Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
0f72f96c9ea2ace0d8919852eb77d160_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0f72f96c9ea2ace0d8919852eb77d160_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
0f72f96c9ea2ace0d8919852eb77d160_JaffaCakes118.html
-
Size
12KB
-
MD5
0f72f96c9ea2ace0d8919852eb77d160
-
SHA1
33fcbc65db1c4129cc41c9b4178399383fb2d798
-
SHA256
70af0b88cd369bacca3bd6fb3b01d1b8da0886bd53226ac92322669ee9a56e18
-
SHA512
f45caaa1256058308aadab59302603d3aeedb8e2c061865a7e251e54e0dec4e80f9118b9ce5617c7470bca926a318c3464c18ffeae1a659456e57520b94bda26
-
SSDEEP
192:2VZalIsr0KXyJJVCqN5CH8k/w1wvqVkZMBDZznxMCpm01LauBuLbdU8d:s4lIc+VrjCh/gYMBDZznxMCpm0LaguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000267ae5c10e6f572c934dc3de51f8af52c5458344c6f96ed86386ad76388190b3000000000e8000000002000020000000a10ad149d0b8e06d0a264de2a4932598e90148f1990c92e8bbaf39183ba5d393200000004b2e1535161e5ea80b5672a4d19f8394ca5da754ce8995f5230f25d3b8d1ed2440000000c5be25a825b832c8f95c512f53094e47a68a9b4a67c71403c7673ffdc07c14f5f3c9165dbacad2109315d237d1f8344cec64b8fe3c85dca6116f669659cdf772 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434132328" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D2C35031-819E-11EF-81FA-CA26F3F7E98A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f06867c9ab15db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2312 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2312 iexplore.exe 2312 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2836 2312 iexplore.exe 30 PID 2312 wrote to memory of 2836 2312 iexplore.exe 30 PID 2312 wrote to memory of 2836 2312 iexplore.exe 30 PID 2312 wrote to memory of 2836 2312 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f72f96c9ea2ace0d8919852eb77d160_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c3595abb660a9fd27eda4ab260cfdba
SHA1a0ea7628e31e85a6e53cb7d669ae92d0262232fd
SHA256dcae72e7b2cd42fbf03832024961ec140a875b3fac521086b08a96c01b2c1a88
SHA51244d9d96ed4876ad16b0999418022a97837b323de5a36b6af470b6c12bf1aacd08534dc5150814fea71067e7ad246bd9cfcc42ecb26b67811f7aa7a2d9b0f214b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4b2f92ae379045165708e55c8ae2451
SHA12b21caed18852eaa81e027e3547d319682d70142
SHA2565eb7653e339a430b9ff995a1b58a30ff8162ca5092e3c014d52a5b54b3d8af53
SHA51299a7250d67b1821fa7f68d95a651f1bc9d1a52524325f59de7741b488f34379395b134c76f0fbb62081491e8462ba9e4f939142f0adf544a586edd3209196978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d31ff5749bec5e81896a644d53306447
SHA1f10882aeaecfa1c0f3849068a54ed9d385de6e67
SHA2563aebe93f6f29f27977a17158c4ec4c49fb12e3b115b6ea127b2172e456f3490a
SHA512a8388377dd2e5fc1212567f42cb7e5e10e7b1cfb5371065fa5506bfaa6b9034c1856712ac03b60620c5f7d96dbe6d4fc0f04e7dee4f9e99461fe4eb578fd65a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55853d95a01a4479db6154302671690a3
SHA1f3fd1761e6e154517a136eb28d4585b84f9926c9
SHA25606047c2ae40c9274377b19920db620c6d729cbd196f7acc0109a7a57c94da30e
SHA512cf358ba18333d7a0aae7902b5d9988253d9bea7eff5cf0e3230feb6a0509b837f7fa155165cf4df19a3fed3c2e6580dc274f9e1388cea101be75b1241522293f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54514d03783b4f1cffa9069415e4ac49e
SHA1a5a43dc86c7c1e761e0815a7b093fa34d111d57e
SHA2561b1f79e1494228f9ca31f21469e6c919bf43a56d2f5f2c8d5a75ae3f19764166
SHA512d3e9e25713065f024e645c57569a52a3515b995fbc8561c34f767114efdeb8c119d83585d4356430bb6570f9b1939681ab18d2acdd852f5a5e8ea2587ae7da5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558a99af6823afa4533b3fe727e3532f1
SHA19ef6cc4802ce0851fee6f7b6799f1e96a02953e0
SHA2561a64bb017e0c8e9dee2dd136fc9b475b684c15ecdc12b1a8e4fa1fa533e71447
SHA5124f060594a0c95c47004996a2c0822ccc84dcefb9d248884de3ace407e03e42a35cf23452f2a8a0274451b09c45fb04b551eb79ab4af8868f1fe3b2d0a6467069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c91d81280a9fb56aefa77e137f6cb972
SHA1b0a9018d4ac3718baef9e9ad757614d74904c22b
SHA256b4c16ebe88a699a39d7c3072e29f9dd24b3701330ec99e49abaade7d10217a44
SHA512b24a4a70dd804fe9713c54dabda861117c44465a71058edd24a34f760d2a1bad137f781801a1c0cb3fb54e2ede7e65aa4035b9a1b978b916ca82ce982b7f98e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b29bd3ea59842a844b023910cefb9ce7
SHA1a96393e471158b741aa7548f49ee700d75aa8ffe
SHA25618f0af9688f7c853cbf570186c08b34814f88ef9aa61bfbb32cdc7bc006507aa
SHA512314a7258d9f5c0b1c5df504ed185f6749794b2c65b0b35fde9606be250f4f5fde2241d871188b9a97b0dc142409b095aa9312e7a6842153a7e26a196ed1a4c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561f5f585565a3ba54b465554209d9ae7
SHA18c7599cd8414070d96bde2d9373e5d06715d1bf1
SHA256825331fe36e520d693b0bc1cf7f3d8fd8a7a90f94f75bba56e3575099659eee2
SHA512f58e91fff1e91cf1bac31bc4fd8661f6e78b79f32f3ab731cd08011656ee2b4bcb82db2d05d3c6c140c12baccc9cd1749a4a870f6fe185aa9c4188a8b93e1e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af19fae6f4d4d2f3e097903a0043a88d
SHA11ed6baad85980ec0ccd42c8333b6857f0056f6f5
SHA256d4c8773c4fc6a22ed8f6a7778bfdba4a3af2f2af91c41a8d4bb9a153206e8718
SHA512f8a3c1bf93df63a36d734178ab47c7da90922b3c011e184b46b2892f0f853195bcffb1d605110f06e213372f2809010c5c4345f3b096def25fb989164e527d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518820f1bb83b4eae5ac8afaba82629b7
SHA12cbaeefd4458b5c47f3308b61a63c765dedf77ad
SHA2565c4f3db0b10787f36dfc0df27ba21981e6a063dfe8e30561b9b44ebbfe78e8fa
SHA512ceae453cd173cba550a6ff594f93716a0521e254963ac76f8e92b63a26f3de8764da55e81a74964e8c54cb0d2455d05a86137bf41a16e426033fc4d87c4a10ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57739e8884553abc5fec68d7f60c05bcd
SHA124ec591bafc6e92973f33a357fbd3d1037c0070c
SHA2569a9a859c268b332caa3beb4e1d4fa44d767d7100d3ba85db57b1adf539347338
SHA512e71e158a54f24d0d2d243ba3ef8853add581d1c1fa554f7ea09fc9adb9d35873dbc6ac058f3b186190b96993dc922911b664323ee5125e7723fc83434add7cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533ef63c00dd279c1f4f0baacfba2ab74
SHA18b18e29a3461a93e1e7afe248fdb31cf08aafd68
SHA2563061ac1ed3ce5bf4719f8dbc35d724ddca21fad1eb75d3d38d2a5540cac803ae
SHA51277930582f735986075910bea1202f8b3e49b64c1e7a16a555a4aae867113acab2209d7eebacd74d937fea59382f15e614b6ed196d95b422afef67676c6fbe1e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509515dbb32b39ded5b1482e25beed561
SHA17155f7598e319b2cc698893d69d285dc3f875878
SHA256a931e5e082e9c67f35c521ca6ccb48ebd9ebd5d615e257bf4bcd4d719dde65d7
SHA512c5f639cb3860191afd455b46c05725aca2eda126e9b439b6b90bae816e4267ca7d14d4f5e4d1fc3c20db70b902dee5a80306435463d7b04d2d340f263e1b8246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504dcae57670d6924dbb2e2426947ae45
SHA1e601a3274a8a8e1cc7314f673a8698a5df7dcd26
SHA2566ae62cd161c4aebf5f376192ec3c25cb12fd59349857ca77990dc00dbc75cee4
SHA512a6089ac2ecd28244e0ee64e3745fa69512cc6b548c55a7490cd53372187f74575d62d4634b512eef2cbf14c47faa4d0d599366ab40ac9f4822eea2d9de1839c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f99a14da68dc0435859224ac38f42af
SHA1ef3b091cc70ba0cc9eeb3ccbb46b9645dac398d7
SHA25694200b509ead60c58f3bc1fc336d9f481ab9e201421b2e53de251fc5ad3c6572
SHA5122e62247f7a4703579e7f199cac3c886044e3a064bc0e5e7b692e330548b6753a039020b0b009ee6c9b4134023679b7503420e2684bde56c19f830f2530c6f694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566d3d1b037562f1331bbd2f61d801d98
SHA17847fb5d111257c89ac6bf65d676a24bbb21f969
SHA2566893de629719414e48a33f7440ffa6e8695e8f6bb75e6d8e34839c25bedb25ef
SHA512b331b517afbf2c4145b05156f991e077a96e800d0fa6ad6ad1fe399bd0c9d1be693670b59dcdbe1c89a16211687752364de01e3b4a699c7e18c0a9efa094305c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526f28f98276e7b28a2338c68599686df
SHA19ff6363e10fbc3ebbcf7541363d9fe09065d37da
SHA256eb0699d7af28e138f2324b97fe4d19e174743746ac98cde38f40d32c1e33c99a
SHA512c30558f8257550593f84b09c51f07aed41de5036df4b8de2c4bd1717bf4a459e5ea6df6923a8e3fbfb35febf1e4571cee81aae63438896312b2da308885ee234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1c376e18bd3c0a59ffb1dc8a5a2eb88
SHA17525f5787dee74605e3ae42ff512fca7bc983823
SHA25609ff608fa6d0e72567462280ecac5ba56e29baa0106e91278f4bc84da7047868
SHA512f867f0f739d5eccdc88067d5bd649656e8dcad2b8333735da1cfcf047f0505fbb7cf6f06c93e9e49c4e867b8e536feaa889c55944e9b5bf8d3f83e92714a7b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500825f2e11deb33e21aa9569d4909504
SHA118ad810a17c827947559495eb0f2791a68a06e66
SHA2562256952fea01b492b42d98e4025e6aafa7f9ee1d2ab47b5fd23467bffd8c2d69
SHA5120274aaa2e82998d3e5c3e2c43a442fa5d42fe723643d4db9b0d7de3b781f966843e542fcde41b28e0000f30472adfd8a5d063368df9fb24746d454614d70f966
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b