Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 15:18
Static task
static1
Behavioral task
behavioral1
Sample
812d151982363c6d0c4170fa9bbf05b6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
812d151982363c6d0c4170fa9bbf05b6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
812d151982363c6d0c4170fa9bbf05b6_JaffaCakes118.html
-
Size
4KB
-
MD5
812d151982363c6d0c4170fa9bbf05b6
-
SHA1
36a446174bb5e1297d8fb7e814e4964424e8cc6b
-
SHA256
71b8e6ce6e3fa3ac8a8e6661a181780fcf255c942fa1042453e406d1999c8d6a
-
SHA512
29330685209087edb1506f3ded7982001c2851f09698612e5dda6d8225a097dfc83ff67e3fc495cc31116ffb6d4e3fed22699b06b23614a8dcdf7c9821b0721f
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ovtJld:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD0
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000006048037676b143175a31006f11ef60ed4cdf5b263783ebe7fca01241a174e793000000000e80000000020000200000009ffdcd0b07eb9762e5721bd4a2963e2737d90bfeb2c67eaec12620cbc9d21d8b20000000ca31c55935f58853194e9b7a0faa868a7bea4f0dafcb5fd09a7f00e12b21fdf940000000038edf843984498193a22950fbb0dd56478a601a8895794e1f40f42b28af694a6916144f3edc43be170427278b63c52099a1298eb84304cec635fdf4da2f9ba9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6080a97fdbb1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB218581-1DCE-11EF-AB84-52AF0AAB4D51} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423157774" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2604 2020 iexplore.exe 28 PID 2020 wrote to memory of 2604 2020 iexplore.exe 28 PID 2020 wrote to memory of 2604 2020 iexplore.exe 28 PID 2020 wrote to memory of 2604 2020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\812d151982363c6d0c4170fa9bbf05b6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514fec6909ef32b66bbb4f099fab92d4d
SHA1e437a6a9ab40350c405becbc900441053f417a3b
SHA256e7aa3ac3c38ec0a4f98b453b9d29d8df55ac1a8a55be4482ab3c2513f8c9b341
SHA5127ba978a7c9560f8065c20c7ecb4333227d54510d72f5548ba76872168dc590c4051610928bbae42b89d2ffdbe3e15190ec3caeaa55391db4d72032dcb250299b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5136752096c05c128610d99f98726bafe
SHA1150ffca5967c7674c0f807d858a25faa86658ec7
SHA256f9535ed44f0df49aec8d2c5cfed242d5fe2d82bc73b07f104270df662456d2fa
SHA512ffd4c9d66dd95c83a00bdc6507f04f9e6dedc0f1f31be373538d1ab4c5694c3be2b981539f2789edf1ea8bf1483693c6d029b1d93faef9d26588d53ded8d53a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bac7409422fc450a794c18e4271a4604
SHA1b0c7cc745491607e2e2b8048922001afb32ba23b
SHA256815059e0d37fcf1fc6c5172dbe4d60fcfb058dac73bee739b30a18e408477820
SHA5123432cc3fac4f6db2e280254861cc9fe3ac213f82ad53cd8421ef2a3fe17c2670d4f743a10971febddbdae5c2ae294b2827fe9736f7a40f675d2822785b8c5a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597001f95255e9770f1bc450bce4c093d
SHA17f1855d08e68398db2c8c1efbd760c10894375e8
SHA25603bb7ad4e71f20a7edd93e6c7d1c099017d209cfdd7712359867baaffaf11c16
SHA512e3f9786cc91cdafc7337c6300f96ca32743e32a0b80f72d26ac473884844377b3a0c5e86ee8baa75cd86f3ea537a9d03ae719d1ae566e8f7f4b061a9fbafcfdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b82938ba3757fa225df25e6b134f2bf
SHA1e808ee9c7ea82cb0e6957a9fef4855b3509aee5d
SHA256bb857ee92ec70cbe243383ff849f505b8584fcb7561136fc382ad9d8a1f6845e
SHA512bf544d8d51c5e007785e432091382c10ce050a994cb675cd7484d6f15accc206964c1f49127d707358b6596ab833fa83e907d3b7e5c2491647c0536cce355522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56450225347a9de27d5eb08e0d071c5d4
SHA1b7de3e8e695e0bd228fb02034740603b19b41961
SHA2562216c43abf4fa3d4bb0c59020f423e2f854a3a5c79ecbbc1f5d5d8bfeb7560d8
SHA512ff7bb7bc5d61b4544055fc6d61d2e92f251934033860505cb728771ca3172649e50b844957d15e60b176e21d6e96ffd0ba1d759b9dcca46f213e32a3fe433657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b242d26a778b8729fac8e60f27a58692
SHA1a90616c1f5e3b0816213b2169b3e3e53317ce9b6
SHA256cbc43b8b5ae2542c9879e777b54bfabaf402908cf58a4497bb5eb3e01fee9188
SHA512ade41b0ca633cb7af566d0d09c149f585a5afc15d0f21a35e8204765664032f73fa1d4387b4fae5ad757a9d4cf40e9373004f479af77ace685069027370189b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a742d07792d95496f79e903895d196d9
SHA13664e017d750506568b2d91d0a2f2e9d89d828e9
SHA2561d5bca33a2dcd1ef64af38f11dabdf598f8d654fa78153cbcf6245ebcee02112
SHA512957b1f59a81e43a66228abb3f29281f27a5820189dff8d644f2f0b82a71b4f32611a8191cf85df7216b2eafb1263be085cb25aac381864ff1168c6b2ce757275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58db8ddfb7c83e30464a6c0cb8593d8e3
SHA13c315342b9c083a4e57f52d1ef206de6220d6651
SHA25628904418ec0080a6b48bbd2f662cfd14586dff6083a2671faaca6b96684b7138
SHA5123dd87201af25ca37fded0551ac639d7b3d87204124e378a6ca884d69507bee346a44d94b36defaca0485d43c76137aa5150f0162ccef6fbf09a561fcce0d8159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57484261d6e41bac4ba870131e598feae
SHA167f10538881dfa6ace54b42f7ed72a27d9410de9
SHA256179fada1e421ec778076d1c326762d207a461291fd7f9436574006d04c9f2df0
SHA512707a3f3f01811bdff4936a3de745f7b4342144bff00c77552c31021a17ebcc4ffc353412004bceb3abc8954f906eef161f319a010bc362165851f344b0026a34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c38dd7f7c428ffb36cbfc4320b08137b
SHA1fb5412cdb176b71279f5ff6d0d41d5e55206fea1
SHA2562c02b1b265b4d1771c2846915987aa6843f382d4e4c3f1b0cf3e32b4ff67bc56
SHA5120d6d26b0df7b50bdd15c38876f2f536a2fcafdc1b8685cfd0709cf9083b8d4304d8bca6d2e7d3a2069d99f85401cb106588ff5a2a90a5cdf3d00aff938599381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5370575292b35dbabf9383ff39f01b7d2
SHA1a5d4cfe571d8ee4383959f67af354d3a761be952
SHA2567fa890ef32282e593e53c9092107fb15866085b8dffd0a3a162876e67d468829
SHA5126595a807aa01cbe2755c7535d60897f6c6595314b00376c698299f8e4d680cf50dc2c79b581e60da9bfebde951571a1b7e4bef6a279d68b9933b1e3e90e1892f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0c0e75abba45f89478bb833578d8901
SHA11c452d34039752ddd692b6c7c400e6bdf442c1f1
SHA2560313c07ab82dbead53125c73bfa1984c11df3103133c65ac95921a968a540a90
SHA5122f7e91eb2c8221094dadbcd9bcec0dfe96d3b45c6a102ed199466662cb09c88bc1c5d50d479612f2f786511a4c71cf9d0cda3df6bdc3e621381b4e8249f9c91f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5babcbb033589adf0c62b4fffe50471d7
SHA12de00de8c6841fc0a630e8edecb8e7e7db491776
SHA256a51600fad66573fe110d00fc853f727923597eab613c7c3b6c1f10cd04bbccbd
SHA512c65285a3993506bbca95bb974bb438a6425cfbf79e6f56b5176466ee0918659a2d9488dc58d0503f0641f5665769e4867780371da860e08064b20d0c1337e69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be13ace48e5506775d499e25682a85d
SHA1bfb4b33a572c1a07ba7e7adf8d1318d3fbcfbc5d
SHA256bf07bdda54944a3c33630ef641af75218afc3d0dbf58786f6d1b7811e6651f24
SHA512658bf3dd7313ba91a7e35da7c9d6008251ff4b5d9d2bf032d66554cfe11baaf8e431fad3e7a9a2ceb57e9173eabe7044d568d75e2789fa685b88235f469e500e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5910554b13bc9c6b042cf59d7f067f7e7
SHA1b231aff62fe674901bc749cba1cb64445ea1c4cc
SHA2560eeaa3801161656c24bd1ca2046dc8cf09cd1092a0a1989ca2425d813e78ac5d
SHA512d08ae8af6f4910abe10af6d02d1d076ddc64847ef2a5daae4f32f4e0ff5907f1a3f7cea9a4e5e5331ea8341d505c993944f41d2af928ae36b79d002f5c0a2eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb0466f33a7d7f4d736515045ac471bc
SHA1bf318f513794c7b283e9cb27ab1bd9afa2eb917f
SHA256a791fdeb4ca437c9adc7f88b35a7865478fc5df7f224dfc3a6e008b8703d9e08
SHA5125c2685bbf58bfa6e2d10c03da83d4c1434d1f84f673531d2d339f7100938d5d3820632f191949a426cc6b679e2807d208938540cf6271683461bb11975e93644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5951d1da625c5ebca3bcc2c01f46f90f0
SHA1ae164c6b4cc9fda6aab0696fec0e8f2019bd45ca
SHA256dba43033d35b43fe5dbc8264ffe5fcf96e6466a94bd6967d34862d49df6fc39d
SHA512667ba138d9002f114898a412bff5f69e9be5e8f62361858e0002bf1751ef8bfae17f54aab34d00a309b3436b2f48a7e7b53c0dac3f6a60f270335d8e61cef705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567eb9e1782b97a5252d477ffdb4c1277
SHA18fff60def7c6ccfa293d8c067ff064ea39d1e181
SHA2565c64d97268dbff3a0af91ee7a1c811c3a3b56050cf50e2843ab8f86f2d3ef9b7
SHA5128d4f862d378081d99272b6fe29b8256e823e2bf0a6ecf136b549aa2a93ac079e2af515ea4c5e8e2b5e1157bfed60a0cf127958dcc74fd14f705af46b654d0af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561586b0db1217db9a5ff515332a42515
SHA186f155753ff7b3265bd8822b288206fb94000d1f
SHA256d4f744abbcdc3dee0cf08149a7586b6304a0e5034a726eac1de1898452e9f446
SHA51268469b76ab722d0f1ab4101d15e2490c824615aec88eb0189208714374524787f5e464d7cf137751a723d40db6daa71ec006cd66da88894320298d9119b508e6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b