Analysis
-
max time kernel
138s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 21:58
Static task
static1
Behavioral task
behavioral1
Sample
db4a79d3f3363c305a4281f650e41d0b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db4a79d3f3363c305a4281f650e41d0b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db4a79d3f3363c305a4281f650e41d0b_JaffaCakes118.html
-
Size
167KB
-
MD5
db4a79d3f3363c305a4281f650e41d0b
-
SHA1
554908bf4954707da46ae529daf1d62f79c4c579
-
SHA256
3ff730cd735300fb8b976de987fa735cee9ed707b7f3ae8878668f3027908353
-
SHA512
6c6362ff7e9309c6629a356bdb18d9900d85f6bf4e9e817a290f872e581ed3e5f1c3669330937f81fb6e52a8470a805750f1c3a02e020d4076c24ee80c8c2efd
-
SSDEEP
3072:S0rNOFDckUTyfkMY+BES09JXAnyrZalI+YQ:S0rAikU2sMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000092c01ca11970eb011589acab0ea3bcf1dd2cd937c44b1b8e9459660fb469cb29000000000e8000000002000020000000303767082a8372e526869518122612f6224ac5afd91157e1f732db26a8accaca20000000f7a499dd0908434c2812e9f3d6eb8fa801288fce87a751cfe619aa433284566940000000391da7be3d3128ee7a6a48802e2d3ad64e580f565e3d7e438386fde6731605613956fd9e180a946b45a0f7d89bf1ef435c77dc82d94d7b62712e12d278282e0e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432253810" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b04f20229604db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D9B1B11-7089-11EF-94A5-465533733A50} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2144 2068 iexplore.exe 30 PID 2068 wrote to memory of 2144 2068 iexplore.exe 30 PID 2068 wrote to memory of 2144 2068 iexplore.exe 30 PID 2068 wrote to memory of 2144 2068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db4a79d3f3363c305a4281f650e41d0b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5917cc99e71b3e2172d9e3474dbd85d63
SHA1f3be19c25087537072ae04f5b15a7cf31e0dad88
SHA2562a6a81e01a6553db120182ffd760a43f4ea3a063a16e3cfae0bf35777ac52dd1
SHA512c9b37c37c7b0c86f0889f36cd2a537e26b38c85869c96341570f4348d8c33b4fac3cc767e84d01ddbbdde66858bd99b15d05234ec724f85e81df2f5a03df56bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5304cddc8bfe7f8efc348eb42c5988e70
SHA12da87c7650ed7a1da82a42bf7a40f1c06cac9ed8
SHA256745ed11ac94c80e2e15e82c0d5d5d4522c5788ce1c429ce2a3ec7014bc2b8c6d
SHA512d33a5460172750537aecdab023e52f431e2cb2b17be4c3bcb656db8cd6e89a75e96482bb8841b84dac50ffed6f01b2b2c679f7e067bd71bcd31d28196f436f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b84002f85878fef3dc0bcc8a594651f
SHA13df7785b2bd531e0dac6366e1fb369f26b430b90
SHA256e9b114ccad358d5a318ee2aad96389bfd4e489f0c07c063724144581b8f29df0
SHA512234ba05b6a2c7f013160592dfd1d4d51d03f3fdb3e3aee13efd53849af882b05d39911896976d5ad832d7b93d695ecb7a20fdd40ba69da597a4b745bd6f7f337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6051d66545fe98c1f40defbe0716bd2
SHA1dc815172de522891ba656388abd2795744d3c2bf
SHA25607e5cdd7600edf08ba9400eeb4e87fd162456327f3379dad7af9e0de6253a6f5
SHA512d8caa27de4210e52813be1b2b0c63d25a584f74f13be393c0994fa4ecda1397460693eaaaa4c20579f27bf491cb7ab6520ad462b446fa75f022f7df9dd739aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c2317970a36dd57ab7b53725d19a6d8
SHA15070f53a3d96294d966a44c5ca4be012db3122b7
SHA256a1a4d04702f6400872e4e7cee71dda2375fdde48944aedc7001554b1b92292ba
SHA51253c3605958f4b77d709c039c8a7b7e7eb8a56302b1db374c2630e5278eea670d3188ee38c7010348a271bbeb4cfb4b5f7e797619dbdca93bf12ca736030c6935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7d7afe148bdb9b20ca73d5f614aa9d1
SHA1c8d2bb1248e33dd0b994340442c3b004c1995a49
SHA256fbd5a18a0acc49db47569c10eda88675ee8ad99b378628fefa6bb2570e1e09e9
SHA5129e07f9482892df6fd2427d0e111a9f83034f3202f109be06fab25bd9e4a92d4f52bcba1203334985d7fb4ab81fc335aeb52c8c14ae1729ae019d731894bbf62a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5626b5c24ff9d894ab23276d3bfe6034c
SHA12dcdfabefb8ae4f07c021629f7532e512a7629a7
SHA256c6c1246bbe7c8decaa684f4a810d46d41b6087a8bdfc11d31077204f884ac322
SHA512ff0e4f03502c259fb272ce698eee60f7c05c56a26e14f42b3d1b7330193dd4475f108a62089fbe8bd739680cf361c0aedfeb3b0c9021276ec03456153eae0cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d130b31ca9d912d091a967d40224759c
SHA1ce9efb7fb7307c9a8a7ccf567fc4f642c174b950
SHA256d8babb4cb10f9b3d3cd45c4db18a1a2d3f51d8f3ca7be193300eddd496e9edd7
SHA512cf715e2a62ad6c077d3065b80665b82dcf2c15b2d8d72e5471e3db69601bb498dc67a2e8b1d7f23f74a0f91aa3275bc4ec898a7117ea5de80ded33781407dac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a84209c0de01c9dc81fd7d1efa66179
SHA14c78c59b80ab90913dbaa9462d1bee13d3aaf808
SHA256841f9821e482ea97252626ff121449faacfabb1874596793df418c732ce30800
SHA51229ba86b09f076212fea3d7d8216f3fec5ae3f60538dcbff0acea7ea43d8bf7a1ee479ee0138c034e687a73fe993664411c03410d3a5033915f80bdb4418f5c0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556cc6699c0a031245e440fc889588f08
SHA10d0a1b495689ab4e6950939aeaa36243d2da29da
SHA25666a5ffd55aff0e0c66992ca74cd949ae77915fa3b20e9458ec5fe12b36a74843
SHA512be6f394a5abb84a76fca1710e36fc8b23ac7f6a0c10e2c215d8aae31525b12a2489b2245f0a8c2250d7992365be7f63c9b6e54130d01164e2c5358f5cb16c8b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d050c92bb3bebf0fcd8527a14950be4
SHA1a3d11d6caf56265f70e57e9de2e7c4201530a702
SHA25624b98873552c2733738ae4cd78230a7c2a474ec02461710627e87f7904ac810e
SHA51293926e7e325aaa57adb5e0db0845ebb0a9aae958e088a17dad811be1b019ee3e6d5e0b6ff5fb76c7c290b60c22d09ddd9cf55d3d17d6c99ff2e035fbbb350201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3d2bef7c1c2958cade61211812bf49a
SHA1d68663b8cbd530a2c6d9811a77b46ce2e67c2203
SHA2563ddfa7c37aaff807e5caf3d098c73108d09d983e9e00e8e2eb593a68e01efb24
SHA512346c1a0cf487ddb66a0dac0e29280d178a8fcd48d3b0ed5ad036a7ff64e178379e7922647efa502c70d3ab56606638524f7bddfb49a50bf6cf46a32c065f41af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579dc4adede7c3c9298d60745bb047f71
SHA12ba766a685a1b031db3779375d892e7e18dabaff
SHA256f610e8ad59ab9f55a26919f8f389f52d81b7448d9763b7fff8f5c16173395764
SHA512054ac39117110cb03f84117e07ce031c3c49470b2e825911b6aee8632fea5fb1fc9c8198be862599c615b3bed879a839a7097cfe723c920c01a851f2cf09b883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5196a91563c0656182efc9c007a90d4b7
SHA127cd0ed787ba0b4995641c88adc4edd3e08ec5b4
SHA2565f9571dddd113129d38d886dbb982d3954ac095f4dbab7a8837e1a99deab981b
SHA51259cbb07d507e825dfcc50831c0ab5c77c6dba301c3c18afd2df0176cb2c2944bc1bdc61fcc0c6ee6f690c9bf461b9491197d7910eb6f9ed0e1647fdc2c58259c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f4b55025a636628dbc891942b366211
SHA1db1f40bd52e49d32102a9066991eb09fae1f08cb
SHA2563d94ee1418eb1a65d3f339524fcb4d30a72e60bf330e5cce996c27d1b98d2f78
SHA512fb7ed812f7ebe2ba3dc72f88ccbd1d9ea54e298053d6b730c4b8739782a4ec96faf1eadabe22bb75093f773410b98423f69c7623ced846634620f62ea6924ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e5676a75beaa235bbce0eed9fd95adc
SHA14222b7935b6b2e884857968bffe41e64d6c1520e
SHA25659ec5cf67bea0d1d224cbed60e54bbce979f1cb9be8b7b1e770f5fe15b337a54
SHA5122eeb8f6b108f104f6fd31d406183020ab0a75eba79c2361c513f1c61575d80753ae2e4f17b5d0c6c0079539409a98dec045fdec5512770e85dbff42eb950a572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554fd6ca87df7505330af7c3a365e213a
SHA1f4e83240e14a3406b7820e672f475b0cff58ced6
SHA256dd3344b00853a3eb0fab0a2d229129d174d31d442ebf4bc2fcb9d57da6182428
SHA512afa900188d6074ee6498a577480f4b47c609035d7b392f172a510d505f48266e9e76e23c1ab4f633984c4502e06d19488b396bec63516dc1b595abb8b1fbdcee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5777d7f5fd1a01c06d07cc644d09eb8da
SHA1a6d9d22a179d9124fb4657addc04bae847175025
SHA2567c5b71dd1373425225b5857d35ac158d04033c83263e624bb75c5c59188d0e9a
SHA51292c24a7d538dd39ede68a762453434fa2167d1257504d0f018118f53f18081e0f61b9551068a71ba5762f00e87d7390575e0a333a4e5dc40c652dcafc24d148f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530ca4ea270a709e2ca0f15f4a991cc81
SHA1585c1bd77194029bc2b7b33c6dc248eb4f94df25
SHA256ec6280580c8658a88158c9ae53729d10db11b4326fdaad332207f0a199aecba3
SHA51293ddfbf83397ff0d33cbbcd1d6c0a769d467ed198eaff09d8d6ecc1e32173bb634e05278e6e953890a778f3cbac1653283eb7f97a876483df2f2b1906abb00d1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b