Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 00:46
Static task
static1
Behavioral task
behavioral1
Sample
eec13beaf7e34ec8460e78b14a1bdafd_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eec13beaf7e34ec8460e78b14a1bdafd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eec13beaf7e34ec8460e78b14a1bdafd_JaffaCakes118.html
-
Size
14KB
-
MD5
eec13beaf7e34ec8460e78b14a1bdafd
-
SHA1
5bd96c592dec20c82a0c60431c7843c674b266e8
-
SHA256
bfc53796ea89b03a60865de4cdd248fb2d90e127a1e9a581ec4b5ff60f35440a
-
SHA512
0a777514b3d9f45bebe502ec46b963c77a307639c406ce207c4517f255394173d683a4962f23ea125d3b014aae06a077b0bb1e834c4adafd6db8896a778314b2
-
SSDEEP
384:CyiGxfm9/tehgyehmmFAi7zy1w0M/2xhYwp6gMehXhYo1E6ySOV:CyiGNmVgEmOAi7zI1MmV6gjR8RV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 807e98c0bf0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E77AAFA1-77B2-11EF-BDF4-FEF21B3B37D6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433041442" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000b0f9ba0cf623f4ce0253d5b4e2623d52fab66e0652a28f1bce5505e82220b1f2000000000e8000000002000020000000d11e276329b677a080f6c5c170660a2473c20f23c96988af14ab369197fa835920000000ab711b342d8b37663721e2cbd17a5a6010ccc21548417672879cc75b5e9aa940400000005d5ad914666202cbaf79a25c2b9c504355bfce3e43977a041bba428ce0d850873a7c472fcf9ac0bf10ad5be79c291fb25906e65d8e0b698050aa13c87c63e751 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2912 3032 iexplore.exe 30 PID 3032 wrote to memory of 2912 3032 iexplore.exe 30 PID 3032 wrote to memory of 2912 3032 iexplore.exe 30 PID 3032 wrote to memory of 2912 3032 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eec13beaf7e34ec8460e78b14a1bdafd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e25b4c8e49625912fe60b9823b17c0f7
SHA10423e4d18df4980a49663ff65f8e753b87129b1e
SHA25625b0495fe62ec269d2e75238ab40650f547d81b7e71f7b2b242f9f5ff6851e1d
SHA512d8e1297a70a7081f77fb2f3f4f75c55ca0dc7b726e18af49fdb5672c245832d859a62cb1c01078995e19450681a3371401e7d4a9418e3dd2076bdd9e32d177cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7a39c79ffa234d5635f9ea7a260a369
SHA100e88336648f9ac4bc1e1f1122c0a4fcf50c8ea8
SHA256247e30016ae5124db6a6e9609383446e5f34f2faa6f5049c1ca9e1716060c6e4
SHA512cec2a04d8ed129d0f60b3c80672e8655539d3a6f6a3de5a86b599fd36f7e4df3d74fe4e3169482160637596796acef17b5cafffc4e3fc2c5f714a0672ddad89a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53565a47da6cd5afde93a3e22d07edadf
SHA1be41c4fd91a9d8c6dee441420213d38743ae0be3
SHA256b93cc0192144f551418e6850391e8ad5f21560d88a19dc5c6e48496d7b42fbbd
SHA51277c5209f4513cdec667e1d695c9439a4394c3a4e910579ca3d872e61803605524d6889e20cee159c18d63206d7c9fae7b5183af2a1621760d72ee6ecf821fe82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064cb5dadb936e9c30a0290cd340bc04
SHA1f5610afe1d6c1180446ae7880ad541697f546ba5
SHA25622e1ea8906910347e5dd9a22229b5ca890e33efe8c01da222a288a764f65cdd1
SHA51247c1f9dd59a4ffde10b070605bb1a3dce361a88a4a773137b3703161ab2d11330417b08e95d891591bd23f1aee0697cd69597a9e32c5e4c912fc5c9e115ee5d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f49f6327ff3cb7d152dffaa38466604e
SHA145120c6083cf804d7931b4c5659a7ef95530ae14
SHA2569a7ad622701382d23511d3c066368ef143435cea6889dbf7027d3fb5bb3de441
SHA5125f662c663b54555c54934cbbd19395f09e68e01692a1d15f385ffda8696b150498ffeb659039c4fab15ed375bd698647b6d00ce2f211c4e5b66ed12b7b5537a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7f2c75ac0e335132dce7ec60d6b337d
SHA1288406e35fbd4cbec9c39cd0b40a561a44a8d2fb
SHA2567c7b0068d8e9c1782c78314fdd2a6cfa3127255d8dadfbe1a818edd9de47d100
SHA51251025ab5bee7b0f9072435beb1f66b3181a8cdf70f9005dd41bfe474234e2dbf7f0ef83fc7582c0e477a80993c1b61d29a569e1534e177b460369b450373505c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d768853b0ff10245fa7d3040e50a0f2
SHA15befef3817dfcb8efe3fc675e5ec8d68749f9fd4
SHA2564571e54d87a54133f9691949dc8ab12f405b3bc72a218a29ac1cd2d9bfbd3f1e
SHA5128fdf6969ed6c45e0586c5e39c7f21f349adc3225dc51c9e4a178ad01209ecfd2a208d73d413da21b6ef68827002e264b2554ca5e9b6940fdf1d9ea6c0a5b43ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c42f176cf040f0a897bcc03e056cfb8b
SHA1ebcf6f2086267c0dd44307f0ee53b881bbceb51c
SHA256e322e2493e470042ff858d44f53612b8fe13c65d2ce6d1e305f24a19246b651b
SHA512535caef8308654fbb9395cfdf7bbc63d4713538b362137fb26627500576fe8b709cbed83f27f5c461d154afada86432fdb7de2ed0ac8ed62fc41f862a0b42901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f7a30911be8e992670c807cc7e75933
SHA16133f58ba7d63f584b469ddd047b1af15addc94e
SHA256315e5e025394baa7996c552c2aad16ef477ab6b9b5f841834abba8db28840c4c
SHA5126efa62ef885de93be36d720d4ac97d92f4b94bd1226b9093d09468eeb86148adb7df8721a32b446466c7891b877a1b72309a78667b1eb7e3dbd75d125d423ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dbe6c9011536c8e57c3383db034e513
SHA153bdee7f97d8e7bb87b4a121e601d23da90eda52
SHA256ad904f2d8bf19d158bd561d2abb0cd645c0ad2c8ba8cac78d0c0d1d1cf8c9ec9
SHA5123c67f144e940fcbb36fe7e0c8a3938118c5ef9f86750500cacbcd2f39e8950063a0432c526d321ca22c9457bce50125696f3c2c80848f96de50a291793fc0653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d077bc62599178e39919da493830c05
SHA1bdb17d2710cca445be2728b309f2a4f60bfc8d4a
SHA25654a539b9df0fc2daba00f6f412daf6281ba1210f7c2a91e128bc7ffe8b824f64
SHA512d66ffa7b0e160e85ef22e0f1254aec48e96e95d7a9ddc91c759c59f0865baf1c462ac67713872ca3dfc535a19ce9463f5c94a1f910b2dadbc6c1396cb408be5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556126e47724c9cff700aeafc5a2a1d06
SHA1c1b11020be19cd3c2877420f0f71d25c71c8b642
SHA25615eaffc3f57956122566baa1b47febf58d2c03c843d12b75120b69e7a3ff8ed0
SHA5125ceeffd5f178d67c39fc0a2b5d4e687aa2a37171e17ef28403f712460f0f761f164ae146cb4412d85dae886a295003154fa542ac33c9517110f018f376e33d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f2c6626f23bf535dde88528d58a34d2
SHA13ff68f143b102a19f0a24a0437ee1c9c1e47716f
SHA256356000306d0edfde37be1dbb65e1e56e5b6c14fbace347858430229776063328
SHA512605c34e1ac0469ac2d1a2275d503b60051c3165cf19484b151244bf9c4bc1bf2a0bcc92b01c0b9f27fce046ee7b67b5c49770ef4c8a2ce90176479490de6bf61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d76ad6213ee45336453901529421531
SHA14ed819b5116a58c66067cbbb6c713e7eaca31db0
SHA256992090715ca813ea40c652e926f6b86d5dff9ff2297c108ccc29c133bbd0eb6f
SHA512a2ddcaed7771bcf9ccb17f48d88003e1052c4e7cee43369f94c98f05a8aa7cc3cc56f4b1532f802d893c4379b74aa5a96b98209f1b802c0baceb07a6eea1c755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a5233778773e4c1587cfba7fbe2bd64
SHA1a1261aeea7d4645fbcdc0b02c34086953bc53f0a
SHA256d3251b63aa3c996a3a4743f14019b3b077c2d4634c98ce9208d5d4adc3893294
SHA5126baf3f41f2018c21d4a0eb3eed5455d3497fee9b553777934b2fd5bac56ead56bbe669d3177834c87a549333a7ee34e2d92c402c4af40443861baddfd6fc2f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657423efd2a202c20d1cc9da1951332e
SHA1375098e1b8847933d0e47e6561385889a0055646
SHA256cc0f26c8c3f44bbe17e3d4b0581add91cb8e73ef7eb05b0dd9eda0ba58b10009
SHA5128d1db82b4533a531046d38726063ffa3d475c77f5eb548a28db077b1519863a12b9d5afbadcd7d520654ee895f3ac4d02b7f46147ab9f5460a633ddb03621044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cb56504f1aae682ec5968c4ca60d2fd
SHA19d04ab13601a1ca81df7f52b44202e21245bd66c
SHA256013387e889f9608aed9cfac415b362eba59b0799cbacc37c90df70738a62a445
SHA512226bfb27339d64db1c5114d4c993a4837b7f7503566714ac881696f405a3e4c6d0383c5721234ddea55f96ee2fb477ffe3e536fb0d0d84c73e847a5f2c15f9f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e56f0e32de30b62cbc183fcf848cb8
SHA14d4dd6a7d5bfa8abfee1b25d831ff4a396ad1c73
SHA256278ef4ca51d17c3e5d1dac92d8106e2db87be8a57ad6e9123080591663013f5e
SHA512267ed650e177f1c7bc489f02e8dc47554593d4bb86a6c06f539651c71940d1ad5d5823ffc1218fc865c74635cc599230f501c28c4622092b4f2dc53a7492dacb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e9e204c520e47f2d7fbdff73c963126
SHA16cfc22740edce153b54b45b02c08139d75a75106
SHA2569e0530b24b1de124f00ab865ddaa4f8d281c5ce3ab0042363812c7d7e78df873
SHA512925b95a1aece8b6b8fbdfbfd25f15ba1bdc4f7a84a05083e6f76d2878eb7be504de87ca341a5ac3055c3d2bdda19766f7b3e8a8524d9d513c33a393af8d95b4e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YW15VCHK\78WGKHGW.htm
Filesize412B
MD503bbb22b7f15024c0e72695e16ce6fd3
SHA19b3f645612d1f69301a7ee2f622067707d2229ff
SHA2569aae4b1022282728d2cfbd917fbf46c885af54270fa4e47666aee7891f755d95
SHA51231b4212a7b8ad5ed7804ee00455bc0976f9a65dfa6aa47eeb7f4e76be4f20e394bf18a427015bb8e0d289be5fca38f1b0f7736f29bb53e6cd000a5c5177576d6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b