Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 22:40
Static task
static1
Behavioral task
behavioral1
Sample
f0c11a7daa3a4cd711d03c5a4cb87070_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0c11a7daa3a4cd711d03c5a4cb87070_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0c11a7daa3a4cd711d03c5a4cb87070_JaffaCakes118.html
-
Size
4KB
-
MD5
f0c11a7daa3a4cd711d03c5a4cb87070
-
SHA1
d1bd506096e036bfc4c3cbc89ff32c5f579174dd
-
SHA256
24666f34766902ef8c636d458e96cc65c8d488e712ab55b87fabe8a2982f4fe4
-
SHA512
130345ded9d3eb49e21d53ae8117bf8a3043a4b8bfba3835ee1f29c840360adc1a82770b6e5722314e4449603798760bcc57492b8406f981ae025ab6bf14de74
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oWYC6rEd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433120291" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D1FA0D1-786A-11EF-B462-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000aa1fe3387c5b33453d3eb3ec4f8cedd84ae714dc58a8f66e0919e93be5d75e1c000000000e8000000002000020000000c4f63c1ce9ae21ff104eba5476abe58ad9bc8f27b8c82a3f0778ee817533a02a20000000da0d05bfe9e017922d26d095247e51e3cdf0dee98c914b88def066338557c8bb400000002ea655db34b5f7894af9f9f09eb1edd457e8c4823407a36073ea7b88b26211dba9a0aee68a2d4cedc15e98d5cd52d2253c569002639fc5518a393654cec5fb9f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80749a51770cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1968 iexplore.exe 1968 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2148 1968 iexplore.exe 30 PID 1968 wrote to memory of 2148 1968 iexplore.exe 30 PID 1968 wrote to memory of 2148 1968 iexplore.exe 30 PID 1968 wrote to memory of 2148 1968 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f0c11a7daa3a4cd711d03c5a4cb87070_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d767a00068d1b5eb895c3c4db2fd7f5
SHA182de0c4309bdaf31ecacdddb3283a2d1e8a8dc16
SHA25607020d2437fae20c2e32195ab205edccc236b41de523083494f5ecf8b7922dd2
SHA512d4c73c2683ceeb72a325e0db5524d91a466d6703bdfa27f5f2cdde3f8ed8e95dab02137819377aafab4bf1f848fa84693dffcfa466d8e51e0355860469eb9362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef29c833bcf84e7593e5aa619fcbd5a5
SHA1a7565770d423cecf10e728645710f2cd1bd09ae2
SHA256c3422050e97050544e2a498ed9df36fe598284e4409df6588aeed4fa850428b1
SHA51233b0439e54dfd7865d880f20acbc1d509684f92b3d26f9121868ccf1ffeb34267bb4b52d26a789cd2aa66b77175fe35693907087b5071c6e9bdbc4263c1b874d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aedc12e50319243a6226c890c909d5c
SHA1ed10794762f7ffdd74e91ce0f0a3a6cc559347e7
SHA2565a42c6536d7806e3f8c3c639915ead29b0e14c5d19a31ce6588ce466d5c5e901
SHA5127d22158ec2fcc38b3e1a369beb933845990c386aaa19736a36345e777eb64757f2e804ba5d486a62cab4c775c47e9029a7cd16d2e6edf4cb5493c032a719ef81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d57a5971569ef1e90f6e9b7aa3c1ce
SHA161c6eaf9a1f0f58e8c70ee94f63778eef1f8e92b
SHA25638ea1f95a83a86c73f87a55dfda6548b2eca3294cd4488db67aef57a3960e273
SHA512522155a5b47b62c5b9e5ee7aade290eed6505be7fa2e487548c5de07642c1afd03699d01e5e2a446137f95ecdf33513863961908652d13b73cded003a1080fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b957697005d97e5170fe5cdc87eb48b
SHA1ed35141d6baf9c16bee5a3825961a47c8042cbb5
SHA256f17d6d3e5bed4d06f0b2d48a09b4a7c3d8993243d7cec5dab7f101d83c42954a
SHA51289930136016c8059624c6243fafbedcaef2fd3c8f65ec97cfe062e7cfe6bc22daf2a901004ad71fc821c577575b15b98042fc8169be912b9eadc955e6b1e0ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0cfa17480d7b60d42bb35ea11fe0652
SHA14a639c7d03b5668dd8066c0852c5addacd37d5d5
SHA2568af5ad04f6fa4a2485fc2913b56fe6e41dc208d058f7fc4e5f35544d7e957047
SHA512a1092163b7e99fbbc0663f1c391fc9ffe2164d63ae9a4739ec16644a5d36709601daaa8b064293b25df9963a1fa1d3f9a6e0ba303efaf0cdb1f709e5b396dbe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d0b096be2dc5e3976aa83839fd433bb
SHA13b836853030bbf433c363b5257ac282186653ccc
SHA25650ca7cd0329098fa0e2720b93b497bf06fdc3e3a04dec056201033c6914998a1
SHA5121c4504970b3d2add56a9500dc70ae1c18a4a728bf15f282e05598f29b58a81e21ab4fb3a5568b2b755f05856af6cd18cdb2ba7855ea75576d506f4b4ee7375b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581a6e965fcb8927872c23a9efd11a590
SHA19e6872160398bfc29cffe85ca534e2fe1de1f8a7
SHA2560a9cb468da0e51c64bbf34426f747369193209c8b316a53acba9d6cf5adbbfdc
SHA512a047798c2d8c7ad0651dcf1d54fcb8bc6ec3aaecb9eaf7d9d61d3a827792ba943d643b96ff82cbf74a65c0be79ede8dc37fa44afc06ff70bd4730a597da66ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5968b22e97224e28ac70cdb6b4ff58f48
SHA1dfec63e6133492b1dfda39ed62993e3c0db7110f
SHA256d654a98626b12c48f2583eff936e9ca6b06fc89b7709384adb890a70f84276f6
SHA512587d08799d6562a02c526fa64dbf19dbe687c56550e9811bd541a89df7e556cbed8ae158cea1b8816f435b22a93fa40c38ada255aef31efa4366ad991fb6af03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537a3d9b40a1eecdc97d1b39e31b5c1e6
SHA142e313f62178292992be518fad8449a00b6f00ad
SHA256b511460a8814461ef0031ef363c25384be2375d38658ae7f50ea1281413c7e37
SHA512e0947ec15efe266b42b7ac544a95cbb147a547bdbf4266ea6bdb786af4459c34ceb32d7bb620efa7cb1541ba4ee0bf8225bc86eb3c66ced9f1a2641ae5aeb9a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8662b6efd6959ad0765a1f4b2631839
SHA19f88fcacc33bde668e8cd2f4c03e84b9575d0457
SHA256ec71108529967d6dc7a2a46748dc0b83206b5b5b138addb700801871a20811f5
SHA51267ad5415382c58d45ac9cb635fe37120aa14473609e63643d997ed5d018c22bb2a6cd7a085143a2838497bde14e03bc594d29d4a9b6c70fcc56652f7fe60879c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55badcfd7907971b14e280383b3d528df
SHA19eaee50f7aa962d6110d8821a90667793f4ee9a1
SHA2564d7c5b40ffdc4d32e873cf14e66aee4c9d2491c5e900db46e4ccb5e54ffa3c93
SHA51212ccc3710cda29a73a99e7b509abd726ffbf7cde21b66dbf34e7d898910b1c9550c3383441e15e0029d6294fcafa22a391fd334824c89a3c261521b0ad011a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506ccb40c29cf91279bc659165cebfbda
SHA1b64e21e521974cd24e4fc22c18c7237d81138ef0
SHA256fca479682ceea59d176095aac872356e6ba34edb0874803533e7c3a44bebc1b5
SHA51288b614b9c1805afa19bfb87d3ff69013323ab7e7e2e1bdb23c2678f5b2aa2b08f6eb92d9b3764027eb5e2e0af0aed55375d928b45ac6550194c444c66f06ebc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa68cf89ad8be886e3c94ba2f1811795
SHA1ebcda4cdebb0122f4b1efac2587fb12a36a77ef6
SHA256f7061e72e23fb162ed59426dd93a35af445d75c2d51e097636502797969a4398
SHA5125e9dd62eb9b55a48936ea953c0d678b104a802efdd2b42ae66d2c3bd40adcd60f045e4e94b9262f5cd2dee7942de8aeed973d17956c6c30791a0425ba9343095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522d85f1032663d896ab3de52617f94e2
SHA1d8787d081322f3eec58736d61ef56a95b15deeac
SHA25695cf8393063b7cac9a63c0c9d676f1dbc78509bd74667c62bb0d01cb9eb61caa
SHA512dfa76c7a68d41fa7704d67239a6dffb0867ea5f6a7595d720f4e7a3d4d0fdd1061a2373938aec3e698bc64666ae787b546ce6bf8b7b3f8d4659e3b72f0590fc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae75d004da3dc458c60f38bbe7913daa
SHA19fc3edf4662b58c9acad35137203afb7f809c7f6
SHA256a19ea00ec4e3882ba6670c921d171e34eafc82ca67cc4222027c3e43ed360afd
SHA512f5a793a4d0fcbd225e05d0476a945ccf7e1d7100e658f9647664d4e35cd9413f8eb00b2e4d2a4a6ccb46cbf9bc221b4a0208e98b7f0e772e44e6440ab2c0e16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58db103817ba2040c90db839bc08fbce5
SHA1233d3eec3568d15c6bbfebe97d56df8da032c21e
SHA2563981457ac5259e49e1235f3300db5578d89e50be5e005fcb66b34f5a3f33835d
SHA512b4b9ebc72ae5afe0b07c84878efe6f90ecd0e6482ca75c0c3fed8a80793c20e2e1778f1a56efac0b635c86cd82d0688ff1879d4c5bc7324a38408eeb59134664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e744b42ac899fd49df0fe98829a791
SHA1c6a64c25798d240fdd54c062884b48965e167e4a
SHA25650b5510cffdb11551ecc93d4057fb6f9cffbba7c5d9ba34eff8796bf61df5466
SHA51238d20c8275285d00470dddc5e53362e3f3095488825cf621419d212670dcb1b47c1b15e60518f76e7e202de295b1cb5155d653d1c191406570cf8f53226ba976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b1c2ae5b31db8de84ad6f49f0d25a91
SHA175d7bb0900eae0d7655111df0397461f6ff95bc6
SHA256109b736e3ecd4dabc46bed87ade37c77429638baa7a615438186f9c2a3f8b2d6
SHA512428b3eef4b1a4ab750fa73da666430bea73de53eedf113d07764bb41aefcbddaf78c64a14951b648ba222b94c3faa1377770e817ad0624b0be344e6040709a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5101b468f060a02844a81e859688fa388
SHA12be485ba8421e74a59f840664b8dd01d800524e7
SHA256df2b4fd2c0fd40c7197c43ac755b12d1f1b88366558e0c4f3df578647d3976a2
SHA512334191f0ea17061daf226621cde97e1af5d2cc3d2e0f999db81acbabbb13b2b4351afc5adba0b0342a0bf1545570dfeac62b2d1d947b53d336a71cc87dcfd692
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b