Analysis
-
max time kernel
136s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-29_90696e99b00d40198eb584eb495cbb30_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-29_90696e99b00d40198eb584eb495cbb30_mafia.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-29_90696e99b00d40198eb584eb495cbb30_mafia.exe
-
Size
319KB
-
MD5
90696e99b00d40198eb584eb495cbb30
-
SHA1
1d79135ea89e9bcfd270fb1080f7088964707469
-
SHA256
8969fa12070f36f7dddc6f2abca0df056c76b24776fc8bc773779df7cdfa1234
-
SHA512
eabf6d8ad25307819eea2922b58009fe25efc2951a3ec1ab684f4ffce3e607ff3ff12cea7baf236628511788c0d5abe57a670fb12830af13793011d3b5be7ca2
-
SSDEEP
6144:JrwMKNS04IDKVqBMEkem+Vv0nQSDWicCfy3B+YZg76lkRP:KtN10quOpv0nhDcCfyuGlG
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423133376" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00308ef7a2b1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3F8AAC1-1D95-11EF-BD10-4A4F109F65B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008550bd145ae71d438f38f0c1ea4c784a0000000002000000000010660000000100002000000089308ee3f6ee9f3b186bde9f8a8582df91e24149e9c4ec2a85a54d4fb67d92ea000000000e8000000002000020000000607eeff5aa0c69685b6a87ff236e7fbd0ffede6819fa3adb2c6d0d89f19263c12000000081fa4d7775e277ae08f8503175519bdb8ccb859dc58f3a1b2c45a6cdd1eb77d540000000f3a69504a07fa5fb661b1de346d72991e107ab61541e28b1a246f1ca868ec7c816fa0ede29c59edcd0f7f595d4fcef99396e9a1cc2012b4fbcdb95a0bc972e12 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2088 2084 2024-05-29_90696e99b00d40198eb584eb495cbb30_mafia.exe 28 PID 2084 wrote to memory of 2088 2084 2024-05-29_90696e99b00d40198eb584eb495cbb30_mafia.exe 28 PID 2084 wrote to memory of 2088 2084 2024-05-29_90696e99b00d40198eb584eb495cbb30_mafia.exe 28 PID 2084 wrote to memory of 2088 2084 2024-05-29_90696e99b00d40198eb584eb495cbb30_mafia.exe 28 PID 2088 wrote to memory of 2532 2088 iexplore.exe 29 PID 2088 wrote to memory of 2532 2088 iexplore.exe 29 PID 2088 wrote to memory of 2532 2088 iexplore.exe 29 PID 2088 wrote to memory of 2532 2088 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-29_90696e99b00d40198eb584eb495cbb30_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-29_90696e99b00d40198eb584eb495cbb30_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://skjp.zcjczj.cn/sgdh.html?s=&v=57&c=75&a=95&m=&t=16095526212⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce2d528cd9936ff185bc26a883e34b00
SHA1a361828132b2b59a93802882aa3adfcb99b882e0
SHA25631031ff3c93ec6128bfc8b412d338f9d1ae03a20f7d47306f3b0a2d1fb4bcae2
SHA512d1f0603dcef7502fa7e3fe1d2e6eef07c6263b14085e86e9e413d0d8dda83993801cc7f5dd033fdde4ab85800085d978878301f5ae5c69ac401644112b07713e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fe28a3332d80efe8c57dbeee8b5eac2
SHA166e8a4461a6844757235a2848d34bf0573d9683f
SHA2562f5ab035adbbd28c8ec17f891f298ee4d322a82394dcee3f60cf3d40917285a4
SHA512f0257f79cf49cb850d03a78edb10a90c7ce952bec7d9d01bfd3475dda6d9fa13a1538a387b237cf3850afbac38089adea9e25844d91060b187ebadf633a2bee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf841b7ce035cc645cbe69049a37ad0c
SHA17051d745fcf2519eba1b6c7b97cd108fbb45748c
SHA256e817739ee522653c1404953829c94cad2fa1758225a2265817235cd2ec6320ef
SHA512043781d41a88edbf2c9fa8fc42cdc1e8b39a64c1eb9df3eeb2be101671b73e3cea2de26c0367ff22a21580722394d233408b980c491b4bed5f387d1479538890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e08478c5ff496db64e16655b9a0c729
SHA124cd038e2a253af816cc4cec71dae2740c4a47d7
SHA2562b532466b5d730718d6220e56122d9d30e7dfe040122123b1a5eae9d0627d1b2
SHA51255ed3f7d013fc9ecf348d2aafe2828f3f8e021277b5d5994499bc82e346e3cf855cc39a57c04c722b14c72cc73699ab6a231c9b6d576b4a23c4c2ecb11a04edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a0e95292a25889af570adb1c14aff62
SHA1f9b1542cd01c6e454ccc557fe8dc0174efe84657
SHA256eba907993ecb047e8bf8c2c16febc935319f5283b1887552d62fc657a77f22a0
SHA51278023803edcce57c134785fd49258d9267b163558163341bf7e72f6f9b82d3ae69fe72caa2dc93287234701f8c3e79ec64b03b972cf4e87651b47d636946af6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55db5c189bc5b8116bb7a279aee1ea4fa
SHA1bbbf66331be011b6a6986f3446738966058ef56d
SHA256aa4f2f46d93fc2d8c0ab8648caa7f2fa526dd3a9a58a2d982c9a26a7aedfbced
SHA512bef4bc034a30f011f96077ca639e136c3998b97e8d2fb83d0d85c36d6280e19466b15be227c81409a19c34e3f1bcd695db819e283a61091fa5e0793cdda9421e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4824780a73ae0177c92a29f4d2082d7
SHA1eeb27069b66748f4062fb095cd0b46cc5d4edc04
SHA2566e3fae5f283c7cf15066f6ea3c3a515bb5959a28493ef15b66e8e8e16714a016
SHA5123c263679a6a8f815a1e4318e5e903d10a4e8fc9b9f90f460ab8a0f03ee26dde72c7f71f848af02e8a2924926c231644372a5ad065dc756c513a633a4f7679a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5318521ed387ccba0fe93704f34a2f798
SHA192048692ec09d22a32ddd36d29ffdf22ae09a134
SHA256905cbbce83fd00e1276bae0746166c04735a5abea44a9ebd6b610db6fc6adbcf
SHA5125737c2bbe5afe26e4b4f1dbbb0d7359b9267b8db6e7d035a5ddf70dec2dfda965dd65664e12e60ca075603f6b1ef7593b051a8bc0aefca7cc14602c695b94136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51586145579701992e8fc5ff7de28aa14
SHA1b40d58fa56b0834ec40e9c3f1ef6a3e7c0b772c1
SHA256a79df1bb8703741beb0bef407734e787d0113c23ac1dcf54b9d8fcb1ec8a1f9b
SHA512de2e468b02382c06522af1530c8be19086de74372a00353ca7f1d4ae2324cc1190da47bf6a92afc3ecda6e5f7ffef18d073e29bc37e38dd6064279ccc43faf49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517aab360e9a8700d9cd842762e01c9ed
SHA15db549456dd48db6c71625bc7a2144bbc5fd03b6
SHA2560f696de994011c0c942348f49fa9149b3d64700bbd378d4b6e8222e4cfab94dd
SHA5122344be1df9384f89142c39d3b9621b9e2e93c2c6439a4176243cb28617a39f96b063095fd2a2ea1d5ab8067ac3b6b6de9562e54759fb7083d766c3076f6c389a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad74caa3a8c714849ba4ebac6482b1ba
SHA1444dd11380fdbcc381872bb3e4d1230b79008155
SHA2560e5f5eafb5f6ae0993c3c8bb4a3600c5610a3c1d7bcf7a087499eb846c73c979
SHA512af1a06cb14a366587e69bd0d8ed2a26fb88abad32f2bed36f083b22844a5252e83345197a20ea11d81069f2f541cc69e85a6383e11eec1268808ba8f01731499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c8494bf2380a7468e064601c0f17e74
SHA1ad7d63ef03eb7762bba0c6e1eb17978329ca539e
SHA256f06a9afc4456b96593460c4c7752443a667c315ccbde171ea5139555e8ceaaac
SHA5124ae9b1a00ebc3e949c55427f68205566fb101991cb29473b7103e7d0182838f48d4849e3ebcf1313ab4c806224cd8b213866c064ea094fa9cc4ce248b6ee5bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b372684451cbaf1232745a1229e8456
SHA190a484932e16407d9a341453184472271d55cf86
SHA2560374b1626a79e3fed9777193d80be25f5f0755698336f0c06f1f53a85aaa2bcd
SHA512ff2fb430815cbfa5d75f844ba1d6da06f92473058b6ee0a2143f66bb1713f39b2920feb5f245e8cb5cf592c6dbd013c68dca9f4ea90e7e52adb4cb61b2b60a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fc6df886c244e913bee785b80498844
SHA12664b094bc1768af98fc61a4f98216e8ac90bd75
SHA2563d0bfaa6da4e96a21290220195972947ac895ccb0fd29900d57dcbd6ff09962a
SHA512a256af78ccbf49a3ea02c49f313b28edc63bc066cc667a333072a9490c7cf8f62348a8f4d59a9af8eff09fdacc5a6b851c7950bca3b3c9d4abefe940415aaf99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a8ddb35c50752cb070771486291944
SHA163a2353a59a06908d42222c2bfbccb3abbda376e
SHA256ec13d5bd824ff2bfc4ff7c634c11cbefe2209786102620c2413cd72fcf65e8ef
SHA5122656b00d3c4186eb05ddbfd602d03bf09ca564e4ee54f36db4039dae3862fb4cba17fe3ee3f6b4b2b4b09f2a5dcd46a481314779c4d06184c3a3d0874f4ace59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551bee6ee2cdebf9a2f47106702ae46c6
SHA13a652042b2c41068d4fd4296f3a258e62a7c959e
SHA2561679972b4eff8d7bc0a3b446c460b5f0a7986e3d96a598a3ddd1478667d028c9
SHA5121191a9ca243cba04f57c4fad45072544d7d2a44ebe5a3b4e1086c38a6d53d2da48952dcf6b371d7794bece449fff1d88017380b920e7defab1ecfd1eec0cf9a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590bd41aa781ecce0bca257d8296d048e
SHA10750ba9a9f3b220ebb02383dde92fc105521318c
SHA2565f7b73d10772673e40f8b158a20c34e8637b872d06de4c53db0ea4d89172fce6
SHA5126c44d7a39b9495392efe2385888b391a6d54efbc8dbd4ab37cba4577fa674456e8a7a3848d15933184fb081954a147cf24c0a6926568fdb34b477d38335dafed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598b33341e435fc08bf847153409e6809
SHA153487e0e2bf36f62f31e0cd9cf968f814c9860d1
SHA2569b2d7c1cae1cfdb8e2b574b124a856d0c8e1b74b209e5eca2be2df6ccf5915ef
SHA512cea25627980114117d439c3e11c265fbb6651e8feec9a3b4f4246da28d281c4b8aa13a3e92905a9467252eec1bb0065ea1284c1ee0d4397ce22d464eb7f22b75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ab55e57dafdb7e8cfa31bc017a644e
SHA16ca8e3b0b5f6777832642b69aa05d37d2754cf80
SHA2566169a4251c2f5dd5b248df96436ecc28eed42df3b591dcd9d4fa1071f24668c9
SHA512a08eee9720d3752193d96646244640fcf60889d95674ed332c605b48cf18ddb0af24726a4249198e2e0c751d340e29ae032c8327f9e5061fc54e3ad715ddca87
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b