Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
2a4d218a145c0db8916f7f3b4347d939_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2a4d218a145c0db8916f7f3b4347d939_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2a4d218a145c0db8916f7f3b4347d939_JaffaCakes118.html
-
Size
646B
-
MD5
2a4d218a145c0db8916f7f3b4347d939
-
SHA1
498d5e0ad8bb3a2d13483689c5cde0a9d74dfe11
-
SHA256
ba9a85d890ade74ee6741b1c85d45f390326db85c567fac62ee88f726acd6616
-
SHA512
0334775a04ad4b2f5991dd06a226e612df70b983f5b6efecbb28e8cb4084737dfec66a378bcd870776cb07e4cacfb516109bdfed1681112b2e8ff2bf0e796ce9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000b8dbd5dd14c832aed40935c39d3bfb4c1ac7456b6dfc4ba1bb39d616d1fe3f75000000000e8000000002000020000000c29b3188a77de67caca944ae9a583029e3097c4f9e4a34e0516dfc75842ce25a20000000f9fa8ba22b14d2374baafb21042ee015a61b810e0c8be9f5bdd900ba00880a0c40000000d40177e5960608634dd82b554a6b79891614d492ffa67ceaf622fe5b503bc5ea5fe9f22fb84abb8595b5584b740db17b0aae104d633abc3bbe7d2e36ab962d22 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B9BD061-863C-11EF-88C1-C26A93CEF43F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000b41dc1df734de0b0d599e026c8dc3eaa929b5bf574858a1e62d477851affe132000000000e8000000002000020000000c86d64813cf9b3fc32693c741eeb364f1961511f8dfba441853aa4f5f728e55e9000000027bafb6ebc36df0a7a7b1f4b0bc491068e3e6b83702b4545f7bc7194addae3afc0b7e1ce82add64eaaa45f47f0ef3283d3064a3d4584f537c66d2b8a5ee9a39c58d5fd1683ed32f4a8c716336de71032ea9279a145d65a1ad78a163a40bd37c76e2c8e84d1274383ddc174ecb8a81cdac152a332c5a8031a2dfc4b17fd39f39161c6e5042157a9c75acc3da6e266cf304000000010a754323cff71973f9cedd181c6e749557ebbf7218b5ac2f87819e6c27ac4ee4ea12d48c1cbfd3205c24a532d426693b21d9532a57bf539d8c25fbe9866353b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434639820" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10319e30491adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2284 iexplore.exe 2284 iexplore.exe 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2284 wrote to memory of 1632 2284 iexplore.exe 30 PID 2284 wrote to memory of 1632 2284 iexplore.exe 30 PID 2284 wrote to memory of 1632 2284 iexplore.exe 30 PID 2284 wrote to memory of 1632 2284 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a4d218a145c0db8916f7f3b4347d939_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5976ed555e9668e39647a9fa0b8fff6c7
SHA1e34f98c532f64da93e12e149638ba67d860942e9
SHA25647d00d556c1baa304f416d62bb1eb1cfcb15691f0dd3265e0c8db93002f18ed6
SHA512d86ce638cff9c5bc0c6a880132b7b3729efd0bd5487be1ecfb49cc4d17deb21e7df11647c931f9837785e2819ef6f3cd9bb0f3ebe45fd56f6d890c5899efe870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8b4e1356794045eab429382ce304b96
SHA1fd575ae965151c41629b38ddf0113e40307c6792
SHA2563d88f58e9a0cecb035f531b4724334ded0f12751aad18cfaf65747387d10948e
SHA512fa36e880d4a86d86875190f94f8e5a74bc3767ed53781d10a9176e47e42e9e54f91414d03402df45445a73e7077dbe9ab4e52c680295c6c3c9b09bfd90e604f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc7bc7dc93517da5adf86b106143f50b
SHA19ad8bf88465d42051006fb705a2aca919429a23f
SHA256ac9455f29cb8b04af06d764595d33d68365c67004af5cf1d50ea11afd90d4841
SHA512656d499b22617b90cbe7da82cbbe8dc424eacd8f7d38c6a4e2efb6671190446ca7ff855364b7fbfddf92c80080f4c52a6d49ba681e2134b7a0e942ebd62afbd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb89d0964ceb81f7de8c0c1d7ceeb643
SHA1b1c43f62bc32c2103efb1ff6110e5edf5e416232
SHA256f2bcd132c5cd1971d7290584261174379a4146de5c898be89ec926b83bccf88d
SHA51288472e09395898a4105627748349a0f48b987e1fc0fa5f31818be1d947e40e9f8732830d64232cff01d8c319545aebfc532ac6b5a2cacbf76cb556d30a365e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a19f400da948e9d0c8565e228111684d
SHA16cffdce802fb8ab13e339f3964cd220b9901fa92
SHA2561d6275346c319834d9d61cbcfc49749b8dab164c29e241404792c217b0977496
SHA5127e3407a42fc3fcbf2bc9e8af35290588092c31528b3f5d7145442c071421af8e14612e1a7fb5846de3e8a5d28f12829ea69f074a7d8797976cdf92205a037bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507b1fc47922b89938a5c1433f0e5c063
SHA11094439be08f08e78e039d16d9b420c5f804d407
SHA2563e23c4632ae29a8b2839772cb30d71238080f9aa5b52c3c9436bdd8bec5fc665
SHA5127602fe10f744a7720e7382d23cb82e548722ec032f4896ac647e2209c42b766113719d675b9e762cbf18d29699ac5eec4c94b9cf688ac40daefed9a69453581b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba263fe225a04f8ff13ae1612e8dfeba
SHA18a2e9159080d1f924ecbad2af35b9a61944144b7
SHA256d9bcbd9e9071e7665a33439a3d2712e34e441fcb471ce273ff3fdd0befb101a0
SHA51269fee1526c115568230d64a2dade035ed375363e8cf1c839d077a02651a19c9a7ed5267e559105fb213a0941b1adb65db6e49f974b59605bf1d14ca35c8b865a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5441ea8e8624221fde20254045e9ab9c8
SHA10aa29f79403560b344b19c3bc2097b49889d9617
SHA25605078977c489c87de55d5dbee3d533f581bef65c647ab7bfb45341d10713d102
SHA5120522f113f6b27aef79a7529e74e7e6b26a19b1e6d32fc4c73c8bda42031b55aa88a7bb54e23a2cc4eb63b5709fd881eb796e4e9f555a545a56b6293704d36e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556828de96dcf35247b2d7ad38c968ced
SHA13adc72f39a96e89485174e09de1152afe7acb2a3
SHA25691d5769af5630f2a6d716a4209cd71ae35558a0238cc1dec33219a9b953d7fde
SHA512723ff17a77803b65c9c123b0d0218950073e4d1c19ab1cc43eaeaeb1c0d9880a7bb57df08b5de90cc609cea4a44ce763e173f9c121eb8508fa09cfb3d93bd9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5293d8297428a0fb4ea6c3dc02be91b24
SHA10a838fc8216930c959d2fd32aa2b2ef0df1c4e2c
SHA25682178ece38af0e6ac80335031ca090e456f7cd352c2c7a028ba3bf6bdb0a2380
SHA5120f27f4ba3479ea2c31f9b0856a8daf8ed73694def69ab2459bbf813e000f9fefc7e3ce2239c21dbc6cb007b9cd4f8b964fef40a8a2b6cece792a3022967cdbaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b035d38131f1e40768614d2cb05f695a
SHA188917fa0b8ffce69b1cfcae61d1f6853789cc878
SHA2567c9b6e1eaae95dfe8bf1f426f2df9a955d055d85a8068960f6d53f3fe5398216
SHA51281562f2bf3002231d253625ea9ce0778ecdd68dbc22f944febee5d4483320588a29f42f607ca1de54b72bbc9ff148dc63b1e09405fb376a8a94c24e8d50b09ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ed75f0cdd33d652bc9e958274ecbdf1
SHA1792e3ed6146b651e36bf06faed2338f4763b6b93
SHA256c5dd0a8efe50aad96b8837e25633bced922499881982f9df1e56049cc40dd06e
SHA5123d907ebedf0634496ef3a2582dab4d80140dc9784e5575f63318c21136f7f1533ed77589a98a0af32ae199544fa69c31f4aeb36ea77f5949301e68d9e39b5571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e1ddc511a5d5613da4a4b757fa5c9bf
SHA132d3877e497f9ea52305a17a84cefdf5cc925d9b
SHA256d571fe88c6435841fd45f6bd979782e182a163addbd547d127a11873e3fdd125
SHA5126b833bd0d3639fdda81d955768c50a35353bd05c61b044c7bc87a3d2557b1eb8329fec2534fa672a4fc4f64021e7c42b556fc22b91af9050c54e9f0fa50ecf4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5276a064970780fb0bc0b2a39f180cf84
SHA1e6061f29acaa16b5332a7251d66fbd6905e3c30c
SHA2561e32063fff1c77b408086ad4938a57dced091e5b5dbfe83fd2ae9735251bcac8
SHA512baf7e7d5b27df3272f0ef4d9a47f663e4fb30ee997d109aba4436f6028a24cc60ad624db249af20e822a87dd8edd2cfd7f609a2be6d96f931fca9d7b26e1cc6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf698814d14b4473f58edac0a8d56614
SHA101f670ae0dfda59f60dabccefb4dd38e6e2491fa
SHA256ec82d0f9746ab424733ac07e8fd12aad4b00f3dc2d043067b802a65ac6f177f1
SHA512e07d0a930136c161b2bd2fc375736b3dab2d953eb92d2bd724e30b370fc53af0170be43bb630b0e91306f332718ea450bdb7ec5dae66a48f1a8f345cace53612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b0a05ad7aa90a85d0a489b187790c8b
SHA1b25e3016cc5d9b404655b6e3645f7a3371c014c7
SHA2567c935d9cf9ae4e42f5a22c2498e33cfc3983d223308c348ad9d705f97ae49d6c
SHA512dbee1ed840cb5dfd90bd2290b91954d2600a826af6378e1a87bfe46f747926c9413be65c562383ed5a64d9c576cab5cb2e4089fc8a59d35a374cf4aca7f5fed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50135e4fccca403a0b916f650903fe065
SHA155981c474fec9cb840127cf248b4c5577d14166c
SHA25637e3a2dbe8b44389f91e1f69299505ba86116aa8ff8100d8db9e8a53d19c82c2
SHA512c7e4f4689478eb523115db97bf143484f05d3149bed73556a4590551a020ac84bad7df9a2792914b6918d46454e92275fb24bc0eaa573311426eb7e19ce4cf2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ae0b849ac5d02853eb39e54960989bc
SHA134adfaef7d1a79f1732ed0a60ef06a8fd2bb6ca6
SHA25623eb29ced73b5da1d9bfb3b2b1d3016b97cca5962377f7dbea83fbd99a06cba6
SHA5125c768969a55a3cb617f6df94c275d03370311eb6b06814d4cc873fe865175585250235ad947ccd5bb0e8e4f2d5d1b39ec1c8f7f9dfd177aae18760b5e1b93078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594cddf51bdb55a5b83807f23f62caba2
SHA1b9317b26a561499e23a78de0fab9bf2c4e6b0899
SHA256850da21b20824dc70327d4fe86cbf1c86ba3028a51ebc586509aae6c156a51bd
SHA51290677b78ff301bad6d7818fca7346086531d86e65cb83692fc0006d9e9bbd03cd25a97c1679a4d495aa6b44ca02255ccff067f2c8838fe0a04c0abe2363087f9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b