Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 18:41
Static task
static1
Behavioral task
behavioral1
Sample
f6a1a292827c8a2ff556c07a04428df0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6a1a292827c8a2ff556c07a04428df0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6a1a292827c8a2ff556c07a04428df0_JaffaCakes118.html
-
Size
115KB
-
MD5
f6a1a292827c8a2ff556c07a04428df0
-
SHA1
9f30da26cbd190ef3043a2b0fb46c25734ddd554
-
SHA256
b67bac409b5e530f11c1e4ac43a9d76a6ae020c5104b06ca9773d91f01355b6e
-
SHA512
ef1ca93772d3fe335c696998b8513535869f24e4c6035faa968387641efd772b8cf2e01b6e5e0900cef18a3aea12ff5f2721341c8b9fcd59765e75d2af5a7a84
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcFtKHAuioL5XTgcZuZZBHp:sFTLLWT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000007e2861e11c3afec7537e1809e9d0a26bf7350dd4f042088df38974708c3f43dc000000000e8000000002000020000000af4b1473ce484421a8308bcd39670b01cddb4766a2361f94b93209a9a1218c2d200000001f278dc8d59a492b1e71a155263c037db5e6e314cba183235c89d4079c3f57f240000000c5a66aa6864fec1645fc72151d47a8171b0b1b59079cd5aff570575d50de4f53d62c96871fba4e0fbcf13854574257678f7057ea22fa44529a40d82d27412e3a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1031f6b17a0fdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433451549" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C2EABC71-7B6D-11EF-8202-7A9F8CACAEA3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2376 2120 iexplore.exe 31 PID 2120 wrote to memory of 2376 2120 iexplore.exe 31 PID 2120 wrote to memory of 2376 2120 iexplore.exe 31 PID 2120 wrote to memory of 2376 2120 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6a1a292827c8a2ff556c07a04428df0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570084ad7fe7792c8c585b183efaeb6da
SHA19fe63cde8e910550dd60e712aebff34ad8e49d76
SHA2563ec8f01501e6e5afee3969c5faa6381a5bb8dc5f26c5201573445cd242c6f319
SHA51230770f64c937fe09a80b11e4d8c6d51758919be533a33203b42757bccbad4fcb5043ea4e334f77156439a95d9305bf46c1d7e0d046294203ab2246b39e6885b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d1080d56829f9f732d145296d69772d
SHA123dd07083751dea89490dac2c9f2b3c961f60a56
SHA256fab137facb2dc065bc19aec9f935541a594bd6c3eb8ebb47298204f0e3fc3fd6
SHA512c253dedc9ac98a469ee04a5bafb74d989a5860072bf4769dfdaf2bb81b24ec9899422d6711a8c2d32edc3c72a227714be3c7b5d195f080831477a02b951ad4cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b18b0904aa147d75783a0310bb1037a
SHA1cb4afb5353c5490c7785b50809cb111d2db8f798
SHA256679aef01fc906dc13fc452f483278fe4f2e76cce45b6bb62eed4a1b2cf7258c7
SHA51289943ba0aa1c358ba67ebbb2d0daacfc5710cefda796bf4621680ae3a1b1184f6917baeaccd7515ce0723c7abed3e79cc8e0aa9b04dcbc4816bbcdb48af089b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579a24fd6dafdaa9243c33f02a5c5ca04
SHA1dc1876f2829cb6d0c18c37b56c285681aaa15578
SHA256a01e7d3204141761fd21c79c267d7d490d9d4865af5dc88416556aa1edfdc2c4
SHA512ca308872956d747a2d87cd8e97e29e8ad9ea2d06f96778907eb3c8571e6b97908c8fe7f0fc5216e6086ed4e7c15d4d774fd4a04f60e64473a4077851ecff397d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dadfab53f2a3ffba5c523422dbd8556
SHA1a52b5803e432169e55e75cb6ca71b65801668e3d
SHA256f62bdf6b31d41b71e405da05228eea63dc4e4a10c698b30906122d3c948e8d17
SHA51257ba7964034dd4c37e318f801f0a538e90edfb5659e8b9e46ebdd44760cc7fb63b08984a88dd695169a9d1c4b98064ff85835ed53cf8d42b060714830c5f5d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb1e3c0d02b0bc11acd6f1305fac396
SHA1411a43235357b2919d06328fd0dfa65df843cc0f
SHA25641622c5acba9c9b50d43db8ed6169922d2547e96a13b13a4f9e8dc252b4938fb
SHA512af8a8af9aa7a9437b928f5ce023c672ff81e5e1adfc857e531f427e9e2147bbb08a8fcdfc906c2b2d6e28cba2002dc8acaa80843e4094d452233e076c45b9ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f274baede62cf23547296f75da22d1d4
SHA1afd6c51b081583451db328d3f940d117a2bc2b50
SHA25648e8f5c5243da4188a71c5268ed27923522cd44232d9a7478caa45d66bd7481e
SHA5124e72426e6c1968a453ae232f3c2bdff6eb1c4df2c243b1df3dc40c441a237ea8cddd6e6d580916bb9dd5a71c0c31b29be4ca4b8fcb5be2c4ba42723e541b037e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eeff66ad75e577fd382a1a80bb9efe3
SHA161e53c8e90c3d4296f1f1fef9dc5d16d24bbedac
SHA2563b6d989625b59848d9a2b0a5d7c38af8a0e5ba1ae34562d1950eed8fbc7bf9f3
SHA5122af4c48390f66bf2c98cdeb55f9b8fb0c773ef3c69d536cba8827f9174b084d45e4c6a36d561c74b26dd4e0a27267e5134b51ffc1badd4773fb38a7bd60d852b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7fb1ad7dae6ff01e166c209922ce301
SHA1c57142dbe895f3bbae63e6de622030acd4acdb85
SHA25625c79dfa7e24b99a4103f4da40cdc334922bd76ad21f41d57be51d926188d4cc
SHA5126e04340f7c8cdfbd6d70a9cc54bdf6bbdb157b366d05634bfd3d779744b7bb30c7c8eefa71dc18f730415202faeb6f99dc2083025faf70f8cc4203a3e7feb6b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500bfbf203f33f7044d7216947867e1ac
SHA116b4eac3975ac0eda1dc1420fa2d0d786b5f4937
SHA256de3485dc75ea2c5972f3c4b727f28fbd1cba669e440c37ce4228b984ab96cc9e
SHA51291cb00e0b6e56ce95bae982f9231ee7ed77a08355cf032a8d9b69117d0e283087eb75a6cfd73bf71f1aa651a5f8ec8776badbd9997ef5ed70a860dfab76ee6cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a61d288f74ab735984d54d66bcbced7
SHA1a1a81127ed9f80ffe934f9cb7c5f90547fbeae00
SHA256aa27987d128b479b4a21316760089aed02cd8118685b2eea594f18ec7799885b
SHA512bf41d9b2ffaed74498a86c324bd51768e8816d6892bd3af000007d3766c0123b389faf0221314550a7fd2d969e4926b0b8f8b1e97a2a4f70869abec024286244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5138c4e3bf71d831d1066fa9ecc248ac0
SHA168f9910aa8d6e11bcb47284b728521cb4660f106
SHA256255e2119b5c20f044506f7f4de800f4cb2eec349b9640196eb5c5d69d60f8710
SHA512b02d88d17d8e28279b042ff6b8897e948d1df91dd11d4085bc9808c05d247219f14710dcda8c46b28c43ddfbe622a27ad1338f22d5e480babbae197786c2b88a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5817866c885bf8c3840c1da14bb2c1263
SHA1d2a9a43699050faaf01bca592cbca5058a3a2181
SHA25612f7364e8426744b6275e84ffe401a4679adf11f07abf19246188ade113fe18d
SHA512f4a8f1f9fe5eded364dfa2f133a8c94e1865cb258753425457bb9315bb773ec11c6408e7509a65d05a6a9bde769e1da62e5ab1b2d392d2b724577f76d630ed38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594ddee5b7fd7d38eaad5e34ff869e5fa
SHA1c44f71aeb2782c5a90f94ddf80720a98ffdb325f
SHA25672d2a77c95eed439461184cfce735fe110337658df8c9700346fa4d83058dc36
SHA512d0e569e4835371e89e65e77dacc40e949cd5981b2e3c7db7bfb2107f688032bf8ef745d166d7c213ba828b3459689dfee840c3fa120f7ab723ce13ab158d437b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566985e43d66b94616e95719c558d15ee
SHA1ad02509d00d7cb6f66e16b1f0c834ed884ecbdee
SHA2567b9483ed4b647d253c951da1b970b512a294a09ec4be2bce5badb789a167865b
SHA512fa4a11a0d1bf52316ef046071a8155695fee8e4fd012a3484840e0c82d6af8563a1e9460db95f81600e13549d9d48295b713b25bf130cf118b707c66767959fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f5bdb514f7fbcd9b7b5c9ae4645fd09
SHA1f958fd1f27dfac95f71d611d8691727f01f3e37f
SHA256ab89c94bb6ce9af6e826541c1626827a2cb0140f42bb6a6a00afb44f4207c9ac
SHA512ab088fda946b0b323988dd5d81e861fcdbabf346893fed98a1468d44d4bd564fdbd8899ed72064f282e2437d1f712c3802db1621565a4114c4b4296afa1ccb68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6bc2eb9971e807d27b8adec057ce142
SHA1f5206f1d109ca1ee71ff038ec7a96c6affdbeb22
SHA256b740ff2a74f8c1d7f24bec3bf9b2fdb429be0cd3c26076892e467729ae2f428a
SHA512b4eadd7762380a0c51fbcb88f37824dfe1a997e7d4564a4d2f3b8d4ad2a80b2565abf2dc851ff26fcbc02f4c317888b5dbc4752e1b302e9adb714c3c24b9f687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563821d04702d6c551be465452348ecd1
SHA14928b6b0e77a03085d5b613967f17168123d07ab
SHA256f1455eacaa1bccde77f0b3a432521ffea2eeaf2191c3d872a3f9667fb0688234
SHA512a5eaf3b304c8cc5b8500ae7c720c6865fe7ccd5388ec19dc8af952cd5145d5c472d5d04b5e1d1533b00c5988d6ffc1ab29ad0387db9bedc059e1d293d1ac7e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f8bdf7666eea597f92135e2a47e44f5
SHA1496bda233f7b2ea20264108e5f11a8dcb1eea0cf
SHA256069ad44564035b9aa4212aecdee15f9fa1c428fff01700a67474a73782db4fef
SHA5129cf2c5d1c12a6ffb65dacebbcb586d03506335bc6999d2f53bbe725f965d13725c188c737705fba3f90c3101a372210376387c05f28ba8b60413a43d68f05e9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f242a4fc861630f86f11c04a19ef6a
SHA16fcff97390a2cb7fe89b03eb6260f0be237cbcb8
SHA2569acbadb2860dcd4d1fccb390ffaef73378fccccc999eef5ee0c9b1b25c35f2c4
SHA512669d4426ac7179ca3998664ea9c3dd2e81861a586e26c581f782165e28ed2588f56bdce87c753c69a28557c4bb62c830e4b6c06fc0cea75058b16c98d90675db
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b