Analysis
-
max time kernel
117s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
11694a2342bf373cfdd7d2771599ad52_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11694a2342bf373cfdd7d2771599ad52_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
11694a2342bf373cfdd7d2771599ad52_JaffaCakes118.html
-
Size
5KB
-
MD5
11694a2342bf373cfdd7d2771599ad52
-
SHA1
f59bce2d48da2d561ae703c9a2b69182fe66572f
-
SHA256
b0902e64495f9eeb5975dacf9d0e9f15a66afd164b4a11ce567b915dd8a2fb5e
-
SHA512
ac8230ffc59d481e75570bd0bd043f7709bcdaf67a8a2701d17c42899ccb102393d0ee32cafd67cc2363ef1245d019d4e324ee55a2b339c6ed03fcc9bf09a28c
-
SSDEEP
96:LJrAiLPv0Xu5XoXM3C395YaDrgiAURXHj7hc7jHh2TjLlj+jlxjtPGTHGnO:LxAir0Xu5XoXM3CvYaoiAURXHj7hc7jM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B67EBA1-81F6-11EF-9DE0-EE9D5ADBD8E3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434169816" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000950ce666e3d3467bcfe32730bcd83a62db1b8fa87ad1cf094a67da69a3568651000000000e8000000002000020000000da56cd972843b0f0ea4f70f744908615a6425ebba0eaa3fa575c5029e86ea8252000000030dd8b36d443a6126fe0053daacba1a3cb8e0b347e3ae2632d6c9bfb3ec2faa540000000b6ea2808502506ed18980f9a80725ca28c5bd4ac9c434ba0c2a3ccbb929de6bd0218aa5c6394981596c7a62c3d966d566fcb16b342e989e52987f22e4cbfed71 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40b642f40216db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 3036 3020 iexplore.exe 30 PID 3020 wrote to memory of 3036 3020 iexplore.exe 30 PID 3020 wrote to memory of 3036 3020 iexplore.exe 30 PID 3020 wrote to memory of 3036 3020 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\11694a2342bf373cfdd7d2771599ad52_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571c1ecd5f87623644eea2afa4c66258f
SHA1e7868ffb9479c435897c162b5c6ed28be8a41856
SHA2562e6fb4b10fba4d8bcf4d1850d55e60f154e632808ca86ab88e5469037f7fd023
SHA512fa5cebbeb878d996de102bcaab06cb0ae2ca0a0771e3f60ae37dec467880f6d6a05835bea34b9f0e71554c4339992180ec76af080c9fa827189e27846394f66e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcc69fee20a27fed33ef775c6dcb522e
SHA1d5c996d678cf969ea80b998dd2ca92e66c08faf1
SHA256348127f3e748a7f62e1aa28ed99a3424d498452dc7935e029df11f8aef9d22d0
SHA512e943dbda93ef8204efd37a7265d5c4c302d69884897b2bc83f3ab368a160623e399bc58c0284b879477408689e4d381ced7817ac1789622de3268048f2e6d676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e781a0508efd92e5c67163a8351b5d
SHA1a37bb12a2a1e825dfc58d836be0622994f6bd6ee
SHA256968cbcb9414acda74aa697af9954543d45011b7f880ac13cc48ef994ffc35f6f
SHA512eae98000f3e3cccfe7d850602b61fac220a16a94f7d3fa9d8192b38471e5951a2ca6f2045a027607a3833795e6c2c63ce13962e59eaa524a72a54c49ad1c3a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f54485c98ff13f04559137a8e2030c7
SHA1754d549ceb7024d0c8a2bd0d445662db56362577
SHA256d570636d5e7a9e1fcc13803a26a6e4853e0538f4f72c212dd63e8077ef157482
SHA512fed633244a2541adf00d4b3bfd9397deb294fbfefd461d06495fd64f3aabcc437c576d289b6f232784e33e2a29754b4fee1717fbc06187ac27d698c4f2661393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1423f011ca18844e3c61e86ccd707ff
SHA13af4c2160f57108c55cca993520117d26c71a89f
SHA256e5402bfe4fff1a98f1e3c85a3c6adaaf17219c9eff1829a7d83a16df68121918
SHA512698b5e9e2b69e35820286da7b2459c423ba61aff27c76720a7e28c5e617a1c336bc3cec3f65c8de962af68bb3d6601f2d6bdafb551ebefb1556f101f7fb9fc55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523abb09b90ce5660c66be6e3d5cb0ace
SHA12b6cadcb05f0ae8cd6cd862880352c1972a1daef
SHA256ca42f01df8db527b5339c135fe7e387e7510f045cded320f3e591e20e01c31e4
SHA51215228f7f533969dd5ccb2066b53b916070f9fde217e6e08c68e0ae41847ca0c7a0265152d6ee6b451c8117d34db34491d4f8f9c39dfb67c680c6dfd54dd401a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deb17e37da5928506165a0913bdc4c7f
SHA1458b82630b5f118f1eb8f555974be191d82209a8
SHA25634acee7955d2661ff50c597382f4d11e457d50d124f718047285bb09b68fd32f
SHA512e4cf05306490bc23635732d2fcbbadbbfe018e5f13d4dc4091f8f5d5a9815bc316344e8d82ad770a1ef4a2c1c07415e38de376d6d4ca0bf9ba17e4a6682f85f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad265213f3063b14128a8fa3d013fe44
SHA1a502fdddbdee35eed40a1485f9812288734b89c4
SHA256e2f9cbe6176c9f846f0731a01ccb3fd3a5e37d5a37e611615f18fa9e7ddec840
SHA5123bee20f3763b7ce0d3bd8bf60f7c395e05bb9fc272c8300c764dc4423824f910fa8dea503a640829bc1e28117511901612b1c2f9ba0ba692a902029ba79ac8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a318e729a0b96049a29351017816b0ea
SHA18e0e38eabfcb7df39db5fbb17237cd70912167ae
SHA256bc18966fc116bf17cce7398a36898d4cc54ad3f817d4c39945c928cbfe23a4fd
SHA512a00626a7eb3ddc5f813c2d51e1374251aae6d99ca17177397ebad7ff65efdfe20e6df9011f2de778939cf87d1f42abd67483438e975ca42cc13c2348b29e688b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b0befd40c95ff8132f9104274c6eb5a
SHA1ef8940012bbae4d0409ed883a30593512c2a5801
SHA25642cdb0ff1908a3798177ef34e42066bd828bbf4520abbc68cc213340bbc65d39
SHA512c006a90bedbde67ff465d1bc855bf1e050cf616f33cec37e8e1a221b73b3e6209c7ba10749673eae8b79f0e7ecb97da2163a63faeafbe4ad5658743b1db62bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a1ba79dbe3000ba84eac2b95cdcd821
SHA198d454d2d71b31d0214bfcb2917885eecf705f90
SHA256a169b86a2264d05f4e1ce9272298fe62b21103f4aa5c064e3f396884c8370b3c
SHA512d01f37a29a34400e76aa925036a1e468a288ce438c2fec022dba6445d2878012182a49126a03ffa795f742fc1dd3fdd0cbfb6852b3005664251b566850e55e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1060c97b764278d6f8a017a20b5f42a
SHA1774706817cef0b7b8395f209fa5dee239cfbfad9
SHA256c6efa7cefb20a0c10ff25565247b21bdc2992de3657ae1276f19256ab0325263
SHA512bd310c9c7ac05036185b927fc240837eb8234c42615fbfaa2160d97c2ab608179c01553c5930ce4b163ef23ebc8f46c9b00a18466437bcdd748df35f462524ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ef6d69102d64dd140b1427948fbbd4
SHA1483b99a697e59ce74294add4382df6d3e7f7e1b4
SHA25688f46008c5dffead22ccc95859a538bba62914aa1c2e7648f75b56f0f524c2ba
SHA51291dabbb1b1e098a52757e2758cfe29790ba86384214bd63d3d7ddb8d2ec52671079f4542d09eba1bc084a6969876ea8b384861d6b34c6d26043c3d4f67461f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532110eed14ce84f8388ac29691947a1c
SHA1c88da4c20757af9c90b56f373d095d4005719b55
SHA256a35b9b5f2b1de63ad05a7eb4c462de0ffc84f0e9005af215b7d94d160c640af1
SHA51287d1e694ac6645ec2c0cd03bc75c47eef9a274f4c100f5c61134418f1d3cbc0a60b280ff96c09d77491eadd58476297e7b78f2e034b8a92e2bbd1e2c9c22f18a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523e2bf082cbe3a8a1de26a8cc8a31d85
SHA1c4eaa368371b3aef30d13a64c6481c7fc11d6de1
SHA2565eb9093ac963c607a557acdff15e719dd571d244f952a5ff4c7115c0dad5313d
SHA51205f932b906d75d79c410393666c23f1317238e5384f508aa2c57845919ed2029afdc5333553b1358891144d22163da44c6d9cab48ebbf649c7c607d1ddedbd2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5661b71f3e78afb3bcd6b3f86c3b603a9
SHA1a2631da6d857a8092547c903ba1ef22cafb6ec11
SHA256032a98e7fdce7eb5ced0efa7c2193bf4df016fec5bc63a5784c234a73d23a1a9
SHA5120202df10e783031f87b6c04c8aa190d26af55eb7a1d6adccd442ee8cae6a55d2636ff6af5aba3cc08584b6de991262ee4c4aaa648724d2d2ec9a3b8bef139380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55427db61f837ec1e23a8ea497cf47dc7
SHA16310e535fede34308ef70d0c019acd4072e15081
SHA2565650d2bf1c1c9f19321f915d26fbe63360352bfd195a9e9267152d250cfe92f3
SHA5120ad30dfc8e41565724193e3a7cb8d1294b0edb4ddb18fc9e94c117ae2174a91d2f02af521ac985b2d1587f5efd6e39f3157c35442c548f94ca67270c06fc241e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509d04fd47d3bd7111c15a37710ebaf72
SHA1fef925b83ce21ecddd8fb2601a06e5e08626f938
SHA256c5b36c395fe8e8a2fae2e6ff91797669058ab53b1d1c963402039579a41e9e0e
SHA512ed85bdca96f7cb82909f59cd89265ee48a0975b3b83a773f6103905bc42a773d1fc3611df1a14c80563b5379b8ebb8920e2650665deacc8baddb155267d82a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e5d13dd96171b159341e4df113610cd
SHA11935d7a36e75c5c5fea7c2d549cd020238f6d12d
SHA256cfb8771aab48eca771672532daf76fbd6c6a11e663b5ca3af67bb72b475c2839
SHA512438e3a79911aa58ec66a914fff3d190c58aa58536ef603b5226521a3c112129a2ebb42b7eba1c878265b23191942c2c8e6194a4988cf2c5bc61b3d2207824269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f401f934f37ff517c5a3da3b152f0fa5
SHA1c9e1a240de9e9c952d837302d54aaeaea36d5ad3
SHA256a14d3c54f50284a23e8339c499468b84a1d95e35b576cfcbda68aed8fe6fe157
SHA5127bc0e78f9d7fb343705beab79e8ce82ee45c112c989a307e5df2d30ae1d177bd8caaf7d33d1a322a17df5613f8b017dfae6ddb4c1e8c4cf20715f0cfee05a17f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b