Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 03:49
Static task
static1
Behavioral task
behavioral1
Sample
d59c36cdedf9bc94cfbcab506b45ca14_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d59c36cdedf9bc94cfbcab506b45ca14_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d59c36cdedf9bc94cfbcab506b45ca14_JaffaCakes118.html
-
Size
3KB
-
MD5
d59c36cdedf9bc94cfbcab506b45ca14
-
SHA1
b8b3e76b524243b8de323f4d3f499fdcb4cb6523
-
SHA256
6e93395012bf9ab501f8c8a8f1665ba80734e779b87acb4c95f9595ed1a319f9
-
SHA512
612b9582a9de728c183ad78c68c639271867fdc72a7cde5f8dd5c1f628223f7428f5cbd3399acf58fe0a229732d6b0259e0d37b6a0d8e968c02b167aa39b5c20
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000370eec18adbfdb6b22ef53c7f68de42b13715079b770c9f31d9030287811046a000000000e800000000200002000000016fbca6da8f61e45a793823d866a87430c00cc15e8d0f340872a1c0e6a2e37d6200000009913765425cac095d136bdb47b6b1d49a8a3c4bef675df7ef9c7fe608a37602a40000000d066f00226d200db157f88732c1f1291d88a7a6330832ac37d4c13ee377d902b2a11e6f754c641e1b4543478d3c98d30db1d6014aa599ec5c410a2ecdec9eea2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0fb3b5d6b02db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{85D9A831-6E5E-11EF-838F-D692ACB8436A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432015640" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2736 iexplore.exe 2736 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2716 2736 iexplore.exe 30 PID 2736 wrote to memory of 2716 2736 iexplore.exe 30 PID 2736 wrote to memory of 2716 2736 iexplore.exe 30 PID 2736 wrote to memory of 2716 2736 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d59c36cdedf9bc94cfbcab506b45ca14_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587fa4bda61212c6aa618d13deaacc2fd
SHA1a8422ec5209119b59e1bfe6dff4b1ee462e068ec
SHA256a2ef9ea8e4dda5655ccf6f130e3bc61cd1f07d6870661ed0f74fc58f28d5e855
SHA512382c921902aaa77e8078653bd45ad31990888978cfba87736ba0a20becb9cd9b9b538d38afcad77bb574297840c0f8b54c2c289f2b214a1addb7190b4fc7fbb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d27434509b5bb7383a714bd6cf65175
SHA17a0d9ee4299d94099edf26ca241c74ee37ecb76c
SHA256cda5357258323038c67be03d9addf4ee1c897cc299fe771936197b442a00c13f
SHA512b296f547def7224d02b1d9b4c6c41db55d3238e1fd412953dd4472e95add6633c209f6143890dc605510962a1b522af4a6d201633118c97e7cfb8639941769d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58de357093aa8743a613b0958ce2e61b6
SHA11e0a512cd7f6718f39fa5ffb5ceb6bf7f2f280e5
SHA2565cc4551f5e287ed2c7183a50e24174006a83b41a05d826b11759a842b757e7c9
SHA5120d4209221b871da49c5a697df7cbb2df13a16ca256a62aea89a2dc4136120a9448ad3a1b4a2db224353f812ede840bfa14c9e95c0365b10c4b0effc762a231b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0e7e16b8310608c056cdde67c456d47
SHA1f99af982461cf028a44f449943eae1c24fd93c83
SHA256a50dcffd40820e212e9533b3f912b9419f4b7d45d928d350ded2279885f2dc86
SHA512fc035a9fdae75d8cfc6901dc70b60dd324da073abb0c9b473f38a3b5c3435c2e7843e4af5a10b33b3cd6d727827f84d3bcbd10282f97584b9c400857a696a86f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573bef31fb002eb779044627147612c36
SHA1c8a2ace99a867da6ef49cbb8df0754d9862f5260
SHA2561a379791a589a825fa7803c6c780735356c082b4ab6cbc7a85c5b7fc3a6111de
SHA512636212c8e2ab4375f9beaa3e137995ba92589bf64f1c4c60d85beb0caa66680cafb0d6606dfce16884e83f6cb3f57f226ac95cb9ace4e99a3a692a05b4cc99d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a96da81034a0a6c06f386b40c2c5771a
SHA1913f0fab7617d31c5bb5bef51cfb188cb7c2e602
SHA2568d0df0d69ede928d769fa468c7db3e0e1cf465133c367f27b8aa4c899f7ba515
SHA512ad1f1f27b4e70600c0354c7a57696cdc60d30b65a403b42e3a9ff2957436b7eb5f290fa0428819147409d6dc21d1a3ee508197fd396b3119b4418035120a7685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eef4ee6d102804e99f2825a01a32eef9
SHA180a99e405ee23bce6f70a078853229e50f30df5c
SHA256381ce69575ef7c4c542653ee3ae7b05588e8999624ec4b6ef0c048de2fa853e8
SHA5127ac541e8be45da261ba854301db0ae45d502bcbc8a63728f6dd1ad6ee6385489dd339be3d1f3bcb70607b0d3034b62d03cd318e476e6d1bdd44cb1aace96a176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e5b8165b32c4d89f097a641d0c8d6ac
SHA101b0811131e389674647072f3bfbafa4c58443f1
SHA2562f7675520f38ef0fc7d0015ca686783f7d495abaae0d8453f1f1ca6b3256d81b
SHA5122c2f3b2b298a5f1d97883885efa36e44a8a7b1ee78a6fefde3f9348fbafbb97c3c64f22f8ced8091f931d836578e0a87def4efde4930bcfcb0bff899efe39830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5484bb9d38493b688224b8c760e4eb008
SHA1336bd74d9843787e66cbbf1e657c92a570a30418
SHA256ad29976b405e17d084b57ed6b465b11087d9bd6697abb20408a4ec7d0db7d2ae
SHA51234592219b8bd9cce5f80eae976484b6991b24ea434b940fa1fb196b716aca55382ed83a55f22640d636922d95ed644275ea735b7bc1fb068f56076d4a1f1a78d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5273293b6126a4309be39b64a2a71e78e
SHA13538a9cba3e8a65e4a5fd7a86f57d6790d2f20ca
SHA2567843195cbadd8db4c4cc704a2f1a504c5298077027b8580bb67e705c5ef42861
SHA51228ad9af478fed37362830ba881922a62274f3a2fcbe4f3b5d87b622c7cb703308645b4006cb43b053b13f6ac26caa5eecd10e86c066bb787ca6636516225d366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b783b23ed305ddeaa18e3e23bac2bfc
SHA1cdd01f958136023193aa90e11851c0f69569480a
SHA256db1a288b27d8c734c7d470efd816997acde84010fa958ac15bdd6f73dd8081c9
SHA51209d6b9019926986fb9f6670539fd077b22b16e0969d6943893769226ea44d4c542800213de064000bab3826f218ce631e106a2f0d3e766708722366069d524c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7cd6709ff69bdeb2467ce23ce2047d9
SHA1b88eb8193e72b0064402f477d055a794bea0b847
SHA2569b7d704dca139ba0fbaaa38cf086dd16a1deb5d23e61bb1a813f096f71694831
SHA512e7a08e596f71cb6dbead8783213720fa04b77898fc55c58a424174638414b844c43cd8dda74ff4b911dfe750151df511260630455362c54233bd92cb9983cdea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aaebb7a9235ec99eafde70d23550aa2
SHA1b48ae8cc0f359f1ac88206c68ab709f78800c1eb
SHA25689ddace2530e9980cfa8e4896337388f735496068933266b4fddcf19c387494a
SHA512cab359e12ae10c029444bc2117de068998cba0173b99b8536ab3dc2bb47b61a29a150e1e45d8dbe211532eabb68286bdcf028b175e475f7d4096a72d6fee2216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5985c3dd40fe43d9251c5ae5ba7482ba6
SHA14de02633e2da287879ccc6ad2c57d578f34a1a25
SHA256afa2d97102b536a4a0bd2316b0927f385ac2d43eb13f77c1554fd0121ac50c7b
SHA5124f9b9e0107ade192944c3d7b93b03cd6cd3e8a10d87cf4fe2291c7c1a2629148a776dfee125ceec8aab7b53ce6223f458cc8bd876e3e611b62eb9749a99c9560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d6cd2d4783be100e9671d731a67e2cc
SHA11b32c5838a6c3112dca3b4959cbac54c1c8724e2
SHA256e0f174a0975b13159d2567e2d9118f3b5dc321aacec1eef990ddfbca7e90d08e
SHA512be2120b049497dbaafcb714cb46d5d0a5cbfae7af2c45c3f1ade73e9074fee238e0ab517a3b3148dc293b54715db0f3d0ebf75ca7dab542643de0f051f5c4735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572415364f6813f1e58f9bca793e4c7c5
SHA16c1c0c50a311dbcbbf4a241c73d8907e95506243
SHA256ca1898dcf0618e0a7e38a4f8dd69a6effcd387647f4fd083eb57ec3c5bbed8b0
SHA512c4969881cd13002dcd14d50b1c99b320834f06b5775c0bdd7a28f28808bde4d739e0a554d69436daed925eef953ce968948ba0ecbf5b21341dce1453540f70d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5226a30cf93271c5012d68ea1d4b2c60e
SHA1794fe17932d2bb3a7d5b3f524879925db3dbfa84
SHA256e4ba73904fe27e25ba3ecc1002044df27fb41736ca0d742715272e36ff44817a
SHA5125cb61d1d59055c3b8a824e06c845396039eac33ef676a1dabceae6d14b5b1f24c557611d3d3f8a1d07b31c0b3ed9284963d43d53e1b57193b66261258f1d48ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7656cb2a1dce59790af5d47842f8253
SHA1258bf99a95cd3900214e7ecdc305c1c32dd20d88
SHA2562d30d12f3ba958ae33e31a6fd4d8706d87d0a137d9115cda243af4bab3b6c796
SHA51267728528bfd48f18c6fd96274cd83d5ec8c9babc8a43d320549852b66bc17f5650a485249d17ed0ccebdf02ca3b153fd6f174211727a6f3a009fcde3025d973a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f144b07dcc0e2ae229f64d8759856648
SHA1535904a3a4a4789609bb3f4c11f138a46740a4df
SHA25685b019b0479f487a9a32b89dc3ba1ba65d6b1d0e31450b7fae418a05c0abd9df
SHA512128af0fff5b5e7c8cea9b62bee69187b2472fdb4cb7bac1410795de1227b70a06097b3a41a510f2bc8ef196106a7fdfe08f525282d9e27710b970132846d39eb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b