Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-04-2024 12:03
Static task
static1
Behavioral task
behavioral1
Sample
e2802fd418a8962538293a23164edab2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e2802fd418a8962538293a23164edab2_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e2802fd418a8962538293a23164edab2_JaffaCakes118.html
-
Size
53KB
-
MD5
e2802fd418a8962538293a23164edab2
-
SHA1
977e2234cbb8b886b246796a9f4deed1257ba166
-
SHA256
dd3915d1e47b1b96fba430c413c8da1d67c5d15245aba3b8ea3e0013d664933b
-
SHA512
6c48ccdf2eb7e270cd55d1a02b946d3c6faf96670031f03aebe122cf1ec2e2dcf0a02516428a4718af8b61de81c112525bc5a6fd6204e9e18a3f171019fa11e1
-
SSDEEP
1536:CkgUiIakTqGivi+PyUQrunlYG263Nj+q5VyvR0w2AzTICbbCoP6/t9M/dNwIUTDD:CkgUiIakTqGivi+PyUQrunlYl63Nj+qt
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7BFB311-F40D-11EE-BD23-52C7B7C5B073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e00000000020000000000106600000001000020000000522923df8972495e80ff5cea905aff6a187d37f40c13b63f112c0c49e9abb73e000000000e8000000002000020000000f672a796dec2f4992dcbbd4e8cf6733dc8738d3febd66505db7b8ad68bb8db44200000009abe00e12f3cbc08595d6e2fea54e5530af5110a4b7247bc58085ca84f5d00884000000046ad67224dae4a96d4ace072eb66d77fe6134a284a5ed0e1fa8d7be6a39d15461534739f6c8c30fea3d6dce375f77ecf261490a009ce51d8318adcefdeb9181f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418566893" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90cc7d8d1a88da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1928 iexplore.exe 1928 iexplore.exe 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2904 1928 iexplore.exe 28 PID 1928 wrote to memory of 2904 1928 iexplore.exe 28 PID 1928 wrote to memory of 2904 1928 iexplore.exe 28 PID 1928 wrote to memory of 2904 1928 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e2802fd418a8962538293a23164edab2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d5bab04ec9c054a8afe277c23c2f7ac
SHA1b966403e7511e6c1c956587723863fea73f6e521
SHA256c37d8c2e0acc5f60e42fd8c89e83445b81176f71a46e3a662e4991ecba6da441
SHA512ed433872a4c3a6e511bfbc479a11d7aa1b4be9c1874fc5a9d9354d95156fef11aa93f70e8096c904a09221f5cc8d81386643dc5574730ba7560f39cd875b7afd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c67a37578f00fbc67ed756add22a8540
SHA1351812c92d111d32403d7fb090d16e78ee6c3593
SHA2562c13041de2ce9d7ea51062cf95e619e9361480dea96c528355c873d28546de9d
SHA512d243cf1c738ebee4c24648f69144d0158fb4e25c443b03131ddec4873f3716f0c52b8eb2102a7931ef2ba1aa09c8d2c19cb8ff1faaa91e7ef2c135c44c674e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bf0e4db6a96ccf7fdc67727ea123c91
SHA12aaedcc950b1a53fccdf4cc7b1af83e97ca15234
SHA256230ebdf2e327973a22a459e2da42a71a65206370289f609a01301991f6058316
SHA512562344cd59abe1a7d68c3048fdbd11d7bb30797a0122c9e247181b78d885765b94ab263b300b7a6f1d7d220161e59fa320b22f3e6469d6e633f9678278784921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5212a3664ed132460b922073adfce0692
SHA16b31b9ed339c7fdf062310cd55080a1c320a84ad
SHA256ef542fdf95dc8293b3a5f92cd49ddf3137cca9e900ae791223ae93d370e47a8d
SHA5122695e94f4bf61fd365985d19aceb407ad9004ab777685b456717fbaf9943c3ecb3f3f84602a035af614f8bef25b0742ea340e4ec02d443c5f26538c86d0bbd7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e20b92bedc6351527ddfc7f2bb3be6e3
SHA1ea0ca34fa6304efdfc2547d4d9d70b6e314ce30a
SHA2560f9eab6b468a5239fa33e3aacedb1b75f3922ee14f71ee92d053d98474bf8b67
SHA512d55b1dd8ae6d2bb98fe8bd87cb226f5cfb15fd6b7c6461fcfc0e87ba39d97fc8a25bca04d425c78e09d2c26f0c8385d545ac81796082d8b15dd3c37cd372c3e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4fc9bbfbb0fcb058a37d643a049d1d9
SHA1504fb857701616f690296ac990763b517878638d
SHA25607fd73fa324eb949b410d27aeb1390af0fcc4027e62bfe3c9021d53600bce47d
SHA512da89528e7b6407d74fef8ac64fa4fb9e9876797bf70d731c724f7e00b9e659f859a3e146dacbf9e6038d7ba96d853d471e3e4d758d86a5ab1fd3fba5e44756fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af64772f1ad9e1502d52431f698bedd9
SHA1c72c137e9a4162f1953c611d0d332cfb2a565435
SHA256030fe3388a021702ba4ab309ca0ce24145f52b8029cf2d2a2edc0613ea6c25e8
SHA512398414c394182c44cdf3e17afd622b655fabcd8551f907bdbd9b6afda5a747f76e997d07739eb0a7ecba96d73ded1785dbea04a39eafa57c6074c5fa64bbe353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f2458b2b6bc4d4d912bd1a2ef8a1dc1
SHA1310af4305e5ce02ea9b5822e0ac7e6de5b5f13a9
SHA256a6aacf51d6bdb922844c280f96d5acdf54324e87f73425dcaa20c60403b3fcb8
SHA5121dd2f72b6da8e263a28b652fcbc03c2597e00a9cd59d0ddb81b094a19822de80e2907d7993d265cec2f8cfe26eff05aa79bc43fdcf8146cb967a48fbee8cd20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc0d6f45b0da7e215a6e4ae49074e643
SHA15bd67b9caa33749039cb27d3838a30bc7d98e440
SHA256c0c6b9c87c38bf7fac499d8aa78689a6f65e1b78ec7a3edd12577dca05919060
SHA5124113ffebc8a5be794f23177a16a77ff1c192a220b6ae8f5e293696398c11d979d49bac3b59fe1e68765ea71d5f1a952bdbb1eb9dcb19585c914aa1f075160d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d90ab6db9c8b6ced550bed62a83e6df
SHA11e46a7f9cea62672187c42424ab758bc17285016
SHA2560ceeb8be312ce7b652cfea26735484551b44590f52ae44285768f75e1fc4ca80
SHA512f7b3a65ed74c49b634a0d0fe0467c90b8af4ca5c1f1cd1f5937b657a23646b56eca68dccee54783a520b5fa405b21bc343550056f557d6c161892a436da35594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548ccdb04b422cb0c956340197f1ec388
SHA1d4bfbafd97e1f9dad89d99d7b5069a9634ab7df3
SHA25654eeed29412b5c5fbf0f21f0f87f461f4c2943cceb8222e1f2a5e289feb84f8a
SHA512d9de7041153142383f92b5ed1542ddca0b1a4f4484cdb4f968be91b985e336c4ccddf5f21a652459d7851883c9521ab99f54f68b173345a39fc02de031700160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c33147c925cff66ea118639f0eb0d6a
SHA1c10da6e0dc1ea06ad371cb38d583f661c558feb0
SHA25610a93e222b9b4afca7b40188d2f9658530618117b889f051a751c37da140c190
SHA512ad72501064a06068489547d135f6b3a70a7db80d561ef0451f5b1a9b31c5269c4921dff02da0d7027d81a7d27d34d68e57f4b23746b78b12538b2b0db3f8d4c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566f1a6da3ef79d17c67d23925a46768a
SHA13fa84fe76ba209dcf6674486be95f73d64181370
SHA256b272bc25789a74a242f891335eec25cde57fdaa5d04cccfce6fe932b6f65b3fe
SHA512c223581ec8eddcd1bc2514f7ba793f23975ea5e0fbcb469e280c63daee1db006b9187b9c63d22d9f712f40546da6ee518e99913d94b587280077d21b58e7ddbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0bc67404cb12d57c9e896acf5573a88
SHA19c23bc13296996539aa63eeea8147e525c1c1d2c
SHA256c6a50f8d05d8350069ec3d94d90c49e16c44127c80b63bd05eda4fdccb666845
SHA5128ae4f95fb8282875999116e8f776cc29e9e2a6d8af1c93cc10e800ca89f384e7cca80c1fb560ba2f7c453e123d740ff2eb5cc3391d75405bdb3b11e41f3310ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6d5ac62864cdefaa1e538a67b8b1050
SHA192a690e7bdb2e28ff23e4a49aa6827d119ddeac3
SHA25639b5c0379c5705366eafb192d3588e8b938863af48b1a3c9d9e85aeb3e4c233f
SHA51287955b6db922af6111bd6f0349e918e67cc24db2cd2180019febb88ed82baf9921a847e86d936bab1c7f6574f1de68bd11b7b854a7725ec89d37e65cc59f5dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5341ed8c3bd99e9f09829ca0678359cd8
SHA1dc83b4de08e8f3f65a3982c0af107aea28eebf16
SHA2568122941e0cbb71adc45587632d8ea0a39735ed0f7c165b6ab0b2e85e104563c5
SHA5120f1309a1b46e98eea15d93a5531930222af8c42979d0207171d6016355c8d89093e31d31ce8234c5e91457fa6732f10cac34744ce0288983f592e0fcaca14a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a73f2ee5f88192a06607432363e3c249
SHA1a46aa079b2d7198805bd8b6e47ff59be09201962
SHA256f90b2b9e181fb1e727157d7d9fe06d816a8b2a082d8a48b4dd0da7a5464e6ebf
SHA512883bdb5b118fe5b6b5ecea2c13e14b752f664cdfa8422768123cfa2a7e37dcde3f708993088b5758c97f9742b6b8221a177cc2206cc74d530cb09198153dfd3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc92f44d2a4c36079da24929cc975a29
SHA125f233e962982c1b2dbe21bf9c7db1c46f7b35ad
SHA2567ccb91ea7b60c886a7585bf51b1cf60a6a6ea7e9448434552ba36f2764bddb5a
SHA512bf7993496495354331e252bb21b5641e8f3a32e160e7af77059437a05cf1136550e310be4827fcdb66704542ba26d142ee9ca0ceab1720feeb729bed88bd502c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591dc85b6fe75decb646ee0950daed872
SHA1e49464a8212d73b60f35c845626ba7df9e218d3c
SHA256a23706bb07d446b7b82194be92c8e9758c46be10ac390a5f7e2b82aa2cbf63f8
SHA5128c729b4dea29a775f1a18c4146406516c7f306607b6a0da8aec199fdc23f599e328d97379e22a29d8034243cff8718de5f8cad91fb87331205d7f83bdef6b7c8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CTT6L9LH\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a