Analysis
-
max time kernel
121s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 20:29
Static task
static1
Behavioral task
behavioral1
Sample
fd1638edd20c05be5b2f92bd5b9a0b5d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd1638edd20c05be5b2f92bd5b9a0b5d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd1638edd20c05be5b2f92bd5b9a0b5d_JaffaCakes118.html
-
Size
189KB
-
MD5
fd1638edd20c05be5b2f92bd5b9a0b5d
-
SHA1
0606e4e5e32a273a7a8ce4e46c1ee8ad3089b43c
-
SHA256
3acae8cc43672f9637b74d81510be4356ee9b764c6e2af96de88f6bc8fce486e
-
SHA512
a62d7613e70c8423726f8676e73a668c62fd36c175e12596a8f528043307be59a2dec75fcd7dab815693b9d4b1362dd278f762e46b5e9ddccb9cf24f241548e9
-
SSDEEP
1536:dEmNGZqnIYnyRZWS5ogpuz4fQpp1dVWHGZ4srV2ERZTxAH3jALcZ3xt3VSmFgN:1FkyZ0KNpLcZ3xt3VSmFc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5F12B461-7DD8-11EF-BF61-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433717241" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000f19ead1b3614b0b6f6065b078a114442bd0248af5d3cc7a530daafd2b4ab73f4000000000e8000000002000020000000b7674f80695d57a5c6f856c319816bc2c7306494716b8ec5865076c587669aad2000000045a6e980eacedd33e8823b11b148e4dc29bb01f69affb928c7deaba26ab69d344000000040ea43c6741badda68601d8edeaba6c9ac7785f24ff0cf25593d64c58a3269b137952cc302e81d9127fd8336646b753ce8e1e21a97ec695ff76ebbebe1effcde iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 908a7163e511db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2304 2236 iexplore.exe 31 PID 2236 wrote to memory of 2304 2236 iexplore.exe 31 PID 2236 wrote to memory of 2304 2236 iexplore.exe 31 PID 2236 wrote to memory of 2304 2236 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd1638edd20c05be5b2f92bd5b9a0b5d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb67fa2f6bac9fbb17d7d269d98ee344
SHA18696a4c65cc5b6bb3a9a977623c9c431be5d706e
SHA25655b35b68ae06831a9029b4809af65bd521e04c0cde942fb2db6ec7493c63e51d
SHA512654cafaab15d07df48aa99e0237f50fff2df6e1f50fd2bf4d0bef259cc39c7dc0bf31bc8258465d8424f206b05bb754b3269e2d12f586dbc9f32849c853cbb28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cc2cd941c8f676a6457be8946825c8f
SHA14b8d779007ed0d24378c8a43515e7e6e75872c70
SHA256f4155cf806b32b7e11457b9580748b5df0fabbec7d55696ec30f9c2532276e39
SHA512cfb90e441940a7dab0fa356e68d9f108659e657d00e39e01c2eb4efbcda5bc33c3a467411589ab2020208fcba785a66346b03bc15f91229ee84e477032f85cb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1692038adbc5e854af76d016a17a76c
SHA1a67d8576b9209b176e43b031910d2a46d3863f45
SHA2566e4e87d336520f69cfd7b47f3e1e66233551d8ebfced4445db4bee0384e1cc34
SHA5126fcf351d67b7de29b0830487c363ce9f47d9c5ed2dd3f48c3dfabf722fe6efca510522f4a1c0f87af04b9be2b3c9db71cb62a026d0cdef439561e6b800d41ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9369d1f616da4e23c68c4b7d484debf
SHA179e92707c730882a8d3a5abf1f45721a517d6746
SHA25662c92d6017c7c8b276692af3173a7a0eded1a100d27b504393bda4abe79735bf
SHA512aef0b1e7485af275ec0f9a6719468a1971e9e395bbeb08446cbf809256cb959abb8e83248c8b7194d5e61c9d0d5ac22ab24fd5d3c8dfc312fa06988179ec873b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5440d1eb7726861420cf9f36cd66f4a40
SHA1f6f6b3d83f9986d3c399708ea11105d90cb25770
SHA2568b7f6dcf5f2f63ca4f076234beba0183f95f3779d60aeb84b870e9a4cd6fc5f0
SHA512137fbd39752e288bc114b988e946a5b39a23646068a441b1360cb8756a7455cf2f2c82167dacbf82df97dc53405725d9d55946fa95dd35f700d03deb32dbfb4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f044457cd5defc200106749e7b35de3b
SHA1d61f29e208177dbdedc5186fcf28679968747c04
SHA256eda59544ce90421b0ccd4bea03f1cb3e8b84a939bdd4183881225b3ba22b6ac2
SHA5121c25b936f4425b8bc0fbb12ba7bdb7cc75d1a035d0bc71059c7812e0c94503718484dbbef41b9fd1be4df11bfc86312838aefee11502837825ea9f264404b8d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c765b42b5292a4caeaa2426db15a6e1f
SHA1f79a6bb3033b7db8ff2e17166828eb6262f12c6c
SHA2564cfc07694861fdc8d6bab1b43b80b98a7264bddca4ea2019b6907e963382986e
SHA512f704f7ef57420b1c4007a46c3ce4ba354979cdbc0bdac1f8874f51a81f1add4761a8ced0c82dcc1086f0679a7275f0b39e3c221bb6c56034ee4e4e12b2131992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7e3ce0134a98c7aee8d1e551f9012dc
SHA12483589223cead94bf0b3164ac09c9827a5b5ca5
SHA256b604de15014cb62e81826972b2a4fc07f77fc3683f35bfbf42327d3c8cae7569
SHA5122c318f535d7755f34d9d6c287f7f31263cf023e30a101701c50ece820614a8e6148ba76338a25ecba5dd442a10175a750d6dc5dcc990340c17f2c3ad5f4a8537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d444de2ae5bb2a1722be749be6e3ed4
SHA1d628c85d26f5c87f5fe3b4daf574879245c5bd56
SHA25653734847381b88fda5f86842c2c624378548a3c8fc96309b4ff64af9d9eda88c
SHA512c1b4e030cf0416288af3e0b29dfb5353a786813d807e3bd2546d3258cda437007c989999411cd3a7bd67879005f2f6bcda96f8783d99fea9d31294989dd3735b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec4cf32a62bcbba1c052bef966e7cfbd
SHA1e7fb17399eb4bcbc46351c38a32af18a0556bae5
SHA2565507a6bfd4029b980d30a8342e7aeb5659438042894de1e5910193aa0ba6370a
SHA5126f5b27a50ce625c81da8510817876e071c8cd9f6d369b112bb3d4244086953bf2e7f1e454b6deb98d2c3fc7ac232b5b3734fb801b73617c939a884725162d6d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576689c2e4b949ab1ff20327826806de4
SHA1b3c718f1ed269b59ae85a853de6b38bcf8ffca9c
SHA256fd687f8ed00574ff0df99da5df214c48a8c062a9d7ffdbaa389c42f94374bf4b
SHA5123fa3ce4f931ed15d933478cbf3a7129c0a885d1b0229b018860e3685f8601d9de630869ce6227392f4a18a85407fba51e71f72efb655ba3f2744912f48e3166a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe6fb45ab8b36a772746ea255167904a
SHA1cdc95a6cde06cc1f9ed1e720b9ee5471591a2d1c
SHA25667a8884aec299f9a700cbe15e7339677e446d8b421acf988b96bba258bb65931
SHA512d65b0a49a319bfab9e00a5c8d0466aba118de7308643039e8bb23e3dae8cc048569349b7a8340e6bfe530833246793a80948b4d1192cda868b99ff70740a945b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a54c4c7f59a765f90bdfe67533d6b12
SHA17a076d2bc0fe5e5c75348e92af65711c11a017e0
SHA2567bcf52397ac98302dfabf6f11886add58391fe6fbad0b6e20c93fd71f1676fa9
SHA5120f14c2682e9fbc7675c408c3fd1776e001be7a26d24e952fb71fb5bf6409540fa6798b39a8348d6741b1ad3b352aabb4bdea5d0c66b18969735c27963f1921ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522b840248f3bb281a35bf333681492b3
SHA166efccc80f60099af0a8415a6baabde7c6df9e89
SHA256a1b97d0c778b37bfe13d0621fe2ea22e6cc9ab24ebe3cfb57dcfbf0d20341b53
SHA5129de31c890c82b45aefb5f3315cd278288e0b1bd3fe78dadd20e95ef86b0ffd026deea8be524ba903f9314c096165c456a52804b24e532b3a4e9331652ede6ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cb81df5e71b4c462ed0c4436f4c3e41
SHA17b73ea877a3ea0b6a962f0e3bc1e0911839faf7e
SHA256ee13c51b97d589c7908c0891f3be7d731897091033a8c21f9b44fb61d26e5ebb
SHA5122a47ebbfb9d515a61881df22b623a6d15c90101d0b722e28453645c5350ae15340549747fb816163c3f291e75843ea9e6d5721c3ddc1a03c8d12e9e5ae542211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b916434bca86bbfcf02384579d9f303
SHA1ac9923641b751ab3d4d45e01a20862bd9009554e
SHA256798ef719bb84b2116b3753b3f141be2bcf111c8008c470d548986e774705199a
SHA512f8716b210da9f5b8ab2e24ee12e7f74f5139e4fb7bf107046b5d5beb1995efacd84a1f93e91b3da6b3f0372dfc112d80079625bbc046b9c666526069a9887bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c8f3625546e022898b009d9f86dd942
SHA1146f35f4e925c112067cd4b0716f94388cb6f108
SHA2561079f06d342d2f6c8e96c22736ec66ba91b06929df3d15062b69247fefc1b1d0
SHA512e97f3dbee4999bd17408521e155c1ec76617abaf72e343f7fda62b72a2b4d5f8f62486610332db00500ebfc93b8c49b9cde0946e32b6fda064db1c17c850d320
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e53a94fd370fab14ad9e346a5f8069
SHA162ba75f4597d7d77a8e9c61f6df6f187452f6093
SHA2566dd9f61354e1ee177c701b1eeaa9951ce899cfe65211ae416871a5ae631c5287
SHA512e661f18f1a732cc13733b0076a2f2ed7e19279026a065fe19547d87eded08e7c1fd54cddb22b03a391c503dc96ad446c79a505b6c2d15dc641718711cde137dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c7919634e74f9dd5ae93a171b58e6fd
SHA150f01d216b4e3704659c81a281586b5ac8b79df9
SHA256e44d1a6179cdfe54b8d6b761fff602eb775033324a5bb8b0a07694d3ab89f5b1
SHA512a1a6d75cb8f7200093d32733b8d5ced748d8ef05d1e304bd30dadde7ad91761990baeabb5e91202dc9acf148d5445df88bee2ab7e693d87c055a4e9ed7de50d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ade9aa0654c2c5d6155cf0d40f95b2b5
SHA1a307bb719e4a89d265afd0dc79ee6a9424991296
SHA2568d5d1b3e05dfc8c4f197c6af0cbda83f320d383b227cfcaa7f940730acd659a6
SHA512a9e0203620b1168a2bb621499012abcee9a02469254249a7c390b9d780bda6f119fb00b8d79f06e37e80aab278d2d55eb627f8afc0ab48eb9d54a191ce55c9ca
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b