Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 16:20
Static task
static1
Behavioral task
behavioral1
Sample
39ddcd0dbdd912680f523b3f8684d18a_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
39ddcd0dbdd912680f523b3f8684d18a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
39ddcd0dbdd912680f523b3f8684d18a_JaffaCakes118.html
-
Size
13KB
-
MD5
39ddcd0dbdd912680f523b3f8684d18a
-
SHA1
3834a6c8a26e3f1e3b348ed095f4d79bed52c8c8
-
SHA256
431b4cb3f7d87d2eac596589a5f4ca8cd94ee433ed994e0d6d785e6f1c039beb
-
SHA512
b860f0d96a7c14d1999edeb9a12d8c4725355e7bc5cfbf0ff5d93bdb75e16c2fa9efad94d976056e1a8e25434a1b6498ae63d268b93c30172a4c155ab508bd85
-
SSDEEP
192:CP06qYNPSnIooSGKE/JPz1TcOnp3a0uNpx8ikiuNphVa6eyS8:C6xh2dxznEzehVa668
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000b5b5c30c7ffea11c92f8aa1b2926e5d2ef3b7ecf8e80b73b472224f59b99db5b000000000e80000000020000200000005dc7d33861d3419ab52bc2131459b325cefaff580d42b65077af974fcbf8c52520000000a4489696eb7917f19c85399c84f620236c5985f1f4f6910f790096a588807ab140000000fa760d7346fbe97dd1b8c0b46d6cf221e1af63503c98994a3df25077c031e053fbd4a533c52a55de12a811fc802c7977757a4af98581afbeba724fe4c717e274 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C06EF61-3FA1-11EF-B6F1-C644C3EA32BD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c002776caed3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426876721" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000006849e12ca4ffe95fdcf3155a5282400b01396b8fb03850dbeb7c643b134d8fa2000000000e80000000020000200000003f32ee5c6716c23cdd367135dbee9e13f95ccc35961e09859aab25260b1ce84190000000881c622c76118fd363731d781c1c6e82777974a591333061abc0537235676e88e9a277a6155a7f26675a36af7c8142d40a519b651db1a5f0dd25d06dbc876e0f89e923d41ce86e927c8e1aa92d4f857dd167be92b7220e26c16c61ff504aa35c30353421b9724522ba6bcada50f93cc3006305251ac036aef6ba02eb35172d0abfc72d43f6a1a54e8d49947afb8f1c27400000005808fd7ee2cbf98cfca73c3e1eccc0e23e8f76f97aaa00db5876126ea91011a1dde92cc688cee47a7ea54f3c2ffda14c28709bde9b58c0614d07dc85c84a6755 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2072 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2072 2068 iexplore.exe 30 PID 2068 wrote to memory of 2072 2068 iexplore.exe 30 PID 2068 wrote to memory of 2072 2068 iexplore.exe 30 PID 2068 wrote to memory of 2072 2068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39ddcd0dbdd912680f523b3f8684d18a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5276a76d6901028caecfdd9abdc8fccd7
SHA14dea63540e50e072dc769600b70f0eff4e3f85e1
SHA256b4ae3bb605b24b9228d6e354eae5631979de4c74c88ca9301bfbbb23f7f6ab1b
SHA512aba2eb934d9df1500e26083cbf065abcedbdbd530ddcdbe369bf922f4c58111a30b5c92b89b38c24e96a178a5b0e79ce577576198a40ff29305a0bf3e580ca18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b57ce7bd6650c4f160e1f8f15b901794
SHA16aebf42685ddf25df69231f45f808c8e6d4f1f48
SHA2561db10bb59c37345f83e98f096114404adf46c2731bb73b56ac946ed52a83707c
SHA51208a20b1fb410b10bed9f9292c695117b48dc63c8e011da6d741084a1abb47a3da54af316709425c18eb6c8120e608ab725c3d0fe4a69d3c193afbe7063d1416f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5984dc4e6bb2a4a4129d1f864c2d34fb5
SHA1fe2d6bc3604137c85875ed8c424d190a9c839217
SHA2566bf2ce5e50f6b9b37026a3465566fe0975d1454099a1274890aa319a6cf67cae
SHA51246b100aeee2e8761be45bb2febe55d16891549be42b1dd1dc7926970c0796dd005a7cd4f0ef9c03ae307b3b7fab65afb7157cce590432c243a7e6ec17ff6f1c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f330a02bab73a766127048afd0e44ae4
SHA1e85d4248364287c63b45607eb33c31220b02b6df
SHA256151f09a5cf5f38d64cf9d501354f7e66788a55d4dace3c3de52ee8f6242ae469
SHA512a67016efb3a8903e752929a204b620a23f2e466a93a764078187bf249aa6f03c42bf99a982ecc00ba4c617de752a195491c1b695917030977ee93146b84a0bfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596c2de98397a840a3fc8c85856310e5b
SHA11b5179c5eefbdb725242151cc1a81f1901496943
SHA2569bfbb3b8734e58f39c9dfab4c1b17f85094699ac6a43288df53137012428d7c0
SHA512d5e9c86915f2afb6d033782f67e7e2600f006bfdb86b0fd3a796cc8861a2abf3bc2dfdd12811cd0fb5bbe86ccff4bd8d2749c0533c4a900b3d720b447501e880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3900741aa65417c6afe1b8ea78230be
SHA16f28a2be50d3423007caaa2908e934f42b981377
SHA256820fdde5eedf62009cc1cbfec142d984ffd7f36a53eaa3985d3bcb299dc35798
SHA51294350c5ba874970b10313491718e53ca6ef0c9b9169b59053828ff5da047f292e3e26cd9624853e800f4801b0512d2041ee7f2c456aefd38f30a36a1fd687511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593be2b2fe426a1600cd0ed5033e32c35
SHA1f5afe6d5f1285b0cc4e5f518c27824c0a093f33a
SHA256e18239feff6f3a9a7a6616f0a11e7854b5c5a6dcd0d44d5d6c1e8048320b841e
SHA5128f582b89cf88f794f4e78a636b22eab24cafb1ffdd0d9f3796be76a74bbacc7da1dd8c601c20631e753b1c253901868867e46daa36ecddd309bf396a48a69910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5ea41f86e88026c168cc04d5544e1b3
SHA1abb89f2a89fa2b497a51d440ba2cd8acfff54a22
SHA2564e45385c94161e398b182fffe6947b12b9c0f437e88037f2ce2f1348c9ed5f4d
SHA512ecae9ee14f26fc79202cf85b6e8797541eb68031f6abebda8f41a993750a62ca10faf04bc4ee39ba96b67b1318b3c6ddc08e28372cf02a1a550dbd4e39dba2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584cf040465026a0eb972e60035020510
SHA1309679ef880319378af1f9f7db3e333c36221f8f
SHA2567bf53cf630b113262f2daf81abd5e7ad8169288646f35f37c610d3332c65dd34
SHA512495044623df3d9f42846d6c87eb403b8c275265e2a495864ee3b74063f0c1ff95064f4150b19d3888099e6dc64457230f84db93c95dde13cbd95adb53a214104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59baa12893cecbc44b43a9dd922e02286
SHA1a8184a67101b33e42e390ad548773412ee7b4280
SHA2560a60045d9d269f4e4f70d58327c22f79c70a3758db376f9f812992f7982ddeff
SHA5121623aea81d49b845c109b786001e755f5a8a6d9735052a7ceb575330601fafea2b8e769626100e5b702caef3a17156eee35c6a0396843343a3269075af0112d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fa399706b1ba5e8346d4f4d26052313
SHA1a1c329557ede8837d4bea89d2e0538a571ea6c8a
SHA25655221fdc762f16718ef4bc56150de24a2214048ac9a573f538f10145fc54eb38
SHA51240e6b812d9d600a6a6446cf6b5aecd74986259af1d41c613feec16d274934050a1a8aef25d22dde484daa0d61432482eacdb964ca735280dd6aea0fcc48ef905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5200efb9cf353a8e2af80c4d1c8ad3fad
SHA1403cba66d1a1e4086327c4ba499203edf68bac09
SHA256a4149ffda0fd1a0fc61dabd90c6671770a15fb41575b9d8a20ab522c81999d7b
SHA5128fbe13117a1587623ee66ea6cf93abe75be0c3f6ce584f12d803fc9360d35093fdbc6b3543b9dcf6983086bd4e10f9b3c1c665b902820bec8a9ad9fd292414cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559cc74331d65b49b4f0682ab5f2b84aa
SHA1b7c55de85b74812ae9a0a8b9a61ebc918ae81462
SHA2564677deee8ec5e837da318106b9b0ca3881c8f3ff3bf3e3bcfdac3e81f29296ac
SHA512162bbea62f407a95b4c8c9fa43478bdbb3a71bf0ad2173a714d16be334e2c5d871c5c77f88b1af01918197ad1025146714662979af778462a04da18ed2643ffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5099fccee536af7a4c9aa53d9a68478e1
SHA1264a0efc5be1aa6d8e0f2dfe4c0c669377cb2246
SHA2567283f7f2e9f72f9d2f1af678d83b393460307ca1bf98f3c0ff14827916530682
SHA512a68da18c44e1c07c742338550542f04f245f8070a2e801456fed97c7a1e9e4f36e8547703ce877f1c5c3c4de3de5f38fd14339dac0ecdc873aba14e042fd4362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e89a523e7bf5d2c9f44c6d4a869644a
SHA1de95cbc27f8c72ccacffea77c783050ea1ee5fbf
SHA256ee5e4f0c7252a8001e3a3419eedf03da9068f8aed4e0883944d311f1beef385c
SHA51284fec55c7cb7a338e8beff83fd03cdc1e690f53971c852f7f1fa05edbc80d50d58ff53678cc77c1b0636e3e97833af1ef597f7308022e5ed0613f3125b7bb020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ec1560fa4110641e3e2c0b8fef07e74
SHA12477cab18d5d7696bf61054012293b6f014d1190
SHA25634516eb65b49b4a4fd3d69ddcd7f4fa450f35e289e10dc0effd425d56fbea831
SHA51243b98d5140391587e5464c4c8e65e9746c260438b5afd1c0ef9e2e703caf033abe345e655817dcf778326f189928d7ad581cf7022bffef8c787fb1eddc87d74f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e3934b361f40baa534faa88b76438bd
SHA1cd624725463502b9883b42823ffbb0cca749f025
SHA256167ebaa5353aa105ab28703091fb86cc1968aad2b1497ef9973ead58f7ad0185
SHA5122f56873db2463bad47360de4e1a898e9816ae2c8cb5819e99a85482c9c8cc1a46e4f1a856d36f8b2790e83545d2312f4c918ab27e31a80cf2710f53b03b6621c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f287570035200eb79694480d60accdd
SHA1c2ec6b55d7678089a0588b111d83b028923e991c
SHA256a4d694aab13c0b2e53412b6713f6dde4e49b2e797f7542619e82f4ec034aa432
SHA51208661483937ba2ab98396e472224c0ebb3f1a4dcd5e9052b2ae70908b7017e49becc93d891ec8ad8045d9baa191e9392a98c60bf8f05d7ecd599be0a99cb7dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e11bf3345bb2213539c455a14412718d
SHA1ea6db75ee39890494fac5e88f8d7b8c71f755450
SHA25698ad23cca827cf88874b84bff18cdc95b3f1ee8492e7f31185ee68c29cee9305
SHA5129f012239f5bf4d4858ecb464c266bbaeb1bf1d5ecbbf97b62a49ff673c738a0d9917d6a73078eb2f98336205bee13c1b15d3d5effef375a5c41d24394ddc2157
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b