Analysis
-
max time kernel
68s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 12:56
Static task
static1
Behavioral task
behavioral1
Sample
fc58e9088e2f4bba2ec2e5c5e0894923_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fc58e9088e2f4bba2ec2e5c5e0894923_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc58e9088e2f4bba2ec2e5c5e0894923_JaffaCakes118.html
-
Size
53KB
-
MD5
fc58e9088e2f4bba2ec2e5c5e0894923
-
SHA1
97e6a32ec95e0e058b13df8c88b86002769eeb46
-
SHA256
9070315c23a64eb9002140d2dd5febc4de5fc0e9bed389cd50b40c469d4d77fd
-
SHA512
5a876dabe8bca97575c503ef014cbd615fbdbb55bb36b5884642881f2b610a4514101d8b2671f6295307c039caffb5868cd1c05a16ecf7eefac6609425b7f86c
-
SSDEEP
1536:CkgUiIakTqGivi+PyUQrunlY763Nj+q5VyvR0w2AzTICbbQo0/t9M/dNwIUTDmDx:CkgUiIakTqGivi+PyUQrunlY763Nj+qq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e089f7e6a511db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433690052" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{112B2821-7D99-11EF-873B-E28DDE128E91} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000009ee6246f1de476a1f48440e6d80068e74008b660a30b9f519b1cfd772b640106000000000e80000000020000200000002d74f6b0af3989b6b11df4846e34b3ddbce824d600331cb1330c53ad11a1f9bc20000000e8663e7dbdae5d8a7e0370b2c6109d3e2c167a6cc077344919f04735d1c229214000000086034ac3ac0b4531d365a7327347bdfa2907ce3badfc1292e01879f6620b9cb07b6e405d8fd837b0f012a3bb3f186dd426c1c46a39ef09d61abdeed117f0fe4e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1276 2300 iexplore.exe 29 PID 2300 wrote to memory of 1276 2300 iexplore.exe 29 PID 2300 wrote to memory of 1276 2300 iexplore.exe 29 PID 2300 wrote to memory of 1276 2300 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc58e9088e2f4bba2ec2e5c5e0894923_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ca9224d974745bfbf398809accc7673
SHA195ded40eeefddbc62ed56713363536f47a2baef2
SHA256780f2629c2802ee90cf85c968835e7060b08723c4801175d29bc47cafe73e918
SHA512d59a38a543cdded0a25ff18fcf609ecb8cd0611e8b0042e39a70d272552c5df4287afd5f2ee83fd5c9d8dbc41c85049730bf3a2f149105ac36c95215bc3ae934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564ae37e384bdddb928ce525b9cc35a00
SHA16a6ab78337feb38ca013fcac29191df1de228d9c
SHA256ff9e3f291a79a83b0ef7de8bd3573ac1f573a7d0cee47fc0720e902b52810b3f
SHA5127167b124b2a52832b2871028f0812366f4dfb702bb3cce664059664be1fe55fd9a66cbe50aaca0676af88ac117cce91340e743d3e3f821240f4531a0a32aaac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c155689b0fccfb174e19d62ae1e1975c
SHA177112f934ce799792d9dbf654321e5a935f270d1
SHA25638dc4212f5b77f0400433368f19cb3411ca152de2ecd994ff0314f59e0e1c379
SHA512a21d3b0bf3114b9afe5b97d0a6d3449975af2a62d889f12f72a55743c77fb5c7f77b43306375d3f41655b5621461b327e1edf9fab9c3dc8bb97f26aa607a7725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597de8b68d49d09bb28f99468d7e47ac9
SHA195385b7c440f7b06322312f354713353d4abf5f7
SHA25645ac4e361a6b983dc8db9404a25c229d6405330163c8c744cf8fd18cabd37839
SHA512fd49f2939cff0416ffbf675ed672c4e6ec8fe2d3648e7635b51ffec3c97a68924355b32f326f4ee0c5ea8dfcc2473d750dce2e059f5fe0e09fc9893ec45b1453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cb26e41a5ae58343aa88aa584fd3a60
SHA12a69a88155aca728f84b0f2cdc63fdd3f4f7fc4c
SHA25615a5bc1435ef8d304413ba631c10ee5d451b9029e03f6fc7d9d656d723a4dcf3
SHA512e58f4a07b435dd9c6d433a4c1da9320b9bfaf2e168edfb0c544875d40af83e4b4dbee8cff677253cb9e651e70ffaf9c832e8f013588960ea70b14be37a677626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7aa0298a20795cb767f21fd76d8395a
SHA123547d578f7deba888e62d00f6e5e3ab86a2dc16
SHA2560885802c9ffbf6509c8f0c5e24388eef4976aa30008e75998b825da3141cdc57
SHA512b484f56345f8b5501c22588339a13a636828e9db0c002d271b2c118c820610112dfcbc5996482fe2d131b979bc2598f0dbbdfad4060948f3598a4279512db986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0191e992aefa4cfc7ed58e3351db295
SHA11f2b7a67c022c10c0216fe87f3f4b2eb32293efb
SHA256cb33f0264331ea559809f01f3b73371de00e3b084a0ec912454eedb167faa34f
SHA512db7da2cce2d6cd073cce629a4f342b54c0d7c9ec1b60ae96504b0e3153ee689bc69a7a36d71a24c020b089266cc218f537f4d7f8d9994fc966789f450fce9b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57362400fade11e8ca27e404862dfa0c4
SHA1f1069d0552556fa11a9957b4b5f5c2da0b85199c
SHA2561b8ad22fd48f6f5a9dd9e2c974088e1326360bbb04fb24b0c9fc66850ecda0fe
SHA512d3eb9bb0b6c0985f76b965d1044e161e1b4aafdd4b7e96f732fb5ed332aecda566c804e25a23e3fe259cd6b748aa049348ff62469a10b650e122debb6e57d5b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe601c0f50af055520f59ecb5551088b
SHA1fc34f980c43cd3b81bf0b270015b812dd4865569
SHA256654e2a89c9a153c8daaa630fdbbb4b9a7c869ab39417d2e5c61fd7656e7f2f94
SHA512920647972619dc9a134f38a548d64cd124567406be64fba3de89b55d02e05bc3565a0e2039c677ce59358c85526f0b8ec486f540653cc1e4af71cdd39bcfffd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57209a681287bd9b5c85936c059334497
SHA13fd44953aea184c266dbc8b657b03ed415b0f0e7
SHA256a09e5b6fac8146e8e3952c2b363c001f5619266e1bbbe41384873ba38ed782eb
SHA512247af33f3f3c1e8f460659c95082e1fbf8592a4c4e3d443d0875128eec1591586da5f51364fefe8bd3e4285c4f0eeff23c5602e1a29ddf6ae8386803d979492a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9c899c8d4779d4e9d470da9c5b0a6ac
SHA11f3ed8f451504957ccf3959473b0c3fe8cb3f3ca
SHA25649fa0980dfc3cfdd24a140fe08aa98feadef55b50e75e40a84a252e0c574c0dd
SHA512d8ad626111e3bb9499d03c70e1b094c60302cbfdd8eace3195b2ee010a333912923797870e34a88332046bf0495e4291df4d7eb9f002365eeca84bd838e87928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8fc87eeedad6579d917744bae44aa5b
SHA19dbf9df55d40504f72376519a862cb0065117696
SHA2566292f7eb198ec267d855d663ccf0a1d16ddea4647a7021626f2af02500e896b6
SHA5124c971124e450f3ef182139d963401afb5fb7201fc2d4af8ddeaf693eecde24564e3f24250948070070d05224e6a949e6b1b736d47a27b09304a4f5fec7ab8033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b71a8e768290b027ad4adb19d9398807
SHA111e681478290d27bf8c7c966b08a6d50a9082618
SHA256a7a14797722dd800205e889968716f904817ca97822882e89f66e9b910bc54b7
SHA5124a365e9d4f127832700b2ca675a884072bea19bd96d04a901c5f4d28c95da03948295cfd1437166a4c764fdcc335d5cb7e3f5ef96ed10e01f1acbcc8c9e30619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbfb2efe1adcd0c25b8865f48990a043
SHA1c5069a7ef72612db31bc6f38876be310989ceb33
SHA2567b49a35eea2bfd48710bee4968e2ad4f80855a95ba1541df5110e5640eb0ba3e
SHA5124270899b95452a1eb36f7ec0b1cc1a7381a4b79891e64eb4ca80d279c3fc09702051f8ddec0685f7bd86ad8d00439a166dfa4a7bf7acd7da8d1f66ff14d67e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c467aaf2311e5449530ebc85ad9d06e
SHA1429ed71cb3180d7bf01e78464bc0b90b4b81807f
SHA256052b6dda084fe9e5107ec74125c75c42f8e2d99e54e1b5ac6c9d0e4fe9f733c6
SHA51282d0027a71cf16cc7b7bc45b55e17bd4ac15d06c1f8aea5b4640168b2c50f7f5a686500093908715edc628da5ef4d25b18e07c1be34c7f4f8338b247c5008ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503b1c56e6797687dc2e507f9dab40a26
SHA161653ea477e8c91f8a02d4ce2f7e6e529611da15
SHA256c8fa221cef6646c16966e6c834ebed28ae86e84229dd3d4339223c91c9f30cf9
SHA512ffde619351d0d90acdd1b648831681db25c14eb08b5f090c781cd3da672f5df441fe5b6e9725fe120abf0075ad0621f581e158f4601af405760c9024dca259d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56df2816ec95124703c5a8fa3b36d76f2
SHA102f76fa8f027c22fb8126a886bb93d28afc726b5
SHA2563700970a45b2f8c59a97c9c62a9b1f3be250084930cc071a6ea174bcb6a32392
SHA51291cae28efce7bd519514e0a8a29f088949324175c8017eebb4273be6a7a14f6bcb1850a08bb39f82a68caf69677fdb0b0a01293266ac44536b3adca943ec1da3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522fbb564da6cee59636f233fde9e2d55
SHA18685365ffd9202aff0090949527ebe2e581e0582
SHA2567ab92f7a4e79c01a69e1e61b2599ff0d68d89489c67defbdeab22fd4005ba934
SHA51259ef2de34c1f5999605c8ce93653c9f32ba0ee3fccbaeae6052024fab4d62ff4dd09a6cba5fe1d6c1b5ca3d38ceb510bf38a67f2c3ca1380b0b51ecb1eeccdff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fccd0cc4174b0b658f534068355f3e8
SHA151e710c0a630297e7ffb9cf8aaf2c2a2b827875b
SHA2560e16f1913913566e4336c30e1bf75d759dfa6be203e31d7db8c7bdc3c40300c4
SHA512fa4770679a3892a949bfad2277f3074fb70d8db59e4f2d6d2d4c4641b1270d37794bbf5fea92d15d35218de167ec5e725b42a95266bf6bb96da7ff1ef785f008
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b