Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:20
Static task
static1
Behavioral task
behavioral1
Sample
eabfa99c4d807be6e5173c1fc5edcc35_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabfa99c4d807be6e5173c1fc5edcc35_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabfa99c4d807be6e5173c1fc5edcc35_JaffaCakes118.html
-
Size
7KB
-
MD5
eabfa99c4d807be6e5173c1fc5edcc35
-
SHA1
1ebbdc2b8b4634d99ec0268f9454d100ca30dc06
-
SHA256
d593dccf43b22dc923780154afa06e3d700f8cb9c9e70eacd5489a78e1699ece
-
SHA512
ff5d6947b0f964c3a0fa9a7a72e9f0a436d4f1a672a7da3f6edda6d76a924e699bb72f4b180114d76c406f4dd878e6297e6727ab8a1998db95d5b53e4471619a
-
SSDEEP
192:qaZ+sSN9aY29LTpUEd2KkTUueZo2Gtttv1eQB++skmhHYNFiINu1VaYRQ:qaZTOqTpUEd2fQueZStttv1eD+skqHYd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888703" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{47EDFDC1-764F-11EF-AD58-7ED3796B1EC0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000c6cf0a2d02b2e4957477958595bec3623a267abd0166a03868c9852b4ec171a1000000000e80000000020000200000000489b41efe18a31d95ad660652f6f9997f40606f1fdbfe3e671719f88afae693200000005de6bed0765e3591f8553b3781e1d015bbeaa69fff97ef526a2de4529ef97f9f40000000728c09abdae027ab85d07c3c07b98ce87e896c9c43ed84e5707dbaffc90f095bc99f52b0913ca090de51ea3f852899ee48a61b415641d41c58d8401c3c5bc3a9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c055b21c5c0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2820 2672 iexplore.exe 31 PID 2672 wrote to memory of 2820 2672 iexplore.exe 31 PID 2672 wrote to memory of 2820 2672 iexplore.exe 31 PID 2672 wrote to memory of 2820 2672 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabfa99c4d807be6e5173c1fc5edcc35_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a182e74261a8490d3ebf22134893041a
SHA1c46b9589a7254c804f20772a434c6d6010f3a3b8
SHA256d107b8eef836ada54ebb7858c9e851e7b1127cc0101d74dbab8a96966daa196a
SHA512ad7c863aa177b8e57b7f666a6dc8cee5b837ff43f59d664e3cee3ac71ec368ff28bd5dc29cfa0b2277a904219cc2f673affdf2d6f8513936d8b27a17252858c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f9e34dcf11248b8aa90c0134ff73cb4
SHA10cfbe9bb096a9deaaeef0016da0b8b8e5fdb981e
SHA25655f1c48e60e7204296bf065ff299299f4a5833a440746658d6187544efd04d22
SHA5126b34d8b827bfcb13bb941630fb3407596c7bdc57f6d483bba6b55160b4867f8f32b36c33845b9821b138efb411952752d7edbf88a62a870049350cc33a22394b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c68e228ca0eafd541af65d3d470ef185
SHA1de827f65860fbfe2fb42877d2c9e6516821740aa
SHA25680f3b7a4fe936747a645f93f90d0fa80c758396747697ed784abf6f4783e40cb
SHA51215604f105e38e2c24ca648a2c9b9f7dbd77154fd79c0728ee65362183bd11f55aa06ae061225e96209d88dbc5590edfdd37b9b9142987de18638f8b229e6b8d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59563ef0e0b461c1a00caa1590523c899
SHA197e77f9d3aa9aa425e2a179cf0a303ae76eea2b7
SHA25670678c0529037f9ff5acee2633bf68fe260681a5238f553c6cbfa69322b7a4cb
SHA5124c138eeb4f900da56d8d2bfe74aec76a0ec6f32a84c37a4c94b6987a4b7be69765d954a5eb43b8ba8e9d3b0f10209cfe4a0e72c68ac7552e91c6cdbcfa9af0a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cb49d2ee62258b1c84707fcd3a206f3
SHA13bd912daf783ab8e3b0203c8bfdc694deb70279b
SHA256784d9d07bd4e76a03e3f394a8fdc14b5dfdcd60ec2f41520b55d20337ade6b37
SHA512895fccbdc4609f5af86513e8994c788cbb198cc468dfbc171cb4e8f75fd4a314895c1d95e1c73b5b7469cc4a83b503f305cb357e13cbfba9c05016392e791645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538b6b417547833b102c52274cc109f94
SHA1cdb26b06f8f47fa0b12c4658ba7d6c1d07c2e33b
SHA256b2a63e5763e05090b1a7d77d3c7ba32428a2fabab1a93648805a2490ea26ea1c
SHA51282e0f6fd3663a0c9f49d5c5c2cc5921dcccf5d6a48e8638da467eef1a40c52a754e2538e639c3dad9809f3d75e1897bf70fd18001a3256d1ee35ab0236579187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4a56d2637886a1de55ada0e818c80f3
SHA1382a6ba80310e403b04c0751120a6be8d78461ae
SHA256b2e8cab6554b45ee175de26e9fe9a4cb8487a235fba5ffd1bb1748847c04e39b
SHA5121a04292d121f0cd9e6bd270c9c129e4f522e52f9273709fa535af155d009c5ea5bd05847b52e21e765ec75c9591b83ae240b368e2a3bc43a8c433ff96355a327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9a58f110ac73bf06662ca2b174f9f98
SHA1627d188ce5b1ee9d52dfa51c7f2879305096061c
SHA256d9dda5914aefed0b5e21cf2053042d2edadaef19df4dec4dc1e799acdc513728
SHA5123273184436e6ad766e62192fd12ba382b8069ca65a5242dae343004467ce2855a653af4c8c0f96fb3acd31c60dfa78b2e05a9d680db793ab9ee54d8c0c42fe7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f8ea7895812849fd2420fb69c1116bb
SHA13292c124fcd88e27dc709db1b471c5a8fb8d289e
SHA256e56ac2e631d7c5ebc1c846847c50b8c07ed97f23df2149a7ff41258d3fbb2fc3
SHA5121c2834fcd5c1d30c18d81ee2da76ae3b080915c8501043ae4435cbc1ff5f541b0a3a79aebb74c9b5ddb49cdbd41e5e63a800b3350acc0dd4b8a8b126af8a9372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c729ec1bc647a47e7d94993bf4c2d4a
SHA1281ee65e116b09afd01a0972c3c32515a7a4aa11
SHA2563e3ebf142c56ea4f624cca65cb398a1c503da1edbd36ffcce0584311ca5c4a7f
SHA51220e24cb2ae0867a724de8eea4113d24c5a6e1072df7cf7577945caa8cbbbaa3b23e33d1c4768bb9d76722b73c999fc3e88daf59a189f546ae18f0c9e0185a797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5bdcb9b45c35ba7cd2d3f7482fc6d88
SHA19a34902e8dd5b312ee01e57156e1ea902f91a1e6
SHA25641548541467cba2151f6bb1d0ff60e7c449a17d1cd39f2df203b10160f8b5bb0
SHA51259f619bb520066fe2b1819553465a3ece022885cbb46b730254fa2b95229124a599df7a6d958c1c93de46c8f1d4e53f4dab38b13db54a5349ed053bebba5177e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555319e201f9265700526462bff6d50b6
SHA133fe057c9f54e80f1b40a934cfa5ec4682552c92
SHA2562ef268ef024951794282322b6a4b5e68b94890e1386392b2eebed185ee7a814e
SHA512ba621c9381327674acc76be9141e6c4e82d55bcf95e49a52ed357c87fb38ba53d8d59399dd6a149af03d02ac7b99c51b27bc53457eb6ca9f4d4fb37e00a79200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5870a0169ce7cf2c186faff13fdb3f89b
SHA1693a2cc6e54fa340dc2e20726b4451b2046a7d62
SHA256f42ef3db08297a6eeb37dd9fcea03539b5653c014f06789fae010d3043ac5911
SHA5127407f5aac20865d2658935b176f074e10493601942166e5e7c31083c6d2630ba037d4395f5d50d4750cfb2aa33f73773a755448ad0f17e3c1a76cbbe9b4528fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8025395ed040df90026ce8589b2c401
SHA142438d21a65a3c1233b82be2192b094f9588d7c6
SHA256d066f6dfb09b9a8544b5c3d5fe7e278c148c8338bc2fb33dc525b03c932df473
SHA512df7a4ffcd5094e11dea78d149dd9f0b8b5054abd66cfec6439ae16f3e03368ffdc0e5fbf7c78d431037821c141bfd9fade9f3788dc6abce5d7daade657eb2a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eef6a8a950854b309337f23dd9cd36d
SHA1257fff62805d15aedd3a103dd4a42d93f23ed6d1
SHA256612d98385bb7cea3c7030c76e218c34a8113b190631190ae43edfcd0e6ed0d78
SHA512df943cc8804b2588c10cb55a4963f3a7b0336bd1c4a81b9c57edf0a4aa4699b1988745acd921cec33e08233366931ab4054826efa6ea963808c997431e5320ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b41c00c981879e2ce8888a4b48ff3812
SHA187395457d51c59a11e73647935f1f906032e84c8
SHA256b6bb6526ee7e0df6ca578f86147f0bf5bb5e3e6557161ac31996dba7295dec18
SHA512fcabee2ccbe59b9f4c8a017cf0b362316c565cfefa29c17ae9998a4e149a4405332f5d939c88317b8284382c05ffc958d46d503631821aff01ca6d780714fbf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567c31579f678dec4c232e875c94e7f81
SHA13e8a7555ae3f4076286e7b6d9c2b8bede9b58489
SHA256cc4812402cf602984abdde97d6220775bfbea8e70d0aa8707eb019e9006624f4
SHA512a09585e012e19fa7bd2a16b93af874666b38600de8b22d4ba0b315df68facea2b770bfd2442f27b65c71f31ec0131af0ed87a981a514b6b5a02c12e1b528f653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509b3fc2a08eaace8b5392be4badad8cb
SHA140760f5cda341d8bd96b25977f3f069a864be697
SHA256d997f9fba33aa5e564b2bd5dbb20b24f8f62e65d7ee6451514028e0fe01a2d51
SHA5126e7b9158252fda38d1390fba353bc2ed33273fd4e82e87ebdcf13a7878ac74a8a612a7159e9cf79ffcefbad1d4e0e675dd4ab15bcd75bf57f6f3b72cfb984c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed6e64e37ddd176376f135cc0db58cf0
SHA18f15d0725029a86cd042715a39c42e20d47def6e
SHA256ec49420dfd6c0f0ced7d687cc28ba0ed2877dd236e9501a72ba746f0c3f64cc3
SHA512ef556b0c4d98c1194f50daacdb76c9291681a773a70cf939c24dff395065d210e5aa91d08449e39b1eadd1ff1b67e9cad147e0594edf2042f64cde646f74e4c5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\ga[1].js
Filesize45KB
MD5e9372f0ebbcf71f851e3d321ef2a8e5a
SHA12c7d19d1af7d97085c977d1b69dcb8b84483d87c
SHA2561259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
SHA512c3a1c74ac968fc2fa366d9c25442162773db9af1289adfb165fc71e7750a7e62bd22f424f241730f3c2427afff8a540c214b3b97219a360a231d4875e6ddee6f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b