Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 03:48
Static task
static1
Behavioral task
behavioral1
Sample
2a455c01b600a5ad51eba12c597a0410_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a455c01b600a5ad51eba12c597a0410_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2a455c01b600a5ad51eba12c597a0410_JaffaCakes118.html
-
Size
1KB
-
MD5
2a455c01b600a5ad51eba12c597a0410
-
SHA1
9788e1a9d7c88e029e26bc4c0549e1953d896b7b
-
SHA256
0d6d58ddb55db7beb5f8bfbfd16e419c1d84410c78217b25b43490c30e7099ae
-
SHA512
85a931fd42bfa249bba4cea918f6dda17ae5e3c3698dfa6f44db225e80ec4fa8b1bace6f6e6cdf7b9de03d37bb82995dccd141896c1dc9c76bf79b1f243ee4db
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000003a7ef527ac42280625c3f78d7eb037f3ff5964b0679617420bfc2dcef23ab4b9000000000e80000000020000200000009ab6d3d4d3ebf8c8e8d954425f53cfa7920a8e93d270f192ab136419eec0e70f900000005afa98d8a96013310978f6a14e741a990ca5633b3c734e794f57dff2c22a75a329e9d1e00c60eb6a046bc936645c8ef657f0ca1ac8181cac62f4789213fbd7f8138e54fe88f28c54a7b26d5dbace6fd5163549dadf18b383092ebece562fbfcfdebd5460cd01cbd24e6180939768c840da9f525e39fa42f4ef170c5c4ce8fe77d8e2d68b5ccd9bdb7a73e7bbb1c6c3be400000007e10b3f489f9ee9bc73cb844443b7b099f74f41aa86fbe858e284242dbdfbed94c4e52d63a4be248872dc339543dc9e2b18537a12c50eff01763e307a72d7d2a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000b78297afac62177fab48ebd73a9bf3fbd5949b4d3bcf9a2c184d4970c349c4a2000000000e8000000002000020000000dc4fbd6da9f7a2c90fb7624b2767f6062cd5bdcd3b3a43b271220656d0942bcf20000000fcde8431c1a15ef2d9047c9a2e109e04cd95201c83ea148efeebc8b16ccd7e5640000000a60a339e3f0237128fb54673dd6aee7057ab7fcd97ba10cfe7b28262f6318a963c9ebfc450f7ad947de703a497d6fd8272435e4ce89daac4622d1fd17f084525 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 903e12e4481adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434639661" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B9A5471-863C-11EF-943D-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2716 2712 iexplore.exe 30 PID 2712 wrote to memory of 2716 2712 iexplore.exe 30 PID 2712 wrote to memory of 2716 2712 iexplore.exe 30 PID 2712 wrote to memory of 2716 2712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a455c01b600a5ad51eba12c597a0410_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b6db15b8b2acfe861d3bab6a0625343
SHA1161dd5aa5ed203bcc0bed5cb9bb14ed891ac1d6a
SHA2568da0ca4b0a48e2b8de7218bd5853998bdcaabb6e276138d19d7dbde3024464c1
SHA5127ebed59331301b77c5a90380b82f304ceb5ad2d522dc5f0b2e56e4500804e523cd547c40e7ff79f90e20b9c7e100f828a5e3dad21478d43b4b5aea9d69f655f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb7d308b80918f079cc27026d16dfd9b
SHA1ef9fa797fa8221ca5118034a6ff2f0893a1c7e05
SHA25625e36f5161ab573e3c26c3b4f19043a2e411daf497da33a211724b50d96ec10e
SHA512a0764bca6dfb56b1bd8ef7650235981eae97a74166e7f1caed87c3c9992b0752567fc8910934b49df1be6f48a37ec8af002f04e9731954c30036f3c8b18e685b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d73fed827d11004a0273b1b4c6be69b
SHA128176a758266b343eca78550240426474ff6e300
SHA256a8d87d3bb6cf2a75e4e9024a9e5b58fb50dd72ec8e29f824688a6b8f2a325e9c
SHA512274deb905b7c1cd92bc09885fec87c17d8d7718e8900f3e1969d1d1c76cdcc7da5725e1054bb48bb6d2db0dd5adca48c494514f88583d8f44fe6bc21450bf0b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571f2206cac109a658e1286c1824a7f82
SHA1f3b12891459f9765a73e1554b0f66c112c3de482
SHA2569a95829d3633a88b4c56c35d3f1e1e228744148e13d73726ca9995b269829eb5
SHA5128ccb8bd3e3a0852874363c2b9b02775ed95a4e28b1d1c9db6953efd9301818dba4eabfbee2e4e9adb3802dec873367f7afaa780891ffd39b00bec567706bdf7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5009fc4e6f68558c62c5a7c748b9268
SHA1f427e312364a756c3557bd4d683b06b3c956b189
SHA25670ece90933314017622b2238ad99131d68dc7c77c21e6949eff67508cbc28d5a
SHA5128ce83bf13e55e9607e527240c275759ac109b3229932753a7a9a2e3391089a5a1c825324861c9c8fd97bbda2197af16c727f0fb6186a7202078d026398b9b7d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9e080e1b379dc4d721087d3f84a889f
SHA144736048f2d87822746d07db071ae628e44691bd
SHA25601494d6d6d1100a4110d15252fd6d57a74d7fdef98b2139646cda5538944d3c8
SHA512878f696d78652d7c148a776ccb665862b3ae890bd698a62a6743476fda2bed9a49005dac90760f0dcb328b69e27ae38360bdbcf3f31b5df48b190ed66db89d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd4eff7354bb8e6c1c92b0f284be2b2
SHA1908d551b3ae001ed169356956245368ce0ccbdc3
SHA256594956ff843d378813c9ebb51dc557a1afc9f2f5b7d952a230dc31ec83434929
SHA5123e091a99912e075816fa9f280cc328320b0408c759099fd4e272b3a2cbdcbcbdab11957eb651421a50811b8614235a2955ed3a06e1a2c5b773bddf7c0a008ca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b8c97822737bd431ad22ff002a12458
SHA194e1ed24b9f17b3ac9a07933c8f8923bc185652e
SHA256ae2ca430da75cf73716855dcc6ea57601c0f6fdcb4b7ed595c562f848ae25a08
SHA512a88b9eab32afbee6f4dedce74785007cd87ea611b0b61a218fbf8508a0d53360f1fea3913814aec0b0ba96bcf8ba729d83cfb3bbdd11229b6082260c01938a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e4e6a2d12b73b49abe95820e4bd3321
SHA14f66815f4777f20c2e1d4311cb560bfc6fece3ab
SHA25676bdddd79d8aa67ff0d4175cc2a98b2346b9adf7e19e8ed63bd6e90015f7f6a6
SHA51243af925f6d433f083d2c108d3c3fbb23f46db7ad24a9d17eb6179de58994945f70ff6126f758672d460ecfcc450aac1603c4064d0bcd71297e04ae085e0e1b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58087b2c489f72d573612c66474da9487
SHA1a57d8016824ab44c688bd71e5ea0d49e357fa2f2
SHA25665e2558cd6537b7d220bfcfefb2111f8a77b6e3d415885380b97a6a2f1989fe6
SHA5124a6007d4a96a204e8c358fe68100274b8f5eea56ae0314b67c5ae5fa79670e7cb16bd66ad3a365b7b5cc39540f75c664ef6085e6329cb0dcea205465142f6f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551937596423f446247b9fb1d046e32f0
SHA107d0638e2aa5e1888b695989031e84ab7c857fc7
SHA25601c1471feaf23068b09d22c54b938404df99a29f8dd9d10289404af7c8c9b1f4
SHA512616d69d1608674a8efba0de01d828f7e7099c28ba2489729951316e1c97b10d67f2a36c12fc06b285800b8d58d44cc6f000fbdd756c401b0e8dd798e4be66d1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e750c141630c08e2f0db325207d89b75
SHA1092eb9f01af76a63cc7d640b881af285123867de
SHA256698442969ea7be65786e7394b7af85d38826901d22414433fbee2193bc2508b1
SHA5124407cb1f942c748867dab8e5c551d9a63a8020dea2c20795fc75dfd56614bc17f3ee23b70ea2239697e0a3f8221f875394a7b2750ff500f3b59bf0734ceb9e32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d609f9d51e82665339651a69db2cbad
SHA1120940f86934a9f08b1e31301b5b3cc9b1ec3cd4
SHA256f9bf2979311eaceea2175aa4b0e85c449d7034914a92dfae3cfeb7b4ccf33c59
SHA512b77f80090905c243271df481250e44aa624726d504b205c22748b47a2763b1fb73c1987cc0eb8490a1ec3472dcb6f7e572b8ac1613c04bf403c5deaaf9ada20c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad46b9529dc45daf9514c143585bc182
SHA1303ffbf37e6bf95f7b8194db51f6eff0037b1c6e
SHA2567e4dd59b27631e214dd3ff5415087e8497de24e51bdfce9b59f078f2c3532a12
SHA512cc8a143a284f85bf5df8b4553765940f460b2cd4ce4d9b460bec91c211c1c38d9c9b0b20e7197045bd9f0b54834490beb19ff427e094d1fbae730ef5e75752ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d7c8dc5bac6f67f2d99515b85716d53
SHA1f8239cb73cb3a3028e92626eb9fbe29e6a5bd49f
SHA2565fd8ba5cec8e222e06e6149332db527cf226cc3acf622da8501283dc06fc6625
SHA512e45276c318750cc6336c1507c552e4d123da8753e4d36e0aa689f560c10ee40279f94b8233e28ab978a165b955c6406ef83ed6a0e45364abaaf7e6414cb26cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ff1b8aaeb4178a59af17606bc109407
SHA134ce20bcddb930800fe57f03f2bc1c9dcd8262aa
SHA2562519879b42636ab66a062b67ef9900d7bae0d467aac8091e8345bf4e3a1cb013
SHA512fb0ff91a20df5ccd5ce6ef73e8235608dc323182f081d4d6e4f7dfdc5cc83bd803c271af9429f377a8a433742495c2a1058c8c40c000175ba2e26a5d6b17a49f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555a501d53e2c66750a14c020b7979602
SHA18160cb065f7e125a3d1b061ebd6e9516c0e6f3b6
SHA25639cc6e9754348001d35b370676cb02ae231f68842571bd4d38f2e4fa976dfdd8
SHA5125c85cc6de6587d26e50df010eb4ab6014d79c0610297b7e631c09b066100368c41ca46fc1734a17477afe45618f8a161a0fc4fa676811ffda6c3284121ae0731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535589e0e529448f6c97d0c0c013e97e0
SHA16f68a52ac312a916b78a384afc8d68087dd496a6
SHA2563d9c2e91f5a5d0e5eeba47776fd6ee06574b02db76894ad96c0bf8a93da29108
SHA512d999a96f8ef768c8a06798ff0fac089f5f293f4283cfd1644b96ace26735eff6fdb832723a98cd797a9d8ec0c8a192d10245978a6442d6aa942d7a068dbee3fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd6dde43d86670879f4e747cd26df1d
SHA121933b2c4c601a7a64139f9df7936b25290dddd7
SHA256ca802808efef5c7092c2cd4d5b252135749925446014ffadc71af4f97f55ebff
SHA51265a221e5c751387481654922cd3f2f42478f26871c92dd1a20d1321a51ccf87704b954d5fb4c6e695ff668db87cac351430e9489d858a08c0510b57662308873
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b