Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 16:34
Static task
static1
Behavioral task
behavioral1
Sample
0b9747b1fcfeffb585cacc4bca756088_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b9747b1fcfeffb585cacc4bca756088_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0b9747b1fcfeffb585cacc4bca756088_JaffaCakes118.html
-
Size
653B
-
MD5
0b9747b1fcfeffb585cacc4bca756088
-
SHA1
cd56e7954baea04d426a6b4684246e1224c25b53
-
SHA256
61835d91458e8b5e5268062588feead5a268f98e2eed4bb9400e09d469d14aec
-
SHA512
987b5e51532d31223e9908139c3f02cee3ff274da59561ccdb71ffe1a84ba5401a5cc1bacd9a9945e5e305d152bbb1dd4bde788e33430b54b612e8af6b9959f3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434048731" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0dacd1ce914db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F161701-80DC-11EF-96BC-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000001bf4c042bc0df79d904a1f9bc31d534bcf7629762bf0acf6476ca8cc0eeb9ed000000000e80000000020000200000002c0c124d89af658dcd0816f8d7dd9025da3611c018e0c6852bc59cee3a060b4f20000000ca4e3df4aa1d6ee302834f5c53d022c5e9f5a9bcc9b4fcddee8ad3ad6958cc3240000000df7511d09c35426f52def67eb67e10ba186caba74259e0ecfff4b75a3905903e7bd2d52797bc8dff500d3ca8204ae7b11d0938644a8d705f2ae7a80256fd8156 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2676 iexplore.exe 2676 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2808 2676 iexplore.exe 30 PID 2676 wrote to memory of 2808 2676 iexplore.exe 30 PID 2676 wrote to memory of 2808 2676 iexplore.exe 30 PID 2676 wrote to memory of 2808 2676 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b9747b1fcfeffb585cacc4bca756088_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1ecfaed7342b20cd62e75989a0b072f
SHA14624e510363e3454298b070c398cf877328739b7
SHA256d84c60c4e32079f26c16b451f489b1d8181ad7696718ba368b8a97cfbc2cb006
SHA51204a496819826dcbe5aad98babdcddc4604ac6b654894a6d69b8fb214f5aac2e4bb514340c8623f4f4845fd82279ea10d757c158e61b0cfe072e5cf8a8568c24f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1c76356a55ef70a4ad68119862d98e8
SHA1fa18c317e5d3934e97b457d306e6ba9413f02077
SHA25642524d01876dc62c7cbb1c1fcbbb4710724137d6a5d6046e63fe8f54b2096b69
SHA512fe033b1c68dd551e9e887cb820bc8a8daabb4acb73a29121bdb3f91f7a8b735000c77f24c8b41836bfeca8adb8a88923e2f0852f73471a88e1776a815e138111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5971e52c39605f8dd53f78647f29731c0
SHA13bf619e1306353eded107842e4a537e48cc86b5d
SHA2569e0c433afe2aabcc7b5167552ba0fbf1c6dbd88260265633daf6c660c64e5799
SHA512c6dd2d462b5c8b39dfdc5a4807dbef4536e529b0fed7c20aa7152381c9c165659c7b3a469ad273d3448c27c75a9a5d377d62a2d59c57b926ac8e70f240a2ee97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b80d3bb979d7779ae593be2b7dcfa0
SHA1cb7b21cea4a4c2c804959a8d022d9b07cae1af40
SHA256bc278fa5fba71c879e455ac342116b6478661fbd720a4e18f3922c113825e36b
SHA5120e9a003142d5acefc425b2040b45f50edc23dd5fa68b91e3a0ece14f5997e00f09ac3b47851825ad13141c462af18a7611558d87f35de2abe2a7b90852bc3483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59adb26a1d97f468e9e45269f7f29b264
SHA10ae44d5c83f268f402e92174ead7e2755edd199d
SHA256bfbcacc851670702f154dd8b119f95a0d06f6e701bfdb3c4597fecf56f7e5925
SHA512b9e540375177303d4f1c77e6ea41d1f1b46e39b17d12135835a0d50857186b689b113559f723406708acdc3c428f1cb419e811e16467d6ca45a40ba786206eb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b20d3ead199a1bb5d3de331db3122c07
SHA180e2b33033d1f6566fb01cf680582900e0046cc5
SHA25692dc93124ea5b5fb5b162a1c4c830e6611de9356db77d2ac4b00c3395887ba5d
SHA5122f89b93cfd39ef2ab0e1b85fc527a561417de0e77ec1e77acca6594dd3b79c871cb76ed3556f533b990b19f87bff66a4207204f2777a359f986023fe105f337c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0ffc880ef76ce86074c654e7fe6a676
SHA1c191fd6e659cd623bae3901fcfb94a3bb6cb5e4d
SHA25667778f275bd2cb5887c785de9e3a07b5a67da3c97f42f11b93398c3428b34564
SHA512d6efbcf5edc8933069d801d4c20f71fef219b57acc93a101c3fa0e2006c2b87ec5915f485f0d67372eb817316b5b91ef3b0acbc9d208069d9d043e0465929c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527d684bd2e0665efff30716f82b1bb53
SHA1c9654364b3c811bdfa682ccf26762500ee9a9874
SHA256015105353d55ed757e180d91b3182e394b289ded9e4872e66829beba1e59abb3
SHA51211dbb669d98372162b903b62aaf09dfd775b83e77d432d06a7415b78374f59940fc031d0319a367255facfed879588f9edbca3e40513e109d8502765d41838bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52596ef5a40413c30218a2e5984a15c99
SHA1330831d273d17241a95f6d4c655a96aacf71c369
SHA256d665b138ace2ebe281422cbd99a9d042983119ed0abbdbe177d777782a175194
SHA512784b7d79d6b2930f34341636e62c5b289bc5c56b82c2fe98802a7955b278b5d4bc5e26680ece44f7c3113fdec5d908b2f615316f09bab6ec2c2ef7c099529f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e186c16f4c9506f307c1133d33d10e5
SHA19786fcfb6fa9181503fcde7145da134e103d769e
SHA256a6b18247b88111209b116cb078d7dc35535e343e2ac2e0ab7375beddd1d6e900
SHA5120cb568f1bc6023c68dd5836511e9a4c1c1c8eeb102de52c9af9a63bb910b9b10cdbbfdd158f9c99a07f5353f36117af7f039146fa2bba507fea1c2f2a8f8cd6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f4f986ee112f10e18da59f17b6060b0
SHA145de0692c999b13d2cc7b0c6f0249e0aba9d25e4
SHA2568f2bf57d4cf3b0771ad784a3584067c0d626a49cdf046c344f31976778368327
SHA512cb81e8bbc37de3d7ba3dbbb676b44e614d97b7b8880228cb8faf36d47d6b73d91768f913787b61404e4d06a62fe0367fefa262b99f77057fa14d7a61d505edf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e526d4978b3f00fb28457dbc328b1db
SHA1f199385b0fce6c339641540dd368c40a2af51c48
SHA256e7bddcefcdb8dc540becd5c844064b70c9b870385c361946d4b5cec97312378a
SHA512128f8e550bf3edb9434ecbfdd1f815a8476d542ee0732353d7488e2b5a79157f7b1faaa9cfef043f01671f966f2cb0ea696c158751dd931cae3c8bc9fcc2df07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59667c228705877880f279521292a8809
SHA111bb5fd553f174121dbc14cadb3455c26504c0aa
SHA256ff0fcbcf36cc04be70ce10e5a51ccb9fdc9281e7971be437c9a716954cfdfcea
SHA512d29b9790612ad0873825882664be562486278d3829bd7285df19f2b48ece7fa62ffa1af7c0ee9471c64cce127dacf24eea58e027cc900c1254e3dbbc7e07be8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52170f154aabff51bd4f494c15c4fb9e1
SHA1f4c89ff79a29cff64d6ff7d557c0621ee0a7b120
SHA2561e9bf068c784da64e09681c2df5d52dd011a60a75d5b0bcdb61f0f58ad00a055
SHA5122627c37f55db407393c497747c528fc5ea081cb60f5775c924b00565fa1edaef78766606f9d1030414ce32954765546562851dfa8f67d09b90dc6453879b3d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed52d9ce1ab90ae9e0d39e0b1ed8d80a
SHA109816ac5aa79a4618ac2306380490c919d0c3a23
SHA25648296c3da471a3ce564807420ff484cc07776a8625cf774b1fbfa66424e8b7e1
SHA5128c0ad9938e297f3edcdafdceeba9f80f0348281a7810d20d0c2b089d4d2402241312441ae479ca45eb31b9fae984a67e83f950b24b1d07970a8310c3f29179d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb3da658e3a69a871161203ec5368648
SHA1af40d4f14c9b5f89b45cc6b05166f2a3a358ba2c
SHA2563130d0e24f149ca0d68e99c70cbd89ce0cde06a444ad8111d322a8ecb7aa6021
SHA512029afa5912b381586c5e672d01aae8c3ffb7ab9db71ad395b19096de53b36de40094b9e9c4777763028336dc57b1890205a1d6a9fda287d204d9f6606a2f8da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54abe88f24fe33861e707473e13ca04a1
SHA1d168503f42bded140035a559f4c8692c87818c74
SHA256aaa92c19751f68684d6447614d7000f5963e683438c3ecf0071912369bacad52
SHA512e77da81bccf2e8fa4c7a114f3b3c05f22eec6dee0dd34d59762d9b2d0851da11ccc2faac4c0c4a057adec651d7af7df080e7952db7ee4200b753a03c3fe9eba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d84c831b23c1379ae5fd62b51ad5e2f4
SHA1d70a623cfdcde8640a9aaa436ff9fceff895faa3
SHA256d6cae10fd49d76af5ca4c029419f731b40f84d49815c44722c66587c30b2c7e4
SHA51273753fb1eb40304e8800fb0e4664ba742a7b858a1cb0a89a3cb0b753a75d61453c0ea84a048199f19339641e2eac91bb7edd189d83c0537800b74912e3c9ddbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad9b612c8fe6252ce36379802cce206f
SHA17f8fb3c740038588dcd4a406f03643915f724bea
SHA256e9e52b9c98fd81e1da1bd039d048297fab91abc6ea27921f28d2cc185ee85c2a
SHA512e2f72419141c63bf64d6cac6fdaa08464011d181264b6b210750420168d2c8e09ba9ff5d6081c46b8ca8710e584f3b9bb12e1713185589973f6721f8865b073d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b