Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 05:00
Static task
static1
Behavioral task
behavioral1
Sample
2b4daad9c78e6c2d04520b9770f9b86d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b4daad9c78e6c2d04520b9770f9b86d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2b4daad9c78e6c2d04520b9770f9b86d_JaffaCakes118.html
-
Size
53KB
-
MD5
2b4daad9c78e6c2d04520b9770f9b86d
-
SHA1
b32f11b42e9a8765e5770e2673c10360471af8e7
-
SHA256
b87de26b07d7ad30d11c544ba28ba8dbc7a5b09e70c0fa50d23f1868f51d52a4
-
SHA512
8e7c219dd0c78346dbe208b596f627732ee9a47c608cce8c8373c07ab4ebbd8be067d0419ad5dadb4c624a70b2948b6b0c4361c291586a2470c51ece03c4e64c
-
SSDEEP
1536:CkgUiIakTqGivi+PyUlrunlYl63Nj+q5VyvR0w2AzTICbbzoK/t9M/dNwIUEDmDe:CkgUiIakTqGivi+PyUlrunlYl63Nj+qL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000002faa59ec8f2e3051dbe910fb4c6d0d6fd2ec49985e242ba585e29118b9efce8d000000000e8000000002000020000000ef2523bc8bf3cd8f683b85e48bd0d98ea129f419f316d3ff94137d69bca2375820000000e84248eb6b9e652455d5aafc717365457c127433bfa20c289b59ee682b35394c40000000090a1bdb382b2b710c750e87525c8d5827c05dab5c77169146d407ac861cd1a03508e31305332d5624385969b12069548973d11f0b87e854bf6751ea72ff9321 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10db94375b1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{618B5111-864E-11EF-90A9-D60C98DC526F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434647535" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1420 iexplore.exe 1420 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2704 1420 iexplore.exe 30 PID 1420 wrote to memory of 2704 1420 iexplore.exe 30 PID 1420 wrote to memory of 2704 1420 iexplore.exe 30 PID 1420 wrote to memory of 2704 1420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b4daad9c78e6c2d04520b9770f9b86d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598e3fa4bb249fe6331d2d82fe82b9eeb
SHA141cffb377f55e07a24e39086a320826771b2dc70
SHA25695e719091d1b76867869bfa4584d7edbe627a0cd4d5d5084c5bc3850be2057eb
SHA5122d44aa851d4e00b2cd0343118875472c0dc1297725ec2509717e719dbcff97db609f18dd57008984ff597c13104437d33c02b91e018c5146c75baa0dd674ca30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fa5a00a6fb94d8067997d1526fe95b0
SHA1d7dd4b341c39201ad92124b56637f4e3ab2b17c1
SHA2566c3026481b59f38e0f7acae3243c56c5e7b8682522e492144e814a5d932bb906
SHA512c0dec52aa4c143ffbd8687b9afe5463eb3e96ea60c027da64ca6e33d9e1a5f0536bcb9a63578c6f28f2f1aa2c1244849c67e19dd441cf3a6f5fb686ae8af2e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52123a52832fbdead01642207277dcca0
SHA10c2567f75596b6d35fb3365fecc0ca0ed766c92f
SHA256e7bd4a0d3c739b18b238d60d36412389e6d0141dc6fdc3c17bdd8b0136bb7dc5
SHA512e717ccbf7ca873df8d0fa8eb9d7b506ca836fe0ef095b0507e6b37584568f3de4fbae325942f851b3c84d022b3d7b191cf0222c1dd6fa1c153bcb319f3f03982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa83bd049a698b6a840dcab45c71d2af
SHA1a586667a244cd162bf946589b922c28c74019b20
SHA256e0547a1e8c753faf777ffa703d5b9155d73017aa05a9f7466a37e080df038e15
SHA5123e10c3f9b03c1444727d45fcc308bc352d73e74e2e3ad1b8e7bdd88ae367271d7e312d112a70bfc7d635b5d1fe14b7aa053f826f23046f526f9c1f961fd14a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56764ec8909dbd7e5a72bd9a4f55483b2
SHA1ee951f8e33c61370833d1e6836102d4be6e20501
SHA256cec3412e9d42404132f221fc4042b77e662b510efadf6283cc9bd0c832b79b6a
SHA51242625cebab73aae915daaeb84410efcd864cda4e9199c758b045e70ab017975aed0472e92c832ef03ff813a8dd2e55a9ccdc4beca1b1ec8e3692b06c22b47dfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b397ca32185d4ed92a1a34620572a45
SHA13fe88feb110720895fe9e06da332ab2f6bb5461a
SHA2565cd444f40bbf8b4ba7593bc9520b6008567e2fed3f1dd81532012319f4edb201
SHA512f0f771b3aa188c4776c13981f99a1a4557b85efa75adbbaf0b2fb6fbed9d50566bdfca0d97170dc8f39a22cb70e45e19da4c7dfd9e55da6e7d29198c3e519160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548ea231e0ca58d54d772df2d42864a3d
SHA1b6944b66b7adaa6e018bbb100287220da4ac665f
SHA25617b19a122a16a84864816557c63c81deeaff76f6dd32be8927c689beaf0c779f
SHA51214a08a4c49648118c9210ec7bc1c1e20f465874dab54d471abef8255ee4254cb281ca7ae2498291ea51a4e41e3e5a48cdbd2c430778e558bfe005978cebf4f86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c76990cc50d330850667f025726cdc2
SHA17c13632f3b4697f957c62f091a6db0a213cd0939
SHA2567832184685d2476212984774d608351af5f8d269c5b90db7535c3951f7f427f6
SHA5122faf69aa8fde50a22c99d416c325926c8be827f6d20c3366f41db545b36f4ffd91f97d3167fa23a9c741810ff6d8f49973f1bcad37e65d86cc1ff1a8a6632ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ad2870e5bb120829c730dc46eb6d67b
SHA1bb63f1e9e5484ecbb6367052b7002a355f75f60f
SHA256abb1bf355a1a428829bfea712d503008ec043e6a0cab51a9127f7a2e22e3ddcd
SHA512824d73c72ff7d0a99ce547b9c980b5fefaa459174efb817a8556db917f4abf2ee2a6bace3d06f3904c3b8b17a9b91b366d415670290a994358e7352d294c55f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544692f9e74a4430559002cb23de99aae
SHA1b11a8b1b5dc6d3faaecdac8e60e84e45f5ae3b8b
SHA256930857dbdcdfbc19fe8cdc4baa8fe42144628d49c8fad9d690bb3533f0fe32da
SHA512fd5f06fe0e0d47177c1bef93b393afb47e96cc9acadc52c08454162bee1a156e1e9c4f1a98f5693905a4474bd9020f2f87ba34692625ddbdf6ba04651f3a4b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53321520394f87e038016c96b45004687
SHA1b1e95a0b5ce43dbc06afdd3c97480992dbbd3129
SHA2567e76ddb4a64664af700bb7215cd227fd218cec01463c9db6e8a535138c8d4039
SHA512c55abdd5dc38ff7cb62933ddcb9e75e2b971a99b9f5fcd1857e6197d5f6d997a833e8693ac2d0cbf9858b2b6d1a0a44302947a44b42ca552bc3f06369a14ffcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5190533d4263727f043e1e266af78bd91
SHA1474164115f72298c81ab82f5bfac3315c8761611
SHA25665396e6586ac588301913a99b9af72454b30cd36adcb111a6280cbeab3283074
SHA512abb9dc716f128daa8095dc3853a0099746465a9373386fd1b77f66fc1b65ef7e65a00fd216a96a8e3df2cf3a8d672904dbc68785b6027b246c498631d9c2218f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6d663dda7058366dd5ddb347a8896cc
SHA1995834853bec02b639ea9ed444aba76e9b4dd484
SHA256559eb3e45e263b607842b32ee2c949528910414c3544367fc77e492e68ecae2d
SHA5120fd7ae246683ffe709fee09a5c080697711c8af731c854a37d6479339174d0c434da2ac03ac358cfc81819269c7b1ec8c1ce8a785a6d2e4d89ba947ddc5a8bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5598074f6c46d273b1585914841cf7b49
SHA18f9d891547b8ae7e8018c96d66b1d5a93d71096c
SHA25664b79fbfadb716682b1cb886828956268a22d33ed013027ee70492c8d54b009c
SHA5121a399f191121577e91c2de410ea3fa91022c04d8a26f1e2e0f6261dab870b2fcd4690596a48289b6b0ee53d2dc034836887e798c290468fe15fcf0996e65ee79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e2c5b548dbd765984ed0cf4b01c7b5c
SHA1d06e51965d27bcf3c94fa17413eef355f57a6647
SHA256a19d4503348b995384bafea894a6c2b4b446d3970fc75b85b90fa75058792566
SHA512b826b903a399f69b8caf634c5a47c97ee5eadb2c423eeca8bf2a5c9d6e4034508f125a7bffcc9ab99a35e741523dba5a9009fdd1ef82e697fb762855d846fbe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a95ca99296b9ff568a0a5b9c7723062e
SHA15d3921c9f4ed7d0e7fef7564816fbf4dc22977d3
SHA2560151223e8b9788efd7331d7e26b8c2474ff8b97735f7a462216769eaf8e7cdd0
SHA5126774067cb10359599914fbc64d4b5d9a187071bf1a379f51c34966c81ab94ffe4fdb73465bca15e260f8fcdcfbc84a5874ab1d1d8728ec452844c3b321cc7072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52efeb91658526a99cd038dc5eaa7e0dd
SHA1b018e03fb2d84226d7ae55c0e828c54675191c27
SHA256edcb14fe34e75ef8239fc62bfb503b1a7667d299b52222cef47c7a62e66fe20a
SHA512fbb3f20d16b70e018bde0665f9738c55c8c40a4ed89d547b987b3a274f537824f7de934bae6260fc7fa8f2ae9cc037cbae67bc019e81fc7c44fa699ba91e3341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5523499dc59c5510dec4e724e330533b7
SHA18b7f63af3ef1e348a857e374816acaec00643d66
SHA256dd0e04268cddf4c401e3803d9e5038e407e03710a32795fe2fb20320f0a7b8c2
SHA5120d4f689228192a4a5d28dee967ae98ffd83ea54463d659f6460564439a7ea4e9a1d43b578433dc05da8ae633335d0967fd7a3c20429e640e9eaa1bcb4ecf1f58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586cba159e14b6e065ed8e910ae4f0689
SHA1a4cb46480cdf58c4e4580a14b10e9328a508b901
SHA256341ee430cf5dbf0483f11dd74814d5eb5ad1c7d271b5b255b3b8657e5ac4a192
SHA512dd716ac8c7b7b33468987da3a0e3ff7cb91840a2a390f80970306979be03f3513055083e493bab7d5f60318ebb2b1a6ee2c12c9854df766786bb9aca9bf2c62c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b