Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 09:08
Static task
static1
Behavioral task
behavioral1
Sample
779d4dbafb67ed209aec5ed46b0bca37_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
779d4dbafb67ed209aec5ed46b0bca37_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
779d4dbafb67ed209aec5ed46b0bca37_JaffaCakes118.html
-
Size
53KB
-
MD5
779d4dbafb67ed209aec5ed46b0bca37
-
SHA1
74c318b5e55b4dbe7672b9bb110a7d968a9cfbdf
-
SHA256
19eabe5d13973c03d07434c98ae223207a930458746fc7b7d3f1147df1a359d7
-
SHA512
2c0d125b45ecd226fb7f16bc6d503b7b9f72d291e5dd2c4f31b295cc2bd3cc7a2340d61a2e91a071ae8e228ca996922e4e5f9a7671b909edf968bb2f20c20e15
-
SSDEEP
1536:CkgUiIakTqGivi+PyUGrunlYJ63Nj+q5VyvR0w2AzTICbb4oy/t9M/dNwIUTDmD0:CkgUiIakTqGivi+PyUGrunlYJ63Nj+qt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000178eaedccea9773870b28bdf46994fcd36266b61b0af25e6eb09ee6b21171e24000000000e8000000002000020000000ac4b7f037b4fe473b2c03ae6ba5f47aa7d9c56c5c7e1f6f1d3cfe8906c21f1b52000000013cd14c49279eed18f8693ad8efc7470760fc04ffb47cd9b31ae71389219bcb9400000002f9551057088336e14bae72821ff4c4ec856d3205c6e9610e98b5b22e036cd7783815a2b16123e77579a50268731adfd8824e816a49f841df23b4e4ae6dca28a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428488241" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 206fcc7f56e2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A8CCFC01-4E49-11EF-98E7-76B5B9884319} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2260 iexplore.exe 2260 iexplore.exe 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2044 2260 iexplore.exe 28 PID 2260 wrote to memory of 2044 2260 iexplore.exe 28 PID 2260 wrote to memory of 2044 2260 iexplore.exe 28 PID 2260 wrote to memory of 2044 2260 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\779d4dbafb67ed209aec5ed46b0bca37_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2260 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5071132df553837c2f2fde426681a1980
SHA1fb036c83bc66010bc991d71fb21a769fd42a8ed9
SHA25631d1048e82b03fcb3b68e2099dd1b6337fc176cfc479698c77f004c6c91e87dd
SHA5125fd3b9ec5a4bd8e62970611112a6aa769740264e9e58af4d02f4a430ae48b51937b48059172e8e675e45359cbfcc3eca0f26ea807bde4bb57b2ebf15185cf421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcdca6b35befcb904c988d2b610159e7
SHA1edf6a1f837df637fff175e452d6c1e156f8d2502
SHA256ca2e1de5498fefd1f67cb8b3460a74e908ca3fa4b1130dca28478196d4078ad8
SHA5124a4fa37aae251c79b5cd7dcdf72722b706cb3f19a1eda3bdaeeeb1202c40b254b599de54e0c98ca242de34c12ad684bfa46cf914ecfbd1be081fe73129beff2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a37c3a7052b3735794f97c855df8f0d7
SHA1d609e851449f6e35443acb1419968464ff9c482b
SHA256f9519e1589497a7733de748d54f27ecf7d3c9b04f9af4be807808f40b9b6ffb5
SHA5124cb3ba17d51efa00e932330af4556dfa3bf802699433eebb5cb60c64b053a36455d7f2c5173582aa03ccd9896d8adaf1a4c7f29b01b94aa435d8f1e0eeef4ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db442bee16823d365166cb1e06047a50
SHA1be5d81c3a9f9e8f2f8d7bad7df869995998da2ef
SHA2568fc6d6c3374a40f99019b4c4726614bc6c0c9885d8dd56a65be665fc0331f57d
SHA512d4e592c94eb1110594c1bf7d28de9d2f1cbfee6b55665bf42943b08a82123b22b4cf35d43fda58ff9c74b091ad4c208a6125e221a6431163901586db249be62e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad5f933efef7cdfb0947604e631e660c
SHA176c5a7e5742817e185171e4b1f377b056054fac3
SHA256eee0191d3e3584b38e28a731ebbc6c1d844c61e7e1e2cfe04bbd4c47073e820f
SHA5129cb4d600cab2570fb066f55ce742d7f0363aa3753f49c571211eaa5abfa2573dfe46e2bca4a4c892b14c2b08a00cc3c155fdd6c365dcf3cd582d07adf179aa54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c25efa0a36023bd9312fbb4a558cd272
SHA189ec863cde09446ce3284ebdefefc59872b809c3
SHA256e5c4f1d8bd5c6dff4ddf3f313f97b5670649a2cd8a684d966060fbc3d6943908
SHA512e95fb157d027d9474757a35a2563e784014dc697b7c332f0d4c707e633c6389f116ab7e3823c03ae4e68118678c62a4c5e546439b509c33045d5d06efe5c9e99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f17bdfb48397d05b6dde904daf54297
SHA1a87bec959b0ff9bfc301433c3d78f58fe24841ba
SHA256868fd669f3128d16a96108ad15dc4315907fb556bc6a81e6df0e25a94c646e32
SHA512c36799f8db16414793ca47b189870c8664a2f0e500a270ffa793298e82db7fae81dabd59fe0e02d605d440d68b0ae8dde66ff037327087a3bd5d38213f37715e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65cecec9b74d911aa630a4068821fd5
SHA1c54b3a1331a3288d02c49fa041af08d4e8692a56
SHA25615ccb7b8b0c0f0fae68844b4cc9bcfb17858566a91d84aee488c4e0e5557cf82
SHA5124dbb3e1f4f8a1ba61e23b4157b401bc7d5bd369771b7176c9a9058640bc558a49a3e8a7503eb3ad19ebc6908e59b6c5ead91810a57c9db500950751678e42ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8aa1a8bd686a1babdce126da997e55b
SHA1a2cdf08da35e2131490cd8391c9124c1ba917f4e
SHA256e38112b53624225af7027efc37b37893c2c3aacbe97f37195123f7f204f23fe2
SHA51260058dca0b3762ce52f339a4e32200b2299b466d81723af49428ece79921081c6bac6a6c24b8298d197fc161460597fdd945a2c336574dc1a3b4f338114cabdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5274c7a3f8188662dd795c7d2b832a022
SHA1309ae19ef18e7ff23c17d2717f5bffd10ca22370
SHA256ecec54fbc57ccc16424cea9e1a4447716590cb6d07168ce06195018a8df7d7bc
SHA512d337ebea5163c08c167354932a557c858e1ff2244b135fad332075fe6bd745b8252a3687c266fe40a4b7ae2c76a2348584305046f44b8808aec882174b30df11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b91cb9d2a496fd3479251d3a7160746
SHA1e203ecb0090c07b9ccb2e8d29d9379f5f48756db
SHA256b886ae9b2127ccf9864c0085bf78d9290558085eca94718c0d1df9e543ef7f74
SHA5129f94b9bbfa495e1aced23c2b161fcc75250974ba7f895325818209142cfd4b97690a7a00b414eb37e70c875982949ef887e5dfc83860f59097401e4427b2651a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532ee6ccc7adfb12a29b0edf61b99b4f2
SHA14f8734a4b51f8b0241450352f5597899ea649498
SHA25634a043844bb6a7c97ceea1591ba68f89be4236ec0454fe588a7c0774578b2f95
SHA5121a5f47361fa487baa8beff2fa2e9f990ecc0e42f6b96c1d9f7dba61ae96b58bf21209232d2ecd522b06a6143b2b6ca001e9bd5d8b2f7d52a217cbaefac90f42b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8f13f3f410c2cd69cab25618b8625dd
SHA1a40f9410b45cf448667b4aa314d850ecde62ead3
SHA2563bc99c013ba9c0a5ff4bf13b63dd429bd7b6ddf9ff5451d5ef9faf601a959aa8
SHA51232b5d8ccfb1bafe982d3478f20c821eb31c05dba4b61c6d4f5e89325093224ece3c1d915216e52a50e1823750d57fb5fc044accc201a6d7d78f0180640b8736d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad0f4ccf09c45312304d4ad4b57cf8d1
SHA1ffcdaa32c42d35cc6486fcd445f2bfa7fabbb618
SHA256992062551be34080b70ba9db92e1524a97de2c639c1b4a5dd057642c4c633ea4
SHA5123f07c04bb56ecb8ca86fce89201b60845487d8b8d117685462b8661458da8f679e52185c9d1be71ade4b28f959f666790b04040ad4f8467928045b8cc91cf0ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8bb15bd668adfcb0f140d3699e53d41
SHA17080191625d212e4b52b1a1ffb610acafbb19d5a
SHA25647b5412820cf934d76a49838f04e6c5c0716b53e4847ad095fc01057bb1b32c8
SHA5127063328cad4fdf822a0880939bc38e14cf9badd42a7c45916c16f3bf618b02928bb65891b251b691ae328b647c40ce2b55cb783ad0a0f1f31ffb8011863ec326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55949a4f4500acecd2aa050487f03cd7f
SHA179fd6b45a3fc3f2b42eaa7def37596af2d31e6ea
SHA2560b363566eea9c56a4a7d2f5298c468294a5634ba1f3286f7b494c875447e953e
SHA51224543cf7c1e5ffecd4dab8b8ef2a82b9fe5a189b285ffe21f70589b968231866d0d7c1eed240e1922558a4502e606d00a3c8561253e998fcc5239ccd43235536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee39a7a8a8eeeced0b3da3a83b835040
SHA17bca5dfb1b152af63dd41a980cd095e6de351440
SHA256330f874e1fa216d6dd03dc3aab6d44a12add32b0364e6621a53174e404e6729a
SHA512dc5fce1c5a0765c81437d98765987a7298971d1c857804162953b6237888c6873bc4b62ab0c628eae992b77adfe969889636d5bac4585990ba65a28640390d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5295e97dff1a3e3f3c9cead24ea096c46
SHA184102e264e757a6b35e88573423b28fad62af2dc
SHA256b0e15ee5c0c2e457b0aef804681b03cb0664bcb0815cba0b055ccb576bb10f74
SHA51283b481574f4089aa3ee74d152df41d53d4934f6e81b5cd4295219432eb0764b517d98d1c81f3a19d5edfdf2e8e08a6481e464ad41847e55444b4d5c1252cd04c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e714464915ab8d5044158b7eaad81600
SHA15719ec5f9beb218128e7a3a1fdba6e4d1f04f38b
SHA256e4362c0eca6c831ed78eecbab0c711649ac0999b0b1dd3e2aef831990d148f25
SHA5126202339e7c6565c1d4e7ade751f65c30ccfc05ccbb1e000c99cf203093fd9f1c284fe7dec64224d02d866916eb20e8ed4c2148d80e5a428b315e829072deba8a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b