ce6d7a7321aaadb3c7f27615117ab20d16ed1e1814bf9b7037983312c
SHA51200d2c0eab2f8c4b17ff9c063e0f7df299020bbfe7d21cafee8c240214943322b9d5b28ebf01ffbb7817d832acd74aad969a39ead2b2408ab83cdcd137b003c6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad6553a928511fa01d3a3628b231c3c9
SHA1a777249c1527fe7648cc3b690a87d03e5f397897
SHA25687ebde7cb0bc7e3764e2eafa6335f6db768d95e2e0044371d762792e24259271
SHA512fb7e99a2d5b0815690afd94de6a138050ddb29bbfb0c4b9f7cbbd4025073685a63445a9ee494e326385b6584a32b78ab85998006abcf7c68880f9fb5b0f2fc6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1125b23cccb5d8db752a1f58687bfa1
SHA105a35f7e7995314ebdcd7f75fd41f931c96cafaa
SHA2562eb961c1d01ed9a6098771040d46993e584d29e7f1f1ff742aa2aa8d4f51d294
SHA512432580ca64fb883b02c1625d0fc58119b75bc3e42ce5808df20cb91294d9bb4bef94333f698fc05babedcd862954d7fefd9aa2f0d30cbae13db5b62400aa04b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54876317240225c1cdee9c2a4fd59e9f8
SHA10b0fa6b5bc0fb9b20cd8d28bd25a9234d6523166
SHA25607d5ad0f60280cd38a6a01475ce4d3cb2a506b59fe47355638691ca22aca36b6
SHA51223cf992a62b761ae4f1897ec7e05b1d028576e3db09ddc21d2e93cc3913c8138fd29879f73816ec9de22b3de6125dc454bdbbd8d4168fdf3163edf9ee21bd460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dc2a399e930ca401ce80b0ed1be7a18
SHA192774850cecf06994f48d16a19c624a3f8c18d24
SHA25685aa8bef06abb6310fe037a6d165e8db3df2009d90543584ef1684d23e8b9630
SHA5121bd93333d7306c8ee92ce4b6de26711ad1169ded98338db45e2de90aa41d0a95c624c636a729c127438414bef3ed178cb7029fd04cb3fe838c1a0b3c07e0d7a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6e123cb325b4f7b058ced67f175e05
SHA15d4b881f9d651a7fa407f6eee259612a2192c956
SHA2561abb41912e2e6304277ae8f6f7ce7ed4086d120626f23968dca01a4a83e4071d
SHA5120d438e118bbd26fd261d39a124a68e51d2c7bd0934797170e0c93babdc5248483fea26bc47dd36a343a832dadcd301c489e81ea83cc82d24a948c222c33aee65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57203937a3d50be78b4934a9622a1361d
SHA19d2b6cb930b22c29f3351a2cb98ce2f39bd02fd9
SHA25662863cd424b50203faa24bbffc778d58a2c15a30f308d05a1036b5e4a0327ce7
SHA5120d16d13e3397f26c324bf4ed71e2793bc77ab194b7206a978be449e39f164b9f502105ce053383c9c0703948454bd825ef39b85d3f1c5bebe407c4c3a0842e64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59917d9e4815b304fe96b016dbd9c606a
SHA1ef76eca52722d036528712b998996a6db493d3d3
SHA2569115936aed38ef22f03003fdcc5d5e1e94e60a15f9e45b3fc45d34a2ca17d74a
SHA512172717630f38addce5e2472fc047a61a579de82577cb2021002fe9bffa13c4f02582975e55ce1e83149f635e6104585e2b9c8c038b7ddf856648b706659ff0cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549cf9478f488ca276b43c425bceb97a0
SHA172d28c82f78c6fab63c9e27b312c3606ca480ab8
SHA2565d14c3c98b3e9b7946a0e371c310f2ffbf8fcc354bdcc17f5f8745b504235c05
SHA512af67e29bdb3389d007349045d73a976d990263e6916faaaf1e6438ef8125e1ac880ab3018acb9115172b4774d8304c7cacd4b1108cffe8758c6caa3da167cf0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b