Analysis
-
max time kernel
136s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 21:49
Static task
static1
Behavioral task
behavioral1
Sample
d2e83c82c5e8c2270aa95142b37741ea_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2e83c82c5e8c2270aa95142b37741ea_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2e83c82c5e8c2270aa95142b37741ea_JaffaCakes118.html
-
Size
1KB
-
MD5
d2e83c82c5e8c2270aa95142b37741ea
-
SHA1
5ec078d8b2db7331a6aa19ccffcb571e22c418f1
-
SHA256
815cff6f92b25444f7fc8560647a041e4e721f1d55e3e3f45224c9b9c93a1ec6
-
SHA512
c45cf22f59e1c036812a00dd536f6348cee873950d9cd8e61c82a8252d40236b809157ca45104016a321be7c34f3e5f0997fa3738db563720b3585d81ec8cd69
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000b3d43a31f03703a1b4ebb3cdf3bddefd8b2044748e4f6145ea451c0da474708a000000000e8000000002000020000000fea67ef766a1dcfd0c69b4bbe789a39d949be67ad4898e79cfd6b7ec956f842c900000000018d87b6b61434112699595d918b395e2d62b01aa26e79a158c2f2cb9020533080050c9f7c71ab933517306ded122a500db41467d36b61b11d1d30e2ca3b744911c5c519845678fe749168171a4e3c07f4579a56abcf478ee228fe1651fe4375c1af9fcd17c0b0d470e4bd95dad622ac91801530ea2acccab2d059102bedecb4df19994e0f459b2abe240df07636c33400000000bdc9646da5f92c5da382dc5ef7ef81cd137f129050dcedb62da0f20e05c0bcb7302fef754172f394f9074f16f5ace0e063263a614e7d43e5e40a0da489ea149 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1A6986C1-6D63-11EF-97FC-EA7747D117E6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b062d3ee6f01db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431907658" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000006b941cfcc268f760abe5a6c7ac33812fe865d765214874696beb14e077d32341000000000e8000000002000020000000ab2ee27ecdd787e29bed5b44c9d93b013f73b9c6967dde876df2e00fc0c2c089200000000d66542dbe9456d82818902165e2f62662bfdbd21fdb7767262778653d1946ee4000000099fe0071d906ce52e1e241958975678119937503fe199a65ee09c33e37026016892b16c99b10fac1919675e11df594e4cc173e8dea028d8187950ad804b82f89 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 816 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 816 iexplore.exe 816 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 816 wrote to memory of 2696 816 iexplore.exe 31 PID 816 wrote to memory of 2696 816 iexplore.exe 31 PID 816 wrote to memory of 2696 816 iexplore.exe 31 PID 816 wrote to memory of 2696 816 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2e83c82c5e8c2270aa95142b37741ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:816 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a621602875d26f83272d268f0d3456b7
SHA1e7f58c77811dea69efe4ae7696948ca32c92623c
SHA256dd2dd4015e8441b1c4d024913a5303ea8be02f36b22a27fd6c2f63ec962af4bf
SHA5126ac2f1a0ce50d1ee897eb93ade266525fd5442c52e1c1aeff986377dac15cf773bc975d2bcd5627104ee6205d93a5ef471f99c969362d065d822cb15b36b77fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e49c846a772e4b3a4f423d7f81facae9
SHA1f13ddbf6fbc4996048a88d61a1aba0e4b9abc786
SHA256676c904eeab595f9a5a271f419443a367a82588f5c54fdb74c4bc8074d437c95
SHA5128e011f5e819f6e2c914f1ad98a18d6b352ce27cc6edd83f197e205b1450a32571cbcc420ea8b0f117efaad03e0fbb95d9b7ae2d1dbf135a3830362ba16430049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ffffe34385f47ef288ecd36d8fb60e
SHA1222320845debfc075b065f8e7c81432557eb5d9a
SHA256604efabdacb1442dd9e8f3746fa797f2071e96c0ab66c66d1a98f3db7de2f527
SHA512f7b176c4bf2b5bf8cc37bd9d046bdd4f408817c501c8e44a170d25324475accd01dfbe9b357cc484b7fda501b4a28872cae54931aebeb8276ed1eff62a6dd62c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5484afc85da5ecf89231e242206e7e491
SHA1d4c07bd66e291d3acbd1d08f4d82629d5c211495
SHA256f81586807cfc26cb6822c9acbad6983a52e7a75938f4404002ae477f1ceb9f82
SHA51295d4f310f85e77e6c51c7f2b668c89e827c48f1a1d9a94cdfb35d24711dca561b6fe310bb9fe13c11ab8a10dc6f1b1763ad372d066c2912aa2fd0cfcf1d06567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518c006cd1cb49c55096f469f07fc66c3
SHA1d75d40e4a5531edfc42b5ccf02f840b8a055e583
SHA256040224ddea1409c44ff27607295ff76805872fc33e9709af855e757e0c7018fd
SHA512bf0bfe4dbd1b177753fa333d107a0a0bc039ae6bbaa260f452c83f65740813a55313af39b3dd1ae47c47266c62d89a8f099a887dcdd1b56c3cf1ef9623419754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504fdf5655038da9043f2e076ebaa429e
SHA1750cbdea838f65a451378f7ed248eba8c0bb48f1
SHA256f460eed9f2a44f67f6fbc1be9ee262ab8247bbcedf2291186125a795425b0030
SHA512dc786307e586ea33c60fa28c3eb50c476eb20c9b343f3b31cbf8438b73198804fb1020a4506d5f5fe006e7c58ee52c357b1d657e40043c24128cbf4d0831852c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542372408345145549df332df5bcb59c8
SHA14d96b0d4e1d5b9229a8047c7d9450e5b664751cf
SHA256fab9e11d302cde4e36751aed2e900f85e6bc2209a6904344219b97b67859c011
SHA5129ba094d75b7195a8bad2a7608d0872b973db61930f4f8f6fc16a8ae1fa8ec0cf2d06b502fc714080c722dd0d2fcaa8d6cadfd3a8fe2a5a5906ad574d20e836e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b544a33d94aa7162b381f49e1bc31d
SHA157c96ce79e2f6d2ae494ee0735672fe3a7c2fb33
SHA25648baeaa8a29f15ebfad23193bb6ffe167cb9e98acd4479e5507b77c90fab0826
SHA5120ce182e8a1fb91409c6b2d351873ac79246661771b9f33df94dafeb8a5d0d1ad23030ae0b157e3fbcae11ba135c30eb79d503f5cf698d733854be9e93ad90085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59341abb3f22231c98b0a33a9890b2962
SHA1a5c91b3f95e569aad262b703cee1f56bf21b484f
SHA2565ee8c96bc254fa756cb19e591c37a91c47a7f6c6b3c4d731e947c2c753099306
SHA512aa532dace3469b1db9899981e8662685f1cef37e23c4ebfefbf0dbc27d78f0042c3f0d5527838ffdea7a241b014733c22e4c50f84f19809f46a356beda2a3469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5110d58a14a26dd0e5b81ae60a15299f3
SHA14e5e207cafe8ab9ea519010cde520f55c5087487
SHA256f4208338c86fef94bead375a72ddb76054457718822c2573a896dd9dbc04d9db
SHA512dc0d8240297796b52057c6bb4f51e6501ca6cf8cf2e39a588f5e1064126a671fd619014ac90c8aaf82525255fa393e085e5eccb8b679776b36e18c4f503a157c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aa9d8ee6833d94906ebcdf407925fc7
SHA142dbf91940fd799e9ed2631832fe8c707ba02ce4
SHA256e85c6da417920b766c9680e2d9b9c6a8ca0348df4207f74fde1eb93f49ebfcf2
SHA512486ddc8624a0c0a7aded61a9bced43f0dae090a5036bf62b3e5b3c208fc173492c04391362f3f6d0dd0a02673c521c9b9a81d1abbfc6bc5cc7ead428ac644950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6ad7227856044e212c0057587537571
SHA12c8034f160a59d052b34aa0e848e138b2bd553bb
SHA25657ff5bd4d6d236ae3b0ec49aae5d334b2d81171a54f05753c74a7f47e85d015e
SHA51255553968757a3076692c39812681fb7c0eba6cd089f85f9db73db595808a560ed2e93ae456ed16b400394b6411d5a49eed852a6cda394bec91253ffc496493c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7fa63c6802ffa6b7c6e9b480b70a0a2
SHA195b4dbc4ce7938da17b528d82722e36a5862feb8
SHA256685b157cc3b3d4434c025b0ec4fbb0fe2e6ef204999b9b6f3053777c61aa13a1
SHA5126904520fe2f13f490c203702ddff32fcb93eabd3f03c245286ce561e2b6462b7af1f33c1bb81f75224ca94f81812fd0a48fb68c71eee218452bfb04ed9f5bd1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c5cfe227e1901d13b737dd41fe2fe46
SHA1953a7032d046571ff25318eebbf79bc3e4979ae0
SHA256d472fba3834c8c298ebe2449e9b1a450fe4787c1c03ab1187b64494c3ec9e522
SHA51203fd162b84bfbd1752c71d86b1783ab89c9ebe760b451d9a5b87277bf333133b20caed1ce7091ad77d3a4bb41da3e696e870ad70ebbe5a5cc7016f2a26e072c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8bc6db35079dcc3e0187403fa4b9d65
SHA1f8819dd146f2d6f9aeb833d26c992aa1e48d4e4c
SHA256387290aaf52ca8d5e6f99cac0323b4431897a0adca76fa286b4a32285f3ed333
SHA512cc7834a5160ba8249bc15325c024eb036bd2557fe0e47c1944211bfb3fd692cac8b8b66b65120b19606f402a9b5da21976f6ed0c589d27e2052ff1c27c8ad040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528bbae7cba658dd390c49ba700ca0339
SHA10fa3eb218421fba9fe5d80cb32307cf267026869
SHA256ea04815afd51f645454f216172153fad051905f5c85365ee4e419725fd7b8052
SHA512f3ca20236f1889238b1662431e4094fa377eb3401650ab5f5dea9486f0bae7648251038588baa9f3c4f6081d3a34e32263be3eb049d8925f1a5d914d667832ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c56e3afc69674044234bf39c78836aa6
SHA15f4b91d316884a963a8d54006fb01163760faa3e
SHA256b5ab4fc12afa27030e2ee4402121b97be9bcd54c53ff8be111f585281e55e4a8
SHA512eab34b798d465fc87d36b2af0df4279db1be72b39c9d04d74653ea0d3422d06a20e2765bf846065cf367049620e3c13f064c5050b5fdcf0d817c26891f1704eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dea3ec1a24ba0d46ebd2193a79d85be6
SHA17ce6cff2e5b3c4bd9db0c3f856f9a60f4f71bc34
SHA256e9f1f7f21c9c722b363a9e5a834f6f6692ecc1fd1fb78592f5f0b5a5a0473126
SHA51237862df455d5c6f0e06e6f84d50ee8d4b769eca4d9d3bb8de52b5de8244a40ef37eb02de9a14dcc0d484b4dfc092626365c1c505a1589492b15da49f076d5444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572190b64420762fd7f7ada957104c948
SHA12c9db8865c32fca547c37262eab1f99118e256a2
SHA256562d9e98fc3b6c91f20fbc57ab7cb9f86c68fe1737c50772684b2e6cbb067426
SHA5122d979360cbf64f4861591310239def2845ab36d7496119779f3c18fd94bf413547f6c4f5852424486d64b866bc2171ba3a6d930fa92ce0af611abeff86c9c1ea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b