Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:27
Static task
static1
Behavioral task
behavioral1
Sample
eac259a04fc34aae4d7cf7eb105da2b5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac259a04fc34aae4d7cf7eb105da2b5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac259a04fc34aae4d7cf7eb105da2b5_JaffaCakes118.html
-
Size
31KB
-
MD5
eac259a04fc34aae4d7cf7eb105da2b5
-
SHA1
471d8fa7ab4acad84c6ad7a949913c50e5558fc9
-
SHA256
3cecc6f830d7bed295d9bdc5fa112b22f365a300d4f32a2ee1558a35694d8ea8
-
SHA512
3b944b2fe495c81024160ed312d48c444577c820c638cc2c11942e1e13b31799325e7e4ff0befd2726671a703d73629a99612ae86a24fdcfcf40acb26736b25c
-
SSDEEP
768:z2Dfg4JFV1ZACcqa1MrOOLrY3ZFnAzNs8ytNT:z2Df7JFV1ZACcqa1MrOOLU3fnAatNT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90cc1f215d0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000004d9d044dfaba04981fe56e7b42ac861c864274779b2067be695930c64968dce2000000000e8000000002000020000000656801bbb95364ab106e591c81b71af65cf345fcc359084755fe2697de2a5706200000002c2734b8b0e17293e2139b1e9c4e556b77863e6e4c5d58abed5df8b78d0504ee400000006e4027c428dc4d341dc3f4859ddbb8dd1994735d419d01187b17e3db81d4ccf67e093ea5d5a1be1f6b9d32064f72f0de36da5b9f5db16187d14a19a5fb731dd8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889136" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A98D531-7650-11EF-8B3A-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 1472 IEXPLORE.EXE 1472 IEXPLORE.EXE 1472 IEXPLORE.EXE 1472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 1472 2328 iexplore.exe 31 PID 2328 wrote to memory of 1472 2328 iexplore.exe 31 PID 2328 wrote to memory of 1472 2328 iexplore.exe 31 PID 2328 wrote to memory of 1472 2328 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac259a04fc34aae4d7cf7eb105da2b5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5128baf0b86c1b052e968d39925914e2f
SHA17b4c2ce3ff72c78a24be5865abb4ea4ce443ced5
SHA256fe7f33cd2b1d44f9c95cc49abe32a18c2713cc733777bc86bb314f2dd4aad384
SHA51269ebcd25d39b9d4ba422a93a4f6917d4ce80c37205d10120dcc5b77ab8244fae06d1a468ccda87b26ddc1dfacc2fa98b81a11d7778718a51f84ee87ba295932e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4ca6ef8b1f00cd28056b55f32f48434
SHA13833e97c257fe68bc18f79ffb0c500d95bcdc4b0
SHA25655e0841d8babbcb359acce21dbfebf9ac61ec094dadc9e16037edc014fa71f07
SHA51228dea067a1e43d9f1b9237462b4aed51c57eb8601f9a3ec8aabcd7f60f0141cfada048d3392a7cbaa30e7072dd337cf66307d5bfc4f340ac771b78ee1a771739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad373d620fb33044aaeb83507f1bd655
SHA12a2a518c92bcdec7834ea2e150b8f699c9a89514
SHA2566dd764dc8d2ac085cc4b60b3cc7a9c0b2bbff02c4939ab8e7cd91e57e89f6a78
SHA512bb88b612d662747201f49b2894beae103b033cce4365aeae572ffe235035ab82ee80d02ad6f4690a35a2c0200eb042f16e908c2e6af8a8d133b0b59079c7cd0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5591c7a4bd8dfdc21b69068db5c549c
SHA1ddc6afc8660c7fc0456ab8f0f0e3d14f26afb741
SHA25672ce36c7c7efcc44832d6868f867fa0d6685ebf74968c8442347957fdce55fd9
SHA5121e9f92a4a26c9e031ed34c76878bf93fb6cbda872bec8485c49d99223df9f66099cd7a6ad4ebc1046736d59cd92cec26eaf4dc99af2dc80cb9aef2bf69686333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5211191372fdda4f08e3420f10aa388a2
SHA14788c151d21a46f840f9114bde5accdcf647cb85
SHA25691c988b429b14da615b59626c4637b7297336666df125752e9bb109b7a350adf
SHA512554b3825b3698ff9d475398cce6544e3032da4d64a2489c9a91b24b0024ee40cb43197743617f94b02bb874f182f9da965d75a690dd4e01a7d6b862b05487d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcd65abe7ddbc7dc44ab473282d987ac
SHA115098a5061a207690926b9920f5fd56eca271a74
SHA2566b43172906d9e60fd2f6928a2647dd7f7fbd92c14d5655d3336e4ca2545273bf
SHA512dbb1bdd0e6ace631dc660d6e6947c9e8014e8a4cd5833959506b9860622bf400a95dbb1d4038302d9057ef380108c9edfd5615e0b3f653a559cf0afcf042c81d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce459f7f2abdd193dd2b70835718bf6d
SHA1cb81d367fedae9b9b8236973c730f7f134f39bc3
SHA256db1b1d25d3d9898e3743c16b939bcba206481879b5b3d24d0825baf1d0864aa3
SHA5122cbe6040138c84d638bc197f397306d3cee0926c901e9fb5c4903fc98e3a1487c46ecad6f4947aee60c1a40a7f8ce4fb40a97a6b39a7390c510005655c0aa9de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527da0b19b13ce218c582edc7025f4a26
SHA17361764a4ce6abb1e103f6473d7501c60608b086
SHA256dd1c3135f98753eae6e3fe392d2df41a65cc09ca716032f14f744509c85ef711
SHA51264b55ac53a760f60a5f8f2afbf08ba9cee4839c64ba98bfe78ad88f9be476a69e2e8ed87414eeb14395df405eea507bb31b2abcfee214b5c446d0832b2ca3a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2f73bfda4da8180200bb70c62609337
SHA15b88f0613e21f1653c5f2df9b71f03d95fa384e6
SHA256b21b85c657d90aebc2d26d54d20ecae342aa55c22c2b5db2695e23f91c75a167
SHA512d4932b9fbd821340d29f16d91c4954e4c93bbe9d1037040ac7fbb7b77a32ca5d6a43edf79dd236ac0b0d7ad9a517c0c803a959cfc362c51d6de3100d33e9858c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5721d1b21d3269841a1cb11b3a376f977
SHA1be6d274268a28cc2f694e9c7e1b02f618afaa95c
SHA256376c0eb4095050321d85600d1c9954123a7b0162d4e0f0e23da0510cbb9838af
SHA5124466ccf0861030fb396044411fe3508c946bac860aa79cab5e005480058be8cb9743496ff8963481225614b5883e46e6244085a0a2f2bb0f715bc43eff6636a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae5d32419b7c0d82b01fb4e765ca8f8d
SHA1dcccb7d7852746cbbb2878be0d7e7da8cf2799ff
SHA25614454b2f42752e7e57c443177cfd85ef09faa6e58e3ebcb7cb54c8ee50a8c28b
SHA512332682da8228683cddf58ca6f43930370e09043df762506bc744aec2a334eeabbb47c87051f4ae254abb1644ba9d59e0d4dd7de224ad2396e72e46a16d46eefe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5366ddb3442088aef9c4f48d855a170c7
SHA14ca9fc709f7b25cdf6025485613661cc6f774504
SHA25666b7a5a995a38e7fd7cdbde47e0e1f555138a1b1ed9cef73abca4272fc91bab5
SHA51239219676f4ac5954076b9ad420d5e576ba88cac5543c9e0e7e315b04e69465007d0ce893fbba71a3523b8fd44212c98bbd8dba069d59636ec68c83350ff5e101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5397c1c928990cd1c22ee0f1a37ea9f79
SHA16544dbd6377083ab2e8fa4a4ecd8e0e124af12ae
SHA2563c6912e8e2614270e0b7d64b3aeb1eb523affa41892d152869392cbcb0c96665
SHA512ec3b09fe55960ea2beec76409c28560274cdce2d3b7c7e2e71f81075e07fdd6c36b1c6a597f49c48ac2df7481700964cc53aba4983bcee6539abaee36ac2bc58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6ffe1f14f3ce169c4c10b680f311bb7
SHA1bd289bb474531815090213609ba6ed262aa22441
SHA256bf5c3ca1b60291ab65efe67e862d86e274fb7decba74359f058479488a74a87f
SHA512feeef542a80d69f619fb28251cc13bf2f92c3f5e40f55f540dc359818948fcf4340265f27699966ed6343de7d946d65798cea2f10c96719c6b61061588ee266a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f676653f3f1b211a84d56d7df63c65a
SHA10c15ee2e1c65084c0fada0dceaa4319adffe7f61
SHA256d630c869eb78e4093c1d9f6a4545d9bcba9a449357f89d91b9357560b881d28c
SHA5126cbb722378c5f1166f021bfad8fb2b266758b83d6ab8f934f0fe9dcddaba772827d6b4c4fbed57cadd30e6c3ebd26e1367effb2ed18b231df870ae90efbfa748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a34c58e4133365d3a686dd8c2bbbefd
SHA17e8286f644448159dca64a6d90ae412c2546b84b
SHA256c636bc3e84874a52e6edffc14af7c1e7c99ef90d6840fda0c2adad29117756f3
SHA51275418e4f670ec7aac00f1a1c117864891972ec00188dccace61cddd7402cb6552c65e832419feac99352378b71f36dcddce6ef3194fdcf3dddccaf9e360caa56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df8df616c58c5aa7f2896cecf26e717c
SHA196c1e55d1f9b7ce656af4f8efe974bca7ba65df1
SHA2563b2ecf4fafc51119ac3260014d740474c430bf841beca72f5c6ce20618f7ec18
SHA51243bdcdfbc0f674ecb64e80e7074ff3de8fdd9a2257ef89e7f4d89e696dbf9760735ece30880887eaf87d6898a70012feb66635dd9b334b6fb75b75831a8044be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5286e8fc5e245f80863c3189e4f08a2dd
SHA1d85e80ec0c253b5ba6fae103c63dc9fa2eae40cd
SHA256961d48bc81bf7319e6a46435638bf438b1658522037357d734e8039ccfc6b170
SHA512f27b4b25fafc8b22fa85a8f1a98a2f4ce16d9e1c43cb115491b0aa6f88b744fbeb6240b3d92e0ca4874b757f28e16a8aa5122debad75d719bf2cc9d786d05911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edbd8f1dc746dc5519535afe2d64755c
SHA1676c04e0ef8d62518652161b709cdd3f5305ecbd
SHA256d88ca3be1c72da8312b21cd94b368b1e5b55a0a42bc640e4c157aee73fc3bf44
SHA512e63f024b4cf316aa08ce84ef6eb2b2a6e9dff2874afbedf9fd53add6318adedbda5a70b53d2b766143965bd978676ee143f58b5d35645558cb4655ea0fd01389
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1LNUKNV0\show[1].js
Filesize686B
MD566356b4b9464e02a05c7f92c682cce02
SHA1fe2db8c863bdb4b14b4561063d390f84ab780245
SHA256cb651d49727b72f43b47bd846a04861548f42f2e8ad59c7535c5e1ba326d3d6c
SHA512cfce631a94bcc0559ce391a4ea66b04b0452b16db149d4738ee5e35f2a668b77744846d043b29a5b0ffe47a610699537c70f4cfcb5b7fbbf2dc2148adfad24e5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b