Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 05:14
Static task
static1
Behavioral task
behavioral1
Sample
c0058436bf1f91cf8b96ecf343c2c861_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c0058436bf1f91cf8b96ecf343c2c861_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0058436bf1f91cf8b96ecf343c2c861_JaffaCakes118.html
-
Size
158KB
-
MD5
c0058436bf1f91cf8b96ecf343c2c861
-
SHA1
7a55d5af941a4c114a62a34256ba3f3947bea01d
-
SHA256
b8da068ae7a47de2a967fc37284745048210f5c0f9b1cfbc20090c4cf7dd483f
-
SHA512
6052c07c30747386e1442b754adf07ea613fc9d5e0228e855b8a2b470352af4d7206baaa1739a2bf51feb6301ffbc0476e4484fc2274d21216a4e6db723fcf29
-
SSDEEP
3072:SuQwmii9HcyfkMY+BES09JXAnyrZalI+YQ:SuQwmiiHBsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20887acfadf6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000fd5a22cd97c050b0161d799896eb3c2edad06ac19f75ffc3bd4a2680bbb435ca000000000e800000000200002000000026728deddea2ff5cb4c4f0a3e273749633f465218fa9bfefc340b7d844c3d37a200000001955e217a24e84315707632edb2747056f2aa5d6300fbe8dbf11373b4b986e774000000078acbf6a67dc3c88a518401beec8416f19f54b08206a8677eea3317eb6b5453bc29d50ea746fa89832f5e8e78bbf24de05a3ae6e4d2f2dd10ab884291933e609 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430724767" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F9872DD1-62A0-11EF-9584-DA9ECB958399} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2704 iexplore.exe 2704 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2724 2704 iexplore.exe 30 PID 2704 wrote to memory of 2724 2704 iexplore.exe 30 PID 2704 wrote to memory of 2724 2704 iexplore.exe 30 PID 2704 wrote to memory of 2724 2704 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0058436bf1f91cf8b96ecf343c2c861_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2704 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bea861123f29644fb87603b29d8446eb
SHA1cbd4d74c10ef88de219c3b0a3730051d0d06066a
SHA2563182741ea72d73fd92eb99bf409665f25f183082a0d76f26eb91908517592dd2
SHA51217bbc8a1b04a79687ca6921b6a55485b70c53ff49c6cb2f0b6dc5cde8869627a5042ad4d2682a85119f3b9fb1b8be31c0e6cf2dcc7ef7b12be8a5bb0f9821cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e9ce5ab5025f5fad6b27502deaf14c2
SHA1113c963535810f5501a306394e7b59613dfef6d6
SHA256ed7407c2326e4cc4e632ffb42df3e193f7e48838babcba3d60a51937d52624b1
SHA512953d715d29ceb00a7620502d1a954764109a2c3881260dff8a66d79b9a0ebc9031187cc85999ebae821e5ae63df6e121c9c7c72b0fd073b4a5fe31680a16ee49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55222149fa1bb330a6adde492158ee0d8
SHA1dee9a8144392edb3a45f6883d79026b98f88eb3d
SHA256db843cf75f7e3bb97717b66cf61aaa0aba024dab65620b317c95bec23eda8153
SHA512a1cc08a9618760aaa65179f03560f0fb104b24cb4ffa2b24ee306313580301288f9ce5385786fea7c7307b035153a770be0f6edc3cb7f3571ddf6a6d194d2158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa91dd207af908163465917ec2a6d1fd
SHA1c6715dc56da918b9d33e25176bd761795189c717
SHA256648920ece9e564f4858113bb45dd75b302e1a0ea1e75de723aad62253bed4909
SHA5129d1adf5b4287a5b33d76cfb3d27733ad15210a6613b48409e3f28c4e6912ebf5aeda786948a90b3819ebd99002511d2f9ab6d3b0c87e07c97bd82e437a993b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54166c9d8276d4e3117c3cb8296deeaca
SHA18fc25d4e34c8dbdf6a4c116f9422ee6d3cf9a759
SHA256f2a086fac508b9fca83579fa0438bd0bea716c66ab6dd7933f8882b010bdaab6
SHA512a0eba74a0f6db2a512eed27192dbbd2e7afd818d612f797b2d2bfe4b0f93a863c93f4647f65004aa46b8d4570cb8c7260f756d1fa7e17b273461911f8fe71c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8e134160bcd42d4f1b070a66c677d4b
SHA15b587ef29f22ce2b4ac4c386e7b7ed06e01a5e9a
SHA256c9983ebf8211c7199065abfd1ed037fce47bd1a9f6604ae3f99beb8c11cb5f5f
SHA5124a59f9b6d456941e53d50dbaa3903146159ca3f718962abad662f9516809f3c0cfd06d00cd18890f90f6e3e2234f85b4158cba86ef24387ca9469ded62d5878d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9abc9c3f45c87fbbdebcd4b03087153
SHA12ac24547e575807d7865ca4cd9553a7837805664
SHA2567a41f86dba3b2a510c27dac8f8fd5433f6763f05ad2d55041ef158bbc015ffbb
SHA5126e5b0cebcf4976c1d8b03e985ac5c8d53783e5ff170bc390441d16ec0588aa39b5d3ca9eab26be3f5d06cdcb133c62ccce3c3fdb0cb78da1e991ac6e40af0d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b47d83252296af2bbbbe448e0f4de679
SHA1a9bdd7a257a5b96d99b1657a6dfeb3cddc3e8ed3
SHA25689cf381e4930af5ea47344caa435b057e00bef554be631e3f4c3646efb0d9235
SHA51260cfe8ffad4be79ffbf4012b4d7cacf2c1cf080faa5bc68b89feb70403fb8996007af466b07bb7c0a08fb1e916ab2a9297ab2388add09cf7cbd8adb74f114ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54feeeaa285c300814ff52929623e853e
SHA11756d7a3a319049584b00a74b45281c287515a7d
SHA2568e5f189ca278b46daf66ed2e30dffee158b1f5a64f3a83a9e1ea1251cc546479
SHA5123b213ce9cff5b9b705b9a94f37d3f8e0666db3d2086286bbcf6a482e3082d2e70e06bba6eb3263cf6c33cb8d69f2cf67b8aaab512bfe6bc616bdab44397c11af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59742e1adf89dece3df53f77269e58b4d
SHA1ab53b510288d2b7ef019d353bd211a82ecc49bc6
SHA25669a72887f3453313e0dd1307b6cb4c4db8a2d77fef51e74a91ef7f03023e55ae
SHA512cf5d57d0836a0fb2d559ca7eb284269b65adf28860dcd9d73ab691bcb14f3e0f35012d6d4916a3ad25bdd9e1c7254a748c1f0c065ca0bb5e27c49560983b772b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d79e68dfe7e682e12b37d6c899bb204
SHA14115f43b9c5d0d1191981cb8a8e246e1f7d5aeaa
SHA256c6a843a8c19d8d8ab2724964aa2c85b10b22c204fdf20793daefe2252a643220
SHA512ecd8fbb12c25bbe8cceedb9cbc53afedeca8d61d5266daecf514d6734e39129a7e085a7aaf6b9ed3192a961e7f4b979fdb868cb0fa8de768b99de3e338fedbf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55166c2e4fe5798054f60f796d404dc24
SHA12acc7e7061123f6192e5d97507621e5d2b99b580
SHA2566c56a36e13073d356059f5e7ce7fdfa2d53cd006fe36d47a56f6116c137da3d6
SHA512bac7a28c43a92caf570405bf8cb32aeb8a721a4d1f137301355def6f21cca1531f07f682bb351d3b2d29adc8b8ec391acd505c6e2e7cc1a973e5a66cc5450be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5accf9ba8031e83483483df4e11ce2edd
SHA1a774e7c95db2ce8c231839639248a3658ad00266
SHA2568826771b88c158c20d753eaaffffd1c7d3d225f9b674b1ecd25b06d5ce71a8cf
SHA5126b8b8a30d8a941a885116d82f625f5246ac840599fa565e40b58c7245fc6d306cf14ff5776c5e1e5662ebf44f489cea4bd3d5e488e0390de84498b5b4bbedffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c227c2bd3ff13990f5d0a2db3b4d64e8
SHA110ea73c254453e4a90ce318e4000f9e597092570
SHA2569e08c726caaf10df20c13d6bd28d70a5ef03a7578d986626d1d1617c427ec7a0
SHA512cd7dfc4c9915e0840a2e883692d2260823d738379e8749fca655f60b9b5e5a5f72d487c1498ca3068125d56e5b7d61eee32d6f50f15355ffbb160e44f3ec6c98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5661d6e627b66ce391966fd1c94cebe8a
SHA1a0072e66a0271d918b87440a4745c1c15f720ed2
SHA256931ad64885e86882a91592b17c81941a5afbf9b79784552686aca8e4fddbf9d8
SHA51239c09b496fd37e0744dcb50633d68f11c5c2ef97ac8204778ca8a7a08c41fe51b01cdcd352aaa0e089ffa585c11f9b30daad4cc2f233ae46a2ee429afd91fce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58949a6c36c7c646df4b9aa63e663d877
SHA130672a3cfccece4393fc6d9368f6146253aa9172
SHA256ae0b0d7638f22be0560ef78ffe54d6982807f7d529e65491c3b9438f6a572aee
SHA512d86a8103ac7b65c4595dcd32770afaa84293f019021534f7e244abcad74d87f62a4d4001abb8e5e2215d603e9f4c2f9f869671b31131e576471fcfa0629b3ef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4f42db204fdae9b176759d2a14b22c1
SHA1c55fc69670c67c79d3bd5aebf49adad267099694
SHA256bed9baa5fe639dbc735a12b2e5f1addcef933b9c5c27cf4738373c5ebf1f0181
SHA5125c29f505bf93f80244fec7daa6a5d1de596a267564dd41b567926b514c1e4382ffa2690ebb035eed325d087bc9252ce09873f7539a6281f6670a735bf26ef6ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc8877310584def5f306de349ec1d6a0
SHA18eb83becf9cba42bbf4ade1a9ca7b83555496338
SHA2562d1a9fbe306e2ba86a21d7f3ab1c11833db03bfadb1ded0102ac80ab52d1b5ad
SHA512067accbceee93bc62f4267a269ffc8d5c689972ad96189a2bd4c54a3b6ead9dc214a40af0c32f49ce18c6905781c5915f06480b5fe7a9b2e32a61279cb666eac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b