Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 07:23
Static task
static1
Behavioral task
behavioral1
Sample
ae5430498e486d836f83adb13661c7fa_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ae5430498e486d836f83adb13661c7fa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ae5430498e486d836f83adb13661c7fa_JaffaCakes118.html
-
Size
13KB
-
MD5
ae5430498e486d836f83adb13661c7fa
-
SHA1
c5da0988794d10b4c6107842564597e917e58220
-
SHA256
92e7178561c5e5e0146df5b3ffad1a7b23f942f92997be56ba4a57279819e3fd
-
SHA512
fcf915ecfd9fff5cea1932f13ed023ec9d57cf33998c35195ffc7d09273486ff6b152fa322525b5911bfaa581c77deb4aab7bd0e61400b72a8f935e0fd6d8a99
-
SSDEEP
192:Rxh2b6MmSqCltPECD+gLmLLfBpsaVBRdKapyMVNvG6KpWs9lPv9NfVK4Xb5O9:Rn2DFubsaVBRdKSyM/vIWs97K4Xa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000b21e924a4b2ef56d954fea81314e05f1c487effd2bfa5e70f9be18162d88706a000000000e8000000002000020000000bcfd80a10d2f1502e038d54ec880307212a083601a1c4a182184e366127ef709200000008ccc004343f2df07230af33d02b57f5a2de7a8808fa0e48cb9d7cc10bc5fe51a40000000c91719727d57676f509ce7a5ceaf8471e211b9a138570549ef7277019454fb9947476e8aa732d44598e843b183a58a1eb5df8181b0ef675297f922da2bbcc23d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{186C3681-5EC5-11EF-B9AB-7EBFE1D0DDB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c01828efd1f2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000007df66473945add7458e44aa2bc363070c19adae710cddaf2d0f45faad982ca0c000000000e80000000020000200000004b8f44b598462acce8a532e19c927b9c64260f2c03c28170777cd0620dcb38d5900000005bea7b72923529db4204d4fa261384bc2484fa8360271d7905f174c8ebf6a5ccd3d36848d2b79f623f11fdd09621f61aa4a68232460b78687e062f303efd3f576d3a46c2b4ed5b8de2a984207ba4a643937f596fe7461b19c926bba0f420f643b96f5846e52b20c7ef17ebad534aa480af873bbb7feb97e6bb0de89157eac7c148d963450ea339312b810260fb2925f940000000450e38935822b3bf651aa0d2afb5d8d3ef130bbf21dc198ac928d7149158506d299bb01bddd4138d0c007a1b58e2b1b1dace195fb620694a45bdbd4c8e5648ce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430300476" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1908 iexplore.exe 1908 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2412 1908 iexplore.exe 30 PID 1908 wrote to memory of 2412 1908 iexplore.exe 30 PID 1908 wrote to memory of 2412 1908 iexplore.exe 30 PID 1908 wrote to memory of 2412 1908 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ae5430498e486d836f83adb13661c7fa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1908 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5482604347540fd6329ef83aec2076630
SHA1c22a869d23ce77e910c3ab4b9af29b62392966d4
SHA25695304dd911bc8ec1620f49059e086e2ffd944e262a67ca553a7bf23125ba4a6a
SHA512e64ef7f59b0e6ef090dfd5b7677e0aa39f5a1b383551a48c9dd606b7818df0fd224f47a23719249243b6b8944291f979a099da3f61aa0b26d9f24c1c9c91fd94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a09367b7ed30394c46ec79675ec518d0
SHA12dbfedb253111d5f3736325a4bf423a191811671
SHA256c3f280cc7efe9c19d078636b8dca478690bfc503809f5aa8d1f22d91decbb15b
SHA512dd55a4fc10b070f3fda947ab8abc1e438b7a471856a4a62f340d5d98d541660a105bc780737d764fbd2cf3bc1ead3da6b05f4685685de37b6c93ed950db9c700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2b4810df744da8ce323e69bcd24afdb
SHA1ef0b1f9b195859bb84d77c109c594e9ece7c5fba
SHA25626188f02da3d3c7322ceeb8c2c2e0c94f5242bc64f023afeca1a0166918a1e30
SHA512d75ecd0fdb853be85397618dcadf15bd60cc442ed8c988c685442c330008ab9d0a60838e0a84046d49c394c1e6eb0858424533905734e36b54cbf8a99722aead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e4126da66d6c3d9c70060e8022f960e
SHA14ceea3d3a2c954611478d15c241f87010f06fb38
SHA256c75faaad004f800f54271c05813990e4c7b030c7b662fbe119e5f9bef674105b
SHA51219ffc543eeed269cc2531a5f93ada10703bd26d0541b6b223ef1aca12fbb86cff5a8d7383e046d0810146873585fd30241dbdf73c08b4750e97950d93132f2da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bae45c9b9fd5cfc72111e1edd59dbdd
SHA173a1660b9c44c287382b17e830022e6153ed6aa8
SHA256b53fca07337d4aebfe45c9bf0f0736acf71b7b27c20fca4db069c1c054e6ef11
SHA512e2d3eb5bca9eb3ee4e93079e9170733477972a5f45e89d5d7ec711524f48762f497d9295331bced25d2cc8f05a71d5d5c67aaa9ead6b3a802a17a4452b6d4dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b1adf3c10643b0461806beb213da586
SHA154e9d354959deaa100a2740c4dd09dc7d33dda0e
SHA2564662f1360bb7239da7da87c9cfe37c1746e5084c507a9f9d18b75639a2de8c4d
SHA5129bf7ac845ffbb279f6a73a03f56cebc6bdeef5b03cd0726a5bf07a45b270ce2ba700fc687e867b6fd4230279d38cd230d527444a0e5f292b91928087b909bacb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c855b84cd6995c8c3024c65e3caf63c
SHA1ad1d458d757af92e78464f173bd51792195999fc
SHA256d35f4bd953e6515d7f4293f42708cd572dc0424cda8b8b8a2e235c6267538ac9
SHA5123c1fe2f0141489a9be481e64083d1f9900fc08a1fcf1d753f5546754bb6d016a720f5e3759ee87f340fa54b5595e91e9e0f42a9f9efcaab2ccb0ab12bec729d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a30f0ddb7c9614ac034060f52b62d30
SHA1ea25fca9bafec7db70a5ed31a1adda2a588d8732
SHA25643d62cb30ab1da1e6ffc03868e3860b13f6437b8999e6a143c65f93dd9dfd7f4
SHA512eb97c1cec67ae33efffe875542a6234221861edcb47e131fdc3f8dec56cf8135943e0aa1f5cd9abf722e0b811fcc32d436539a209ceb9d9d9251f1e0bd53784f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520e98aae627e0c25338580a59b2b28a0
SHA130107f778a2e75f2697e97366dec51daae359567
SHA256a283a0bbcae8e487be7ff782e59fbb9945b34039c4350b195310c8f6c134b6b0
SHA512c7154b0fba4bf407687159c5de67f2847af35d58680659731f09e3a88521a079f1a22332a58e422b2523a15fff32a2d370dbfd5c2d187130a6c25454abda530c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffd54a4a41cb01fe9ebe7e2e17423dac
SHA15980bd1a84708c46daf82f1add13dee3b06ed317
SHA256ecca22795572ff3f046b6b7a6030f4b24bd684e380ef8fb26d4c06cad234d2f6
SHA512f380c3aa06862f0128cb381112ff177305c2389def3bc1853f25d9a6775041f5f5f751403793a205c77ba1bb698d0b748ee021bfe89cbc7277f41f7ed8a10dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af26d6f0975236b6e448ed330784da09
SHA13a98b59863004c9412fd549245faf8181f00fb5e
SHA256525e266457d2e95deb60fa70c183e3ff47b4a67e5461cdeee61e939793555405
SHA5126240029f34c292810c63f60457347a5665f5864c472009537c70e8bb4fd48e77d5ee9de8cd006efa197989935302fae4e14903c272e71ebc50f448bbd12df9fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55985fcb2d8b46793bac4cec05e471209
SHA1231e5017731be519d6568985166a358c52a1a801
SHA256c6aa9328940a1c3a7f7443d3f21a33ead0e7e8c12dc49e5eba8b0d3548e6834a
SHA5127c94409e9f6a5385194048aacdc86f405c2db90495c5f8115bb683037ef08dd1f53b92a8d39add9da93abc5c167fcf227a24917b6b7b0d1d1631b4d6050b8c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbc569ce5671abcc1718c3f651efdf7f
SHA1e04a68cb856c39ad28314ded542391cbed055e84
SHA25698923531444d9b796acb9fbf4af70ea13bf3f12d353c50be1d97aee7c29fa0d2
SHA512231e2562552d959f9983d4269b720356cd076250bc3c6034f8f58dd6f30634b95c24ace853e527fee51c9f1f234090efa17e432d4ec31c367eb067f2a1960c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5270c7476a296ec24d4af81fa96060d41
SHA14200d085adcca65fa611531aaa62f4f0378f1ca6
SHA256a78c5047434bc17b5232825f85681bc1c76e66a1d9764c2f5ccfcf5fcad7617b
SHA512f36472cea138bd2b007623c5321aacab9181c6e6d758c84261e2a2c5f372cab3c08524efcc4559e4f4d11cfdbed0cc4b8e75515a7a1e7abf913f9485a971f7e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57386a571277551ec8b3dadda502da08f
SHA16a5c1fc641bf57d9cc8ab82ec0e8b5aae3f231ed
SHA256f09cdbc94874a42aaa2d0bb5a8070b675d45b820d082aa7914044b5400a08ebd
SHA51286b11b9649040d00856f5fb6d953764f2139b3fab537e1a4844bf012c2b539689b112d9c579adc67ec2325fff29a263b21d9f0781f614916011a940742383525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ae8f259615f36ef33ec190c688ecf4c
SHA1a8579213a8c917408d6827fde19b0ebe1ad9cb9b
SHA256424d6deff0001d3c3fa4fd73fe29d8ea771a95abfac899cf6b18d780108f3aed
SHA51264d7bd8abae0e41628811a54444658d6fa3027eee2ed35aa02b1e7b82628738032455039a9dba2888974835f95961007970206ac81faa30d8c4eb176996603ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a6e137c41ac194442fc229b9fc000176
SHA1f0f4092e8b48aee0ba1f10ca767024701b06adbe
SHA25647acd8c2d7a9c4d7a69901c351a6912544923a9e3fd7f54f7f1ea7c8f1e30d7f
SHA512a11a8fc94adb6e10333169244c89176f73a975e6b754d898bd85726053d93433c1fff60fb3efa48fafc8ecea1e4fb124fc71a5c5fa7e3254f357038b159d425a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b