Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
fc83a43f8cbea888f30acab447adac22_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc83a43f8cbea888f30acab447adac22_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc83a43f8cbea888f30acab447adac22_JaffaCakes118.html
-
Size
19KB
-
MD5
fc83a43f8cbea888f30acab447adac22
-
SHA1
f70841c86320afd2b3049de81a42e7a9828901b3
-
SHA256
ef7ec5ff5b9d6cd94b14684e2b86471b95e00623ac03ddf9c0542e909801f656
-
SHA512
8bc771fd18827372edcf406285977567da0144a397f1ad9f9e01ba85b045769cde60a70527430ee3093605b0360591f866135dd6947b80debcd94e137af1d17f
-
SSDEEP
384:XP6P99i9oH77KEPyBMpBMFAxnsbCoXPN5oO0pc2IEt:I9w2H77TPyCpCeAWt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000076292ba8039ec098d54fcaf97f1d01829b7535144cb54e6456f4a70825272b58000000000e80000000020000200000009802481aead29fc970380fcb5088c7a8ffe64f11964a71c1abcaebf733aa0b1720000000c0d224fd6dc8d6b043d6e328886e05551bd3851ee05ddeb48a3f65ea2d7bbbdf40000000855f02bff1429f00c0312a3e1885f5eb7df9b167f2b18549a76e1888b174047d9dee698cacb1a2f6db7379deb3c37efd17c19cfb34ff920b4f582907513d21eb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF3B84B1-7DA7-11EF-AC30-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20afa29ab411db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433696357" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2800 iexplore.exe 2800 iexplore.exe 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2800 wrote to memory of 1956 2800 iexplore.exe 30 PID 2800 wrote to memory of 1956 2800 iexplore.exe 30 PID 2800 wrote to memory of 1956 2800 iexplore.exe 30 PID 2800 wrote to memory of 1956 2800 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc83a43f8cbea888f30acab447adac22_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557514605b4a837ef1cb616c375618f0d
SHA1fb4fc4c973e0407172887370505c3a69d2163a28
SHA256a7b67dc91e91e26bd7d625a78d1e65decac127232d143ccca7959882561b7436
SHA512ecc65792f0f198a3f34d5a8f84c21090beb0c55d79b6e98fe2f452c282216d362b0dbf7babefc2fec8526ac4dec63951abd52b5eed3a2d0f38dfdcbe737cf9cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c39949fee561a3821a499f369aa1db4
SHA12a405dee106fb0ada22b34a0903329c1f18b96bd
SHA2561a449e4f7fa61adda404790816f518b020e6c5439ad91e0c72056757e6cd030d
SHA51258e174bdff898218475300ea3be968e1fa9728394dd091ab3e7dde053da4c6683f4ab1e5b8c6ab5dc4854ab76ae7066cf36fa514978b5ce532f513e3c9be6093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58718f1bfc825b53c8f561f3256cd65ea
SHA1ae9e883b9e0d5860ad2eea751ed6d6d46ab42ac8
SHA2561279351579f1f282569dd572a5fa34e3ea9d56d0de493e53320cb7719c68452e
SHA512bb004683de8796f090d58e441236d95ae63436429af94f5286b1a76e044f0a572be3ce7a4ba26f737095aa482635cff492b5966e35b411e2b35a1e3aa64d04a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d703358bcf97a2552c1dccbdb42f5ee3
SHA1158ab8ab736dc8028bdee0b3f1b389a8af729c84
SHA256bdf174cebb62f9369b9c9351d0539a1d7971cf03128b02f248e3e890ab9c97ee
SHA512917dd5041f7672e9b39512185d9aa732c0996ee89e98dfc49f71ae798dbb41953a700795a57d51cfcdf6d39963959ea1bd7770aefefee071a7e982c4e9d880bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58189036ade5d8585f3b9923395ab0f9e
SHA1400c3b7c74a6af33eb82e038c2d5d9f816df710d
SHA2565511403d8be98f528f6648ec9a66b6ac3889bbf3874c2bf9b37af77269a18090
SHA512a29f00e0b37ea07356ccb80905ad4f7280bb6268f1caf94234111d4ae7945ecde066ac737a87ef97773ce20dde01a6eb1d60f08af7ef9558e84d92149019f907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9e10dc90e4162d24c396f71153b4247
SHA119062ab8b0d0fe664ca17ec2cfbe7e7dc84d7b0e
SHA256cbc064444dd8b339573420f0fb3c980afbfd253e2040cd1d1e2c4b5ad8f138d3
SHA5121166c348b7979dafe707e67dad0fed8a64e5c74973c93bfecdd28704dcca0518d3e4d4746a80468d2dfc2e890aa02e0754fccf1ecd477a5f621cadd629163109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd8980d9d24db8d4536c0f9bd1c8dfa
SHA16b5e3b94ee72ed40095fb71747d8cdbd20590167
SHA2567121730c6f6235efe6baa33cfad6cfc9f9f21e9d081acec638a5788f7bf8a61f
SHA512fbbf9f9c94e62add8ed5a4fca58816f59edd8ccdce9c221add607e33509979c2d71a375240058a8a75b05d2bba1b52831e5e7be6791ebc6c1f27c2e4f5ebe9ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dbe65fd2dfce8b15aa361664a98f3e0
SHA1dc1e597a4730c2c89d9f670599cefa79bfc29902
SHA256174e01f8801326d782d24ba0a86fe9b84dc12a5c4b6d71b76a5209da24fd7a13
SHA512fbbe869ffaa54314c4e55fcf128d7a1f451f10898e60400453250e4cb2afe6a874d19ee7def1787cc4afeb23616cea8bf8acffb3a3dc68899f7093a356f08cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534a6f725abd5a2d9935fed639b62cf58
SHA1599279732e30e1d035ef9b89b09f8761c710c457
SHA256dc065f77c6614ee419debbb64b642edeff1909b0d7e3330a090129f1c82b67ce
SHA512d8bb4d07ffa86ba799e5083b86ee66d22696dc8d9c9a79f2d4b95a2fa4a5a3806b17202c2d611a0ff221430200fec0dc8ddc3b0474cc37e312f309d983aa7114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fd8685b8e33513846d38a1ecc75894c
SHA1bd6cab166314a53618d9ef7de331b339a576702f
SHA256d292c315bbd2937488f857a50429e1a0bac5459c9a3fcffd6024e40a645887c6
SHA51286d02e0cc81904271ef88c25eee7ab08e76680e2a4cdd288858a4274faadf97723fe694cd22873775f71b0de543bfa6f0054c0f4727d6dfbf36f454152f8b722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5971c8f6fc73f6e5d7757ec60699c9e69
SHA111a6d3e7ad6eda6320c8a269e9a7f3ff6c32f0f1
SHA2567a5d67ca4e0bcb9f8e61be07715533a1ce24e155de50012981702dbfe9945311
SHA5122ec4100e9986dbbcd0a343d68483c7abc44689094e6bf8da8d86a8c3f21350904b171af272a918749ad51f512621db65a1c326fce6c9a7dfcf9e3d0e21742ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc9bbf6a6e68e1ef16896ca9b13a1f0f
SHA1683bcb8776e7844a340d614df7d09c9ca31b6875
SHA2564dee8ec2ab5a01ff35956653c01a171e425b9af6231d9888169fb20bd41cddb3
SHA5128532651d7b3792cfe7fde73c3e94bc3bc57fd3e5ed4251fc579d257f04ef238c238784043dc41c58bcfecb0d979c51e305f1f80da8177659ed253e8247ad43a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545416f394d7174fd20c70a87916c3b42
SHA1f0c4fceb6f634119d923ede90774c6a6019a2ed0
SHA2568e3d12456a0029644fc343b61eb211e471e67453e697aa92eb9da7a93412a75f
SHA5122308ae7f3192cb4d16c788e8b9e200d08f9dbfcb87f86af85090a1e6fbc89b8f8f2fb1da17f483e0ef8c0bd232eb74727a2115f39bccc5442ac61c4da699acc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2b4b83fc028b9878896b98c92a20ba6
SHA1c895db4dda6dc14870494ac1fa42df5626395b84
SHA256ef552ab19d4c754e0cebb1eb195b5967684fa986d7ffc82718b8a9213e3ee2de
SHA512f2d49404afa2694a52a301804b2a45a2b91b11d528819fc661e5a95a31c6c36b35c20305316377bb6fbc92d5b07ebb81a1e7d3da66716f00cecf9b26afce8551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d399beb1aa42fdb5ed4dcaeaa832dae8
SHA1d977f92f709e2548963383f9ece173ef5e89007f
SHA25688c2a3191a8501bf0f89e7f71deac131a8508539f997860124b504a64af83340
SHA512ec35dc98a9053d3ef467ded9b5e1dda590829db5c5100e1a19d123250b866d08842921bce4e3b2ea59e928bd845e9326edc9ed3e4ed1e936ef7a4b019bcc8e84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d0c9b79e0b8e8ec588291babec06fd1
SHA1fc9f725df1fbcd9afdb93ce05c85911b62b92ae2
SHA256f60b17512be30323abfb06f62c03d8ceec29995a88882963fbb8180c9b55f1ee
SHA512b14879d01217ac3980f229cc54dcb17032501f0053d6795ae1ebd87be45030fefce9aca8bfabb0e04d0e974f7ca44eb0eb7e79ab7f9d14ce7844887c936fba9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f50d13e6a11c261f0bd54ddca937dde
SHA1ee6693aa2a83fb028e286d3e9c14b05a44bf9b27
SHA25665ce3edec8fc689375679a10a1f87ab84204d1783d6d05261426c8d24c35e718
SHA512f66827693c20dd1759cb621fb614c4d9945f627a08f285db796c389d180881f4fa5cd8751743c358c290880ff0b10841f88cbfb76374a5bbbf08d000d41abc72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58910bf3ad602775fe4068136ca489b79
SHA1718c1b6cd53f26cbd3d23aedb3ea2dbfa0f73562
SHA256751b21760e4b7767a65a3c38a28d487a80c1899f5d15a88ffb861ea9ba8dd2cb
SHA51260baf320fc431e5511496f4f3678060703f471f7380a4470e1fe0c0496183a5c3969931fd17aab97cfad806de5fe7822f2e746d164523630521ad51c50533e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506312b2ab5ef93f5ec01bf3fed6ab93f
SHA15c036b1bb3546cd57490fdbf8b87291cb4b1daa5
SHA256a48be0e482c11f60a6e75020825630f57071f357e3405dc4b42bb691ea243465
SHA512a0cf2008c91070d6c97a151601060698ed3ceea34924a9b868884ef5e2de3588ba673ce663576cc3cd734276d9a49ebb1f3c84b6549f2b8aeaa34710875129b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587fe87982987cc1839bce467ac16a217
SHA17377aefdece323107eff6fabe57d43405c4c9e43
SHA256288deee2b8e866b93f1727d8213e7945633712ea8ca11bd6dda0434605026ef8
SHA512a0bf41ff17edde672a721e4f57302984b0fc7f3f88db0b0616c9a2ae120e5ffd7abd9016cb2b522e9263b27a1725cc0ee71a8c1284901a9c6984a10dc447d37a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db501ca4333a7f5d634850f851c4232e
SHA194ee2d39d8e2614c0c7f9e37b32e065cc6d3484a
SHA256436f1b36052d9eb9276576296f4d57f029acc5c585750382c6a3bd762179a578
SHA512d763534bcac65b291361c34e34f37fa23d9e46850315110b046b6996ff306c9930097e7c153cb534651284438810f5a3b9bc3e5bf66ae65e8f8babcc4b888f72
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b