Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 05:12
Static task
static1
Behavioral task
behavioral1
Sample
2f188892bde7bc182055dd774086160c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2f188892bde7bc182055dd774086160c_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2f188892bde7bc182055dd774086160c_JaffaCakes118.html
-
Size
53KB
-
MD5
2f188892bde7bc182055dd774086160c
-
SHA1
dec0bebbdc63b8996efce50997fb6ad04497cab0
-
SHA256
1c0b7c3c44385108693734c2e910e771128fa4838542da24cc824f21d95f0413
-
SHA512
6fb7576d951969c83e0c8f31ebb355c92dbf406ff565982657204064a39403cc82fab10c6fc99bdc097a80c3db2755db262f94e86e390f2053e33ac256d97616
-
SSDEEP
1536:CkgUiIakTqGivi+PyUWrunlYZ63Nj+q5Vy0R0w2AzTICbbTo6/t9M/dNwIUTDmDG:CkgUiIakTqGivi+PyUWrunlYZ63Nj+q/
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ba24b6e4d1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426680151" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000b6ae691541d9530b581c1027801cd1e90a4d579fdbd614fd2d436b6e87e869b7000000000e8000000002000020000000630e75d41137cf2eee997f9757b4a5e9d6bc9ee996c263adc1142f6f1fb41d4720000000b11266b40a08138336075a679028f8372e14a5b1f77815a769ec84f09a05dc46400000005b3d01feafdf6b17041a26eb9e089b6c017bf2611ffc7cf9bc8160972bbb4616e193c60301a466dfd597d5051a0f254562d0496b989ac36bc3bdcdfea5050fd9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF2CAA21-3DD7-11EF-82DA-D2C9064578DD} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2948 iexplore.exe 2948 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2324 2948 iexplore.exe 30 PID 2948 wrote to memory of 2324 2948 iexplore.exe 30 PID 2948 wrote to memory of 2324 2948 iexplore.exe 30 PID 2948 wrote to memory of 2324 2948 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f188892bde7bc182055dd774086160c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c1607f8865c5cc998f18b8fb7989a7
SHA11af0dcf69614e729e067b6ebfa0d0d3aab151d3d
SHA2567cbdf6a7de5181d998d12df6f6acd96ca8c90c9f5fad60780b07670b80388742
SHA51269bbedd0c9656c3f5b3d83405e65df4be573aff99f6374e3936dbc12c3e24d3e48aa7d161cc353e055a1ae6f70473924bb36b5782b28e979cbe221699549183e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5322d0115bc122021f893a424d24b210c
SHA134b228fe9bece108765042124f16b7a08898c36b
SHA2564d8563553db540e49f51fad00ab098c1257afb6bc9e221689564c7774ce19401
SHA512d954173615bc37b7bffa5116000cc280d0513709d06a8607ae549f4f876cde0e805806d87cade8a0191f886f69f58213675aa68cc4390fa1c1ceeba989ecc317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5343ace19418418a208cb349c3bdb6c86
SHA1aee13c1c25964eda0094476322e60dd9e1b9e262
SHA256f00dac9a4e7e86efb6ea9298e5cc7da6b8f5f777860b13407589723c37135ef6
SHA512178ccc405f14122a3ab27879d263f4cbc5e0fcabab6da51726d4a0b6ffc3fa75d5139f2d57c0b1ed812d5e7c4216bb599b8e402c90d3a215c2e727029f7936ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc661e0f80b0c1a9b8c1259ae260306c
SHA1170615847b7651b2cc2e855c31def5beecfa7721
SHA25633b417e660a0dc9fce8ad16260dfe3a123d72a642faadd716c23fc482b3631d0
SHA5128d339998cc749cff7b7ee14b08785fe49ca70d5e46f62ec2d919a31c7f641f6a31da169826eff10637be42c27658f18d2136fd2b3f6481682baec4e23dfaeede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8bc41d2b61af6e903cb15b7d6abc0da
SHA123294690066374c2a9e8723f06f3726df2eba869
SHA256b116a2d5d51cc6aefef89726b205832d62508f87a89b80d99329f290ba64c040
SHA5122ba49b912e38224a64c034142dc357131b6039813f15e0fb0375bd8139a590fed16ec9c5d91d35a3b2fab77485719975fcffd65681a6ad0e611736d25df4e9f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbba80a644694aeb569b14722d9d5976
SHA14b23a9e28c3843ec3f9c9cac653660716ec6f33d
SHA256f30b2c7ca266e64fb2453c1460a69cd935de323b5a6545320bbb507ec2567c63
SHA5121b90ce7d649b4aebe5068ba9a22a1f3db3965febf45396dfcb988051ad55180333345d8ebcb1aa59f234a674b155dc7d4692afd8b6f153c3d771cfd82338a519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d1a602c930f88737dacc7a93692b142
SHA136ebf0fa4ae5ef97dad598c62990382e2ede853c
SHA256181aee1c7e42750f17a3c359490610385084853f03862f8d82f8ed11e541339b
SHA512a3aa6167ae37033e0d3bfd01499ec2a1eadfbfe68122fb0b58d667003f51d31a7a6534994b777fd11a823f68db09c2a8808c26edc57d81b31049244c6d7370af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57385a1f4c351317dda281570161b9aa4
SHA1f7744cdedf6fc4dda5aaaf9be926c6bbb1f50ddf
SHA256608f35aa241c3ad8b5f7fd9eb06590ac4a747712b7ff39161e42b94620152226
SHA51236fc00a7ee487658759d1844a50fb7a77eecc03316a816b6d67b167694d7054123bc2d4c83bdd795d08c96d699b0e56be1aaa02cc82d3ee0a5ae23dfb1effc9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578df98b941ff5e552a232adbef381315
SHA120fd6cc3b47c547ca0d062272971af9cd7698076
SHA2564adf14cec979de38862e2daeaa7851b5802bc6e3ccc3aebbb8d5a857cd08dc9f
SHA51240e814b900ddbbb66466d2ff9b6a30148af1ab1e042207cce7a322f187acdb50c163c5061fccf5920283f287356169aab44a9fbc804ba100fd91d61410f28636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501d246b2e766734f38ca6038b5a78926
SHA1bf5d4c1490350eeecde0c46c47db350596468fb9
SHA256b6d693886770ad8b1aba11eb10c452becf04575c5d50fb2ea7c3e13d60d29f4d
SHA51287572a85fdeb703cfe162c11c6882ee4ea3467a372294561538d2b0fd18680945b64a39a5abcc477fe2adb08a9950281a1ef9167a540d2b49b04907f10ac8399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5018968f9715b643d3aff68d7598a7f10
SHA1fc2e538c268a050469bde177ac0e0c80048928d4
SHA256124ef4deb27cbb7d2222944ba7d505f41237b202dd5ac443a32426818b09510c
SHA512354259e669d810b15d1625fa45b93921d9d2be63034a8a4c9ab4b933542ed42651df3946e3abfcc827b965692357019302f54e408cd85bf1d4c0c2502c24491d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514f9d2ef0778580229d3f02b21b10c91
SHA1ab387837043c88078fc9edc36f3e1c69c797594b
SHA25661c7e9993868c006920a78a1c99096c3781276f733dac1dc8e9bf3a33b62a89e
SHA5124a2406e660323126a8527ce574b92e11f0ced12859b0f9a1e68d28b97310f7f16910116e3d4e6545348e175c2af1de2650c2d9f24442adb83c160d5d84f585cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b99dee88c7551313e557f8d1ada3be9
SHA159745e6b0eb49c37dbe87079d6a262f767d2a21b
SHA25699c85e9a640750aa1c7a45068a4d5b1be168cf795865c9dad7f9f7777f57e996
SHA5123ca61447d098d0d75f064283acc8d11d0c33c34eec27313dd42cf4c6c8e27e400814d2302806cd889e868f0ffe5ff465666e22a9f9002971153b5244167cb63c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55330f5058cd8399cfac4e5b100f52403
SHA1cd1692f58b7faa75845f3ac1358a04efafa5e415
SHA256e693f2baefc8a2e344abfc37b79ea1f6500f992ac5a727c6757383ac5445f5ee
SHA51259dc09cc0c51f858962c0d558585de18ddc59571705c8f9135b284fd2a87560035bc83450e3de941d52dd98cdabfb87c36cacb39881fd3b216356037dc69dd56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5634c4f5bd1198c28dd3b94d60b8dc712
SHA17b4023e18967694d1c0157333adb113fe6ed725a
SHA2564020812a0620eaf946f4f4dcaf2bc4fad7a57ffffde34a0c6fc8ab038ec4d5c1
SHA512098e053331498c99714eba282ceab8b0161d2321746ded5a2a6508ddc2ff999e9a6abb10c85cf47d0304eb12c440ebd23869a52708dea0f95ba67c821604b87f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec75441e7398ce0d7b6dfda77561338
SHA125509251692baea6955cd8ef3589075bf55ab5d0
SHA2561be07bd471c8b24a073d824969597c5ea70c68741e39d880abb281e806524725
SHA5120270af3aaa7e2b1162cb06f1d45780aee91c47b2c22a687d70d9d4cac8947e31ad6f3ea3b0ed23e81cfeb8a730854d59f87cc415d634ce7a870a6ffb19c5b48c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebae7e7b9c3b5e9d618ba483a9f6b88f
SHA15434ebc39f2b149e99157ef439e882c1400607cd
SHA256656ce566b9a03e3a471c4e9cf51370b204cf56cdeba2a5752d49ee04e7a9e447
SHA512cd36ae4380991f165efa41f3b7b51d2a82de996d76c0d3fdc2e10c01e352e54894a31545b63d852e9d9e2476f42c56d287dbfb663307a94940e41c431a028757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddc5f6c41563431995e2ff306a9c9283
SHA1d0e98e89133cf0ff7e3fa34b6ef53dcebe3f1e54
SHA2569922d5860ba0e1d1997b36d0f32afdb5dce2fc11c6a0c1b0886346c42a3de40e
SHA5124fa539511f92006d0df2f93e824b6d54a8a39789284076d5df5bcc05b2b0120c7d4144b5929c563b83d31fa572ca133aab5ca3a68821c9295d260e16f5afa7d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a337b0ec18c8d3196bb258b1dc2c4bd
SHA1871d34de1bcb000ead9cb19b58e8c06c0a7f5301
SHA256ff840c47babcac9c3585ed3c7230ec746e878a651d28579c3e5bb62e4d6835c2
SHA51256e08c55049c0a4ae88e62046c877a3a6f32b82882a5950d8d8006650b5cb085a8728fc9e11088233021fdbcff5005cc45f922e25ba2f7c6f699d83d6ecebf8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5146110244c6587000b9afef8564c2841
SHA1148e287e719670b46668b9e344a45b88c62be815
SHA256ad3fbff4b4dfd6f4b231192fcd51313bf98650e21fd107d72ffb86be3b0be027
SHA512e2e750a23ff68d015fcc943cc05af1fde07accd099746e34ecefc99906f580006dc71b2a0ecc79bc698992c5858698e4a4c839789aa4af34355e3e67c958ae66
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b