Analysis
-
max time kernel
136s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 18:18
Static task
static1
Behavioral task
behavioral1
Sample
0bf2f2894c1f623d4a19f99c3371d837_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0bf2f2894c1f623d4a19f99c3371d837_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0bf2f2894c1f623d4a19f99c3371d837_JaffaCakes118.html
-
Size
214KB
-
MD5
0bf2f2894c1f623d4a19f99c3371d837
-
SHA1
47c979f3e823ac866c2eb6705b5c5dd4ee3019ef
-
SHA256
114f6085270e3f30c15bbbfd021ad1e74d695d04c27dd41bab2f805469b726c7
-
SHA512
0afaf944dade861f275a50f50482ed57d1dd4e6a3c0c8e01295c7f3636627a11a3bf72ca35aa5b2fe6429b07ea64c92977545d9822ef0b95eeabb911b0c9081d
-
SSDEEP
3072:frhB9CyHxX7Be7iAvtLPbAwuBNKifXTJb:zz9VxLY7iAVLTBQJlb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434054969" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705029c8f714db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000754577b8cffaa1bd6050124f667efb253c6be895d1fc15995dfe1ab0982b1755000000000e8000000002000020000000ee7dbefa0163a79ca4f23a51dca909824e34e493a61c18b5dd791628c325d39f2000000087a5887ca953779546c53bcdb2bdcced762a568a02cb893ccb93eae93be37124400000003dfeaa435cbc30cd447243639410f62c7db6fa8ff37f3302976ef817ad37b341923211ec1d9d5567aa885c6c73d1ef897cae0601225b2680a4c55796b4ddc631 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000abeaf53436759e7218efee96d06f79a1524c3583db32f61d0982af0c994d05e5000000000e800000000200002000000092dfe92bb2d6a5d5e53232adc715dafb915ae8a889bcbe5f914cf3d60a95488a900000009d6bdae871b2afaed1f090ec52088aa2a78a49af78798d8955e4a850c6477e36d51fc0d78ba8285b6671cc32ed4ea3ed7397f75fa7b1282367c566aa7679fbf9ad7402057731de9e87783c942b367525dc026411903465e7c5658a6a932f25ca1995287fad802f9a69054e612b81cb4bc5daeea372807662499065958daa3214730437bace1448ae27448cffca32b1f640000000533a1be8216b157e52bfaf388c6ebdecee3061a5d7fb0a3a3e5b844672e53f37e8125941d75f59e8b4d9ebbdb787deaa8eb4dc7914ae43d5db844cbbf49eb748 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B4A3C8F1-80EA-11EF-9D33-D6FE44FD4752} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1960 iexplore.exe 1960 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2708 1960 iexplore.exe 30 PID 1960 wrote to memory of 2708 1960 iexplore.exe 30 PID 1960 wrote to memory of 2708 1960 iexplore.exe 30 PID 1960 wrote to memory of 2708 1960 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0bf2f2894c1f623d4a19f99c3371d837_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57177b93effc30ea7ee3faac48fedacc8
SHA155fd4f8d16749e070d91c4da7f3ee5460a54a5b5
SHA256623f55ab3c57381d42ed2d725e9a34fc66d0f55dde71a708efeae90b7d61e873
SHA512923b7444d5a33d1fbcfe0a3ed1bca7e28f90670fff656028677e55beeaab474b596a4886a1d4b85a3699c8904463aed764bd4a23aff5961f0985e90d00af1aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dabcc3a1d8240d2e8d2201e5743a1cc6
SHA173dcdbcb97ff740208bb0ad18d9f07939a5f386f
SHA256562f404487deffb6309a93819cd7e96a02e3b7eb1eb357a69d3d2fd85b815b03
SHA51259250ddc434d0fd76622246b4c286cb414f23184ef8704190ee6a91b0abf327ae2dc813c279e76a74aacc49f3a7dc658659af3600fe4d86204f92189255a0201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afdc49e81ee730abf3cb6e2c17ea02de
SHA178e4ff8319844fdc96ff562ca65f1f95a55174b6
SHA25649f9b6a0ebb6319edbf24007caceb2472b47e1fc2480260790987cf8fda17b09
SHA5124b217f3935448acea3b60293b6779e0b6cca7e615723ef88a6dfd1936c2f327dbdbcefd83b507ab8c0238ab21c0e7c88063746ff80047d4797a315cd2ea5a07e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e7dd44ac5d35b8ed3e83dae7575327b
SHA1db571cacbef64ee4cb0c8500ee7c9a3c0be57888
SHA256a11fad46ad497a6e81d3442531ed7cde8ff2707e9d0e4eb903578979a392b3a0
SHA512c0d4691849d39717fd58d2c65bfd2a875a7653f4ff34e27c286d3e88c77b727479ba567ef143c1909d5818945cddf73c9e18257448a2e5c1f088c030a625980c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5079a8d76f00961dbfd0896d692454af5
SHA1104a7300043566e4e705c3e6ab33f5d67e99e9ec
SHA2564ec26ba60d4d4a45d9ee3be85b147d636a3cc1d4a57491c929f73978a6ccf203
SHA512c1fd528cc9f88970e64358dd5a0d5f1642d554b272b60b223ec1e7ac107d4b76870e0517988711db1f2c698b765dbd4f8f0adc65e178c7b792a3b08224ae08ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503dc23c17015c64a90a6d8a306c7f778
SHA1448b4557c30ed9e341509be06c6c1718f1a8369c
SHA256feb361b061053e6ba74946f89698c62e5d00bb17339f1de7e96f62d9a4042f34
SHA512c91bd0a360722e934a9e2cdc43d848812d87de2ee3491f4d227fea4fe41a985e1b6c083d7fcf48f61ccf9a4f653c6f1cc7caa6c96ee6041f2194a8082fe3ca5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599c06056d7a45389f56ad2b44112067f
SHA19f931b3d2da270de868a9d8ec4710a421eb7e1b2
SHA2567444436f2f261fe3499ffe7be7149c69dab7c3ee415d6f62aa67923069e02bd0
SHA512002b5028cdfc7edbfea7a4d4f4836a8d898b2fcd305e26ee8bca599ed5ab2595132d17a4db658e95693b2ce9a0f82a8d05ba78cf616b02550685825cbe10d31f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a22383ef6f01c3a1f8449886b03c9259
SHA1779bb4783476c3bc80cf46b0130cf1cbcd1a48a4
SHA25600b628865c08f6a07d1796c41840026c80684159d9459bdd581e83d8326cf1d0
SHA512f769a950898da30d1743d4ac9d6e0d6bab0394793469a790abc4a55fc8e36ed9b3862aad57a9ea7e0114746b0238ae091be4b65715df394241d641d9175fd884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b150d7cb9e75885de5956917cf921232
SHA18fa5501c7a0f76288d2d8b1fd5d3ba2874df3390
SHA256c7edf110a91fce33fec3d995074f2d1c8b514fd7a30ab24cb51094e110b3d8fe
SHA5121f126614fc861a323bc28afb6ef0421d6ccc22b409cbbead27804dec9dfb3cb894b13f340a3f7db6137abffd9839aae181f60eab8d4bfa857fcb84eea0f591e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e680699abe27e3d4967345de0b88b898
SHA1dff72b13698b43380ead98347f988e35a01ff5ca
SHA2563c836535bb7d241b89055b4aea28b29c56472a768391e36d0d1220a0772f03e8
SHA51204c8226d5c82761a31bf24e3c84f959d68bacbe52f942b79f00d17e3f429f346131eac2d43ff9356f999472cc5d131027b868f52cf6de1652312f5255989f0e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55739baa6174cd11eef6ffd9d5f35c5eb
SHA1ca0cd907aff2b7eb9731522d3822b433efbceb53
SHA25662df9d48f127988731f33c5320ddd0e1e416c9b23bf1e1d60d9bb51fdc34625d
SHA51226420f8c1363de1d98a77e489079e04cd4cd6ee5ef80282259cdfb7f761229d1a905b65a3f503481fc095c589f4b2ba78c3306e3442a7c3b508fb7997d8a0b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5576b9f5359c390149ba180d8255d072e
SHA1516ef3db86ab9bad3cc8b3bc2ab27462c5647d9d
SHA2569b616c611d915a5892d8a407a981e536e4a37b135d2403a551de9fea03172f92
SHA512923106489403e42545ce380e0fac58ec91361b95f72d12e2bd377c900c272ad80331579d5cd25546f4484a11af5738623429c405cb29662b7ee554615ac0d7b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3c4c5ac74d36362ffcdf7a79328190a
SHA1d3f179cd11ed39c2423b489ee0564bcb1bd1bdcd
SHA25634fc23358abc13b1b58098a1d223a5d7afdeefc36335727a5e8121c0b0b4a757
SHA512ec0da951b8571a108f8ceacecc48bd57c544afc490484b8a61edcc94edb122a11066f8f967a3c0518cb40c85b71a248cb1532048dd7f527d2dc7e13e99a3b68d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5683bbbefa0bfc46c12c1729060765330
SHA1180e3fb9bd4edac0e3c27cdd194b9eb669489c41
SHA2560c2d7b4ac056a00c6666a7f2acd060b171a1b837fd9e1edb3f6b2e9fa90eaf7f
SHA5120e389feb80e102d1209ca075a1d1a581075e347794a872b7d8e9a9320a0509b13ae8447104e309ee62791d408e8c7351865c65d3c1b6386d5946dca0e250eee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5900061ddf9e1d39cb47c786a9b00f605
SHA1b171c5ab19cb3886d2b6702de48df35fa361e088
SHA2566c8ecd863d84516d7b752e3ab58d9f3757ee73ac8a25010aba7a8eab6bee5b84
SHA51241cfe42eed9b3411dd6c56814559a7ca42f1422b7b1605fb5b47a268c95b22cbf3ead78184a6103d3d2c0e558fc0b19eeb96e578ef24cc865b540b5acd0a8470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527e3c57f7f77fe7e151cfed5565d74fc
SHA10099c39c2ad0716ada66657c58da50c2570784e6
SHA2565909a841d760dcdf0e18e9924ae35f4b68a726284a30cf13c782eaae5f88b786
SHA5126b72c86f8238c2cc767c39bf466b913135db77f77ad8d634068cd59e68c630c9c9c6f457954011353a46a56c58ad53c7aa048e62c72945818fe1461c40efc0c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57758b3ecb70d8c1d9905973be6098c9f
SHA12d11070a3f2fdbe83d37b5f4de25a53fb53b85dd
SHA2569fb8b3acdc16997729e4cbff64512ae0df8fae86199e4d6700c20c022546092e
SHA5124ca307309442220284ad0473634a5992a857d69f665b0be2a1fc7d4ac5849175b7b9d199bf4a8f2ff185d6787562ed646f10d58352eb926291a33a2d8d169fe8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b