Analysis
-
max time kernel
138s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
1102ca54bbc041b8e248095fdeb8279e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1102ca54bbc041b8e248095fdeb8279e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1102ca54bbc041b8e248095fdeb8279e_JaffaCakes118.html
-
Size
214KB
-
MD5
1102ca54bbc041b8e248095fdeb8279e
-
SHA1
6b28a1b60e9208baef68a2068457f8d678e486f9
-
SHA256
69bb396e9bf1378070c73864d4e569ec0891a43e23f8b85f7bf9af2c11067e51
-
SHA512
92757e6b153ed712fdad3b2d8cadc71777da96ce52f0b58f8b27ccdbad8c884ce51c15719f5081c4f5a259be2aee7605e7e4239a70d9e4fe2f063ffdd1364819
-
SSDEEP
3072:RrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJT:Fz9VxLY7iAVLTBQJlT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60490f09f115db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434162019" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000000d859f16f2dd2279ac5048387024d791776baa1e27f6b1b08a9623cff345e249000000000e80000000020000200000003ce4007e961d6a6714a12572c45bb1a1d91cf0ce361722e0e421c29e6480541f2000000071ae714105bc75986d86e2a3ca1ee3a7ae491906c3c3294525c4cac4bc57077340000000db2464a29031aad48155d5aa06087248d5812677c4b6c21d93aa3da8ef36086cdb600f11978b6aa73bc3b11f37b0bfe43c3dc2b66601f71fb054ae6c55795749 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F400FF01-81E3-11EF-8D9B-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1488 iexplore.exe 1488 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2324 1488 iexplore.exe 31 PID 1488 wrote to memory of 2324 1488 iexplore.exe 31 PID 1488 wrote to memory of 2324 1488 iexplore.exe 31 PID 1488 wrote to memory of 2324 1488 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1102ca54bbc041b8e248095fdeb8279e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1488 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d72b3c4ea286cc73995116434abe6aaa
SHA150f853647383cea86685cab8bdb54afd1a51abf9
SHA256abfb05500d23aefc3a65833a60923cf7f5a8a19265b1a26442bc4a7098a1582e
SHA51202759b6b951f8026abfc2d799825c73015a64087c87a17de9e93dd54e9ff1999d2eb410d695b27bc0fd816179ffd1eb2989116f4c1ed1ac77b9676c1b9f3acbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d225cfb8f4920c12c1b269886b141766
SHA133dabce941ec0d935f083c6b05ea9d888941a87b
SHA25654d74e6a6d7ae823c292782880ebcdfa7c4d7ad1c90e72cc10c87d5a02cf911b
SHA512383e4a23d15a2294a493a6ca33bb56bfa3bf43353eefe4828d30c0d00fd086eedbeb3083da8a16872458dbc46f63c251536e6500cbc92a250641937b0c5c1112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58220991bb26c5c87dbb26c5b04104b44
SHA16a94807e939f5cbe7d61e66c8232baf6dc570fe0
SHA256da5caf3d44e0b7ca1800c030b6a26281abb9c974198fc3d688020af643681abf
SHA512311797b3acd128640e5788d37608d92ec70fd1f3eabdb2dc4b3fec55500927305a12db3e64db0ecd621b826d3990ecd6313936eeca2e3a772d02b55d0cb48c1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5051ce259373fb3e3ba0c95c500ac5198
SHA1496a9887efa4f5e4ba7f554d4b19f1fd2dd3eedd
SHA25692d27216f907d0056821ae37dcadfe9f7302720888da4126c0213ca7c222da45
SHA512a82ccda60b01954b8292965b3f9b97577916c1caeb64f325fa38f040b79fefcaf005a8449a01b03e238100877a6f2cbde0c94f42243396fa78218015a992b5bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538ffc94923a86f7619c7f214488d84fc
SHA118705f56892b38acc04e839ce7c8d40b200e5b45
SHA256d80eec301c5c343c06e2368c18797f8c62ac0a5940e75ed711bfa1ad35dff8db
SHA51293b40d04b9f03fb3dbeb92d2a938910b7e1b573e0301c22c8b20e81b1164fd8f3bc63f845137a3c6bb17fb75432549748fd975c5d541d9ad58ff28bc0cce684b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b7b8dc2536414487f522edb32023e07
SHA15e4b7e47b73b7cc01aa7b7c762ec5858f55b01b4
SHA256154b6015324a98d09e430a27340e6400a7df1e75b38b9055f65d7a331f7c856f
SHA5124c78212a05a3cbcdfdfc702092673fa09236d310a3f8be46a13c509d9e3746ba1214321830c8f9ccae91936c4a7885d366b4edda3fcd7f384a8e77d6b7325770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff776b3d2d580f4977a0c83435207dc9
SHA159d5992a2253bc5da1ab64643fe8453d23eab653
SHA256eaf44db9a4c995bacc9749cb98193b35d1f615ece9e11c52a5a0f66fea394f61
SHA512ada8be5ec2e3b732cafa05f0b7f4183ef2e1fa420ebd0c829781aa4ccbef2e456601ca23aa25f88fc502daba89f498f45f4a49f9e98f8168b51debadaadbeb79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578814b3029e82df475082ec5de7cd458
SHA109286a8a97f15499c3445d4ab4ff6ea12e84b81b
SHA256d90dbec4c491371de9b5916e1dc5e12702ec2f29f2405837891e5449fc033e92
SHA512dfbc55e20d3d8b91679273de5218144b6f47c7bf98761c14d9ae8699811e80df014b5d52b3ec17f1c1ee3f4727fc02827491f5bd88e0c1f8b888ab532660183a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5f8f6274be1367317423be9ed312924
SHA10fa23f5851be58149fec37828cf3c0aea76f5cda
SHA256c82fa31d932e018f8480635b155b16a0e2449779f3e4e5879e3f80e0f0e81684
SHA51299ccbbd499b87c4da54949267e255d173991327abc7aa6173162e29aa9a3bc7fc7b11b5d5a873b8ee1ee1f10bf87e291a3fefeb97a454da6bb2002b82b179a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539476824fdd6d833ab4351fb5faec4d0
SHA138af89d89c89abce3e050939c71df323475501a2
SHA25620e63914faa700b745c409a3552cbdebe13986e3a54b03c54dfad14ec9028b97
SHA512d1a2626f90accc03fade5168abb21169c7c31c21bd6b71301c8b10b452a35e902b7ee57494ffe6addaf8225402d28f1f0cb2f6d82ce548967d3914d0fb4c57f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b53974f6df40007f20413584725f3d92
SHA178ed18e5f80b9255b05945307c35d82daa0a39c5
SHA2563873182a703d144cd570b6c652b17d7e850e7b1425ef1e12a104db0e0338134d
SHA512d38b4d2a5c2397ec556073f0547430fec9adffda45d7b7dd544b610c562f918c01f80d10373d1761810a67cf4c47b394488d38d860796e473e551e060e50b73a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df0450177b65532c1d13feb31459b30d
SHA139493d025a686698c2415d92f6e6aa85276d0eec
SHA25657a9b1508fbac408a16c1c5744d7452791d83e94b5d6faacdfec84bd813895f1
SHA5129e6b0cb871001b568988588586503c18b022a03c41babaab4467d8f1d17189cee42006815be49072781e686ea6bad42a1a1d2e988e27af69f5bf1cf645dbdaa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5226e7605407193c86ee44281e464d7ed
SHA13e3ccd8371465c8e7f3eddde7ec22798d063e7d6
SHA256af18afbd81eb76c5c4016ee5dce27623599fc326128707cdacfc016676c4cfa7
SHA5126fe5019dd61255b6d1443f5527deddd94203793ab80dd1ecb8c250027cf163dd796579bc6f509947b269a20df2d4232115a1dd3e564b1e330a5235e6a805f1a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd9e7fc499dd47b7afdee32bba1b9374
SHA15753bb005894e26f36206e0f7c8e3b5820329848
SHA2560dfe73db7d693156f343144bea12b641bd1e4ff9c363d05b7e95cb5476460bbb
SHA51280f1ff12aa4dbf47a1424065c7ba8a3f36408688b0fda29d7c7b3e243864cac2abbfa4e933aada992981e4c4fce8e88b57258f5e8dd52ef0f5dcd6a827b57f37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5500e8f252556079154ee9354da4955a5
SHA157eeced088a92a46cce0498f52774266d14a291c
SHA2569c5fc8cdabe8d777c30161e7139d1e84867799df8761758eccb57be2bc17ba16
SHA512c88f7cd136f4765905678c105f9bfe0b38ab9c94556c2db8dd608830228d604d4890a109512fe1bd16bb8412d8284fab7a21000709e80396aeb2d9f98d992764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567c0540df10779bb6e8e304cb680b9f2
SHA1ac57f051722049c5429198edab7535e239fce6cf
SHA256142e71e4f59ddb20c4e9f76bdea5a93566b17d3afa5291f3eee5eab0d4794b67
SHA512b1da87550ba5bae9e205942f823ef626f1f5c235adfaf551a4733603d203d62260c1b2a5c54268d6954e7cb12228302ed06379665bdf30e233bea911ecaeb365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556e2a853ac2db1f448fe91015318bbc0
SHA181765e66412f19219453d3a72a5f4a7ad49cd998
SHA2567c1c095db135c846138cae1fd570bf1c8ad8a67de5b4d34041acf3068ca2ffe6
SHA512890d1d724965b21f087d47a5774cc4b31c6a5246fef27217350a33166eb2af14fa9834fb11a16b229f12c41de26cfd9bcf198981b772dae6b22db15fd80a7470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571197b24233b508f42b317c525a3f411
SHA1072ddf575076d77b3a44e580d6e5d3688a246738
SHA2569f49676d05f85d25134b390eff0e5cb3776b928c1d683526a2d329779600162a
SHA512f7879e74f84b7f70700659d9953f1c0f4a5a2ac75fe2bdccfdd0f18565f829cab22370ff2233feb817edb498c80e35439025500fd622b57754b75a1d08e545e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be95427247c90dbf05fc6f6c91926f9
SHA1dcf1520248d2527bd0ea23b914f73ea657a758c7
SHA256a2c0083d6bfc8095ec7da7c1aad76d8032d3815f21a44b5e371187dbf5e294c0
SHA5122eed97f267192c7250f1b8afd65af9d012feb9ef2f28bb933e47126eb2bcddcc518cba376e79ff5ce41a3e11a2552f0350ece4f6e9703bfcc85305bc6697fa79
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b