Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:17
Static task
static1
Behavioral task
behavioral1
Sample
81c69b89e07d02e7c7480956f93e3c48_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
81c69b89e07d02e7c7480956f93e3c48_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81c69b89e07d02e7c7480956f93e3c48_JaffaCakes118.html
-
Size
9KB
-
MD5
81c69b89e07d02e7c7480956f93e3c48
-
SHA1
9418af8014dd05cacdd32ab8e3c381875ec02451
-
SHA256
19a65492a5427d213e691ed4ef27bd4334dbf496b5e4535b7bcb425c01c5dad2
-
SHA512
7aba07fd5d827c5350bbff6b1cbbbfe9cbb8f4c873f6e26fda435afb142bf49cd4590f71dc861f36ea9761aea6ba0283f77e4c4128faaf6a671b5e67b1bd1855
-
SSDEEP
192:t9rmu2XAbUKc7Fgkuj2T7ZkHz1tsLJk7ALvp6pzpgOp2SpNxpzp+apTpzpTprpjW:yXKc7OkujiSMtB7gBxxpRhxphxR5xhRe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76829F81-504B-11EF-9363-5E10E05FA61A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c20f4b58e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000ef5706cb76238ce67983be01065c07f82912be6e75debaea6e4a920e49274b21000000000e8000000002000020000000efc2e13b13a2cd7cdbf97207570fd9ae3d4688688c313923d86c52fb1e91c61d20000000ba2b41aa5751248e253a20d34185f00531fbf682b3c085f2d56fc87fb991095840000000737aa20c3bdcbdf4cdc91288c839d392962b151c8d85a41280c36dd1364d07be05c4e44c317299222df52215539285817554efe305e5a4a56b23c78fdd9102f7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428708918" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 408 iexplore.exe 408 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 408 wrote to memory of 2756 408 iexplore.exe 29 PID 408 wrote to memory of 2756 408 iexplore.exe 29 PID 408 wrote to memory of 2756 408 iexplore.exe 29 PID 408 wrote to memory of 2756 408 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81c69b89e07d02e7c7480956f93e3c48_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:408 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fdca0e73a2c152f25475599c30e1dc0
SHA137fbf015aaf67cb413fd21b99267a6e41bb43cee
SHA25605c25db9f2866e67e74c2c07f1d4991d2a255130184c774bdbb18efea8b11551
SHA512629f592d0417ae77c62109fa5e132065afaa900b668d5d7ed6ace350a18a46318cff2de6575443df295d29f036a1559ed0f1fdff1ae06a9f7ed9a62b39bb2089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b258322c880f4c16c1c5d99e9e57dba6
SHA1516726dd20bc2d311781883ea7da754c718d38f1
SHA256c68b7f083ddc2108f3a6106a83b73d261989af6ed0a2cae5836670f68256311d
SHA51271058b95a9d1dddeb32c94e2e5b4a6a1db82bea2e85e621af8191d7f385b0997a4e88521c311cc9752e7bb179d996019292cf98942aff3a415dd6044759199cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5033d7dfb29b5190d6cc61d017dca4d16
SHA1fb40e840bc5df696807bb385d6859c8e74a9bd71
SHA256c1d09b37f8eac3a21a14a39e312da4e6b3d1c6f26de8c50c7cd77e3a081ca73d
SHA51293f4834b54ea6e5db21938d06b95f59d69da5df52ed37cee7faf203b18c5a58cba9b5012bfe12b3926185799f472069eeb6665ef56a00f4aa5d316e191549323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556dc5396486cc01600f6598de9611f73
SHA161509487ce403f358289353cbe1c89d3cdac2de1
SHA2567e8baad686e2eabd72f0ef3d9f885d7937de555260c4e3a05f082941f88e3804
SHA512d38ad5c1998fd4a97bc806a3bbecf7fce69c3ea2d27428a47aac1b40468efefaa4441c505076a28b5c4034bfa963d58c17ac931742fa82a1602ca94c9e0f27f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7273c46dd5843827452c9de4fd0931d
SHA1439ef451a6ae96e5228ac81c247e30717ab2b679
SHA256d2957a531184c20015d2943018f0f25af954877ddaad2a7fdb4480647791ce7c
SHA51239f17debf9533008b9886afee0d9135fe80837bb7d541ff66e162ea12fa9a1da9200053e92b15cc0217448da0665b045c9e389ecfb929e75492ae38a52906c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f9992a72d85cf938b62008f4f68f71a
SHA1a6083b1788c1263a02181414c8ea0d9e32f26533
SHA2566a02d586a4b0cbb9589392102fb02840277d47072ede4d673b5ac6841e6612f1
SHA51279bdf70b5ce995ab4ab36d103fb45e97a6420d6f26ce1111061308b6c616588e6cb4b7e1cd943ca8f7eadd5c984bcbabec36e22c437a359a20c4fcca0ab840c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b13125a0e543d0e2c9e2eaac8e42d668
SHA17a158c2935e61ac99303381204f37456f056d2c2
SHA2564dadfa10fa93e5d3e5c7daf459f813f29c44598306ffad0d13f0f3c79e966e03
SHA512fbc3b772026aca8f65ad1889d72d658551a6ed08441bf72963c1202e9cd39415748e1d1b7e9ccbd8698cbd8d1ce5ba059f0e0941385d16dbdbcb11e2f7b005f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bc4a67b6647094a24b663ed28612158
SHA1661411ca7ad785e79ad15ab1a577fe008c54442d
SHA256c6be3df07362885b805d553d43977928fe52acbda07f7fd5c31733215a7fcb7d
SHA512d634f955fcdb828900a849ba8716515b81d21df1e9c62dacd2a82fe34dd30ab8fd7ef9c5e7dba80f1eb7c4e66bc7dc5c3914eabadd83770e5099095e35e1ef2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51feed69039ce6fa74132afa447d47825
SHA123af0cd4b6427adebdfbd325abecc0819650fd52
SHA256ae71aa41847dd5e48c89a534da73abcf14364be15ebcc612bd1aaad095aa11fe
SHA512d816552b518ceb707d2ba5f6a0b06c203076b27101b6cc5d0dd6654bc68af050803df9c99d09a5b2a88833f8be9eb2e3d3007adbc2d8bd824a3831bc03e76554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5362e138becc49aad5fda65b2351bcfb9
SHA11a30d1314ae77201d7a803cd0eb2bda01b35188a
SHA25685a9f1a0f378adc43fcad4942181fae807fcbff41edde59dbc54a9d6c2e4b4aa
SHA5123bd8578aceabba11b4813aa0fea56f7913534e76415a922109a528e6adf6aa5ade25788674483ed0d34d8ddf342e2d3355bcff02a6dcf02a074dc96ca6d9f4bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524bb3e91fb1e9f0f5e81dcf4d6774a63
SHA161109b41a980cca9a33589609758575d573bd081
SHA2560d5dc1fbc80b903993d1f504e2f2ee606c0f4b7dfbbd3a689e2429aed95164b2
SHA512df9ce3c81f89e1617ad2c30fb3b1dcd96f86ec16b87b96a89e048d46f81ba06c44b0b0eed392a7f8fff27cdaaac413dca5c63fb948a0e517ec2ed42e4a2eb86a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cad4fcd55ee858ebd8a8e557f3afdea
SHA177fc8c0c393df0dd440ad5e57cb26eee2a60bcbc
SHA256f74632cab64c29f845ca437e6e195918316b296a8bddf01346ea37e99fa58115
SHA512579066009123150d8946bbba2cbe7f81be30e8e714cfa7f504c8bd6b95f3d2562a347f771da05972b2e5138866b27b9b2e9ce63f88748956cc35868c3e850eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d5892700e698db4591dc611cb37304e
SHA1bfb969b56cd249dda22ef4c9024bae341b0d5d9c
SHA2566b08ab3d7afed5df78fd6641f7e6f0828adfe5ea24adb89ca59dc7374f3af5b9
SHA512fc90f508f1143b0dea475e90a5f529d3a774a2ef34d81ade2d1018b4a0d77bfdf58a04735bee7c4d097756d2d21c81cec936749693e9034f88dfe532b76c929f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ba00ed10e37bf69d8dc74bbe564122f
SHA1e50dbe5ac93dcaee400f3dce05632142b0a74a26
SHA2569acfac4f61da9fa569d6604441641909f4ceaa1aa3e82ee7eb7caaf079f1302f
SHA512a6dfb20137424658665906542b0432012faa96237fc432324ca80df7686277a06643c03e821702a1dbedcd01d0946cf360b0235cdb3b0d57b57c4da05b903a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550fff3a2f7a2cd6dee55f5a291df0f63
SHA1ef729939f99f341cba3ea377e9b54d76ec275e1c
SHA256035459fae5476f902a6048888a5d1177daa3c849d9e95d32e09f4f38e81a39d0
SHA5120d6d2db918392531753d1cd6cfad3d01162777c161fc8592db5936cac25781aa0c0a90eeac101cb143518e8211ee04fcd473b822ec2945ee0199d70081792fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5e09af2518efc66bd7c8c0ec4510f8f
SHA1781fdf32c705ce1ad01d55a178fc7ce7bd71cf38
SHA2567a5268d43adca1b793d9e8b5fd93ccfa8edcdf69fbb240315597c298f9c6b969
SHA51209ec8395e47e7c7f33438c5f7925ea430375293cf31b85a0efce23a3a3d62a6321800b3e1bae9f68da882c2ece1e7172e7fc4187e5b0da6702b9d13357ce9ed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ffa31c408c6846d3f0dee4eac1d8f4
SHA12e9c8582826eba81537b91ea6edf627610237cb9
SHA256232e47831aa3079c83bfb82c0bdd107700a8aa4b4dbbd71c93a944557471b32e
SHA512af582f01fba1b3de99e94550ee24ea94b771518658c324f719625d3f2d9f892edfd6ae80fe0a26c9ea033366f4031e4f6f974be5d8abb27f4cac2e4635b08a93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536d0b2e9132343c5052e14b6970e20cf
SHA1a64ec160046956333b2d21a34d41eada1fb14ae8
SHA256014d550e7006d1b4dc0448931ef2b6ad463e8cb840fd96a1d35b38071c2406dd
SHA512ce9fe5c12905f9f7cd6c8b6673bea684c806c197550c89ff796ce51df2cc47c7c3fd77344e615c145e4f9e8d366b7c3ba0b3b48b5d7b57b93322676be09e2f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52397c97c68a319a358dd873715d0dcac
SHA1c78dd6d26654f8e66a00f6b13cbed5f40b62e89a
SHA2564c35af6aad15b0162b14b1c56c125cf1bd3abeb8404d27e9f4482b2dd3894e80
SHA512c47ca0ac5e228dd8695c8ff2380a3ec6f552ada51a2b8fcfc9e093204de0d2e638ab25d8f1d28d1c002af00bdd990ff347884b8934ef0a125a6e5a499f9f6dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510ec9397a016f147e19ae898375ee354
SHA1443ab58aed4b33ceb1b302b817cee287f705e0f0
SHA256e3237ecc222a98606acc923b21b3291ca4f9dafdbbb2aeda6d937136de16d1a7
SHA51235eb5c417982d6ed5175a2a7dde899f1fd2ee88d0225f48a83ee56f2e5a6139251ce44de84bd033effb99a309ab8acab7ae0e806fb6da09440dc3b6de664c3d0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b