Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:32
Behavioral task
behavioral1
Sample
08437d858fbf527cd4edbfb56e6e7e20_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
08437d858fbf527cd4edbfb56e6e7e20_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
08437d858fbf527cd4edbfb56e6e7e20
-
SHA1
aa5cce349160cd58016946a85c1011c44cd45443
-
SHA256
6c15059936f3144507809facd703fb25266905d300d83706b42760a9db33b18f
-
SHA512
90b3210de3ae179e1ee9a2452da06bb075daa8015ab19142701442b85090ee488a1d9652dccf98bb929ba5b4d693e6d2c7ed396f53365d46245092ae701df9b9
-
SSDEEP
24576:KUcPiGgb3wRwumk5I4KO2deuPVGpjgXwb:KdPwb3ut9CjPC
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2440-0-0x0000000000400000-0x000000000059A000-memory.dmp upx behavioral1/memory/2440-14-0x0000000000400000-0x000000000059A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08437d858fbf527cd4edbfb56e6e7e20_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main 08437d858fbf527cd4edbfb56e6e7e20_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9089f0fd6a14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2618F651-805E-11EF-B0DA-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433994601" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000fb056c952e4496b90af0809b324ea5d4ca9af4c4086d57b2f9a23fafdf9e651c000000000e8000000002000020000000a43e54cb746d1552deef362a6b4d822b9006fba9501f427f90a262aedcd3536b2000000027d7c64fa0a3bc20d07dc72acbfd0e1a1ab813d70e5f49b266ea9f1ec1af50a2400000002cf808b67e761db4dcd7cfa773349227c0549aab46cedec401545343589a8516067a3f44a441a1a29274b00df9baae408f81bd6954192a7bd30b2e10536d664f iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2852 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2440 08437d858fbf527cd4edbfb56e6e7e20_JaffaCakes118.exe 2440 08437d858fbf527cd4edbfb56e6e7e20_JaffaCakes118.exe 2440 08437d858fbf527cd4edbfb56e6e7e20_JaffaCakes118.exe 2440 08437d858fbf527cd4edbfb56e6e7e20_JaffaCakes118.exe 2852 iexplore.exe 2852 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2852 2440 08437d858fbf527cd4edbfb56e6e7e20_JaffaCakes118.exe 29 PID 2440 wrote to memory of 2852 2440 08437d858fbf527cd4edbfb56e6e7e20_JaffaCakes118.exe 29 PID 2440 wrote to memory of 2852 2440 08437d858fbf527cd4edbfb56e6e7e20_JaffaCakes118.exe 29 PID 2440 wrote to memory of 2852 2440 08437d858fbf527cd4edbfb56e6e7e20_JaffaCakes118.exe 29 PID 2852 wrote to memory of 2956 2852 iexplore.exe 30 PID 2852 wrote to memory of 2956 2852 iexplore.exe 30 PID 2852 wrote to memory of 2956 2852 iexplore.exe 30 PID 2852 wrote to memory of 2956 2852 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\08437d858fbf527cd4edbfb56e6e7e20_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08437d858fbf527cd4edbfb56e6e7e20_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://bbs.515wg.com/?wy2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5625eaba754682e059bbdb41f891c4bae
SHA19b10558edc8682d9781b8e46b73ad309b42a6e88
SHA25636d392bf8a8ffc6428dbdd1a7712e384e3278d17aa9b3d3121e0ed723d707e32
SHA5129e702e3153ad9d574d60f2f6fd33857510823e5083c113d247a1548f91aea87c84f2efb6a89786982b63f37ce97cd8b92e81c443ee2f5bd5194595f59c104627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56937cbaf16b88ee99ac9b63400977b92
SHA1291f81b2f914b978bedec719354bb1848fcb5086
SHA25678ffd90338f3d3f04efa1496c216767d7628f462908147e1a1cc5a075bdc2244
SHA512b34ecbde177aeeecd3562fc8215c503df8197526e44cbf13721faf3814654b035aa3bdf4286c27ecd7382d78015780d8116ab6d80c5e0f9b6ffc877d1c6aac4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5319a07c6e656f720127d30d344160b4d
SHA1714ac6ea3273383358a51da8da14603e96e7292b
SHA256232f0244ee069e835c11c83a13f9e447879f723a3d5325091387c1b78f9cf866
SHA5121e7eee38a08e6f85f2a81a1beb45d4fdc9728e8356fca7bd15dfebf89f9f784dea209adcaa6ec53d2db3ad58e4040381103f9b2a1bd91278d22bdb9be19ea81f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594e97e5f9ea947b8abb0f9749eab8484
SHA1ea8c0bd65c339b9b1a13d2fd4a28b39c80d1ad31
SHA2560b4634b50e09dc0bdc3f5ae72834a011a12885e56b78c524023b134016f433be
SHA512e84eab5b72d6a510004484944b526463fc034335baae3e8b171b79e060815b3b977454012036de71a1ffe801f93480a4dee0ceafa5c17a6e633f759f8987d2a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dc864fe51c6cba2e5a020a45be634f0
SHA188f6357566541148aeed8c4465a3ccd6c531d4d9
SHA25659e6ec2c8651a5cf73ed1eb473ea2644649f514161e18375b0f555e552aed044
SHA5123c067e3486103885fe2e6edb19b8f62e1023bcb979b084e524a41b6694366b9f1c25307c901adffeb7acbe36b343e2674a8ca4ef92ffb59bb2447685b6240b18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c177c8c30df3aa3b2752204c16cab5ec
SHA1c70eae9ebdde80e9de54ebf0e54b2e1e9d2ab92e
SHA25630c755e168f7ea2285474d6d4f7f396ecb48f9cf3497a73737a7c1fa4d9e6df4
SHA512c675e8eb833faa1ae91c271f115c68bac9ef122cad2093e261d412c974a36e7beb2e54fe1cffbbd4a468aa65ed47a662dd8c1436cffc0f88cc2d88e071b3c22f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51458c69cf918db71326a80a2a56dbeae
SHA1b09fb3725c14a19e832062d33d94fd434ee54530
SHA256ef4eac38cef5331db738d4754a6ef826647860e9fd333c84fbd651db4bd3ff94
SHA51267bcde2e088c5d0ff69a9367324c448c5451c4f7eb028bd0495023b6b3c6f764813747a25ab1769b00383fb5bdcb3e154baea92da8bc3f51f88b56823f56be95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53366ba75b5d3576039bb35c45ef1d8fa
SHA1d03a32130549e447266aea80ec42df8cfa076068
SHA25655dd55c786f285783edf49aab70b80b96a8f3b138fa5de58478c9d235016e2a7
SHA5128f8927486e3adcaa7dca772a1bd90d127c1be5c453be91143ed687d4baa6a7603e584715171d9fd6eb320a451ce5d0779998226fadbe41cc5dece72eb5312d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c3a0e00c83f9f8c3abd4fb8fda51f54
SHA17e09eb72d8d4f324dbf671d957b5827ce9fcacd4
SHA256936e9770ad5724e7a433e8390d5ba99d5be897ea28552bf672e97b0e358a6ad0
SHA512b72f03deaf2c2738324c6662968b56db204c9ce9d9e63c7a9ecf12ce85884394a93af52e176b20f6c4319426ab68172cbcb50d29e040049771f878f104685d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521a422048e6a87d9834d72db741b70e8
SHA1e2aa80a0f923456ebc04eb2a4c80febb9b5b8b9f
SHA2568e788d1a2d09dab40239936b37d56de55e74485655f75e038e5dde4dab55276e
SHA51200fcf73a8d4a986cf6e7bc39886a28f7459faccc212d003eeac581890ba63b38398f353a4027b7b8b9d70c18f5d25428f20c4d95a0d989c30ab113ec3eb1a561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ead5c441c7af2184b6dd53414043e2d
SHA135f8834998d36ad1aefd1f5d661f0dfcf1451c92
SHA256824f9fd658b1dd2a7f38310ea48ddfb748804cabe20243b0bdc307fce89ec397
SHA5128d99720a0c53a5d3b0f37a8e8cc54dc94583321b8193c6944fc77e772d49dce37ac8505d6981f721395d8174e5af07cd6a3e0fdbf1a3ac38be6ca0216c8e0b75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b05a387e7fbd48a335594912946ba0f
SHA1a0199999e285f8d680d23908974835553d3ade4e
SHA256cc1b5b50fbc29cde65928ad2dde4ce77aafb8cf9942cf0bc596152722fb54dff
SHA5127c9eb19fb81ece2f941dc79b371a5fd2fbbe86b52e7528e6badab403d4c53c047e8f725c282ab842075245f01995b6838d9c1c1a4060d3f7b3f5b0aa1d4d4a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da69e7b20f32b63106a0fbd72e9422a7
SHA1927469440697a7e6433c575798648abd1573f9b9
SHA256719f29195755cc9a2abdf3a2f3e4375c387f4f33cd4e586d6adb0a38061432a6
SHA5121255c59ca0ac559e98ead6cdd45dec71f5f966512d579645b3b7af00da3eaa7fc1ddb955bf332ea418eec3860f19901555658ab4d0bb408d3f729c8f026f8b1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee4aa8bd2cc6ae821034e9e2442f97c5
SHA199e77731e2dd8ee8cbc9afd5453b9b4201571fed
SHA256e5bdcd62af0d26466e10f963088de4ec8a59cd6546cf6da032f4dcdef5a5e2d7
SHA5125a932f163631dc726522e45350cdddac7467226e483998166fbe66dd2f79dc5ca6f7cf6212594c70d2b81202c6078d7b82f8e4af3166084983f0c58f97ca7b0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab6c12de8f5f9a63dc21ad390fc52b2d
SHA165c684e7c433edb54cbf48c441f1bda5b76c3b35
SHA2562646c9dfdcc9dcc3bbfb7961d4f3b1b97529e5f98646d1f710d3348094de8add
SHA512e0570cb4d2b60743bea730d1803d026578b6467e054bcdc7d6a89e11de78e16f3cdc730a54551ddc52a64042f96354222c4f4c801c83c68a46b3561161b875b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50deb21075709f1b6509076cbd00ea24b
SHA1726a5283d15ebf4dfdfd2239007b1b89660c6c01
SHA256705b360cf5510cfed099471a2b59a38ef2b3772cac992c242e7be8e878648d11
SHA51279531c1dc3b2e03d0c7ae5ced3f1a5a19fac4d42a4be45ab5ff38605e406f282a731a518482f9bb76210766e503d94e01313a6f53d67d4555d26b9c9090c22e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5092fc1cc364d19d4bb42c6d148e92360
SHA1939a20ad97dc5ac8c6e12fb8278aa17e7b5b2ddd
SHA2564d2a03c58fe35b6c0b905b92d0a37087a92ee4486584d75659a4ac4c3ec7bde4
SHA5126b338acc238af1c44a68eff886918ac626784605fc0053ca2dea0d33685275861bc037e3d9107411f64f62fd156bf1f4d72b89e9c632129131cfd0cdc8ff9f7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f7945d268643b60dc17cf5b9d81aa41
SHA10c636d23b7f9545889625d4b1ad7d6a5d4f5b637
SHA2561f7a9bc9c50bdfa3a4c20893242d5309181c122e9f84b92e68282e7c027cfc6c
SHA512a57edbd7b9866cf341702a6348a76a4b278b20be907b79f10390fa366a947de735f7956ddff3b3ff94174cfb45671b5bb453c7a2baf7a2b196dfe3736f598cf6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b