Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:37
Static task
static1
Behavioral task
behavioral1
Sample
eac61a14002d8a18280bde97d0fe9276_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac61a14002d8a18280bde97d0fe9276_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac61a14002d8a18280bde97d0fe9276_JaffaCakes118.html
-
Size
76KB
-
MD5
eac61a14002d8a18280bde97d0fe9276
-
SHA1
e7fafdbca3d5f2fd351a245eede44d173e4e14b4
-
SHA256
06e77e59485b0e46d65f5406977b3251d8024b6afac2660a485e0848a98be47b
-
SHA512
6b8ef9ba544f07c07057e355a87cf8693626031a75130bff41bcdd0ce582e4ee84d2e15d1c24ca66fe5ab9f4e6557d8dd97c823fb9b530e325ccd3f7f9a5a6aa
-
SSDEEP
768:b5Zp5buhJITE2P+wRn8GuSTo8tlvAw3EEFGRBj3+emfWSCeQqY16MYHfM28VUj:bDp9qJITE2sSTNNAw3EEkRBTPevMtVUj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000ea6a22196606ae032fc12fb0124de9ed9e7829d730e87cfeabd53500663b2d61000000000e80000000020000200000002e00168d86bf6c57ef9c201f597908f26cba90ac1cc3537ec99e56a95f74532220000000d9aeb6c56ab01497b963b074272471a999199f5fd65f19d91b673efe8ec207f74000000057e4762d2ba46e01e575963772b9be420d50569d795dc826e1b0406b494546fd03151e3e1d344022f220bac5e1908e5998e5bf0b866436c4f1459056f3438435 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889737" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0D25E61-7651-11EF-8CD4-527E38F5B48B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50cc71865e0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2720 2336 iexplore.exe 30 PID 2336 wrote to memory of 2720 2336 iexplore.exe 30 PID 2336 wrote to memory of 2720 2336 iexplore.exe 30 PID 2336 wrote to memory of 2720 2336 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac61a14002d8a18280bde97d0fe9276_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d50e442d9bf1edc6de7b8a7dde5ca4
SHA18283cc6acafa3d6f891d4804172631f8a770219b
SHA256b94baa078870e9d2a3d945f74486d168cb7b9c8637b93e96e3571356befc8c21
SHA512b78b343d8fb0604c148707f0b443280011323d0805015ac3768309819f9e8bb000855ce46ba813bdad22d2e133cd53bbdce34651004fe2a187106f71b04c1201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ed9fa635087ca95c6987473dce4fe34
SHA1cad695f0a504eab3eb0efb37f91739900040463c
SHA25682e110dd251b7e04e6bb33f818758a62a39e177af96ca519e22b06ecb8fe46c1
SHA51207c92c2d5d04ad5760f9e4d292a825d736ce151bdb26fb33e4020cb343e08ec5a275e58c15f4436170e23b3ede7e5392214bca1d01e47b0643ae0eb27ccec185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4005464352371aea039a3f5e37b1b45
SHA188def26e76b6c849eabbf48d320bf9867188c781
SHA256652091d1bbc554c3ab782fa0cf11add022bc95c976826d517b4a930172498ae2
SHA512d7c3221afc8d031737bfb892ff7ccff82b68e043195fc2c309325860c1c66f1a93be6ac3a08908ed4affb8763337fb9ea62220ccb7e64e2b429eeaafdf0d0bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5676f08966f6b1011cc46cef29fab431b
SHA1c6c9c135d11bf75a4264886a0fb909aaeb8e6cf2
SHA256e91555e1e91417ef61ef2d2c53293b3056ae1d9ded9c21fe4d8dfaf1e8112ae9
SHA5123297085ae4dfcfafd6b6ac874524432f515ab63f22de4ea100abca8f5c4bfff779dd2bd1e771a77b6cac4a7e937f8896fa071cf9e8394849fc959282b51640db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d664902080fb189194bcfae9799d2b3
SHA133cd158a198bf5532ac3677ba154cfb995ad77d1
SHA2562b55a8f644c85d5860e30b9b87dad64be6609e281b625d8bc92eaab1c56c6aa3
SHA512f4ce4b4b4baff6c9ed33515b841c86af1c468bed42fa1495680c61ec793866870f03d0795d3249496203483157bd6e2b1fe44c245d105a01ddbb66df8eb02e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c676921ee5962a6ebce5703589d08e4
SHA1df6b9fdb1daf493c5fa275ebadb3b5b5ac33a764
SHA256ceac230272dd5429fd7bbbeafe83160711717ec92bf21d9bcb72597b50f5ce11
SHA512fe87d81c4c5f6c28babbcba778e1b3a17b9e8bee6b73e66c0abaa0793694a4de5b37f14a95ccf9bd1eb50b627060930f9b16c071ab65711534c5566923f48713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520d73204483eb9e3937588da816ec2c2
SHA15eaa06a5cee518c0529e05ef6cd6def757717799
SHA25687cb96f362138959f68ec2d1fb1259a4a9d5c720d00a9f37d4e56c32de8bfc77
SHA512038d1a51d637cf8fdf66a2b88ccd6999b83c3a8666204d240936df1bd6069dec262929e44aee545e6272e8f5308fffa92ec2c3b606c51ea3ba57be398c1cdd8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b70ebb2158e57a6733b999958e684260
SHA14a1edfb5a89dc26bed6b1bf23995e3fa7fe9a1cb
SHA2562f9d7c60c69c4f36b197e773d23e210aebe15518f141e3bd3513b71d01a8cf63
SHA51273be64d8335867b5a1aac99a0d776647f25d5e52515069a9ea865546c98c9b36338d03e49de69bc41b589a8dcb40865bf5457f4f99ffa234ca6793c9ef12255a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1a34f068afec4cc4fae70177e3a6130
SHA16b2e1653643067b7bd80839dca8563714c97ebe4
SHA256b7d7cc2ad3e6f6b766b5147fe3eef0a0e51428ba2ca5b886786abeff828c19f6
SHA5122368e92820f03b80bb3a8f41f9ddb5865ce7044406893c09f409f4f511d146036c8916df895f7592456784a84689e0c14ee2f6eecc6d0a1800e15b8a8989d106
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559df8aa4f28ba6b453fba27a63c52069
SHA19ece8be81be10ef5907e819a90e52c516eea0a71
SHA2563a60bed203ad1fe365cd925d1c1aabfa085ef160f4786231d32f328b8c983298
SHA512cf560b8997b2e4d69a1ec053df95e4a081faf7bed49fc58d5bbd660e3b93835526a42b607e862c664447d60df23882fa5267913e3e338282af98aa1f51f9b2e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8da5621804b74d5ddc4e5c90df6a725
SHA1a1135bf2faec16d7fd35ef128d9905428e9b6ab5
SHA25610d046e960a5f22342eefbbba2f759c715dda2be23f8336300f858bde8c8562a
SHA512945f951563d6d5a6641dd6d2b8ea5b057f7c4faec8c94085e81eefef250a074af5276c3829705ff3df41e414d773328e4cd6e19eb9c6b6e151d2c7e61b8c76bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e70489ce56372a4fc94151d7b0a4363c
SHA1ec69cb6ac4000ac0b0ab3885fa2996eeb21af8eb
SHA25622dbed5939eb95fe931934a271236ff53408fc4ad1f1ed73bfb64d7f04dc8acc
SHA51295ccd3c82c79706db3cfc8f2d7a0c9c88acc32fa2495709365c5fdb7b65124ad46f302d920a5fd0acd0267579d8c93d4bfa3d142109419cbf5264c799deac89a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56364c33b438d9345d2286c3156e0458c
SHA1ae9f999d477510f80bb32031142fdcf7fbd99fb3
SHA25621f4bba25d5345a6b2fc83b1d812893c8411a90993c3a65055c6aec383b717a6
SHA512d9a22d01ee297afb50774f784e6db68b3a22d901eab1440d907907ac656f532aec92d15c8bb7c4189eace37b0f5d8161a1118e02252c945a5fc33f1bb87d2ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d3ede1e2ee944a77e3bad8f1cd9f31b
SHA1732ad2d4fd38c515e1ce7706223500756772aeae
SHA2569114b1bf4f4c5f50410d2d22e25e2e362a5c1cd7635c361c276b7df9a4425405
SHA5123cbd63c81465d4735bd3a913175f89f4bc86847342f4b1361c7c653446b70028afcd7ba79396edeceabe2e2b1c66122b0b5ee186eb590b937516d23b7963f634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f61fd74d607e56204758d564262a5542
SHA1da5eb0d76fa8439caa98bd2a35f38a2278e1e9e0
SHA2567b351e1131da543c23b3e5d686ab89859bfd5ee37b3583f94127ae4b1549afa7
SHA512e75782037557facb15bdf19a727e2d09638d7314d2a8a4051352a1af5bdb1ec3281fc1b2cd4d4533daa26c4b9f75d8c753bd8d11df41ccf0d3365e3d333059e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fe4cefb8bbaed079e098d48e53c2e3d
SHA1f3c0b8f58e177622187c8a60f3c1350ae8c0963a
SHA256780849e3c75464b60434114aacd9932b59dccb95e7cced33540968f14771fb46
SHA5122f9a95b244486ef22603095170f9b38398c2da3a8988222ae4e0606927f9d10d74821862a5edacbe1e408b4e1a5d7bba086dcebc07068b3d009add4ca0b18240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c5b3d2c8371adfc9a740ab0c697869d
SHA1744732225355ac50e1412befc6dec148e1428f71
SHA256053e7ad901299efc8c49f47353d6417e234ee58c2839440a8344414e6512b7df
SHA512b52e9a34eb27e4107f0294a431913f4f9e64b9025f4c9245b8b0a34b16587031f8da3bd8cabaab6397d3dad5084b1cbc30e934ecf67a9a3022ec6f52cf668959
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ee4c86191bfcec1bface1b9de918b7b
SHA19d102fb0374966240a7719a1bf18e371ebc71c7e
SHA25638243a1c9c679ba5691e80f704fea7c7d8afd87e0c11dee9bf99e823acfbbfd2
SHA51278730f2ab5ef38a3ef33a146fb4c5a96a7c6f87cb4bdbc01ddfb91b08fb13e784e63ff39ecb480e52f3947bb2ec2da6d0bfafa9d089c4d7454de27f1152510a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e319b34adbe9d037cdf560b63fed6a83
SHA16d045b45c6fda20be869562d4e9ef9a37821d2c7
SHA2561fa1d73b21d12ddde6218658ace21a3216fd0371db5cb8cdbaab13fe3099cebe
SHA5124b9626e39d00d39bc3eeace9d5db89cb7ba25502fadd3c75d31e8670449563702624827b3b25c85e2170c3c999fab942ff6ab2a7922028e532f3ae9c521296c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb2614ef2764a6f0f37e44f8d95cdbdb
SHA1a74780632998cb52c627d8ea246c1fa6b47382e0
SHA25674afc7ef06b2ab68fd7b28af9dfffaf0ced5144108ab56ff14f67063ff8c14c6
SHA51267dabbf54a6f3eafc242c7857eb000fb286f4b4a4006800250b3c53dc2bf58a445a00ae7019f7abe1692e0a71179de7db2a4430a90160501aa5755997ed58577
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b