Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:53
Static task
static1
Behavioral task
behavioral1
Sample
eab4b3502e5c385afcc5c717f51d5c94_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eab4b3502e5c385afcc5c717f51d5c94_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab4b3502e5c385afcc5c717f51d5c94_JaffaCakes118.html
-
Size
3KB
-
MD5
eab4b3502e5c385afcc5c717f51d5c94
-
SHA1
66c5b0ee4fb4e48896afc2c8d2fdb800634a3c72
-
SHA256
c4ab4fd7f43515e456201caad35df4af0cd7c27b65f13e4e7e70be5e9a94028e
-
SHA512
caee4886d343c51d4af07bf654b5a563020c6a0b5ea70811a5f3d318af20bf0af3e2519518ea7ab4abb0a846d0958f01e5406a4c98a01a29b2b8da12f18e8012
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887059" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40dd1349580adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000009d8b7830927b50630dc2e55f19a316b77c70da30e00d88ebaabc4efc9b237580000000000e8000000002000020000000762b49cf06e71162d41c6d631aea4ba30bd4eab9e3cdbf3e70152dc02d5ef35190000000ba330aef34a4dee6f812eb7c52bbbc8b9ca952196a145fc593b61099bf0e8d1da4058df0c1f62d6c842d2b30d396279ef2721464f3ee0896111c6a70aa8741dbb18980f6de83e38b10d0671080b0f5899d9db290638f696cc5b881fa4e160129d47746c095e66dafc9338dcb7da88c4addd59329e4f84d2b3305a1409a7b9fd0d741d7f53e746a8cbf4752f3eacb0ee040000000a6f32f99df35503df3f2da718f4c272da3531a873a8c3892f6def9839724557db1471506a95732f99cc695f757f6edae54c42880bf9d8016c30363acf9fe4eb6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000361f049c74c717204247f30923c8c8a2c0eeac280b7faefaf49e40f769835f36000000000e8000000002000020000000683ec000721edbf055dbc90e24c452cda531ffb83ab65fad77c9cfaf4ca3c0ec2000000016b317a13f18481530b359bf83e5ae17bcea95782b9eca17373da4bd8b9533a74000000049edd1844b495e18ef868528759624485dc44607d52691d5f5f903401adcc874668f443f49d631cfff5731d706f36d6e650d8fb78920233c982eee8939fb7ba0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{749C3DE1-764B-11EF-9DBD-525C7857EE89} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2884 1760 iexplore.exe 30 PID 1760 wrote to memory of 2884 1760 iexplore.exe 30 PID 1760 wrote to memory of 2884 1760 iexplore.exe 30 PID 1760 wrote to memory of 2884 1760 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab4b3502e5c385afcc5c717f51d5c94_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce0867141ffe719b300890977d7be1d0
SHA15eac1472e8d8aadbd757d4301787a4a82dea93a0
SHA2564b8837ed0f015eb5d8e17bb9ed20cb394306039bb3d4c9a83f470c3d589a56db
SHA51287e26573b86fc9ef27079b65f14fe6b832466b99a46812de07bc409ca8210601b70c5cf9ff86e838a0b3e2e0773c62394b6f75fc289e230ff77591201ba0b3ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5017d60dc87824784b8f64fd0450b726d
SHA15169a2dab84bb2ed26f5b7fad2a6eb2832b14614
SHA256c69a4cfe6212d4d4291a7967487e179118c9637473b55f51af214075b131a5d4
SHA51251fbb48bd2c3de3a822d15adb8ec6a668d3b67d1d0eb6e24d5a273ad4ed8257a6930f69f72af599d200adcd0c6c680a82fd289e15323dbf996d8aeb552c69402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a433642f92b12498fc9c802ac4293058
SHA1954f922f4d9ea0c450e85802179a90a0829fcfe8
SHA2561ad5425b6e8f16749218d96adcf79f4a403060b1113cb1c5f86d982a755c2771
SHA512a40e1fcd87d7246dae98afc4ab9fcd5ce72df9cc331759a6b1d020a1216b324b764e9206b06cdd049ae61666e85e4f355d33859058f4e3395f144a9ec0868bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50836b6c25892e05accd9a8febf06119b
SHA10ecc26201e87998acd7578149bfd5135cceeba3d
SHA256e3a4cdcbb7e3cbe125c325f17913be8f10cff2fe0af118d2ed0eeaccfd760526
SHA5129988991599ab5119a8208daaacf558d41112f3b49cd4903917700eb8986935b97089e3657646b492f6af0ea836f68b00c385a3335ae6287e8a6f4eeaf845ec2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5557f0cb6509d1a05fcbcf0a1bfe34edf
SHA125503588f17c3e34342f8b65671c73d0f0cac19f
SHA25697fc9e4a5be77d31200e68b1521a8bf5c279fc88d2917c853161be951df739df
SHA512e3bf2b38d4b07e5fb0aaf75d2c69642b36e9658cc877918ae4779b3146502f56224843b708f76941f818f3ec3dae975bfebca5145314237ddf4b9afd4d8a0597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b22b0925c0dd93d34c1e410e24b69e59
SHA158228a294585a029a52acc8caefee3f2fe2d270d
SHA25630f010dd4dbe969b794b702e0481617c13f905a61849327790594d95faa5d8a4
SHA512ffafa9bb2dc1ab700a277d44ccd5dee60261726f869f12cc384d8dda69ef6ef1db144999761393bc505261bc6677b33c6daf8ea765d9087d73a56da5d06f3618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a413c70fb211b6a89a74f6fdfce831
SHA149251b0ed74653a94ce85f0eba5377b622c8f4c1
SHA25673507c71b9ccbd14399b10e47a6235cbc82f7387ea31480c0722dd956ff7a819
SHA5128882f85db12b0220f1160b56f5504ac1ef696b5593f00d44478ba9cb1a51d89e6cf41d90fea42425d2d53cab64bbcb8b7be4b22de48ef8460fe2feebacf0833c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eefc643a493abfadf159d70f3b4b849
SHA189e7e739afae0e0e54383f2690d641c53d942021
SHA256d619555a56eaef315ee2cd15113f63cd46ae57692e7cf52807b4fc2f5125d670
SHA5120f9fdb528c96fa61ef1a969c527d96c707c65dc268ecf383db292be8aa0e1e2287c15a1eae0789f74236715d3ff98531411d654a6df0e5bfb3fd89c4c1309cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e308b6267b8ed08ee6e1a3553ac7c8f
SHA1e807b00cf1c6de84a9b36d4d7be50a3774c7ce7e
SHA256114a5beafda81b16374f8d16c56da73d7e99b84608b0719c990fa6a3484f5b2c
SHA51216b2b29c6e3e35ef3c869a1af1e1a5767f030d957594b73bba557b00238c7ecb0a4a1c12d95d2770130b9fa31a89410553a6d2c89130c8a6d1d71a6af2fa861e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0876bba5ad82131d5117a91a3c13b75
SHA13ee825f86999e87ba516fabd410c63f832e4f829
SHA25677dee9a7acfb7f0158367d2cba434269ee6fe9f978dd180cc502c4090e0bb188
SHA512a9e5559e58aeeed7b774aafcd870508faab36478fd7141ac165998884476b6e3bf6903499e939e1a9d5a92e889959a9f543d61d8d1be16ca99f9db41c9377aec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dec667791c2592eb01ca321b9192f12f
SHA10e19f6e120938c3ca156e324fb586eaeddbbb695
SHA2564c6b5004144ba42284b03b27392f4cf78a016ba84ae312da2998683114b33def
SHA512f9c1db86cd24e5b1eb0d053f9e36a2e11308c9a8816b7e92f92d575d28ec1206e0b0528998c241a0e8dab4f11e8c956b5250b0d8056ba96fdc305f982b5af160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5116904b580c0105198ce01704b126ee2
SHA1bee0e4e5ee18fdd0fd9d02aea764ff14fec8cccd
SHA256d59b5221e6c9f1ce13e5244ffaacdae0d8fbcd8f3e7deee3293f93bd3bfec908
SHA5126f4159876619d1287d6d9c7461ec7ef9ae060b7d27706940a2986fb40a45044c49b2e4eb5278b9813bb69fdcebe0086621ab607a3b273700e194b939306145c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8a619657b58ed5cb780b0baf62ff8dc
SHA1c0fcc8a9e93594f8bba8d5e9416fbe7ee61e47db
SHA2560d829999e3f62b2f84fe6ca5df0f37504badbc1d2faa62e1572575929a331fd3
SHA512d019741016fba03851198c242e1193e979d545fedfa3713f14fd5205e6d36a10fb7c4605a9ca1a084e7b226189a2dcc967d1eba43da0f5757e18f2e1f54b4af2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dc6b59588633302255db67a6706ae36
SHA1eaa50c810aceb667b28667012ccf9d7fab7c9340
SHA2566d1a290a6fcd3479d398f5259d0720ec1a14fb4d64fe4980268820f309440e00
SHA5129eae050c4e3af2494e6276a2912fadf3a74b6411d882a348f27d995b0cd53561d7e53ed68d82073c1cdab5577df39a5e484563ae12279f3a21ab4a71d0f65749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5123cde3622a827bc070cf04a936d1ce2
SHA1e5a004c2eac4bf5fdcf3a9d515cb64ba8e8eae47
SHA256d795303e37b51e3d0e7cc6662e456d7f1a76c5fbfdc480fe6253b63df5bb62a1
SHA5122a8fbb9a85975a5f5c207d00e0c327d3e30b193316dc6794de1f2afa7f900d64c6aa66a561549fc7a08394eac1fb1d6390eba09861faa52d4b040b9e281618ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505b32d2afc3fc8d2f6b61711c879aa54
SHA1196d7d36429128de7e268fd0579237e3ee946f30
SHA256429fc06e60ad892ba9ef857a87d4363ce854f5aec9be2f7181cc5c93e4442b06
SHA5120a121600f9e7f0b64772b44ffcc4e5fdcc5ef1768d1d758884f36b605f7c78769e32a6d25a19f5a05ebd88cb3f95dc9ac3a775a9101d3566c4a4e37ac75d5a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3be5f0a5582fcf4d138863064a38f5b
SHA1ca9588564d5c64a63744d52fef101aee47bc61a6
SHA25649348496970b7589f481b9b3df1efb967e6d67864d4e554c83b9ce62a441f5fc
SHA5125389e670b5e02d25502135a9e19794443faa6babfb7a260af0f336d6144336bc1c19f0d1cf202f62532c63296bad5292eb9c1bb6768c8b0d15f8e76b0fcf7d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f4ec59746eae58274c6ebbb7c29878e
SHA13de43ca94cbf374b8f7cb399774fe0f0b92bf2ef
SHA2562d30c7390670d57b102bfc9fbb26da3af5d548e73c5cebd47d65ca0e616c799f
SHA512aab1794c65bb2c568b034de06985bd71639300b5a83408be884ba324ce5783250c53375a24bd94009f3f881dc65b355a5158d0548a800ca6c9a39df2c17c46bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56240f601de0b6fabc0ef295464e1528b
SHA10b14a58236100917e9b98ec2064e464632c4a12a
SHA2568f45af971b29ec144b81426313f91fe406dc9c92f9e5e217ba9cf4f45bd379a4
SHA512c662a41dbb6813b7326247f553f1d67215b19297d12aafec41178874ae0d4010cc2cd6e3ec09dfa1524b8519a66acfbeeb29840ef2c06216d0b0a68b4a0c3c8f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b