Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
2a78151fb421080e2009988a58070019_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a78151fb421080e2009988a58070019_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2a78151fb421080e2009988a58070019_JaffaCakes118.html
-
Size
86KB
-
MD5
2a78151fb421080e2009988a58070019
-
SHA1
7f56479f2177116ad3dc0c81a7497dce71773441
-
SHA256
9be3aa38f9c0d46a54fd6714084efe3c8124ae76ccb7a8d3088710c14834d379
-
SHA512
c965cfdd1207d655d58688b0cf3d06c28b0590c3cea0bc71ada482526bba29c0665b3e79baaf9ea05241d3b4c208dae36e90b84f60466d2adb6f4c3b12029ba4
-
SSDEEP
768:8tZnXyGA1oVoe4XZMlN4DF2YBnRY612OR0W6YsjCDsahg1gMaxLZ:8tZnXyAbYBnRY612OR0W6YsjCDsamgMk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0294ece4b1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434640866" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB0B0EA1-863E-11EF-854E-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000002122b824f1bd6d7953d1c873409ec767fe06d4d182b8e9670d0e654744e1dc88000000000e800000000200002000000040f024774d7956dde8e663c128bb0683de32a5c2a5725d417906e28253b8c720200000004651903ec8eeee043f9eaa65af2c27fc15a30351323c03576bfa7b5ef4c6905f40000000d00171fce137a553524586fdf6155a5be734b5500e3a7318e90d719e2c8b67f3e9663563df9cb67e3edc62ac04888ea6636f9093e19d325ce481714085889f2d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000be6cc4d6ec5db9f723c0e462d9c343ac5e040c4c59d82b2d766b2a4bb20dd50e000000000e800000000200002000000075768c621b110a6355a80c1367de83830410b0d5a87cea1766b826ec385a3397900000007b83be23af53f14dbbcdd639a6899a1bfab1afeffc3c2425d53c1b1c7a584538cddba2beb58c59618a91da8bdac9649f78c08ae0a002401588b1240a43fd3312c9acdff9d5a507f1926b477b121ac006aaac36d5f7a25e4b66138453299eba21140bad9a43de4d053248fdd9feaff2c6edee39275f95278503f74e40b830e442dc7e25157a4447d518c808898252a661400000004d5f280f262b9e441abc32183344d4f0e24b9e44439842fb9c702e5e4c08a93c1507e885b77db5a2c2fdbc89b2210ff5d55e899823f532938129ed203f6678e7 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 3060 2512 iexplore.exe 31 PID 2512 wrote to memory of 3060 2512 iexplore.exe 31 PID 2512 wrote to memory of 3060 2512 iexplore.exe 31 PID 2512 wrote to memory of 3060 2512 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a78151fb421080e2009988a58070019_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a212ee42b066a1d09b81e31948bb585
SHA13f9a9a602f17ce626c9403e1e807816213ea2147
SHA256974b432e209e0cceda6c221d7fdb586cc2c2c3f5380e5786e02575761ae59330
SHA512fe7b5afec1f9fd98625b4c1fd3605eb7ae7137cf6bd4fc9b622a7cf30072d47e6c6a7e26dc849667440aed96ba13966452a6e2bb91ca9ca62258ed6f5790fff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571904b1d7607a486ca99059d17649cc7
SHA1570ffa8c9e391950b81544aaa7cdd12b0a4252e1
SHA2565d443b93b998b5415b82086e0fd2bd9c18dfb85ba90c08e9baddea27a98577d1
SHA5128fe716a0e05c6fb2377d44e16890d4e01f0873a1d0f87d0491bff49bb553e5c830aae690a7b19d488da819498853f9f9ba6af9d8831129f206242c21c099157d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5938b0ba9397e6763b78ea573105f887a
SHA175f3c37e80bafd5f4db4aa12b0c62dd81bc44919
SHA2568464daafc0f1c74def08cbe09171c9df10ba2660e756c5fd0c8d64fdf77e2070
SHA51202a3753fae2a03c9b3ea1df2fd01e6a65ce7001149752ae532603efee62b91c3931a8f9c7a2688926be710850fa48e1197ede790493d017e9bd53d9aff336037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb91c5310ef47bbe3b4176f2c639f0fc
SHA181715d61f49587dbd795d449c4b17c32bf8c8a8d
SHA25683fd451e206cde558a7b9dfb8f04523fac1943ff7247f3051dc50e6b94109495
SHA5123074e956c1df974f0681a5debf3ef53ce8993cf65324c6593d0cdb159b0e57c130b22141df2f7a7355964211f724dab3411099dc8b2ea957c122509a2ed5df41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c337d2315939979f8c9d9b5a65f855bc
SHA1170af1e42b479541fcb470e03cb85fba16bc9393
SHA256dfb463acad8988c1123d68f78043d9ca22f51bbe4c0abe8f7870590ea3c48eb9
SHA5126bc7810e84462dea96c300ba01eefc5806b7e721a5d712423a22f3b388d08188c5f45fbcc6ee915dbe2831a758a0ea1dd89a475365cf4d51045615346876d075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0de81aa8a06a8330829327d27bfe402
SHA12436565b41106eb1f974a5c50e61a39f83061640
SHA2568d81e7a80ec6e74a40ae2d5196bf3fc4c3480869daae814d8443ea2851957fc4
SHA51261887cf5408e422b97e626b971fec6c557070eff37ac1cd1de5bb199c4a31b2c9c5e186a884a087518c0aa69d864ef61554f50c5f3bc37c46b315ab4ea0f6bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58943acabe5f1c85520a1b8d4be0954e3
SHA1307473ece0e9537be4e00770167d6d403ce336a2
SHA25603eb103f5b3591a4762f5cb292a6edefde12b057891e2098b44632580588d785
SHA512bea76fb1f0438f5463f4023d405eee7df17d624bf2f25af1947fff2f2446eb6bdb61d4d83e4134f18e7932a893a4bca947b23c35f12146a53f0a4ff609c23cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522abf3a76bb8d80516387965340f043f
SHA10cfe1c6f0dbba813d1233fb5d3aea3c408f75253
SHA256dc3be783a69b97055cdbca4309383c203d69506d1aaeccdc1e7baae52cf68a69
SHA512f200290054999f483d8ce4ebe7672d9ee3f6a374ba887c6818bd6539d00c0263ddb9482cc4c2ea4a0dc59dbf70b9eb5f3638e0c6ef8265ed3a5058d32f24d513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c3a0f88ea86187e4c73280a315ffa7d
SHA1a543dc994aa0bd6512257e9d385fb840e898245e
SHA256dace979820037d635361c8d4fe2043e62a1f96860092ad3e0329051f1b976c06
SHA512fb60a4689003750a03e61f517ec248d3a5b12e32501d87a093c65f60c54b83d50011268d50a98ea8af7593b4f6b8370bf243678e64a497f0af2e942336394c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f725caf7bcfdd8c697d2b8619fb1a25c
SHA15a4c7321f65f0c98c757724693648a3a03f00ed3
SHA256eca760a75928d949d7464209590cc41f0b959df4ff170c0cac56b6951a749f4f
SHA51277fa96f8fd524a79021fbbb97646aa73f25f6733f63649943a4bad13aff2cb33d1e38b3fb4c82c6bee685fa71aeb58c8ae0d23a7765960448ccb6a7349bc762c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5853d5e87cb22e20930aac3872bb5f697
SHA16955dfddf66330eeb59d8cb4b9c3facda5a93173
SHA256eaf2e583f77c05761444a0e4fd15eb5b6fc53dd1695dbc31a4d5ec8436f8e9c2
SHA5125101d4e0ccfc1165dd14879b1665c2bd14b5b4845f7cffbb5f90b84c94cf30e13d232efdea8a344f9289bd465b0d1114ca3022117d041853074e1f29423e09fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b5ec1ca55ae106415385432e60d353c
SHA191c8a1b0fd7f0e8a7307f2c9f3aa53b77798fd4e
SHA2567613b740ce79b09b67213b2a4c6de06c8202c66fc4239ada6860875300c0c87b
SHA5120eac2b42cd5b9e88b6a5bab43475115f7f606f3c4e9e8210b949aa194dd678c0ab9b3ff997c745ac540c7e00ef1dcac0a8a289d315b3dcd7ec09abfa052e74b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57837fc99156164b71f5dca93730d45a3
SHA166dac7b76c4cd586ac8ada3f40e6835e1bea8159
SHA256a0a72a1eb0175fca3aac6449e7c327760abf90d5573e8328c0c5e330e3670dd8
SHA512646969d03b2855daff52f92a6ef90be91bd6ae147d3bc35063f9671f80fd71a6c29fa336e98cdc99d3cf85dfb871a6ea4748367c52de4fd52b90dfb8df990d88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572fa7d27b314d30c13d453b21a264428
SHA151bca5537166f9c246cffc101615fc0c9ac099b3
SHA2569080231c3618e7c42017ba2cee1d69afbea89e796c70b2a69ab962310fe2c485
SHA512a10cad3931dec2d9a00b38427660c1aa1c2864d3ca8481de4d26cd6bbc870c23f451a958532e214cf10c2cfe721e1575aa69fc1abdea7f2cd32f100bfe8ae583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d85a94e5038938181764771f3cf0bd95
SHA1a37d46b6cfd784709dc023f1fcb39fa586d4dd15
SHA25617c8b683f479faa67c767c933e50f3f5fc04ec81d3a4b01bee28e898611292aa
SHA512d5a058d73587ddcfc2a892470bdac54a93d2b78ac9c33eed4ad1dba5693accdaf412aeeec10c37dea30616cb7e0f76ae5f4708f56ea73a3f40d4bb4c2619488e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee6f7119242d9db8676d42a3cc98e6d2
SHA1d1b3bbe4e900ea62f7f2607d0fbb2a4f197af3a3
SHA2569405abb46d75c222bd0b02ea536716168c50d165a4c1abb0364b7688cd3cc793
SHA512daf77dfb5defe2f953c4378637e4f2e18b207c64933aeea806806d028a667463475cb358518915bf2b3719cdfad73b451bc2b8245182f983d781449440b80b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5565cbade408fe7a1b5ef345546160ced
SHA107ec2bc4918d59864305110be0fbef0335024a0a
SHA2562d89e43126bbfb463d3e881d7cb8bd69b0319ce930a019653e15e762de353322
SHA51262d8d51fe08e5e7f4d5cfa4c7a51cef9ba1c53cd20384c9c57f1913db6bd55713448ebf01c2e2ba59e7e8643d73fa8462d491f713acbb78292ae5485eda63ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59be81da4f5039473097f9337666e2d01
SHA1202e7ff2e70d36c24adddc32caab4810d576b973
SHA256c4175734995b52c8ba26390665aaaea9bded650d9f7e1345d1cd9554ccdbaea1
SHA512286ff6f826cb539e16cf4cab7aecd88702cab73d2707cf289c3cb927ff2ee689c30547e31ee7b24003321f1727dbaee27175ae9dea306869c1b80f56fb852886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581ed7b3e881208f86ae086e2435e5806
SHA1000314da57eb8f25eadedfcbbe8b9f1f8d268443
SHA256cf217be6ef8c687877960285f3426b7597f0f39097e22d88e247438635fd3602
SHA512b58a17810795443726148da593c10a346eb1297d8046c8742a9c17951471c1c5c4e422f68ff851c12b6e17313b6284db0f0f20b5ea8ac430093b73fefd716ec8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b