Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 09:47
Static task
static1
Behavioral task
behavioral1
Sample
77ba8735b5eda3a8ebd27d5bb876e990_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
77ba8735b5eda3a8ebd27d5bb876e990_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
77ba8735b5eda3a8ebd27d5bb876e990_JaffaCakes118.html
-
Size
53KB
-
MD5
77ba8735b5eda3a8ebd27d5bb876e990
-
SHA1
bbc7a0ee6e404bc18062d830d828804aabd02a8b
-
SHA256
2ea22398e23dd390984d514645a4f88b3303552cad374418ba0ff303067e424c
-
SHA512
3383284e7411277ad011b7e25dcc01d4a569aaf292040670f2d98c59a3c3ca951da1ebdbb5ab628165e730e4d09d67ef1c0b30f95a72b1f7aa7a48914c5b38a4
-
SSDEEP
1536:CkgUiIakTqGivi+PyUC5runlYY63Nj+q5VyvR0w2AzTICbbVol/t9M/dNwIUTDmf:CkgUiIakTqGivi+PyUQrunlYY63Nj+qM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0cb820759e2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428489330" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000093ed3a624c7cd055d1e6e979cae46f19340777406d2f68f9d1af76b5ca445fdc000000000e800000000200002000000080dd811163738766c3f2a0e89bafd41ea4bdf5da2e27575c9979f323148d44dc200000000378e2572e6f2ce56bb9035789be113cba7ac85ee733e86b8a3388c5314d200540000000c55e6678b1aaa9d1830e017afdac0744c09d625c06e5c00d99c05a91671070a723adffb5d13333bcf7f31132d6fc3fce1645278a91661633f0a254d3e5db8bcf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{301A3E51-4E4C-11EF-AAD0-E29800E22076} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2944 2688 iexplore.exe 30 PID 2688 wrote to memory of 2944 2688 iexplore.exe 30 PID 2688 wrote to memory of 2944 2688 iexplore.exe 30 PID 2688 wrote to memory of 2944 2688 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77ba8735b5eda3a8ebd27d5bb876e990_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55157c8bb3cc0701399eff4e4483bedd7
SHA1a5ea9fe0183731f347490f45b39ae570fcb6cedf
SHA2566097dae9de637bb1baaff9dea4771a61116a41bb6c42f4a65b8bb63c6cdbd8bb
SHA5120a57e3e0497bf521ac7772ea50ee092db9c6facf02cffe53a72aabc8372a9689de04b6d57716a03c571f2e9a114185565447b2e6b3428281a9f98072fcf07d43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce502d4227a2d4b605f3c012607d6ee7
SHA114fb8bbabc58ab1eac368563415d21a95dabbf61
SHA256f78e28078c822560419002e960b204147119bfd4c57da2c8591b32c909ebef6f
SHA5125629627447ad742c943e310ec9ea1b46001b74202fa60d8d975ea5ef7e1982e88007ecd511134e58febb001c915c7ceef709370902d9f5d90c33e7b22a00987e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a02f5544043955b6ac882e773d91113
SHA1fdb682e18909238cb2be0c726fb5d43fe8482554
SHA256f4d0e896dc4cfafbfbf1bed34b4e6c6f02e97bf11240d2a1c6296a7326672c83
SHA51275a6871581e8a2e371ac7ad982eb1a32e0d6c1a719c713ece77c9f117030c8b6ec920e25ad96eb16561c7f6eafa494e3515226bbfe42903a4414b6144fe1043e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a6b6c037a6bb460d92c1578f14339ed
SHA18742bdf4797761f803b56eb69e1f0e28cd5d439f
SHA2569f88d13c6bd8786c8c6ff6842673133a134af6e354161ccecb5d4feb3eaf1990
SHA5128fc233edb2c68bc58a415ee315796e3d55c7a110c9920c258bc540a91b63d3cefda05c2765a0ac8af3c1a851d8444fa533ec31c8154a5ea4d0608dafaab9e898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c84217de181f540c0e506d9f1a38886
SHA16260340780e09ad4de914b945bf03b046c836fee
SHA25688e2175e3c03c4bf05da6fd1b05402a5ad07a108115fa2d12eda9c174ef61e7d
SHA512aa19e8b477b12f157b59f85535c1c2c4d185e0e2e711bbc5463f297c46d8eb76434de0ca130f5b8aedce0c9518b4d18530e042f197ec0e727ca14a27a58e7a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510304f9496228ee98bb7c7a18e493004
SHA12fc030b2791af9e2b139b53a1f06d10df6eafe24
SHA256d526ea933f1251eb54313cf224eb794c54f56d41b22f228f5f1e885bc3186c4a
SHA51217d064f426d55bc71c1c21471d37a1d17c7df3378b8173bb963a23ab07feb1f14325c86454c98cd9ce07510a6368eeafeba0272d63d758bb9b6014c5c99ec521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd44d1069eea512a62fe11b8086270e4
SHA13ff98b9f40c8846a2fb8d33b2923cbc991d797e6
SHA256a3cc26fe2586dce59d304d580f3594e402b233ace4029a2f00df461fe8013c67
SHA51276346db28d42352358310a2bd5b351b2b3adf8e847d9efc37f733fc8649fe606eeb39c05fa91ddaf30ba997a1cdf9b1e824ccc57322bff1a3e5111fe6073d3db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516bde81d9bf684506e206cb23a07090d
SHA195788acdf58c0fc8624c0a34b12946b54bced666
SHA256cde5ead16557be2235b092d1f9b6b77ab24858ba9287dd7b36888453c64a5772
SHA5125a5a66fe3ebdf411a93de08e3fe051c32cd22e3a535c5eab149ef606ae8dbfe9828e83cd2b4700b3e66102b6eb748d5d798c4a1908238b2099ca8982ab31c5f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b76a16becc66ed7a5d035bdaa6e197
SHA1e898225f8b362707feaaea7cbd3d0dc589e2c351
SHA25612eeb1fcf72f52171822cebcb373c0796d76cb011705e46536e3b41dcff3397a
SHA512200adcc9340a01effb7b960bdfdc4f051fa4d0996986f6068872136fc49c70e31b676b8d93678358ab531d6d3ee812b12d777998d97f8352955de95deb66861d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557792687c4768244154263fc83f7b3d9
SHA116b68db75afc0b51f01198cb53304de8562dcbe9
SHA25666f8ed35da8b6734342f37947f94dee7619563de506c43c0f8bdfd589939297c
SHA512b713bab2f68533ac50fdfddef1b4f21985fcb9d10bcde2c053030fdaaefc1d5276c9cb02d44d2a0f584ccbaf86a68f506905572b87615099843489a6b341f885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eedc62a48a5efdaf0573ae6cfbe31ea
SHA1e66f3cca3fa1f843ad1848757d9f786a669f7eaf
SHA25652b4c1211ce3fec4cb98d776f4fc4b6bb30419ca3dd2d93771d5861edd76bb67
SHA512f5b84e14afc5ff468046ba1523633e1ed88863aa6d899b9406897abd1ab3138d1b9cc0c9ec0c4d776457e5b04ad24d31ecb12eb7ce34c81cd5c48097b7078a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5132c1a5f47cdc7ecb5c2db646ffb3aa9
SHA10116c59dea88b47efc2d9bff8d141afac015aa13
SHA256c66d59830bc3bee6232209eff097d5a1768ce020859283bb58b2eaa2cb0667ce
SHA512b0d1878d82b2fe5322587294a3d901f69ffcf834497182a336271458e9856df2c0274fdfb9b16cfe1ea38a4b6b4af4fb69bd4e25d087f0d2f89857a4d8d4c58d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcdfddab57df6e3b8ca5e99270cd328c
SHA1ab6f5a3e5612960e55d9c22676ae145edc82cfe6
SHA2560dbebc36570a3362c6ef8db21234bcddcbcf4bd884cae8d72a2655c531861fe7
SHA5120c0912e9bfb5d3eccfd6a7b0acf0e609fbcd005d823e88182d735432905ec981bb6d89b05541b6744cea454f0e591238b0f2ab509df795203596d67b61755c23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f9a6e491f0cc565e1557a6666011f37
SHA196cfaa9d257012b72d1c292ebca564b02a8a8cd7
SHA256884ea7d9312ba56d82c3518b41797ec49a0e651679aca3947304e1bc8b6d5e67
SHA5120d7ee6201360132cdae57f91690cee17f9150b6077aa47fc46c6ad6f67e691ca40e6035de8772a38608ac63cfe30edc05e6c5767c0d91bee4a8558d16d81aeaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f79ed4c18579c842ba6bc5256351e52c
SHA1b95fe062be14377076b1e77c59a82bf3ab96b1ad
SHA25641bf3187a06195769fc61d8c1ada796db8f2f001ec78e84db8df3ba65f539653
SHA51230fc47ccadd7183b98f16b17915e4c1d768a32a5bf9a5d9e2b883af3ab2ab9c542eaece698e5bccec8891ab600550bf313bf67da33335b09066d33800bfd1cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c91f6a16f111376d8b813dce91fab2c2
SHA1d4e1f0cf2ecf152cd961c0270d67600016c94995
SHA2563df065b30c20b94585f9df8dbca56cf1ea8a274c67a7d606d07ea452f502980f
SHA512fb14efb9f6903463f4f89bdf867d62c5ed9fe3ec17ef403b12d183d2928fae64052001987bd970bf902e982c21a4e5862899034a84804b998e1435e32544406f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5614520283c0b4b56423f16a4c7c286d9
SHA159bbd7b7b5aa4087786ac05a81f417e0f78ed0b0
SHA2564ab0a4bfb4fbd64460370e3ada17b7c14f61486766b4706358adc9c156103761
SHA512cc1c0a6cb2185f3d58c3f1178c012a1d8434490c5f9cb13b833742b2ea8cbaeaaa70f5734b5f384cb542ce490e9cfff58661a1e306fc7081290f9ef6b1ca3812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b921e41a6909d5bc7d1d336fdcb117ac
SHA1136fc3ff399239e1bc2179c7c3fb71b9791dab7b
SHA256b211e9118b8c1f013da2f937c549802d0f123db514014de83b8ed29ac1d2e370
SHA512a345de391c6c638f35b8b93074d37a722e25c7054a60c6c701705eae26d5e3fc7402f30ddf3d978db7bcd8a916a5e3e3bf341f93d700b4a86608c63c4c3c5a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595d61a3c2b19aa97fa717e663246cc64
SHA1a96e990f748d936ce08dce2c8b3645e5eff8eb3b
SHA256c21edef7aaee88384ccb898cab9aaabaabcc1050e5d21e3c176579171000bea8
SHA5129e7b8ad901c309dd02f320096f2bed7e7bee8c0d1c432152fcf6f3fe1af78c74214caada38f4c0e7fcaed529a0efb3dec4815b7c8fd77e782072e13e41079144
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b