Analysis
-
max time kernel
133s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 10:34
Static task
static1
Behavioral task
behavioral1
Sample
aaa8c54db790e29b1a8219c536fe1cf5_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aaa8c54db790e29b1a8219c536fe1cf5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aaa8c54db790e29b1a8219c536fe1cf5_JaffaCakes118.html
-
Size
121KB
-
MD5
aaa8c54db790e29b1a8219c536fe1cf5
-
SHA1
32ce22a98d8b8aa7dd357486dc1bd1c230281822
-
SHA256
4f198dcdf437ba55ec6e7afd365320bad876a24598d2496a79fca35e96260578
-
SHA512
932830f0b3ae58c4a5159fa1caf30a8f69bfc32775411f9fe7149357bcef4d7f599ff7e25bc3e89af8692d58be3eea3ffbff8da50690a9f89f05c1988f98568d
-
SSDEEP
1536:cjJd3vFMYeWX2+8L/HsHVgEH4aEo+/wjT6W:wlvFMYeWX2dHsHVgXHU6W
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A512B1E1-5E16-11EF-8470-C2007F0630F3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430225550" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000086058ad12c4526d00777f46dc048dfba8a3e689585f9e5a4f062fcc3529936c1000000000e8000000002000020000000709ae53d8ab5d505fbab0c95afb33f37cfe835f39f631c96d7512c8aa7ca687a200000006345823bee957b9b1f122d47314b208772d4354790a37ef39d30eeac4f3d95ae400000009832f8a9fc557421e76e0181e8021501dd46b54a93026b12d72f82980de77a9d3ffa94ac9eb61137234df5701568c623c4f9e32c750394fd190163571a7287dd iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 800f019623f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2820 iexplore.exe 2820 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2772 2820 iexplore.exe 30 PID 2820 wrote to memory of 2772 2820 iexplore.exe 30 PID 2820 wrote to memory of 2772 2820 iexplore.exe 30 PID 2820 wrote to memory of 2772 2820 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aaa8c54db790e29b1a8219c536fe1cf5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565035cf072ab64fa154417d52642e2e2
SHA17001a997f444f22b87c4f970595328099d87710e
SHA2561055bbe37878a48e0519f597bd43d255abea42b5ed451244850539e7988c4975
SHA512b8d89a2755f81306b80d8cc86cb033e64e5bade3e5f947011694e9e062695ea7bc2a665f9b22b7e7d8f032497b78824f4bba308ff817d8bec1e79e84a1aaf2c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b00cd8c8ccd269143f4a69419ee8425
SHA16aa4c68bf4b51811826a1eba5210f14a5dd4315f
SHA2569d714a02dc3c92e46740dfe9b69885e384ab516c56de4b65f3aa5f037bd50876
SHA5126da7c3ff14bbc081dc32e1a93cffd3d27e178617bdf18a8b9eae6d1c77ed0d4d1f9647d1744bc270719731720746ee2aa367002d9679c4f9d9bff72bf742e030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518372c52ca4701c3a45a5afb80687f10
SHA1433d0bea6eca49af8706d68dcec6e1e27fa994e6
SHA2563d5c09f1fec0319858188c1fcf8a35050df7bf7a6d8db3785129d0017b8c2439
SHA512627644f2551f1d5e9497a7a07d0a90c8bcbbab34b81e1cc40cdd08cdd5ddd2d0161a193d8c1b7d819490c62bf410c15fd119c668fad1d86e6a792af982420be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f252af0da6c9facbd9f84006b07c057a
SHA1bde6f3071f6271acd637fa796cb97aee9d2b6954
SHA256d00c45592429343b0eed5d7da6a32538122d08350dd616424b2070afaa4f063d
SHA5124a861e9a0694f336cf04fcee59de841e7c3edc39321ffe5034ccebd9035e3ce00d53d3df0e2b3a472d114a4405552c65be686ec2b1209b80a2f8aa92d99ecf59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505478ddd2f5b78e303278d284cd09f40
SHA1a3f22ecd1f4e766d9bf88b7fc9c2f3c5cca6ec8a
SHA256889b15102155bd7b10b20df744070134b502913c2084f463c94d8600b4659f8e
SHA5129bceaa8dadf472e88dda08919d2e095429b9d90076aa3b44cc99e6fdef2a21bc4b43c2abdfb3b0f8610203775914fd577a0966c747dbaa0f220b61815b075b7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55249e692465dfd35ee57aa09341cde89
SHA1b462b3ca5de466c562c21c4d3d6d12d9a54c9438
SHA256ca5be1b64ca909d47f5e67e7d2ddb679342aef79dcb45e3d7d1382918190448b
SHA512692f53393eea04d4fc8db7f6ae2c9e3e01ff82430d47f23815e20d761e71710d6a6a586e96b9f3074149582b5954e876ad174c4b8995b2d0f1e048265fc5b756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aa3602c70126f8034c6c8ba845c5fbb
SHA1a87dac6bb311f3c6fa07a3075c096516b05f3dfc
SHA25697b7e96bbd106ed144b78184d5ca474eafdbeb91189d2d5d0f3fb1d851c56a16
SHA512d472222348950142f83a4d8592f3da93a49f03af333f8dd09b6e89d4789396fe4d1324ab7acfb3cf56e8ad6378310da498514a93e053c4e8e4a1dcd7feb9a6bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f65f771dface35fde6a3fd9f2133406
SHA14457e81622ccb1a058eaf167f792fcce6b4294cb
SHA256d41791f4c22eaa40510a2ffad6002b071335c15354738c02ef579d9de937d69e
SHA51228ec8e1b9b577f9e2b052344604fab0f6850ae95514434368868f94321d248318458ee58c7ae0eb267527b75dfdf65fe9f3d28d2556b1db5641925b55b21b284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50be0b5d7833589f08329027bbba49e9a
SHA1ce0febdb4a553bc8a2a8042f2e450b1359f1d084
SHA256c4c20f733d623b9c13f58295b7afba354d433d33d7333933ebb0d3ad4f2ba001
SHA5128936e36cbb5e903ee2a3512f45c143223d65f8c503085d29f355bac168b190b23009f3b9eb87440b3c9c47068d5c844443a2ebf58c147e3327b68c7f5f0070e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4214bdb4b48c3ae0443ff2fb2feb3e1
SHA128432ff4863545bb7f6a6ca618ba7e0f4fe4906e
SHA256dabedc441f52a10e4518649957ad588c6e23002433310c7d50d0be91073af5e2
SHA512c350105ced7b157b5b073019e12426854dacaf356e029e441ee1a4e6102d06f82dc82ad1c9827a74e6d7548bc91012c68d93708c6b8ff964de52136e7889b1bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ffde0dc8628eded6f73960a17fde273
SHA125a2e9b0effbfc3e1556cebbb62ef4fa8a692a67
SHA2569870f80097f64325b75753ce74b5b7884aa3378642d414eb503c05086ceac043
SHA51233635bcec3ce587bfa9e01fad87f6ac3483e8bdb15bef7eb301e6ade77a57be8d26e0791c2d61ef9dffc4a20c34dbf341d14acca74bf8ffe9f3d2f96a47b57e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7a728a9dbb9486334223719b0b109d4
SHA17b0b8af824c8d0acbbb3293024726d5498484f0b
SHA2563f19930e3a4695ece73031da73ccd45512eff1f1bcab1151e44d2ea6823f5116
SHA512efbbe1e0aba491946e77f4de23fa6836924a65bb7bc781abf9ab8f5b6fc049003f8f14d52477261e11eb6ca4d2f76075186d3ed041b480f819383d1d0c0d6b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7327e97a88b434418bd078f3ede6a84
SHA121acd76b63859715c51acc8fec515fd47fd19ee5
SHA2566d85f6c1fe0ecd315b8f9b7006d376ddf2dab6c21c5d3dec1c360b6f2eafabc8
SHA51254d2c1adb4e43b128dad64de17490feb039237aa26813f44b44aee80dc36eb4d15dca252612a05b2502409f2341d3f1cb6b6c4c43ebd8a55db7bd32fecba8d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f4d197f92b19a1313ec470602b2c025
SHA14e17254733dd064545fe4d6cf2450a48c42f46a6
SHA256a99dbbdbd8a4c52a21718234ef10183239e55395b8f70b0057ac366bd1e53c1c
SHA5123b3b3a364a54507175ddb390b4454a815ad6ff447192912e357c8d28844a3ecf1df1b73fcfb8a6559a6339e22d193e77369735e7c9c1e70f232afc7f8a6d7f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc01e17ebb2b0e3c9df2104bec478d18
SHA198c19800ba251e17ca48f5a38f021d86b4d0f174
SHA256fc874527a0f6cdf73257d2a574e2c68dccb7af520e9e6ad2bbc5bf51ad231617
SHA512920842c5d2cf72363c6def0cd5121a91d8c90bbefc341051dcf8191075042da6fd714961dcdb4f1e6b7da6697c27b89c726eef761801176b7c268a8a31dc9c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532977b0b95cc164dcc0d09e34467a7c9
SHA1fb4918124461c7a106d8f5f4de73ae9b50ec277d
SHA256ba540cdd616188dfce37824c1ab37a577d475aa3b40523e7c6753e373d8e8edc
SHA5121b0f6979fbf2646f48098760fe44dee8bb1e86e6ee3e059b5b14de18af1c570ff6009ee3a2b362a0113299da004fd4ee01b0393831dcba5735076fa93f6ffab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5712cf6e5a1f241c50a3ea4a9769d0014
SHA18671f21f67e9c137a77b027a7795ee0e6eb7d6af
SHA256e6c8719f2c436ffb06001fe35c640559b0286a53470d5b39fd2e897b1009389d
SHA5121f6bd5bea1034633d5201761a17890cb20b2b69a8a58855dc036ae084accb3b9dcfdc3282d0e3b0415a34620a1c064351921276d914e9c32574f70920726fd60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5875689fc0eb1635bf2fc94db26c25b6d
SHA164a9973df4cef7c75bb659323bec793e831bae94
SHA25618f7a31fa953f5c9a96f3cedf51dd2c9e5a0c49a80bd5e79114e17bf04567690
SHA512481389d13250bc067e583b1e57bdf75870c3da2e2760a88a6ee5c944e29a56986a00518fdd8c06bc909ceff30514b82a5897f4f1be227b51941d5a66ed33ee29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502df27edc06da774186272fcabb9e7df
SHA1e30b141dac0a39787fcc50a7087c720ed1754c6f
SHA25669423ffe225249260e526bb8f6f47d718e1f1af8a53b93b403642a8b910c0403
SHA512801aa74d598b9c88852b5c32e38929c3a3eb06fe2b5f5530f264976f08f2b16bb99b28cb8c5cdf635973defe86081bd8427fa24b7f03b0dde9e6cb8907e71b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57897654adc9683c99df9eed238dd7ac7
SHA17b5280b27dd02824353dd18d87777a23e22ffbb5
SHA256e64a89b3177860cd47f64ce76d3c127c9212654ec70e48b5e42b0a876c0ffce3
SHA5124647a39f11855926814a3909394b09f7538080d9e66fe15b60a6b958d5742168520b9e0948f93786f64dce2b6f6f97e3bc1dabafe2b2d32510dadcab70b094c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9d38c444cb91b4e34ad3f541a6a1615
SHA1e1c13802f92a79031b1323d33b907fd24e226db6
SHA2568e86934d9e7da0dd371c2f026f612277a5edc595d56d6d5069978aff18a1914d
SHA5128867f25b3d6db3aca84c5dd6be962c93ece6b1b50f152cd25735539624331b3563bad5fbf3a0bef835df12a59ed77f366f7c28a9a7e9494c6b3b51223d850be7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b