Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 00:02
Static task
static1
Behavioral task
behavioral1
Sample
827012f25af22001f4eea351ec0329c0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
827012f25af22001f4eea351ec0329c0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
827012f25af22001f4eea351ec0329c0_JaffaCakes118.html
-
Size
27KB
-
MD5
827012f25af22001f4eea351ec0329c0
-
SHA1
b7e9b3f461724b021cdda5e10a7f52cd38c46645
-
SHA256
1e2959ecfc4e158156c91c1e5d62da4d3b25a9f6a873766aa5391b25d1e73f81
-
SHA512
bf3ef258e01ed3346669ed8ad6fd44a369bf1a122c8dfe8211de6cd9d6d428a0e9fd7c89cc079c492734a9f169891bf16c712286412602d56c6808467fc1bf69
-
SSDEEP
768:H1S0m8MV4UwhZgEhyYCGCgCUCXChCWCYCDwMrINhk2Z75L/em:H1pm1V4UwhZgEhyYP9dYu9tQwMrINhkI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423189239" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906652cc24b2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a88a1e1109923548b843e74373e423a5000000000200000000001066000000010000200000000cb3d1e1cec566b8f01de2d5d1ce4a4419721b44cb384d590336bde8239cc562000000000e80000000020000200000002c73fc7a0e71b1cf284c3c891b7d0f8a1db4e3da0da8fc5b080151ff150ea685200000000c45cbeb1545cd1348a0f2b9628c88e09a1dcb5db86fb45a230423707a8bbda94000000042b1cebf0ecb398a2edf737c99ad198c1ff99540e79d02c7469066d09a1c2fa3f4a46a4b1ac2ea741292ff91c26b70b05b69ca5eda9d19795055b5cbb64b85e8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4D99521-1E17-11EF-A3B3-6A83D32C515E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2012 1712 iexplore.exe 28 PID 1712 wrote to memory of 2012 1712 iexplore.exe 28 PID 1712 wrote to memory of 2012 1712 iexplore.exe 28 PID 1712 wrote to memory of 2012 1712 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\827012f25af22001f4eea351ec0329c0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8fe707b06f6b687b36517f9fd9200d9
SHA117256a1a14ef3f70e51cdc4018d9942f3982caf9
SHA2566c19b0c3cb3840e6263d4bad57e2d292841d931697b09c826b22c03850efbf30
SHA5125fe33216e3d2100635b781e911bd3895c66034bd0674a07f8ae7845842db95d41abc638f4adcfaffa2ba7c090d8d4e3de4926a00b6cc573b70639348e129997b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fa95fc0bd064e4fbf69429df8539458
SHA1fce4538a6d944d5de4801155f10eff6a89616627
SHA256d99fe7f550a92dada10086ee4e5dbd0dc8a1f2ab8c4d14221df2248b79cb747b
SHA512b75a5c9149802df7ed0a38e5b2e0784bed9a7009ccf0b112d6f839e57ab2e9840935a74e093f8f20e64e7423d3aeb605abe21514a2b0682ee161cee0775b4afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a1776a75337abcda212ffbfbb6320d2
SHA1063c9943cb31458b5db7ecb701ac7e17547d26b3
SHA25626658568235439cb83ae533687a19510fa462e9420157ea416e3c606faaba386
SHA5123be7373004fb8c3ff9d5dc4dccee8fd3a4b5169ef29a4a32d2e07de936c4592c609afecc526fb1c0f2043393165fdeda2b860a8387361d92ccd6893100b50cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0aebd206382c14456d833bbe23576f8
SHA1b5e3d6ab946720b3c3215b39d0c41d4682edd982
SHA2568e8a2eca4ae21bf62c45a581b5f453676bf87575fc617630eca6172d3d16c170
SHA51201f628f56034b44ebdc0d8ddd3ca3922b7548f598b768e4afb8357ecd219ed7acad74381ee497778986cd534f8be5ae57a23622bacc1e3f4a92ecade702b53b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520b1369a9b31cb938bfbc5a2014080f2
SHA190fe59e44801b137b3066940d0847149f108c58e
SHA256969defae6b19fd3fcd2284a33df386f45501d7fe261d88d73ce95e900931ffb5
SHA51201f55e814389c9f34783902f08ce3aaa69d0c73d824fc8679460eccad9f945b48ba3e3545df8133262e0d205b225301cb67232966db9a8e96b78b4c6a74eadc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d093c538035be7fd1e8213033a7c0ff
SHA199ec4da76dc7445931b197454ed669d963ccfa8e
SHA25621bf5f520fefeed5d235c2079bf173b1b7b6ef5a19867441ddb33a595037811d
SHA512b78e12e50ea2084724e143a72a96a4d7e561ab1b5fd0dbe6af9a0a6f7b66b0f2decc59df879dbf0dfb1426030427b5f557fa690f521418642739a7c589e98a7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d39d92c4fbed2d20a048a3161a78912b
SHA1e3610d64c75eb986ed7dda88c426b8f32248e8c3
SHA2566a5c72fd3b1bc0d4e49fe1c14c90806797f853ff58bf315e9dc24be709849c30
SHA512a01a91c68589db3741d042c8af60e9fbc4c4d3fd50afa228ca2702338a17978b45bf4b142d839d3ac2460e276af75495ed59e96b3b207f84a76685b6478a0fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599ba8c051532d226f96c4b85f61a8207
SHA10758593370196c074ee44543ae0f9a81c923d118
SHA2560a77ced27b3a74eeba289fdd75096afe7afac253e45ba6ff0e25c7b67d4abeee
SHA512e70170ab48f1c4f4c8e5dc422b9303e236112c7a8f8452675365d8427a54a87d0c5d41b81146aa6052c422cb1d97eeefe37514940f5e6822b99ef4956c8145b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c51350b3aa41f630be50c674f02cf4d
SHA13639960ff2008d37f04067596cc2efd1fac3cf32
SHA2567582535b5749f40fa4d9c9be84dfc88b8cf2f6d1713cbd3f598c487acc0e2f97
SHA51279a275ede61c4df215a475865b3356c823f3f97e5b70c926c9e092ef9aeaf630377b3d5d40d8ce24421932c1617a24fa323fc15026a11841b6bc3866c7b0fbf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba57905bb1218b56e20a95110a34be5c
SHA1bea9c7c1bd63706f9c2c9473bad7ebe7a9a28196
SHA256e9a07e8607661b17f53672377225c067e3350f13a93bb276058ca40093a2a774
SHA51238e2e9f47fef9b2b6b70426ec3877934ffb4ad605ab07a66a66b0a419d42610685b535cdfefcc1c67a316eee09a0d1f5541fafc1f6c33e0645294b62a8a05e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c49d486693d6bbe3943654a818333f4
SHA17d4a8757064fd2b91fd3ac768a9c5f33695853db
SHA256d2767775a38ed47a0d897f4407a18bdc0e361806f0cc11f309678bdcf51145cc
SHA512d284ab31f1b4d7f3fcebcbacec7665412f2561cf5c280cf970023b394a26f82b34fc3695e73769a916786fafbe9b91f008d1f347d047b7a4fc45e05c748d1b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f185faaac7137d0b180fadb7e40f57c8
SHA1a730705f74c9067e0313a826c489997ff7237500
SHA2560fcce7d6982f357b51adbe9171f5962acb6fa38485f5effb9149f0314eba55b8
SHA51216aa985c238d9fb35f2dcf517ed8afe960318c477994f404547cb010feb6b70c759b6a10fe3b4c87847e9191e7a9cbe224f5ad609f0c6c2e654e169199ea6fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d9f53686091ad99c9abaf5f35306361
SHA192d90e6f6c77c074cb87186d1222882615b5ab18
SHA25628224cfcc9742530e6849e4f4a144c7176eb909f00f085181e06aae69e0064c7
SHA512db1510ac8d53c5263a47ceeda6b03083e1113ddd1ce9b53fc81aad57e7c7ec821b891b8ff3e75cd3ffafe5c752a65060a160854bb80161e82ec666f5bd38f60d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5fa2b5f62cf87a3662823f8711fb9ea
SHA129c5113503c573cb0106df404a705a97147b4934
SHA256fc6508a499083588d6ecd3174f62bf20734bf6fe5edf401db07fc8f4975979f0
SHA512e5b2c54a94eefeefec76f3084a3320cd52f076eda05384e0c8a2ad40c87692fe75f5c5125df089150602c7cbd262d3e45cff82fa4713581b52ff646a0569bef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b08e30c21ed51d83fffa8de86c801a7
SHA1734f2f84ac81894ac6dbd562c7959a9eda5abe37
SHA256d582413e9680f56f382e508456b1d202bbf6b0d2ff17f9cfe6fc5ba905ec136c
SHA512ca4ce73617bb5717c195b3e112bcf038fe61c78a1de184d96daffca5aa06ad8a4aaddb52cad219512afb348d312dc2f9e9c81844d67f9555825f03b635a9983e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea7cd6aab4886e67d2723794aa8c0a70
SHA1466cf7344344a9ae702a5a4dcdac9d31cce7fcaa
SHA2563e054ff1a6ee92a959eae595c7ce8dec2f4475be22c972a14733a231e57ca4bf
SHA512548061fabb1fcf676ce0b7c91e03184e43d7d1128d47d63636033fa5fbfae63e01d1cc316d2ee5851f118c4807594253d2d820ebe9b480a2bd09b0bcf6dfe4f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564aba9d270ab657f8088e092414e47cc
SHA1876e4e87d66c3c3323cd1ae4ee891b9406331943
SHA2566661616dd46a2bcd5812848cd6490d6fb3a5e1f7221da061ac94dfc0a8e4a0bc
SHA51291ac1370f692bd79cde9a342b0eaff09034e9ed37a7ab1c3537426a2c7b29d1c86e3247853cd273daadb07d2ebcea221f05e095feb0d29680008a909d99e2724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5472c70c8cbc2fa869ad0d9c26216d51c
SHA122c1092840876580bfa3258855bb9f676ba52ac6
SHA2562c3c8ef5035b90ce588894feca8e4ab02d34e9406142eda710812ae45dca2aeb
SHA512ce4341ae2bf46d3f618bba17525c36c32609d1a66891cc04ed9531a0490c4bcb99cc2674a96045c876e9e82272159f448d021864a7ea2cf64127bd9acf1b58a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2b8d4534c0e5a1aaf8d9d7c99d9d57
SHA141298adf3dfbc5c05a67a5a2da2a5c706e9b0174
SHA25688396bf3900ae6c9639e7801862327bc9c3b9b57ee4d50e6dc5f4495b4fe5f55
SHA512e5333943e8432c434517442f640ea46c3968a59eb27215a43dee8891329288c0e3eb72681c2cee8686fceeab6fd0dbfdb527798a78797f83049090673126947e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54390643925d25c2bba8b2e0ca5d20649
SHA104448a174e16c951b3d2f19a4c8643862959fece
SHA256cd9a09bc2c252a7f7e54d3f9aff147ee620a413b8814b92d8c0c8dd9bc142e0b
SHA512a2c3bb843a1417f494b7b4c3c8fc61c8f04a557ab9b0443517e6d62967e6be85051d73f418de1a5d218fed1997765ae86042bd55a3124d1868dc301667d380b9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b