Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e269e7edf7c732899d547c644e3b0c3a.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e269e7edf7c732899d547c644e3b0c3a.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e269e7edf7c732899d547c644e3b0c3a.html
-
Size
10KB
-
MD5
e269e7edf7c732899d547c644e3b0c3a
-
SHA1
ec8972924517e9def999d51012d8b82c7eeb3556
-
SHA256
4b8fe989ad793d443de1a574b34387b6d981d41ee469d72d711979c3609ad7c8
-
SHA512
5bf06e353338c880f51be6c04d6a35aebe62310694083bb9527d15492e9acd05f8936cf3ee7d23e9af825f13d2a743249078c5642825c04f650408a3113ed672
-
SSDEEP
192:F7TRci3WNE/xdHQLrRbtUq5TbFaLYbJuQ+NedIILTVCTwNC1L4FqVNmno8EmTXGM:FdI0dEPUEbd3IKosrFqVNqum+ZmcmqiT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68B1E391-D70D-11EF-856C-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00fffa3e1a6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002ea1c90dbd4ba14287161c45a1d99c09000000000200000000001066000000010000200000000b84939abbe3a0e64bf7daa79cf2fce51b9c6f94bb300c4c70357774125ef615000000000e800000000200002000000016818859e01af1a0a45686bfaef21473a5065cd002e90d7ae96a9f190363ddf1200000007d617e4b785419b1ea56fe5c72f4770d14573e45320a56e3bcb1f3c12ac9184640000000b06c21ccdeb42ed5fa8d3d95a0eea0b65d6338a9978bb6240fb2fcd2e89a6f3afadc83a1f73bbdf5a1e7afc227a45e0628702ea1ca989c8990e65feb70a6091b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443525673" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2984 iexplore.exe 2984 iexplore.exe 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2228 2984 iexplore.exe 30 PID 2984 wrote to memory of 2228 2984 iexplore.exe 30 PID 2984 wrote to memory of 2228 2984 iexplore.exe 30 PID 2984 wrote to memory of 2228 2984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e269e7edf7c732899d547c644e3b0c3a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f36a38abbb8a31f251775c341cc92fbf
SHA19f9f30c80270490b43ab4cae1c6c35086592f0ab
SHA25639c19f1be9a02a2f1e66a06266e19120a5e7b1df5d1d7c4c1154cfbe683fa7ce
SHA512ff48f8aa7b764c4ce802143ff9060ada1adb1fb7dbc04d40dba8b5b497208e51098f6be1dba37c8b09acbb783064c4644254c48dec2c511595504ab8249048cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0b01a9f8be210449a897c5618a743bc
SHA1d56d44cac3d69ac2eb101b50e17f1befe9b6a4ec
SHA256297e8e766ced3cd7d640660b5ac1c9d293c4f5cec3665cc0c7423213e07868a4
SHA512f80f1a2e687980d1caca2aefc8d7b42412c18fd4c6dbbd1db14682315aa96812caa84e58057c132ba0bacf436335bb29724b3c0d5965a5081ad1cf60d4c097df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560a5ed707c260cbdbe79826e72267a1b
SHA1df4ef9232b825696bc60cf622485172bff56d32e
SHA256bb5041dbaddc505abe0dc5eed5b9b53faee95e5978e1219880374a6fbaf28b42
SHA5121717eb208bb48fa8e8d68f1d67bacba9890daa9355d1e11d1671688af9a9825de0c72ea119fb1094eac119e05b8b584de9326c2b4e99c3623efc11fa5b1b230e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53442d318788001f487077a3d0fdc05e3
SHA1d8ae75629f42e3f4d06743b6a8f5749758b876dd
SHA2561a84aadccfbec5bb5d74d6c1940d4ec9556cdf57e0fe90da0a4547ee9c1e11e9
SHA512ceee8e1d67788ea2db4abf21be510b24d1e8e1a6e4f0be81eb75ce85a74a5c8d72e258e0b6819debaca065a23948e829784cc1f676b9310ffbf10e866b6bd1c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51628aac551f98f6e36499554d899318c
SHA1e0f68385318b94b52ddfa4a938266006ab3997af
SHA2562d7fcaa77a9618024c8cccadb719e2dfe77cddfd0642dedefb06b173ced8fdc1
SHA512828d7d2929d0d6261bdc07631719b15a6defa2f19b28b1f6f91efc13d7face4dca491c52eb37225e719444f3733de93cddd1a6d35230303c5bedcdc188ad6a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b11a167a44b73c0717a576e04aa7f28
SHA120c67b31de4ef976de22c6218fbfbe5edbf04fcb
SHA2562b42e45910c3efe4b4909d85a5cca8fa357de9cb73a8eefcbe24cde93f07899a
SHA5127983bed7fc8fcf742c655d1fec4e57142950843ffa96138725ba817ddd2cd955d89bf78b9f8296581dd689f6d965a2364255fe159dde295b427c0d8b0ac77a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e89339d783054afbb960c5aa4f7c133
SHA1ec475b14813e6ee97df9d0b76f64b3a263a20fe4
SHA2564d7e111fc766d7a7e6557d8460cee2863fdf7869a616adb639451eca19d9cc29
SHA512c39cfd3332d374f95da65b838337bf95989bcdef0ff65086150a4551da592ce23f3bb6e4b683d6b012d8b19652dbc5e63302b63585a160995ec354e17e57e06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5908cda3c1e264b609d91c74615107d02
SHA13d6082bf11aab4b96571b96da9e4be358acda696
SHA256b27ed0336563f8dbe47d8c5429bba1c08e847cf8dc05463cf181ba3c11abdc76
SHA5126a1705d439a40992eac27b39eefc82184826812946bff661684ec303823e5573bc5fe3ae40625c3971f25da5f0e1327c35f1a7b4b5720db0f00a9ea28c4b75cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5115a8209312e853ca81601986bfefb72
SHA15bbea6da7abad411cb3d4568ed8279af35d18622
SHA2561ef5587c1d0856312686c222035f26cbbd892f2f9bf4da54243d404f66007e67
SHA512a42fae81dc5e11d887bf615ef739b450e4051cea05f748fbc71649bba91906ec18d02192bca3d434092f8829a2acccf15ca3026cf79e5f1b86bac635b0befe94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502f4e333f849a9addefe99811f9f2330
SHA1af2e3261b95f0d9d2a7f53440afb39271fa27474
SHA2563322e1f7d8aa16b8700431bcb394261ebbc4f7a37406f92d3be687c8fc586b7a
SHA512caa4c9641132ae0e65a304e2c6fb6e9bf6d1d944e5ed6a9f5851b4645cfbe42adbf677a1ecb0c917bb0c00b666183bb6376ecfcf3c703cbf8082ebaafeee7997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7dd4d444bb49b426f368015c3580dc8
SHA1b60f72b5b0733cbb813a250548e464272ed3391f
SHA256ceba9891b776d745acde3ed842fc3bbde63848c127e16976f7aee7e0d5557762
SHA512cdba8251142f92991ad6c91e91d930809d5301eec24a0d60f19d28cce50135aa839688d10775a68221eb0f8c29336611af5786d6085907837df157096edbe191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5795ad43ea29a410c5dac7f1f56282709
SHA1593a12b5e9533067392c9d43e8e7acd61f1db5ad
SHA2563c62b4a880840b61e2dfbd3c3f351621dce9a5e45015c5586227ceca3fbe82e9
SHA51254e93bcd62ae6c870887ae11d78598c2871af4dad536f60d607582a342b2f67ca8b04359332c89cfd80b2ce445db1dcab48ef73aad666ff18351bfb1f8cf4a91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591b91ce413ca88d1a5a1784c2c1a4c64
SHA1e665f470532485a25dd8560eb7263cc98cd19d3d
SHA2566fbfa9d67498a685ec9a3871a74bb2feb54159afcb031063e3c59f3bfd88d091
SHA512b1ca92e61434d96135a64af777ba2ace3ed2e9f4e72ce0494cd43135dbd26bb320848f0772f005e8a74ada1d7953c8e2e18a4f4c4ae8cd463e0b5a8e0fd58475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f911a1bdc1552ed4e4e49dbb630f4da8
SHA1a3a8c996200b818f33693512126bf843859e112a
SHA25606b2b53f425d58fd9314b29e14e00b92da96270f7cd0d79097d7c4fc3d3c14ea
SHA51283a56f3dff3c7bb0e011602f9a811bb2b01f1e338dbbe58cc86949798a36092375be503eca1e937f8f3c7f521ad4b1d7d61be50986c4766c832fa02d29ab5946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5300055ad884b4d2352bcd529cb5cb9d2
SHA121b15f249ddbbcaf9136c2915a8912d609f0e862
SHA2565e4ed17b913fbb7d4d16fcbef6ae6f273b9b2e4c0f02bdb21f7bb87685b8d1af
SHA51218f6d67caa3e1188c52b283e76aed232a2048a93c912c4a15db2991c88ffc0323a0c0507a1ea0a57a9830f2ccaf24e70219611ba1548054cb36c04527b08a333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3d55532f86250f0b636892f8165f295
SHA1683bf3b2043c2fb4b5988dd91cdfe41fb2a77843
SHA2567c650f285bba2dbe6bdb3f0eb3ad2f6c3555495e3af7894aa0c7a1836eb550e4
SHA51222ec659676cbf309595808693793ba920705c78d08a9257dfa454552294bff9f17fb0ce80666181451469be651293d1ab4c526f097e4895aa7f89c6065e48651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515370dc41da6cc56d39780df6c6e1dc3
SHA1ec2e29523c3f38ca98513dbd2f68975735c41c3a
SHA256083909cc1185f09e898863ec2c8821757aa5f613fad3ad8a7f6f75a92a8a9da9
SHA5121eef6850f44822405cbcdd0153829b13f04febe7aa61768f4c0f9e118e7d995273caa620767c31fce5d8938362317d60515eec2dbad8b907894a3c8a8179e405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df74f1faeec01b9dccdcef912024447a
SHA102bfe651c6d13d7a2e36bda7a47e21ea0b110d1d
SHA256e7523cfe01b87f40d8e824e45be2b9d539c1de8b9bd0d8ed265d7a46e5a7199d
SHA512979bb3f92b411f3fe70952ff48bcc0b1f7934d35c16b484cf4b8219cfa07778d511ca4dd64e36b1f090370cc5eedb08bbdcc3ad852e73a7a1196a6088206927a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ca8ece50ee8985bf185c8f68e3140cb
SHA1149deccb38cb0fec7ee836880e5ee288c4d7d7f3
SHA2565ded24b43f0840ee38b02f51321e6c0756a32d8a91a037b5d2f0d60ca6c76dde
SHA51260e69b1de075de5de82e0ab56946e44059866fa80267023a3e5f9df69f8c8e1e4659cd8042ded0a8d5c9c88fccb37d0053e3e43f7cea846916357ceb49600f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b1e4fc78d3610f4f7f684b45016e9d3
SHA10a9327c4baf31645df383dfef0ddc8c706cecfdb
SHA256cb826e3e4350b677e0f5cdab9e3856e58b9908251a7014c18354b83a1f0c374e
SHA5129770d6e3963074b996b4612c9ea981f205c3d7427741df1c1e9d1da18ca947d245fd0580abb4e6ac46949a679026c379c8a3129cf745065fadb1a6294767a508
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b