Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
fba6962e76e87fc47edb532cc7e6e8bf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fba6962e76e87fc47edb532cc7e6e8bf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fba6962e76e87fc47edb532cc7e6e8bf_JaffaCakes118.html
-
Size
53KB
-
MD5
fba6962e76e87fc47edb532cc7e6e8bf
-
SHA1
3efa1a8dea9bf70ee60e4a3e1b6d48348fc614bb
-
SHA256
c1f83de9693e80852cc41f788bb6053013ea47760a5d30042ff0f1444c3552bd
-
SHA512
b8b10cf1726eb2a27378cdb5f8e9691aff07a2918036f821a648394a2d045444ef5932f544dcd33bac9c19880d2652c4c0bf13cf4ff65e29c2b34fadc00f1472
-
SSDEEP
1536:CkgUiIakTqGivi+PyUDrunlY063Nj+q5VyvR0w2AzTICbbWoh/t9M/dNwIUTDmDS:CkgUiIakTqGivi+PyUDrunlY063Nj+qs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000012dcb2a47530398f196f103bae4c16ed244e21d2333571ea2343a08bbe865522000000000e8000000002000020000000104b6fa82e24d13629fe6af9b1d619b2784c64c33f910408e8521f7feab42239200000006c74896f85e268b9f26a1017e55ab62fc33d44fec0ee81c9ed9b9e4f75907d104000000057d68d511a7b57fa05a52b7e00f6ab294a02d0d18c1596df37d85395f4fa0ad604ccbd880760a1eea500a83f79059ef1a3850993e026ace3f0cd8880fe557da5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433665277" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309e9b366c11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5FB4AC81-7D5F-11EF-9F4F-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 3060 1620 iexplore.exe 30 PID 1620 wrote to memory of 3060 1620 iexplore.exe 30 PID 1620 wrote to memory of 3060 1620 iexplore.exe 30 PID 1620 wrote to memory of 3060 1620 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fba6962e76e87fc47edb532cc7e6e8bf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb3d56870086d767779b705df099dbab
SHA178ba3e265abcea3a00c3a11ac7c0b006296286cd
SHA256cafe525de8ecd1b6d8da67d012019c168245a803da1d23fc367f0dbe4e4315a7
SHA51213aae6ac24572a7523d129418041d41fb07e054a5d1c1a7803dbffe7ca5f65251c40616737ac39fc6b95c39635f82c22e64813c3088bd61e51750ca53a701565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515fbf1d2210d14d36c48e4af67e9bbc8
SHA1d70dbcc677bdd1672ccf6e9c481422d24ef68363
SHA256d045cb7f99f846b28e44a0020aeb932848dc23410b5f34ae12a9cb27f5109817
SHA512ab3ab6b3c256fb5e862b77eaee186f9108e8ec77e8750967e85d04cc81e9c4443ab2174d7cce045e1ce0f5d59f8bf9211db9978a266f428a5c7d338c85454c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5133f2f906333160a3d75e19347ee9a5e
SHA19e955f9336cc881567d0656d861810458929d24c
SHA2565523a2d95dc22ddea423ee2de022266ef70ec5e209135e2c01a33b3bc3f03583
SHA512ee98e84fbd5e385460bd95409c537108407f22c6349c5ba57b83256018c459318205b06cd43a513fc387e5762bff031135fd455c06571a7c0d2432567b3a794f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5004917fb92fbeccb0bcc1e8187839860
SHA1aadb8c7f9c2ddd955ab5710f62609bdd3f156a5a
SHA256f640b7131e7a1389ff51276720e7abfed7d1f50774d7ca31346cee45c9b55e8e
SHA512aca86f60b5778c8bcc85b0cbf3e677104d27837303acde2674d0996bc5cfe2bc616fb46d184979aae6ede97983f8335b408c65b3988bafc1afaa73a651e442c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d525f5245e3a0620b46ff881695ee71
SHA18f522d939de2a7bf82b9c4306abb5d0b30a4d01b
SHA2568c0f31362003fac4dc6ee774b69c258b695ba778b50bb0415fe9945c65bf2879
SHA51262c4181c3992e42e5eb66b139de9dd4b72cfb3d07f1c2b237246b1dfa7187a3857c57e497fbaa078944282c3f0eb73d6f3f0e48818e3fb0dfa447a612af9c129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a387f9f60d1878638fc715d89d7d0620
SHA1a477d0280b313ef975e0d84687d2ec133c197e27
SHA2567268086fade7f09dd3243b7c66c033a34c54cb7f1feec1186b004bf3f3eeab2b
SHA51201190b14795cb4181bfcfabfeb066383b6c2f1e4a5791dcc9fd1c3ec4d5fe35da69bf805f1d4ea6e63c7288ea4846e357600781df30b8628b73511044b673539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542bbb5f8f2bf471ecec9bc0927a7eb17
SHA1808a7b808891fe0d645be084c5157ffe1429a382
SHA256eea11e33c0b1f256fc1034a2e5d40e96cbdef2c29215c1a2e9e4aaa0f4cb18cc
SHA512d452e65e173cf34ba16b0452bd87e1bbbb4bdda79f804bca77e7f4fa54b7dd1e6bc6355d9c3770bc181f9104fd53d3bcf26543be82c905fd31c7f62b0d4e2bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b001050b2b5aacc72882c739152d16a
SHA18cfe839f7d655b1754891b860fd969f40fb6ff3c
SHA256fa8f5317291e84869d02c3406e50c7ea1558eb760977cb001628dc5dfcbda08b
SHA5120aed7b0ac1ab44bca92d8ccdd4dbe55fb71ffc7eb5e9b75c57329876bcdcbe4d5a978b4ad58f20a66872db91760b7a1ad6c2c6744018c34682b62b4683b8114b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5794ac8f83f4d643db286bd68eca60921
SHA1b9d3787bf8dd194377a266f201fee561126ea7cb
SHA2567de2d38eb6baf2c74cff71134645584711d6c8a46fb0403cc36cec87f16eef09
SHA5126a0d6736d11e91688ce1de0d3cad00b9e08ba6b054c53e835cfbc3108abf9e5bf5c1fa134c68365e0790128dc0684b40d49df936f582a4f86c1c44f4c9b3ad34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cdf822dad6e33a4163aa329d2593455
SHA1ba05c77ea41c2f73f98c2016dbd0881d7d863a2f
SHA256607a94cc9d0545ad1747d0ada1c87727292c5db489d69da166624c12716a5e93
SHA512c12f06296cf9ec9e634b05c95ce9ec55b985cdd8ca8d3cc0135f66e75903fff8edb5f738aca95e447a0920261f44bfd3e0a6bf317cebd95a78bb5823e7c175e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bba16dddf33fc41a9f63b3f904790402
SHA184c59f317d4edba4d6bfc5179031af2741d87ef5
SHA256c0d21bf96f7c9059fe11f63f7bdd023a2c227933eb54c37b159267073c234fbf
SHA512e40f189f573ea4a70533efd63c2a5eeae08c1765db55942d095f0b7622e65cc1d822e2d450ddf044afe9dad8ab1579445a735f60ef85ef3523d853bc450b3c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5646376e22b92d67f680b5370c97a9dc5
SHA1891bff7349a6c03b35ea0698428d12c95581f222
SHA256656eee5dd3368ad1b09706b98a0dc0feacf4ca977ea5f9d9e33bf44845d5019a
SHA512221d1cc132bf7d1032d50c12a6894df7d28ee2538b66f8c852ad4555c6bd602f3c98b7a28a821c6a1a90241163eff83d29076ffbd5f1ff98c1cb9d98b14eec1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b72d94de85aa208ccb1c2a7de54684e0
SHA10e0a0c2bf7cb7e85f7c7b3b651bd62489bea0ce1
SHA256614ed8f431d48cc889daeb4354aff98db1caa6dccb5ae96ecb877e9e896e14d3
SHA51265dff6290bc70a7f4e839d332bbee887a0a2caa047032e060893c3fd000bc085994703cd278e46f14f5ac0c74851b13f0d44bd677962f8e4c8dd99e729f7eabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d84f9b75157b5de72dd9c28beb4874c
SHA1e7411e3fd896ca45d48a2dea9ec2c087dd4f9d69
SHA256c7b7178c32c68ce76a176d829bf9195599d27f8898dd1ce10c2ce5114c96f410
SHA51280f3fe61c5b7b82dcb4ac7b3c4b8142b589846027fdd9337f3cbe328cc4e7b4b237995518f81cbac06b5d1e3b0d2e3a9b3ab88bd6e4b5b8f96d0168da971cca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5254df1815baa502db8660668d340ca2b
SHA1d1b20828709c23a78318e3fd9abdb0b27e4531d9
SHA25623f381324d89eaee8cb039a7dd532f0580e255b92f8ed5968456afceb97e1471
SHA512ec6a651afb1f7d148e25ff1377de6b99409820eb65f189896378d036c0c7908aaa0b38e546e1aec549ca17a84e77a4969492d264047417624af311572fe0a81b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccabdc996d8da1a2f07d8d78872ec94e
SHA1c3020337dfc0fa80854ce88d938380053addaa1a
SHA2561eefb8a228681d23bd802bb5bae1b16783211e7d73c8de9c0760dc1333817e59
SHA5123bcf999b54278d53659068af35eeb7c642db5e30899c85c859e98ce89412aa20040a6e768c60d7e2f1825875532704115fa702cf80e7d4f916584ac78657dcb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e63ad692388661a4e30ceae2bdaf5db
SHA1ba6401daab283d0e9ecb0b80d51bcc129de3c734
SHA25692dbe426c05046d707329221f2cdc6dcdfcb7ccd19538c2e7392a86e4ff12dd7
SHA51236ee0f5108a3a912c8861396a7007bfa0ef6d78e1d14fa398e37df572b9412e23eafb28b2a5bf432d86b2e627544380aeab5ed753b9183da7f095d148c018df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504b3d30960dee3ed1c063aae1ffc518c
SHA14b98aa5f474925dba55470570dc5f6e166b3f422
SHA25641a3fe831907608899319236d7645193707e28b4bd428ba2250be17bb85cad09
SHA512cfd434c76598498cd00cc4c1898975c4a042b8f1b71161d72ce27c1f6d1e55aa8d7eb22f84c4714d873ce5cdffb84ac9b6eb1ea9b79fe4dae0f2b8e44ed7a7c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f42ee44b62104ce64aed3b32f4ae847
SHA1ebd642abba1d99389df8cf9953320b4f96e65883
SHA2561ac42c570baa0880a578110e08182954ac5089a8fedcbee22dd5bd763936fee4
SHA5122e0512f3ebc9bc4a9392a5ea747a6fc4592a5eb65bf7e6a31b85d2a92ca88352dc190200d56e87fe078b54899937f3107f40d7c84fe492fb3c4144a636b05922
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b