Analysis
-
max time kernel
118s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 13:19
Static task
static1
Behavioral task
behavioral1
Sample
d206669f2e9667529925b884769f7c19_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d206669f2e9667529925b884769f7c19_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d206669f2e9667529925b884769f7c19_JaffaCakes118.html
-
Size
94KB
-
MD5
d206669f2e9667529925b884769f7c19
-
SHA1
10bd431d0d0585af8cb864f17361f1fcb5ab4916
-
SHA256
00ea81bd226efa9efbbcbc563b73ab3ec6e92ce5a0a272a07f1e0bfc68540944
-
SHA512
b560e36b4471162c92c6a6cb9894d9a6ca2d289c15ebb65b26d45b7e00092f14a403258aea8ea4b2aafe72b9fb89feb9ec7834ef0331452e54085e235409d2b1
-
SSDEEP
1536:WMLiNj+vdf7k7L9Z9iAKW4FLDSL+w4fbUZuhyezBdkrY8mgHC+qpEyW:WAisJPBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{56641F01-6D1D-11EF-8B6F-725FF0DF1EEB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431877696" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000a0be455f3b55833df1e797c3a866b2ee7d82fe495a094793a000498900a23e62000000000e8000000002000020000000f947bc56fdcae3344b2ac3a9f1c1231ae3baa74af9f661072514c3109c1a504320000000d52b8a949a6cebc09fcb81d4c1fbb8edc3ae18b94efba5f572c1518118bcc553400000005f6803fc5c2686a245390bad69b2a149fd5d179d6422336ac81bdd268c477cc298074ec1375045e4b1362f04ad42b390ea9ce26d28fa54ec1559893027ab493c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06c81592a01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2756 2708 iexplore.exe 31 PID 2708 wrote to memory of 2756 2708 iexplore.exe 31 PID 2708 wrote to memory of 2756 2708 iexplore.exe 31 PID 2708 wrote to memory of 2756 2708 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d206669f2e9667529925b884769f7c19_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530a393c815047bb283e61bf7944a95af
SHA1c7b45bce1e89714f296c3d27011267f105fb066b
SHA25649fa7ea3b3489f4cf536cc423ca76df4b4722be10f36258ce10c63d1b6cbb33d
SHA512ccbb27478be9aa3b513a954a40b3221878835ad2e23fefc521afbbe2d8ca730f9aa52bb828217d4ee6ccb70d276a5539596b12bbb3c3c05aed57fa544c3bca03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51471972823310cde0eb7083b34dbb003
SHA1f6b4172b1f2ce7ab11c75917db71f043e07e6519
SHA2564da1ce1323786b1b2f268578a996f761e7e26b7cd116f9634950dcc7c0d31d1d
SHA512b5f0ba0836a0369f17503b5148ea228f8d89b94898ae2fd4fd972a0eb742606479696bc03359049a1216a91b95210b5550f70476f8aeb4986e8080ff7fcb4bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e77406462728bc5d1235a3d6e3087c54
SHA1cef0d9b38f342e58b369957023f93a3c91a5d92d
SHA256b9d7556067c99b76918d086be0ae52779b842284e2085b39780049b3ad426a2f
SHA512fb4abed481d74506cfbdb87ec7126069318e80ee20f623da6b07ffaacadb2fc7af83a96fb007742fb8cd2ab240464c03b23a8063336cab92936a992508a4aa59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c81a68977ca8301682ec3e1afec2ca
SHA18c0cde88ad26f8185b7721af7c2ad69bf1a6f54d
SHA256761fd9784167e6ab8484446a265a7cd58dd4a6b76ecab892fbb2e160100efdfb
SHA51201f3d546166d91f607a5f253a412d28110a58c6e1372f99e36adfeee64baaba9893af1897db025ff403f0024f1ac05dd6d9a3fbdfa24ff4b917cc3cf4fb4b3d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ecaec553e7446e0a24723a0c6b9ff1e
SHA11d0adfb68d3f8e7f95539bc9d00d06674dfd7740
SHA256b5db9dbcb92bc35cb696d537ade50ec52548fbc22ac0b76347dd6bcac90c7c80
SHA5120a30ee7c1e285ee1f62be9da28d368d3a49d5d062c9192c6dd27c995e70e99dba666966ca294ebe67fcfc052f913014dcb4e06e3df62f9cf22c0149eceff382c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512608c4f860d5e34d94cdda41312be8e
SHA19cb0f4c5d567dee435f9c383c6d81aa6bf824c0a
SHA25661e7f2f17f49cc1a29aff38000415c3f5efa1d746f42b8cd5389d5c523129747
SHA512a652325215df219c0d52d33106e356408f7219692cb6449c2d43c5beaef120b9e6fb98340c49a3c67c0bd025b5fbfcc03bdfb51d6fb55d2d826b7404ee2e56e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f580a67f4907af1fd8bcc3cd65dfb4c7
SHA1dad10079526c73c8e5f78fc7757a7f33922f9705
SHA25640dc42f6b4a2c3ece6d8162f56a99eca98983a90f29282078e7d12eacd9d8f05
SHA512f53c1658cf3355f469f2f6e032eda723fa09c797dbb0432ee2f4f922f65af59c3b36e2400237c413ad107d533b09edaf186dd98e84ffde33517d5c221cbdb9ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2670e08f61c00f5cc6fd476d105eaa3
SHA166a31c39543039b9be5cf9d97a807f375d8202bf
SHA2568808a875ad67bba36f7c5b7040e4de5b2abe78fa1bf24fa3c5490db12b0a23b4
SHA512943eec360873b605499acf204875a957799292198cd74a2f40be1576845d2e40b53962cb1fbfdf8d04ac33f6b32c2c8010f71a452f01371124467bcf10acbe22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dc8eb4b0ca31ca495a7f83bbf179854
SHA1c591e65d04e1ff7d59947c6a60f92c041812277e
SHA2561340bb46456ab01916d2dbb984cd6d0a93c019c7450c834409f646400fcb5800
SHA5124328885a0bb1a315781256253536a79e93c1a764ff60bf4252243e304e9adfbc4266041845dc30cc7415180e7bf312a79af3e6da64f02aa616b300039a4cc91d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56308f4ef154ae7ceb5842ca57531c9d2
SHA16645038ebf0e108669957ff5b76de3654ec511a1
SHA2565514da0c08086ecde55834132a26cf1d7763cfc1b5767c17acd51ec5a6b506c7
SHA512a30ff2f6d9f546b34ca1caeac362b13ea3a9d34daff1d67f0922b5aa48e19dbd6d0631d56285a47e069fea02560fc79f3fa6ec7dfed741795428bcfd2e8015ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6d2ec5e402c0c11ae81cbe822e1d612
SHA13aca19bf45171b98f26b6e801db3dab01112d6e5
SHA256ea7a28e3366aadc8e98487d9dc887645d2003a602bd91dd1a5d619c0d2b6cbbc
SHA512a5c753886515fff59804cab56e256291dbbad9325779bb04f4f7c487b02ea8fbf0ff94ba1660756dd001819f3b18cc1bd617ac2e06f6d35aff2ac9553c570bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55127f8e79c921ff167ce507d496e4b7b
SHA1221573ec7d1d9a6f641d8e9e64c4f3855369f83f
SHA2566668001790b9801b88d1d25cf319cb54c3b6200daca4a7c38d49764d34354885
SHA512e234cedfaa7e6a6eee3060b625cedd79fc00d54e5e127b8840ba7e1d6b75c9b132a6e5ed42c3a4d36655a17d305c507fb48b003cc2dd233fae7fdb1bf8395142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bebfc46b43ac9c480fcce59e120511b5
SHA1f8b3fbbe448d8779578ed685cd35c55fb4418570
SHA25679372a6809450cd6905958930b7b07fcf6ae0e0cad5bebd5810ad91bb0696786
SHA5123c10206474efd83418e2aad20b144ac166905f884f347a6d91f8b63a873ecac930a82ff2542edda7c6b002b82b8ecc3879aaf6cf552a04e147156a7d67053d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536c11ffe02c3a84f0e86219c715cd2be
SHA1e3ffc9ff41c6ba235e8d32576cd92231cb3a36c0
SHA2561b9d9dbe414efd58477d569553db93080a5334fa7bc0dbaf2d2d69da3b98f0fe
SHA51299076871f5b248eb38a0cd8b44ba1a4745e6b33c2333e216abfb84bccb5ade0043e3e9a3381827b5d63d3eda4fc21f58dcf403b941b0f2f34e8a3e753f16eb6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5485d4e84b605b82d238b38af9a443c1d
SHA1d3039a2f019fe7e8483ca3ea1ec43de5aae59dcc
SHA25652f7c8e684e5d55f56d92e289359b6495074fcee1efafe345f851ee928db1d7e
SHA512b2ec85f262d6a4806bea124279e86621fb6936fdb9dd6f5625cede32e62180a3feff1608c80ef87bf84964a2700befb06de1962ff097aa5b59ecfb57763127c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50181296a95b81841cb06ccf2f7522158
SHA1876572c0b505f6fae1ac3cf8bdbc5ccc73eb480c
SHA256b018253aafddd7ed0f92a4b2d27ca177505c8eee9ae0f4741317514fb8d0b5b0
SHA512f65cffc36a0a80bc43b194f6b9b1a509b10b27b62bb535491f3515d3a9cc628cc67661c3a104e8fd341ccf2e6c6ee54a712b9e8b5290ae0d33200ed007cb24af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510ec8693c9d5fdad17f9c10abc03cf4e
SHA1c1a07906e7ca1fb26879e09e84ff368e920ab0e7
SHA256eb881b0188b7fb9c91889c0b1be288756b08c84cc18123c8c3c398bf49523beb
SHA512bffd925e11151de3eb456802cb52debc9c9b366094ec92fc78920a7649ab4058e7286f6aed05f944bd2f0c450fdddbee44a910f83f698f079ddcb821e286d83c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5272410059d6fa9a1c2eaa2ef59fe4b0d
SHA15cdcf9011c79978123bfc1e7a3754fe016081722
SHA2564b49700bba98c6b832825f82db73a6cb9c39127c897a25a0394519a303412323
SHA51299b370b3a91787f3c952a3224b59acba24425b30160a0c4dcbccfcb195040c3a6a872fc249068a273ce5a0fc42f80463082c0b38c95c67ea5bfe77d0241e0c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb5d6f9d35aaf8a20470f7313f598d57
SHA105dbe5903a837812441a60fead5b1f638f3392c3
SHA256c12ac61d9d70d5c26474de09e0eeadd19cf71d5b45c51f8c6bd5936d87bd8491
SHA512c11172f8b631a1c90199c79d93b65a09b5848e818b10a8f6b9fce8886e939ed18e8b0af914bd206b5b883398bd71f3c0181d399988a0c1bfe0d4b2ea14143f04
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\gmap[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b