Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
378cbde8aed6369094c7ff6ed7210cb2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
378cbde8aed6369094c7ff6ed7210cb2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
378cbde8aed6369094c7ff6ed7210cb2_JaffaCakes118.html
-
Size
138KB
-
MD5
378cbde8aed6369094c7ff6ed7210cb2
-
SHA1
daaebe0de1581c75051ae3ea72f48eee1ff98481
-
SHA256
86612d4318d4b0b69b5d5b90a55a2428355b41a58b471559545c5961c037fc3c
-
SHA512
2361487bbefaade8ebb8ac820750a7e40629deca78846faf52d326fc89e46e5deabe7e18a472fb565d0ec5b3a2bdfbb87b658aaf1cb92c68e5c8f1002d3f1e34
-
SSDEEP
1536:SPn6Weseieo1jYLEF7KlpIgyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP06:SPd7QyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{174FDBA1-8830-11EF-9C86-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434854428" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307c662f3d1cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000007f776b0c415f457cb3dfdd24a99cb84ded74ae0d8dca3efc32334f67b689eb6000000000e8000000002000020000000c78d734fbf8648eda0f56cbbd5c64be5975aa6fb4ee79665f6ff8525b6f921cf200000002eb998c986819438664edfb3b03b1e2aa25c4ef6470d4e6cd9f097640428f9d740000000d25a5ccff3aa3b626f11b9bd52d8e961af0a56c8e7317786cfcfc051d05a6b74cc0a732075b20d1321e7805db4901030dad7aed90c440d0ce14481fae516172c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2492 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2492 iexplore.exe 2492 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2564 2492 iexplore.exe 30 PID 2492 wrote to memory of 2564 2492 iexplore.exe 30 PID 2492 wrote to memory of 2564 2492 iexplore.exe 30 PID 2492 wrote to memory of 2564 2492 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\378cbde8aed6369094c7ff6ed7210cb2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a7353e4d74532b3b6823cfb492de18c
SHA1c8d3bccaa0d509dc251ba1d169be107003fdf835
SHA256b4d1166468a72a4b019bf9e50d4c4812ed0ae5fc9a04b4a2e1a5460314549f5a
SHA5126f0f9ddb24570ae1deb56901b9a88658e3cd6857c1b0f688ac4413cce8212001f9445a426d945e80219fbdcf3bace69d0da9e03d2a723668f14cf2fd4212ee62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524f0670c1ad92ae53038ffb64e6efac7
SHA1f0167fce3d82fc19fff04a4fc610deb7d1bb877b
SHA256b529db63df0880c421cf09065917849000220c82ca69e72236d5f288d338d72c
SHA512546a3ae161f88836fa45357200617b1716c9919c85ff4eef2d92b07656a938bee262e884108dfcb24be195a476d871344dd127a2afe3ab83d16b3c7ec6e2b369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52777f28ee71b980d02565fd835a2a223
SHA18ed58db1ffe632db73abd59e9e0cdf739c86a8df
SHA256819830cbe791465e7799d4acdea11d2bf38bb78a7bdf394669ceb8d6b61f5c60
SHA512fe697ec0546dc478dcc56a08261d6648fe6a8857ace9ba7462feb33a53fe30ed640e2cd5a611379868dc2faf7716994bda219687a422f221d8557ac096f73b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552597b47897c129489d0312c99ce5b88
SHA1b28a6719517e6c5dde28faba93cafcf6d2924e06
SHA256083250bf592322923af1ba25c4d78217387d023a19783ef72e29c683003cf36b
SHA51274fd5c2dd5e9d8173e8fd0db1a28d23322cbfaf8ca1b6c46d9789cdd6f4a66176a8f93c0b5b6142f727bbda4709c058f4253992fa9376d8eeded3a3228a3aad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d56cf49616e17790022847ed4f1eac86
SHA12e013f29d4a6f89044c13c66a925840fdd2784c2
SHA2567a909105feb81fb25de1a21c9a9bd5b18482fa41f089b714805e7a8b74ac8c95
SHA512bf5652ec9458b8b93cf39d448b2347b23534c8be49e50240b23e1bd365aeff49792035e7fd7782ae6047c27cbeaddaafa5b10b0684420349382ada7b81cf30d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e49291abd01d177edbe794860008e20
SHA186aaba1af959bdbd0986ab0a387acfc84c2a5c9e
SHA2566ec0f41aa00a498dbb7629db02356f29b116bc4eeafd3fe63a94f354686c6741
SHA512015e364bd105869e384d3101215af70de73c66382032da6210db294f805bd2836ec1c9a9e479184537979206fcd1dd799150c054e8bb39eef08fd73d09dba3d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5687b5fef7b37e07aa19519225165ae80
SHA10cbdc5665a3db150a0d392a96734acac7385f305
SHA256ec4ad630ee076691f5f5b24ebad482864642d70078547dbf47eed397baebb17c
SHA51267b59b078e369bed0628dbee6f5523a02ea9842019ded11dffedada1a5f9a32518c827136af20615a0dbb3e8b411268465beb1802c04a3f600972094f9c602c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6be162ef83f9b4b2dd0965176e739d8
SHA168dcd55943b489be807b5a322713cf006d7f7cec
SHA25605d779d53aae60a086982edc58847307736cd6bab4f359b9ca14b71d2a6ae01f
SHA512ae7b88b03a4b6ec20c342e6dae2d509b0c21bf423c56b34a5f10fc0581e71259f19a2f39ac159a139d2adb8acc30daf7441c0251edf96c61ba34cb2eb1bbab99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b4023c0704223689b0e787b351525d8
SHA1d4022ce23fec12bbd5d7aafd5de0600d899a32f2
SHA2568d4f220a1352903da5b9c90445afb481b50675a2d3a867be0a85e41b16213121
SHA51241d992b688d935fe0cfe415227c82e4d37d3010d4afb2b6836fd13537c0b6fb8e85e694a04f736eac5959747861e020a01cf767435afc98a70d361123a5dc376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d570918e529f719c65dfef63d753c72d
SHA194a9befd2c08a481dc45f2563ea1e87ea8591af0
SHA256ff503c7476ea252b769a33e086e7916fce0f6f77550abad3055a132f270278cb
SHA5120eb991f2863dd2b4548c62128c79b0735943fc6fa46c9e05c868bf3b00da8197d86dde1eae9bdc4060327a38df139a2eeb5ebfb3a8f463f3f692851edf49ee68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ed14fbc37cdcb1ad3ff6b88d4b4dabb
SHA1e50a8f95d010037628ceced8152b272a093669e3
SHA256b7997c9d8844b0039df728f4ca67e54c48de105ebcdff977d7ccc2e74f0de0d7
SHA51242d83ffecde2d5f05f7ea2cb6972532dd8b57a48b193d34509c88a45f39837e014cba4dcd51f40ef60d8dc407bb9143af97c59c5a91ccf58d9c17919bd119514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f480b543fea0ac30248e3208f0a0803e
SHA12b8bc29177c948987b6bf449bbc63677f3576b39
SHA256bf395229ba160f6ea55ebf69ec89b77054f2c06a8508c689c5016c20e0e160d6
SHA512ff4d77ed20887e6120f1e792d1880814f7fac06a2e736d1b930a516e911d3cc244e07d32beff7077de3b3073fd65a973c6cf5682d6ca36019e5cb66396394049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562eaae082ab168e79f7243877ce8414d
SHA1a8e8548423deb3dd260dc1a99aea85653c5e88c2
SHA25601b5a10b193d44f633eee1180109df68f934c654cc19f666c046d361599c1b49
SHA512776d10e8baa595b13f64689aebba90f21da8bf4d94f0e3dcbdaffd461abb338be0b75743593c4bf38f829d97eca8f72a58a6656dc833ab892629ddc595b9cedc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587ffddfa74ee5413dad58ae0bbb53eb2
SHA1495524ed407f294d961179e909d343d35df62679
SHA25604dcca33fd68fbec24bd198d143cec21522de06f5ad74077fd8a958a07d76c8b
SHA5125dddbdfeacac262e2d5fdf11927b39c456138bda55c11b0207c9d46b58bb32c3bc996006b91379a777a7c46a6b6f4450a16a6a87ca4a0fc0bf4967c55fcaa03c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a125d8d69fdf59f00f9618f907045177
SHA14facb794e1057fb90347657fda1ca25b240b7c66
SHA256421a3677dd3d066ec5beefde7e76e39ded3a211457db638fb6b07bc0a24052fd
SHA512d03aabe39f2295976759d0062511d82aa0bc859d9d97415b5db6de1f5b5df6775fcc6e803b8414dc1d3ae28f8b6a0de26bfab7fcb8882c87fab2753b0d9886e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ffd28c7fea8b11d9065b9edc6227ef5
SHA1e6e9e7df622897e39c1431013a81b505d984a128
SHA25620398fec74a5aef7e9fcdf2d7fad19ba81741129228aaba43272c3a990097c0f
SHA51212482bb666d00cd750bd37cde541c26b95c7f30cd4cf6bc2da0f60be02a3fde0eb0449660de7f2a4955a4943890aea36fce38f5e132ff29877feb560cb218556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b90644b95a77223d418bedf927738e2
SHA1af9827260d21d20f3701b634d70b530036c30e1d
SHA25689daeee7f0846dd07a4a38c09b0a12e4f8db9a1c33a1c2751acfa651156826fa
SHA512dd5f0f25fd9a77097fad66168fcf4240256720d52e516b8afb8b7d84c254053319bc67656b7dd0fa0da6bbb38a82866bd9bdc8357795cef6df8a22fc67f1ff87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff57b0cffd8347e43edd3e92710dbb5e
SHA1c2b254063a45a371ed7256acd4df10f31ebf8640
SHA256f85a04a79054002e004e2af1c8d6492f104af4d578a0b1a3b05d493d5e2df2bf
SHA512682705f439c737e79e001f51c9dc06c13024080c60b2a58c244024fa5e4f27e3188042440df35f0cfa1215e2b0be1519a530f06102c976e109e8a61e58f55586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58edbf9ae5d8296b5322569169c8be482
SHA16d3a94a4cf1ea96ad28745c2f22876467cc2a596
SHA256a497495725786cf04283ea6328c082f1dc38a0a4208c06dbe586632e04e7b5f8
SHA512d5eee330c53b1c646dc69e9be5cd7fdeafe605d3d1497eab35815309737d3b39c4ec2269508d01aa1b12f34a563b3c0371cf65674cd272e785c0686d80e8cfe2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b