Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 03:42
Static task
static1
Behavioral task
behavioral1
Sample
bfef0a98adaaafb0aa40a8f345ac5e6c_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bfef0a98adaaafb0aa40a8f345ac5e6c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bfef0a98adaaafb0aa40a8f345ac5e6c_JaffaCakes118.html
-
Size
57KB
-
MD5
bfef0a98adaaafb0aa40a8f345ac5e6c
-
SHA1
353cb1ea3a337d9ef261d4158b3053fd6b99be1e
-
SHA256
0def02c1945e86de10f889d1e5240e33a6d8fc82bcc0c979a4c2ffc19d0ba102
-
SHA512
9aaabb9ef3e94474648586c1c6c8fa4052ecd6248ffcf1d7b56a9a4718792a3c36618f0aae5a6684e037bdcf09b1ec417254f0bb5585543d715893eed77f32dc
-
SSDEEP
768:vgOriWNcaSoBgGTe1g+N/BE4BvRCs4CW85dNbuP5V2YP:waZe1BXEcRChl85bbuP5P
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000f50bd33e670757b15173a3330b82edfd2b4c9b93c75370b80b647b739d97ae8e000000000e800000000200002000000079ffcaa5fe6e05f450393ae537059eda83510e1680300c4fe1fb519bee93dbae20000000d3031f27b5efe88beade9a4d746b9e211382cfcac9f01a21762e8134c3bcd97c40000000840bde4bd75f88029db9d95925059df956302c7055ca566b421f92dbbcd34a5a8f8c02a2d72140e0e213cabad7c4d6aed8ddb3a83e25c79fba38bd3e6dfd8a63 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{08C40A51-6294-11EF-A0AD-C26A93CEF43F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0f7bfe3a0f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430719210" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2764 3016 iexplore.exe 30 PID 3016 wrote to memory of 2764 3016 iexplore.exe 30 PID 3016 wrote to memory of 2764 3016 iexplore.exe 30 PID 3016 wrote to memory of 2764 3016 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bfef0a98adaaafb0aa40a8f345ac5e6c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd0be3e0fbe17b899b222082d90afc90
SHA19810f464a8d14fe0ce017ca1b1819ba1bca0d3dc
SHA256cd6cf663b35b3a3a3641da979b10857a6b4076d435369394642db30ff7f559df
SHA512a1c14034af10b757fa69d3fc14e23dc6e3e6bfeda50aa408e704930c2c4af35aa22860d01e0b41c8a7aef08ecb5f063f1558be2289ae51b20e4698c10e5e875e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cd14660a29cf9251f905c702146396c
SHA161d527399ab99a963b40097b1bb48f96dfbdc685
SHA256876efb3c4263cbfc01ab9e74c332b44a918369cc7df9d0e4ecaafff4cca18e04
SHA5123965f8c7689550e4e9c802f70241baaedea9042948142eaa6f581f2f6a78751295596d245baacedfc3f1f8971aadb4821b899b7a37e71cb5750d2c8901459ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a37db2b58e032769e3b19cf36b0f9da2
SHA1818cd905bc4e3b1c3bca956a6a4c347df5748b89
SHA256c92459679687e3005f6da1199d1c307f55819577ef6adf357d4288e181a3cdda
SHA5122e5b1ffe4ee8e9432f358982b0c421d5599fe6fcecc91c9e86b804662fabcb27bae599c472629cbe43643c70ac133deadf25e8e6cb8b1be0e6f3811e97e43c4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5dbd7191daa16a1592ce40aa167e8d5
SHA1def1564d892b9d52f4a477cbddb6ba599b2ca5e8
SHA256ba80fda4c9cbe450125b31b512474bc24199fa5a1ad4a5eb49db60d6023c9a8a
SHA5129c56bde31eef28a8b803103c791386faa5dc5db2929b62ee0e754bd547003b2336a982bb3bca0b13f6b704dfd650370a96236f92fbc85811f3bd3513c70c233b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c99bc1ffb3533ef855e8af7ce9255f6
SHA12835994aa18ca283d28d7846b6192395b29eab6a
SHA256a51d9b391f5ebdad0f96dc5362bacb405e35ccf0a4571824d53cfc9941110a48
SHA512876c72ea8e680eeb9e1a3f699d0cffde4378e3820ab185f2a54ed63382aa4af95912e0b733f6b62a279d5f913f7a318cb5a30bf6b3a48e2b57a971c008ecad45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d4c7ce223a128b28f5143cf54a68083
SHA1c5fd66ec16b6e0680d160c3a0653986e16230a50
SHA256f9a735578d8c16df8792ab9dae20f73d7468857669e518e0f554dce319023f58
SHA512f10ede13d455d829471734146d6664ec61ded2e92a0c1201a467f38f0181de71fe703d706e6d70042887791ed93815a7b80ccd1265d12210424f3401c8e4c274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c524f739edc9a0d71f92c91f67e66e5
SHA1e37c5979532d21c539538dbb63fe226dc4e1a63b
SHA25620a8d30c8a9eaa9101e112f5b7b2af84422b33575dbd08200398b0e3ec510cf6
SHA51248f0704c2abdada7e9301799d7f68fa91cfd61fc6721a1dc7706526b2fc52a6996d28423de0a313706bc270762bc26938ec6bad054c093bac071ec35a6084e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1251089f059b3e6eb782fa7ff121377
SHA1053ec173ad6a4f95ed7943f118330abc35a83860
SHA256a612f84d7493386a994eb11a8d18193a57db57408a579caa4122c06867c6c9c0
SHA5122363e3415e3d5bc25fcbc7a81399f484d08d5a9c67c0acbac4f1821310babc4ab12b9fea84ed4a06db67243324e323ed46a0c339d7e014923a4e8b46696a00e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510db70345cf237cb37314ee63c15311a
SHA186bbe5854cfb887f3c186870f293cebe5f9afb15
SHA2566e033df78cd83b2f56938d0ece02ddfa12b37c6bd3d05d87d8f8ed7652cef7d0
SHA5125526eb2a1f226017dedfe5affa96a74ee8b8fb06f88711fbae92a3bb286fb602e0e8d0545e2a7a6f787530ca15d904ea69872416e64d74d0f7f22746c1d34f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8ac90e1b9e6430c6d0ad34ad361df7d
SHA1f5ed854b4b9504bbc604718cf3f2268fcc91bd79
SHA2566e58a255342cf15c9244d1089abcdb755276c7e4fb585e3169e8d4773da244f4
SHA51228158d7e8b9a616f2f9bb57293bcfb24bbf364f0da0d9515d4d63779e3e2859bfeb9ad2d1a19ce981cb12494560acdc50a9703a92ce7e896525f1dfb71cbd8a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5313c011e48f52561eedc5c05857145b4
SHA18c4ea8631f80e1d7895c165161cfc35493348ebf
SHA2566a28ff640e0acc7ed67913f446ab788503ee8bc3abc792811e825171ad9ab103
SHA5120fc0f5930218329fe87430aa7dc9b2ae4f68d89f6aa7ddf1b14120e6b897adf96a63654e94ac005ef4158f69d10dfb0026f9fa9c5af87b0b0c86b25c94feb91c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589f6f154bda73d4ecb57c4e496eea78d
SHA17c558b3c6fb5a252eb479015ced38788dc4193d4
SHA256b480c78611bfde95b22129ea475e7168c7f8b7e14186d0d00d75ad802eeadad1
SHA512b28367384c0d649c232a6f1028b5a6a0b0b22894136a468176905a133bfb6ad02d0a61a31843c4add859e5a007c7a7854282500a4ab2f5d9c07e834c10c88303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9af8783a5b1b59735d2065793eab0e0
SHA18a0f2311f597106dada82bc0e8baeff2dc595a1e
SHA2565ec3b2ed0dfabc61756b9509048c2201983ff8c6b7e331da7491daf701306e05
SHA512745b4a5978c60ebc51ed3d541d93bc32f0cb03d72cb14d4fb68c6d7301a6257eb46fea9d7c0ccfd507cdc270e0fcd4f59e90d06107694ab27e6e2ab94c670508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588c9c7b4df472b0028c086a446a7b82a
SHA173030a697b491daa86cc7c3017d7810b7c494f9b
SHA256e9e1f6e3306624419f9564957b7622642c52fa3a38c4f530142a6a0243a36880
SHA51276987a95da44469342247ff34724eeaff315e82b278f271692068c88b493a16d12cf18b53f2beab1084144cd81e88f9f975d8e366e4d205785df4207217e1d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515ce27e13fde2e69b359ea828d4b58b9
SHA18a4e19f85d8e1e4181daa39d660a09b6d5476dd7
SHA256e70588ef31173d4890ca8e62e581a2d471e410837616b167a77586bf8453f6a7
SHA51213bea1b08bd5c9d0f75a726fb7dd311ca3fa692ae76d513f95eb1202859706b8d9c08fa46482cb51511ca53dcb5fb5c2b489e47a5c95a09493b572a5221fc3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf778b3e248d5a65c4f38b6f51af2dd9
SHA1a4a877705d5d42e5dab69134bc40afd40b290a9f
SHA256fd7b43be3e47386a4fd2fb5f9deb391a88fe70f6cb2c7d2bf2f55896f4f0cbd1
SHA512828f80796c0aa8f2302369c76850de744507ec6064687e1ae9df37216f16a779c848231c3ed3780a350a797d0f0da1a9b6c8ce39165b65b0601df07b7ecfb03a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5198572b63facf7358bdb690142e34a45
SHA18ce2c0513d54c726847738d252d5b55a0c6f0c9f
SHA2561208a246ae448919144601b6e5214387b306192e2e0fc6244b4097e41c1f567d
SHA5128de9839e5489a891d8588b0e6226dc8e54d966c24c6857c6667fc62c41d16610a291e812a0ab9d6b192165cd08f1b6d89662f2067f742b2e4aa59e0937322d6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aa5d42f0c5d9db11cffc051096d61bf
SHA1dd60dc265feaba0bc5d6a0467c8545ea8f214832
SHA256c2741a543f1b490b57a78bdfef1696dccf430e2ca60f0aeaa18bebc8e4a4ed41
SHA5126ced0d987345414a877f39d4afb8d813a561df7e474f3254657f5ed363fa299c86760cc6066b5ba2f296d56e7b4d276cc50c6a16b0ab083e9a5b592af3db11ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b85dd0dd345aa70afa522cb8c31a7b4e
SHA17274955f2faaa425f904d18fe877b3305af0c597
SHA256155cba15c045a0d1a5486e6b792ce1e18aff0bf14f6d4257516b4f5c1f5d6a39
SHA5125c275f2213d5ecc4ffe4fc2b9f4e6c5bc626932cf6dd273e1a17bebd37870ff13c4f41715336461adc630a6a96c5453f213c64cb15810da82161f51dbb2012e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5563cada0d8f4d51be1e4b9daf9c35312
SHA110811b8153f223ad4b293a34821e509fea530481
SHA256e56544f55ba674f9e08c337589b218ac3cda7cbcd67a35e06a86dd66b3745f40
SHA512e91c912bfaf02877c0fcee36fb90cb89eabdd91540af8ee2de1d92da2d748f7be957ab0a98b5d2c5c7ed9e4a2ae9716c357e3244f9e05f893dca3b52e6957595
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b