Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 18:39
Static task
static1
Behavioral task
behavioral1
Sample
dafcabbc6fd627d291340a8ec09a008c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dafcabbc6fd627d291340a8ec09a008c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dafcabbc6fd627d291340a8ec09a008c_JaffaCakes118.html
-
Size
73KB
-
MD5
dafcabbc6fd627d291340a8ec09a008c
-
SHA1
6bca39c7b589fcf725c2493c8cb45519f6c94048
-
SHA256
1e8e9b701200b4031c62333ed5abad0c28619898df05d3af0fd4314d7dabe1e0
-
SHA512
14fcd3312746325c42eb6600c378a33b7a50459fd97a582ca2e78be369d525e35f2ea8d9222b9f4ec948f148135628f00acf8d1829edfafefce96fb71d95f499
-
SSDEEP
1536:JVlh9UOyqksvmOzW54rY8ZK+FdG9xQBPxPbx:7ltvJ9x
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000ec2d1a8adf8e5835e4124b3ccae56524eb933efdb26bb1ee403cba8ef24a2171000000000e8000000002000020000000fdb6dd197683e151f22ab00a39a266fdca15bb9f8220755812fb1ee4aa8357a120000000e0b517bd1d999220d871c137279194f1c24285f52734804856b69aad351296534000000081d40d40c366a1deb13e9ac3a60d7dbdc2d4e74f6ffbdc5f808f922d6182106a536ae0a0e3f0275d71539cac4509404ea56fbc62910b623a4de57514704ab31a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6016b3077a04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000003f0dd92ae2f180109b7dface6856c7f49cad1506b52dba0a40ed0b46cb90240c000000000e80000000020000200000001cffaa7c8c52749d43a41b6ce8c5f3a95786b9e99c60e9d5033fa07d9de7f5ef90000000c3ae409187cc880852773df22fecbd22ffb2e7d592db4eb1501d3545bae7156768b538c5a534a9f01aa981488fc31326634d79d9d18c0c595f81389da23466eaf9f5a6fa961b1dfd2643d78241a6c00f984582d419a0eb5e758cfea37c099b2fd6e0f3c0b93816148ceb170e39749da5a3aeff266643b7c085897f4a16f9f8e8501d297959ed226caf5358984799bb1b400000009195650da2c6cacf45d645051f5314b80f4f5f1de68607c346cf5f62d92f1c7318abce2be6100ee94bfe699f9f420dbb5767beac33b54cd95b7f944402896cb2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432241846" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3315C691-706D-11EF-9BF0-D60C98DC526F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1672 iexplore.exe 1672 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2604 1672 iexplore.exe 28 PID 1672 wrote to memory of 2604 1672 iexplore.exe 28 PID 1672 wrote to memory of 2604 1672 iexplore.exe 28 PID 1672 wrote to memory of 2604 1672 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dafcabbc6fd627d291340a8ec09a008c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e073746f637a6357b4408844cd2c2906
SHA13a6bbd36da203ac1f31444974c27b39b447148ac
SHA2569c2fe61ada9fea2915564517732379cc0c0a185f7df6790b5ec977635269b5d0
SHA5121d165774ba98401656f2f835852cfc3d00aab21c83c1af4762e7822e898ce8aaf3cf764ca3a2335c38377777fb899ced09481dbc5f4e42551ae44e1df54c2809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e7267594fd9e0c6702ababfea0f0ac5
SHA1a2870140ba488657e201686e4e6e040c2346dce6
SHA25660044415e6c567094c5bcfecd9c2f0e6d122400e6e1184016307ec96559fa733
SHA5126e8c4903bbca4c6881c7418bec44aae6326f9b7726cf7798363f9c039724dcce91033e42e7273decfcb90c1e1300a04c2bb14777b3e21200a02e5fc5475b7193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52991b470289c3533c983e51980dfdad7
SHA1df4c0f1545f5f9ff99bc8af750245f9e7e90a8ff
SHA25616d6418176738d304edc12776465d46256ad5d4fe53acbf3f697945dc473c3b2
SHA512195851c09836b6a730173f0e640d28ccdb1911b83b72a7ba09fb450afd555d57b31a5f734c8bb9e1ee23787c343fa83dea862caaf880057043207846105de446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b2dcbdef7a9a5cba8f65fb29c613338
SHA1897be4ad5dabf59455ebd8cc18a937f47fe41bf9
SHA25656c3b4b636af2ff1a34b05f1a6e0f969540e21b29ed56f52f40eed6d1ff25721
SHA5121e17f586daeefc863e06cd27e5a1c0cdda6a9ad7169a081cfdce67b035e733e54ab3e6e3de2128a2e0829e0848b19ec88bb9be965d643639d6effdafda06d75b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5528d0b48e58ebbbe32568bd9f2cc1d77
SHA1bf8e74a2d12efc9ef0a34fc4905415951c2dc9e2
SHA256279daf0c4fd00e3d7acf9adf161a2e570405feea7ffaf05a1885dab77733fbb9
SHA512e497331bed72a366ddeed0d3286ba3a7872a463cd9d40aeac122dad95ba50c9642bf26c0366f78f8ebd509379ecfb86969c725dcf50105d3b94222035c5f6522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5141daffc0f24d31709c8106bb96575d8
SHA15c958676c6a0d659c11fecbd73e9e5c45dc3b4cd
SHA2561b34125b9a9727de839662cb8ddd10acc34e71c0a2bc73cb4a8cfc6e98934dcb
SHA51203075b4176b24000c881dcb3e86054085a325f15f703e51882078e7cbebbaa8ad769cbe203006ea7fe6669cbcc3464fa44efe1b5073b0477e0c8865fdcfcee6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526fd1fb1f678e62d25e804ec593ced7a
SHA1e21b873bff8cf61250d980d1a44e0520ab964c30
SHA2566674bb52441681006969afc7b36493fabdf8f916341bcde29a84793fe02a5ca8
SHA51222a556c4eb8e324e233deecb6d10bb09267bd9aa05eb8362677ce94d66ae19aaf939bbd0975b664e12a2f3ad8395d6b3748ee82059b3b7d6cfed36a10958e242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dcfc90b794988dd0f13110ebe2998e7
SHA1115bf047de285d1403c616ae3fbea9a888b49fed
SHA256955335fda1e738de519af80cfc2fc06c3c1eb2043b10eea4147c6bd0422b4f73
SHA51214df82201419a254730ba23271fbb34d53ee611b98f20fe7fe96e2625fb2f60fa33516c00399cd56aaaf24c6d4a005e67e730d911f8adb51a4d3fc3cc948e74f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517129d19280535132de819b0ec3fcde1
SHA12485a792f29234a379aed0ff3e59ff14b977bba5
SHA256eb06f4fb6b6fe5977a819e3b20fa096e0be8aa0211dc943be1977e2a4c371a4e
SHA5123d477a37bf5b388643e7d66d3b26f99f8728f75fb46f848a29416ac5b73a9ee0907e7007f586a60b2dcae29d01cdd7109e63f125f6607798090fd1fe88347095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da450078893b19fa2cf1c6b92c4a6a9a
SHA17c7ea80edd9f25c4e6f390fe43de0db93102879a
SHA256a9dbaffb6337bc5b18aaf0235e3f51a1cf5c235a5f04373809b1000991bf624f
SHA5125a78a438b2e9561c0f282529968d469c840b26c24e621f5d17035216e6ba5b7831d5b0517219d8b34fba57b5161d4eac7483a90e0629080336ba6e088e20bd1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543161625715c9243392514784057e9e
SHA1b25085d43ae5793c502edf4cb5a58b13e2f300d0
SHA256f4fdf3a1436a48ab7748240d62a480e442bf627d1051127963b3a83f87893add
SHA5125c32a5ad8dbaff6cad7a7964f59c14ab928fced2beec3d247c8d37ed1d2d0dc32319c0c14ab0cd98f25cfe5cf160726115c2b1962f9d25daf00366665e779e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d53957f1c8466e7e6ade9d377033d150
SHA1e0b4689941ac5a01b79989174ee8c378931e8862
SHA256c49e52ee68b0adb5deb6e977fd1cadf2d2e81cf949f8ce55b645043a02fb32df
SHA512d4439beb072c17a0a7e2642675ff41603f834f900111ab3acbb76e28c0cb0b117e7c99b42e83e40ae3e7595727992f8ae61a3165eb027e59f22c84f56201a4f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55253cdfac26a04fc4c0a28ce50192441
SHA1ddfdc7d921d76cc54d17a23caf37b1266e6e8cf6
SHA25671f2e87f6ec18957722e5cb474e2e68ffe64226b548d237149f811e2a8658c44
SHA512abf1a53a75ebf630cbc6fbc604c953944ab624c5a12e50cc9c86d8ce00d2f8ab1c945eeea66d052604110c0b4920e3d455e004ef6f728478792bc61a2a9f01e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f4352567c5c87cd21fc7bd10f61cae5
SHA14acafeb053fe43ae0d226b185894c1a796c2aff4
SHA25677e4dc4030ac3411d68369c7d021d36e6de3a961d2bcee985396352965dc05cd
SHA512c85e11b5282531a9b0265b7496896df9a9254fbaea0da677904b9666a0b62bd09122cc756f8346fc29949c8deeac90808f797b47201957cf0fe60756d19f866c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c70e03bfcd12ce3f0bcf3c540fc07b8
SHA1ad09870657cd6fe8314fd47cc0112cf3c4641794
SHA256217e335aae865a8593e149e03b2c4b5997e00b63e9013ba541434b04696012e5
SHA512d28eb2a3c279949981786e242a34bbf9da4f87d0e73f55ce121b849c74639475dfcd1caf39fda67cbc4f7bbf4ae71c17b993732e83c030a8b5c3c8b677853649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5015087a3f9b3bd233812e2ff4d8796fa
SHA139cc5aa6871fb825b3fc99644b378e924fa90f11
SHA256c41d6f5ddedc65b2789ed794c894b0a03205600600fe2f372b4a216df6648cc8
SHA512134dc7db9d75559f6df1034f5d67bfc4633179925980820cedc89fba82b4fb00a101ffecf4071364c59418450d5e2dde7e885d90d83ba5a79950ab2f4daf2ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cfdef177a01c8fde20fd8ffb4073dba
SHA142f9857a4b9ba4398da2d15429e6188b7a62d27a
SHA256cb7046f867c501d9662a1276ca1511f113c318f14f6e7e1459a2937a04358cdb
SHA5127f42c39bc37142646d034a0f2f9e58582596360899b37b19f8e947266e81c09169414b96e6d575827b353a186cab9429e5a8e3f1fb8a2cb59ff7f2105598569c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba13e7c9fb6d562d8a24a9ac3e9b02a6
SHA1b1ca8fb81c692b5bb013d9934408e39566480aa6
SHA2565f090e561092293ef115ba7b34175ddd7067734798d2586fe5663aad5251a1db
SHA512513efb0f9e28897375ea4ab0c36d99a431f28e38b34cf5ff9636d9c16d25af42b4c054b701b4e47e1cc7020c5dd8243669d48e7d538abce8ded74494a79e0540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52badd47524064b40598be09ac2ce5ad0
SHA10d7d9721cd3e4c580426628b4de9f76c5475431c
SHA256c2b0023ec999ff49efeecb4e0d18d0654b0fe179d5ca3e39316851d3c9eeaf76
SHA512ed365daaa3eb67b33f2b71e0a3886452660832bde232e1e8c6596cf78a536abac9f78d46be3cdb6f3a1d0356248bea37c3ed87018bb973776e4a5e0aa0c4f244
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b