Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 06:09
Static task
static1
Behavioral task
behavioral1
Sample
ced9b1c0c054a83df5d6af44a8e92a8b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ced9b1c0c054a83df5d6af44a8e92a8b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ced9b1c0c054a83df5d6af44a8e92a8b_JaffaCakes118.html
-
Size
53KB
-
MD5
ced9b1c0c054a83df5d6af44a8e92a8b
-
SHA1
f5449a9206b7d73e5e63f42aca6871c2aaa6a33a
-
SHA256
d714c1b3fc235fc946f92daeed444918d77c718897575ed5940a9d7fcd351654
-
SHA512
24b54387795764eb6492924a781e0408a20cb61465f2c2ff5dadc9dd35dc943f96e899adb4dbb0d54b35aa5bcfe2f5daae3ee795b63e06f59bbcc141cb6ffab9
-
SSDEEP
1536:CkgUiIakTqGivi+PyU+runlY563Nj+q5VyvR0w2AzTICbb5oW/t9M/dNwIUTDmD1:CkgUiIakTqGivi+PyU+runlY563Nj+qr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 308584702300db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431764849" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9AB8FE31-6C16-11EF-AC29-D6FE44FD4752} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000063ce300492b01321ee653f41cb7817e2c6872592ea8338c6dda576a8c665b4df000000000e8000000002000020000000be4e644df2b227d3bf0cae3397fe289f3e45ff2c9442d515ccf79a4b66f5beae2000000074ac878b96b214d8077ec66e48a597ad1726e8225ce19c3d8cb11f94e58188b24000000069f706806c58596ceaf931cdbd23023c091fdd5d7823ee2739ef72a8c3964ebb5a24d7f2729673a3477164e75a870a15f23458638bb92391670b82de449ee885 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2644 2172 iexplore.exe 30 PID 2172 wrote to memory of 2644 2172 iexplore.exe 30 PID 2172 wrote to memory of 2644 2172 iexplore.exe 30 PID 2172 wrote to memory of 2644 2172 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ced9b1c0c054a83df5d6af44a8e92a8b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561fa44fb3d692307110b6cdb34face6b
SHA1d66c0a4b6f8e7a93f95a70a7c141c73185ee14db
SHA25641f0c72c878a475160122a59f57a7d52ec1ed7f621bc7b17eb0e6c0569c94a58
SHA512c64f9af962d32473fe0eaaff7275159ef86dae77fb47e98657345147cd7910d8f136a346ee3570b13aae8d9c7245e55e2928741d3ddad8637b0eb110e2671793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d3ab2bb2205b897d1b0531c87d29d8f
SHA1581beb09282091ad6f7acd4b9ec860a195c70e42
SHA25612964fad20ad12d4e2ff24646cdf7921435df0f08cde5444f3159638033e617b
SHA512ef72ccfb3de0a835f9c638f6d0aaa2feaac2674b5dd9e9601c754427d2743e566cd908ec28d0d105973ff98999f67ef9e68c441cddf7e717b6a9dd7bc0f17972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54505b9a1b4a85b61f0ba9e245d4e3b76
SHA10df9e6e17dd3a25454384aeb22331f8e26b65b69
SHA2567f0d65767d64ae62f0478b51f21bb3a42b32a52fed99e0a14ff08c9304ca0beb
SHA512298838a7865142ee55ecb485d4f52c53bc06fa6114a4ce452ea277bb5d71527c1c9ccbb1fadd4936e1a8a844433bbd6b4b29f0ea6d94205f62eadad3f96d01d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a55947c01c3754eb1df683a321556e3
SHA14ca4cd251df7c883a5ff030b3ac4bc2da0d0809f
SHA25665b0de54618da3ba3251519774c6670dd9f4ce7773d0023356da96c5f95cae37
SHA5124fd85f9a83872e25f8bd5a2ab94b7a9897960a59d374e2bec62c669e958937d1bfc59c04289a9c91e119be9e7313d487d94781a2396e6d30663325f904bdd6a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afa2557cdca33128f690aef7c219359e
SHA1377b586acbae5b272517e6d86df584ed26b46a0d
SHA2567ddf50255c3f06832de2eb37157bdebf5bad73a4a0d9f841c54d1627dbcd53ea
SHA5125e657b2bc93be4dfe1b9db4c3729331f23c234e4e27bdd92e8eef30dd44a33b74f0987e8a72ba3bf662c34e0419d929f360bdb4f6fc97841b6a8595234bdaee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532fb363551e486a688c2daaf59a33a95
SHA1ead1b36a00150bc5f5c26d7320236891367fb637
SHA2565cf4e29b61a63be53428e6f0cd6dbc36a50b158f9e7bca6c0bdba5073d8f036b
SHA5125cf995466b6d3277bba307172af49d8f09709f46a2c16f64463de6310920170e634d89467c7e4fc63347c39f2f745bfb56a5b7e536feae74286ec8ed4d14961b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556bf61ff310e6e631a909f346a97fe4c
SHA1366843a58f9ed3af359d5f8cb0cbeed4875430e0
SHA256dfaefe1c83febbe16b285ecccba2e0e9099b0d8439ead4e523fd71890e083ff4
SHA5125c4d90f398935d42f3c84b8c40485f024dca2048a42d146cfa56725b205f74e7543a1d27fdb460a9657e332bba2ebb88ed137b5147cfb3eb0cf3aca406f5e7d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556e663745d3c3f2a2c43c05fe08d5e30
SHA1fecc7afdaa86f4eeba8f25c1a7eddbac8d5a13b7
SHA256e8b26c648a555a9797eb108a50a88076e14de436ed794efc10e336a32bc64728
SHA512d710dfe2cad122b22c3566a684a0d450c04bf284a9b38673c59129ab8ea5bdc9df127a0cd6697a1445cb0d70f7136ed71cea2246ec940965a32d9046b9e81e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dd355326439b67a1f677ce62f5a5e71
SHA1df9ac9b577f0f7849c66409830ab490bce17d598
SHA2561d5d71243c945c9d0552deb4d7f1c63735de339e9bf40fd8df506048025f6ec9
SHA5129d5ea693d4f001ceace5db78421787d251cf7a23f16f18f02bf70f2850a87c505f23e396ff59680e7811c4cb08269ccf08b6c1a9d74e6f969d6b0b13e80b09a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9dafcfddfdbef582375a9c7fd0a6a6e
SHA1281299c5874c628d3f3b4d64d66bde30237ac3ed
SHA2567b92a6c60b29c8f593cba1c7def3dd70fd8bc379e2903a5cf12a9a7bdb076c86
SHA512a7b55b3bff262982550b7b6fc51a6ab563a885a4e759d550f5d1e7f2877e36ef4a35db497f59572fccd4a94d39835605468e469347bd236bb55205b387361140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e2865658cedd310ad73e172dbc7b71
SHA1afad58feef17a4c2e93e6dfa40116c74b099a78e
SHA256219efa575a397dfe903e893affe4076d2fedc688273c062c82104c5861caed8b
SHA512959239220d445e9646f64905ebb1fd46c0e15527bc0c3b155a3dd8bba0a355c4f01d630dc08afdf4404a40044960ae97c0325cecc6163d02fc58fdf5c2f57e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8abbcd9bafb15298b95055dcc1b5a21
SHA16e85e9883e993de4e95c1de9956ce50ac1e82e87
SHA256ac254469e376703022a32dccd7a9522f74d141e1a250d19338b2f466ff0bd860
SHA512043bb5acc5c87e301a36f2604ab22a5b5af9846c634d182d064fb4004227574575774176b688ee1a40239ab203938c91c8a789c13cf448d1f4b3dcf61a12be6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e10c7a937648daed4f7887203bd03f5
SHA193305f5696ae7ba889fec461ac1a4ef9786133c4
SHA25642364ef978385ae2af6eb6b831807b11ae6c0ad378c703be574191504eeb39b0
SHA51204ee8ceec6031718d2bc2d8bbe8a66d3065c791848f089d38f55bfd4b124aa925037a62ed8d31fc41fa89e931d909ee2901b0ea4063005a79180d7da2a9bc7ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f351d93a9cef61ac8139f0c6a46de11d
SHA1edd32b82d006f787fb66d4d0a12ae99dff3f9da7
SHA2566fc8d120bfb94c13b00d9770ec7fb8edd6e05b1b03dc6cd06f89e7a0667dee10
SHA5129faa16aa6165833da006c18a21a8247ecf813542736abcb1ba9ff4ad41ec9e835eea89323b570954bf9f487207081b47d9a055124be178e6d7dba6f55736cc5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7f331e92ec310f748c32efc527c2240
SHA1f88b8f188c8179f593213f119d645e642ed36c05
SHA25654ba8022a7c52d280b37b6a3298be7295fce4add0aad52fa6a112597b5391d31
SHA512c06d94945f6ac8471791eb1c15da435e5234d6b69cfe9f9d00284c26877a71a71640bbf88cd2ee16baed9af71c91d099d2668b5e002c1c0555abe31df2ab350d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5292094a0a59f8c354aa48132efefa426
SHA1357f834347d9699619cc052316de251acb5bd510
SHA256b0b8dd10317ba58efd9ed423df044d79115defbc9b095b14b340a8bdf16d36f2
SHA512d38e4b41ab171807f40866d15aab48f0a4020000f3d14e23025bd4eb680835fb3f81c4f083a0bba9a1b3f4813804dd63e65cd147b8d112e7c0c37a904b0eb12c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae7a18fb69d27ea8c807e7ac9a7f725b
SHA14677af0d60f4343af935b0db2767f614499d9b95
SHA2568f115498baa4515a24247e263a972d1b97c8adfb19f57e09568a75fe340a8acf
SHA512008debf50bcdfa588a82a454cb254a9dc204fec9199881b94c51a0d7475e86dc95b3cc30e575833f5e4cac5c8d413dd160afbfb4372ab6941a87f7fb97c2f90b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bfc4d863d957ce9518c4a58457c189c
SHA140fdb9245fd50b9ecd5562f3aeed86c0bc117c56
SHA2565162681e1cd526c8d3fea3f7451d8d876b195cae695793b3bfc6ac6af821122b
SHA512b69c150a20957922a88b70dd5f79ec47a90f9bf70f6d7f5cda2b850a421ab8fd766b2730406c4d9a025070fa8491af1ef716719ea696afa6eb1e3bac5025cfa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f55c561739a4ee330145576ff8909aed
SHA1edeb474e60fb0b199b20bc25d4ceff72e12a4eae
SHA256ae3aeee9681e2b8575b7ecfef53ffbf9c829e55a4d111a988de10867fe146205
SHA51214bdbafbad83c5615311e74a53675f4268daeb716c7a59ccb62e62aa921f1b17f0456166c6d29b995781709eda7f8bf2cab3364ef302d6b9e087425ed251aa3f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b