Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:07
Static task
static1
Behavioral task
behavioral1
Sample
eababbf7ad17e1143fc734fa32c230cd_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eababbf7ad17e1143fc734fa32c230cd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eababbf7ad17e1143fc734fa32c230cd_JaffaCakes118.html
-
Size
222KB
-
MD5
eababbf7ad17e1143fc734fa32c230cd
-
SHA1
40f621efd7718dfb0a5d06a6ef04f3ff88582c86
-
SHA256
a567c719e1a2b587b310069791f91169278dec564e49a3d8e19a8f4c68419d7c
-
SHA512
b38625e579de7ea85abaaf74b6ae5c6fdad5fb357e39cb292d93df944f0378610de39b098ba2d635708bfec71038be9dd9c7154a01a294a3f7dc67cf9829f03c
-
SSDEEP
3072:h4yfkMY+BES09JXAnyrZalI+YayfkMY+BES09JXAnyrZalI+YN:h1sMYod+X3oI+Y/sMYod+X3oI+YN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 704172545a0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887937" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7FEBE4A1-764D-11EF-873B-E28DDE128E91} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000008e394bd181a457c0a96c26a03b0d6debbee8ec86554ed6f8eced220228839e1f000000000e800000000200002000000086f24993188b8ee0f47976956b395aeaa064cd1dfb3b8d201274b8b8c1f794fa200000009870980d0c391641fe7a663ab440c3af12342dcf0ca846c200c14d3a6e273e24400000002c89c91fda2e0fc2c2b9a421a35eb9880984daf364c3be0bd562a76776e88bd611cd7c7a299ea9e32243bef90d18496220b7483c90f560ba2b22782348844546 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1276 2300 iexplore.exe 29 PID 2300 wrote to memory of 1276 2300 iexplore.exe 29 PID 2300 wrote to memory of 1276 2300 iexplore.exe 29 PID 2300 wrote to memory of 1276 2300 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eababbf7ad17e1143fc734fa32c230cd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd98a23c7a1be196d42e6cb5aef54185
SHA16f3675b42c074be7b850e201e28899de9aa2fcd7
SHA256dc3adc31ec808ed5eb999db27250fbcf90b06540c75f5be8ba535826dc8fa464
SHA512d53e11e7588e478269a6d7c0fb64ac8e60148b94455865097533fa1cee9f298ccaaa058ebdb5c32c27938a9da8de830a47eb8ffcc87373992383765148c27024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587dffe04f859cd6cf4f641029018da57
SHA1291c894e05c2f413bc837a1e9f72637a9c45110c
SHA256faf2d2d179b449a41bddb4a4f5071007bddb2ff3eab97fc54e13a049d3ac5fac
SHA51217ebe4c66eeb19d8e7c97c3f6c2b653dcd6cd94832b30733137cf312e541d7e8f4a85e88e0239c1e9b0eadf8af38ed11005306fdeec4284f1c4496a2c7e1ca8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cf586f2a80e2f8ca1c0f6f276406228
SHA1665cbb97cf1c88d533f06c9832f1e6fa4ca90096
SHA256c93b7d20176e0feba0486a50520fecbd1d8316108578a12118f142e7be97280e
SHA5124628f71c423a3b4661944f842572a6c5c9814df3348f03c9ff9c430d131b0ae549c075b6f21c9234244466587fb825d9b70941fc208fb8cc634b34e8cf7e6809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9824539b94ad7eafe21cc4c7474d4d8
SHA12a09731593299eca3002d123cd770a69637174ae
SHA25600a0cb5360614df29cc14879d063c75b8a183fa8f38e4814a367b8a6c96ca5d2
SHA512e143dccce9a40c8ff2d8962f665e753317c4764f0dab38613f00820d2c0448e464ee02e56439053d89d4dcce788f54331a805fd69635aaff49b1c85acf590f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef3e56527c838db83109d1aa00617c63
SHA1ff96d7d17db68cdf302b7c61ed7713462cbf0f8f
SHA256a0e7582fbc8b65dec019fb37b6f59aaa860ad2aafa732790b0cd2c44672f8415
SHA512ae4fe7ff25e4b47d1728422f0cc8ecc15a55e46de3c9d0aafbd3adc237ca9af68bedb770901120b17dfcf31f7a0d1b3627821a575dd4d620c808c8cc5132fa62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5957fdae26ee11c766430bf89f4c0b3ff
SHA1aaa3fc76120b4633bcc12f699816c2c78105fea2
SHA2561a42c42424563d77f1d9c7854bbc4b9ad939dcfca37222c0c99b8e9222b42724
SHA5122e3e09c402318bfe2b0db3a8f5f1f7dedc1657f3de6393b651dcd42545506cdaa2b53537975eba8fca476594f2a8b10c2871e21e2d7bc8d9cb6d221c993673f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5edd71bbacbd212a11f42d37d6c8261
SHA14b4ae9cebe96946e8ea9fbb97a9749abab6ba891
SHA25690f8c7032a36d17b4154367efcb52dab7f527b2ae60d1e139e29b887f93a8c84
SHA5123f38d8039ac319753216ad591edd17d7e701c27ed1275512f7207565bcf2e65b84f2d2ec1a9b7b271818dacc927578c50bb6e99efc487d701dcc6db51fb08437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd2e8f952c7137ed71ffb31b6bfef8d3
SHA1ec401476f71083c8b083b578e3a13e1b4cb56b0c
SHA2566758acf1fda959ed6c4726599a5dcd873a1475965c9a6642b7dbc35ba78359ff
SHA512a69b9f53d8fb18fd229d666e308dbf76c57306875cf352ab3c98587e836d606ed5bafa86e26e02114016bc92a365eb7151ee9b40207df55366c9401354f15fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55498def0e33f24b3ce1fe5455e94ac2f
SHA15e91640b8f32dd46d8c124113e185365dd28d387
SHA256341eb252da64a5682d4a8022778874af64f6d16d391d3efd4aec5a7b51daa00d
SHA512b47484b013b202f4d7b5c1cacad4cbd6fed89d773e06bdfeaaf37e93d32bdf61a846422b83c7e374e0edb4ec5b5fa1a46b69abdd88e80e8a7e48b2ad8ca16429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbc4754653ce47052e25ea093a81000d
SHA1c0df9b57e7710b4b429aed65ca9ba820e332dc6a
SHA25648c09abae0d52edcf90af17b9fecd5831e06405a906fffc0e7bb3f0b604386be
SHA512ac2101307942e4d17790c53838f74852e0e0c8ef9b722b73e20ed1136f3ca4fc863db2a19642c10eeedb11e04209b09933a2b8bba8e0e725b816b20af46ee09c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5651ccfda26cbf819a1113ce752eff0ef
SHA1d30d823440705ac61313e2fce08bd514164d4869
SHA25644083b061111b52b462c83604e3734fe4dd374400cb4a996f303f292ff73b9e4
SHA5129caefeb8bc12e4485ff3083097bcf36d39a3b207fe38cd0086bddf55886f24b3f2149fb148a5ba6e7683f8a7455f0de40e480af25faacc96902f56ef0bf11056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ac9b9e0919d31afc5cb6383a581c37f
SHA16ede0716f6abf6af270014302e492eed3aca8136
SHA256d254679c2d09bba53db0aefd8a3f54dd7c88968c403b6dca660ec52cf18073cb
SHA512b233293f4f7238674afbe453c8587c6b2727d8d09e3ae232f153b1f8bfb31f6219dd15cc5b26529691df6d0d2328dec681f41d59cfb9b4fce5cb90b75c92a310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f6127cf71767272a97271b34555e971
SHA12ea60d9ac53a110e79ec23e6b786c144c1ffdaf9
SHA256ed875aad3f86e0367e354f198380dfe6db3824e3311f29e422adbbf3d1c4f0dd
SHA51291b922b17c08bd03e06b0eb08f38b40314428972a197569d670628c2cd94da5d50588d2d20529bdebc0c20413fd8b26b9bcb6510aebdccf3258927f89b245cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd04ffbdf82cc206d26f7a2f93ff9861
SHA1cba9c77875edb1ca809cc5078eff9be09ab57a45
SHA25628bb5dc7d35537a134056ca1036e9e1df575d3f4232082f7438b7886ae6aa252
SHA512ec39c979f2f086787b59c54c907a1a22e373a2bb3fff7be7838a94213ede69a93f4011345c59b3a44412dd33fb76989718dc368aea0d3c38eeb5949507f2315d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f59bb06f83e608508301a8ee87b0d7
SHA1d1a095d6bc622b981bf1726558f35ac9d445adec
SHA25630bdf4fe120c09cc5e3dfb41c5949e76c7f2489e04958d1f1ac45557a31487f1
SHA5126c1dad8b63641bcb77ea91a434ae15b1a1391f9bbdf28ff00ab3b243f1fcdb4363fedcf3f94cfd812c768f063c0632c4d933ebe487af1a29656e21d687f23c4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a317adf15aa55b9c2688c54e4d869667
SHA1e7cebb00e77f3f8b85f77139d777c6a0db766988
SHA25666aa2141ccd6a7253f0faeced8750b855739d0a49f06f2a15380b88013ddafdc
SHA5129b06c10e2273f89b2a2cfc9d55c9cf2ea15e3b20954ee3a164021bd3751ede2242f74f8454a0724ee45279adca392bbeebf3287900ad10f0927699371f83179e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d5a05c162f23871989e6f6a3dd5cdec
SHA1ec7d26f67e292812e916b8a1c915ccef0ebfca6a
SHA256b3b11bb0a8a0f4ab07839c6e96aec8c951acf5b8ccc2be0cdd7a4d68c5a08645
SHA512804ee90ab5f20ce934b289e785c2d2f28afd966d0bb76f32123a7b247ae9eec325f2deee66404e6fbd5ed9d85f59fdce91210f9fb9da2d88e33694294e50cdad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aad1d34f5ec1711402cc73ec1398eac
SHA1336f36d4f305da9efb989dc34ce0a1b21e1dab77
SHA2560cbc1d2c3329354a75a4fea870318ae5dc994fdf3605ae50d54d078659f4d6ab
SHA512308e88b36c720d6cb49bfedc526faa7252dc45e61ab0c9a6b4746bd49734f7aeef0adb06ff983fb2e45ae0232b745dcec905f6d1565b21185a2c41c98b3b2965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8ed3499f888eced60ae6b011fb3133a
SHA12e6de0011eb14a3207a5d2c0cb05ac7fe1f54d55
SHA2564d590915096c1dc7c867208c4f18dc790b63bc1674ad2c6d8e55f76c1672098d
SHA51271a4e796b0961926bf2072907a91cafe6f532644b62344e85e163a79439fbd60fdebaf2ce251281adf6687c3ad504a0c7b5a01d0bd192f7cbe6787fdb9ad0087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b40c54832e9e04ebdc76642197020e85
SHA1f148067e5935bfe204b1867376cb57caf8dc2474
SHA256a6940157ff699b3cac99b954714fa1b3d28ec801467fdce23cb3cc460de66889
SHA512bca89e25a4f77bc08a857ab0485c4c85ae363938c597d33b34bb6d3af6ee0cc575d30620df01dfed4a9970097daa4f3d5c4c175e79dd4cb34ff414b930cb0120
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b