Analysis
-
max time kernel
119s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 23:35
Static task
static1
Behavioral task
behavioral1
Sample
bfaaf317bfa8fc4120c55c7bd131bdde_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bfaaf317bfa8fc4120c55c7bd131bdde_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bfaaf317bfa8fc4120c55c7bd131bdde_JaffaCakes118.html
-
Size
106KB
-
MD5
bfaaf317bfa8fc4120c55c7bd131bdde
-
SHA1
ab4fa546ed6b048b2242fde0ae0684feb4585f7c
-
SHA256
1ab3d47a025d384b457bee3f4125765036c8f8dfa9368bdf92d0709e719a986c
-
SHA512
5923724d41fbf1cbd2583cc12ea65734c35504e9bf6844dfb5bdc4d04cc5244bf7e7ac81322246726f44419e89802d7d3ad828bbbbbb46e8fbef72dfa3fbe484
-
SSDEEP
1536:orb6e1W2kH90Wr+p4Ma74cllrlwDWn17yGkFVX:eb6IW2m9BCp4Ma74St+DWnTkFVX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96D2A361-6271-11EF-BC1B-C6FE053A976A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c920000000002000000000010660000000100002000000097099bd3055134cba336e40457fd327f97e1397222f74f539fc3fa4c054c3a6f000000000e80000000020000200000008d4956cd655b326306c9db0886beaf147459e541d55d3909c000ca72ac825c12200000006b3966eea5013c78f065bfdf3c3f9a2f9500b568d5d1f79ea36815d887c6eaf8400000009ad4cfc6f59b9310ef2a8f5262b7c2d831c4ac6fd0039bef2dde188b94e356144482da94a721890d44adafb081beff19efe04bf5e9b68aa9a015b5d2809a2513 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 804a5c9b7ef6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430704414" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2016 2516 iexplore.exe 30 PID 2516 wrote to memory of 2016 2516 iexplore.exe 30 PID 2516 wrote to memory of 2016 2516 iexplore.exe 30 PID 2516 wrote to memory of 2016 2516 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bfaaf317bfa8fc4120c55c7bd131bdde_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bf5ea3885909e85b2f48fa593f07b62
SHA1c989098012bcd1cf07c12f14d7570e8025365fd4
SHA256fce27cc61d2a73fdad1fd1dff8b7f6f3094278796e26126ffef94d01c36228f7
SHA51283d501f1543eae0bd0fdcb1d095e157d1a8b3a322e547fde5dda6f4cb19573fc6f4eca5112f2a29bca55baae06a72b396b9dfbd76a82e63f046e65d358ab2e93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5892dbcae003cec7f5467d5e342260b73
SHA14d29d6d2ad4b40d39f65d15a1b31d6fe86c0feed
SHA25660f796e9200849dfecd5f4531ad572df541b0b613797a17bc22a3b164374af63
SHA5126d8456833f9bd041131f71b67681c391be313dcefa263b8f4df83a7ea5f09fcc0bafaf75b6d22fc6b301ab81686f1763ea11986c79ce18cb1eafe5a25f71bb93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b440cd9acc9ab3e8d8595413c6355034
SHA197359ce042bd31e5b78a368ce3a90bcea39edcbf
SHA2565548f09e4ceb250e2e049fb61b3f84e85fd191df79ec77b400148104a31fdb6f
SHA512415c5f51ba4bcfd749ce17f276da664444aaf5ac039f51489128b73143c7c3d86d76e4c8bf4da058558a4afc368f5cb0e65fbddd9ad41b57a93cbcde493b7480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585ce340c9086e81051192e195a767da8
SHA15a0298ffefc01ed19621ea3e1caa777e9c0fbe30
SHA2563a8684885ee6faeeb2146fa54a5f37e76cef478de2fa42492a810be79fd1dde3
SHA512957ba127f253aa5b121fc6420535d29f8f67ed39c70d3faac8e74bfa2e2ba7c1fa9f434c84fe90f94b5f98c1b0d95b31753281e7f984f52215aa16bb14c318ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53539b862f08fcefc2116cc13983ff340
SHA1fbaeccd29db2ec4c39ceb8e2de75edb85fc3908f
SHA256543ddb16d65ac5a41a0b4fe99fe761bbe9ac0da71f7e00214bc5e5f01604bf9f
SHA5127dcb823d00e5c96fc66ac869078911aca8e033e51b37d00554335a7c1f582fcecc3264c9850b8d851f9c6c746cfb2ab0cf525ae8071a5635acd469203d69c165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ef2df43efdd6bb7a084839fe134a9ea
SHA1f2c98f580a79bef9588ebef3c55327278a07d939
SHA256e4ca87d7fdfbf293c8b8fd7f077a35bfe9d8af6161d106e4ba86909062424f95
SHA51265b493d0236b2c3489ed2c1fc14ff7b4e918f4a8fa6ce8c664976313143ebc3c39e3b33b6bc22b2d1f99f08bd38555258f499f78b85f897f34b75bcb1a4c4d25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a8194613286951d2efef2a2dad55754
SHA10e427445d355f9bc6b09ea2e58151d464b59af1d
SHA256b5d41abc37f519d9c1e0cb5fd2e0a1a43eba4a3f515e196a6748071aee109378
SHA5123f50b90ef8a6631810367ccc9f9e927582fe8fcf4f35d8a7672bcfa58dd60170eed7bf541a57d97cf104f6c30afda70ee945feab3ee74c225604dbf91897c927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddf72c5b1418c4448e5b5c3fb91e4bd8
SHA1f8c7295a727d3eaa3e99fbbc811d2f3eae604ff9
SHA256d02ff0fe717bfb507798996232caf8166b2b180ece85a58306d125dd07a56d33
SHA51299fd00afb6a65dbd108b328bcd447cb95e7c6e3186d1e467413d72b9ffa21360552e59d2f9ce20e3ea7d3f16d83edce85cd8abca4b07adc043a069018f9306c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cc36cbb9dfedaf2e12b84c81e1d9f6a
SHA17e17d588a35d7298af5c28beec733b7a60e02b16
SHA25659daadb0ee800511ec128eaec19ccf811753fb62375d839aea018e99b4f41f59
SHA5122ecc46e6a8ccc1a86cba779711d69d29702f06da0c72b7a507585db810510c63bd2479e8ac5053744ebf0d785e90fffb8ddb11b90fbef95e1983f55f35981f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd6d53e240f5bb1ca69ee7815e04ab14
SHA1051af30a11ececd323c9748c2e78c69a41a00f85
SHA2562f8f2678a0f6a4a0c18fc72e68396a3184ebdde1e45e182dcf8cffb9e0c4e737
SHA5120d44557527a7a19cc6576b7dcbfd90cd3e4825f5359479fd262b0fb985235e34e4e5b78d55c79671b0caf11a2c4f2bef4a11ad82f8f758bc113fedb8ec6a7ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a86f3b26a6e57841309d0b5ba6143d4f
SHA123bed7713270e9054f2a74b4094d91cc0c783121
SHA256ecb8761f8a64ec8520ce9adbec7b53b8a648d38eae92a5a9333cf53232969343
SHA5124ca6a3095a722938cd4b4626f262444b1d9de4ab23e37dc7047d5eb62e99f27f2bfc3380cceb38b6adb37159af5bb9b1eaaba47e43ae2fc0f8449589631cfc5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515ab396a62169159401023ca570781d7
SHA1c11cc7ab198455ad841fd9546d8343cf43585bc6
SHA2564a8498e86214c4240f26140510d9d824630474026cdf38b8d4b6661f703576f6
SHA512764c2d07066cb98c74aa6527b95d7803dae38ed2a256a94d2da90ad834da05f6a0d7d01bcc2a7912809ce42205b67f8d159d5adee1e4978e19b251dcb0ad7565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2f1981b2487d4906603f64bc05f10ba
SHA12e08287a5cb78f73070b9d951472517193264714
SHA256067bf08ce1e59a5a591986b043f8eb00178cf248e3c348f3ea2de41a3b4fec64
SHA512fefca59cb40beb9abdefcb4e3f4962312df865756d21302610b7cf9573ff46157f6653545e9807b9b4f42d9f13c00fff2844ea09f79e57d081ce34e13dc39c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50333bba884762be3a2792f3c5f79a917
SHA1c800dcc67b6c5783756df42e1764b3c4e93d3b2f
SHA256a55a633037c7e909696dfefb943271ee80c845ee5e00d3e24eaaef6f37232f39
SHA512c3358b386336d85ed782b107a55f84bd22d5cbca6d0773a46f15ea17bc2abb5ead46e98587d47701713e7d147b249ac7271522b62e2ffb2a593e1569827519b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b96ad74e6b4fe12715b520d6dc7b82f7
SHA186d8f0e0bcf3b0f5a4963e56a793685dd0e88b96
SHA256cd904a736c13a4640d16277fd1c5b190de3a7945693a63b511c94dabd5c2b9b8
SHA512f9f549b3faa1bfaf3037430a8555ce506e54a47a792896d79857f66bdd577591a6813a598ae23397d3e3ff8fd84d3e2833c473c65f3aa6abaf23c9d6c3cf80e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d53a0702b1636355c3b3b8b7a1091377
SHA1cb8422b5b1df81c1aa6253a66a777dc0d59129db
SHA256ba9ec80c69e68dc100bad42ea0f7068ae8fc12f3dd5cca5b1f9ea81861aeb3ef
SHA512a78ec4d4b48712bb7ad94c375f6c22d23777d3a56491bc3a06acdde65b72947b5414b7adf867a9f0afd1308fa126a0b925454d8333d3100e84189c19f2f95ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5015a2df151181456526a1ae46ea35591
SHA11413de2a52a1edc93cc57ef5be3a4933f3ebfe1f
SHA256bbc2d813a5199ea7cc691f2e8f33ff189200e1e3262b2ca5c3f64575e6c9252e
SHA51294a6cc5d96dfef5d6d1b394f040567715579b7da220935821af026b7c79ccaa04eb180ba96b0e77a485c8900a5391c67db52417f737d12acd0f42c00844688a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cb1bc56209d46aab625aaad7da10350
SHA1f39451ed5f8c7bcf69f6ca3f747eeab54c1061b9
SHA2568f4d84eb02da8520fbededc8ff4d2fd4436fc495394fa5c16ce0d56801f87326
SHA5122844e177f1928f0b5da774b2bd23785bc6de9bae7a1672515814da9f74363500e694fb8c6f13daa3c5fe4703f1e6250eec14f895b0751c15898a62cfd4994771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f13dd5d09a2aa02bb0c3b08303be67
SHA1cb14eb2e4a81a294bdf80d38c1745da7bf8fc22c
SHA256f5f9e0a2a96b595253424a72117520574248d2e0bacbc4c0c529f09d99e24bcb
SHA512a98d841c11c33878d4a26d5dd6a439759796311af18166b7ec7f48b2a6401635efd83fd3657439a60b7a23fabe881b8cde80c2fe426d520cb759922fe4fa2644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b107e765ea3b2c632d946083a5d5a458
SHA1b954469ba941726a52a0af284546b187825c35c5
SHA256bab4fb6de08cd4c69e6a4d072fc88b85d575c5fea6096b20ad33306bfeea2cad
SHA5126a227ff26820f941ca416a11bcce875304c5767abb76959a0ce4184df4f5f2136053db9ad7ed8f288499642bf3e4f213fbe429c15de4bdbf4727de6cbfb75315
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b