Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
bdd01ca5aae602ca202c83a9fc7de41f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bdd01ca5aae602ca202c83a9fc7de41f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bdd01ca5aae602ca202c83a9fc7de41f_JaffaCakes118.html
-
Size
19KB
-
MD5
bdd01ca5aae602ca202c83a9fc7de41f
-
SHA1
639a06e6a1103eb8814330f118b7cf3b42e032f3
-
SHA256
ee232dd56951a153b08cdfd5144ffdab1c2c03a7b1a10582aba83fe2bfca8b40
-
SHA512
5eba2c9bc9dbe764aa4df1d3e064c3b314275bc9928bb6dc81c359617544edd8094f440887241c7474e334eb714ca352241767021d060ecc8dd6cce062c8ab4b
-
SSDEEP
192:0rAdeAcfHBpbNnvziDoAME+vAowbEGv1uo+uE+v2oGEGvENzACYiHjCEz4Szoend:affBb1y15O4zttcScSV/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c920000000002000000000010660000000100002000000094ab24430b366dbc859c8a8f9964d2a1dfb26c95a32dc79db0d6a52a751ed5e7000000000e800000000200002000000015add3ee6837fbd5c5d06de5de9523794dd131288f668ea4813bec7c1c4733dc2000000017018e7e4f306715cfb9d37a22d9204cf64f51e8ead41ca9ff13106be849d5bd400000007cce9560fedda2d2678fdec4d386b43bc7a5504c17b394ffc8ff7f7f27e89dc0b73c8171b8b0139d40ead8b11e4f625d78ad840974ed6fb53706314f560bbd83 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430627487" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0392c51cbf5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7AC59B91-61BE-11EF-8507-5A9C960EEF88} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1816 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1816 iexplore.exe 1816 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1816 wrote to memory of 2632 1816 iexplore.exe 30 PID 1816 wrote to memory of 2632 1816 iexplore.exe 30 PID 1816 wrote to memory of 2632 1816 iexplore.exe 30 PID 1816 wrote to memory of 2632 1816 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bdd01ca5aae602ca202c83a9fc7de41f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1816 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e4d3a0a17432e5eec94b15ebcaa8248
SHA13fb6fc0fe94babd041ebe9c7174869434a36f0f8
SHA2566ce3f12b7aca234c6c39b22152bccab1a664f838eee999ca9868c87cc0a693d6
SHA5124a043458ae98384e1d5013375e7441d52b182d0d4909a63d42976fb5e77313e99a95d405d6bf176d9bc802a614288dfa833f4d999ae4246062d65ade10f5bbf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510d14d7ba22342a055934a5132b34e13
SHA12313b8637db4592718b4dff181f4d3d3ba86210a
SHA256a32d15c0184aa037d161f3b69f3c480b4817c4d3915cba7e1b4a2dcd6b625d52
SHA5129a666b270d22f6effc1d7977c5b53b77f766b04ecb039f10bb5b3c2426f4ca652f74f09067a54c9bef091f29e504fc56f399f5b0e1204b23012db2278dea360a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0508842a9d4736859494d91750eb5e3
SHA1d212b09b0a216eb2ff1b7c7f5adcfd9ed27694d8
SHA256d7cad63b73127922fed5ee561f2f314b7375bb1f47df61c7a7d436429c101ef6
SHA512fed672bd89aaef3609c2f16aab52a65365f56a2ea62db036059b91214e7a904c4fa32663f710da40cb161a73731d5c4ea83dcef6f0248e01e1360c040ae92b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df7c6ffd085c9fb3178d5b6c4b7056c8
SHA13104d2d2a915c57bd0e19e2d10bf626afaa7cfe8
SHA256a6a8280da2f6549ad27dfcee13bdc3db734ee49c976db1b81ad2535398043bdd
SHA512c6f424e265b2576da6b306148831bf507b5e81d194bc41613a87aa1b4c7c98d8fda7a0076893d6c05d13b7b6fb4ce4234cfd1366484738e4b6dae06b82394aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9ceb580c34d90861ad4144dc4a74bfc
SHA1f36b6dfad799fa0b6c59c0e225fca22de467bf5b
SHA25634293732dde9849a1cc8686052c4c3ced1216141f8419589ce13f82ddd0dff89
SHA512183ac9e1f06f521185544f381eaacd09f0f03ceb889dc917d20049eb857997c8f6ca1caea0a2ccc460c1ab6f552954a21964ccfa86f72e50bb7c190761d4410b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea05e518b7aa70feea5e529b126d651a
SHA1ed394b78636e7e4d51ea3d8b929e4328f977900f
SHA256a94f9be14c8fb6d2468a7e91e81f7583230a1397a7268e8a48f29b1ba28cea90
SHA51275b6dce874c3586c1488dd62879c3aa5226ace71c9b0587ef747f0890d6fe6bc9c59b7a8f79e8af909a0fc1cc10957de8f2464cddf057c82aea3faf5c65ba28a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2a049c9bcc404ebdf7be3cdf7e4e8ea
SHA1b96ab02e552e629c6246bb518d19d9bda520e346
SHA2560c35c256040e4d861f707554c5d1faa4dfc75072a7b5af5da95e6f9a56e04240
SHA51260d8730175f345de4ac6b3da0930d603529d210325ebe7663a5cb310857480cc4a0c9cec82ea7a445dd82eb0955143c9651b5fa85ba5ec8c12c5b6d618492213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb5efefca5f6dc9682f5c443e5a771ee
SHA1b73afe33a8b9fe871e9b5f1b44dbfa12f4863bee
SHA256952f4073a073b83001d88aff62e4eed7478e03e932925036288ead95f45db27c
SHA5127c43fa3c14974a11e00a8d0dfb0c88abecb91fc09b144d9ead849368e509f5e88371de454e1d509fb205249f805d642024051a3222dccea53152e944140f2fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a24e992be2a60b8c98bc896c08d29f2
SHA1a69866aa987f79563fc581dc5b145798d73f2711
SHA2566742e2d715426af15c25a8055045ea69d574498913f0821c959fa2f0088e260a
SHA512e30ee5af5c78b29961940977a47b8a58cfdbc46e3a9ac1a23112951160373ed6503d1878bc2b24bde95f7dd0f5bb5ba1481c1e344f50b06ddecf0f3c886bab4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5677aad47bd3a6b57aefb070e8bbe8698
SHA1d5e81189c24d113f8e9a7b6b49489e6311c2ef71
SHA2560ccda2b15c9be4cad2816437b91a9eb0fa47a020b74d8f9d85c259c72cbf86b0
SHA5124b829976905eeed8b7b9cba3a706537afed8f3f5c3184a8b0cffb8892732e2bb826a4fb944019523fd58ef1b75d6467805ae32aa90f0f3f1166a58e9e38845e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f19f91ed09db3bb18a627d1b1fad43f0
SHA1ccd5df487f0acd02e64d37fd541387ee084bed98
SHA256e1e69b0258b87e0041b73c28d23ad82656c4a82083ebb4dbeac64354f58fa8e5
SHA51231db2ae294d08c803af3e51b8922157dabe6e28f7c7101d406822254a103943b5594e2c09ce4da3436faf6d4038fcb2919d07c959290b33745c09cea036118bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5245513a363ea7ae6ef3a0e007b776d5b
SHA18bd9b2c15545ff5e1c50baed5d397d84665fd2c6
SHA256f22c4f180014875117e0e5549b2de567d16e413d842261ee1d0a96e4f33c9cff
SHA512723de281e71e915f9996e18fe35c7aab490f012acc7025a616d83e0a00dc3948bb02ec604d7482a0b9ca697f6db4bacca582423529550d9cb41e43c6375d3f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e725a73c339d16c69deff41f6ef5d20
SHA1bdce0b66de6f62c51eebb8a8925c0f70930acb98
SHA25679a9c730e15c8e8145c21b522bd7637f38d81af10796c191c09709fe1d182dcf
SHA512c446892809f7daab9910df54a2902e6c94dc8e414de789277d059c180fd7accd9b9fcbf7ca52642778665a94bebac762693ee9a103d755d510a569caa50b5caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b173502c7da5a22f25f4ced459e408c6
SHA197d05074ebaefe3b299646eb86624c1317414ddf
SHA256fadd9452e12fca1545cb5fb2c762409bd7b35f4d5494df4b8df87c211ffa9ff8
SHA5120628596102696bedfda29a624ed890a6c4f0244aa1056d8fb2cf8136b752e635ee5abb64e42f9f45ffb5ad6be76bd5f7f66a30d975011aacd1f189e7a3004dfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abd346cac787c11d65786ff33590345f
SHA16ba0da7134a1066993cc4ad8c4d77fe14184e655
SHA2564a3df18349ef979b04d42d5a0b868d6f1aabf0fa25fcec01a161638528dd058d
SHA512db6a370a530c3b68720750f6046e9aa62dfe31d05e51f0b5ac20bfdc26717d9982be9dd00c880dc538be76762fdb041a7724dd2380bb48de4f3a1dc379254c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591a64d08ed3938b7d1fc154be6f3f8b7
SHA1d73dae144dc32d4cd9a7f487ea2442982cb8d742
SHA256a41eb8245c6486645bc193c91e83259a5ad6e87f9b144cf0b106f48e91057ed5
SHA5120568ec466b247b36ecabe851a045c4e9277b5857876d29d2cd4f60d9fa2a86f2a63364f5a69582adfff9480734cf7924efaf6a69f7ff4070c64a6d009803c8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c50857d8dc1aeec28562f870cbf5f0
SHA1ec7be5fc445826048bb830b726873e07010ce957
SHA2560d99129a1993035b1fba76b5b46c94ebe05850a5f0b2eaeb042ae3725c0b84e2
SHA512f68fe5339b7115449f1fe73c323b2dce9eca95b90e885c3b60bfcfb1a83db3df9ae1e1c57399cac19599ea291eb9db986bd4b98fd2f325dfd3ec7adfd1f995cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53095c95bed3f86d44eddce558435a353
SHA134ad68f0105655a589d4cd081ee99959e7739c1c
SHA2565ba0305a3afe40f31b2826df231680168974793e3fdd0ae52b855229c259398e
SHA512d816361c7e53b62ab5b0131ad04e975374eedee48a18c6c7bfb4b9f8cff8f79f560a6ad85280510ecf63060b4ac9c6f9cd516367aec1423338a9a1fbe9f29d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bfbfa8bd93df37d04061439ab53c060
SHA12c248605c2fccc098a42f67a3ef0ae1b5e707026
SHA256347aa0d505309526a5036dd6263b2243673a70e734b1e7159e93a6fae51ca1e2
SHA5121da25acbfce37df354f05ee26986e300264e6ac1a2f9f49ba6843c81f9f141300140481a5dd70841c32e211e3921f2a51d9847ffa4ba29e09bc46f332e448289
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q98GZSGI\cullimg[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b