Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
e9d1f017c1dc89da9e7ed9a0a1f3dbd8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e9d1f017c1dc89da9e7ed9a0a1f3dbd8_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e9d1f017c1dc89da9e7ed9a0a1f3dbd8_JaffaCakes118.html
-
Size
1KB
-
MD5
e9d1f017c1dc89da9e7ed9a0a1f3dbd8
-
SHA1
640da0a162d9e8cb7c4af6ecfbe601aa1cd44520
-
SHA256
57e391dd974d99d403d421e49ed73d74d897ab090ad321bc84546ecf466b0409
-
SHA512
52128459b5ea33e4abf9b470a32446d7ae22f341b441f67c0eeedc618132759d7b5a6e1c165c79d97569bab7ed1249619122ed4048dcb4bac4f4ea11cd8c2bc7
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D8DA06B1-F65E-11EE-B0AE-5E73522EB9B5} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c230677000000000200000000001066000000010000200000003659b8c426993e4b17cd3259f175367991486014b29ae3ddbdeb48a41af69f0c000000000e80000000020000200000001a203824f91de46686066a610c4a46dfe482eaff7de6ba0216adc6d0b2d4f198200000000e9728701c4d09ab8bd4ca4dbbcbf06a2880facfdaa34c42c4c09d2de2ddc38e40000000f6353ef71608a0050c3eaf4426b8df2e7bcf089609ba06987e29947a9235ada649dc01e0bc3242543d720d3a615de1d767f51714bc5a6a119e1bc071f3228e4c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c00e72c96b8ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418821640" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2472 iexplore.exe 2472 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2932 2472 iexplore.exe 28 PID 2472 wrote to memory of 2932 2472 iexplore.exe 28 PID 2472 wrote to memory of 2932 2472 iexplore.exe 28 PID 2472 wrote to memory of 2932 2472 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9d1f017c1dc89da9e7ed9a0a1f3dbd8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5485cf24adde808245d4ea333cdec1831
SHA14259c482c09b568f2f48c62eb96a0cbe7cd734cc
SHA256ffa91aeeb3862d2ee3a56531e890ad43fb32efdf70b5292bb92a3541b102e7d1
SHA5128aa61633d471eb744c0180483ff5dca6c26611b791fb47fa1fa16918ba362d57f9849bcdb42f0c494713f4b55e4e4c4290a7406387395d16b77591bae4611575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6efba8cb11ad0e0f429f58ef1ac3620
SHA1a5187af45beb5fb8de4719fc9c3d24a6b22040e6
SHA256fba21030283839edbd9668f64ee30989b6c2f9ec9354b0273bfb8450bcf14b97
SHA512fc472f63f5fe5f3de2016f28f598d334a35339cabaa4584b6c4b226d2f0b8b6e269708dabfd66d36e849cb8eefa591697a09e8689f8249ab0ec4a373a9a09f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf899858f4524fef326cde2bf31f2b39
SHA1eea1c8fa9031fced9b9aaf583f1cd3d7f898bf2a
SHA2564fe355ca951d5ed51c766f9eed0c01ff308a4befa72f330329162fb741023c97
SHA512a45acc27af3fd9180c844b17b3fd28aefc18bc4beb3366f1464132088ed9375536d2159af0d3ea44872575ed62096fbab393d1474bfc4d139b581adb46b14247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515bff85cd99b7ee029e853ae21933940
SHA1e8dc9e9631a05f9b3ac25a64d55fde72bfbd3eae
SHA25654b700b8f404b8fe3d1bcb55c179a7019aa4c68bbd8ec62f5f53619f51b8ec25
SHA512cd7723a66f728a53db5e38967565ab5de7effdec7ca3a05a9d90feeed0080d0edb029b143909dda276eadec39472c1fec59352efc2e62b74c11e0f70489ddb0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b65802065a0c77a16ade96e7102c5f5c
SHA1fb9b4bd89697ad16df793dc75d187347bf1bcab9
SHA256196a7a21d21e68d0f818e31159ffc7186d6443dfd7a6454974b1af81cc2d6b56
SHA5125a5808a3c187a11d70186ad527ea95f665322dbb7071c7fcbab3f95ab096580b9f56072658986648718b67ac44ead35f15750f7385bcb292384a591f10871598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7bf70aa29178cb03f48a26c5a14b7f3
SHA10b957610f74c4cd44b0051ee6b1e4003c59ba466
SHA256208dd688d1c7957cc9dfa5567af81605b7917d92343569229932ea8187493282
SHA5126c2fa51b670e4038543098d1894d0dda184dbe997a55c9ed7bbfa8bf8848fda7f9d2aeb8d5b49cd8141f3ec33dc181f10f700435b4f86d6e71ca12bd2bbf9621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8ef1f070e4d080046c141dd6c7f84a7
SHA15698caf5d27441c92a26fe23fd947ea2b58443fd
SHA256d58dfc7299a74d87d26dcead7e0e6d1a9d3713406977b09a5537eb7a9e4bdac5
SHA512346b07aba8f1758f05656c1cc7f23061910add1dd8f955b5f79ee0310658af3bf01a2b6d4a39b2903a13803a0979d0093658b5fe086b5980832a7174fcfa2b06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8cfda68e83b3f84258653f1e57e5b11
SHA1cee07b14ba4060d0ef5561e461ab8e2559cb237c
SHA25619cac7800ecd8f365f88f24551c07457ac3408c378004adc932937f04b815075
SHA512db57380bbe7316d9f80132f9a5966ab7700077c4ef3d68c1802f0d37e1ecca3c5a0fd43d7d49d5840dc30b14efdd2e6740aca8d83a65534f755e8c47215df8ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56af7d0c32558fdaffdc7042b87959eb1
SHA169530dc4ef05370d90b4851a36bd458ea8acadc5
SHA2569250e43016a8288ca28537c61e1bb0fd214fa147345bcd87b6a5a18494b5b1ad
SHA512bd8cf85ea175e389f2f0d1308c9be0cfe1ec7b46a19c491a08141f95b4d169a40d047e2aa2b04ded9d757c00c3e08b5727f612b889a1525c9c21a35f3cfb426b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5607c0e931ed9379f11f8c0db3ea35fb7
SHA1495cdf2cd4e517207ca04e03da83f2c805519b7b
SHA25691961acc1ae78fb6fd84244c9ac341611e9ca9a19cba597219fa76c172087e65
SHA51277544ba47021346da6ba111089a2e857e9832a8d87b4a36d129ef9c8afb364573744779bced95edb8a84e4a469204b284a8714fd8d17bd11b454ca70553d58cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fd61870377ad263a144d95c5e7bbace
SHA16ee0378bb79d7c15598db2f78c3e21b889fe5c0f
SHA25679c73c73371926ffabd501f5cad4c7e9be42b8a535d43eb58fd2f40bd941423b
SHA512262dfaff6b7545c30a69a6e944280d43f1471c8369d52614a8fb591b30aaef9e72f84013c2df8301be4b9a67524e9adca0c5b30cc83febc9adeee4e9d465c5fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54776e91815b9f0e598d87e1a26a69ff9
SHA1105a3df2787ec472c53d4437b900457f8a023149
SHA25678e316b4d43cd4c128576ea084ccc14baaf239d1a5215811364db7650fa95c7e
SHA512f6b2b5ed0f0c8e784ea656ec3a70f741d1e3a70e1c03475dd4cabdef5951a9d0ed5f93a7bf3eb83947d00b8820f8e9fbcd4e225e3235563812490cd277d7cb3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a19c88d30f6417c18ea40014178fcfe0
SHA1d51668b9734b187844ab68e31a28b40d3ebec2f6
SHA25612ab85631105e2c2945e8cac57573ea1656fc03298dc50f4d56468d104dd2d12
SHA512c597a2f430090e5117c91b809bfb944a88875cd25fc8c5bb3a4c0fcf8e9f4478b0246dcbd67b80bb5b59f7944f61c908d9ac8fb8213e8baba3d4b2b41849cf51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582aed291f9757f658d53ebfd046ff031
SHA1ce5399dd26fd6973b0d21ebfb6356ef5c36ebc9e
SHA256a9d6ff13425a76818e2b93f8f222cef0d751258a682200dd7dc3b5dd64c495c4
SHA512d8c6dca48d0322f26be4aa1dc6c530518a93bc8099d45a9506d97bf120125a3ea702bf2d2622302ff3ea9276097b0b68f3640c8c79201bc08d5bdb87c559dc9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef5f52886197b639cf5b7a7d6235e8d6
SHA1750f200288e642b57dd80500d80ea50ae3f07553
SHA2566cde43ff6f5c7b5d87e6225ee07925057efcd76375c78327633882c73b26d5f1
SHA512587f108614fec51b56b48cb1f3ed604353bf1d70692bc74d084adefdfb4b5a2f2e0a87954554cfd6fe1dfd68098cd22fb4110ca76ef830ee1c2c9450f04b556b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e74b606cc7465ef8fb858ac4206ebe07
SHA149af2218395da858351c57295ad9043b0e638560
SHA256520a68f6c8e7bb5e8851e7b9caabd4addb4bbe9cbe96c2c1afebe9d9bd390305
SHA5129213c3a6a83dbed0b3141f68be6319ccd1df7035e9f602087ac7b94b6d02553e661b30f177c0403431ae4116a8352735984c29a0db4f78a89c004de3b777e677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee37629ed02e295070d55744f56d01f8
SHA15fb8ff11019679e9ec8037d6942da771ca6adb16
SHA2562596bf756fd9b5393f78881a7697cc8cf1ea74a687ce0fd16dbe1e831a316286
SHA5128c5397f7da3cda81fcf76428fc70e25d1db8c84053926c45d32efb8e3561a3b7544036d679ee188ed1b8f8697ad55b5cb88916d87bc7d994bb6e7123fa3e008b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d21c1ae3b0da53df8e97da64eed0de3
SHA1f10dc73d4cd1040013693dd03868fd66f3b661d9
SHA256d287409410fe2f3686d270e0c55a06e34441483270b6e54df1464399c9bb4fd3
SHA5127d150d78ddd3f26b2f53c45e7ec87afc7d46c59c1cc088c1124a320b995d033924709cded8644c3fe506a294fcf4abc10dc324e7261554c82c3e0dee7159ef7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565386277f3b6a2448cd2009f0dff56ff
SHA13aece83fe9ada74d1712d427045a643e07219d32
SHA256ef2dda2fb8fe765d43c18e07bb92788083a03e6af5bcf8265f283c2295b33066
SHA5121e046adbdc2ef453846845f16f0d67d7af1a8a7aa6a899e09b67b5484f5537eb88e3f45e891624992ed5447555c086feb672dc252bebb1bb3690e7107f595589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f584f92b1537ecb3bda93a25f5c2b865
SHA17772313595128ab12ea49253bd9b9d8e04210a76
SHA256c168ccaa00ca83bac6d2f1d8d41a5fc6df28a239216e86a41c09cbdd725d6887
SHA51288039ed2b28931298ff1da847e8fa6e15df62bfe8700f2b2414dfefe67c184eacf6bcb16646fb77b170f1d5745bfb0de050861ebe57291ed6adde2eb8e329bd6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a