Analysis
-
max time kernel
136s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
a6f35d3cddc18d23d5671ad0c9cd09c3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a6f35d3cddc18d23d5671ad0c9cd09c3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a6f35d3cddc18d23d5671ad0c9cd09c3_JaffaCakes118.html
-
Size
11KB
-
MD5
a6f35d3cddc18d23d5671ad0c9cd09c3
-
SHA1
c6741502c181596195ed15edf0b66077d8fef09e
-
SHA256
418feeae9a2379c173e95936494c78e379ada8149673ed31a73df1111c19021e
-
SHA512
9e23b565c7280c162d1f7f62793f93c2ceeebf825b89765297dee9a11e199742a2a912545a77ca0f1a5be88280ab345edc646fb762b3bf947e87a48f718685c4
-
SSDEEP
96:uzVs+ux7a6bLLY1k9o84d12ef7CSTUOGT/kG5pJ47XTu8BdF1lxw7XLjlVHcEZ76:csz7a6bAYS/TSJuXTBPyXLjPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000005c6669a451004606332e5fc6b40db6cd2ffad63c60fbc5b78656c15eb1f18dfd000000000e80000000020000200000007032ba631723955953087025d4550f152d4f740085e55ebad8c7e58b1b749a782000000060bbc4f43df84770b2daf40f6de1a6167e8f188581e001a6814b7bbfb7b12b5b4000000052073c2f53ea21442a8e910e1d432178a455851d2c1cbb371fe68c6895a9c4cdc4501a19c11a0f3719265a232eadb49ba23671e0ec82f2b10566019347496200 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3289EB31-5D6B-11EF-ACC7-DA2B18D38280} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430151916" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ad9f0978f1da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2312 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2312 iexplore.exe 2312 iexplore.exe 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 1528 2312 iexplore.exe 30 PID 2312 wrote to memory of 1528 2312 iexplore.exe 30 PID 2312 wrote to memory of 1528 2312 iexplore.exe 30 PID 2312 wrote to memory of 1528 2312 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a6f35d3cddc18d23d5671ad0c9cd09c3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ab9810249e37bdd46df054d0bd4dffe
SHA1da07e1ecf90beb636c4596449b1102e04000c632
SHA256d32adbcb4f6d236bbf5bea71c8b0cc992a85f832fa30982e825ab9fec9c60139
SHA512ae9c0c1a035a8d8d8ce45fff05b408d788c2eea38ebb6df9a19a631545ae3bca4c2c6a77dc58820bc2814e4ca96bf3f8848672d41911c0f7cb37884dffca1a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b43cf84c0dabe9162222d54e8e4f888
SHA1130dbdb4a9ac6ab8b59289c15144a200c034dbd2
SHA2563de95dabaa7d9cf9359b0f1b499b8d55332d20162c74939bd22afd88150f347a
SHA512e6b5f918ea591ea36aa38dfdca5c9f11f28a7cc7033a599932096ebe0039fc453edbf004bccb7eb41cb11116caa246a3294a135ba4176a379e7e9d7d52809445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588c99c505356eff4faae592f7cb827de
SHA1db5012b9e5daa5307b701fe5edf50fe07806fb10
SHA25665604a22e1409456175f44e2ed3f8317d9efa16f3c54ac66fcd52cc27259082a
SHA5126b15e7c248dddab67488f1ae6e20d6d74b49edb6cd6f4ebedd1322682b7df51173d932b57923b63e8a11baa3642ec4ffe51d9c0001c9babd968a76ab2201698c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2d34d40a34fd63c8ce5c429c3c04217
SHA197db4a6f0e34bb8e9f14a7a59b3d1a4e95c0bd84
SHA256831376a7eb823af6607a05b05551ec82f7801f32c0e690130af8b3b00ba8be7e
SHA5124e32ec7a086798883baf56340487e0c296b08122c9be2f7bf1bdd793ebf153636e8bd8b368a683c38b36c3644d4922880c33dd335eed39fc8aef44e4b690284c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9dca964b4b543f280be9400ded692cd
SHA184088e0bc985bed582168a04b65079da5aed4653
SHA2569df5b4bc7d92ed4e55c0deff98346930e48c081b24de202d110a5561f4691cdc
SHA51201159ed1cc14e54a3212b5f16de2b879aee0f330a763e90cf91cb050631eaf2be6d90f5946df0513212967bdab732d9c8dca6ed0445d1446d485e17773942ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cb86a861ba55ac8a377e429e3fd15d5
SHA13ad4dada793a5059ce535b2a8eee2745ce3bd2b3
SHA256c2201081a413895ff23cc57d8391cf0361742e750670e91844671b6832768311
SHA512f6946a4e8f3d07339a8e1ac04da58535528b2b01d5a3ba55c8988c4d61723f31b91b2efabb8b2fc7472b27bf60980b3b2755e3feb06d793130b50d318f2500a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f34d091588d037cee0e103e4295a79d6
SHA17cf39cca7cf0a79a1bd7f2bf1783db3c859152c1
SHA256202f13dc3286836a3134e52ff7ab71d564a877c0bee36e3414d7e3ab7c4c0704
SHA5125bdfc3f44ba0cb07712e2ce16a97efc1108cdcf284b99bfd61b6cd2692d8a33df91436eda3898018a2f085e376ac5af97a71fd65803f273bd2d66f5812ea8907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbcf5b7e1da321083cd202c03d1a1a4a
SHA131c75c86e1e3d7c24ead7f61802ed47c21cd711d
SHA2564ffa8cf5b5a851c5a9ec761f4a05edcd26ac93c3bced65b3c6ec587c31d11a6d
SHA512a692af7947f0736e84f29ba8ac7944b39d4321e486396dfa853390d055cb7881f528a9f5317ba112ad13567c84fdd676fff70e0c32c5dbb62befa5e071c0bb5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e681d1d3217b2cbda70c8aafeba66c9
SHA15bfc3dccd5eba915494edaaf4c5d8d124a7f5cd5
SHA256844b36b5890cfe28aecfeec3bcd37cb1b3a67cd59f001442a8db9eabda617daf
SHA51226c77415e482f5622a61fac7667983b3082258021bcf1913a1b6c2a886e4966d39576d9530d60af3cc49d1d47fb8e5cfecbb06c164c979201ce84163c5c68fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbf5acbc8990a7ad59b52e6d2ff8c73d
SHA141328954e6ed05078808d41d0913bff1460345ce
SHA25657b3a5192c4c3803ac0ed551964e63d0dc522337660a75d215afd07c47d18902
SHA51209ec58fe18ae92d42bfb4c67f51f12fcae8c7e8c70c8eeeef27b038b9d69c478ff44d0cb4142b1c122120157ea7c83c9db0f98e6e3ba166dc84b93d703b34d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fcdcff40fc84a49e2731d81ec667f9b
SHA1e96c228d5f71f4cb9cf812adb91eb0bba81ed6f2
SHA2566129c5f889f09c8b1c998ee0ffdf377ed83fb30d58b3bf9b1cbb6b934a7092b4
SHA51252fdd7f78aa03f6f4fe403c6a7a22a7e53941f87b0a8906f09d983026c0b2ede6391f275f542a569f511d6c5c40ab799e5dcb34b59e49f92fa98bf71b76f3300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cc51f4fa942a1124eaec5ee7293f292
SHA1769e0106c347033fc30c4e61fded63e48bde1537
SHA256fb94c6a55d8b605f1f9dbf2b9fed510baa4ed59a882575282431d1945c8b7e9c
SHA512ec3acf883f9f50e15d243f3f7246a194f9a1ce9804f44ac463182b3f4ccadda516dd49075254aa12f876bb71a2c352f215e091aea91797247bdcfb5205f7cd8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51adc46a19780a917ef6b24705ecc86da
SHA117b8b0140b8065bf71d631d62a039dbd7bc67c92
SHA256cb5770a569dc435e6513f34dd3310aba858dd0ca74cb1e94935f900d695d5581
SHA51295e5ce4790a4f376fbf9eacad115b190b5d6e0d172824ad94c895e481b200799e32bd66eced9b1692b3a627d64c70c582a0da03e6b2c3b434100aaec30cc59fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad49cda7b75166f3059f5685fc544b42
SHA115a2f093bf7a9938919fcec84bd5ca158cd0527c
SHA256b4c8c1c65ef2b20403f4f28ae72148cb268c374992bb0f6ac2ed4c272df7891e
SHA5121f5d41629041bc40905da1602e8d5cdd12d7ca6bf9d330447cc060678ba8243b6978a70a5a8d851a4a932dcb0a086e3c2304452a6f37aff9fb6565d494aafd55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d855d82a1f5c7a4d2c643f1938bd102
SHA14b6b9b06df4683a6c8d15d19812c7a6e4435764a
SHA256da3263780b5e78a07291c803fb58123bc3a51039f4dca7a34ab5444aa7cf7ca2
SHA5128c9e73b678867b851373fd06971260198a79f25fa90935dd41436cc642e6a01e3e6ecf5230d7228f5333964b7a26e32d20221de0a30028de73f95057852695a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58675f6fe18137907e0dab003a429b038
SHA154855f733b978860df7fc874a763e88e631187ba
SHA256c0acf4f046d63b1d8ed543fb882c9be562d249b05f25b7bd805c27aee62f4a5d
SHA5127ac59209ce3a7588b55e9db736ea51fea0e602cc953e9f9e2bfdd98c89f298d4e2ebc377d6a413950486b2de182ebd297b6807a8463816afc8a4aa0f04322b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7605f4573e43d9958e430f56e63f836
SHA15c651a5e96df5ecc45a946752195a3ed76b3cb6d
SHA2560b49ad46e93cf56395dd2c2e80906a1d8b9e633aea2d25983761f92a31559adb
SHA512bc3d938cf5f0238d4312297c819dc3be057388c32fb9b65ba4ec4754defe594bcdd28bb4bbfc59ebe056c43d91c4fe89ce84690cc20691b3a709679473f14c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ede0e630438674419ec260177155177
SHA10bd940942caad502d42c15b05fc4a933630e0cab
SHA256a8e4b5e6f6815ffae614130ed67342f79bd898fdabf27acbf51ee2b86f556f9e
SHA51263e176554b55524ed50883a8d70e7cc948e677c5bcfe1dda655575e059190176f89289f863bc92efe02f0457ee805accc8439197c6eedd0842617a060ccc9fd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570345442fcc1d5bd4f967f53526b2203
SHA1ee20fefad13c954238e28d3b61992a78bcf6886e
SHA25670746619970eaa2986a73a8b2a78ee2127ab0b0663c923dca60d7a50a356506d
SHA5123e6d0363fc309ec20bd87dbc8f5fc8c2123cc6cfce21692b11d88cead2d22415ff698c7a9874302e7bbbd4e14e748a4e8003c7ef3afdd0151e6c1dc26eca2298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ae62f2e696ece9b3c60aa88860fcf1
SHA1a28dbb5c979473c5976ca425848af828cecbe6a6
SHA256ac78f528520c09a950dbd3623b1d50dd96386a211804599ea26a2a1d60c48cf4
SHA512575afac2962f9fbe9dcf01cc6b007b1399333699dc2edc7570b221f2e791068656acfd19d8e085c55d5355f94634e79891c495ea42cc8ef1909b253ae9062973
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b