Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:24
Static task
static1
Behavioral task
behavioral1
Sample
eac1754d2e4a32380b8b2fd63971341d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac1754d2e4a32380b8b2fd63971341d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac1754d2e4a32380b8b2fd63971341d_JaffaCakes118.html
-
Size
1KB
-
MD5
eac1754d2e4a32380b8b2fd63971341d
-
SHA1
2e019c9f5a02d9bddac06e74d29f68a31c0b589d
-
SHA256
89ba44f13d3acde60cb3c7338d6bf9a702605cadb025675a223a3bfab66c8d99
-
SHA512
f095eeac710037d1de10d514183f1702436fdc7746a82b9edebead4644a1fa28b8914f23d3e90564cff9032b47ce3b27c01d6923b45fe211be8447fee42bbdc9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000002240e579741c8051b9286a56b3410b075134973d0da2387e5820447f870f1bea000000000e80000000020000200000005a186d71d80a2b595f692dbb5407df75d8249507e18489bc1a378192e59b36ae20000000c32ee7c54f564a934c4a95f5e410591844987025e4d4f267fe6148ce87566c3b4000000001c97211dc3476a84285e21604f40f3846da27371187ca3506db045742d81aab22739c54adb3c60808dd8a6f7f5bf535d1b5d40aa2568751462c4e051b1cade1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888966" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E4AF9971-764F-11EF-8778-C60424AAF5E1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506692b95c0adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000005386de085916c693b94bd4db70d3985cbd2bfc56f9783809c82ebf97d5cbc16d000000000e80000000020000200000006fcb40a74025723d6b747f63ec497db5f80987145be7a3bf4609806c6d62450690000000a15cd0493866eb92ba52351eee262d8c7d015fafaf5aec8743094a886fa97468a9276a8a2ca43e8489518dbe5d8139fbb2de951bd65f58adf361c536f60c86d41deae50a57c62b2fdc63801276bc70f2c8a8de159d2380c5d5ecf8ddd5fe9ddc1d781d43265982ab9634d499ecf30ca7ecd9b8e89390f7d7c14f0d9142bdc8cd2a26d928e2103a10481852904ca56f5a400000002d6201a36dfc7ec1e4aa49b2b5e524107c1395956a9a2a0a455ae0297fd86b2cd6ec872cecec71935caeabd86fafc3611598599850d74853ff5b46ac3ecb2656 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2808 2672 iexplore.exe 30 PID 2672 wrote to memory of 2808 2672 iexplore.exe 30 PID 2672 wrote to memory of 2808 2672 iexplore.exe 30 PID 2672 wrote to memory of 2808 2672 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac1754d2e4a32380b8b2fd63971341d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c71a865c214bc15e98bc31e79a2f33a7
SHA11ea8ccd860351f3eee9be98a37d459489be7538f
SHA2565a04fec373d68fecfb3301b2310a7dd5eeff33cd135fcea210f73aa7f1cacdfc
SHA51236b9c9e798280b6d9b1954b9c3da66fe5d48488a83bc0c9d6b51b12c530797a762e1820e1dfff76aa76846500407a005aa4b32cdd31eb299616bac38038f162d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ada476c373896125c0d6ddc320bc6ca
SHA10264a0a75bf217d70f91cc9e99e53308d72ae947
SHA25679d76908e5fed9410ba24a425c14faddb8d2b4de47b344df06f0a401d90fd07a
SHA5126ffe4792faf4529470ac1784a5224c47f85f5399fb2345c3683eee46f205743c1ffa1d2444b69b87ee6bff5c7ea42262497a82ff28d575a94f5a4f4f44e909a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0c672ccb9eaa66f84dc32132b218c10
SHA1fa7ca89130f7b528f8fc040fb2d43b207c7cef47
SHA256658e188b1150d481bff6cccac0404ddd1d87b1af169abecd5894eac69bf0c01e
SHA5129a482c6f243f04860a23ae5513d23d7d429e6219e8034c846e90bff642d42100cc44addadd4e37ddba32bf9f929025a3b79eb5535ff6eff3572e60f93535b104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b86b35e04f79a57c6a63c72cab0c55
SHA13c7de6eb7e37da45ebe86c103faa6345ee4dabef
SHA256965727986ecbf28f47e38925339b0738b0ad29b71bf3cfdb2971fa98b0d3b83b
SHA5123201faa708e0fb0e92134967dfaa23622c318bb20bf023e049142b7d84ba93a066d1e5646139274935a1470bba3a76bc75bec02d0e04c873ec26838bc9061d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5377ac838a0531cbe377ca9b227bff176
SHA1a64dc903a9422c72b235bdd3eaf27bdfd2b9a10d
SHA2569fcec3595ff14153a6e63e2801aa147dac11058eaee732f047521cf2015bdca4
SHA5128e3bac785aaadab8e67bb963b724166721ae5ab2eb0fbedb3417704f15dd80092d1e9a49df32e97415f217130f6bd14af33c70d65d3713e0cb8050a7c2280bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59458f0734f41c753fed1b6f41f0c7a2a
SHA1d996db277e1d37641a9d5b8ed9fa25d30a65a866
SHA256263a5a3770cb0b091c969d8e54c36ab0fddbd820f53f9d59056e3168d9b2ebf4
SHA51201fd7553200dae12a2a9915438d0b3aedded7edca8d86cacc1a98947c7c7358d4d5a6b58e24dc2636b51514e72d2c2aa786f003311fbd5e6477ad21edb960f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a4adf49d809c875218980206376356c
SHA1d4ea6b5f1f1fc0fec8711368141155abde90d60e
SHA256ca25031e325edfd301588ec3d0a7ae166ff8ad80317ddb769d17a8556694a631
SHA5129fe70da269162a97073319b46bb18ebb8dfc08604d4f59308fcf9b9ba7e18528cdc9526f48859e1a43e827eaab8fcdf726b6d2a110c33480e7cfd01c29090dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d5830fd7937caedb0aa8084bbfaffb
SHA167e1fd7bd4ff59b2e097fcea604e737b8b09273a
SHA256cb948249238a166e3e9fdf836f63dbbba73610e22f7939a39d9876064ed12dba
SHA5122ed2fce35a1e319488232c5ea5880b72fc7c984695f7bf2db48c7ae50b742c47a119f5981c92a15ee11f7ab00c4b6bd3f8feb1829123ed8b3cb9888a974d1c28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59464654e7b6b072ba9f3e811727582c7
SHA11e2b036a62942b0d3289e4892a00c29ba9044a36
SHA2565f7218b5711ce407ce30e28d01b1312a770f96dcab23452a0c6b3513e6f3782c
SHA512d0dd5df5607b0ee3cdfb888342a15140905909cf705d4c502ed4640b4cf0fd6ba25aae5c815c9936dad4933d22fd712182a30eaffa6d35b5cfb706479a132f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1119f964ad822cb5cec52594b8d0145
SHA15e51067a916766bf2f0f03c96c5bc7d904e596c2
SHA25615859e2e6c2ea6f9fb9330393aa8ebf3beef3873d387631d2202ff4a78410397
SHA512fb4ec03cbf825026cc4ab824f44d6c1d7210d2b5e26d6ea2d54914aa44da8cf7df387d33f56837a9c8e55368535b0cc6fcf52da6f5dcfcfefd1835e551b3f0b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58171ce213ecf501e1617f86ea6518c4b
SHA161de3bab4467fab203cbd3efb88a4f4a2aeae6e8
SHA256cdc15c047329c3a9bbf2c81d600e630eea9772dd9e4631345ed1f8ac3d5c7e40
SHA512788e4c41a236dd3fd8baa7ad1ca262eb5b83a58d36db55dc7b1a9f650726d8247f34608d93688a2dae5b0a0072b68d7d58257795f32406aa2dbb809e8159a4df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be69bce2880a7482e59e0a0f464ff01b
SHA1d7abe96bf39a04d9000c816ba4932b85f19d0281
SHA2560e4f4573ba8ddb2b8c38946e3402530394c3b4a500a4c89914706c106cbe3558
SHA51278cb4edf40fb6bf57de8b450357447bae286d6e8a8f7f1d11726f1a76e68f7a70558951b395bd837370d9ce69091ab47e7a0015a76732b2afc56844f272bb0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526e193a5fa783dae32df44898701dbee
SHA1f9e2e0770efec2184d25de22465d2ea72f9e1eb1
SHA2565e87f357d090136bba2ad83179775d4507eb8fe33e5a29f2fa40fd50a399f960
SHA512677a352f1eab9d366bd79cab26601d600e546d362c2418b184a25b7ee8dc7303260a0c7e38185ee397bac7649e69d1cb35693e42dc781e24a0f753e99b796a4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf19c8eac7743765c04f6e22945c336a
SHA13d056f35abbfd1191a1dcd2ce1dcbe68a1909e27
SHA2564d535db6a08f1bc08e8f669a2440fb5906b6fbea7a6c92bf87e0a4a5c6df866e
SHA51232fb5c30628554b737f76dc29f6d15049a05fd7583c2deda428158768cd47de0d794fcaa45fca6ef57cb6dd83ae9948a7525ead3db743ab75ba30f81806d6212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524093a68d1cdbd456725ee0494e61016
SHA1232a9d098b23d9af629b1d8effd616fb6d6d47c0
SHA256e5a78a26fa3afe2d9fdf3b5dd582179ed007af4590b0e5092c66c5c9f395d30c
SHA51255796a265faf7995bd918b8b27c60bab869690dd87c991f66ab58aeebba334a608d6aaca335f9442f23ecf7eddaa689adfad31ddfc39447a420703ad91e47af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b12deb0151cedb7d3429a8eee038836
SHA1faf681a172ed1c67ecc0b1b3d3c89ec3eba92f80
SHA2560cd4fa55c88db603cc1918df1ed9e54a9c8e6d31fc8802fdbb6c0994f5a2e388
SHA512a357bc60cd7039d2c13c71ffae634f701ff7803d6d6d130a1511cbdfe6384e3c38839b0cc9757190a4c1f9bfe7784fb4d2dd8b3f5a72eef055a2ce411da8ba0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc68251316c0e1c88068839a437564af
SHA1c32d0053ea2a351fe536761af53cd43adb9cc717
SHA256e56c41813cc6a587b016ee7ae4f2083d3326536267a18a274431e7267883b58f
SHA512bd41c27409eb51330a9f193bf0ebcb40a2dd37f35eafccabab1375e1e26a173fdc0f3eebbd42691261b3d8a6640c9749ea7f39f722904a6f4a0fd4fa4604dc0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589100678186c040083f490c4309dbe97
SHA13d96160c30e633440459bdc20d90ba19a8382e3c
SHA256088d1facefce76a410db28ed5954e9f08ddbb46952d60394993f47abcec71c68
SHA5120f42c9e37e936ba0d000bfd3447069b2b11ff05bd54e325e7ba59f0f656af2a83fce654e83d893e70d8683e99b985726974b8fd77d15cf23832f81e43b01113d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57722a1568b197654e9c6725228ab68b1
SHA10c25eba87dedfe776c9f2c62f052c0ef2f3cf9e6
SHA256cec6e9b605216dd8a499e37c1f580d78473f99032b7a3efe855bf5d09288a541
SHA512b4002530f3556a715f0fc8e5b15fcf51c2e769882dccfbfb8e20c5ab01fb5ca0350353a3c395a8aa3959e36d0b8bd188e27d55d75e4b3af40e1e666a2bc54d7a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b