Analysis
-
max time kernel
133s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 12:04
Static task
static1
Behavioral task
behavioral1
Sample
e270323b3180b17f03aef72a6dfab55e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e270323b3180b17f03aef72a6dfab55e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e270323b3180b17f03aef72a6dfab55e_JaffaCakes118.html
-
Size
461KB
-
MD5
e270323b3180b17f03aef72a6dfab55e
-
SHA1
a5298b7616d7c2f86392702e690e6eafafb049d1
-
SHA256
74b9814a57e660935de603bf4931e69360966bbe73cdebcfc332d012d8459d0c
-
SHA512
bffecec67dfe2716552597dfd6397116852b344ea211ee8dfbcdd9e341482b8d9eeead17623c34f2ed78337376ba66624b672cb062da7ffd0b8bd5f0f905d9bd
-
SSDEEP
6144:SIsMYod+X3oI+Yc9sMYod+X3oI+YqsMYod+X3oI+YLsMYod+X3oI+YQ:95d+X3OJ5d+X3a5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9F811B01-735A-11EF-A02E-E67A421F41DB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432563722" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000005bb9bef6810b7df4473ad150930251ef8e6c4b2eb517b819b0923d657b599e10000000000e8000000002000020000000d5ad9cd9fce3b98b37a90dcf01c283fc5a67d21dd3a67afa4568377554f30f6f20000000f426153de2d6e721df21e7221bae70b097f80d52e9f199db2848931dd0fb4506400000006ec0bf6bb23ab2f77feaf29c1e90bf958f62effbc2c1610dfadde9eef5cfc2e18ce43489887f104f49b7c564f1fd71483ca3910a48b4d3bac76ff4ca5f186b9e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000a74f3e7eefabfdfbc63e72771fe09e24c75690b6320fcec5141865cfdd3ea3cd000000000e80000000020000200000008a002fa26e531c70608297bc4a69143e0d251c89433ce8eae46acac813aff0dd90000000ec64b84155e9ada834bf844aad8f778b592f3f72de5d48271cdcd76b5b189d62c81a8f2b1481873a45ae4ccf4617e294c04551e1e99dd9f7fc42c1aeab1253116cbb30ad2045b2c120feee7a9dc2720323033bd06edc60ddbc753dc64254d900983b31bdfff01228abba9b3a8283479c54828e478bdcf91397218d8cf6d4663d79bc8fbb026adc911fd8438b3d0e7da0400000006d34c2bb2dd3028f2e0fe65c0d38f1b899db427d249bcdacd5baa3c09455bb39c45920b2b1e8161936b246818c662ade47e5bb1dcb5513918bee2018629bd637 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e05678786707db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2684 2876 iexplore.exe 30 PID 2876 wrote to memory of 2684 2876 iexplore.exe 30 PID 2876 wrote to memory of 2684 2876 iexplore.exe 30 PID 2876 wrote to memory of 2684 2876 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e270323b3180b17f03aef72a6dfab55e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b02891316bf8431767461fad14d54e31
SHA125b402088a8e23504d8a2b7c83fc577ec301f9b7
SHA256d1d163ba6e60b1f713b11c2df65b02400a55c4ce843a89870a09d8838e627bb8
SHA5128baf70b19ea503e83beab2e21c01363ca51747d7579d2502a9c84413e037dbdc3e0faf920c42de6bda9c655ff10dffb37c50996dd69b0bac546262fecf359bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b0a712b483ba5b5e13723c79679a36
SHA15d57f356584df96f0e1e9c7d1bac21b21ae6b9bd
SHA256285ac367df33fe482a8ede086659d3ca2526de6a0e5ab2ea87b6665bc9f312b3
SHA5122b669accc2cc84a407a256017b152849adcab9894e521cc3485571a22155623955e35303fbd28329f16e1a7825b3e3b1a04c63c35dc91835f497e9638654a008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c46dc3dee3262dd7753602ad54f5ef8
SHA1d95fe52a1cfc128de46bd30de109e2ff7975e9d8
SHA2567496a2e9e6c1b85a608fc6505dec487f118ed81ed3430192939c491a789e2368
SHA512c213114c4b63cd199be9351d02a7a476fe84f14ebd3d636887d3392f0499f2329b231cc7df3188f12cedb7e19d82c86a605e85108810534369a9a13e782b77e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c53728d01edafedbe3c27d3a3e367e1
SHA1a19d605b757fbb13f683c7edfc9b716a7498164f
SHA256693c336f55a395ca9dc153af25aaac0b84fd917a49f72047bf141add4577187a
SHA512ea305f1184fd0511ea08d9df60d4592c63fe82a757958331ccbd234b6592a4d68268c0a8cf9f1fe88237558c73916a5ec251e7a42884965835e6838ee1a8b142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d82105fa273a3f9073bd604b49f7592
SHA17e3752b71916724a30c5f38fc860c80677c04c80
SHA256966aaad76a510dd937ba6a73967770569b8d7ca52c837643b824323d19bd6355
SHA512effa941b3509d28661af1763f1cef90c8391fac5eda3121be342f55fe1a568616eccac7ea73a8915b316673680d88a0cb16682d49662ddd793e85d66470856f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5976482ba92c06a365c025593c4e2c41a
SHA127c673a61b3241ab49a48e6d4c6bc95ef01e04a5
SHA25600a10ff7736f6b7cdfd81448d8614a9d3bcd7be58b32dc60de01c451e073d4f4
SHA512ddf9431c8fa2cca9e710f335b16fa15cd05696153039fa97622f0d166b096a12fe9ec478c4271a8a2325299abf25b02d0b34e105e1c296d32906a84db1dccc9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50584efe6448fe1f2eed7b28c3c960c8c
SHA1e87c14d9f9d9d1eeb765f5dad722b97a580e66ab
SHA256086caf297490d7c4d48f9cbbf04bffbac3a7725ef9ca89f54d78ccf601ead012
SHA5123862b2d7498321fecfe4af2bb309a02b922c495439d120d631bdce0346b982f25a8c383adfc9a89f6868fc7ba1f65dd352cff8850a323baadf1357db1650b4d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b616c0dba21e654f367ff0e61f031e31
SHA154c89ff06267593da78d345bd25b74b2db3c66d5
SHA25650c41441d800cb3f03a0af9e268520912fb24b5899771929950c02a78577e72b
SHA512471769d5265aad4656a1739669cde3ab807bacca2fc0f98ad8bf374f58740062dd81046feee759d2f275f107de60467036bf2d0facaf96bc99b059f9bc335b12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537295cf967ab1c2a7d7950ca8dd38de2
SHA196edd41900c575689f2e9e48736ae4e12f9406ad
SHA256ff0662f9b6d75d34aa3db7fa65a1dcf47422e75c7962d3bc3e5e7d1ae70e6e65
SHA5128711bcf3fe2abf8e0a44c962f56796ab103276732dbb1b5ef0f8d25c5e5ae9ee21bba810e0f3b0e6c22d777cc26cd2f3dceb5dd016c7478a090307a0743224b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2d665e81cdc4111a83035b7aad513e5
SHA113fdfd6b97ffd8c902b4f3c14ec733aa6f6b820c
SHA256ace932df47ef3a9f26f20d54c7d85ba6597ac75b637b0280b72ef5e7382dba91
SHA512874decdb23dcc809f47aed984c35131f10a714a1ae04d81386f6a082361746cc17597e7432b26ff1ae6ffb028d7e20d4eaed3e7ee76e00dbec782ef2c8443dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7de77eebe519e2317cc4046aba60ee6
SHA13fc206190c52bb55beb0b3a52ffa0e882cc42a12
SHA256959af885d93c5541225de2cf19fe023015e551da77684e82dd179262f9ff3092
SHA5121cbe569b1a94615c4018ef25b7d598fd1e1b4ffd76e9471e4c916d26d4190e545d7ecfde18deebb057d69ea715d9cab0e93a71807d634d57fb27d991891bd95b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c59cbdb39132fb838f06ce731f61d00b
SHA1dcd186b563e338cf6f8e388fdfb6ab7ef49428cd
SHA256d60b9091810ad05a95473eb6fb34ef976c54d9f16c0a158e3c6f3eec5da4b1da
SHA51285852e8251646ab9ec6416db26fc95dac07ec6f79c2653a4c2f8a3ffa4b34ae81ded8b2563c59c86970f068aa39ee3c64e3bf60ceb1410bf30fc9b1bb29b30e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58160c1ec2decdb11534728328a269603
SHA1566008b0dd6bd41ab82c831145b9288384290288
SHA256fe8f64e67c3c76ca04ca189ca57fa80af1ce915de1ef172855860b82e50b5479
SHA512e803d2ef10aeba1fb224ec11d64ab26187454e522ab659576083221bd0cc39b6316e76f9a4aca46d87811a656cb90e9552ee55305f8507cdb7f2021845e2066a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537514fb6b784670463811edace478c4c
SHA180bf1507b6097342a41d6ed699e55ce11b1e7747
SHA2562a14aa3e7ec1b91bbaa87a8b89a44da0fb9fe7a8235d907109973a540e0ea7a8
SHA512c1fb6b761c86d23bf7bf4f3489b6a76e1ece681ba12bc40fce0aa576a7f24d6edcad8c914af971babe33328cadb421e42cb333e6cb88931d0097bbd49f9524da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5603649dd37378e8b8f10296479297442
SHA12d7803e7df2ed5790697b52873a388cc3612076a
SHA25654b4a7402cd348a115922c168dd69085abf4bd8bc819c3c37b59495ca7c98c6c
SHA512081199d83e73c0bf7b4d64a24664f0c247cef10e81469418c45134d3c2ce5c7a3b8a5738a03b1cb91d9d80b92d71fd5478e62f84ddedfee20fda483c2a63118b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51961423088230c6570dcf0401001619c
SHA1e8739c90bf4cbc272b9d11822f5c0ce628370fb7
SHA256914934d357996677ec27c6af87b1bdbf4b43a7837c32f7ec651ef8e2715111db
SHA5122f566faa2c41ddbe918ac14f86dd87644d8c4a43a85f6a756be9cb3addab4ea112827f98a0f28a6b0bd3c4ae0a9d60faff6356218fc230cfda454e422886a409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec058db03f0bed196aefeca633ff90b
SHA171ddfe210ff98f59c713c14287f665b5804f2b70
SHA25678e81d5f27053f8a8e265eb3cef9114c21e046d911e1216f46b92a204eaf6a80
SHA512ffe580ca6e781152d8ea1f14f4a5324b0a45f70624fb936829fdea792c3ea3cd90b390d1861625f35461d144577a38b87e49e92e26680b4fcc805771f9b6defa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541e7b72508da864a844baedbe841d73e
SHA157d996f055f124527814f4adf186897bb11cde4b
SHA25621a7ab32594bf57c10952dd5d02ca21654e82de447e8edb2cb4eefedd9d9a0d9
SHA5128213ab2a8d85d050a587b0181dace0801cce12bec1d94314c1154a324e5292aec1b044969e837c9ad72b7a8ac967043cca03a92c082af5f71d0c467834c68aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588310a41fc5c970dde72cc1684e6be67
SHA1898bd063cc7dd449213309a6565d7b57def6b452
SHA256ab80c198cea89276a51b047e8d01e020b3cc219e61c1d60ff329087d244e00b5
SHA512197779aaa88ec555a26d2d804cbb6317de34c010461b09babda4383a30fae5d1f72a4bcfa17f7065c4e6769860b7c2cc49993ac732b98211b53d1f493f069064
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b