Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 19:48
Static task
static1
Behavioral task
behavioral1
Sample
960d02cdc30a8b1eb5b1320045d3b718_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
960d02cdc30a8b1eb5b1320045d3b718_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
960d02cdc30a8b1eb5b1320045d3b718_JaffaCakes118.html
-
Size
69KB
-
MD5
960d02cdc30a8b1eb5b1320045d3b718
-
SHA1
6a57151064f4953c579f4c6aa1eb8b4d3acb4f1c
-
SHA256
22a88613977bbf4c5edbfb7edf4f13fe702309c4dc3b388885eb34bd95ca0d5b
-
SHA512
468ddb4d2cbc0577000d8f60ee8caf19219d287446b5b49ee626d28c1b998baf47802436b948a518b1ac6d4d0c977794776151de1b71572ee9bf74f71e049481
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sy6eZ/Z0oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:J3EJTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0a24b51b8b6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423692409" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b09897efaa117b489e04a89e24c59c5900000000020000000000106600000001000020000000ecd4d3e88a3b396f4ad5a499c51cdce2adfb17bffddd576c914c0746859ea6cb000000000e800000000200002000000025e8ed88d80e79c49864e89a3071f469cbad539077dd4028f06792ca6d240be12000000009e03938c65f2c34f50fdcecbc8775b83bb7217d5251b60171af6809df61642a40000000d1962d0dbb430fc31f62fd792927a6cbec56c6d35f24d7edd2e4533642436e4accd9905714bb5794c33d5ed01847aa003f9041492a3e71185f19a56c47148c13 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B3176F1-22AB-11EF-B671-4AE872E97954} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2988 iexplore.exe 2988 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2484 2988 iexplore.exe 28 PID 2988 wrote to memory of 2484 2988 iexplore.exe 28 PID 2988 wrote to memory of 2484 2988 iexplore.exe 28 PID 2988 wrote to memory of 2484 2988 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\960d02cdc30a8b1eb5b1320045d3b718_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c9aa349bef0473563cb1a04c648c0e7
SHA1c5e094beea38a99fd2f4140be5b7ff08f8873ff0
SHA25648ad76c27fa8f05c1fd89622e189c70160bad281571c3f150155b236e6a7ccb7
SHA5126a5135f107eff91c2fa1b5c3dc77011b99f4fc3811245986a7ac536bb56f7e2bd531fb572aa55c74a4b863849b3c5e0d80c04d4792f60444618c46ec1ba07ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57671fa993b2ee665ac819f440b42ae28
SHA13ab72bd923505781f550a657db00f552db20bd25
SHA256359f6c6758a47281cf5d397a491b6b1d192e9d59773321056ddfbac87fef7012
SHA5129e3a32a2c009e1898cb0e9322acdd471aa30e9dd21922380949787afa18c312a37c65ed9b1075f0fcc8f76ffb1f85e8f6d45139962f92677af4550ed2927e954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539ec01ffe06693c763b06070705f1211
SHA1939a09a0366a19ca5ebbd0012ad5ac0740f999f5
SHA256321e76f0c0b51dfde69396c80d2d8142ca9984b74207fd50d9eefb88c4ebd723
SHA5125ce2497e48c4845910ef61d6c30f40bcad9ba67392b4d78102b33f88aaf3ae6f88287f6439b91712e61ed928ab60755bb3f1853cf4f8b7cb0e85383546b5595d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538f425df713a74f5dcfcde69ff081593
SHA13c2640d8204091a5591c086ea679de28c4d3f28c
SHA256e0f5465b8f0669d5b00b1da72ac7eccf1d40c0fd67403e5a23457bb0439f3003
SHA512109143eb11a9812bcefeb00c704c56928d71ce848709d174a94eca993fe4d6d7a50a3bbc3fcfb4f1b2f909a710f2bbf7220558470f7ec57e67a847a320a5586b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5914a029a5a3ab4f008a3b9cd2699a07f
SHA1fbbcec114bcc38f5bb37e8183b21c9189fdf0379
SHA256ae2f721b4faee635471aefe166bd182c217f575678dd11a224ec92e7d1410774
SHA512e2ad3be7ac2b75513d8e6aa9be4a4bb6ca49c9221ce428dd64330ec58e0f512dc994f1136a4aca17a6492be763e3fe70a72bb2fc11d22911cba9126604b85d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509f377b2767fe3131441c9a578f27155
SHA1e5f3ff2d2c2edc4cb357a6bde169439034f22623
SHA25653547d7da7377ef776159a1757cb5ed4c5dbe4174853f61e864d84519271331c
SHA512960d0a3bb26a6ac0464c0d1b403d25e29d5ea1cbdd6da6ab8a4eb7939de7d977e19e11571a4b54e5c428e4ec44e4922836ac174974506e536ae07bb7ebd6d043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7e1e91e3f7c93dee4c272be277e7b76
SHA122989461a60b208d87cfa20a106da1b52a69f902
SHA256de302fa81449cff339985a3b7a1dddd64c907f18af4b66c83a6b47062196b06f
SHA5122b91f6d56990772238a919368b1f2f92d3d65a127746d21a9d746bc1db9653037d4dfe372177aa7a030be13ff115ba5b13356938efb5ec019fca5235dd124e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f0c0cb2978761d88f163ddf331eea29
SHA1fcf35954b9e1c9beb53f5869960e78a95cffa215
SHA25663586b6f929763459f5fa285d2379d47d6f20438325a0c20d9cb942e1f2cefae
SHA512074f50cefead14762542fc3d0ee8e3f82aa70168c397a218d30cbb9a4be54e39a2240b8975a8d19d645f069fe9944add6da1ad1403d8139b2e44c71985b0ab33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5d787a9bf43fede4e0a4f35055d28e5
SHA184f834f5fa0b4b881a682930f243ecd2c3ee9f07
SHA256353dcc03d5df624833490a8ae71956c8e22f056427f81d6040349a3c5c7e09b0
SHA512ea8f08470e6b50d914a3247e0fbf1a3c0bdd96c6787364c09621dfbf54a7685f5b8bc0f0eefb1fd8a30b20fe9593df9da67f759cb2e0410925063f41b0f4ee30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e663b36da5fc945be0b9e25fac833073
SHA17fa461685e49ae5eb8b2db6b3b6b2e5fbee31761
SHA256c721cf716ccbebae7bf93270315dd4ca410c0e91e66bfbd14ed2ef34070b3a09
SHA51228bf7dc12a5181620bc37e6a0e5bbf6ecdcb5ecf0648fd0ab7d7a9b38ab8c4b136c512eb9450c197632b5df69b20e52f4e0e90582af86dd182906dbdd10964d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558775e5a328292352e48e43958cf026c
SHA11b4adde675cb880828158ac397ebdc7eb48b7731
SHA25640c3dd40236929e1b48e30db8b38cf8485c6bbd6ac1e3201486b19d7c9de9b3c
SHA512f144d7f6c788c52a5400461155a4c789ceec906d32b40eb7cdf83f3334aa3340fcdebb9a533527cbea86f40683bf3e9b24b6e71d7ac2e3b8962c0be7532fa75b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eefca8fc71512884290e03803c1b3fdb
SHA1ad05c60099e817488b184a39dcabb7a9d242b3e8
SHA256e9cc824a10f9c4b3e394fe7b1aeeec61a0ae4c28fad7ebc8bced053bd595dfc4
SHA512990150cda36ec5ae2df754785a99be12be1df08b80dd48700dd5b38bab4f8ea0343a7641d111aa02b38f9ca7ddb51dba87469068088ade59aa999ff846f22c96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c7202cdc235deee720286000b744663
SHA1e9ddfc2bc87b27ba55c5ffc330feeb3f13cba826
SHA2563ba987d2bee9820c50904c3a3d8a4bfed0185a83bb126c7014e15ca9e0df15b2
SHA512085cbea476a47211001b040fdb5d304cab17f7d56a8d61843e26138417f2be044d6b551562da1b6e9d310fb10f5a42ed635a579ab28ffe4c85ae18779868c23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57115cdb4de6c7259dc512180d8710c61
SHA101eabeee03738b35bd6f29083f04050d506f3063
SHA256f587d4c9121317cdaff7bf51c1a32a3787381cbd56f06b3d45502f5969513630
SHA5121117a48e644ca633db55d9e9b7b06630ddda9ebf3f666e81b3b40a3731692da250f60274627f785087452af12423400aefd5bb4f276db8d599180f68d111db22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbff75380ec310d6d193c19c155e2b66
SHA1560ffd0193ea2c9d66ec631bc10a914cf6fc94ea
SHA2561eeacd01850f2aa46057b70af85e051a3c582dac8a1e4b2085049c67210bce4f
SHA51230e8083c45f88c77ad9c9ad7e0d41cbc03cd254ac3e2a3b0d1ab53da5db3e05e0989f931e4f9f143527989a61e1908dd0c86d17abc6938309ca1de90e7ec8b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594d2879d9f6c2d9ced57d31536dc7e93
SHA1aeb6df16e04d38b52486159c661a8f90841ccf01
SHA2560e6906157c16bfe3a81bcf857aa0b93a1c2c76812dca06adcfdbc2a89c9f2487
SHA51294232aabb382b36317160dd145eaed303b12b530323859de6f737c51eec00ccf878c95e80b5ad902d6d1cf8b0701d7dbe608e4af6241dd32cbfae99c1237c31d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c176dae63d6e25035183b06db57a8d5
SHA18f3ee17589b716b7c9768ec8eec7a99bd25d53b8
SHA256fec07e35c42fb14918d38c86c262a6e23963cffd826f86a4b9a0eff610a1f21e
SHA5123b93a261ad36ddb6c32207f42f8aca0eb2c7c7837307fef9f5672102654818c041f2894eabbc05e123f4f9b6749ec36b2f349fd61ec5735908d5cc26e1dd308c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df7c149c22a3f176437093a4cd61dcef
SHA14d79d89b51725ebcec286280ad9d125c5e568c1c
SHA256100fea54b800794593456df6024ce77315db82b49b2dc6cb96ae06d416015204
SHA51253f27b745b29376facbc303b4a7bc1a1e043ad194de09c9b5e537d4c4e6813ece99e28dff3b505110b3dce2ff68d86e4024cfd0b8a968a9594d3f395c843aa77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e357dcf418a85eae41b64cdde76a79e
SHA1fe9e8f768f9e3bc433d2c987fb9c58c8012bb36e
SHA256f2115dda2cd0c24c86e1c4d430a2dbb9e21da0a58fec9acb12310f0bbfd13d0c
SHA512c2d939948beaea29a0f69d367ac920295c0d2a39bdda1b36d18dc6fa4ad4e92e411028082488d1f883fc8266fcf429d694bc94ada108ad4db3568e510ad186f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5571ceb0aaeb35bc065e46cf7021e175d
SHA1db837377b97893b8be4f7d1806dbd6e40c943172
SHA2565147b5682d2b91fe9c2cdb812f7c8e15d066010889fb72324bf2277ec2ac5522
SHA51218863087700de510d00515e63192263cef1b29ad9e7ae27b80f37c0527e025f2e1a9ddf0283e1ac2920faa07093e489d7a7834349bbadecd2695088d08e571ed
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b