Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 12:38
Static task
static1
Behavioral task
behavioral1
Sample
fe8bc895586b0690ad65184e2ed32675_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe8bc895586b0690ad65184e2ed32675_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe8bc895586b0690ad65184e2ed32675_JaffaCakes118.html
-
Size
94KB
-
MD5
fe8bc895586b0690ad65184e2ed32675
-
SHA1
01fa5a1a092de81f57e6aaebd6a4b48c5aefdc18
-
SHA256
42e894dec55bd7a472b87329ead747c3fc0ac57a0feb80da6f0bf2b8062a3f9f
-
SHA512
e1f97615dbabae91b4029db8cc74def402f54d0e6f6dd420993c8449198fbbc4949d6d25dc4a42fb6916b10daba25e67730454c38af4fc473be8ae122e9ca0f7
-
SSDEEP
1536:WMLiNV/1aJjL7LSMcCKF0rAg0FLQdAfHZ+1yztiBdkrY8mgHC+qpEyW:WAi7JEBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000004a5ce16db8dec10f24b4fb211bd26ce3b2b609115fe78aeba2413236253042ca000000000e8000000002000020000000fd3163cc6e7131477024d89b1a4c978beebdc371bcbffeb442f9e431add0ba55200000006d3ba84e3ac88ed598f1004f3f065675df1509804b0a0b5fb8c15c3cfe2382b140000000005ae4dac006ce249cfe4263eb6175be5123be7a4451f6b1ba6148eecc9e4c8e0f91991081451730dcdcd2289363a7047a597fad3f33d10144fa3ebed22251bb iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433775402" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA550891-7E5F-11EF-81BB-F2BBDB1F0DCB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d083a16c12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2380 2072 iexplore.exe 31 PID 2072 wrote to memory of 2380 2072 iexplore.exe 31 PID 2072 wrote to memory of 2380 2072 iexplore.exe 31 PID 2072 wrote to memory of 2380 2072 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe8bc895586b0690ad65184e2ed32675_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547c48010ff24fc849501f5f19f912d09
SHA1e00d71f2c72a7c19d08e52aa0d642eb07d3559b4
SHA2565f7a29b0ba58335c76fadca40ca3ee711fc372497348923171e7f4ee4e999948
SHA512561298f281282cd63f8d760a26213eaa618dbfc5874fa6b3eaea74b58d3acc3f0379fe3ce19c76899dc1a8081254ad866b083aed3bf6efe30fd5d85521a3d7ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aae4b83c700f14ef0fff369efbf6ca0b
SHA1c0b130af30741fd52907a4b0900079154a30dcfd
SHA256f51ba6620f4960171dfbe357b384b7be221538b5ab92894a5601107d0160475f
SHA512a4dc67bf88b1236b872c650eb38d677862ae35bdfee60f6bc527f691bc67d413292ff886f20219b2dd4a579ec314dca77412f89847e647734973f01d6d2ca67c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e35b4a5443f2108183e72af202d33e8
SHA1bf654f465e63f4ab0162bba6d23cce2faa882a2a
SHA25685dac328c108ac3e20ca14816ea0cc6a2fc16eb67ce8a6d1b5c3f9d457940537
SHA5124a2c3f35fe349b227b359f83ecc78cb4618b0f7b44095895e4c349bca7fdd62827035e93a02feaebf30bb44daefab2f2c9c5b2452039bdd04bce5fb76544dd00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd3cb527e14a3ac3b3973f5a2dfebcf9
SHA1a78b2ac24f1740fd78f6e3f0552699724a495a8c
SHA256784bc6da766bd89872981925062ebabc2e1868bf16864208730e1eccee0671c8
SHA51260326794489815d7575b517b3964466cc2b0852815ba4c4df29d7be995f48eb9d8c5add5ecb1b6e89bf22f73df36a88f328968fb74317995a41b1d1ebc9e82eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514ccd7ea802fe4444bd3566fc65a2268
SHA1e5fbe604d034015ec290bb1984b8316b17dca1b4
SHA25688bf90492e64c1b5dc2f2613368ffb22bf20a69f28dbe83fcb55b5cdd6ee8844
SHA512a47a29e7a5d462842a058918f82cb8a27d09d5461b628ac94b5355b3846e5def8903e6e0e3a400a2916f58a81ca96f2be7eb59dc4d212181ed958cbb72ed2eb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e5d4bdd541d9e4dd6965c045d796b7c
SHA100e6cc93a76e188b846f73f0cb373a86ef8a4572
SHA2567ab2ee9b99d239fcf164a1e1b188717bb6b9b3faa673808523933eb5e99cfe5c
SHA512eea41bd02c54f9bcfd0330b7f04dedbde3103ccf107e5e17d3331226e497c3ba2a0f7a0e9c82f8dd65edb1a7ff3bab03313782b0f8a055294d5c650de2ab5264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51320618c5aff89c0d8771188fb4c1b4c
SHA1baa25eaf707f7b86d3d34dc7e010bace0c7453bf
SHA256acad75c57915a6fe9381507d278bfaa6f9799df401aa3074d26f6b015db437bb
SHA5127480da6ff61758f7690a728d6ef1b4f73f2a7d0cd6e361b81c12483688ab37d08afdcabc0702a0511c200fc05efeb3957cae8179f05dcf0d4b9d9e4a69e7f5f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53183713677eb50bef4e712e8c52a3605
SHA14fd3059de9bffc9a8b6956cd653c412bd000e519
SHA2565d8e7def07c49d6745eddbd059323f072a2ea55e09a6bff6ce29e986a2c0d678
SHA5124e2fab690bfeefd4e7fbdf8d8c3ae52edfcd446cc7f32c6bafd9a2472a00a06024b73353e282893700cd24609ac52f85f7fac83f5e8b7fec65c43316f40394cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512b983a5fefc4314f8c429d11beecf81
SHA1e5b3fc383edb72f94ec47ddd16c4ac0d6fb27502
SHA256eca28024cab30e11f06094c29286a33fa9ad1b7d21e8ee323cd2d865ff30861d
SHA5122b11199ebb7c49d4ebe4fa1fea3bbd3a9db5047f999ffcf31e77a1889f7f8b64097a603a04fb0c122713493330a21643c962a386763e8af64c2ac9d49dcc32c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de404fdbc2af665b8d2568ac1739c011
SHA1d7acdcb944c71ccb4d4a1bdcb2b41093b89a6f0c
SHA256b6d4c578429ab825ea2e6f45fa315779e711ea887d98b2abd3efb4712ff500c9
SHA5120e2a610edaa6eb47e6887af1d8b0d2f08be80bd73f2d8faee9d418a5897165a7c033f7acee6be4159b74577dd909664ddd5655348c809837add4fe6d6493786e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50344827779cca2b056f3118cdc739157
SHA1aaa97397c49a0285248956272b0721d1b5556703
SHA256bd67205cc97f206cc1a87790bbd9515c6675455763be205ed6f8046d2dc24657
SHA51263d489047e09706e614ab90e313d502f1c9367f7443f8a7a07f9d589141a4efbc49b5fae9b7387ef61fd31d7269ca12e7f934214317c09cac39e55c91dcfa723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d7b94fff0bdad06ebf32ee161718abd
SHA12beace1be70d75d0730f22aafc48afc8fcf41ae0
SHA256130f5fa0b8067967937c41beeb0ef3f6bc2ffdd86080bcba42c16d1966ff6b94
SHA512273855bc6eb8c473a5c0a77127477c25947d0b50a96fd78df37f044b6adccda38ed94a463bd1cb5b853eae7712e659df0b84bc1b17e5e531b72cb7d245c946ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51323dc2f7e2395157f552f81ee3c9556
SHA14edd0fa5ab752107b2ba31bff0fcec23c335c184
SHA2560f2cd15e590514a02e110cf8541453671a983e930dec5051c2d76d1d3bd271fa
SHA512550610f2af544a3fd5bf445f108014c516bbbeb64926931473de540765fffde816fe118f91ef3efdd33a0f747f57d5d5926c0152957f7804aec212dc5c39ac2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a31376711c6fdec7572f8e0f31df6d23
SHA1f5e43fad97adf507649e782582e784b1f721cccf
SHA2563c83104b4f392b7a478d9e9f7c2aa3febd6e929e325fbebb67b05b9bd64b6a94
SHA51216bf9a766c11c7dbcb508e174f6b13debdf2f272ba02e719bee7fecfa762f0179efc6e4600d582473ef301ee4e71807600c6c298735374b577a91c040601b5f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56daf8c0b77d3f4a1451c088b26718e98
SHA1f690e5c6b37dbd0930c902ecfd2188056b770bce
SHA256b16e3e20831067435f3597eb5f3ecb8f4860fc315d78e7f6900091469d6ca209
SHA51274db2766fe9c135dcdaa3fbdd6232821321220357d70813783cb3fc79e1b5b9e9f9a297274ee77ce100e598086b4e3654c0a0119152f24b1d02eebbaf4f51780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cc3495928151e31e315b009dbda14c7
SHA186365a00c2fc581d7af0a574cbbc87639aa745c1
SHA256855a17716876ec596a68e5916a56787b063a37ce9e8faa85ccc82f898082c33a
SHA5120869b3f71dd858d4813fdad95af0d08c97b9d7f7edbc66e5be3c869860fb2665ab80add7f98673bce48f33221860f095838fb3f63d16e4a1cf943a915b2168bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56665b90b8badb10a4cd865e27a40ca7d
SHA1b7bdec58b8445b60e08955502838de7413a0cbd6
SHA256e406adf0a08d576170a20c88a64e1268df865f6c780703e1f9bdd85e6e284013
SHA5123fed707541eeec493960beefb5e80b129bbedccbd0d15582c4a22d6207bf4fe887d44a024162d271d7c6623d594db6a1856e2e5710fd572548d2206968fcf0ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b86b103b7132e355331da97e0592509e
SHA1435e37839c116fe484f8cc58324489c73456a057
SHA2565d6da14a4c665f7d6b8a9d8fe4a2dd2e123b73f48ac46a6293b6c02eaa3caf69
SHA512c08f74360ff9c971b4715a1313a9489c307eed34b04ac01ac7b5c77655d626a08f3d58af5f15d2c5fa75eab415bda47887c7bcbf74d20de53eb9022b8f32b6d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f48264387bfb59f74ee2c46ebfe4635c
SHA1bc2e6b1281aa4da3fec1e9d748a53a80cf7844ec
SHA256bc17cf91b71daf0494325a8f446b2603f58ba38278908e63da48e08766aa9804
SHA512c5514da7a248efdb89cba62b38b6b1988c62dcfca029417bbe2ae47f0bfb1cbab366f03eda2379c8967c49d83e3447e93fe669b1672b5cc083beb9e9fee52493
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0I0VVMWQ\slideshow[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b