Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
2931392468b3140086d1557eaedab84e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2931392468b3140086d1557eaedab84e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2931392468b3140086d1557eaedab84e_JaffaCakes118.html
-
Size
53KB
-
MD5
2931392468b3140086d1557eaedab84e
-
SHA1
81a9ed89612a6d0973dcbe6521c4c8c29aaf6035
-
SHA256
a9e7cd56b10bf9f7a289c49e61da88f0bc9b216cda1e676a36a73ae7d12b628c
-
SHA512
e6367e4f3550b570ba8d934a90bf579393365fe743deca51dada44ed3d2c020bfd8011460d97d3570ef5d3732b14326db9ab9ea003c3e2bd6e83e69f1499fdfb
-
SSDEEP
1536:CkgUiIakTqGivi+PyUTrunlYK63Nj+q5VyvR0w2AzTICbbgor/t9M/dNwIUTDmDv:CkgUiIakTqGivi+PyUTrunlYK63Nj+q1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434630941" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f223c5ab5488f841983cf95d71eb1ebb00000000020000000000106600000001000020000000ecf48c3c8fa74133613900373564f0ad2ac835dd77d85b1aea5ff4bc168ba8d9000000000e8000000002000020000000583b3d0706d5f4cedf0a367f7acb39bca46ffc0e6dd9ef78917931a420a51501200000007b74390d570f83624a6d3e62c51e801d88e79c1f3101d7c421e91628ed60640b4000000033c26ad66d6de89d7544fb78e6a2aea5ae9539d45977a702d1e497d872800dc617dbf1b218c4b11c321633a1aec5748553fc05d9030ab2f1814d812884b5b19c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90881b96341adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BEACE881-8627-11EF-8BF0-428107983482} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1864 iexplore.exe 1864 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2940 1864 iexplore.exe 30 PID 1864 wrote to memory of 2940 1864 iexplore.exe 30 PID 1864 wrote to memory of 2940 1864 iexplore.exe 30 PID 1864 wrote to memory of 2940 1864 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2931392468b3140086d1557eaedab84e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1864 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55521a7c8f06155b00eedb3dc5ba6a5b0
SHA1255902c088dba64dd29fc44bf8e043ca52a76a09
SHA256c0e10c5d54c4eb681320eee39dfa8946dbba2756cb3fce741a8fbdc37939513d
SHA5128d5fa55e8d081519a6536e1217f766e3b6e938c2d00d632d495b57a2f0e5ff8df7ff6baae657da933276599529e2fbfd67bc6b78d55c50a63682b340494ee1b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a69021ebd6aaf219beab7e289047f9d
SHA1b62d33002e82c95fc5e8c093d4cd6a8fd895860a
SHA2563bc9870a9f283db52416e80e5191814553666b89b22fe9c56d698f05f6a558ff
SHA512398b2295302978833062b5a81f1ac9fdbf3228cf336789e238491a56c16cdfefad9569dee5a4df7172fcaf098493dc698babba982536cbf8bd3f6dec6ab23b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0afa6990d998e6c2970365288f79c2d
SHA1fb75bb61d16758dd1d21d25fe20218868760ee34
SHA25612a224b508b87190601e6ad221235bdfdb7315d0c3d2cf36ecb6307d7c312a79
SHA512c4d5d4c495a198b1e458f77ea58f5f9c4950071c2e1be7dc7f939fded1765fe8815482d745c917138c9a20c249d42e4bc759b789ed7e53de6ad4817575babc97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57006cc9b3a17f11d5628057e64aba666
SHA15bb1e988036c90496715402ae9061e9dc0fbf32a
SHA25640183a2001a10b2ba525a1c19b145b37ccf5064b7444cf380b75c2a72d89099a
SHA51263f60ca6f4f625cc8e2dbfe5989e8da94507b555630bbb8aea5dfd9680998a85feabc6dafecd33ddc4ce673cf562bc70aed72cc2957857cf959cfe1459413f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5261744a8c4f1e629d08fbad2b87a12a7
SHA153da3ff89d86bc0b4c1ebfccf0eebe0f859a6ccb
SHA25672b294143e066469ecb64bf06e4e8c733623ea7f82139c4bd7b86594cc0582c1
SHA5129db2d1f392f099eaf702e0213d0ed9fd4d8a7631d7d90e0166cc4cebd3a53a3fa83a4275a94d7cca290496c7fe940a63a904bf283cc7682f2c4fe7fd03562e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb19aed82b0a83df2048d47cbce91f7a
SHA18aff559db8dc0f223d8a87266fa3d313247ad34e
SHA2566574596f38f38262ffd2fc2cc57552dd41b8cf83f614fc2ef44b11a7d11bc648
SHA512534dacbcd4573bfd6848a54493e27e1fcc9ed83513517a1a01fb96c4fe44816db87a8e0a6d0ea08e0faab6a201e9a78b0c6d0cae00f8bf658e01943f4bc6a6ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6af0b174bf8cf8b05a40211526c1794
SHA14898326b6c7668daab38c20c07e6ad09549919f3
SHA2561acee12807134fd1267e67fb09b43ae849e116e0a1c1b657329c0c15970ad1db
SHA5129264e9a7379933ad688d8954d8c73909d1ceea222153e4d19b65924ed0c0ffd0aff1e966f405d920b620bc498302159e40918c88fc0e104070b0ccbc10912bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e558ed7e2d07ccff5f46abc728834a2d
SHA14ecad6c8d5a01a93452b93f67c75585f30afe527
SHA25671755db871c81b119dd109bf52f735949511909b7ac08de5c0e8f6c1d1d56b23
SHA51220b59168c44d764f785a0ee731856c5e6c0cc26d0cd883c6094a73e3aec3c9a7fab87d1332f6a5c5250786e5b67d13cf24241c50956bde50460f7d6b3f00c52d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bdf9306c99182c67f946d459a221f9b
SHA14806977a2fd0b9512cc97193fd404926a2ce70ed
SHA2563b56e2be972448af4a904b2ccc364c858530a3b00395d41256b9623f4ac0bf8b
SHA512fb01bc3b73559c7e64358096e29f2effe481d53f34d3ca818b212ed93d23780d7156819b97fd8a5cbd9935b262043971a3a22c9329b2799fba89cb51b4f38b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1933d331853af4d5cc6e0ee9a9c8649
SHA1ee2a6a3eba241bb635c0cf3b8bd89cedc7f47eb9
SHA256cd06752ec96836c28dd28d239d27c15a962289c25f7a285afd09849c50b7cb69
SHA5124491f78664e2a3b9c59bc737270dccd1d0a424721c0ba8c84bda4556a580f878bf3bf2f43130951bc90081344d1867723aa62c471e4e6aeb8c105b178b663fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cb03cd419a165b5cdace883357a65ae
SHA10a5b9e81d3ee74208f44dd062e9b27f0dd3be90b
SHA256cb58d49ca5289e172e5ee410d81c6a9b884e29468d73719a1f1f41e976bcbd28
SHA5122ba4f8e28832f982aa629cf0c9e09c68abb74b7db90a2612eb45e04a7248c90c31846e35c6fc11122e723447108a588cdc0cd161274dc2c3c0d0f7f8c7809c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6eb2cca6bbe3f647d06395d754a6572
SHA1c3f2031fd0cc60f9621266dba47f93c0423bb49e
SHA25607c496acd932b63dc90854913e3a85f3ce2cbd0483240b8bcf80ac8acbc53466
SHA512bfb2f8b0b4f9155151131b10b2f77951233baeb762464991e818bf367950fd6424d2f9ac65c1353abde9fe33f1b94896f111a214fc195014108f404cd7639e16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e6a376a175e80e88debb56d213add40
SHA1ccc18515146af0ad6cf4c2e06eebd59e66234a64
SHA25697032986dbb9d2e27f95ead6e48001e58efc5c689acf696b9863ee96ba0ba3e1
SHA512e9d67b4b21ce6f4b6b6f7ab99f53504b40175fcf926b9aefe9b64a70c00bf7b38caf676b43b5f0f2920b2e9ed5dc609747690b9533960b9e8315cbad3b5b8c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5073eb574775a673f26cdb56f4251624f
SHA1d7760aa30664bafbabd7dd60f99479229d68a99a
SHA256cc1895c6ee0b73233cdf0fe498aeee4fd62e74dbb9d88d22dbed3ceae6156acb
SHA512b588d37413209bd4a069e92a9cd7c942b3e50ed2280e3c0b53cea7e8df37549828f9ff481bf77d37cce8368b34df5f0c19f0b4b18ae0361a6f9b0b26751fe666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f5a30a15d07a69f84c35f4a95108fb0
SHA1394b459b491ca614a244cdc3226225602b3370ee
SHA2566c6354c5355aa986123b2f28658b7d2928c851ae9856464e546d2cfd2081b2e9
SHA5122343262998276f2f3a68f91d60b030308f9e407b5a2bbafda936f5009197f906e1a25fad6fc8f83395ec5fb01a9c9e535db22c928063f0def342e79106b4d528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585251b239ba7f67ddc49a86942009fe4
SHA1ab5d4e7aa9c0d58515ca540b8ccd0437f1bcb747
SHA25690e79b6090d5553352fe827bcf526b31e2b0c9648509f92b83728a76fef11b8e
SHA512cde7240c62ab27e5add17f51f45d209a941dfef9bf4aca23ebc4c7b246ec8bec97762a3f6c0ea58085277b08eefd246829448cf846e0f6d7952613faa3bfbc69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5735f15836029def26dfb36b9dde69963
SHA148e405ec44766d9ab17bb6655e0227d5245f3acf
SHA2568522a0e7def59195525b8c5f1f997c871c21791dadb977355ebeb2760cc44c8b
SHA512d077d97ff899686d1c80ba8f09a52cdbea74ac821c5546824b23b1841fc9a6ba9e2e808940ecb1206a44a1085e71a13947ddd1189853b7533a3a05771645d81b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5251090b5341ad10e5ff5caea79c13893
SHA10b193d534c1be9d0d86d3ad0da4c2ce4fee4c2dc
SHA256bffcc66a6b2d520a4885510bf2565afe52b0ba3b1bf754724308a3aa85b991fa
SHA51287ccbc07d77445c28f4140b2e95dc06abcc48c0392378c97de7a6e9531d37825647c9ae9e2334e305aaf91a6b8c3c590158b3d0efbc0643af23643d85661fd6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ec06a1d845a35e16b984eab043646d4
SHA1a92c20292e4c409d8ef0a4fe86b7cd7742ba34ce
SHA256ad061ea6971bd0d11af17fa5634f758a4587fb2d5737b35afe6d86a6bc6a4971
SHA512555f2da1edfc458a173300a5c12ffbad2c44e52f4d975269cf9b886117960d0d4751264182208096b966f844bb6f8af4607fbfed68d37d34b499b10d0b4e8ed1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b