Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
a3d68e22afbe4fdb7969771339f3256f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3d68e22afbe4fdb7969771339f3256f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a3d68e22afbe4fdb7969771339f3256f_JaffaCakes118.html
-
Size
460KB
-
MD5
a3d68e22afbe4fdb7969771339f3256f
-
SHA1
b7efb88430d373ff43a44a47d41a167eb27d3186
-
SHA256
1495c9f95eaf3fb4aeb0b6e22ae6be307f9d89702d7ea92fcd06dc71d2ac9be5
-
SHA512
5991fe652305578f2c269c5431bf2aae1048f34560c52eaea2d1ef29760aa75b1496edc4eb694c72a9ce53c20616d5baaa72a53aabac063ae10d7d6a0f8be358
-
SSDEEP
6144:SosMYod+X3oI+YxsMYod+X3oI+YkLsMYod+X3oI+YLsMYod+X3oI+YQ:H5d+X3/5d+X365d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6FE39641-293E-11EF-9F86-7EEA931DE775} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805584484bbdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424415229" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000056189268c1a6b749b229bf9cf9b678be0000000002000000000010660000000100002000000075a51153bc20681efe9f61746d65fcceeac71d105c4f2fdff5e82484c8435850000000000e800000000200002000000050a020172c7914d89e7a7d15724befea0c2ebf260d28003948c5c08f5a9589912000000097ee9c1f0cebc6d4c768c2504185156e77740aefe436fa3db56c3399da5f24224000000027c4e7726a1b48f497716963bfca45c69bb7a544ed4b1af1c17c06ee1c954df8a075acc0627e23d4c134cec6a42dff0b5399f73d20c4ed4e74e83f9e75d3ba79 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 3036 2168 iexplore.exe 28 PID 2168 wrote to memory of 3036 2168 iexplore.exe 28 PID 2168 wrote to memory of 3036 2168 iexplore.exe 28 PID 2168 wrote to memory of 3036 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3d68e22afbe4fdb7969771339f3256f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5976025b102161dd498e768e53c4aae37
SHA103e0cf3d3b317295637443fc69e9703f05d165f0
SHA25675c2f335943f3d6dda9ec85d1d0c50073a774e08018632e52151d2031cb83f89
SHA512df0ad282757288af13cddcd635cdbde66cd1fcb25f42c6ebe403cc32ab516c52b299c4bf6dfa37c1ffa722534553a48b1fbac6495556db1f332534c6431beb27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e43621705563b3cd95195df1592e4b6
SHA16046b74d815b8aca5c968735f15d494c693ee521
SHA2561fe3f6dabadcf1b70abf36a1258371cccaf482d00087d642fcacbbfd5ac1eb81
SHA5120470cb458334d40b9ba45f11ed84b0c0ee4bf93f134fe6c4bc0fedd56a5688b4fbe1a1aef53742f729d5ed578c313aa091ab69096ebdabd07dc6d7a9ea0531a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be602d8ddb41a7a9579b54288d106d6
SHA1d73160f08f0dc064c1b24d01d9ca75780dc75fbe
SHA256d77139657efa6065334dc2a13c82b0adca5f39a257e6c6a4908d90520063d737
SHA51264f4b5c7554d20853877a5a7ed95b18e23def8eea24eb5e8ca374a00a445c91f77415d8d1eabc904c492ffdd4eadb8dd93948ecfb5e05795fcee85b1ba54e58e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f7ea792500eac34357b3327305d850b
SHA15b23bb2b33e615bd9707e03bf5d2accc909907dc
SHA256444aa0d0a2c8b362e384b13e65b1b726fd32f848570c47b4e263549b4a07f31f
SHA512c0793a3468a0ccd38aa09aed31cce7ed5a2a39c25e8d4587b7fc89305e6e34f7f5b9a5fe68ff1b19f51636325ff95ce717ed63761c284c9d56734ada35f7ba16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549da75d00c5789dd1940a851d7dc4f83
SHA1a0483482277e69efe97d0b4b00fe2fc9c474b1b2
SHA256de0f1a8be0288b90388a5d4743ba8515f378fbdb56fb458c0d11e5cf6897a956
SHA512aa59f18621464bc0eadf972ac58e88793e35906222cf784f6474828a389477d36423f0d9cbb8fcc90e54caef694a6dd21d0926fb5a971cdeb47636a1521f37f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d0ffd1169162c7ec06817e8150c796
SHA1ca82f86c77681008aee263b836c5266f1a11f82a
SHA256826b44075a611618deb2184b37af12d80d0f5e345d362fa13c244d2a159ce4cd
SHA5124ffe9edb2431bf0ea5e5cad0726ee71a4f88834916395e102f9b47ee7622f76b9377fc109c6f396a1ab60f971d52148e026458063f5fee220cda1bae7f5976d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bfb7fcec10fe38b707eb0703f7d6499
SHA1cb810120a22a9957a7887020561897da5cf05792
SHA256b6a3f96d0a0564385d565c972548cce70d0669ebbc6cfcfae13f43d90f3da669
SHA512154bbef0339d6a4a09db05747b048e78ae6eba25a88019ac3bb8ddecd957ff24ee2adb06a8b916ba27e62da43fea2417f8559dec561a3e0aedf3c3697d73f711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdfd72a146f4744901c8c669fed47820
SHA1798510a7f744d75303a64672925522f64eaa6da6
SHA256b57d9e1b5e76bcee04704666e3ad87d14eb1c81db4093bc0a726509652a291b4
SHA512081e24a011002ca2430ca8e871d28d5a82aa28b59aa1f68c1429bd193c95069471eedd8ce0517d4ff57d9f3fed3f9d66118c6bbb295c3fe6fd141d716423e41d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c78ba5d271b21850285f259501e1b1bc
SHA1123da94cc7c776df7debe0611c804eec128c90a0
SHA2562416e91e90ccdef08e939df28367cbb5a0ac749d5de23f45d68c5c032b5ca663
SHA51271e2ca588e2e50d7b7b3dd192e24a01345404cecb390c469e7438256af0730f51caf13b5af43609a0684028ae76041503d6ffbe3ee69eedf77ee9f34ead42df4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5412886b38ab4e7268a67b327f44fd775
SHA1959498ff7a7f50f1d68666dfa02d47070a98e713
SHA256103e20943bede84033a9483fc942d49db59a80e5d8d4222a6efa484ffe9ae15a
SHA5125cf8b4f6824f34605bb425c64f35fe3b6df75f80a14da12bb0bd10222039a8631c5de2c59356d0c01aeeb136ce8d73aec0365de6e706d3d3fcd01ed1d089e468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b354e3de063336b225ae0581ecef0c5a
SHA108cf3b6ed6049c676b680547628d294ef9a89bfd
SHA256eff98e1b350e1060a72401a4d698ba601be4137ee1e4d188ffae3df919df780e
SHA5126357b0d8957523bedabf449c2bfd2c3885afd0cdf43b10ccf43f078744f3e2612e044e45d93618233cd9423b28e0000375d9f5897572a45e7252a1881b1910a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7f7d190a1d0802e42ab789bdd86bab8
SHA19b3c06b747dd07ff86ba60c5723008b74a33c7b6
SHA256fe93de8d1d67e1af166b7ee677fb390532069b03fbdf40bf002f706b2112066d
SHA51209bd91fe2e7aad1f034ad1734c7c5908ff82cfdfc68cb831871438e8b8de92e541d0535e667278b64be21ae3ca649e2a19b2afa4092aeaa7ef909f61f1801004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55544206a45369b65e5649dfca6bbf54a
SHA125be96ea00ed830928c41dd73bd1330d97efe1e6
SHA2561473673e5619b427f5d5004b11b89f88d2b48582392e3cd761e56f3802e37402
SHA5121eaf1e3c5b462801cd75527e77ca81066cf86faadadb19a1a4eb8186fb16fbe7497897b40a06b0aa0e9a2645cc8b485a4865deba7baf632b8deea94a41b262e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d3c00ef9bc9719b53dc7c6d5df3d955
SHA1f19867c923cc08fce2bbe8c169e5b2253de1385f
SHA2568850528aff8aa3d20d566bc21e3e1dff568fa1ae61882b06dd25bd2e484f1d89
SHA5127d0ecc2274d5c2a838c79d91f33c02eef49ee3ad7406d5fa93e61c14ee74de488338f989a2f9bb5874742a3eae46da7374dfda1a3c99638a84d993c004bd888d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f96103ed73ebe8eaa0caddd67b18fb63
SHA1483f74ba6ce7c12e219626a13a9d833e028ee4d2
SHA256dccc128bb580d96e5fa0a67c1483487e4236fad6182ad31ca48610c4ada66719
SHA512f2b139f7500e756c6e73d070b4154fcf24339d5c74d4f6a6c1e4bf1d55f80ec8a49458577d02ac4542d739b3169d1d706087697ace599461e7c38620d91baa0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e81564860952d0267b2dbfea5d11b92
SHA19f3ee6f8ad822298b9175675dec7a800f6e0ced6
SHA256882a192f5eec3651f6fda46d374c44b2351decb1aeca1ec60e15baf66d007b50
SHA512d57ca41b50d4dcfec997640eecdc8bc9f1a9e54d9b1cf4d865c60e6f130001ca6783cce96b365f04e215e7514ccd44fc5e845f25478cef2605a8f711348177fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55838a8f36eb0ff9f445f2587a946059e
SHA10605c62d6dea68758fdc1d95164f3b4ab13a4622
SHA256743650778bf0ac54f6e331c9fe602df65e416bea5dedaf04054212ba3eb12186
SHA512d15485721f96eb219db3becabb4d7fa8938a4b3682d61319f0b62118df432e044f8f2e21f33f5dea2c84a2858fcc455904e59138ef0657270846838062e05a12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f119410eeae1e35adbff7992f68f3217
SHA118ea8b18f664884b37815232013293d922896cfa
SHA2564ca51c32a2a596b1c103a8dc096579cff2150040de74c87fcc476879c67ef913
SHA512387c8b306deede78b30211e14698c2b8c25198010d9d6383bfc44f321465140f5a53f68ac94bbb618f6e08b2ba62b5e6c78efa8bdd2b7aa9fdcd2291e08e0328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51af81d253c317d7d5bb789e424a41e5c
SHA1926b74c82085b778a8b4daa756b257d1faef24b5
SHA2563ccb478fc6869c891d716172188bc0eadfbb54cde0278c9897eef2abbdf752bc
SHA512e0e4636568ec7779e065921a91505ebcb04d5210d59b8739f29b5bc4dcc58a15455df574e06256a18c546049d263fc66abb539e99b6109bf601339435d01703a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf2b1eda6b6195b924dab8895f43a43a
SHA144cc7195cfe206ec35ec6188f50ffb62032405fc
SHA2565e7b3635b14562c090ce8406e6897726cfbc3459c85cd12c159362c27cf626af
SHA5128a3cbb150a0ca0a4eba55dddd569c9a52bf5035715b981beb33966678e681e9c6930afe2e938b6bf1532d010c09c24a0f03a97c6e6644a062a409e6e51a5862f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b