Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 19:51
Static task
static1
Behavioral task
behavioral1
Sample
536c45a148bed2795b099738e358e02b_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
536c45a148bed2795b099738e358e02b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
536c45a148bed2795b099738e358e02b_JaffaCakes118.html
-
Size
7KB
-
MD5
536c45a148bed2795b099738e358e02b
-
SHA1
1281deae1c49cbd6036fdc60d841016040f47c52
-
SHA256
f7bcd1bda134236d00abb1d5fd0dbf1d6c483d8cda3f49a733557c4a15fcfd25
-
SHA512
89288a45431631d803659d44974028534ea47328eb323719888c9c8be4e80d51c994a56f0d5be66445ca9625a2becf6773f8b8b3a67b2645476f9c944a4b6fe4
-
SSDEEP
96:e/0qFcGrOUpwv90G20Y090ZAW0X0B0L02ko287:e/jzYFmF4cAWuqIbT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36886D31-8CC1-11EF-962F-CA3CF52169FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435356562" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3064590fce20db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b960000000002000000000010660000000100002000000039e24f238aae8af7c61e188b41817bf996579083371b839d21976d5f9a17a313000000000e80000000020000200000005030a51a7edf299ff4bd7cbfd2f1f924f944eebd920b53affa6c87a02f6c392020000000d22c3e162043837202d710ee23d5950a10dd4095fb601d17790c7ded3f622a0340000000a74c31b5fe92c178b29c7efa2a8154e70f9ee3985cd8f7b6243e5ed16a3cde9fc35b7b049f681b742712f2d3693d3acd29fcce6fd8d24bb9a844c27f92048d41 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1644 1712 iexplore.exe 31 PID 1712 wrote to memory of 1644 1712 iexplore.exe 31 PID 1712 wrote to memory of 1644 1712 iexplore.exe 31 PID 1712 wrote to memory of 1644 1712 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\536c45a148bed2795b099738e358e02b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55302aaf5e34002e9bf62c2d432b5f6dd
SHA1e03b78c56f202bc780ee948b2ec1fd4cf2bcc9a8
SHA256d1a843f472a6b6a6412817840514138ee2ffbc106c69cd10d049b1857640338e
SHA512b9eefb5a9e6d4d542b71ed5d013ab36dfe87104f74c6203a5d362566d8a520753fb037cf8ca2868853ab88fa0eeb001e8b282a17891436b8f09bb1642da43db9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58957635c4dbc20ba2050ffce287423a5
SHA16e11c3641ead3ba50265eeaad5a94d70126483d0
SHA256614267a8ec65119c111a085b4d61d6bb86b3555fd7baa85c6914c54aaba7baf3
SHA51272b292a16e75cce156049ea61630befcf4e6f7b02f60ce4bbf917a73cf1be7e2750611e94748732772e747348b8114c6124bdf9bffbfa799380edba3eaab5be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50691badde2d26f1dec51d3b3ade58e01
SHA12b55c684de06273c5a4aba05394a8cf03fed9b65
SHA256c2544db4da140dba558e3fba5148cd362d6b4020c41b25e80f5e147ec36b674d
SHA512c08d9bdd7cd8a282308d99080e9aee86db277d4c5633495dcb85a7977b65c5699dfa8d1dd731a22496908ce0f9868bd8eb6bc18fac4a26b00ecc40921916c288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bfdfdc10e308ec75dcfcd6b5b69e82d
SHA1cd80c9ccc0ef81d914bda1e25fa32da4de6c55e0
SHA256337e4cbbd4220ba5084fe3c391b27060b0ba0bc4053f67994dd315a27f1101f2
SHA5129affb59918d9216daadcfdd8b0919d0a86524a2247d513e4ab8b4b8719504a6cc8e7f99cced083f2960f7e80f93b7eaf9464e42f98a4ce38d243a2fe7f4c08dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dcf601eadc65812fdb177802e93fa1b
SHA12c636192c07976a84fa0506dcbfdaf45d182fa75
SHA256184ef2e597c99906223b0c854210019dea70bc7da676324d16d19e3eb2afefdc
SHA512ef3943fc175e201def0f23f2621b0bde1cfde73400863ee599120615a6013a01e9eb0f1a3c4ce5fd2691abca20b202a0c3dfb28aaada8ac0b26c204f9c327db1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d0807b40c9ac7e1449d964f37971270
SHA1bf2daf723bdef152d1f49bde35201d3fbbe69482
SHA256e46a2ba0b94dcd624684bd55536b892eab5e67cce3ed35b21b484931dbed6fd9
SHA512c0f757cd7d337745ca24546367b9ed66fa100263cacd06f859b7fcae5aaaed9d3e1586c2bc341e87da17428081f9577944ac6ed6f588441845cdd5ed5357cd4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6aef70913ae39118d9070bd5e2f97d0
SHA152aa99c7ff124c6f716bd7c00e2a8f26a4ce4159
SHA256fb4ad3be35f6a035e850dc1d8b55f49f2ad85750d1b7c8ebcb0d52e083bdbcc9
SHA51298dd054e7db1430531c651064bea4a8258e6782cc734210db02c2434a1892143ec47131a6a3eb6e218e4ff2abadaeba0860c205945e9af670ff0415e475839db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed49ef5acb1f6ed4f86f660f8fe54275
SHA1879ffe8581f2cc717de8199fd122bc541674e056
SHA256faa8880a5fc27340c84a58791dc49ad882e51bd7bf692776ec76c4ae030074bd
SHA512ec3d0d55988f528bd17651ba4acc44e4bcd22570cd04e61020dba7cfc4a8ba38d83c04a9f4208109abd5f3d567b4e9ba7f90c79b40aff6485557094ea9f0c182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ca02e51ee12cb9dffd9c8556fb6d4cf
SHA176dab0a79c74dd06a568965d08159383228c1c56
SHA256403fba40777c4a1c52f6c3b6befcdef21758421310509a3981dee6e6439fac3e
SHA512b40328d47d432e6ad34d4577ba33020193970caf9cbaefc16647098ae066fcc11f40dc952f61a12e78a742a97da6b89ca0b4f1e0c97aabce323b73506e3a8ece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1f6acb9e7504a0ff3ebacd344c06709
SHA1af6cf731af02e445bee302987a062ab243bd756f
SHA2566e15119d6d6fcb2d377a0d9eb281fd0fd5ffae9911c3c21b9289a4c670521a8b
SHA5122d4c75f21ecd70f2a80504baee2c419ec30a596560b96436b0607ed2009b20b81448f25a537875805f6b7674ae5284230f13e5aef397f385f3a13700dd7c9ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9b4172c41887165995a41feccceb46c
SHA1ef4b2ab8e883ed705a3ea59be5ca2139c092f090
SHA25636cd4671175906af101582b08fd768506dc8428eabeec9c5e6582a4fe0932c82
SHA512ccf5ae9ed9a99f182f4d2403f46610e7afc5801cbf1398af489164a3be8bd3beced190d49126eb763f8409be971fb5ff7e794608fe25a8a35f751d2d2e365fdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5968119f6fe4714a4a958721377d02dce
SHA13d2cb64f724c56ef2999fdc18fae58c91b14fa67
SHA2564990883c4849c529cca5792b797d9d2a2b58dd1a7bcc31362a27b281cae5702f
SHA5124b066cabd45b6f1aaee8bb43fafa34bd7b16ac1db1090b030b6615f31af39815318625c64fb18673e55352ca6a1c69daa45c2eb4061caecfa2619ff3c19211cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ee5b93dcd3926af5578c5e25260704
SHA13907703ecc98407bb7f977d63221b5c234a2c455
SHA2564e4e72ce2e98de4daeb727c2de9caddc0daaf1b81b10a3a834e16119f9a6a677
SHA512dfc654d2654de8a8915ef7e7cd9ba73b9b7f5430c53aa6636870fa8e5040543b9fc494fbbaebb42c49c8b9a98980191d6068c4cb5f18aa153af01153b566aac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553ac6391cfb3c71ee40182ac4cbccc75
SHA1be10f0de022e2eaf01c9d1aac7b6343216abeac8
SHA2561066c65a6f93ba957b34b1fe5779bef2f903b29b493a25c55534076cc04e71c8
SHA5126f047d0b980892781f6cf98e71cbd71801bcba62f43097c6e87312d52725ac9bfada876633336fa19e14280fe856648cc2a310c7f728775e18d3124e7367ec6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568fb146523f69ae830fab1f2c81b51f6
SHA1dcacc7f3195e640d662a7621e8219cfa8941e39a
SHA2565fc12a8752afe92a657833ee4264eb63ab72e5c32817bb89e380cced6e7a38a3
SHA512c17d977d1e44b83867c16bd8ae664d76380942ec418766fc2ed42229ed3cc5ed52bbe1af3c1b7b82931ee005afd4b664381392b622eb3d6547130a2c334337d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c502cfef9c96655f03320dca8c86e91
SHA1e188f20cf8ec3b7e0b794f37060ca22e2b2151d1
SHA2566b58425ea05823e00d8889a369866c26f47425bde3e8ac4f34192ec65007700f
SHA512b1a216a13c82fd1c9ed4b1089f40447d0f4b6042f00031d4a2f7768dc0dbf94972b18e40fa4a43ffa0ce8dee4476ddd997d60103e9ea8233eb4b96c80427428a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e238951e3bdd184ac092de0284307635
SHA18b91ba5a68f62b110954c9f01f9a1f3674a66e2c
SHA2560434ffe5dc5455c6a005eeceb10377554a4fb867d5e491713af3cd36188327a1
SHA5120dc079b51431e150f64cae14d2b0c33f3b8c3f6dd75180e2a8a522829cdc1294364d7159c467eb760fba614973b01e0405180617eff767e45cbd936270546d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500575e09b02d991ddea6a7f206e2b0c4
SHA1f6c853c5e6b4cbfd8a9309cc1e8a68ae500a957f
SHA256e7236ad6814363c8243948181e74e3dc6c680afa4f29486032984b04186aeccc
SHA512e7cc4d1214f8bbe6aca669ccd1dac76c6adcb2ea21fbb8a40f1a41abba49e8d7d0bb6fac3a47cdff193ae739b65c8d6e201c3470146e19cf13c0b90844c0d402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7074b880a6127b1d09f11bace0d6da5
SHA1640ba3b3e527d30c53bd4f27e8acf5052565cc41
SHA2563f2c286a5919a6b51ebbba66cc8672172d40ed57088c19e133f1402fafdf79c5
SHA512072fc92d7a1a36bf17d399f3d5201d1d31f2cb56c804884382e4603930d546ee5f8ebdd512475804cb84709b68fd60e0a1fd4cebfcecee82611c4666397ae517
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b