Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 07:52
Static task
static1
Behavioral task
behavioral1
Sample
89cc8bd961f3a33e5cfda9c685a21df0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
89cc8bd961f3a33e5cfda9c685a21df0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
89cc8bd961f3a33e5cfda9c685a21df0_JaffaCakes118.html
-
Size
94KB
-
MD5
89cc8bd961f3a33e5cfda9c685a21df0
-
SHA1
d13bb3aa49e5b5b10e9e91f419bff46f793c47f9
-
SHA256
9b49b62c14b55279f19bb66f3c4a6d9d9687e0df868c0a4dee3a545f41d0d87b
-
SHA512
a2f7acb045a05bf411f7fbcfb88288be1702c7818dee582942ef63cc739da9c8d56b40279a3e63669f45b80253f490006f028b97bf5c867315e4fd3bfb76beac
-
SSDEEP
1536:WMLiNVfZBFLpP3H9XCnEmfUPyEfp7L03jr3yAZ1BdkrY8mgHC+qpEyW:WAiSDvBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DDF60C01-1FEB-11EF-AE65-4658C477BD5D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000a5d97cbbf3dbde375366e60fcc5ecfcc19404d23290039f526bea306b88cf7fa000000000e8000000002000020000000a4b1a437e73f39b969f805955ea37ba7c7454003ee9664293821c62c02092cbc20000000472df5b1bac83af89bd96c614d37c239be78a7037366c5ba8940c1aa2af5083c40000000996c690b8a07bcbac646895d64db5722d6075b187a47560dd7ca9b14b02813f4dd4ae6ea30bcb8be6d34c7e9494707d143e747f25b544200be46d823a5c7ce25 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40bc6cb3f8b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423390204" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1272 1952 iexplore.exe 28 PID 1952 wrote to memory of 1272 1952 iexplore.exe 28 PID 1952 wrote to memory of 1272 1952 iexplore.exe 28 PID 1952 wrote to memory of 1272 1952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89cc8bd961f3a33e5cfda9c685a21df0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544d5f0123834e28303c1e35c645faf65
SHA1806b223001adf0a1b60f4286fb07a8c9adfbf2a9
SHA256358ef8d314175ef0fba4f2a157f7ce4084a961c72aa610c5199c12f364b10eba
SHA512250bff653558990501f6ba406c4ee5f63a20633be415833d72445e2cea049088ad1640ebb5bff2bde95e90e01a392a63b0ee6f69eba9e2e2dd90407da83156e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f415ad6208058855b32f5c24bd904ab8
SHA1b13d39b9112bedd216d25da2c4befaf6142a09dc
SHA256263b35a48c21087c258bdc04a4db155638c4c21a1cf31b66d665b1ff1c03ff83
SHA512c76276306ed03ecf4f1f420d4188091a95f9ef984ad6894401cb3dc4d6751d346c2cc02772677122629b4fe7f85a83d4a615de0013d8f3fe9457d2ba27bd8424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e868c631edd44de785635c624b78376a
SHA17f7ce371abbdf21be799347630157e4ee4d8f33c
SHA2561feb2e9eb61b7e5b804d588e29c01f5fa2c2c0577b784a19906b5331f817e453
SHA512c635e3ae7fc6b92716584f001500e35b26ad45e7d0e6be4591c448b6eec62290de4c891be39b128865729d8d2fc481d4dde49cd233b74970e8365fb409794c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f704adb26bb2b4868618a011fce72b3b
SHA1ecb7f530e027f05edd1648c338f2781787c6b796
SHA25680d2d23d833169a6c540dc7b06ce558f1d83a27698f2c54d9e81ae1ced0c0b0d
SHA5126c381edca3c3159c4bb545041825f2e4e808e112d11663e9e72c3c3dc02c3643b5c174e10fed8880dd294343b181d487ea608415f9464a1687dfe87e8123f5aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de55d330e3c261bd2141f30e26776c9
SHA1875b787b4f59ed3215fb3eba8cb0cd2645bb7ac5
SHA256bd447949c61a585d1ff8b842c3afb9d36cb2af3a7ba4a349115f207ed45adb40
SHA5125890d1f91f1de9b6e1eb7c16b370ae1ae7daf208a86ac0547198939a2752410246c553e063ca9fcf4e9d184aab72635565d880040817bc854cc6f40e95129259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2dcd3c4c11fab45db7a6d539ac61a73
SHA17ab7cc246bb33c5fec17474eac473097d1309488
SHA256d0efdb375002a0215e2e3f37a657c9f1a7ffdc3df6949e4d5433e4aca191415c
SHA512d14e04633f3bb35d082af26c4a40478f6a965bfd47f780b03ddc4e9b46f2b5ca0799b9792573009ee73bc7f6dfc19a4dddef00d66acfdbe2814b85d9dd51ddb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1b072511e2d1418c8012315b1a41ddc
SHA1cf3928c20250ba87a82cd61d57f1f37b2088571d
SHA2563b10115c8136c1b2897f950aecb726e93a9e1cfb87d605726b664ccf148d3c9a
SHA512f0747ea4ab3149d1e7bcbf803a685838e9fd1aa1928c25eab4a8d016ecd214c4ba93dd98a0547c5b881d7d5f7a5709746ab327cfd8a8eb1089f12093ae27267a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d34778ed09ed635e5ce7dd668da637a8
SHA15a15747398a0cf17a7dfc34014854d33d59c1a46
SHA25630721dc2042c3329b266bce55ccd091a8ee14c3e67b4f33bc180c345d18b9a3c
SHA512c1822561b6ebad2c22a2e016a0367a3264df666df2124ad21e7c0a5f60b4833c2855f0317bf03e0717db793dbca56c8e6c1909f36010f5adfca853cfc5295af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5507501f731886e018c42256773ae49
SHA1100ff0187f68c304dcc2b1db12a2d89804788672
SHA256095b6e20c35c0331aab65c47f2504d2c99a025c0185c5a3993c186b450772e32
SHA512b896f66c8eaa6836c344848272a864e3cce6b73f8f8203e6e6a28643ec2f78e04c945d2a6d36155f9fa143c7467734bef65a65f29bfe54a9680c694f9ee7f10d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a5991e5c6815ecae8ca21f569fbbe70
SHA184db5b18ac9b25ed2348c486f7419772325f777c
SHA2562de62e5bbff72f7bc197231ae2c0bfb027e848cab5a7ac6d6c5427ae8e27e2e5
SHA5125a16fd1281b93a509571ec42265d8e1c43a9b646116ef1fbf39ce533303dde69fbc4d19a4006fc6befd2acedcb31a6ebf147c21d348163430cf37939387c67c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528ed502cc6d595ef52511ead3012c510
SHA1aa76a092343d59c2d12f7e044a68d725296bb50f
SHA256667f3a53249083527cdbce954fa9bdf233e81cd1ba101cfb356e4e52ed703ca3
SHA512084a8059fad8dad834ef8b62632fa9d2edab4fb145b677efa5d0008c5c9282179d7ec5e882d6e84b3fec31e16821226870f17099f4a9895d5d474b423882349d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555dd108aafc5246fad0ecb2b65aeed0f
SHA13fbcd0ccf02ad22aed523210d83ecf62036dac7c
SHA2560efa72600fe794ac36f71b8311e935364d51184793cb6c59fd76b3f039b64c83
SHA5121a64210290a661f1900ebd7063e0db8aad9b775ccfe3cf29a803538803246a50eee759133fc0b19520e82c020a7905478703076ee4753540b56b589e929f8c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d107f263b9fe9d4706b6463ce6aa05cc
SHA1ae3046129a1d4cda872c4f05fb6d2acfd600506d
SHA2563c15ad657095bb2837bf0975fa231106c1a815c559a67c18af0e7c8666a1393d
SHA512ae4f8469f6730770551a630bbdbf0d68ac26cb5053aa3569621a804c62bf2805f85f146eece6beb22b4ce21c8fc8e186444a9f45b5b05e49dd3c2720f1ec50f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ec6a98c310feeb4d3c12ab7ed0bb57a
SHA1fa9060c8c1c9266f147bf7ba65987adabd5655d6
SHA2567983504b53b874a3db5a818725fa5ce32840b03b0c7f02b7b97c378117ebe84a
SHA512a0a25c328479e1fdc3ef8d8e1b8a425c4cf8f08201dce427391162a75e82d2d648d32e140f6a9bc09e5f780573f498e8c7f1255a9ad0bbc788f02d8554d6c175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5db2e06dc7bb1941ff949763d616fe5
SHA1733fd3cbcc2b21db69323364df728fce480ab2bf
SHA256ca7d57f215190f6c8c77e6943ee164c8cd39cba98b3cdf9b8fd87b8f3aa68594
SHA512d401404cdd75c4752a9cf00719fbc4d0836c26ddf09569e9026458dfcd55f607b280d23f850fe43058bb34214da54d206d2e0d0813d9124b1c96c64ddf727a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516a3021d15bd008f72c23b662b5cb5e5
SHA1d691e6a0da4092b41725038f561a768f3486c5e8
SHA256130a8218195b699c3b1d8e0899767ca67910ece93449af5e40834c93413b8299
SHA51225092c109eb31679cb1be9bbbd231e4e25afd91de9f7163e06999192870de3eaf1b6d31b38c9c4676a44460ae8656a980f5654bce9adf0b76ea1458b1241a540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abd44e00d1d8973b07f631d6332049d7
SHA109774bad8839b0b84b2bd83619c801dfcc2972cc
SHA256d16db28e1fee48fa090a651100525cc05b395ff1f534bce1c7632839221fc490
SHA512798ad6b47c5bd4bead3aa2cfa75ffc602817b4d736b5574e46a77617bb5d5e2607404b82e53e088d1bb21c5b8e080b5c0a7e5d6ec80c548700071e846593d134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab66cd57566fdb498583bd291aa70946
SHA15d9698233ddfea49011c821c501863519953bdf7
SHA256dae56d30cf098ba23d10966097e934d3009c1ae1c9cadc8315936e9f6dba4564
SHA512102edd03816874a7a5205bdc5b1dc93433d1ef2e4383beb9af1f3585f9ee6e0d322cee8f40df88418f416a2864501f8500caabb3c8d6c7cc97d04380245f7054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c965f3aa4d065c9a4a73a337049bb05
SHA15e3c645384904d421c014cde354660e4c19eb901
SHA2567c4e6573c749440d9155228082108a545550524fa2631eea664e703d3e060a58
SHA512a404aee81192c3da049e39df178c9e55da3c1fdda4495cdde6580ac5ebd9eac749d2656db3cb7d129fece6833cd92a46be677696c244af99f8ac9e730f44d4ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IO0LJX84\font-awesome[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b