Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 03:36
Static task
static1
Behavioral task
behavioral1
Sample
dbbd7a5340bcd179497048a2b9e8115c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbbd7a5340bcd179497048a2b9e8115c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbbd7a5340bcd179497048a2b9e8115c_JaffaCakes118.html
-
Size
9KB
-
MD5
dbbd7a5340bcd179497048a2b9e8115c
-
SHA1
12ca99f6090cb6937467f5dfb2f2401840421aff
-
SHA256
fa4dd61f7d5db180de75c1e50c273e85cf3ebc1d3bf9bd25f0be703d3bc435ee
-
SHA512
1f97913a7706602a429ce6ccebe0cb6306cf5e422534eb14a04847689ea6a8753dd300b78dc3ed74a212c8314f386d16d236956bd6ba3a43eae7c5629f30523a
-
SSDEEP
192:CR2Ru4W0W0gTn/xDlI90jX+xtqYtYm8IH/7kYxaTif:c+90jItLtH/oYQmf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70ffb817c504db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{270B44B1-70B8-11EF-AE26-F245C6AC432F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000005c4dd8eb9a1bbee7a3685ca5c9a082675e9547e7ae9f831c57ef6d695fdb5c8c000000000e8000000002000020000000ba76c7632a07de584a49cf03da9b752e5d4299a1436802e9ecb462dd8e28605e200000009086a5494daaa1bafa6f076d773079b80612646ed2bdee4a9b1c886b91d83b0240000000252aa5fd734061058840e90db7a1ce31d935525da481d85669f65d031a8e9a2fbfbb71a7afc174563a6e1dc9b65a505d1e68cd0254c9ce695826076e672aea78 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432274037" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2856 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1960 iexplore.exe 1960 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2856 1960 iexplore.exe 30 PID 1960 wrote to memory of 2856 1960 iexplore.exe 30 PID 1960 wrote to memory of 2856 1960 iexplore.exe 30 PID 1960 wrote to memory of 2856 1960 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dbbd7a5340bcd179497048a2b9e8115c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaa2c2160379a54c053f6cc5dc83985d
SHA15ff0d93db861df4a917797925f5a8489dbea7ded
SHA25613bce01079a1428593d6f2482f82bc190049b137811302824360dbcb7b6df674
SHA512a0ba633c1e0d2fadaa6073e93898b2cb67ad24df53f814073564bfd97bfa589d43d34ad82ecb4f10263b85c022c18fb81ab87f199cc35ffa5190c2cd74eba20a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cc88f78ff83dea9119e5045d437e104
SHA1182a261e45115caccb62d61b06b858654c2e8fed
SHA256e1f143f4e8d8126b859ec0403c36f53b6c5807e40aa1cad94abab07bc9baf93c
SHA5122a6152b0f8bfc3c668afbb50629992e02bc6bec42dfa05248e6d39e9ff5c9495fb4ddd6fd99d0b1cda9cac4fbce108d8a346fd73f9b24673abe46ec9ca304c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5186a31fc9c6a829fc5e68aaf13eef741
SHA1e070b2f2e7f415f5b6be32bb859e517889c3d218
SHA256a8d1c8f6bf0b1ae69b60fa43ee8efb7ee0ee3248d6c5fc2801df1c775946d1c5
SHA5126555584749ca0d927a109a20085e16aa1b58b13f4fdc692a008ba043aa3005fb1f840794da0666f5cd56ed8763812b6a23a077bd1808436f72befbea187b1400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e138c288630923626988f6170cc28db
SHA1977b91b993055c5acf607b91d18695baf8e701c0
SHA2567131c2405fb2fd2667075d803d43a8e0bc1fac88396af77b9bbd77cb5d885814
SHA5121a9ddbbeccd989de5ee991cc3c25139ccc39d1f95c936104b0cfe5104f811065df2c58ba0ade8b815af1d550bb06d3a7a77f0b042ef73a83018a3ff4de911064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534c79382f35b5506e0820dc15f309f15
SHA1f5b4bbcb98ede08d06c1827ce7f8c214db1eca22
SHA256073bb19acc43904abf315dd5d6f6bc22862861366260f9965565fb4c67d310d9
SHA5127306546e2d208181e81ce275db14dad00fa8634d3bef839fdd9083bffc71810eb4888bf16a718901053fa25b6d53cc678b6c7cd23830083606b59ed80925b1aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b55a3de879f2c9d3fe2714fd62a84e05
SHA1a0e93926359558ea64b6daa19fe770b7542d7836
SHA256999dcbc44b9d20c93a00b085c92149764edfce4f2cda9185ec2bbc31dc449288
SHA51211edc352174d3eeb632bf8904b28354304022c42c91a0f09e393231c68223860c753a4cf3b935559f567be4ba42f31a397a66de047a8ef8fecb3b8005c8c8274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e492663206c4aaeb6cb8e61c2e7cc2
SHA1fe7bbb33614ec86d9334a04ead4c28fe584fbc66
SHA25668b6d51609cfc9a74a268c29d873b0d93de3e5fd431823fa156784c755753972
SHA512451da2ab566f216e6b0979a1a96eab9ec69333acc041f70dece1af4362d0308573aed4c4d91643bdd0b6422973b0b6a0aadf512c37c0e979a6c45c1468ecb84f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d34bb1ef40c2fb20fb498dedcb0e419e
SHA15fb19baa3d451311f6c860a7d3cdd6d9c8cf8e38
SHA256be188a79136a4378d5f4232eed2fe1be761761d1c5dc15d67b7c7a39cb3d6c19
SHA5128d0769f1fb28f1901b47df2d0d4f7b497a848d42620c4a27f88a8cfa4c22ad85b46c5f854a63ce9a55224c02a098aefa39ef705b1f94fdf09ef48c7ed1c16d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bee72ad66932f491dd546584d4b78ca
SHA1f0bf05e69f70335568c7fdae7bc875b30021fdfd
SHA256aad31675bd90da40c523dd0436e7b2f37f58b59d98bf61e2a08d1dc099dd41e3
SHA5121b86791e270dabf6301792c0dbdc6a889b3409c3b2abc44645369cc9f180f3b5f2bb7a3e14a07e293ec44c136a29183751f4073d33c388d3b0b753aaf3d541c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f61c45438b39069afbc093b881033a
SHA1a36e8df02af83466b49c115ca0aed95ca16027ba
SHA256265e0a7a7e005c61b8c5137e7151376e3e7ca741a3035330cb548c0c098a237d
SHA5123eeedaf7a1e26f651d9b56ac35d6881967ee3e50562d7edbbcb4492263799ce2612cddb6b1401b29edfdbbe24e67798faa7f603b0dcb67320243a3509606cb9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecbb50c2028c4f20308ce586a8f6bdb9
SHA13ac40e43197daabda24eb214a6f636c1860090a7
SHA2565c93179226d569ca904437f95c5e57a09fc8628ffff5c606a9c982ef9c220246
SHA512979af10ef9ca330bc964519092712fb1f9683b81d06cbdca71d9d3621fcfadd688ca7470693000a86c7a626097790456483b7d19535aeabe342cc53be05067a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce7570ffffff27ee26c44ea02c8ef65b
SHA10742724a936459b27196096d1d0e1fc9cece1b6d
SHA2568db3338dbfc2c8b71f6c59a43f17690ef3dc182566f8a74d3b22cad807990a06
SHA5123d9e56876c2e2ca7091dae68dd82693cbfe133bb80b1313689573f84b93636fb85060f69cd86ca980135d1c82158080d99928798331d4d202962b3113197c348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56020612f334c9aa4432d7e85515ef411
SHA1dfb5a7ba7bb4441b528f2b026b283878ad9a3837
SHA2560a026cfd6c589df690d97da266689b5db3a52a8e8c94a78231c47335aa63d1ee
SHA51272b29e770ae87cd119fcb9fe3e60e34606419d0baa1341ebed67f83d7c2063c2e4c11036ddd0461a0d4d1fa2ff0bc8900400269a3837f9989fb804cda8b0e646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3711f6bb24d7087bcad16dda5c1500c
SHA1443de7e8c2d5979488eff091765c6c916ff77bff
SHA2569d61bcb380889eb1483b30239cc2c0669f7a52362b98e98be2265dc79fbf2882
SHA5120f9e5b575e0b4ee91420248c38a50689ba32edcbcbf8625afaf38103c9f6dd165b1c3ec504c241a941ce19351d83803a9cf38c962892d9c30da80a35f5f5620e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5767493f1509de601d45168063bcb75b1
SHA10f45563d964e647748b9b838f8384acc328c7d04
SHA256d0a62f17264b8b7f6829b13bed5d01407fc36a2588a672d01b3f4918192b0256
SHA512c4c6f2899b125eebb7b2878459cf00645e788a30fe0011af7eb7a58527de30a5626cc97708b1b92277c0f9536ff7d0fe5f2ef57c59da3629446cff4fed4da559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b25f99469aa721d79f99353511224314
SHA10e715bc918e5f4368864cf8c80c932e75f159e2c
SHA2565bd5a220ca58429adf8ebff81c9a3e64868ed51503ad7035b636f42c161effd7
SHA512e5bdd9b73fc7ccd90bfd8b791bc39a5afac64a2630682895d40a41d96c16c1f6d1d7c17818ad798db2a968e62d93c2bc70acb83838b4924fcb9e5ec3e4434c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5014efac006d69c1f3a00571d1936032d
SHA18807f85c7153874cdf31c916398eaa96e93f97e8
SHA256be96d849069d5d00cf8981cc09b2bdeeb9d2edf2dcac2a02597b0f146d5e7e3f
SHA512dfa2454f671ad0cb2ce7e195b7cb79d2219f147e978117090a0abbc3ab213bda20def4dcf9ef10b7182d2b84bd875d5b66711c2907634719f9cc555b716b0960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51524c56019062a7ea0ba33ce946652ab
SHA1ec8ccf2bcbedb0bc2656b17b480bc0d9db2f1782
SHA256c7cc9b29aff65140f998efbba77822975831df2a971f611a04a067b8336b5170
SHA512fd694d312cf7c3cb8709d208e5c3e47d8056db0935bf7b84ce4876872bf23e0912b85ab048c61667df538940ca3be8e7be2816ddf462877939df41d800ef2033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d76de2783c4e77b54c406dceb1c7efa
SHA13c58a78cc20876254900a06732c970510206af17
SHA2567adde15cef67f1c8842ae2f43cc93efa254b1de2944129d1b258f0694be0d60b
SHA512cec9a265dfe897e96465295264b392130c298513d2d062d55cb53b56e43c8f394fc75755e674183758133f9bed3ea7f5c1c26a1b1645dfd8f0e06d1e20a2ec82
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WUBCGJ0A\px[1].js
Filesize346B
MD5f84f931c0dd37448e03f0dabf4e4ca9f
SHA19c2c50edcf576453ccc07bf65668bd23c76e8663
SHA2565c1d5fd46a88611c31ecbb8ffc1142a7e74ec7fb7d72bd3891131c880ef3f584
SHA512afc3089d932fb030e932bf6414ac05681771051dd51d164f09635ca09cbd8525a52879524b6aa24e972e7766ddf529484cc1ec416de8b61255435a89ba781f8c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b