Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
a575d419263f2c948ed452bbd66ed323_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a575d419263f2c948ed452bbd66ed323_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a575d419263f2c948ed452bbd66ed323_JaffaCakes118.html
-
Size
32KB
-
MD5
a575d419263f2c948ed452bbd66ed323
-
SHA1
0a77760fcfc26b738b25c62e6f9a5692e1cd6d47
-
SHA256
e12f6a04bf06c362d772af37d432497fb48c3a21496d936d87dc98b9ae01a85f
-
SHA512
5bcdb6ead4af232f68b227791be1b08c19a9b0370c4eb161e30fb96d66fa34a6773b95c74cdfa91766cf8803646ecbe2b9fea298f4ce7e3323cb4f19bc70498a
-
SSDEEP
384:f57EuUB0AZ9OttPDqiv9Xs0BW12HFT0ZcqsuzMj:B7OOD1W121XqsX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000003bbc9fa8a2ad0c28e2e6c876e4e3f88f8c9b6ab4f204ebf7d739b53989519c87000000000e80000000020000200000007492e64d72bcf085e460463f31f13531572136ac17469c5008cc0f5cae3942d0200000003bda71b062a8fe8df1613428b834723475867614da26d7c75f3d45810d21228f400000005240d478a1420935aa5b06c51d855387cfbf7352ce3b0dd86e3a2de710461620da9e83d5471e92af6b15b57f6a82e951811ab6c698356ba9a1b98d59302f5538 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0de419c8abdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA2FD351-297D-11EF-A5CD-D671A15513D2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424442412" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2032 iexplore.exe 2032 iexplore.exe 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2464 2032 iexplore.exe 28 PID 2032 wrote to memory of 2464 2032 iexplore.exe 28 PID 2032 wrote to memory of 2464 2032 iexplore.exe 28 PID 2032 wrote to memory of 2464 2032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a575d419263f2c948ed452bbd66ed323_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d966d52118801773d44a160c4c29a655
SHA153c1ea318d37e4701b297ae9286a84314e96e9b9
SHA256ffe63c60922b6301ea557a080d842d9f624dacc8db09aa49852da23840f130c1
SHA512381d975615b36fadeb10ba0f121e22adafafd252c85f2b613d5f971b5b83079e6502186207ecaf8b93a3f6cb20383335d70bc3e25d6ae2bbc819c1e704958f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53edc05b952bc315c19f6b29a078d2be1
SHA12fa0101832558c99e3e13a4637ef03f88a4fe786
SHA2566c58036bc512c5c287589f2045ec2b5bc2e488b86116b164f022371942fa8378
SHA512c8376af17c7a389a771ba25876cbd8dddc2cc3db6d0b9915fd64dfa1e69d8f47a2b594ef0959a876b90f27079e40095a41bae9136e31922b3bfc414bb0105435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6c226f53fe8bc02930edcc4890cea21
SHA1a92559bc7e2e7d186e0c4f06632bb9e07a6001c1
SHA25675361b24bf096153bbcbe2549de4f1343119ac8b265e38cf055c7aa0aee6f50f
SHA51229a22918d3c955d7ed42fa4495ec41bcb7f4be0899f4ccaec831031b2e6d86a54f442ec3dbec392e6ecc03a01d792a1e167b63c7fcc480f8a5487dd5aaae4c8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6e1a5289a351ed7d15c7dd6686aaedd
SHA1912e85015b843ac31ba198618d336482970aba30
SHA25688cfe8fde76841c9fe011c82a9c44a88b4621b51542cb005cd959d2acdf46464
SHA51229094cceec8309a6230dbac68f751bebab5342925087f26dc470e240e932461286526cf466d13d9dc2ce936ced72e9855087c930e88108bd526cfc62bd85db4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d9ce191285978417d090492b1f7aa41
SHA189093e1d6062dfd5d600e708193c9e146717450d
SHA2568897514e007648cce3a87036ec9a2b9444c2233d0828c976df8bceefb841bac8
SHA5125c924a7f320421175be18e4794de3a9073d05c7b7325f6dc47fd16ad4ec817e5374f182f93d9b869ea6940925a2879f9bd29bc6d9815901b28b49b53bca19c7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54620e6efabe21bebe7afe10b77a73370
SHA185b213dd14b4793d3589f61ed27a18a5c726af40
SHA25625ff1de976fdd88439cbceba779e5d769d68f6184f4f0005435ef3931756f3b4
SHA512c8586ddcfafea7ed995c7c018db39b65141a00f939539d8af17f63b7e30b9ed9125b084ba1630e605f4ceee71102b5b964b5a253472c7b087cd3efd05718a44f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba25321b809928505c84794fc980b9bd
SHA1c1cc33e4f1e95bd584bb9c70066e829ede4d9639
SHA256a8217329a1a5f1d49a6c8ffcbd11a1cd8994a78991364521b293c498160941ab
SHA512a91cb659c6190a0110a3a7aaf296f8d9001ce3f98edef25f9b09fa8e41983674c902f8f3cfd8b6d99494c73a267b1f6ecd9b6b306df15aa794ae288af229368a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544e1c2f5957eb8d661e3383d056409dd
SHA1da47a6da31d273cccffcb92854e07bb225202ca6
SHA256f72c0b251522b49184e41ad7eec557ebbea6d092d39747e902e0aaf76e09239c
SHA512a96d2d60f713a6796b5b49975c2b538f2e6410c6e9c35479e6f35dd6ad94dbb60e325b262f528269e1924a3c65cb706cebec24198b617bf367393cd831161ed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5277a4773dd9238a2087613ad061c4e48
SHA199b13baa750597f10db3f910a191cb7af6c5d132
SHA256fd9348cd547b6ed57a26a35f7d8528ae81c33c135c657bf920e66f647eb3fb5e
SHA512f113c7ca7f9639bc5b503ca0322abc7576e878223025233c46cfcbb930fe32031e0f473c6f58340fe29e0e82a59f11414534a152e3b320780f6d1eec25493eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513dca31446d65f8e299fd5b59674365d
SHA11cf537e8d142903de1036f91e6f28fe4c98a3248
SHA256b7763612962edb04a941934a60d0057674e712a381186c1a43422cc7d4c884a3
SHA51256aac56df2f8e21d2cd5f92a7f583cbf4fe11f52b29955ac31e1055c3526d3607469f2b4cd079f427be1ae14ea00c5be101a153592ca2747ad7f3678c5e4b683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fde31f5b929d2c51a89e5d0bce83f0bf
SHA18ff1c3593d421d2890c9089239b151115c9858e7
SHA256e39232d5c4ca3d7b6527bb54ee83d83427fa9406bffbbb3bc3b3822f2c40902e
SHA512844c5843fc8044a3ea9382b80ff13c878702ca70a631308d708dadd901d4d07622f95b037a048f0dcdf7423ec8ed05fd22751050814e8cd487176bfb70aff041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5641b1daab01154d182d41f90b4578555
SHA19bd0954e8423ae0a13070b4d73ee4745da6a2a3d
SHA2565996578280f9d0addc26f130ef36975d06cc4f76848c55dcab0ae26f14f2eea1
SHA51210dc53c8e7ad6a4b47649b50797c17bfa229172dec8ba618a63ae03a874efd7b5829ee9e6c8e33932a923539bf442e3893b43d08efebfda4270891e53fa0c9f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff1c6cbce485a75f3da67dbe57bbe8bb
SHA1db1fedf8512180d1bb3483321c5a4e37f46eb711
SHA256d801c268187496fc83f86a978304dbdda8a96f1e96f325bc7351615d60668307
SHA512c4c0d0af27dd9e10da8cfec62b9130a368c79fc089ebb9e6dd7215a75b3203872b6d391fc453fdaddd11719fc060f578a35a85e9de870dccb4c08bf92923da01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502a0c5a3174c9d1069ed1c340a57eac4
SHA12cb4941f879d6d60dc03bb2a616884df48530d0e
SHA25655ef0dc85e5c723367100c4a9f0bae1715659545a6778662fa4ebb3899971d1b
SHA5122c67a7ab48b7ea986b17475e1719061ec194488609ddcbdadc788003ef57daa2580e8f7ddf0ce95298d421bc4b37557c8a219789e670e001803464f1f00928ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4484230a9908b9ab6eaff136d3d182b
SHA12e2f403269bb6297648ce2fc541ea7e92462f22b
SHA256c738015a47bc85db047461658f320fa8e5d21114a5f4bd65f982d75b958d346d
SHA512d764eea5af2126f877fd974b528347ad39f348ebc3b80765ea51d4914671d83b3576e82963740d637a86f7189aaf4243803fc41358476622f06619f5c1332e8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aaf429e02099307c641bd2a25943f6b
SHA111923e200f45ffca5fb2ad09849764ebc5001735
SHA256bf45bf3220b07a3985c85f5446a32d5fc658cda4283aa806a3ca0b1a9fd53955
SHA5125f8e32766043d52f5261281cab43e9455063e3eee2d26553f596294298bb8a5a0f4fd566c25077b89e4960ab9ee0c9eb13824898421458e5235960963465616f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d670b63d74dc8a27ff957f2d92da14
SHA12201d0404713c6a0f48f0851eeab185b5cf89ca6
SHA256d25cab90e029e205b4055b62844cb157cd44c6b1cc0b329e69ab0c2247f905d3
SHA512e1019aaca4f5c276d33a7a95f0f717de0bbc843fdefd6215bf1b319c6aae268953a3e6092e0bf4c58bc5a1cb8f4e865a2f178d8777b669b55bb413a272256d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfd9aff45661ef857b9a86430db31d70
SHA1948d8caf1e9f801b22e08194427f945dff5e8514
SHA256acf973cf93a166c82c30350d89d0d1f3411a4f957670aaf97540bc4d3ab93c6a
SHA5129424124e19bc038159bd9921e6553be2045a088b1de0d8ec26cfe94e147e4daa7de9f1410b1c0ef44e5aa77250a8f52fadc27e1cefbb28a502157a0d955c6aa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eaa5e0ef46fe5d8ee14a54dd1bf3a74
SHA12f98281676f062baa2102cf47908e16646bc7ccf
SHA2560ba1ae0de601d6bc7aedd79d69be87177b41037cb206deb6d996afb8b1535d04
SHA51287f86d8d605797d9ae892e67ceddb7c3f9a57ce9fff2a7624fd39bd9f9b45406a96b0a9941b2506d43b646ad8465e49645697c8805752c4ed8d9cb027cc1ab02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b264ad647f684806183d06f0821745ae
SHA13713f9ece7d0356299514a5fbce305a9eeb9bc6d
SHA2563c18abe200dc5ff4ad3fe45c7bb55e6a7df1049325a296937a009369fd355186
SHA51269ecec33ad1df391fbb37bc2afc139eee906ca6f5d48a3b61ec8987975ef9b8a8b95b63a49c278814bf17baee51e0664c0fc1df64fc39fd35f8a4e2689b39918
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PJARS8CM\e[1].htm
Filesize377B
MD5419d216e3399ee3f21d193fa4534e1dc
SHA1fe0f1bd8d35aeaba63551f239c2bc4a5b8696c03
SHA256bcfe0387ab3435be3b2fc659cec617cc458e7cfafd480144d82d409f3ff8a18d
SHA512a4874a28a02b69961f7ab76e746a0cd5daab593d1da6f20ecb2e89925b4888f546684d3a314a26752d76976b300945deb4b34f559e109937ae663fd41446dac5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b