Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:29
Static task
static1
Behavioral task
behavioral1
Sample
084204a1f6c1d54e093c5b5b8118a9a4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
084204a1f6c1d54e093c5b5b8118a9a4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
084204a1f6c1d54e093c5b5b8118a9a4_JaffaCakes118.html
-
Size
53KB
-
MD5
084204a1f6c1d54e093c5b5b8118a9a4
-
SHA1
03173569bb173f2b6fb4c50840b26f326a148064
-
SHA256
61e2b017d607ead5bb80796e43cb42dcfb05fae3c718a64dd19ed6d5927b0fa9
-
SHA512
005fa761e12dba101a381ffeff0eacc1b6f4b33e4c1094727fd5057947d424edbcc37a10189479037b96a7f8a3988bd343e07e2bed7b05280a88161ba3fddfaf
-
SSDEEP
1536:CkgUiIakTqGivi+PyU2runlY163Nj+q5VyvR0w2AzTICbb7om/t9M/dNwIUTDmDd:CkgUiIakTqGivi+PyU2runlY163Nj+q1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433994485" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e8c9b16a14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC02C691-805D-11EF-BCF9-7EBFE1D0DDB4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000af414fb310943af41b22df81aa3c82b1487a5611b83cec4b6a0c2d4c13561245000000000e8000000002000020000000a9ed26da8ae9d9e3c9d095d68cffce46680ab7143034d8d990306099750f3fbc20000000d2272bdc30c65687c6e83ac49adda018c790c6563f7a2c10114193193199a04b400000000196adc71c01965c3cb3fa64440716e9966bfd9319d96d022c547d8f9d4acd5c4575632c5e94357831d9c8f075264d527ac351052a3db2e3319f5f3e9dcbdf9b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2680 2668 iexplore.exe 31 PID 2668 wrote to memory of 2680 2668 iexplore.exe 31 PID 2668 wrote to memory of 2680 2668 iexplore.exe 31 PID 2668 wrote to memory of 2680 2668 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\084204a1f6c1d54e093c5b5b8118a9a4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544f5e27410567947cfba143ab0631381
SHA18c493650527f7317afa309d685438f195b4b2b4e
SHA2568c6cc48d29b843de37be0cc05597ce013a76a2b785376681cc81b41dd8cfed87
SHA51221008f2cccc44c5381db3d247bbbc8c68ceb01c2ac415bda2749f23eab54a9886cd49f712aefca2910e5cf4e6c8dd7706e00281de23ecf55aeb876ac276bbf0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d3ea83e7fc9ebdbf38aa1618b929b0
SHA1766296f2421fabda3d3dbd27563e1b88dc7042a0
SHA256f17cc0461f4a37d17e1655520a47620e96f18ee53d6ba58981189b60ecef115f
SHA512f3ba828b2ae34a1d88151704fbbbe60c6adff66963d23d21408dde4e35229e5c6861397b548815f4081da4d204ae62355a80985c8f5132935fb09378dbdbf729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da6121c18cd3f144e8dcad51bb327a0d
SHA1f31d1dbca2974a1ecdc63b41bed94394a66c7a20
SHA256800fdbf86f3a7ce1b09c8841e06c9b501c5962bba000a10f1d537d0a459468fe
SHA512021be5d88ef9d33c155e660bcecfef30d900948f127b4aa52099cbdbe5777a7669ea3892451fb3542b7f46737dca97b8d0b9a073b9eff4fd57e3df9c25c68968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d8e731a0cb1fb647f02fecf79e6757d
SHA19d5f28f8bddd0c81cd9ef4ace026b2b60c3faf9e
SHA2566567e109cbec9b6c4f993f3e6716d7dbcfcc162b6ff9e2821b1b3f61ed2e9b98
SHA5120ff35bcda20f39b9e837c46890b1ade3c8e945c1904000c599afaaf275c9341ba49eb4f418bf926d03d41b070de4d7e0beaa0647074a98302b85338a31fc350c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d27f726ef533b3f334e820f57c6b8b37
SHA18edba597df726507a1c7b19ac40584febefedcd7
SHA256db0e1f78f4f5c31f4f39a7d66fd49152259bce30c4a30d521eafa45858594c1f
SHA5123de261adb7d7e909e32f0adce2a232225fb2989fe864e638b3c7744aaca4dbba0188b53d68df2e177a223b563fd23a94632f67f2380041dba20ce1435560625b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0ebad6b489913fd96676542e03f0d59
SHA17e7c73cb9413ccad742cd395a0d330c1b9cab5dc
SHA2560f4769de122948bd4e9b32a305c4ec0904e2443ed67bf5bbc229e798d70ad4cb
SHA512d11b7bf759d8cb0be7aaf50239c5915b60add9995a95c6d0510b27db4c99a15aaf10429fe64d51371530978ae128b73c5abb8b9ede46c371e1513984dc93b6fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54639f6eb6a25a237147d97481fd3ae7e
SHA159193f086f21ebe443bdd0f3ee01ee2dc78e53c2
SHA2565854d23fc228752e11ecbb44ed08f749490946063249ec6291aab2b40bdfe690
SHA51213834aba032fc89ea5b6d1978ef7d8f1ea0d3fd62b0d0769ab77bf9a9591dee8f9241f0815901cc7bf988ac5fd42cfce7847fe4397496bc40be911667c3e8fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be429113b9a1377371c8bc055f3e8a24
SHA1864250c35dc13994c11c0d407a65db9302b17681
SHA256652f1d3ea4ea24d0d648997576244f51f726c74b50a5e6d3e973c6cad4670811
SHA512cab759a515c26234da75bc149853f04e5bf25198beea5cedc3c7829ce48039987a50892a675ff089ce30a51e4fd583a3ac7da4307719a0455a3d1d16f39218c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5831aa37f7114999ed27dd6984b28bde6
SHA1d8c0fc4fbdea4890e7d6476e95ac1c877c6aec3e
SHA256ca694ef82ca27823b188876f16bcbabb6b837a0a0fb424a9028bddc4249826f6
SHA5120c14a748d81d47218cf964902ec9942418f7fb2a8d79dcf1d5fa39e4ba82fc326050918599b8a04f0c064c48d7f1b21493a44b17b457487a0fe12c6a2b9f002d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ca2f1806e227cff8e206df0b79ff727
SHA147ea51a80589f3e65a7d98fd6d79de152cfccfc1
SHA256d8debde2751703b259910dd26076fcde559454034f70fcf33dada13ca7917540
SHA51257f34a35c70dd79678be33fd98be4000c0736c814ce33418ac9382a4aba8deb6732cc620080403c55130c4564323a28a5de6c27bbf590010b452b38c2c3f870d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d6fc35b50634266e7f096d1528dd1bd
SHA12a4dab703df6a3787633557502dc93ff3ccfcb25
SHA256c30a5b963816bae1ce0a18a20010ad9d0e898787040084a3ff4b2984b58dbe77
SHA512f52a3ec06dc04092b8e96ea50663acb33fce3420c185ca3c44857f152ef6a3c6db75070d6788441d6267b339573905d63d5052b0b87b8fd48ac01081a7e3f3e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54553c24ed14a3b4edf86a0e83b301ad0
SHA110e6cafdcc75c559b44c2057fa769532c1e55498
SHA2567671acc7ea9b308b1854df5b56a058a30d44f708116e3a027b2c6e6a409561e1
SHA512ee52355c775589f4ac444ad1acdf464ee6223a6a63ecbce4df6c7713dc329a163c4f117fb4e479b63201412fde0ae429feed682d136505987f552a8e2c5b8595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a7db458dded4e636b68ce7acfa4e2af
SHA155aa00e84aa4246fb6242ca8319e17861ec3f328
SHA25642c387e220190d18d74a098533a03ecc43226ac26b494bb0d739fa66dbdda78a
SHA512afd715b7ce4b6f8a57a2d4c0f40e60bd3718b67bfce81a82f441e18dfa1cfcd0bcaba855f141baad1e4ecdd756176c6f3a273f3a927907a5a3075c50d15305ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561092346c08020bad82cbc58af9893eb
SHA1d21e7a7b0bee3c929804fd3b6804160e0d11f9df
SHA256cf2583728b800fa097e84bf3a8e751f4413c21909e380754b688ca35649ebb8e
SHA5121833d5e556ce35a4414bcee56255c720a7b8c2155b4bb13f1ab9d221fdfcded4d50dbb2512ef8441e1fb6c7731eb039b12c5f269b7d30eb0160090bbb0d25654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51090082adf8b4ec79f671855f90f94c2
SHA11af2d37aade40b2a5f7e5a3c6fed78968a82af51
SHA25698e70f3c590081931a24063d9b55907f6074a34b096cd1c260ef3147ef221294
SHA51213b8bd47d3efa22ad8a0caa6070983bca93d2a679b2cd8fbc124b3add9b48af5a9f036264703f57b63030d196e2f03f655b7ae4b41a555dc6c7761b5789cd96c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e87064fcc5753c15dfdd7bd427161684
SHA19d32dc073b145e5a9d98a3994a5a18671b23115f
SHA256d97d7c86a3608dfa486a2e01e5c4e3a8428a01d36669d917a1b194385927664c
SHA5123ce795775cb3cf4c5f23ecc9a986d7efa7f0d640cf3a9e01344094e454dd3faf60f2bf75626f509222e9d6a48b7afaa0e5dd8b1c7bb03750c57b2da4c6731b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5f8a8abf0fe4f6b0956c086a2bc864a
SHA1186f53d36a6cfb747b749be43ece04bf2f5f943b
SHA256af2ab9e851cfb8569e9996283f625ae415ce371f372bd251749cc2bc7777b02d
SHA51234e7c849e3d516a3f746382c1ff5c175a52d48e82dc37abf70435932fc940992765c88ad5dafbb6ec915fa78044e9eca2bee4dbd2a4f69a38c84df9f18c6ea28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e05003e1249c67d3c01fd1021bb47488
SHA1f75dfdf2c7b7db3c8d23780d0bd5cdd85691fb83
SHA256cd2593a5fa1573661a7be76a97558e3ca555bc72edbf68968f67a9a94f4c3151
SHA5125f97b01a2aff0e6877bd1de3d9a51da41c114bfe98182d7fbb13a0b69865b0c17e831d50967490fae97db32b061a9b3d00311286be52336809fd7f119d54a573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389f193c157070e611ad3e394eb1e1ab
SHA1d56cfd9a37f9ef08dec16ad1431b1b3a586df8ec
SHA256fd7f27fbdd71f5e7fe2d2b15c2536d8656ed6ccba40607154f080d88b9bd017f
SHA512a229750dda744120621df371ed688832d7d2c2aa8474b1cc833c231fa73eb2459ff5e00b942319b66f6875a335202e9639a04cd0ef902ae25655f5e40f464ec4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b