Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 06:07
Static task
static1
Behavioral task
behavioral1
Sample
834eb98a76bf45d65059dd00ce6d7a34_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
834eb98a76bf45d65059dd00ce6d7a34_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
834eb98a76bf45d65059dd00ce6d7a34_JaffaCakes118.html
-
Size
53KB
-
MD5
834eb98a76bf45d65059dd00ce6d7a34
-
SHA1
79133f161c296b48274404f5852908a9b55f141b
-
SHA256
40002096ee3bf40ac28d2f8b2041d08fc8fcbb0b281e8edcfebd25744f678ccb
-
SHA512
d7d812fe4cde59782365c1d6f52e636f2ffb45038110a7f29a27bf1d0ddafc542b51cf8ba9529a70606ef24b76f91880ac53ebb40c4a7123ecca9f2ec4a80e44
-
SSDEEP
1536:CkgUiIakTqGivi+PyUarunlYJ63Nj+q5Vy0R0w2AzTICbb3o6/t9M/dNwIUTDmD6:CkgUiIakTqGivi+PyUarunlYJ63Nj+qL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76A9C751-5095-11EF-9CED-F296DB73ED53} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428740702" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000009b3a2ad944007a75262729fa84d976ed29ef5f79444c68a27a6680c5cece3270000000000e8000000002000020000000665241f724b84baffa95e914fed5b0f00474ad4bc7ef2bf27da314efa05cf994200000009b1b50bc2fdc58957f275926416b9acb62393560b6f864ef96bb25b32d15568640000000752713f5c60f2bc68e3936b1ef5d398f14cfabbae7ee07c3e012cb225b4aa22f204cf7addaf4c7219d0382ccd0ca1cd1dcf5f082d42dff97c2b8db000566d069 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3058074ea2e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2052 2008 iexplore.exe 30 PID 2008 wrote to memory of 2052 2008 iexplore.exe 30 PID 2008 wrote to memory of 2052 2008 iexplore.exe 30 PID 2008 wrote to memory of 2052 2008 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\834eb98a76bf45d65059dd00ce6d7a34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5114b8e28a5cead5f29c7a5419116cde1
SHA1c69efaa5309ab2e064adb793310f2eef6911a87f
SHA256a1b6f1fc3084cdd1cbd31fedc149a710e543270547194aa0e9fc15d47a98c937
SHA512835200a25495923c5608bac292dbd75b649da317d454351bc51e9ef731188cad1167022cca4bff3d269c2dea375784a3d3b171506f6250d856dc769d90ce700a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c4694dd8c36fea863aa2640d010aa24
SHA1ed64872cd0ae03301173a86554fb5514f59d0ce1
SHA2565c85330dedfcdc91a74694048116b38f4ab1f6e6963527ab13018437903db9b4
SHA512017510fd69aa519a07a8a8173e22873068af6c164ef75b26e71a06b5b9398d176840976372743ff25b63790ecc065bb3f3defe50e6b6bb5836e565cbcdfe288e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3a7a39211908e43c900e19c5ae5fe0e
SHA148221914d345a1296a7fdaf07360cb3994a528f8
SHA256bc208d4499b6d13ef41feeca94026de5bcd66d8de4d233fcee9a41ca4f17b679
SHA5129bd0ceaca961cb82f10749b2148c2e14f2632cf7cb4daa31b1d7fa149020503f74dddf3792343ef928224fe24549ddaf68eca26e0ab49b8b6ca5215ad79495ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a9f168c335ba88032de842d6cd6922
SHA1a09a7dc59a12015b01ff6fd89252ad6e558519dc
SHA256ff2460f5e6234c6e2d3265706acca1607e2ce1802f3b32548aed54a853f5d551
SHA512359c28ef68fcdb93010279934cc1b31bc9a78ddf81c0fdc58bf7fd7777783031aba4198ed616df54786db64a63268a0ebef2ab6e86c9d03cc54c1595b68461b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b923df257cfdb6cca009c93aabf69a
SHA1f64db721f105030f1ed1ff0a6b743b025ee07e83
SHA2566644148e3d2ded23d1a5deaf5ff276ec6ea847a990953468bdbb99d9ed856adf
SHA51230d84485e11f80fc3b89c6e59b957efa1d8d3bac317bceb6f5c272b7d195c5b2e6d3484093224ebec68bdb5e6d8327c0be235eccc5c1620c5c68fac209ca17ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5478b9ed41259b0b59181969e12f231df
SHA14c8b244219d68db0692197cefd6869972c8b8a52
SHA2563f3eec00ff9a678f38ac756f46c06b1bf21f07835a5bc5279e5d56ee0479c442
SHA512f942cf469511a7a218df9ccf8f040c4e9d7cbf792cdd0539af8f20167493c33e009a16279d01a1a3a0add3a63d0ef355e6730c2282fa4ecd52298a1552e4f4b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559c64a88fc42f2f7b0ab19aaa841d9d9
SHA1e482ad29c3bcbd0515f15693fb9faa28983a8c34
SHA25609ede2f4408b3a1e45fd79097a6b9a265ce70de73effb4d32bade86985fd6a7e
SHA5126412cf004f5d4334ab4e9f2dada88df793dd09d75a6ebcb7f12c6d517dd5735e5798c5071f551cd0f0a9b46db2b66c39454b30cdd31f78dfa72705672ee7dd93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0514f5f5db4e601e982bc60335e33b6
SHA1ac728625c2278bab9e4a536ceff339ffdefc0964
SHA2564c1e59491ce05a1f7703304956000758c4c11eee6575d348dc1ac7d64df1553e
SHA5121755c3ee7f5bbc4158df291201ec325e1a1d50404381695b2faa70dbe5eacb06dfd6716efcf6f0c0b3769ba2185a329b39a76bf9ec0ff2d314176f41e9be0d4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfb423987bc6d4193870dfbc234accb0
SHA15e80cb6dd6e05a79fc894d82a54d33173328236d
SHA2568a684ce62abfa0b9099111dc06649a474373b0a8d9a0effd65683703f4a6bcd5
SHA5123b1d2432a87074e2eef93b9b6a46f84dcefd77e2d23cf8950f18471e31c3de17d75a815063556fe9520ab369fe76afda5620b4deaccef1dfafb10f95c2189f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d76a31b59e7a67241e2a57abfee9ff36
SHA1ae3b51efb17f07cf39e451c1278168fdbc0d9b9f
SHA25699f05ba909b8577c52cba15c842baa7bc5fe47089fd419bc97d0238e70fb9269
SHA51259add05629d453cd210e971fa0ae86d02520df4e265dc8345272ddcc698d6520af38333be27efe5f9cacfd16f02192ccd42ad0f528a8bdfa37d9d87c3dd81a28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53335726ed159d405e549016070c4c005
SHA117360d17f90a920eec486bb599fa8224369ceec7
SHA2567be4c31498a0913900d77699894b160e068365deb72888a83cc764eb169729f5
SHA51257c08bd6c2fa9bf4cdccb571cae884ee0af202e0902a6b5e0be48d1468ad10b114a24d724014b6833df2b3af930c97e120703d623365997c3252fef6f5942702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f27209c560e37b4c3cba9043579c40
SHA1d773d7e9661050a8b4ad8f3eb0b5be88cbcab8de
SHA256e9bb947d396a2397b3cb33688f86124d843ae1296b44462a003da54d2a1d2da7
SHA51281eadd0099b9e4a73f2b5e72647a828c8f12922fe2088af94ea3e31595885f31208d18b73f323c810ca1a74d9c826c672c7ac51fc1af2fface564ae846189050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589365f90e06992906782535addd3019a
SHA15dbc3bf6d572a9a7fad78e738b7dcef371c8bd42
SHA256299d38a85afa90226981fd76a0f5877e0e11a9074438371c6fc43efb5205d81e
SHA5121b3d44e4f13e3e305c763518d71cc1e2dd0926aed1a89df5b1a6c67566bfcec36aa9baf9ede0152056ca2a4b5be0235358800c735bd30ab9fab8a4401ef382bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a33b9dafb1d8cfe340961a7f13075fca
SHA104e3c91258cc88c8ae7b1e5fccdc6a30b8793036
SHA256372b4d48d2c909484f0c2f8892822edcc67bc7f7b9e4ea635834042b0add5de7
SHA512dac63bed12557aef088f6bbda7e978cae30b044b6a44822046c1bdf78f1ee7b6b5aa32ef6e8b754390b92c8363563a52d0df62bb0178fec6cffbf8bd19ef47c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5924afd0cd8efacf97eca8a93e65e9c95
SHA149ed6fac1052df7ccd08e36e37fbad6dde411820
SHA2564034ad983bf61f49a125b74ec519f0f47b262dd783ab6acf26b9eaf92c3f2a1a
SHA512302092a94212d97e6dcf9a0c7f30bca9a83794591bfc9c7ef201ee4e8fdfb1e64a972ce69b3316757da86e47a4309dfb7a4a46a63d2b9234ddc8e38663e14d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4628d71ccdf77940cd473dfbf4aad4f
SHA18d5dd41cafdc1ebd6affb7210eea39c2ca0b0c5b
SHA2560ce0663e8e2add93fa3c6a9f923488ea2e5885462e412f3b1a5fdefb9e3d880e
SHA5127eb6b24b0106161923c8f3222b1a938eb13e34a7f01dafe1091b1b558bd576076d703863919796bed0ea6cc3a435916f1b12be81ccde4fb26e8abf766f0d3b2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4e7c3a8814723537340fd2583618ea3
SHA12ab0bea736f0580877ca8fac347ea109fef8704f
SHA25653a13a5b152a3d27e75687e0ed6038f995c8a53684eb1f5da0e78cdcc4504796
SHA5128cfdee39a3d880637a9ff5189f8a6b00812368ac12480f4ee51d57d81d960571c104ebb38e7f1bbd65fa6474157388a189d198df6123ec210f9dd2f384dfce57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ed94cb6244df49825b93b4f5d729913
SHA19a6a9079c3934b9a23d2d78aa0a001d92092de59
SHA25650e46af09b98771428da84a5447e7fa10d8454769288f5017e7ab72b1cef3dff
SHA51233c1f4d7c3c397e12aa979b9f190080ac048b3fd1fe6689519b712342aa23abf9c9f8e2bec5b37b498f92888d5f73e3591962431e9e75a76f636789df46e8190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5050ff6e3eedac7a726f2cc1e06e68d
SHA1294ccd1fb1cfa8d77cbbc8ab72e57795cfcf4b2f
SHA2561e4d3061c2671c5f318606a500a7e97474112f74e3a6ee601615956cc6f72da4
SHA51277fb02d3907ea26c379f0091c940445a7f6f46eb86fa531b56e441a2302aad963ef88d4c566492a0018b420ef2590b8d265bebbc29f71243abdfa14577db02cd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b