Analysis
-
max time kernel
137s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 06:55
Static task
static1
Behavioral task
behavioral1
Sample
ae3ede52867aaa2a48811a7e3c95197f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ae3ede52867aaa2a48811a7e3c95197f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ae3ede52867aaa2a48811a7e3c95197f_JaffaCakes118.html
-
Size
41KB
-
MD5
ae3ede52867aaa2a48811a7e3c95197f
-
SHA1
b4ce7d4fd8dc509a590cf7af363cd20d375fe4cb
-
SHA256
48f09cf71ff8cf06593b798041f6cdbf4b537a9a72fb218c85e2e35b653841d5
-
SHA512
c8639d4d3e08a711b34ecae10359afb4e7295b0daf019ad416645f468ede23d04b644d9bf024f801f10a36ec9e7b12cc6bc2c7b255cc686778dd20eb574eadfb
-
SSDEEP
768:SzD6mWwC2jPrvOu/pSQbYcdNPeFPmxHmhwBcdfGqqD+qDVNsSs2QlsLoHGKeOp:SzOmPfqMSQbLdNmFPmshwGdfGq8+qzs5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2AE88FB1-5EC1-11EF-8D15-7A7F57CBBBB1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c920000000002000000000010660000000100002000000003a303951a1e65291c3695337c5ca47116fb9014f01f22a6a413e6bf06501741000000000e8000000002000020000000ec4a2f848a273b7dc734f3dd41ada3b7871730ca9f4eb8f3b984a117fd1b33272000000082ce4ad7e2b9c87129acf20db96a3ed5c2f660a83a4653f4cebf5e106ec9379e400000006a6f0d2f9f2fd33373d12131b8d3bc8afb82a92373d7006bf7000d0882ce37de1f2bf446c8b8eb2caf049172405e461a604efc82328c84c7cc6b5f12540c33d1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430298788" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9006833ecef2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2256 2400 iexplore.exe 30 PID 2400 wrote to memory of 2256 2400 iexplore.exe 30 PID 2400 wrote to memory of 2256 2400 iexplore.exe 30 PID 2400 wrote to memory of 2256 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ae3ede52867aaa2a48811a7e3c95197f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590ad88b8ce20902b06e49c2458020728
SHA1c5b1e6d29e26142f8b54619959d865cc905f7ea5
SHA2562f52d44745626c985fa9d750672b1e0307db5ebc162fd0b9bb5bbe517bbc7624
SHA512e54dd52dfc3a4a8eb2308e203ea98228fab50c2a3ef250ba322787eca280bd1a889e68240cac6cf82a6109476f0f5fc715b991d1995ed96638340f37917b8af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5267c441eda3070fa43679a256baee600
SHA18b5031c93cec2fb66c57233ed19d4796808442dc
SHA256300cf1437a665ff2877aa26602dda74e57268539e528c11a76ce9240ff9eb3e1
SHA5129d37e0c8849e8917ee129bf53c45732a0c757f4c3ab3f2345a15799a4810bb6aea1425b287c56d51238c6a2930acc86392a5ce82234eb3d1a49df6650e15dbed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fefbb158d531a025ee681fa98c5b8d1a
SHA142aee766cf1c7f58fcc18501925d5e0736770226
SHA256bb718858550e8329db3cda71ca7650b13ca448133488a67202574d8acba25984
SHA51273522e043e4fead87cafb1638d55da28da4479bfdcae871974862cb9ecd76eb0db4c7ce4cc58549357ff87bc716d28597e7cdae2b90f704e11e135934ebbb3ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a67b1e39ae6b5bdc8c197aca2b372f8
SHA1a14846df6a3195bbbb3b75553affb0121803c5a0
SHA256c43d62bbdfa3df584a51c7b70b9b3397aa449839490452031864741d64f89ede
SHA512ea3cc7bedbc33561173576375ebb5252893bd3ad0c1a58db12970dfb89470d38e3668d4ea1864fcd61da791178ed978b02d20f95e7c2c8a302301850ff799119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51326ebe885e236ee3ce84ca2c1600fcf
SHA17a1ae238e4b7ede273f7b1ceca8b2c4c8639a4ce
SHA2566b4dd78ed80c690b4f4e629f411fe052f21e2b0ab098091d0aa9ad42244f5ab3
SHA5121e723cadbf57f699a8e32d135286833fe6f6ba8b016e420b77ef71f982a34ba8aae5b37d5301d90df5f116b7fa0f392de83b2895f23500b3c9a467b29e8caa06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e93b697d1f1dfc95ea59ccd2a1b25a04
SHA1b2401d3e67e30fe4fcd87ade9a00252470a503aa
SHA256f75a6c9ad44072f2756bb14a3349bd60330d12a00193421c213287142681892c
SHA5129949f8dcd1f8160b579720804d6c74db1d0a760a299df7ff1a1c6b3c067e56dac2c68006a3b1237496785f1cfe6c44dcb43642724337c2b480351d592268c9b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a4c748de4d8b9dc3b4aa37dedfc40c1
SHA1019cf2af94e76b118e75b9a322045c3f3727dad3
SHA2563b34a3ebf613d96deff6386f457390b0970b773441251e497da4de56ad7c3f3b
SHA512b34fc2f3eadc6f87302a98b95ee0cecd32ce76d594260088f77228f120b89eb7c3819a8fec6fe8df92a85a6b90bb4b3b64881520ceb299d1acf80e559d50fee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f82b0ce52cc7d4de34a494c4034ce39
SHA177148071783d5d6ca73976b695138a14503ca00b
SHA256f7b7688a235e70019f3ba8e00f0e52060b6c8ca3de672326f34f239446ec3b0e
SHA5122ccd4eeb1d903f327f2340464ab67215c18ce17a9e10f2b227d6d3c24e9a9778043707c7b6bd3aa2cc44b12d9fc89e1afed92cdd1fba4dde60d3c9be538f8000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e142d93ea4741d62cc98db783ae3c22
SHA1cb364c4606dfd93ef961f11bb01e8e5c6e114cc4
SHA256a402a8d79843e5fb07fd8ebb1f5ba7228eb472a52857cedee5787b451c6142f9
SHA512547bc4cc226ffd25dac78110dc1c804ee1b03d1aa0b2947b21f99b02c1c54dd70bf5e65a2b359be972ca18ca676410ac080994f80b93b6af18d5d2f31fa3bfa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e505d4e347a584dfdd733a8945c3235
SHA141f702fe2e98584b76ed1de9e6581ab9a25ce0fd
SHA256ad2deabf8086482832a698ca106ccd755e0729f18576943f9822a53e3839ec68
SHA5123181e044eb4ad3c3535a2e294c133bb15441cdae3708a11b7e0b3301d5b740fbbdc01ebf8cc3dea8171841bb4662c17fb4cb8841aed960b1608a0f1c98b0804c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5061958ee2d48ba024d0dfa98d1661593
SHA13eff3ad3b23e07a00a45b03e2fb9eaabe2658828
SHA2560055c63eb2fee2d5931fca0168074c7dd0a0ca4084dc28cc269a2421a8bdf556
SHA512bb05e8d7e8c8db73e0574807083ff55f3a036192e212563b030d69ef5f49950297ace8ba7bb0fa48ed53fcb06dec455f584b11b096c56ce931bd442689c949dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544e1600fca38728ba5fd3d31057ef2a7
SHA1add1f8deb6212deabbb325bc3f5491ca843ca7b1
SHA25673ee16e22963612849cebb130fe4183f72a187673aa32b72ddfbd2a7773dc71f
SHA5120c514db8b2cf82c76df1f6e3c1a3eb1ad26fc7c76390fb6cbffccbf83a4576dbc2dc242fa96538d71ec819a9c7eba9d234b715e065680b84cb51cc5078824e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7765a35f81b171af8b01668a7c236c1
SHA1ced174362473e8c5e94d77ceaa0b391edb1c2103
SHA2560e60915b35da1215ab4f32583bc59bcc7bd83057e36be5e1afb30733f39fd424
SHA51258e7265d7c20f1cf6bd4f4cdc6e736deee5a38d26a4bb445920ee15f9d7ca2549f65e451d0cffe1a494e1657aee7f6716eff9239f22ea3cd6be97586df7c8dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54294e18fe025164caea185617965c966
SHA15d67fb3f4c43718798c9210e03ad452d8164ca5e
SHA256e4a78c28e32406f1b2e8921474282215e4b83dafefca95acdf4c93c04cdabd3d
SHA512eae328519b6c813ac0cf9b311062ee4dfff6ce9f201c37927a2a6a9ac065901fa35eb80001daa34626a1b203a8b96bf896ff886d00d3d8c0f7c48130138d5b17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b713b5c2f45c33b00ca8b4e24d17e5e7
SHA161595fc69fd967242bd1509824ba9a38c9bc4c07
SHA2569a517731a3e0b5da1a7f8e1080214aa6daf0598731a03c28b8cb02785c6254c2
SHA5124c42eb7b383fe48655b9be8c99947c651e08bacbbaea729744d5d1ee70e2b1dd00ee4366748709abd356fe55317f73fa56c449a14e97e1fcf70435cfce10a946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b09bc76164556b2c5ec0b4aeb4a20dee
SHA1e23818cf60039eba22d6e203efbb0ec2e5b7a526
SHA25605f2f2d5a7e5577e5d9d357f9a1f068117dc908aad81eab762abf26c7d2eed2d
SHA512c88c32740253cccda98e3f4cfada44a1c02bea16917b2c38c98a4926f9a23062d37d401863db2bde0e8192c78bd10cfe6a2d41dfb4d3f84be428b34d34098f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ee65ad940093a045f1249c4079439c2
SHA197ef6ddd04a0f2707e247f4e056668f7c68cc06a
SHA256ceb69673449484fea754b203b3f41d25fba9f6960dac5a7a3079054331855425
SHA5121707e026fd37304c2942e00f015bb8014e31ac25b0066bd0758b3c83157d706ddcf0efbae7cef7151a88c14a3783263a729f59d048de6b43e2969a17a4f21951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce8528436d08f03fc7ce8f8dd45e1fcf
SHA18c9843c480f0b9c7c834296ee45630c3486d904f
SHA25696b5b9f1019d51191282cde13b1822761ece5b7082db6c007c7f550823531883
SHA5124756fc7ec38e4f9822c08526ee76ab3f003380651c2467d14b440b470ed1efb04c72f6e4ae9c90a0a756cfec08f38fa35d9f9227fa154bfb32005e8b2d95a070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5839813648e68494cfb00df2e4fdd9412
SHA14f3cbdfb49185365f9dcfd9765378ecb61247fb0
SHA25642bb5c1b8bde366fca53a2750374fc7bb2eb8efab534c087c54ee8b5b912f680
SHA512049864e084e24c74c4e3639c4557e4e9ce2e78936f8824c343ea88f37d2d49d9fbd485b8720b99874698c89b58c35dda5e9346a382b045880115a81476a0d707
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b