Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
ff98fb146e7b4d663e0fd2fa10dd704b_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ff98fb146e7b4d663e0fd2fa10dd704b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff98fb146e7b4d663e0fd2fa10dd704b_JaffaCakes118.html
-
Size
4KB
-
MD5
ff98fb146e7b4d663e0fd2fa10dd704b
-
SHA1
bfbfa4c1a9803ed40e43b0ddd381c10f98a15987
-
SHA256
3d23348cfa550df64bbfb12cf315574b4c4e4b1edac9d60adaaf4f2e1ac28a4b
-
SHA512
816aa34bcf318ec9cc75a254ae59d5b9cf7ac0c6569b6aabac092353bba340a4987fecab805a5e97e34cfc6ba412bdc324b495b1726261f6974082dcda92e7e1
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oV4Ojqd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433818738" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFFF4271-7EC4-11EF-9DBD-525C7857EE89} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 609b6984d112db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000003400b62d65648f2f5343943d5b64563bca15bcd16f649c47c6f7167f5d67b29c000000000e8000000002000020000000e5c0f87003969143f576fcd0f9a6ccee70dc063cc7f7884622a8ca2e800cd7b7200000008706745625e8b72e03054fe5ef6417c57016b9653fe3c94ad47a19bd039706054000000060a0a50345a12909fd8fa7eda5fc34e78f3b7760ee08306202d0903354c9a0583d8e253ff6cd7751a41afe419fb340840d94f640cfb93111ddff2f2b29ae6699 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 376 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 376 iexplore.exe 376 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 376 wrote to memory of 2884 376 iexplore.exe 30 PID 376 wrote to memory of 2884 376 iexplore.exe 30 PID 376 wrote to memory of 2884 376 iexplore.exe 30 PID 376 wrote to memory of 2884 376 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff98fb146e7b4d663e0fd2fa10dd704b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:376 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53af94e4135d0d6fedf46df33793e2e51
SHA112ea5b2a12ef2049fe7e0f08f215f0f18c642407
SHA25604d91379b0fca72bd6ddb5721af45391dd89f7d31271ff2552b53de1d00b1199
SHA512b2ecc2419006cde0af643d6026ca16dd869cfbe377ddf14d0cf22ea9cb1df27e5745b729904c40bb819680497afe499a8c7e7b7beba9baa690e6d0b7c4182fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5857928e575b8ff9f68ae2da2725329c6
SHA13af8d1b324bc20d654c5cd09d261bf190cb315ed
SHA256e8a16de535cc515115e3e6567f9ee766a75280ddadd5ada2d58548fdfe1d9218
SHA5120d9d28831929d8a0e793e7fa56c8cbad170c770c10fa5d462e72c4f618cb46db94210772dad132513b0e1cfaafc3d3bfa1d3dcc4ab13c77d6417408c30607431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aead8f1e8675ebb86adb5be01a72a052
SHA12fedf2b2cc5531868239ce888079b0e8293a6560
SHA2562cff5c6741bc83e23c6c1f6c2822b8d7de08863fcadda252870235f2dbb1c17d
SHA5126d07c6769a12dbda5be662e178c88e682851085dc345c13eb5e5574af62fc7bf2a45c06dd1dd0c6cc5c9d2865f1acf2a6c56d4746d3af57aaa2eb217244b0f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fac84d62c19989098eedea0249d7923
SHA11fb6416a9ad4437b96946d81f1bde0ff2bfb36f0
SHA2569a851b99fca1fb63affd193e02b46a5af03a5370e471e251240fd559aaf58a98
SHA512318fbae730a54d14b70d0bfff740b3f061bcffe1cd11bc65242893d5a6135138c936735c4403f1a19caee5ce6ff5b72d9c69384cb2568e890aa25ef98ccab9b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b766dc7a3b4644d7e5eeccf2c1ccced
SHA14e08247efad408f00ef60d60508783807f11836a
SHA256f6856684977874ccf2932819ec81a9ba92f65ab9088f9bcdfe146ea147a707a3
SHA512fa738919eb0d546c49e448bdb968c29976d71ca4bbccbf624e68d0d56b093e57a452993a70d7dd075cefe0bd4bc4133e5ba2a7e99e2fbd031e24b5be3a857ecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561356b92af308d05ebca5c8bf33b53cb
SHA10ea6dc41b322d72b2b2a8e4e47d932e30dd2ca02
SHA25637ab32b2c33a9dcc4f7d9db2d46b50c42adbcd754ff7d40edb6bc7e004682d99
SHA5123d59687131ca7d9ffa46e20f71acb5bc1707a52935e12b42b33561c321d01de68cf4aa19e478672c32b0b3d7a3d80430126cf50848dff7e0a5ca80dd6f3e3c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5958c9d5effac1afd88e6da464d1b28ae
SHA18a70a9fa66ed5ed7303836c4f2a1bc299f172cca
SHA256212e6cf6ecfc00a89293cf7b490de6e14a7f0453189d62fe5a5ce642f5379985
SHA5126d171f94da8ae37fda44210c896bc30d801993ef4fe0402547f684fb87bbf2406fcde8bce8ddaf2074b6b490e8d0a8749cb987f60d497edaa2382831133a877b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca638517ad3df3cfb060b4e09845b188
SHA1269f38e0141e3346490309e779d0f96617a6ee92
SHA25662ba1ea0dfa6e596a0484be847807d3bf858bacc9a99211b3d84ca3d45af7c12
SHA5128925f8f317f01aca01371eac1aa191307cc14274637219306cc43ec7876a3bf248fce5d2f1e813d7eba7d537cfa3234c4bf68ec8c410b370fbcc2512eb90f5f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af00b45e7bfb350c0febed808dbcda55
SHA1838c2d47d099941627279e9cf3bcb7d060083a5e
SHA2567e1a12cf1ad6a3d8d33cf8352a2141b289dece2c52eeaa06aa459577f7eb741c
SHA512b0d0f09e9c8415d361a31a9a94f7228a5fcfe47dafccd759587f42e6360375a9cac3ba9215eda551dea066983ee451c4e5d5b69811fbdea915280096de0bc48d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5853973e5128a4af0cbe1fbd474172cd1
SHA131f4009df74c7c91f62fdfb9a28d21ffc88f375a
SHA256d31f4b4d0b6bd9f18b60d6d9024778b8f8d962703248758f6fdcadb8f6cd06b8
SHA512185ec877532818ed07d9f97b44223cfd162ac5d8fda10318a17a6cba7ea786931d111bbdb4754ce009b5d012db7537d0cb385b927b997462cd1443758263ffaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bce5f7c979034f3dd49f86b5cda7fab4
SHA16676a7fa93531c61d0cd4a9e1db943787e7cb8f9
SHA2561b348747dd95b1af81ddea06ac127beb71799f8c2c4cc0954471dcf96cfa3005
SHA51246f070b71e161062c8104be82000f176452b5fbb8d9a54eb712fec8ea9586631f3268dd08164655167121acba475ba2da1540d62f9e3ffdbe610a5e1957268f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570bb2600a578e8339a814c6f439bc639
SHA157a5fcf7e2becb9563b934ba194ce751e4bc95f7
SHA256bca163bdc496c756c9a6e2f377ef46b61065f5c2ab6102c17b363eaa024e5115
SHA512e2f106e5d8f3bb79947ea1c0e22ecd4f8c929a15f48d23a3d48373133d306808450180f00a520e625baa14acd5f60d26a95ea513a4498d687909a264740ebd92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ce59a610b30aa8c9f882e2396cc2841
SHA19ab1e0ec8178df49ecd3bb43a77f439a889aead5
SHA256990e9fe5d43c9a37ede06c7515d016c6f62ed1424d0f63ade5d358088fa6ace2
SHA512afb1c7ae684bf0122427b613184d8352795419c39ef60e4fb6e2e23d08a26c0d76dfcfb44aaa23e2d74e40a9e03eae652002e2831e5c4574da59faf3055a3cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9d16b190b830b48df2a2e611add50d6
SHA1bde2ef6926037fdbab850502cc7c38db01e09952
SHA256853b2ca2e263194771d4b0a0be79f799c46c3350a4a9549223a0c3e6c5e44f6d
SHA51240c8d13cba53a41ad5497e7a5e6a63645706d0cf5d2d26cab0770b0650ea29443c5342a108fbf7cbdd9c58d3c76ab1d4d189ab8f85343a13168aa30f91547065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554612ed6bdce418667247614d5eff7ef
SHA19b4d1a0e7610fc5c341e6743668a00dbc91a66d3
SHA256c8360add5082d541c6ef9aee72b18093ddf42a3abd20ec0feab0e6bc361418ba
SHA512b5021781887d60524f8a2e76e814b51696be5ede6b029017cfe9fa2b21e9dac02205f10bfd55ab6b1bce6474c55efd93790d940e2562390f43ca575c38a72288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd09b9715af1fffe5565c38ddd3cfe6c
SHA10a94e47809996136ca07dd8ffd088cd8bcccc1de
SHA2569c963540dca78362379e98c10c3bb279ede0e529ed632d35188bdfaffb1c363d
SHA5125c4403acd1b2a730d9be07181ed732b6d7ffe4288c36a2a4471cf5c9037339a6cdc9ef2b0dfd843434f4dafbc32fc49243699d1a266b76deccd44ff8d00e9a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56efffc0af721bf69525872088b4266c4
SHA1c53cbf83f7a5a8f9f6b5d8e622c94ddaafb8a1e9
SHA2563ca30320ad23439dd7248dc0bb24859f22928cc29bd67974ea6f58fa87658020
SHA5122c957a3e15f5b6a08b4927841b2a9030c4ce09ccb12a5ccb7c36d0aec24771f6a540e2307eb8071ec7937c7de2492bf7f5551268d71aa4d279143cde0e43885f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52083d6d12363a673f51f9c56dbc7e0fb
SHA19c5128aa0b39a8050a0df9240ed302cb19f83727
SHA256181e2fd68dc44fb333ee2ef24a242d281a49aced7b87fedf1c7922ba366d3d35
SHA512b09e0d4958619b59bc9b1093f1750557a8b6893ece30581b5dea1259fad3a132f592b8cf1ce7ff774124918650d6dd6f899bfa85a3bfcb27a5da7f9cc7578282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae7287b1c6e396e6c55ee54ac25abee8
SHA1b81680a1dd61237a0a66173776f512c52adb3046
SHA256cfc05b3f130d2644b5fae61ccc7145f33847c889a0755877694236c8987b1f47
SHA512548dd2198e1993469c0db30ca434500a36c2209cfe0067eeb9d03735b26d27918d45d3841f70c3de6b34ca3ee7195b58ac7bd6d76ab2119b536ef6e9b10dd43b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55448b5d0f7713c72afec26bb646fd937
SHA1d67bc3ff46604d7f3e32ae87d13f5555c7f7578b
SHA2562a0e1263f5e3d769273f7734c0ce61b6bb6bc15dbe48e6a3a2ade694e51bec83
SHA512202a9c7c98149477be2f5e35498558555fc32a66406e17c3a78367adde24bd0791587fc92eb750646fdd1163f76c05c3d39769f12d1735f4865835ae5bb52b5f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b