Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:32
Static task
static1
Behavioral task
behavioral1
Sample
eaad7284f113a9a5fa11427179df93d5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eaad7284f113a9a5fa11427179df93d5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaad7284f113a9a5fa11427179df93d5_JaffaCakes118.html
-
Size
53KB
-
MD5
eaad7284f113a9a5fa11427179df93d5
-
SHA1
277eb9e36c3259885be39bda0edc56f68b4b81e4
-
SHA256
d47213647e234b991cf02979e6148a44b28b7e9b7ad82aa6b71937c3a8e1d475
-
SHA512
b6c64c1a448415a118c96098e52bd30a720a37e2869b6adda62feaef4f2f79137533602aaf9e19cbd05dd9f3e9a624312a0e5b68b86d5296810bc564d618bbd5
-
SSDEEP
1536:CkgUiIakTqGivi+PyU/runlYQ63Nj+q5VyvR0w2AzTICbblo1/t9M/dNwIUEDmDN:CkgUiIakTqGivi+PyU/runlYQ63Nj+qH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50311564550adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8CBF60D1-7648-11EF-98DB-E29800E22076} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432885812" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000067510fd50515952db48163b0eceb3e8f937a50a6315c88f0f49ac6da0e335998000000000e8000000002000020000000771c86d829040e784fce389cc1b30d7071d76ba31449bb77eaf525acaa8b55a2200000007d1918614f123fb9a2566e0bf6437d92358515cbe63fb0b96aa8efa39df6068440000000bed386f15c9414aef1cd9aa8b06e8c8eb56f662ece42570f642a22782be06d0756907838dea93ced19e0b9e5ea564a3c774784130d10c874c911250b5bc48f65 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2536 2000 iexplore.exe 30 PID 2000 wrote to memory of 2536 2000 iexplore.exe 30 PID 2000 wrote to memory of 2536 2000 iexplore.exe 30 PID 2000 wrote to memory of 2536 2000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaad7284f113a9a5fa11427179df93d5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad0f29cf3764af3acdb1a890df389830
SHA14be0d4929a542471b63fe776133373a15a01b481
SHA25692596469b8910b9c24cc1b95931fd2de93a6b09ca931e7e50e501f8a3de0177f
SHA512426e66d07adf81bc3297c432b3cf3aa1d07b25fe4e78fd63e305cda9b5ba11382b70f494fd8ffa7af7d54d5f4ec2740ef7b34eb60ca2882cb0359e7969f19d56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b763ffbd4e677db024c5784cafa99dfa
SHA1dd9d53c68ad545b9ea4612e014ba83da28415cd2
SHA256f95454d2591e8748a33ab8f94506d7fe56f32cd5106484b99a46f547c9b01d92
SHA512f4990436fd7b606d8fc4a1b0a64f6a5b3fcc215dbfe4d60918c8476ed16bfb54e92f16d75434783cbffd383eafc207228ff86364047998496ec2167eeef4cc1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee357f0869e092bf0a22a15de45c9233
SHA115bbc7a6fc0b78e9c15cbf9c833adaf7df105ed6
SHA25692b3fbf820c7634eecb7750f9d35bf10f13ace0e4b608fc929473d176650056b
SHA512ce369b2880eb35ce8c0c638e646bc609806bfa26ddbbba9b1f149a9af6e6acc0f0344c5f20caf13e4c026bff11e5752ee624f28e6916e5a9c4048ecb353597a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c971bbd8d9c4dfde479a64a9455dbfb
SHA12445d2fbd3c0913bd479aca6ee110a6b85901626
SHA25676a9a1f4611a65e92ae072e22cdec2e88b6845defad2fc2d83093925f21a993e
SHA512bcab09d9a8e8a6ab7552f6fea44dd2277082734565fc972c08a981b885c756c175d6c1c4aebcdf1c2a59b0df951171eccc8db7b94a3b68cf92211da3f35b8e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561089dfb576c02ab651f22314693916d
SHA1b975daba48e8b5daaab2e9430e0399ca930bdc3f
SHA2567601cfa4fa548f4e8bc5711b4f5ddfeef0445a2dd19770c83eb830f6b152f093
SHA512055a4580397f912cc235f3cc31e4c1b60ceb6cd09b7dc26b1ef28ed7babdb9aa2e780589bd45236754d17325cf3fff5d4fecbfd0cb0a058539f40f3d0cd03901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5966d82430adff98a9857174aa1920f0e
SHA1d68765ad435858865313c1dcb05fdb49c33f198f
SHA256d31bcf02dc7cf1aafa249a15ace413c5c2f02cf3eb558bc925b4ea61aebce390
SHA512fb2e39363b99229935fd8974c9b7c09c18ff9d58f5dbcdef3a9d975fb711223726cf62178ea5371deebfda1f5830db2bc38f8efb2f238b0764f719c33d00bae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560730e282ad00f5cc005d5b1df741ac5
SHA199ff04a73e589526d4f5db03a96de8f23ce89f0a
SHA2566d7d2a08a184444b8c760b6dc619508d7f1827ba6e2b9c1ffa3483635d087fc1
SHA5121e9a15f8e10b644db4c9836380c4397e4820c4e614feb5f19e2e04c5e3716a8e585266cb544ec8a2f3b41da946df88c0a2ed774766b7872058647410a61777bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d9c571211da8c149681bfc049d82ec9
SHA13c85500636f7392932cf1defdc889ddd80d657b1
SHA2565e2259904692c3a56a1a40f17ec35284b42891bfcf142a4ced6681b85dd2b238
SHA512b3ec7720f757e7dd92c1dcb1657ffc7de1aed3036b0c5f4698bab5d26dea1ff398b0c1a8192395dd354c3f608994b34240e5e8716853d72ffebb2ca1eac63bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d83f8e588ffec63dfcab960cd29ceff0
SHA165206c97042642720418d8de06b00e1f2795b530
SHA2560daa13936fbad761096218f3d0fb964be5ac49b83a004165c7f36c0668daa6e5
SHA512986ccec250c4bf1f8336d4e6b4c7394195a1364077b9ef19b1a7102462bdcb1998664083b986952d9bbc92b815e26187db9ecf2c8ff09042d108d47479578072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad2f3d00952d4b88801f807e42afe8c7
SHA1b21bf4a3125657a440ac8f250b2ed7f32c08fb6c
SHA25678340e6def499a3b66ca35007fcf606e5919884f60eeb1b7f740a4618c6903a0
SHA512e7a528b3ec41e4bc5555e386c4737298301960e21e2e0464d8d5d069b839aed14b77f3e45bdc249299f56e1b19bf85fbc9202f925319c17e0c4e2ceff4056fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef36899a58742d47f6a9e251db44ba63
SHA1f11571fb8afb200f2fb315aaafd8fb2b97a7b2b4
SHA2566987d59a6f9a7cb504db082efd4d9ad0fb8a1029061eeddf7b221cdbb2958543
SHA51219e8eb99e44b9b888b458ab17ef181c2447e9a30b36673ba7ce8f85a4f0d44dcba31ad9a60b82889a1ef4f170f772a65632e8bba40c36fe39f0f59c0d4eea9e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548c1c6e85f5a10cd30c17354e14173d8
SHA1f80ab0b73a729e8bcf5a8a68bac2b9a39aa192bc
SHA2565c791cb406dce44abedc590a59c0e30ef74c6749b1428882a98aa8f7287a7bc6
SHA51264f4e9ef1cdda5ae9fcfeccdec66e1abf162a3009e2382ea7bd9b95452d1072e12d18d68c87a97cfd6fbad80d9864afb4165be426263ab77c46cf21d784bcb87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a29040fb30603ef5b75c369e2adcfe7
SHA1a3e6407fb94756543fcf90e41894d76ccb463b96
SHA256f26fe5e938badf386d0c6c954bd9a9f6565022da4f3f151402ccf113574b97aa
SHA512e0a7602063162d096793f8165ee8888f4c908a5adfa60f4ff85c985f4c9dd15e53f5cfebf49387aeb989dafcc75b5d464558374b95a75585e0a3e2a73298bfae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b39425bf2f1a1dfabe60a69af6d9d7c9
SHA1305471a14222f233aa0577ae94e89302bdcb85b9
SHA256b98b9d7c4066d7ca7cd0be1f91ae88eb9a56cd52dc1b1df2aa835899c5272b8d
SHA5128eb23873dee25da42970e5ff5971173a3811d28e6c428081f00fef6a3bfff1b463e207fed9a62f90d4c25109c36bc5ebec68b45f9589b08e5f06df65b14d749a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557648ce55d5ebb24ac73285c984c0078
SHA191c28d1e54363d103f0abf224d4a2c508b87c687
SHA256df76656aac067f2507cc6217e065ea01e917dda244e68336f78bebc0f8820450
SHA512d7b3e66272817e63b37115e0ea871c5b18aa52d602ff4d5c240d48e8bfb41dddbbcef8157e65b3bef1a729652ff5182856456eed0a55b0c9583a5d4bab903a1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596307645feda24661c1aa1788370029b
SHA1297e11628cffa183dd1b34ce4f84e1b38ea90da1
SHA25617f1cf8369dda658c88c59d428b807893ef03a352d328692fa6167e7933eedc4
SHA5129f335909251b4412cdb1f045f0c5b2dde6036bbed05c7310ecb7d3305f0504da13c37bd3686f45c589770874e0867bf02006f449608e2f4b0fe291fe7de94a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a92826b7e8223405a08e403045390ee0
SHA11061e3767c0a179ecd79ae61ac923de76e4fcfc6
SHA256aad92246b64ab49144941b27093b9691ead93c913830cb4a276c2eade19a1d7a
SHA512bd363b26ffd84d99981fd7f0a9a63e1ead02ca8a264b031781d07e29ab7aec54e80b4e5faa2bae8860fd3bcf5712abdbc5d42105a285879bea111a7964a6fc0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5347c42e7856f7508f1b86fd512f2b48f
SHA1b647c10eedf153207358c14555ddb0170e6e66b5
SHA2564c3bb5c81de24b45c4b55c8c790dee6b737613d9ec48e50ac3e9a1c36e825894
SHA5125f1f7c812bb94415dc0165aeb65645a633b62d10e28934df192d860d1f8f970ed8587e17714fd8a4a7d4e43b15fbf027081dd9282fc5f8ff3d100df0ba99163b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577ae8532517cc8a0bc7dbc5de38cebfa
SHA10b9ca19ade58e11082aa4e1aaf174cc1b8afd01b
SHA2565ba3aba9bf885302380372891739ae063812492f08d3777fe7625bd3450cf1b1
SHA5125b56d85a913499068287b993d1f168d4229d64eaeba9c9f6ade668856815cd55ddfd96022c7fe320a36844cc1589a2bb57ec6097677a4b12c31f59dc1e366b63
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LPQ313RR\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b