Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/02/2025, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_981e80c1cadcc7d0bbb0240fc9065e9b.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_981e80c1cadcc7d0bbb0240fc9065e9b.html
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_981e80c1cadcc7d0bbb0240fc9065e9b.html
-
Size
11KB
-
MD5
981e80c1cadcc7d0bbb0240fc9065e9b
-
SHA1
4e936590ef9382e91631bb74e2f764d4b6ae07b4
-
SHA256
135d8aa2fb904945ffeadeba2aacc0d70523810e3b386a0149e01bc9559e6eba
-
SHA512
cfd5690af928a9d9e1267163ceb0ca7828aa507052569105f3734d85016f6df81c484b0b4b5fec54e98e96d15af76b27a3d53123a54961a6163670a70136d3cb
-
SSDEEP
192:2ValIsr0r57M4xjT8I/w1wvqLkt1/6uBuLbdU8d:salIcIQ4xj/gq/6guLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "444864120" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6044cfb44677db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B8B509C1-E339-11EF-9F7F-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7b00b34ae5b014eba53360c7617406200000000020000000000106600000001000020000000c6aab80a0a8c0a82d5a150a941c61184ff2456ae42091cb299154728c7548f89000000000e800000000200002000000034041b30d0d3ce49f8c70cb3ed8d669a57e3e6826168095b39bda94e9a2f3304200000004e3f9d4b87acb572b231ab83eb351d12bde62853437b1777fa4634b74ff735cd4000000070379fa7ce5ac82b2bc0b80f7db56aa893b7897f594ec53410ca5d03bcef33b6eb3760d7f29436ae1085bb5cdef40b7319d7dc37ddca2b83fb33d4fd3c90adb2 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2788 2236 iexplore.exe 30 PID 2236 wrote to memory of 2788 2236 iexplore.exe 30 PID 2236 wrote to memory of 2788 2236 iexplore.exe 30 PID 2236 wrote to memory of 2788 2236 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_981e80c1cadcc7d0bbb0240fc9065e9b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516eb1666e22d45c99d3398fe0755c639
SHA135fb4fd1053288a07ceb100f2c0406a23b30930b
SHA256a752034a2db2293c2fc50a6748089f658d8268e1e4fb295dc02d755b9c0f2ca9
SHA512c37731d924f52286f8cab7a5adfc79d5dd161ccf3638d8d8860480c0318371e1c1f72efef441c88e4c382a6e8899534a2cf810ddb8b74adde4f71bfd01224479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a32bafef04f0ca0a4c6d71c77d510246
SHA1a5b38b3b57ac5ec8860f4957e5fc26deb6c5067f
SHA256c30a2818a6515c301beebf50d25b3cda6f1c4a569f0f6e88cf0015bccc52ffcc
SHA51214e53e676b87bbe49940f48d82af8f8742edd0fd6d73f62862896e70da3a5b824c71ec884afedad653adf164267fa59a144d4e294b63e87e0f4ee0341d082b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5956288fba25121392a6990769f47b6f8
SHA19bfeb64c77a702491d4c8169fa078621968858ae
SHA25620e38fd10ebf4dd1d6223ce4eb8b744eba04612898d05b810060013719abfbd4
SHA5120ad1a94be12e31c75a5ee599eb53434e6277f4c825595c7f2f0f47ec26c722d3efdea074c5e48be74760d96cc79fcb2179f97495809ac0449761c5fbd98915e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554e0abd1d4719bf26068070081a9aa1a
SHA14a80964e99fc6094f648ba622389ab1c5a7dfa82
SHA256ae599c1b2681793f20e2cebd546edc257e9e1f42a8952e5e6defcc9a6045b2ff
SHA512f44c8f8affc6d480ae59adf1525a16accaf4eda5983b08d7a1536253d1128fb94111cb49ff404b7d9ed057663522bba35ed9e0ddf443db7fa0f37370cc4ff95e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59332ac9ef7458b384156bb0c75d90c65
SHA10fc811da8954124a2316dfb0774ff4bd53f6e21f
SHA25630bc5ad58ac818f55f034a41eb006859d02d9bcc71635412d7e7218ff31a9899
SHA5121795a3e81fca5fa7cd23c9b89fe407b7a6b5d05c1d994203a453fa4d82beb900e691004be1d244ee509eadaa33c316cfa694adb2edbd9d6d5a89a590470c1fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549cc3b33f4ff3785bb58a88f22a4ae22
SHA17ad2afdc84b53a5625f26048dbc82325ff0840d6
SHA2566587cccdbd82a0538def2e46aa105cdf193c181268b35aea1168bc7de050c28e
SHA512cb44b9ac99869d028aba36e8714bb167ff1bc62deb1764dcae11f3c6a5beeadc3a194bec474f0f192ac6849c85a52648fc61be5fea26c018807961420704a8a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc045d2ec2509eeb4529f505b1f17ad9
SHA1461a10a04cef187a95dfc18977205f417597279b
SHA256715f603562f91040e9206a47ffb76d44dc78955ed6ea7013a7a833629e1e8f3a
SHA5128eb8d9651ef3d1b033a276a74e206ca09bb543edc54cea8279f4c2655caf02a423cec932bcadd0e41433118b78fb58b2f0ca83188e6188cb4b9f0d75693d247f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b90db2839f0c5c51da596292da5dba4
SHA179b919cd17df767acc3c4e6382232ce54fb012a2
SHA256401c753714f68c01a4e302647795d71b9c31bfd43fa05573b51fa18d2fd4dfa1
SHA512ea1a95eb4270eb3cb6c3acdd263165ea89fa4077840d4144681a8085e6230cdfabfcfb5c9c76f33d52196217bb101f5fb1880f3fafa7ef3347ca51838032d916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b31605223e7e88c85df3431ceffd090d
SHA19b98a529828d130859f5399f0c88e6861b86e939
SHA256e7a7669fcc23026608c303d2e116fd4a9e73a9314cc964caa7f35b09b83193fc
SHA512f3f243915c396d329fef3b0e1b1fda90959fe76893f5fa518df8600454dece4ee90f433fbe0eabe3e24ee4a6c4a28cf463cd2fa1e9b6e623acc91a96f807356a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571ab6045a265e84454697ebf460ed5fb
SHA1016a80ca97fd04b0503205b0a0302292e1eff057
SHA256821024c5cb9342fafe1482bee12494bfd12fae1b7236c09b2539d0e72a7e95d8
SHA512e251cc5bfd384928976f8f67132038028d8e7ddfdb90bd442e3b30ddbf5f5cf575561c963b414b45cd409f4979a7fabfd54d9037a757db6d53aea07cc5120df6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e901d0920b6dd6ac2fb7bd16322c7818
SHA1733733611fb208542c2e4662c6e245edd7409d83
SHA256e05023a0c3011df0b6d515353430d5f4aadb9061d0049e7503704fe228628382
SHA5123ee3f6ccf42c6c57812807976195192874745ca446f8f7af2a89a5885b7dc029293dc3214fbe84dda95b34c7abf4c372a0eab779ca3165480bc482398b4540f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5243b7d5cc63bdaa986df9a515f532188
SHA177a1cfae5be297d40e12e8c5bb7d27ed125ea763
SHA2567d1861c4763bdf85174ad44c6c816e8bc542256808df5f5f2c3ad1571642ffd4
SHA51263c3cfa9ea96ca44b7140c289def3341b566762276285d1bb07f2ae46d45ed03386caa4a6055e7acc3f120dc4736d09b8318a7190c66a3f1abf19933a079a78a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eafe1858b7f4cd096c8fefecd6b206d3
SHA12cbec0e105390f2593c16a8e985b623b0a1e13da
SHA2564330f96f601d439c7818a8412b867e939e522346a3524c87cad25bb641668594
SHA512c3e02699a0818b94da27ac956a5631dde00e7ef0890d8e9295f4105357fcebdbd237fc8760b27b8d3b71d95568617148fa34e2ab98301a8eca0e54fb5668c08a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a81fbd30162013a832566b1c2fc67706
SHA1ef81ea86ad1c3bbcf4917207cdc78d915cbbfe2a
SHA256eeb4c59c77bcb888b025089e22e7c9b38a25e5bfa04f79ae99c0c9e1589067e0
SHA5127e1ebf83fe88c3119124bd8beb9e05331d94fd7f12b352e88b58b2a722986daf207a7e5177ae59cddfdbb1292516359417b5d9d901f8ed886ad06044eca5752f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deac294ed62b9163ca9b1f72d0c3e13e
SHA1cca3aa5b6063fdc60946ed4b92338cb296267fc5
SHA2565ffdc6bc04ad60d6dfead8a11f3fef091fd75805bd98f6bfd91d13312b00471a
SHA512c0d4f0d25e10efe589f054e34f2a567df13696f88a9601695951b22267916ace96791b71effc2679e9182fa4f4172eb50ca87b56e72f2226e7b820d74b8de687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547a097e9a8539301a88b2260aeb56fc5
SHA1ccc4e3a9087d6b76d067ff2daa85e5dc335ff729
SHA2565e7cb404e625ecbd5df5f8ff185d5fc397e882ecbfd7c5b62d2176e9db3c9dd2
SHA512b7e50dc98f9ac4f78fc7e0f016eb92d2c51db164d3a30f0728fb2cc86047e75038e03bebd9b50ffa8807be1e55b56fcb3581d54d78a6daec4fe4723b7eb495b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e9d41ab7dc77d7174af1eed9ec4cad3
SHA1e233432ed9fb4ac1020111ada014a46859cb9d27
SHA256ce5ef040c8c064c3a7285b98f561cd98608413e90feb7ba9e78f4bd6d73dbbed
SHA5122f849a0036ff3e319ccaa2856526367ed6b6457fa89cb29fd47de4ef3c2c6f172cdba0f0a0b9f2fd358f4ea1bb1f8e7a4773d23b0b0162ae0db737633c5f66d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e229debd5335333918445053e59cec1a
SHA10cd119e65cac26abff6a63a9d4c320d8a87374e7
SHA25641e8acb88e83797a402c7969b892d26688f0b31d11039baf483fb861ca4427d8
SHA512293507ad7cad6e3c296f397304f471e2685c78747de6b0085e80fc80580e2f8e3f866849ee0c4f8fb12c37d98646fc5815d231418449d11068924e5091ae17c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb32e0a7fdd30b33766245060ea8c4ac
SHA1223e78d1ca024e75d5549a8825e1d28db561bf7f
SHA256efa0795c2fcd1ff57bf9bd2cad910a527a091497d67fd218dcde553ca181ac7f
SHA512db166d382079461addab4c778bb64e7c72d54d56212eed87cf8d56b5ed65a926d85d584043f3680dbb3da97d4fdee6cadc6f312a568639d48fac19e097eb9951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547cc5b67ccd4b584a4d615fb7686b71b
SHA199428052fcfcbc76bd8f4f48c24fcdc62fe63200
SHA256389170448771d22b90c26290b6311942485995134b2741e74a1edc5d9e30c672
SHA512e853c41b1c4110709e4b3fc6b4d87a167496b5078b5bcc52032f01ab1db7e925f77ad3716b9b5309947c897ee2227c3174638d65ae0c97dba285d756df648de0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b