Analysis
-
max time kernel
136s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
0d42f8f9708e395142d27b10869efc64_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d42f8f9708e395142d27b10869efc64_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0d42f8f9708e395142d27b10869efc64_JaffaCakes118.html
-
Size
214KB
-
MD5
0d42f8f9708e395142d27b10869efc64
-
SHA1
a68b4797f19b1f40200924817b1a4942ac340741
-
SHA256
f295b2cb9521c1af75412c646b56e948e2886461fc3c15fd90ff42c9862a6c4b
-
SHA512
69e910011d05fc22c4bf30e8e9cd360df820c0495df1360243fec4b67cc477697113d674db6b1599ab23e7e4a5d0777f778a5d279f77f4f1a7008fccadd1c58f
-
SSDEEP
3072:2rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJW:uz9VxLY7iAVLTBQJlW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434080058" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e54c323215db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000ac6ebd8cbe3c19490a34aac563887765f3ea0d628ffaeeb8b932ce9bd99ad607000000000e8000000002000020000000aaed876a72a416e0c2153eabe3c9bb5e807246f643e485115da48dddd829122c2000000036ea90461ccacade3133e78ba6333f4a17a8a3effc42ee06281e7b6d4e6d96bf400000008c3d9540d51348c92625aa1a51c40cf79eea2b975515a5e12116681f55e83e0ec3e033c643758a54889caf2f5b1dacd50b5f4c2520e0aabe7026bbe0f5650a91 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1EEF4101-8125-11EF-98F1-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2180 2408 iexplore.exe 28 PID 2408 wrote to memory of 2180 2408 iexplore.exe 28 PID 2408 wrote to memory of 2180 2408 iexplore.exe 28 PID 2408 wrote to memory of 2180 2408 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d42f8f9708e395142d27b10869efc64_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522c220ed2292ea91cb5e68ceb605c95a
SHA1c188c0bd8b31c0a9d5f192f1c9bbe1bde76f3a48
SHA256fa73527f461ca9bc62dbe83c88efa529bc76441b4a2e99ad5924236d4e81a8bf
SHA512235a0d18409dfe599bf2a3e5daf9b02e28467606e64dc219e418d663a646aa2a8077e730af89780a1f7502cf2bbe86cf9fcf70365b8eb2d641086feb343182f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0a9d40a835ea99e4f063ff11751f41d
SHA15518f92e3ff4e96329a1dcbdbe08e3afcf00a821
SHA2569e6db93f9a6d197b42cbb37aabb9a072956abde6dc77effa74283583d890893b
SHA512e10418efc02b9786647f8def4f291f2dd6cf2b7e14274f6458bf3b16fad132facc8b6088747ef6ad9ea0e28f761e555e10f4b2401191715e4685d10591dd43e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b52b564ac0945e890b023a9a59c61b6d
SHA14dabb982acb02da23b3e6b344982bc929e93fd53
SHA25620a7449d79c59c5491d9ffd11f8de9588fa2517ae44d3c5e5f946ecaeb4fcb9c
SHA512ee5d7a033bf860ca42d11fd53786635f28c8d6a51abb4f7f3b113e9ad5fc9d71809e00eb6e1bd5aa54dda419e56100dfe0d23d3f51808aae4c566374d98be681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510662660afeb7e9ef170175f3b7d543e
SHA1eb70252b8e14aa3b7655d9913046d374974c18c9
SHA256ca38abd251a8086267b106f5245f3a4832104d80406b61ba73fab069d28db77a
SHA512678f765d778f9c943f23f4d993ef00fe9cdeb486ca48cf51f95fd6cba7a5f4e3d85a863b92dcbfd9c26059d60b3cb2a8df5e11bb2739d7cf533971550f563771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c29e64f88ea2aa8a0e23ff734d3f2667
SHA1d83e320823e8469e15eaa07e592064789cc209d9
SHA256b74a519ffa912d36b22cee385d222efac1f9bd6a0415462ad47b778110b2983c
SHA5124d6283c259eb4db8b78a26063b0531367dc26c3d22b893143b1f39a4a224780e674db23d2485d337bb3d7e125c5482cc0dbc218503539117412163a6c8864328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54df8cf7b610e7ade4670a1007ede6995
SHA1c647cbb2ef9adc989f213b4b40c7b51f8bfb5409
SHA256bf3060e5262e3b8326170750cbaee3e309042675d371821147d8cff529197615
SHA5125baaf4ddd081b40f59a57f66727f79d45acd588b662ff575a140143471fba41000f1a8b5ba66f43130f628348053c55271f67b479d73d9f866c22fe5252e8bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6bff3cda5b6306a6f7c216d6d8a1d42
SHA1e8c9f0423c4250b1601f363fd70d2eb9a57a4fc9
SHA256279e571de70ccbf268e590bb6aae7bb9da5f863f1801cf56dbc5fc9f3b242a81
SHA512cca114d6eb196f172b868faae3af2bba46b3a436f2f8b7777f491dbb4a6c55608212fca59a8f3072fcdbad3582d2d9eeebb11981ff0ae7be6450eefcfadec70a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a221a2340fdc5c57424d1f99b2ca1f10
SHA1ea7e9dd11dd972a1a190788301c254a9481233a5
SHA256fd0c83c406d6a58c5d9e9841da04458ea4c9b43c8e3691ba58b4654da84c4995
SHA5123132be01673d46645e47599ac12d06433d657b44da9e477a377abf058905c72fd88693c5751984fd7b66a8b352e018a7fec0e7c88477487c91360b8c0e1bafa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a7a3c9f2fd881b2e514a956f1313a81
SHA19bb9d6b090a33b6d6090a90a786ef10b3c3c5cf7
SHA2564a7db0328207140a77504112f67cdea0639741b91fe933f91c31e9be0ee61f1d
SHA512fbb8ab7cb663196880c61f09abf2486024c332601f384529924de05a74dc41988766e3eff2924ad607fc9d18a7369fd3ca702ded38a13376e800d72e6eb55f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566a40841f67c935b13ea66099eca2ad4
SHA1b22458e9af8169c9557ce717cb0b40f6b5c852ba
SHA25614cd7b214d5812ebb83a6d7d9d069e622e02a21c2b98244eb676de64ba0cdfc3
SHA512b8376966efd59bfc6b920a184cf761a137559b215e0397f81340a61970879eaa861745ccbfb0dde42a145b4144d99d4577020faa492a391cf362ded97254879f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51354bc446ccd03c7c159b2668213e2ac
SHA1f408f5fe85f6c92d1d669cbeaedb0ff19ab7d5bc
SHA2564dade4fccd4d78bbe686a7a3959604e66a43b3ec937b018549cc7f2c5d54a698
SHA512950a4cc7c919d6d8468eab09db33a90778d1967a6f551f88699f27a112f71575233bb890ac6c66b823e07389b33a6424221ef7d0f59551814d8e4eadf1c58e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e773f046d14849988f67e90837335e25
SHA1f6a92b48f3eeffdbcd1e93bdef3b96613d2b1a36
SHA2569436006ed930b64ace2480a167a73939149db9c440f76b8b5619cec72dc830f6
SHA512abcf4d4e00ef121725a9056cf8e1e9382d966c72a1e38d6861fbb0b60adfb2751b8bfa6526787a90d0bd883857e8e1d20b1c0b417382d8787862432cd842fcb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5b00ec70904a06dcc28214dc1fa0877
SHA1e502b7cde4c29c1efcb884ee5a306a61201e5789
SHA256f4432062cb4e22262a95589d1a1f745d45ca266cd54dedf52ef140b6601d2f06
SHA5124d9e1708a76b8bc51b8b6ac383c32526ed925eb0a3b09527f3feddbed8c8a7162c235c5474cf0f43f98c59df4bb963205393dd50b7c586eee7c38aa5ad9c57be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5109c5f99a80c97d4723e7d6d8a72b817
SHA1b99ccddb7f8c7d95d66195e72a5676c9cc95a0ab
SHA256bb35c382de25bc39ad455430bd4a3fd09d6bcce8afa900749a5c72223e6d10b0
SHA51220f32b3514489361f7e47c7bca7a12fa0e7c331d3329ef3faad0596900d5a4dcc1d41156368ed4518f58c25ec4a90bc6571520d6633b7670e86ddd40f92681d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdaad303510c4f85d997b3bbbd0e5dcb
SHA19ffb545727a450235019d8498af37757df435b39
SHA256e2cfd62d7ffdd7de843c685761b3ba355547c4481cc31b27d1a468fb17bfd1e5
SHA512640c194c9c879887a60d7c2db221e15ae98ca7d86b09d241501ac1857562446e770072bbecad148bd0d4171597cf675853b825b900e460a85b0ff98400b1db57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52647ffc03b8f93f5ae8d36ed0770380d
SHA170c257448195fedaad40af7eecc1d5dd947f54d2
SHA256d029d65effd3c8a84119dd3dd72522070118dc3bc50f3eedafbb9fb50089b9d3
SHA5128b7383631067f458121c1a2d22642b84a558caed5e880af9d15e3829dae70dd5742e6f0fffde16814edc67ff402876967f961dd9c0878a0916ee54542e9f931c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528d3836744bb110513f78d05709e8c23
SHA1197152a7c94d583495676b6f9d90a696b64caa57
SHA256746f708364c5ff5e6403066b43c1d90b73b7f3c5de4250010424b30111e7a202
SHA51243d48fc53a1094dd2ee51bafea2867b36fe0bb995dc4fafb5ec62188f4c2fcb392e9f11a9bd386f2f50c2e1e004fadec6b391d258154ef0e1ca732f8e024ad6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b110f59c8eb07bffb262cfae1257a6
SHA1c090111504d8d524748578ef07668fd2872088f3
SHA256de7b72140e7f0e728d766b61ea72b7fbd1fe98b9bb9c9df9e0df70e9d1b8cd7e
SHA512543ce758b28bbbeb849a256d5a1837520f3fd72a27fec1ecd58a841e357d1163b476a5c2671d72c1708c3d565d7dacc3b261d45369e7530d0257ff18a44db883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cad579eacf95631029b3b3222cab4da9
SHA16ec3190fe8c2d33ba8a13bb82f21590bda1449c9
SHA256d73062cdeb46881cf8c9e2d74106cbfb0885525ebd87234be81b10c111826a24
SHA5124252b10a9c4c649268e93afbb22db6569629008f7fbfbc9fee6d1d3930759bacd192473cc084803db303f36845614d3ff955ae0e600ae69163c82bb193d5c391
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b