Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
96480f32a0882f470dded8a4c4df961d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
96480f32a0882f470dded8a4c4df961d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
96480f32a0882f470dded8a4c4df961d_JaffaCakes118.html
-
Size
39KB
-
MD5
96480f32a0882f470dded8a4c4df961d
-
SHA1
6b7e8841b4de5279184c0a4b92192360ebae922b
-
SHA256
d5a7f7c18dd3553dac67c52bf1711b1d9a99dc478ee29fc8eb84c20bf13cbd17
-
SHA512
35c5746edb460201909ca94a0d8ec818e5d22f5a6ee20689266ecd5eb9c6cdf3d070d81ddc37ce47958438e9b880b668799851aa29b5287d5fc98e62697133b9
-
SSDEEP
384:SIgphX7VQKJ4x8kvQOekSFBkwjgXni8186sToGAewCC4ma59gwRaa1wvOewMvHWR:SRpYKJ4x8k4nh7gXi8Pyk4mSguaa2WkO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC2B45B1-5A40-11EF-8419-5E235017FF15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 902c57924deeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000018c1fa4d6b29592f20ce0611704e6d04c19fa5197b7ecca34b3754a8d33b956c000000000e8000000002000020000000d53c5045d063a9f7b02f2eeef6ea409efc1e54626b3d45aef44da44f649ad61f20000000e1dd33ecdb838d8abb11e5468c0a08101a1e9e1e04216a0d66ef7236f1766e7940000000a08a931dab18af93c91047949ec6c13dc707bd13bf4c4830a96dacffdbc1316b37c1a6427782d95acc9af3eb66ff3a80df33434ce50c74a1d567b593c2fa462a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429803823" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2080 2104 iexplore.exe 30 PID 2104 wrote to memory of 2080 2104 iexplore.exe 30 PID 2104 wrote to memory of 2080 2104 iexplore.exe 30 PID 2104 wrote to memory of 2080 2104 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\96480f32a0882f470dded8a4c4df961d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbab5ce0245c6e75208ca20dea18eebf
SHA1fb1881a71d63e9e07dde01d90f6efe56eb9f54c6
SHA25660dc6c65927194f7595e69075888fec52893414ab5ff013add71a8460e9911b4
SHA512c9320d1e6cefd78885e6f2732e401659f12edf6bce4a3ad1b3e2a4aca64a50b2fbe5869ae0ac787894074cecb00320362261541054cc2ecc689309e3845935d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545f8e4d5697ba051ad18d63a5254e964
SHA13b1d9b43a3111be1b604447b767012392fdeb837
SHA256519699c3abb8c685036e6c80cc6b8b0e35c06e7002ecabc41bbdc628d387103f
SHA512558f3d3b1a39d076ec97a53915ab42fb6adf3cda566c91e01d904a99ab585b849271ecc8c39571c46f3ea840b2b0e64f06dc71152f22ba4c221b801ffb029986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db429792bef0539d29ed4d6ddcab3112
SHA180f7540a7c3e4108ea6dbfc2d69cc938e94feba9
SHA256362c5021441b9e06636c6e38a7770e468fe6c6e6cbd131db8658efcdcd1742ce
SHA512c4611319b70ca968fd62a0f4029a0bb5b75c3a4e10a6e399d7abd8aebbf3772308ae034e309149582e4bb16fb58d628b4e32e3417efd3aec199616be0f710c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f099ac4ee0f64739c3289f9dbb779045
SHA12a89a525e55cae549b15715904e625cb53f1e239
SHA256d84e1f12f1fbd5098fa22d8b08b4e2b3eb2a71a761eab088ff596e2e8e373014
SHA51264213594a094973829096414221a5c222b8f30e8c80923136bfc466a33bae13f2c8378064a4ebdddd5049135ef29562f936dc31213bfc2d7a8e3fac69cbbc1ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582be5c4c8f9ce7a6b6617e32af19e18e
SHA100be11f476af071273ed949139bd69e12d99680f
SHA2565fb5e62428cd17f7bd986cae73dd2a142c3b7221fae750488fa4b89b9126664b
SHA5120a34667cf2357f4ac9edd3ac9f3bcfc5efbe2facd58173854b0b6b41b6b6b75129f4468aa1ec7beaba7180df10b1c785632a0fb61be008c6c55f99a9fc7b1fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589a35784e7de2605ebb9a71671c8297e
SHA1439b1632123d94199114659d8c5cf690c4a2ec2d
SHA25684f691076b0173399feb5f2ca30bf2e4882a19754d601261a067210b1d953850
SHA5129ddcfd491901770b94b06fc727b56eccad42bd7e6f08a9c3a8933ed102d06667927bf71cae65386c80ba6dd974b818971288e15d8ed836746e9a2a07d7b245be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa04c1a42ee77584076c58ec404b090d
SHA1f989f2518015e7e0f86fe71dc164c6a98a0e3bdf
SHA256a58ceccdfbac51cb12dac52add42f912cd1817b0edddee8fca6bd20e8794da95
SHA512ec26c9ba9de3c680e29618a430ded765a3a2f43fe364b36b7589e19b5d3c980b1fd0e962d4387448e79648388307bb75246140659d69caafa04d5466f766cf87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582060bbfa62974d82a685a2adbe4057e
SHA1a4c377d5888ea575daacafcb2a1929c1a89f7fb4
SHA256d3a90a4fac5f5fcc727161449cb02dc5ac302975866a45d89c3988806d0bb33d
SHA5125c723befce597cdc8fbc0d7a8dd42367742ab32a854e3255daf76fb9b8a565490c069f7e92ecbc1ffd6ec1c70158d048fd97395cc82a4795aeb633c5a9e5de21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be3d687cfa3557b04b2a8fee44af8bf2
SHA186c8a100b534faf74fe425d1994a39bd883b8682
SHA256ee8657de45d959a89d6ea16919a3800b0ebb81220565fa0660331d17662649ec
SHA5125f8f7aec19fee529d9290a39db4df907ff1121b4a7b4e3929e32d1d5ff66807014a5b27694402a41bb72a9170e1be984809adc3f92dc43bd463cab50b76962d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533a7f78ae41a836d16a695261be9e2a2
SHA11b8d509b5ad42fd53feab2ba61e475216a019d78
SHA256b057106ec57a71f247dcb375dd57e6c204c069e5daa69dc2ad395758b17324a4
SHA512d5fa8cbc00543698f7c61011524d7b05c332fbeff13b1fade7cfc809f9e6a5da171413ef2e8571f857f37f03dfc029ed3ee119268b1cc0d997ae02eb2f8dbb3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507e070a5d20b13deb0768d57e132ca48
SHA1ddaf7c0c543add49e79da243b2e4ca36dd92e134
SHA256bcdf6803784f78992208580e767e809b95ec7ddcdd5807f08ef4366b46ea6036
SHA512eac989bf48e76484b11e4a31949a7124ed8067d3628ec7435554ef7d28dba3648cf6007aec1246ce3c24ed2adb7c9e39793302e59ada478de549531d1e71e890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c06512bc0f569c24864d2ae5d095484
SHA1d3907abdbe15ebc1318c14c15bf014992245ee5d
SHA256826e80edc15abf763983f9cfc5f00a2b05d3d34faec2261ab30e866abb819f22
SHA5128a2c740487ab20b81af5adf3112f91ec4b49594912f5cda3c8be3f55cae5d80b2fc51b9cd6f8ea77350a32b20b14ae67853bda2a2d55121a5a3d795f366a47d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f85fde17c9dbb7668d8f7d5422356b9
SHA1866116d912096d6b2ba1667bebb44c0a95c6d199
SHA2564d3b7159e93e141de6cde7fe6d03e274ac779ad567c457a0e1eb25809596e5bc
SHA5123a5eb5919db0d4507623346be63a6df4fc580131010f6a071912064443890e4666423acf476127572384ed9dcad313bd098a7a894b887de68b55a14d73a0cbab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581e270137dd28fa2f5298d1e7d15c686
SHA116d9bfd9c7285258c2481b7e0cddfdcc717f21b7
SHA2561498d1b076168b443fbbac4449ba6ac81cbfa581dde2e57d64510f356272eb71
SHA5121d4988bae512bb5c0493425211edc7293fda390cde16db4deaf7df60c7fd6d302665aaba6bc0f0444e330b8e4a870fe64a6fd77ba838f69a1c416f34b19bd164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d727e275071d18ca6586edc6b9a7f56
SHA1bdcd4c53cf8ffedf1d56de84b89f872ff86eaf70
SHA256ed509d42cd33eab6b49f846e94ccbde9abfc5de66bb411ab1957a8114e180696
SHA512bedd66e7ccee9ca014028fb2d7837abe2bda281deb2718777665c9764b0f551d1f92e5963e0b47cda94f99a44da897fd0d8fac7dd9daa63be4837b6365897d43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583ad64b5c3e9c02570e825ab6b675ee9
SHA116ff48a714db4ebbd49bc19f5151694a69e9fffb
SHA2567b4c681f006eb5af66ceee5236b90a5d394d4a055491cb17e8dc5847825d303d
SHA512e141879b3eeb45140381a91dc6a009daa6bb1cf8fad8c6a7bde3d908a8d39f3034d2a790c9e4b40b52b4d0f9fc70e00efb2d446453cbfa3536470d2ed6523860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f199878f6eff893b3e8d8a6c64ea6c35
SHA12c5951a81577797e368d9b2c871de7c639365ae6
SHA2561635ed8229d454d7d8435b90730ea159ab929f931a16bd9409b1634ee13eff66
SHA5125e86e6e25bb0370b1c6dcea4e01b4ab204dbb783b0e28c7af5baea656a80123aea1ac7a20a07796d382db19e96d3dd1cf96e430879fc71f84ff86c1fbc3c3555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58291be90784a43444f5798274a0ca773
SHA1009aee6c90e03d46411eafec4138096744bcb01c
SHA256f48102f2d3e747648bcdfa0541ec0d3df857efccf73d068e97f75a3f59499284
SHA512dc83e897120f9fb8f46e83399553e3e5e7ea79fc7a1e6db2847bf30057edae00e7c83192c4bd7a78af816f36159d62ef70d4e828272dc255ffbef7ffc9bf944d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fda54dc7fa3e82b1afff13969e80e7dc
SHA11a6e30f1c6bb5ad6c29fc233db4f12b1016f712d
SHA2561f63b03697e4f7c8a5e0d7da0dcabfad900193e8bc0b433e5f410cb35d1b8f25
SHA512baae23ea914d5b6660f4b2efcd0acda733b1f246f9a1af348a82ccbf2bcfd5b6e81386a57bd050efdfd826113311a26c992e3a1a77c1fbe1896d25d0d3f91073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5665e7366fcab45772c6c1663e770ca33
SHA1636b95f1758f82f4db8ef9247b95b26c7e2de5e9
SHA256c945a510b05673a11c42062e1ff0f450bdcfb0e06dd233e7c38a9a20faf03e8b
SHA512f661f03ecd74a4c2b66169017994a829a43164e7f110cfe9c056811d8f34b4458f939b48d6a836f3066ffbb3d91c04d00f09d78c64b64ab941eb5803587b534e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b