Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 08:59
Static task
static1
Behavioral task
behavioral1
Sample
d18fb16f199e1fc1e4494fa87a37543e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d18fb16f199e1fc1e4494fa87a37543e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d18fb16f199e1fc1e4494fa87a37543e_JaffaCakes118.html
-
Size
958B
-
MD5
d18fb16f199e1fc1e4494fa87a37543e
-
SHA1
10377e4cf291c4141c7e5ccb4aac2418316370e0
-
SHA256
df84c8fd7b45da04fa7989428970399969e33fed8f0f0257b451e7318682b94f
-
SHA512
803ffc6c04632b292f5b6f5190fee0681796f0f503c2660b94677e7bd7b60c829326c3d71c9afb2105a6a785110b67ca4221627b88db012f4e405acbdc26aeee
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431861416" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1036a3340401db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000af329a91b57c3de53e831fb6b3607254af87f1cb204f1c6ec8e9b7ccd0b169ac000000000e8000000002000020000000b40c74f3d89d00482382515b92e7cdc7a7585c6481cfdc646951ed1e218dcd8b900000002434ccf06d30bafe41dccc40d7a31544c52eb5fb77981e4d4889b523a37d3ab586ca4d64fd9498a013e4b2a337e44d5ef5b5d6f9aa3b0c0ba1ac51c14f5ac548a844ade0dd44c73d367813b1f4d68206c141db497a7d2bb3d76db13c7f655c7d8dd078729ef8f1114d92f8b0c2e4828faf10c2718fe0b8eec4143057f6054b588a95d5a18139f76011fe65f9a3e34d4f400000001e96a1bd140b567b9b159a94ea3ddd79d2e23e43b18b3102930232ccc74cf94fb1e0031a81c5a243bbc23181745ae92c1ea6087e841d2e90b74a7d911d986e30 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7127BBB1-6CF7-11EF-A96C-C6DA928D33CD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000007e42b0763cf72e49f15d695d4de792e03e9c6c8534d1a4ec84383b8f3f66644f000000000e8000000002000020000000345fd8a72cf05dbc81562589f47cefcee83694f7bce60efc0edab5098716c56c20000000fa846ca75631b31f3ad2cae1daf019b7c429426a4cb592bcb3f5607db51a57cd40000000e681ad51b0faa7e6e8aa456894ab72bdbfcc59a336c44c32fa4a2d284785191259e4aa62da59c05082fe3faed55245dfc855494fabc638d7cea1674ec75acf11 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2668 2692 iexplore.exe 31 PID 2692 wrote to memory of 2668 2692 iexplore.exe 31 PID 2692 wrote to memory of 2668 2692 iexplore.exe 31 PID 2692 wrote to memory of 2668 2692 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d18fb16f199e1fc1e4494fa87a37543e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5824eb300df6bbc1cd801add7e8dd34e4
SHA1c36531051026061df42fffa39f0816fc817b9728
SHA256a6e1619a169774d562065bebe650d81838e29add0069354da18f8bec9c6c4ff0
SHA5127c264534e739c6a7e6dec569f1e0c834db85c0d2a34bb48d0c79a159ff2636eae013e776e6582690bd474eff9d5dc49fe16c9c9987aff262f3705f8c514647fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544e4dcf7ad7d863fcdc997de764571c9
SHA11f57f50f61f4ea49896e88bed0cf322607869d07
SHA256f5350c11aeccde27e4f0194049087387d5e21626643666cf64ba27673b1f9a87
SHA512d83483b4ec87163f8ed58a00440e86c545894bc464c890f550198f2906c658131d3464c6cd337364d2931a174a2879d16775b74def8c37b0b61db2b9815d37ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052dcc3c6c23eb4854a4efc40e99c62e
SHA1e6d40740a274af8befe847aebbff7d3e358ab382
SHA256e749c6412222c2d2eb27a7f466b5197f228d4d52c033c65e3ebd4bcb2470ae44
SHA5126962b59fe6ebf4ef578b15f52508413256b9cfcf0905b6173876d264ff037b092937d63d2a079dd8aef230b7913337a9c711bfa82596cf82b031c799d683a719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6ac7c374c64275f3b2fd413dc616cc8
SHA16e01811c527581b5c0d34d79acf17869bd633370
SHA256e3bbd2d70c3d0112ce0ecdb09295f77613d4cce90dfc501976ed97f5acaa050e
SHA512ffecfb26ef94799618ee3fa3e1673f255a87dceba9c27974c4dc835d20dd1341d023e205a1f7fa9502c2dae2389f712618b6ebcea4109cf2dc1f2f3a4d34160f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5638a29f79327bbe8a6f2c2b38fc7d336
SHA1365ea8af43b9471542188c2e7211e37ffb8776e6
SHA256b3e973302e1736f6647f280b191cf52efe96af27144d8549f29aa92d0548cbcd
SHA51284dbd844dfbeb4972fb0a4ea828d51b55cd5a1c8902e92cf7958625ce4fc7c3528d417c9df642e2c488ee41e417a0c7f57ddb93e522681f9cd65ac8317910cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2aa7564e5499949a77c52fa36058eb1
SHA1e5c8911aaa48150b89455ae1c523791bb250746e
SHA2561bf308d750faa6aa15db8051b5f6ff4b26a7c38e07ae1e11ceac7571ae749b03
SHA512d1dcb9e06921bb7d710fa0c9b05230bcf571accd4bec1f3029ba6f932be3d8651fd329a2996d5399efc6cef6c3a0d18ae80fa874feb6525acb252101fa0a4a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5707c1e4748f74851f5bfbf0630b985
SHA1ce8c9b3cb081318f8e6a3c80ef4703972e1903d8
SHA256dc08c550e03e1b649f9b99cb5dc3a163413db243c2816d555cd8399cd3544c8e
SHA51287ad4428bad105bffd4a81315adf8c5e925fa93fb4c7c7450040950ac32fe846fb330792c0f964899bf1193d60cdab73f3b6830deb35148b59f4ff86572db5cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563f4e4ccdd986a78bc2d73cf437a9ec7
SHA135ae835c3992c489afa72ca6c4d0ca092c460405
SHA256fd6e97b8f116b79804740527912964a22afaae4afc702c837238743fe850300b
SHA5121b159f65877eae96b8a7e4484c0cabab7fcb2353c0b9fc0aa42e680dba3c6cb29b76b4099074a1af7f03bc1e47234740f9dcf3ed037f265e2b50e92940a70509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597caf9bf2f5a2af995a11dd7b569711b
SHA1e246d1ba509156e72a985040cc99cc74724fbb82
SHA25614d62f4aab29c8d251de4439cea7151c25f7ce7db4c815803edc2fd1e5cebaff
SHA512b17481601d23ac5e6105de3c3ad798c9bd50b92be3e2f54c2443bed35ae5d1ce19cfead54d244f729a15826f8a3b30db881947668f793e79d2c441daefe54051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5743db8a396c70873d512bc3a132a9157
SHA1ee1c7b6193fc1e6d3867f7d821284813039072cd
SHA256cb52cd78c9e117303eaf419a81bd4e1795067f8d2b35c5b621a1fb95958a7ba3
SHA5122df016af8e55f9b89d65f503d117db4b02602b3490c9a8dd0c3265c072dc9ecb5c9216b7e79895ad49006d887e1580e6aa5f39a839b5b81575e7f650d36f3d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f221f76b2bf2ed8e4602b08be2c9f013
SHA104b5c9a2eb2a5500c14843d1e32b12258318e66f
SHA2569f4a884ff4f8ec18871d84fc65ce17994b5659fdf03168cb649ba8ff05e828f4
SHA512417b0f0ddcc459edf1f1c4779b3f64dac55151e6327cedc1cff025d8d1c65acc868e3f34d3cc914d783e8c691f6e23f1b2101693b88e7128d13c6c4d914ec075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b58c52d8a2110d5952ac3f0de3b219d6
SHA1b8762eb944ab27b9f4ceb97cdcaa46fd4a15829e
SHA2567fb92c7b93ceb8e638e321be631151c58addf2a1e1df3e9ec8b5b1d3e75d50cf
SHA51231d06feafae3f982b2ae4c3598da94ce7bb624b5ccf8ee46f7b67336442fb319862a9fe4d227228365fb0cc1706059acd2aab1087e395e051bcc093042970ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52da800c7fc47b7d743da8a9a693bfb5e
SHA19d98399ad72c60604eaf85de1d95932f0aced3ea
SHA2563174d8dfbb1a5ca0ad0969c595001046bf98a4e8a0ef7f12d6fca068d3c93c9b
SHA5126e11e08762a202cd24ac266e74a5e5cc723b2672f5ad35480632e778bc9cb7b564b77a37460e0ef94966f270ca46c225e5fcfd2e8144e90ad80f244d366a59f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a2ed0e7703f61bdcf028f03594d2e68
SHA10d8da8a199ffb6b42f87f97cf032157b0293a1ad
SHA2564c4a40e32a5b1b32f9afc9b401d6cd98a741f0c0a38788ccf02a4622c818dbed
SHA512828d7735d2a9c719a92530e8f20b39445ec629e945cba5b996e6b4c63e8d138a5e5e5d7d11c4ef4353cd2cbafa68dbd88407d44e704cb17b5851658860326266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9a2fd2ffe8e51038fddbd6fae5928d5
SHA12b52cd7a367d65ac1642c0da3a86993ea4c1aaa7
SHA25651fc604264bc0680060ef034aa2bfdbb5451425f946db7027f2613ca9114823a
SHA51207c93ca1cc5ebef89cda65255aac66e02b62af718115d4944467dc70e24fc35aa00f3b179a4f3d3f8e6837a0ae28db459c557d94ee4a22656dbc716cb2b841b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5445399bdeab77418180e07e671aee015
SHA10d6bfdba6d97aaffa8375ccb955e0865bc5956ee
SHA25668910bd03cf8f4b8217fd9af5dcf555a44aa957f5153e37fe8e75fce6809ab7f
SHA51274ca7f11b3a8b45aa48971e5df34e4e57ab54d8eb1d92296511dc71850a2dde12a238aad2236d32b13d5697f0535416e69f5a0a8b635898ff85d69a9ba138540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cf5fb1d2c46e59bcbbbada42b96acac
SHA14c8973de994e82e21b0d5665409d472210543bef
SHA2566df1d12d2a6c16f475fb8e949c8f73e7a3989432a1e70e6f92b1e0c47e0ff659
SHA512a0ff23eacca28a43ed04134cff2a57cf315f9d599d3a290644854fc33958a19949beb8573cb372ddadcba01ac4d30a1988761948e43ddba67990e9f223096682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cd6551bc5d3a6ebfacd19b5116f0974
SHA1df7050bbc9df78f0fb5c9bf81e5e29ce1e9bdb50
SHA256cd4438439fde6434d2f0707efc0cdf1aedc2eb5dd23d5aab046e7de6820cf82f
SHA51285fd8ab56fe39f5c086c78250e605d3f0cd292c1b98d3d4e844811c2cf9fbd3c70a67fbf144cfc8c1f53c315c3bc69f75163a1efbcb02dfdf4174edebb0d45e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5189d423d8b6c8d52ae416cf6ba3ac6e4
SHA12a8b7a4c4ec7878987f40e315234742b7c6fc1a7
SHA25661a02af8c981a61fe6d1a5453ad508834ea094542b577a56624d84bcb213b9d2
SHA5127dda9990ce197d8b9df54cb9f98e85989a7f598478d3aa133c459c897827e181c833f153eb62944003ae31499b2b2edc48ea452f7b75457ce6c854362687ce92
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b