Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
f4ed0e1fc1ae20cad6cea7a8b54f9a75_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4ed0e1fc1ae20cad6cea7a8b54f9a75_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f4ed0e1fc1ae20cad6cea7a8b54f9a75_JaffaCakes118.html
-
Size
69KB
-
MD5
f4ed0e1fc1ae20cad6cea7a8b54f9a75
-
SHA1
738b7727f2e917c7ef484f18fda2777754ca4e10
-
SHA256
1fb93cabbcf25b18539bb6c8cfed5ed719a4596e99ece5bcc6804e6003451517
-
SHA512
ecfb7520adc05feec2ba5ab1fde722d597344935c86eae88678e0a56c0e0550ef75390404dd19c535c700d41b9c99bd1da72710677366e0aa81f1595cd73f5a3
-
SSDEEP
768:Ji3gcMWR3sI2PDDnd0g6jQYFhu2wKoTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQS:JTNTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433391468" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05462b4ee0edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DFD22C11-7AE1-11EF-9527-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000004a5a97108f841ff67d282b23b1a721d3cf08bd6ae3d2c4ff958cd7be50c65191000000000e80000000020000200000006e46efbb7a52d7d1e96f855d986eb7eb0c9e0036cefd290317c5ec57a980d1dd20000000c17442fabcd49f93dff91affb05f8cfdda9fc610591e8eee4d71dd487ab9f67b40000000610220c7da87d9432cc34360346f74a84a184fd5b72058c1e70ff6771434e64fafaf7d0b44e0f83c863e65f3e075f89004770bc3fac847d40e046fc54c7c564c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2936 2648 iexplore.exe 30 PID 2648 wrote to memory of 2936 2648 iexplore.exe 30 PID 2648 wrote to memory of 2936 2648 iexplore.exe 30 PID 2648 wrote to memory of 2936 2648 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f4ed0e1fc1ae20cad6cea7a8b54f9a75_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53761edd65ab36fe1e189a609335268b0
SHA139ef3775f0b78201c995250c3c8c1e3d0af1b799
SHA256bad525ada93cb4f7f693fd59669e2b8a7e208103657679d7042a5474125a6de1
SHA512f93b0c429eebeb834f157ce7565fb388a521b61a241ee5c46a66de610bde73bb1a7b9ca63ad595e5fd99b482777108ffaa2a6e4134131c93b258989102b4d784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570ae20c381619c2d419a8ce61a2519eb
SHA1d374fb92dd2a5dc784c984955b02e40720ca3049
SHA25672c1513d63c8bc1f00d2801cdedb88c03f7c8c93ec5f026ccf69040de30f2dcf
SHA51200db6a18a67858364913fb2da05f7f4dacb29999df922120ff1904d9b036c61448c293a92ef4e8248dc655fd6339cc4251ed3b82dad9c9a6273856f994540ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5fad59c289a1ad3dc7688b1cf3ce035
SHA1e86cc85e5c523f43d107539bc3a257fe248cc724
SHA2563c1c3746df5eddfbc57dcc440519d5b0a48da88d54df47e61d179a213875e215
SHA51287aa23d84de2e2372dd323825d9b532c0126bd604baeacf68bf89015d72c02c4ced124e8e016f508b1c2e37d200750044267baa1a11ebb8ec6a6a1c2f5bceb02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce199ddb6eaea28078d2fe9ba338eef1
SHA13f6203660848dee9d6ec448c986aa9e6343ac157
SHA25606a7966b2b71213ed168d6a9f47408c06f0cf1eb0dab246da28ca90f99ac94bc
SHA5129804446e7b631e2fabdc1e64238d8bbb871dfc6a9efa8615b87fecb525f25a6b77d83c65898ef5ceeb25c09177d37cba3a74f71f5e9d5bff20548e5f515530a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b0c3e1dcbd694a1073243db490b30b1
SHA192421eaaa836b30a4c7407ff645c8410357a29b4
SHA256afacdaf9e7d160aaf2396320f1c4fced7067955921f9382a0c2990ada3e29b5d
SHA51211d192ee793341e047b68995a9fb3589c68fa61dacd40924ed7534b49525c84c456253d97e7359a4382ecd84fb5b1d5b014eecb8df9d1500da2b02dc00a73455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f80325e7d6a7eacb273345593b547d2
SHA1b06e4a0313b74074b39e3ffa1d8eed7722001384
SHA256a1fc90ab20c462c19de8f87ef366956c92a1bbdbb502a6ecd00b508a6e5ef88b
SHA5121f27c64470e6be045df9103f55995a1424e5bcd84afddc3c6f073880efa244f9c8fcd68cbe80952db5396b95bf4b280731d8c5a1dcf8a34816c7ffde3d00010b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52311d07e6d852b44cf00a755cb9529b0
SHA116901b2e97aca0e641d3e18cab52aa9a51a0f238
SHA2568f6d6a38132b8bf610c2415022ccf97a65e2c651fc8ae8468627a25ca9e87ea5
SHA5123e08e3d933fcc9d4db80b0a4930e6afc30edb8e3591f5066167f2c78f590f051cbb084bb028ea2f2288b7d2a8139bf330abb41d52184d90791139f4c73e043e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f2f065a4d04a9842363a8db6e0596d1
SHA1ff6d756a183081e017ee8cbcb511b53b0a9c0177
SHA256b0df8b41194781d5774e0021dd8b12c568af9e7af3601bfcd0b09784ae3bd0fa
SHA51228464d35c8f275792a3f24ca8d7774e6f951ed87bb3059003e47964c7b1575db995559bc03d938ae7e1395eebf4442dc536dc249aa2220c669fcd43b73cfd4bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590d97eedd9947c62a805465ff65e4b99
SHA16e386360c591de42f8469ff82081b848accbda48
SHA256efd80d3cd3648161de146fe7b617c238f2fb92c1daecb9c72db4d60d9eafa856
SHA512909b46fefa871dc030a9a63c683dde5f2246ce0f914de69a257f4b58164abf1d22a8d1a91445c0f52d6479ec77db586f07ddfe8832f91bb8ffa5d67605fa1b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597d1c1ea10865a6f3e5b6beff487ff45
SHA1535ba576212c3ae5455a4241fe8b51f51e811744
SHA25697671e6e0fed3228d35f927202b449eea77ce161b6d2e14e36f390bfb2c62a60
SHA512ed860ab08fd7dd6821bd50639941231c9acc6ae14e96653e126f72d554256a6aec43c472b767d34a9bbe86928fc2e103264fbcfd834f673afb7d0d04bad764a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb190cedd70acbb38ba6413a7e3be803
SHA1f77d07b4c41dc86f32e92a1f879cbce2fa376079
SHA2567f56b01530407c3e3afab9541a59f4dcd279957730f59eeaa30a797165f84f01
SHA512fb66f6f255295231928eca6872be6f9155fbc23354e2274baeec8a161f620890fedc76ba860a98a26037acd6aafaa08734ca0d0a94d95cf8df256f9c6b10eae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537ac3b49a4426de71d21d3da3e8bf934
SHA1f12641030b7d4b8f60195171c6f855588804a3e0
SHA2561b30ffa51eed33aecd3c2f38cf4d251950eed69f3d0cc36ee43380aa13643f81
SHA51214b96962a12639521c02e249eaac6f43192e43297b3900b5e239c0bc001454c9effa3b7c9689c31c01b58e8c00a69964fbeb5b2dc221ed2d8beacd9d3b3b3309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5953f441ea2cb6a34fca40371937f35
SHA1910768b972133aa1eae72fedec4e9d910e70ab0f
SHA256e7f57d6394bef95091fd15bf396dc998bf9b34564f40ad37b19ee2aec4ffac8e
SHA5128108d7b8b42a825cc30e1b69452c08c31a38c76c33ce68601a63a43c32493d8b84a4e294bfc858046c4535d4b0fdc37d1ce09d7b4e29172a9c644881d789446c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537c08048a0e7371af7ef6f7b224b93af
SHA1007a00ba9a7e2c2c80036ed672f8be2569d512f5
SHA256b6b0792c7de4d1ef31c867c8db7ce2d682cfa2c4148f88029dfcf048046cc96a
SHA51295f9398094485cda9f2f6bb177845e2ac410b54985e715d27aa4e642e9f8353242bbd4339978ecc98aca5fae631682714e9c5eb471ef4b1a3c497c421d4fb7fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509bef395c4af1296ba0a2b728269aacf
SHA146141596168864a5cc939a0589fb98727c7f333d
SHA25642a5b5f6000ac5948d348bf2f94d5f339b549b3231415b29136f36741f441fa4
SHA5129e22401b33cb09661420688b978d9434261bbb80445c4d2b63cdb02e0260e420885d71edbd6d5d8b4b4d20fbd0ce4a7a7378b33911002fea9e3c770271449374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b995f967f2fa68d450e5ce31940509d0
SHA18c4b94ec8960231b6fc4a9a8e4d185d8f82763bc
SHA256cfff2f2d62c1141fd06ff4c799f286a98b20c620b42c5cd45119d34e62bbfdef
SHA5125a66bc6015e74333ae5d5bdf820790878634d93b63e1ac00d418c120154cc349ba5ba698edd1f4028b02c54d993ff6bc24de2bb408d82a4946e3f9bb06dd9231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb95c47503dfecc3c9cf13a42f7dff2c
SHA17370826ce983d5f6d5e5def9056bc178df2e0ae6
SHA25614a0486620850854b6faa429ad06f84c918c98224a2ed5fcaa3cf03043f4c176
SHA512303f5ce9c07cd6881a168192da759224fe8b75bf2581878306d223d42bfb80642931b38846c8f744c167e0cfd7beebca5a59ad585a621d0ad2fe12a3b0f4dff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d09a58bb47828c34c552795e5f913579
SHA16916181ad32bb8ead349de921da9b68d63a04fd4
SHA256eded5d013076acfc80df1867e6d53649431bb3062b41535ed6e3f26b04ae54ec
SHA51278eed4232b3807f4cb0219b2bf152d77dc53f5f1bff3e89ce0905daf18ad5a849110afac3a6104374668af4eae1fb264c29a263d5d72b36b91e963ec4cc39daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4ad48c5275c2956d6d27bd51e0f749d
SHA1239dd535b6acacd68cec7dcf569cdf16df325a9a
SHA2569def9ef81b6d0ac82516b7ec64f4c0adf331e6dea75347c48b148885eceb89ea
SHA5120eab24ce8bcbff014902e4aa7690090fcc921908dbcc3c2e981dcff4a3e35e631351cf0808ae7ac29daba1d7b77ecb1dabf7c304903f192234c9afdf41913361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdd992c22b9d0a11fbf5bbc5c7e1ff94
SHA1047b41bf09e44730e73d36b7ec26a8634e1d1aa7
SHA25629cbf5d37a7165bb250d7f6c52cd677c805b42a52ac705a15003f41aee74f172
SHA5122683f7b07c2a3aed2ce2afb3eb27cbf1e4ea7e9d5feff50b05788cd3170fb37c872d6d0b564a335b4ac0345262e6f5f36204f2e2aea1c1681483d1bf12c74489
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b