Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 05:58
Static task
static1
Behavioral task
behavioral1
Sample
55d5e033177b84525e29ff542909f371_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55d5e033177b84525e29ff542909f371_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
55d5e033177b84525e29ff542909f371_JaffaCakes118.html
-
Size
10KB
-
MD5
55d5e033177b84525e29ff542909f371
-
SHA1
63ea6ff549f9be18a81c51ae9fc130306fdcf025
-
SHA256
63e4507c48bd4470788bd63a2994c4a978b668ed08381679a0b45688bee99f8a
-
SHA512
eac0828a70a1e39a9463125edfd295b84780923b519ea6031e0ae76fd83966f051cd64017e0626ed1efe4ba3e2a295fd660501da0341668bea3fffe8d693e0bf
-
SSDEEP
192:csz7aBfAYS/FqBJ0IaRX9/cZ1JxV0PHb76f:chBfAY8FqScoHS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0dd8de02221db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000007f94828a744c892bc260ea9385ed21553a18ac038799699382be5191b167a743000000000e80000000020000200000003ab3392f499d9554a84ebcdd5306389a4abe416e5bd43eeb37d9ba905c281e2b900000007bc61a708419dd0b45b088bdb76401fb6f3400380d8f592e766c6df3d0e7bfbf0e18ebf6c1ce102fe01c5f79e4eded9cff921c0e700b6233f4455984db035dce6ebec072deaf1b44a874d56293a2efaca82aeeb9db8fbe6ca937815ef42b994e3087479d62961352bc266eca67277281514e8889c925262daaf027f89af1b39852dee54c22178de37e5ffd5a83f912d340000000bec8d91b11e1abb333b92f92247910f1193839d14355790d4f2c3acd071d171cd3898d28b0a229230b52b3d47db7c10b5ceaa6daf2793e63a1e66a9b3b01d23b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B87D941-8D16-11EF-848B-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435392997" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000007fa75fa453d066ba5adf682dc18a751edc933d7ed8e2269a8986e734c74897ab000000000e80000000020000200000008a6b9b7463700b15c16b76eed403c8b09dde0c6238c6dc214863858b65eefe73200000002dd64c7ef78abe7f015572d4ddf44c264a4ba7beaa894cdc60bb8241db60662c400000006399d12560ff879d389c2deab8a18b9893aa59ebad801ebd40bdad3567e81c392401e1b750239df4d3ed608a2d63809e2daf19a463a54a83f023f4d502805f5b iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2948 2300 iexplore.exe 30 PID 2300 wrote to memory of 2948 2300 iexplore.exe 30 PID 2300 wrote to memory of 2948 2300 iexplore.exe 30 PID 2300 wrote to memory of 2948 2300 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\55d5e033177b84525e29ff542909f371_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5249921c98e295eb85920defb5169d698
SHA12f76eeff31f87fe1e9c6c51e0cafeb3f8770a1c2
SHA256222ca7dbe077c175ae331ab7cd69bd03081cda7e393f1b660f371d02c3351f5f
SHA512e9e0794578823e5c8f8f5810e33e9877d73e786837f348b01a03d1adc4015bf1feedce3e423126c4da58956964cc6a485a7bb1aeaa93b2b822c0b13933504d89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d1787fb44c62b5c578dce3877f709b7
SHA1e2a5debc0a052f91385731c6197fb6600134e768
SHA256c5effac4afdbe9eba22e4b5cf51a7e10d6df30bff5f3ff5ae6d291e579caf4a6
SHA5127e3d78a1ad04ba3e1e96d416187cbf6758ab77431ff869afb997ade7d17f868af149749b6b5c4c4d8defa9558036d1df8c90a91cc7e060beb080716e9e6105de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec284374d55c648bbab4e4897b173e8e
SHA12e5399e3874ee8a4439982ae7c144edf1a8be3ae
SHA25663c9c978a00a6f2344eb245b011b961f6ff193dfdc0c307b85f94b1d6423266d
SHA51236187bca01767b2ec9771c08b123a782fd0a93fc28a01afcffbfc933d154abd59f4226e96ce928151841dcef9cb44f68e22edbb940db9d433cb2dd7426a9804c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8cc7d0fb27e95f282e3c8e1da85ccac
SHA10c7122815f510a0ac3ad09fded843e62f9b41d47
SHA2560e4bd05c917f18332d13022dfd14fd2e77fba81cf4e953e819473983c4130a2a
SHA5128e4b2aa50d277dc151d59e2d17ca300123b5238fdfa33f69811883c21ca5a8241ad575502ecf554833d1c41badea886aed74478b972030012c966261acbda39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562ee14c6de93c92e20cc84106e48fb80
SHA10c0261820f10dcbd6c7e7872c45ae33c3d92f38a
SHA256ae7888d83846ebd65d8c81a9eeb47735a31fb7c0905d9aec8b70fac2507c9d97
SHA512b97c937ddce632c684dd2965397119bef2151b9568e805686242ec0fab6acecfaa8705d4f49151c709af3f0db357a31227bc91c8b31e2aba63b2ce776bebf50f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f23e459453054098fe3a479e59dd08d
SHA1a6136a54712d6f746cb55a8bb4f416c3186b6d87
SHA2569ec02b61541b9e652bfc8aca43902f7b2119bdb8a7114532d7a7f32e474c3fb5
SHA51291bbf939b261f9ed44de73ffdc4cedd6093e3742cc8fa50c57b1d482de9f2f7114fd53e949441487f2ccb96adc6c80738a9c6c48bed0e0f619f1f29fd3eb7aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ea101a582a2f8844b40850d0f1c833
SHA107879caf80e18b5e3a2ff0561aaaad5a212a14d3
SHA2563ff3812e53e2040379f2fb221a7cf9e404b5c5c9abc7b0b30bb4d7d59ff6befb
SHA5125f45d0b60814d92d7903840720bd6cc596519693cb3b9da5f3a5a9fe228313ec42dc3826578351b98a9927c3c1ba7744be6015a22d0939f7a11ef6dc11dae412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa92ffb6ba40b3413be8b448cee5b42c
SHA185cbfe36ff2d97533d7858fb54bff95eb4e2e9c1
SHA256700c9be0545d3b6a310bd28763c7d3d0fc4a308f1c049347a492d8786ac5c265
SHA5121df04d99a848df0e1b38bf0bdb16f27009968bac8a3dc2119cda4083dbdcedf6c4cbb419469fc652ff23e4657608b29f5e7239bea949f8d092c46d781f42120c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54230a3150014a8dca6c7b1d605f9a542
SHA19c81f33e213e30cc938f1a2d7df3ca100f5ed72c
SHA2560891f288b51620d7183a89d17ba6ad494c71d63b0d16ed8edaaf11ac6efe6ca1
SHA512de1ded0c87f31758c97067153881631fd6f9cf9be3a72fe98862e975aaf61714fab7eb5c2dc3cbfab540b42ceda8495cc0cd2a4e9d3aa1e5fd46054965f1ecf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57955f93c38716d20e68f9607b994eee7
SHA1eb2bd0525c5bcbdd50a23b0acc8e45e4736af47c
SHA256a01a450bfbb6d56cdbd465d84ea4f78200256b3cd1aac163f9be08461f11903f
SHA512dba8a99b746be0f88a2a60d39d50816784f5b3ab5ec28ce17b0e0147253e681911302a118a84856e41051fe909bff9bcf0a2b1132c34f5be479b6370112c0edc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c93edb6470e4e5e007b78a405d15d489
SHA1d384522a73e1f06ed773ce2e5dc69654d5196312
SHA2564b3c78e600d0370ae9b3b7e0831d2dcb030807d6d8f4884e7460572256faad0f
SHA512ed2abe6dc562e3090b18bdcdb60ad1f53fde2c777bbcce1e8b535c5b151f70d1d73b42a71ee19a57a8863b71e9b814f5d07c44bd4507155919141bf752027c3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d46551f1620c3558f562c7e19ef56f2
SHA152241d4139d859f698ffddd721d54c683fad17a3
SHA25628a5521981d69e0995a4c5a04beab13a105c4fae04b482921dc0bbc563f5bb57
SHA5126e04b0d7fe0094bb6e6f69143a30a41b21d44104c1e503fecf0322eaff8bae417bccc06a2d27a0a8e9486becec251071e324cefcdeac03182e8c7177f3cd19fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5960b9422030623a4339292b73d54e252
SHA1fa4d047324fe008f28e4f7a772f396966f02362b
SHA2563f40d831c34249279e2b7a3761c98c0690e4d576b4acb6b0d31b5ea206feaafe
SHA512c637a88f8003a770b7a2549660baa10965679247f7adf44ace723509d7864bcaba816b7d119df0e3a1112580382ed482a350bc0b35056a59dd2f16bc7c1faf3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d02f0c33b4d06d7792dfa5d66f330255
SHA1d740602af1f7a0c8b44757e56800ea15dd587b77
SHA2564d6f088da79955383081edc9f868df9bfefe1e2eab48e5878772a6edb7ec6d43
SHA512155d46bf88b2935539160fdac3f5bdf20a45d8e98980427d94d978a6c1246e4c0ecd39ec19174af1c6509e4c8bb2057841ad85df05888bbfbf0a2180d90d07ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580eb5abfe481845c21cdd2d10130ab60
SHA1dea5da250874f06039e4809374ff78c584664268
SHA25643c5b5bc1527b356d3359080ef5db86414b9199bf188ab159ec90d3afef34a48
SHA5121dd613be1c6f326d1daf99ec662829c0bbf2bceed66e4aa2b7ae1cb131d8c13cadc30a03d812d3c76544a6301ce0014271d7d011f781bc5657bbf7032aa6609d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e7b950e5722590ef1c2b4fd1b4f6465
SHA11e0944c5aa8fe5af75a2823a40dcb3b66416cbbd
SHA256c8910b0efe131a0d34dca41872c3e9f7acf2722bc71a1cb5c437b464fc8e83de
SHA51298211519893a6776321115bbb8b227842120ea1510bcd8992b0eabcf527390742ed6660d0cf0e3bdc98807a611a0589049970b4361401f3644315889f939a470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c56dd4b80871ea1c2ec763929414a07e
SHA1c2ad4b410967468316c0aad5856b396763bf194b
SHA25623653ca208fd56cf417bb0b6f00bab2dc89f54bdb80cd706fa26e54b7d2c24a1
SHA51295edb54ec98dc3d48d3d0e1d0a4391151a41561625aecbf77ee8f82a42bf640a1ebe958bcdf9af0ae9a4059ad84bb878f9559f979c153896d4ca75016c363806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b59014e18ae56b8a7ecc2fa46b0d898
SHA18145414b3f680b5f70c81ddcc0b308d1718a29bd
SHA256ae08326e572a5f48c6a2ff572260705222e036d2bf942824414c5a178f8ebe17
SHA5126faedf4bf3b0296ff88e36df303d421abbc4ce165411b3658b5c5f1b6045c0623ee1efabda37103cef96bcfa4344e4162516ce2f796ff856c6d2cf5f2f99bfab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5525516be90dde970f50c2bf3a82584
SHA16b2637a0e28f979a6d566934e014626a9b6c2b4e
SHA25694fa1cca6cbe67cbadd08cca85427ba44c85917fa9c215eaede2037be11ba01c
SHA51266cae8504711b6527aee5d354e4a7783327c05ee05e33f143a2da46c0825064303ba3575ab4405374b46afd3f6943f8d27de6ea4679ae4bd26c328e236f21d30
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b