Analysis
-
max time kernel
135s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 14:55
Static task
static1
Behavioral task
behavioral1
Sample
748483a2d1a5608adfeb8b619c60e8c1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
748483a2d1a5608adfeb8b619c60e8c1_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
748483a2d1a5608adfeb8b619c60e8c1_JaffaCakes118.html
-
Size
90KB
-
MD5
748483a2d1a5608adfeb8b619c60e8c1
-
SHA1
e9bfcf2f8c857fc7736a18a06770ada0a66eb7f6
-
SHA256
59bd2795c7efb5502d8fc2b18f220a37c5a37f9f54b43c0e18e36cf60a1417fa
-
SHA512
818e4ed3bb804e59a81e9fbad8a250954827bd7b667c44b8eb345adca3d8b31d0825d18add69d18184f5c3254e10c69f27066bd110c475db3683609cdf2a43a7
-
SSDEEP
1536:gQZBCCOdc0IxCAbMwinoK9DiS5+xyGICVoJYJefmaZnKUt89rufLWGhNs2pyNovc:gk2q0IxLPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000c67a1787e28c9afa8437f4d0440529e66bdf4230d40961f163eb7f91271544aa000000000e8000000002000020000000b6e468bab44a34295092c8c7b3f5d714d97cd0c697773beeebc47696661e8fd920000000f36213ef98c2ccbee6eb3b34028406e27456412e11cd94ef9e759f8d5514d641400000005f4acafeb8df91ff15758a309fea77fb9b0061d6f1f752a3d976779696e75cdc25bafc4dfd475dc0ea795cf14f682084c68ad717df9ed053f2344adbcac5ddbc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E55D9801-4B6F-11EF-91EE-7699BFC84B14} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0876ebc7cdfda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428174810" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 756 iexplore.exe 756 iexplore.exe 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 756 wrote to memory of 1944 756 iexplore.exe 30 PID 756 wrote to memory of 1944 756 iexplore.exe 30 PID 756 wrote to memory of 1944 756 iexplore.exe 30 PID 756 wrote to memory of 1944 756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\748483a2d1a5608adfeb8b619c60e8c1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff3a654812905c02f74aa813cba72f48
SHA1c5ee644219de94acf61a1c8c510baae05a3b6678
SHA25659ae77c4a328fa62c4c409ee5816b2495c0cdbbd07b249e12007c67552b206bb
SHA5123931af0018ebabc0218e86481bf0995338b6b6c71edfeecd57aa38e25392afed18e351d04bbb4c6775de7fbbe5fbced7523c532ec36df6f87fd6a2cc39b7e7f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f9279bd8c84b400651990b1adfbd36d
SHA1f54ae1b7fc896a966b66af68770a33d8c95c748d
SHA256d99fb879f5032a5f3e7df9a6913c231799bcdf9a33374a1a9e2799a4851ba851
SHA512ab5fb56959dfa61da2a37fe6a3b99a7c52b9259ae7e5a026e4de0048104b990a802f64619986c0d8a109e61c6714d039155d4b6567e46c0b114450ecf7b7a616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c3d2c0c8b4895afb8f3cc02f3fbfc18
SHA1e5227c6a2e155cd9a172a9ca1943b8c397365d13
SHA25649558b7cc67f7df1f430b23da97fb42b2275fb30e009d92c404f28189a11e475
SHA512bcccb42daf0cf755e4f0457e2eaf6caaf532cb11add44c0eadc1813a46a1876ad699d3f83825d50b438aae4b648c9451e8dca6b9f3b7f1086c28791837967b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2bb08a3e78a8a72ef0f079cba734a1f
SHA1336bdc65323ee5ec4601b26abc39501f85f3cd77
SHA256b37631cbc76f35fab1bbffd241f862ea035c69266116fdc26ba0c98e9e3d85a6
SHA512d958edf7fea1d2a631cbe88717821261e4a0e7403cdee7c2f1bac9f8798fc5960100f52a6fb9ecf824faaa1a5287b9def5a8050a8ee17b7a79f33f820823c4fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df05e8e21fb32a4e00a7804852795fdd
SHA1baaaf18a8dce35e3b56939ac1cd311741d861ef8
SHA256ce89a3b3e9151ced2b37e13752cc212e4fae0d3f42baa8ac34d1666cb3ebe627
SHA512521b4770e7eab179315d23bd3d641252efb13bc52709ea5d9d9aedf97ae6a918078c21b4f12bf6a57a7329d149fe99daeaed903d57d2ed5103d2b1860cff13a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5364ecb4d1b8cf65ff58ba70e8e0d8e94
SHA18cc22d59eb91c028d5f1d58a8fe5e4f636ccd4fd
SHA256d91758aa27655095231da3d652b644b29d0605d7502f14a1edb9ae5b15f4cb1f
SHA5122a866fb6fcd6cb950463fadf17dd6a762cbf7912b71d717baf4e04b4ef6725b066cecf999ef3e255edae995866e7377c882d80290a887bcca6df11cbd2550222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55209cf58e2741ae746076390f498e30b
SHA123e61955d2761699704fc11ad6c8057331c5b12f
SHA256973e4f76a3f3d6dc5402e48449791b2ac9e3d6abf64b7d24abce5e57d4983f36
SHA51251c2caf0c6fcd388222aaf4a3bfaba7e9a486e740109a48d1e4e096eafc783d96047671007cef0379d0deb22312ba0df42140be0050c68d7d566c2a440bc1f75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597265f6865dbbaa450a5f5fa4ef548fc
SHA1f4c399053da0b37efb57fbf6ba01deb621ed12b4
SHA2566f2cab1673493f04d8d822b504ab893188595c53e49fdff208ebfcefb20792a5
SHA5121d54afc606e5b5fbd9d40cd3260309ca5141dd0865106344293bab3fb7c65f6cd9d5adc30292459da7f2a76c2f6e481b606c95d9ed4f19bd3db5ae6fdd54efd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec2665688426560ada7d4f64b592d9dc
SHA1a538141973fec091524b7c3ca98b9729426bd50c
SHA25607bfcf9de4ffd5e6c237517811cb7178dda4f054f5aa6a35a3af48b82bc7ad3a
SHA512ed59907b4598a78f6b8c2c00d07898df53d7e158cfb2dae130c95f83346a0fa844fae47c89f22adb9fcedbdc7f07b61f24119cff8d4c2d08b095c388cecbdf40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514002ad9cda89edb985fe6c5b2060f6b
SHA1b7cf536345c914088abc0b8df8c23ef41475cbfa
SHA256e2759e418cd417956d11027355264242f566683656bffaa994697b37d471189f
SHA5127447d4f137307ff9c8356134579db1ffb7769848c108c692239d9a2e38f7c1d93a37704ce9d092247824cb2ebb243a9cd3ebe00a2f37ef6d02180aa7a29fc154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59227229d0d708904b07d577c68efbab7
SHA11490a186128a7ed3be845c484ec792ec8e82d3ab
SHA256bcbc6ea2cc2b6693f7c7a0b642d52a73fb5c406645b772f3024241335cdfeb59
SHA512e8b443d2c4fbec860b297ba22f7e8f4e74224bbdd4f6a02ca00c1259d2bef9afc295d63aece466e94462f3a638a0d3461dc27c7a4f4dc43868ed4c841bee4940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc2e5b99eab97de17d10c0439bfd69c4
SHA1928fe4800756d6120e65471ee7310b1f8b627da4
SHA25626946af4a64ec8f50f51d5eba38b6f86c4778a901862b2e09034f6552bd8bc8d
SHA512b98ed5ff6acef0e4a8f891ee25ce213191e6448915b560c744e4c5c770c0f7c3461bde6e6e1e0177d625c747749113db2b079122530a6e2516a91e50e913db7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6366c7c43d52dc89c85c401efe91793
SHA1f2ff1176c02d1321ddd72c638afa4fe3f7041c09
SHA256fc1145ee277bf97b65c4c431188dc1febf7e99748c64dad6e6586d0b95c7d48f
SHA5127ed7315fc98a65f8772709e9bd54917666b7b4e07b99421872036a4f073647ac3c1f786f7920d7fab60aee5feff9b5ddcf56e7b76df396ae75cbe2f6b8fb8847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab2e2b6de20dcf31c7e5181660356cb7
SHA1c3ebae09cd776f02857e606090b3aa5d87b3719f
SHA2567a6b85991796a7696f1082f2c05935206b68ef659b86f6994b8476e012c02d8c
SHA512fd61a16675a8b4421adcd90734752258dd588badaf215bfcbd6e198cf698bb639cc3d7d5f25755db6dfd1cdf563e9e1893a40f903ed792e500b9d6287d623bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8101760485c67094d8cd0c59890879a
SHA1bbce36384d2600af5b76a78746d7ea0d233ec551
SHA256c12e74fc9b1301bd365b3d05d3ce8b83d69df18c4295c7348c8d10c442df77f1
SHA512bb6979c67588e626fe2881ed4fd5e649f18da22a27e8525c24e8942d3de7e50a920b9490bcc1530886b7442b55ddb0cc8c79d3c268a0d28ceca01d98a8c86036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561c3fe6349ee020681c34a8dc85156c5
SHA1031dd0eb603d9f62b63e4937e517192f677c9c84
SHA256e1c7f1d0b4179556cf7d7be7f3af55e88c75b4cfad6425139455064ed95f5deb
SHA512da86d98da322b79faeee7d17be9d8896f41eec7fdedaabab442e6d3e043ece5a5d5af06fc22c3cdc421d404e077d1600399119d02174a07ac9718265d186b293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5794d7cef0d8371d2d94ef059331bf59f
SHA1ee4cd7297a8c1489d2869bef29fd227a192b93a6
SHA2565069b5d5b695b8d4b3c1efa5630c477451960989908f874fd43b1b2ca59c6dcf
SHA5123be3d01dc5985e961d534d370ea2eb8f04762dc079c944a4e4839dfaeae8503ca13c98a0f840e81895222983c430ddfd4eeee5ae3659d1f62c91e65374c92a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5655c0d70f83ce10a63438fc5b3d48dbf
SHA162f4da72d8393694c0fe3d845cdf7032df38f692
SHA2566cbe3df41baae4badb23dd1a73efed94873b2565b54056c98ef6a24f0adc9cc5
SHA51222e0b0c1139511ba2fe6889edb162e89d42d473626d2442f628cec776c81eb8a3a70c83a3e7c1856222ef3eeead9e3fc2da7b847ccb66d556c73fcf537c4444f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598dc353dd6400156afa4afeb41270ca1
SHA107dd2e04ef91e769cecfc72ef74531815d19bc7e
SHA2564950eedf93ddf4d38e986dabfb2a9457c6539e56b5bdbf10405ad41875f586e2
SHA5127fd18a603975afe03ceec5d7d8c9db7c0e4e2ea4e3752243be44dc0a82f21727c1f498b947d5ab8be9a1a0dd43dc4ff489d32356433b4320a23f25d40f7d394e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590af472ab925a5ce61e32f6cafb1fa36
SHA15b893383368de494403d0c4c250ba422a17b2231
SHA256d691d2fd540684166c673aefbe3e639239fddf0235152899e50cde50cc658549
SHA51267096ce252270698f4078c505e141c87460930d9a7b42f750195ad8e0dc6062fc541fe126d7471e8714a3b7f77db8ad2a24d8add3b4d2b9c092bfed8c93624c5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b