Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e28b25919b903c1f0ddecf3c505d2bcc.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e28b25919b903c1f0ddecf3c505d2bcc.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e28b25919b903c1f0ddecf3c505d2bcc.html
-
Size
53KB
-
MD5
e28b25919b903c1f0ddecf3c505d2bcc
-
SHA1
fce2bdff2778487fe964a1c48087ec3808b631a3
-
SHA256
aa1328bdacbe4fa7a1b12fd5d011a0f7f2590698c8f19badc6ec90028f58494e
-
SHA512
4ffbeb95c357b20e4f03616d95333c2191f5c2f6af733f56a224e61e7d5f6645ac03e226c1b8c7b79640cb330fa2417ae5eb9a84ec1f9602ca2d725daf3f3073
-
SSDEEP
1536:CkgUiIakTqGivi+PyU+runlYv63Nj+q5VyvR0w2AzTICbbUoA/t9M/dNwIUTDmDY:CkgUiIakTqGivi+PyU+runlYv63Nj+q7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003c3430df6b59d64496e2adb8cfc2092f00000000020000000000106600000001000020000000f66f61790c0db9f23846f1b4e0f4824558e29bc95a5f94b056f0995dab6bcdc0000000000e8000000002000020000000fdf86808c2bcfe0eabed53640ebe819f89dcfd99a204552cd32769051ab13b3f20000000ac753a7194ada2cfe9f656f6c3265611195675ddbbd7898e349ff5d750762f5c40000000e2c698f0080d5cfdd810c19bcfa6a7223f7d7b805d647ce74cb270e2b3c82c973c600e64de14556cb4a717d30d37e17fcb8cece02b9c95eaee828d34adb53ffd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3055b20a1b6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443526014" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{335BF811-D70E-11EF-9A84-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 1792 IEXPLORE.EXE 1792 IEXPLORE.EXE 1792 IEXPLORE.EXE 1792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 1792 2412 iexplore.exe 30 PID 2412 wrote to memory of 1792 2412 iexplore.exe 30 PID 2412 wrote to memory of 1792 2412 iexplore.exe 30 PID 2412 wrote to memory of 1792 2412 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e28b25919b903c1f0ddecf3c505d2bcc.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5537c7f0888f9ecb83893b086a2b87a9b
SHA110ab0d1ae327ab6b6973d23dbf59de53d1f5225e
SHA256df9ebd73991d25b5d65a07f28a647f4c679c702ae8d233e622da470f4e2675eb
SHA512b896fe2d561d460d9fb290990988bec00b347fbfab07eb477bccc753e26dbc84da28277710c2be228c509012f55bcd876c6ef544c0e6bc9ac83fb7fa4fe51d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f826b5bd4a02f087dcb832552895e39
SHA1cc04c3784b3a0757da3df31d647d9586f6530741
SHA2564b1909cfecfbcc7cd90fffa273c18c6597570363e2cd593dd2330c3631bf7427
SHA5120af7f3e75300a06fff98a2463b039528cfbb0b27891ee4eca11028e6d4fd900df5f044f6792ed146cbe9e96b38aefc2571528eb64c80c9826105d46dcab726e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9177dd0f95873abdc47a6672c00a98d
SHA18d2d3b838461a1690d70226ad87c3f48dc841a18
SHA2563ecbd9479078c97bbbe3de749413c9df26e1104d723dd5f8a7e2e1a7d811e41d
SHA5120dfcdc50491484196d6187463df3d7f57aa35c58a5719a5a32bdbcbbe91b08d2d89b2dd3f8435940b62dd8429c722dbee16f11a49525783bcf0178cf14043393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533a2e41b5810950434f12ccb0c5e349f
SHA185cfc7f75d504cd3fca3446a12d30f23edb4cec3
SHA25604a22d5d14f2924312625fb9bae064f41f3c96a028fd3b1c0c51fdec5495bb3f
SHA512f3263b3bc5d917c416a125bc06bf7e658ca54e828a42c1f84ee63306aaf9abb8b168994b70f888698aa951c9af8b552afd26907246f159ed06038e5358765de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b3c5966c1b787f0053d0d5420a8bbfa
SHA139dd550036546bbc005be74368271e3f55ca6143
SHA256066d330a990ff88664f66dbdc30dff472e5b42afcfc727bdaa8b234699ea10eb
SHA512e9a8a9be56f11aecabe7b1600378277741404e73af372e2f794fc81daa5c128d430fb5392371d95dbae4645acb75e9935565e1af856346b6b6e8db19e0fe539e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbf5c96fe4b52c61d5c51e4e00d6979f
SHA1f8596b3cc4201a41f875e6fba35cca4f5ab8a00f
SHA256cdd5b484a606ef9acc307d9801d6a6e9e6218c2c674c0f52cff9b9bdb106ae63
SHA512353cacc5628c118dd29b43d35d361ed8447fc528dcf8d3ae9feed30b9883f3252fd2cb75ac1978453f298851b26aa627caa3d3ba1eb221832bcccdf025e937a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51df89b4561a140f55a3a31bb13898b6e
SHA17a54b35716770c66a50451f758a9e3b8cab2c57b
SHA25615c5c00f6c57270d781e17db0a4c232d2cd7269c4340366db572c229adc5b05c
SHA512f353b1a061a432eb6d58287741be1cb6f514452595e8913001f339bc6dc5146328762652dc197b97eb7019fc5ae55dfe33a7749d06503584038e4cb05a0167a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efd67440cc93eccaf9c7348ef1cbe694
SHA13163b6a57f498586e53daef0ed2a1cdab71d221e
SHA256ea93fc93e72192023c2e36e86086904eb774de11a884f139be8ccbd210e22167
SHA5123520da65e17c47e212d924ef68ceb88a4635e06e06af8e0ccd0c08c56898e65d43db2c6870bdaa225f241e961ca1c86331f6ef49ac9a246cb721b74a151ef4e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549a93c58454e38a3362fccb07cc727d2
SHA168af0cf17b0f655b03fad982d39c507a6b45f08c
SHA2568c0c3a55bdd032fd9a4ca3c24b9043337ffd253cf89870f90b3859cfea83c0d1
SHA5128beb295f698ab0e05a05b5b6f4de0883aca4701bd8accafd7ffaccdf195b97dd67bf406ab0f4b65ccedbcaa325f5f38da3cc6a472ceb9e38db3c40d25e8830b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505d04abe9855d20d888774f3d8e7e148
SHA13ac272b9f37da8fdeab4044f1887ed0a5efef407
SHA2560d404480cc69c7b5689b3aadc32f38d7e28f24736f3c71e69ecc6d5ccaf56fee
SHA512822df8e5ced5004e94c1008ac86d230f00a532fbcb535461d2f3332c1ffbc4e90403d1f7c8aad6a429a4fecf3d70edd0e4ba1ccbe4b43134dd924a5b282f8db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506efce72afedcbaffa19fba7859fe833
SHA159b928cbc1507789243ca62194e5a57eb5c2e442
SHA2560c87487ed48994977f6577627a83a171908604190a8eef34f035ea4cdbd7005a
SHA5124ec1717e63f4cbdb7c7bdd8d6bb660d5712de17aa3180d4331ca01969846ee8f1bb22eb0b8e97a7918f56fbd93d1555c53e5220e9d10d27ce115b55366c7ac23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5521d8503872e52f80f91392be715a3b6
SHA125c454fe70ccd83ac24d27e19c5ada807bb65d22
SHA256581db97263442d64efa1629889edcb923d2987beac50a8cb58174ef3b2d7550a
SHA512a29d37453fd8edd79c9bad08c8e4211ba70ed7a385d343488e5f3bb63537e72457eac5451f5aa8fcbf2fab52b229ed695a7751248256286e28aba21ad3dd62e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5702386d74f4fe65176b8d6512abecc06
SHA17c5fa3a521b7bf5d87a671da080b3836018e0170
SHA2560e2495efd61da3b6711f8b5482a1fe85936de065e41eb5b614eaad9b32261cd5
SHA5122beac910972eb871a8e6240ed60ef01559caef678d31be73a96e4c016a051b1a317f59493b94857b110d9fa7c3a8f7903fda581b38ca0ea969e80fc39fcee39c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac90b8ea8a27fc35c2f7f922d0e56acd
SHA1a332b37ff01dfa38267a421ebc5c4b7f1de8f4b7
SHA2563417f0b2c0297bec398762a1f0ab8f3e9ece1b8149f97db16103ebe7705ed372
SHA5124bdeb16209e2067fdaab307ff2e3eb00a8278aec40cad8ac2c8a8c885044eeaff08c4c3eb047da78e92149ee7b431baa56ceb0a44e013aae689da7e62f4939f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529a05a00fb10ad4fd0e915383dc9e61d
SHA186fdf48912b75408dc06b5bc4c858343c5c17743
SHA256965d2cfa21039cb8db74131ab030c8190a58c27c875fa6001c7861a30e1ee2f6
SHA5124cc52707ae37b4dd59e3863405965f5134f93049ef316767ac2b39887399e06318b21def03bc9f92cc89ba5decf4d472ec8651f0a30871fe3eaf884c7f80acd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be54871054318e3f868a0d2ff41c4e52
SHA19b41bc98235bb39fd99511098dc8ac8dbb450fb7
SHA256328054839219d63b75ce728c996b213e28dc6470b3b6c5d9efdf901f84d50cc8
SHA512fbfefe67a6f8caa0a8fd1778d619c1450a2f7ab9e5b1ca21a530217bfa91cb7be90bb440dface24424039ac2f58d07dd98a81c4c210963e8606e2df2df83bc28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ecfdfb89b9cd3de6c372a081c300bd7
SHA1495ae54ecd11ee51001d2d91d1e1f32400d9e17e
SHA2565c255eae6b9fde9a4415e49dddbdad37073dac5d95c6ff6a56c2cfb5eea563d3
SHA5120ac8367d9874ba95822733169d1df9818741991f65d945c5994fd31a0e2b9ee185e75fa58b8cb989adf2c77d2b39ed3242e704f9446c86778f85954cc0dcc41f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567b6400b3590c479a5b5427f2b4613ba
SHA1f8e29128ee91a1e5a91279f87f737cd73de9fc69
SHA2560c383970eee5a26c9c4c4360a909e97e332e1ebda8d626ac439c2d6cded2e4db
SHA512043e9eb50e6d9cc861de9c950f2d5622bc15f9941e1a1e433361f1b4539cd8a24fa802fd7741694f745b3bf34fa6a5af40d3e3cb7a26d8dfb5583ae7644225a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5490f10f01331f4f516427cd78dadbbe4
SHA13ec5c8b966fdd6aa0e58007f68353eaba6b71e06
SHA256a01999599e67bc7acc610dce689b2dbf8e698f4ac960a649d08fed0dd9c3cb67
SHA512c107bcdf9219519dba84328b408eeba01f5698774eb64479034aa59215bd3443929b7c95c62385310e9f00f55a4ed75c1bdfaad8ddad566b789bbb01619bd767
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b