Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 06:15
Static task
static1
Behavioral task
behavioral1
Sample
eabdef512bdd2e620f242c5eb113eb58_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabdef512bdd2e620f242c5eb113eb58_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabdef512bdd2e620f242c5eb113eb58_JaffaCakes118.html
-
Size
21KB
-
MD5
eabdef512bdd2e620f242c5eb113eb58
-
SHA1
b9dce160a179024da5165693a16325d73668fea0
-
SHA256
1e4aaa21a36d441da2ec0ab0e01fb344189d7882b4ce0d9084314cf8a0198595
-
SHA512
e6262dacedc0fd605b9de8d6307bff9f5ffcd8232c4aebd4e948bc6ccdf104f948b7ae9de7ea08d1684cc3d081a4190c60a3f0c2c909341525420ec856bc2ba0
-
SSDEEP
384:zi9AKcRAa5r9DIiXb0VBD8cA3RrHPF8kmEfP4ycbp5XzVcrxDJZTO4uhp:zi9Pa5r9DFYgcA3xvWkmGP4yyAJZTO4C
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{86C67371-764E-11EF-A160-4A174794FC88} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888378" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000cfdeecd41470fe5df41e045fe8ae0582ad667d6479591e08e9aec167b6314bab000000000e800000000200002000000063d70dad0b60d77a96f42848f8ea9f7a6dce1119e77da8b060a4b12d61142c9920000000a0b836da589b55e076192ac1ef18d617ca260180e33af21a1b4042e20d87658c400000002484e636dc8cbc81068895d5135cb934a425c0f7f6c8c2ce18a65de9f5cded17c0c30716bef263342bab47b05461498c60fb8a391f0528f69f59cf5c2cb0ded5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8029e45c5b0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2148 2352 iexplore.exe 30 PID 2352 wrote to memory of 2148 2352 iexplore.exe 30 PID 2352 wrote to memory of 2148 2352 iexplore.exe 30 PID 2352 wrote to memory of 2148 2352 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabdef512bdd2e620f242c5eb113eb58_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6a7ccbbb148f915728842f724fb4b3e
SHA1e698ec6772a4eef90ec5fbbba708c2d5ecf5fd2d
SHA256bae3dce229c1d0f243bc4054528f57a586b3f06247e1bdfd0500411eb9a06416
SHA512c025097b5e4b17a55bd8a17fc9d56ba8031dbe5e865c571f28fb027729f579003133e78d96d7272d24e64bc630cbe3e3bbc908cbc3902ed1b16cd8f37877fe61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55889feb35228accb8b853c83580f1ded
SHA1a99df456f09f014632469ce2dad986c6baddeb1a
SHA25621d8c3c09216398332cc1a349e11b308aed1fd25e50e50eed3c635d3d82465e0
SHA512941ed6786e9f44fb29211510af886adb9e81ce976a01494d900525423872cfdde56ee63a7bb8e59a510faa25c4d90994bcaf24091edd9c24d45b91e72e4b5c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57addb0ca194a3a9802ce9baf8e9dc5f4
SHA1d563c8464790e4d2e3a6be5782a67120186021d4
SHA2565505d44ad41da69a594808b29d121098654f8affbf1db5e79aca5a2ea49c7097
SHA5123f82808ec1d8b4acbdadb0ec47bc054af970abd23be2ed24823ab12890fc63098f4dfb41c5c342cff2360ff6cc69763550a7a4e671ceca741f16f47a8efddd4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5436a6285e25104d0492a23b4437b4aa4
SHA1fb48bab16bad988b76c2dbc2e2c47a2853598e0d
SHA25606332521f59e2614d5633fe26cb82a8c4c116561d2eadf624b7550a538ec8af7
SHA512139785dfc894574bc5c5f1ce4d2e753ecfb59d39c8519f4198f7db77980db75a84797af3cf79c97a4dbccb5c38a291122381e1b2f0ab7cf30bc9c66e8f3f4a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b64613d2c427476eb33fe135af7905e
SHA106636ef9acb88c0cbd1c2f9239b8772ad58c920b
SHA2561c855d952daffd8008f6e2e94c7913f8f9a2b70271379f87e76e39c810d5cc65
SHA512df5510f13d39853bb3991b8242ae0e1b1843ebdfb9346770a3c6a5cd27234ccd9bd00d1b1ec3aeb47a05cbfd5debd30d93ce7967b231282f339d8da01a8bc366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0eff2dc6591ae574a2210d831d052ea
SHA1131f48a4f1291620e4332d28bea3009163045f9c
SHA2567dd133eafe0eef497e52e66e99b9fdadf27ecdd1d8994aa60b020741de4ff1d7
SHA51256ae60aab5666c24cad8692951ffbc43fae79b2d18ab9acf95a9d70ea90e2e088043916f89f349e0f3b94b7c1bd9639902c50885bdf940c6c9ff3c7c0ffe805f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9fe9438faa379305e231b0e5670f442
SHA1bf31416b18d216c0653f8ab12c5e95f7093a8550
SHA256687d661da3738e79fa7d39bd2babf4ed8b17861af46d745538867ee6583ba517
SHA512095c88646b20e47c8060672258f08b402045698b5903066978de0d96be4fa209bc88e9c4a3c5ea124f6e66114b0aa4ca50fa5c7b5bf7632760cc54eb8f3544aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5339bc527e6e26e6d5580a30410a82a59
SHA1a5556c18a67a33ca08699d1eab9517f316234412
SHA25654a842e41cd764b4a2b3dee1597340cb54c45d1fc58a58709b6b4ba50673835e
SHA51260ce8c911b9cee1fcb76905abc908bf5c78586bd283dafe23b3949ee8a81c6f724a6e24e1e25d93074bb1ab028b08a131491c8e1c9cee20620d3a18bfe60dd1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511b30ca0eb04d8b6728bfedcc55c7c83
SHA1582c8bbc01fc012b3877615617a0f906fdf6a0bd
SHA256b2d9084ce5f2039ff0565bd01e5bfd53980b227025583809117431fadbbdb409
SHA512024ad1ec685cdc93bde2db2a0ed2db9d3a19fae6f02338bbff6f5cc8825d7ba6a765aeb0cab8f0fa8a9286c811be977fd8f25978b938bfb526498cfbd35df020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5161181cdd8f2a535a7454506588943
SHA12de2b90e3564f0dc1b2118def85515b2aa928153
SHA2566a2dc6780344e355089bd88cefa9e1556eeda8c16bb6c51d6137051eb04887d3
SHA5129757756fa0e6ae98d6152131fcbef507246e766949978fe158eb4846ef2a4646ac6aca06fca2f8de3ede4efaf650abdaddf5c8278c2531b436062403fd14341c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f42c1747531c1e7dd039cc5c39e8884
SHA10e7b2d17a311f3cd63de5608352295bb6cd26e11
SHA25665fbc07c0cb560eb5b5df4f9bcedc36cb4827716c7a07249ba0763a908aeb70e
SHA5123017db33228fcd17d98741a454edf06476fa934ee0fadba3b2f985040eb54c8d784f156829556d41a381e34d682238a4dcebde7dbc1ce97c7d810200633585f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe57d5d9e088811d9af7af427970c0d0
SHA1a755849b6ef6923d77423c5606ff8fa6b4fd6a00
SHA256a3e24537917aa0e6705086c53228914c6b311354436acdfab46c8490cd91669b
SHA512243a5670678f1eb7ea979c413841bf50004cdab9b7d1541212ecd93ffbb6d5a5b756af142d2f8b1a6189e1150b3992f5bbc5c83ada47599b5235b23ccbb83685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2c09413aa28d1d7151cdfed12eff179
SHA110ac97cf2e9152b354b24bc3258fb7083792b728
SHA25672903675db1090a3df59df8b4e5330706b0bf92b8695fe31f212ff47dac7adde
SHA5128bc7816dfb1eab533f9bd79fd1c6636ee04c6446fb5bd600d451debacf6562a1d4a8beea81ff9f3d67775657638111e1fa62e7abbeeb30da128e8cfc1039f792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547dcd99c2eff98370fa4e212e564dfe4
SHA1e32b75ac483bfebeb28f2c678f62a25b7c29fd2d
SHA2567e59bd44709fcdab19ed47de4ac496eba1dc63903414d7aed5004cf75767ac76
SHA5128102640a7fc6cd93d7eb0e5e412b1812cd33a914793fbd56d4274a171a118d1a2dc2f7f2162f26ab44c1e1462ee8abd911b64263041977fdee024a2d8e100bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e27df3623cfd2db19f8d8633e0596459
SHA14dcebaba8bea88d4db907c8713d2acea08dbbf9f
SHA256e4189b77429f8e6231fd0d4192b40210418695e31b12362a610a053761a51a74
SHA512ece56b28e122dc415934270a7f8dadc72431aa463458d20f2abb7328fe205b7e10e4fdfaecb2f25bad303b7c933c8e48336b7df525dba3301fd40586df6d719a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5d2b20622933eb5f323cbb681f408d1
SHA124c6105e8afb9aacad730f06a635cff8edb88ab0
SHA256c2570c249711ce27ff4bda1117088879cbdc776283de1bdaab364a801c660d2d
SHA512022e86534a50ab0dbdf178fe6b6b860065f069a754feaf432531c724fa7ca5f4c34bc9ee77f949a656618562dfdb1941271f4407cc7b42dfb54a17c7cc798be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57494a53240a6af00963f85f29053dc01
SHA1bb4a7d911783f4422549c938267a46fd0e56e823
SHA256651feb844d76faf287a54455856082d07cee30cd3449d0787049f95fdfb3b2ce
SHA512e85354c010f7d8b57bd9535f69d54179b77d40789a6d8ad9ae352d51b0cfc0a212216fc9e5d987c188d28b9ac07a078c8c1bb975691a7cbdf071d9124a44de62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5816bbd3cd5468c5d6fb5b05442bcd1e5
SHA1d5c007ff616ad08fb4037d6c8b57b6452ca70474
SHA256063f06231bec13640e49adea220216762ba99734161e61d48a7308872dc6c3cd
SHA512501df3ba699a2af9fbce1e11c1e2aa0200a47c2995f75aa8175b5a0243fad17a63a09bd8b3161c7c1de2110a72e76bbbe7c4cc6c0b873e10d2b87bea52c737b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580d18cb0fe172c5717df98db1fa44c9c
SHA1c02b91a8e201c3a44f9a23a240dd629b8d4c9d63
SHA256ebe561df06057da66786531e757bd2f73799540f9dd2230847126fe0b68f28c2
SHA512b125804e45aae3fb516aec9c6c01800af86ac4a2ae42c4cf8d6fcafa91b246419d1b736e5085426a1e8a7f9b980ea0ae99ec459df94ec5b94b14ccc81157ba6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511c3f58a6956b310cab1ea265551075d
SHA1f773df6ea8fdfec989719d1480eff8ccfb137093
SHA256066a5f98dc9ecbec9fb20ec4fa076b0161b6bc5b42d5e63acd5ca5620ef10acb
SHA512f26c65fc2c9798c402f4c52b525a99df0c0a1b62d16f93bcaf83fc062606d974e82286101b658f84aa94ecf0eb2aac4c9b36d67f292f446a8c9cc914c6d4430d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b