Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 10:04
Static task
static1
Behavioral task
behavioral1
Sample
be5caa5013129843fc5a44afb3ee5197_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
be5caa5013129843fc5a44afb3ee5197_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be5caa5013129843fc5a44afb3ee5197_JaffaCakes118.html
-
Size
115KB
-
MD5
be5caa5013129843fc5a44afb3ee5197
-
SHA1
19d1ba4771f462ad8bd1b8b4b75042e2677a6868
-
SHA256
fd790027f019b3a08ac492798330e55c4fc5174d5718c9445afdc5b436c96149
-
SHA512
46fd53a6246ace5800c9765af6b61d2326ffcd975bbe39c74a78ecae711772338d67dd61859320e3c556ddc6e9088c989b7672c5291964fa70b912d305aa7ac5
-
SSDEEP
1536:S6XqbyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:S7byfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430655734" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3EAD2781-6200-11EF-A24E-4E15D54E5731} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 901436130df6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000033c98b628e9111e5bff12d17992c9bfb9d1d1636ed6147bb0ea74f09ff39ee5a000000000e8000000002000020000000d0bbf5d2d2f55d7605c530e9fb21a4cb876ac25cb67969970e6d5b1ac2ad0cb62000000023971598826a084fd0765157562fb50c5b1478a3e4229107ab82f828cc15c4254000000083e6578ae06c67011fac052df602ff38e8e309e344b8cdae2da0c8289da9f7ee705e8e220b05c90a31f4fa2d5fe413714ce419d0871449bea3e3884a22471a3e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2104 1628 iexplore.exe 28 PID 1628 wrote to memory of 2104 1628 iexplore.exe 28 PID 1628 wrote to memory of 2104 1628 iexplore.exe 28 PID 1628 wrote to memory of 2104 1628 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be5caa5013129843fc5a44afb3ee5197_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f07b4899fac69a88d9b06f4c48532ea7
SHA192f81e53c1840be84ba6f9fc553527f58f985880
SHA256991661e0362432de902e31d2d5720e204bf53ec4e54053ecf1560ca9714e2044
SHA5121e86069a80333702a1866c47aa95d61509fa19d68242661c3b14ac3e21236bcb4c97b986293592d3bdcea269b5692c03795bc4f85ab2d5a1884b1a2e3ae35bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a5aeffa48dd8f5635900f8845ed9de7f
SHA188c5e6466a70ad714e64b088238319c5ccbdf75e
SHA256fc37e5e3fe5b6c8f525b49e7021cc7401de59d6cf7c0d66bf725ba275d35d212
SHA512c83531fbfe88aa67cd4d44649d7c3a12699141f2d2f6a9a1adaa3f05b56b17d76c90da262fe92420981df050832d91d1674d959480d2610871fe58da9fd2ed86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d5f42bdc1569c1c8b7723667e2dc13a
SHA1d77b157858a59a32040d5b16a3b084e2597443f5
SHA2566918302fb919a8b9b41d14f35e61427716204e45df3ae45d1183953146c24037
SHA51253189a2249c134bad4905b509ca6015db15ec3aea46ed7ee08ff62f15369bad813a189917fd64703e4cc972e030182984214d1fa5a44a3294c0bcab8b12df100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d3c5937a96e98080e92825f4bf610bba
SHA1f5d75d57e34065f65680c50035826773365edc57
SHA256b28f23212af03478c60490bb4a30656a24e2350c7ebb9109c312f69993c12780
SHA5129a414619bc123a9b0788b6444424eb7626a4590a50016e8535be5779ab524ae8369fdff2737d7db0c055d9049b1d200db891a9cea9974ef346d546c415cf7a94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD585a90ddd05f5aa4751b9214e3a764f83
SHA172aabfb82226aaf142d763a22127317f7bd3e647
SHA25692829ea0b678c81e3a207ddecf8e9b51465069a77ef44dab6c327301837f8a46
SHA5126b0243065af4942b4262bc9c7c438ba6d2ad7279677528d33837eb0769ce8ccbc8e475b135806ba7df96d2de6330425c5a3a9148c4c11bc0a26da33892bee86f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5081a4587e1f13b9c93c9d04098802d98
SHA1b058c88e5cda520a5e294f9d0551c6a6554f732e
SHA2560fcb2108d2a6f57b281cf5774a4c7ff579e30541656ddaa7e897af1a133ad1e3
SHA5124e87409e429bdae482905f720d7681a5f41519fcbe5e4d5b664b9be885f375f7b722a1326a7791f04a6dc86f674009157ab22398e7bb574474514891439a1215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51bf1b2ee3ea8aed040cd1e2311b60484
SHA1ba26beb746dddbfe48e850b899d973f391595512
SHA256d9c91e45a6d66cc75b6a60952817eba34db1c9e1ac5c3291363ff8a2f789d3c7
SHA512d9d5858f70321f30ee9740112b924d75d3deb8dacf4b8a4ed7a61d5cd49807f011b857ecca67382a4e955d39ece373c0335abc7e70d409804fec458bfa4ce88f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD596896d08378966b76ba7be8c42470336
SHA114f88bc67c336680b9d99eda98b56b3c3969fdff
SHA2562998ea5f2be3fc98199ccf858b1966bda35484d526fb81f2837b20b5f7006032
SHA512687793b038774edc6a5dad62f79340b08022c437380736aa2a00297740f484d7e3a9bfdb43faabaf419248bd33ed200c58588084ce4bdc78b4d0a80aa9721296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a35b2510c3a51e168aad07f5df84b97b
SHA1c9910e363c6514f80448ef2a25088c3288595371
SHA2561401bba2fa00b82b10ea14ed228c4971fa9bee4ce6509de43ab1450f1bd148a4
SHA5122cc6f0f71c008e9bd78228ff835df677b9639d56c41ed2f621efb04b325ff8ee4209f0ef235b1244e40f79b63d7602a2eb53fb068cbe51b55cd640fec44db37b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56287df0fadd3e0f474734fdb7d926129
SHA1f31b63c9a330e84923b8445b3ac1c0a240456155
SHA256c9f1511e9b4f83902c6b8f6ce190bffe193e5058767edf8f690325529c19dbb3
SHA51246885747caa0b2d99543af34decebea63aa36bde10895e216f38dee7857e68a77829ee6c62d648b74d310f0477f0c378660841ec6197b8672110903cc0ff06f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5295e454b4a926f880141e879abd672ef
SHA18eabeaad5b2a48681e5f4c789fe9ed32b68b7927
SHA25644560d775754aabad72b52804351a03e29c0f6d0429d638d68f56ab2880a1d11
SHA512545f81408e6d8b8fb6bdee4014e83298cd3f137e0361037e1e0c13afef64747ba3893afb79562fc6f59dc4560045e507efca1fc90dbd348111a29b912ffc0e42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ba9ff5954c48e72336124f4967a627f0
SHA10c7a3cc958dc9084d3d7894a3f7aa30eb04465fe
SHA25690ebda9ad5413549be4f52864f458b916957ce8224269454e0e9b038b451bf1f
SHA512ad3788efa65d61bac4a6e2325d4043468f1c3d9bc998b756233f4d0b524c139512f66e28a4cffd94010613d5f665afe083a6b88e92b1ab12326798f5ee35d9c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56f654fde017b3d163dd972309f416edd
SHA162a8d17009cb09e61e44b755c5a44f1313f63e59
SHA2564a2d4262c038077592effc4ee56633e28590c201eb44d17c4b4f8507850554ff
SHA5129fd31db26450aadc87237909267203bfab0802f45e4af9274aa274c7e84b3379609a57b7a1dee2bd6450282b0087e555c858557606d0a97efbf24f474bcb2bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD511da75fc6ac6a54e71fc94271cf6a76c
SHA17f919343bc680b6f6afc92b270054ee6345b6ddc
SHA256061b178f2cde42dcfb118b1432aca80f9b49a631b02753d0ef8f6b77d529feb1
SHA51201a5de4a60fee4d0a393f7dced1d7fcd0d04f544b95780b6bb5e8673c543e93a47e4d738368e3e0132b781b7972b98463d04ba19664ab941bdd7240aaadfd058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ce04291c84163a0f150934767c79ac57
SHA180fb27aca220cfae45884a00abed9ce5d0c50ef5
SHA25671c3baea6554e130828438189c17e4e488c57f995b73fc7591224781b46b6f62
SHA51226b7356f0b4946b5eeb6234bb03591a3b738c163d3e9f398ea3024887c14dff5afb42c8aec05bbd7eadcee966d46a3dfba39fd6c7b9d8c5927cc977b37cf6892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c17b57bb0b4e421ae406539a07182e31
SHA1d6095e35f17b840b515236f97bb073adaa2a21fa
SHA25647463d3fdecb6dabc87f88b20009ea3e17dc6528ef48b4b433bbcadea7a746bd
SHA5126dadb27aa5a386fd4c6fb46a1abf78ddca43994a9421bfb029ce50b8cce462d78e706bf3481f836aa41b986c396014b38f07b1e309fa69221c734d4597adf55a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b5c951d8bcdfc9c87433c9be9c74da7f
SHA1ca3c28f224ec4e3bc4bb3a4db1d69dcbe3536596
SHA256d357f2df38a05f1350e1b2a155af51bef967b15095148122be2a66d2d3756092
SHA5126e7847c0f033fa7a6cdaeeed40628bab6b34780105fa198898ffc56330196ee17a856b1efe017e87f7dbe73a98b85520bc60fba0ff683f80dabbabd7d3f0b05c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD546ba060f7379b500389dddcd34676a23
SHA1bc785313270d67b44f79bdc4829037a9bdf62a12
SHA2560651a8bbb20b5ce0a3e1d4e10e0d552a98e628e93c4a50491aefe909d398fe3e
SHA512504e4104d67fdcb0e5fe45130ffaf16adc2d5fad9468c39bd89e722cd544a47ac061488acd48e4a0e18704767058eac9222f285d80a814af098874adab2d98a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e609133da5775691c1330fddbe6bec18
SHA1f74f07fa5677ffdfbd0cda40721a82bebda82f97
SHA25637439a3cfc5e4a845fab5056848fe86a841242bac97fe499e24c761f8c7058de
SHA512467d2b1693df1b18ca0da3859e676c5360db390d84ae5adbf76fb0ccfea647eb38d70f97cc0586ac47bb856322c136f23cc8c8efea5405e878263487cee40303
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b