Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:07
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e287cc33554ddf665bfa355ecaa9d79e.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e287cc33554ddf665bfa355ecaa9d79e.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e287cc33554ddf665bfa355ecaa9d79e.html
-
Size
53KB
-
MD5
e287cc33554ddf665bfa355ecaa9d79e
-
SHA1
53e684a062a92039d6ba5bea43eb3e2937dbf512
-
SHA256
4f745d16013ca8886932e5e5fecda6407bae9a3f8688101a6583ba744525d0df
-
SHA512
ad4e9c79c0d080137a888bdbd290d5ccf9d3f0273e70c8331d97bd04c04466c2faaf001b6c5711b47fd44c054f762d6a0880d3ddaf9944ed274f37573cc018b7
-
SSDEEP
1536:CkgUiIakTqGivi+PyU6runlY463Nj+q5Vy0R0w2AzTICbbhol/t9M/dNwIUTDmDx:CkgUiIakTqGivi+PyU6runlY463Nj+qz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443525942" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{090C7CB1-D70E-11EF-8D81-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcfa16021167a47aa81f81453b3988e00000000020000000000106600000001000020000000f4308d4eac4dd797eb9e2b9e0c190bbfb937153d71714f8594a67a4e50750f04000000000e800000000200002000000079e89247e39477b4d843ef1309541e1b96635b3f0475b278ec061615b87808bc20000000d08dc65ec7767dad504b1abe9435e8c607a6d5df1368c0ba56a205c36f7071f1400000005c44b2b6f5a61f437687c6694ec757c9dc01128039169f2afa46c21070be58e045156673baa711eaf28bcde8cf497f531572b9982fe12160ef0f74ead2cabcf4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a04d5dde1a6bdb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1552 iexplore.exe 1552 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1552 wrote to memory of 2820 1552 iexplore.exe 30 PID 1552 wrote to memory of 2820 1552 iexplore.exe 30 PID 1552 wrote to memory of 2820 1552 iexplore.exe 30 PID 1552 wrote to memory of 2820 1552 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e287cc33554ddf665bfa355ecaa9d79e.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1552 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c6019d60889aa95dd37a266808d0dc8
SHA192d1b7fb6cf747254492e97a0639c2100b87ade7
SHA25636b8ae69b516529d258946824946e9c2243226cc96f85d57601df7b846c57b66
SHA512cafbfb79956c27f02cc4ee82d04058e31851ff8f436043bdce71b5acf01de63e7ecad5c0302cb8c33781f58dd9e99c1c40a50d9c44c487aaf8f734972ca141f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e37096629d9a4afe0f2f1271070b6072
SHA17f2c811e1c36ab85d532fdb0079a3ecbd302fa75
SHA256dc5ef94dcf0f3fc3bd48d72d98d0a5bcd6541d606365ead23adea44a1901589b
SHA5120f4c776079dc2be11ef792c0d15bdf9e8200d9b8837408d5769198bf919aac443f49959e7881d0edfd05c119dd3c043527fb5d62e0821b1053156f6a0251c3b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575df9e19e2cbbd59bc2627e9c840a205
SHA1aef1325feeb8d6a9cd63190826bc646025e0551e
SHA2561633f62c69f42db5f113aafa8589cd64f09363565c743b324b251359fbf72719
SHA512dcbdb9b205722f0cbc5a8cc244c9ad214ba878df667b91a14baab480a4c15bb3b6d3aa1568146b1fa703b1ee7f8988c7c80e4130ebd6c3b521ba2a8ceec2a854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd845e8e3500beedc3b7f87c2095c95c
SHA15c4494ef36bea776028c4ee50575392a6d3c155c
SHA25631911ef129b4b1a8336361c8d5e869b5e521cdfa785d928d877af8d740e07585
SHA51201d9570798c98cc3962ee9d32e9da3a61dc569f5480f9dac0f318eed58848aada0ee1e00e7b34fc42c050a67119b42e328edb39d8eb08be636798d0df739f388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b8d8ac5a1e494250f3f34f147f6a1c
SHA1cdb9c283d0b616789a09ddb27e3c07e82e0be722
SHA25679a9a1cf55253ead52456c06dfd8c2d307fdcbc2b47ceee2401b93da05510c2b
SHA5129699f66367f3c1e2f93312398d74f2b33afa053f8463e81bd747cc9bf380689aee955b628e81298f5616c2cb083919334340f99d4389dabea253cf69463bb391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddfe8b2cea88b631ecff4c40d66abc64
SHA1f2280dbc29c52a185b3ed1f1b6de230e2ef1f2a2
SHA256d3f32fdf27c5cc39440ee3799919fbfec0338f1d6b6208ec03ceb26d1a606ba0
SHA512086962f57dcc68100bac7839d27f36e19f80ae29c23d44f7fca9f5d779aaf56d28dbb357ad750e54862018661bdeaa2c5a3d057609b1bb89ab9bc12a76734ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ceda1ad13613848317b7398a324ffe6
SHA155076fe2485937dc59e76461f0808c2d63008188
SHA256108d71dd150d13b3c50cdbf98c394a321c8664c9b640bf9725b41a3b12628031
SHA5129d3b1734a671fa79e2992b960ee02bfc5b54190ef6b209ee676c665dc3171048559e7625ba7cc369edd4a54078c9d08a766b951e7e5c99bed04dc0b39aa78f8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514d76e94a58e24f7807cbebabd87cddc
SHA1cf9e9f27cd60f19eebd0a142efa93c9210c424d4
SHA256ccd452faf99ada5464d5310c13e907ec53254a43e64de15335fcf7aa6b3c74d9
SHA5129c614fedad3847ee78ee810a7ae749c1b68bda770d7116fe7b6e297f805e78673a9dee7122f0097eca7ebf98010f3ae650497ce029747bb30e6ceb7054179f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f762f9b3ea0eab44e5437109b05f7b03
SHA15a8cf4b2ff4cbb8eb105281d0e1a9393aaa08c2a
SHA256d1ad047ee72fa5c8e5b4875143c6e8f304a4dc4d4418aa7dd8f89e8664df89d7
SHA512b7d031199b3964b90cde979ea9ada7a289afb883984d053faefc2f580c08e5a46df6250c3dca502e4d09f476c8dbfdf0dea1cfbd1078f73e244eab228c3c85e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfc837d3a814deeafbd20f4893858850
SHA1d4e1a86eb6e435c90f120cfe9f9700aa1ac31b87
SHA25605620add6c240d6141ce4ef0554cb6196da6155416d4af82ec3878386004e597
SHA5129f8a68b653f97e18c6d0567d17749f93460d7c6d1538d507b5489ecb16cbac2b254c4069ff1b647931b1cb219636430f47d40550cb6972c51eae4fbb15dc4e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567d6253c45b6afc56b0bf5c6a2d9b6ab
SHA1907b7927145c124133c41b1df97cefbefdf0634d
SHA25681e096906b60838c98edd35e40247a19ddb88f021b780fddc85caf283935c614
SHA512c659432cc5e0e0762ef6ae0e9cf77f660bdc9f41f0affc88fa9784ad07819032469dba59b570739325e91b4dfff1c4049e406c35fa8cbb84bbd4fd110272633b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eba12788952e488d5abf1a3254b8e19
SHA1f43716b43cf947dc9843de03cdc453a0370022ec
SHA2563602de83665f65350fb7f1cfb431746d0470949b3ad1420921ddad5b676d0e1e
SHA512aced438ef82e0e38c50f454b89f513dd6ddbaf48055ae3bd6d36a4f749458514329e0d448003b66c3bee480901f3fd56a240c5e8b982cad22c2fc3847ebed0ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533832bb9d25eb8f4b91436a9d4183eea
SHA18b49faab0b6ad4100edd42e09c12c65fc7c31d1a
SHA256ca16d6524958e11078db4f5270cebe453c2130bd30c135ed89edd8b1feef0bff
SHA51295da3d5b04ee29170812f3d95cba479da086abd2c2184605ce82e6ea6aa4234e991a49303e8ab21d87f31656f7c93a3a85cd2ecc7314331f30f253c967bea90b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5361f911061144fad8d52b870e3ebc532
SHA1065a61b9e7746ab43994aab21af85e38b092d6db
SHA25683528cfea7c1310e05fcfa7d63732d8f70516fa317ecf6e9742ff495abee6125
SHA512b5e0bd12785e2ecfa357e98de38548c1b533f9df7f46eed051a87538b6853bbe7e131b98c6d677821370bf905256b6b664e0cb57f43ad6e60293f069ea3a3a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5690236e94858ec3fc9adf8c9fd6cfefc
SHA1b25b94ba9853aa7150339bba5a1255dd9b71d309
SHA25605c7b4523b76809c4344d59d2692404e01bac0df50bbab8b376fe1264e5c86ca
SHA51298fecb7d0ea716126d5fdd5342e9989a575118ad15a5901187c5eb6309985cb2b8a040e7d5e6b7eae5fecba9be794414a8a447ffa4721b2cf13d0ce98ad1bd6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6235f23596d494011ad2a0c611b814f
SHA18777c8df5a5c1aab3fee62cf9bae3b2527776ce4
SHA256c795b06e3b5c6d276fcf5be9c49f6bce75e1105196a4123e08d33c108dec8f58
SHA512ee7d0cf6fa4cd643c5dc8f97221efadf62b78b1d5b1b0216077796bb765f83a95cdb1d106051ee980718578343ed42b66cf96572ca97657f17836292322d0ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576cdef2e3290b6898d73ca1e470a657e
SHA1ce5f5cf7480473571704bd4811b0a7e9f67611eb
SHA25632f95492e469e6794574110c89d57b76385a768912b54df83b909112e317176e
SHA5127b60dbfccd30003ab019600c9d064c3760b8fadc624a6f46c6104ba56a36961753aca8a27dc84e732aa6fd7493aba0e24ffa18ac7a4a341cbcdca8cf0dea75e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cccd9616f1a831facfc0a2ee0d281c9
SHA1b7dc69c619097927ccabc42cb5f140b2f3489a42
SHA256a8ad687fa211caf5e43f5e95cb687b11e2d3dec61df88b6221f825b485bec212
SHA512011bfd10920fcd87cf9fb71f7e61f68d7fff5f65348e35d39b07fb07d05fa0bfc71d0bc718946b9171259b0ae3f6e1c5a505438255cbbcf2297d764f73bd70ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffe53117c905ef2694a45ccde8d38610
SHA1222066dcab072f44c0b6616f3e2f2df4cd81ed02
SHA2569a72faf7092aeab0243e2842a4c808291301f26920221a05ae21de56955dbb28
SHA51295c7747a8cd13a99be5e9ab5541c9c1cfe1dc8ec5c089b5754f92b3c6d45fac5bc44654c7f20a3f4f0412de86eecfabfb2e3e096ba87039ec9b5891cba365927
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b