Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 03:03
Static task
static1
Behavioral task
behavioral1
Sample
15b15b211ef77ab805a381c188868479_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
15b15b211ef77ab805a381c188868479_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
15b15b211ef77ab805a381c188868479_JaffaCakes118.html
-
Size
94KB
-
MD5
15b15b211ef77ab805a381c188868479
-
SHA1
41a1cfc1008beb12468e3e3bc989600b5c099388
-
SHA256
4fd3f183ed5045ca4656181fe5811aa4ef272a8b89dec5bcefab7595a2477ea4
-
SHA512
d8ec533a2168a0809542e0fb757f077debed68cfa520fc2034a5ebda1dc2304cbce8627fdae2c52354b657633c9a3d3041f1231819afe23d676dd643285104e5
-
SSDEEP
1536:WMLiNVq8YWfwStXFL4Dcp+F7L2Gv4AfV6yGbZqTBdkrY8mgHC+qpEyW:WAiwNFBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50534f709a9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000004cf8f295238bbc93539a0e7754938077e316d7a9aa781ecff4bdb3513f902fdd000000000e8000000002000020000000fce985614ac30ebceaca9803b2398db8d2d7c71d929447f817eaa4b31f0364ce200000000febb04b66c31a477fd503968d52dc3d992be77b0b65a0d922490e162bdae15240000000113aeb0ee18bd25bba2f7d183dba1333ede812258a9001ed745f4f1e9793077cf44556e7ececed63e53eac1b4258049e72d05ff2da493dd847e2a8f1225dbeaf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98F6D351-0A8D-11EF-8CD1-FA3492730900} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421040742" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2356 2172 iexplore.exe 28 PID 2172 wrote to memory of 2356 2172 iexplore.exe 28 PID 2172 wrote to memory of 2356 2172 iexplore.exe 28 PID 2172 wrote to memory of 2356 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\15b15b211ef77ab805a381c188868479_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5349e2c2e4d01f4ad0691c0b7ffecb2ee
SHA1c80ca442fc99bc8f4d4a06efcb4490d22237cfab
SHA256afd64572c8ed31f435e012c3cb74576759ba6629510f894e794ede035bf06538
SHA5125f7390130c0ec0ce146e17203fcf34dd3cef3369c44afbee852fff1085c3b963a3aa2fd3fc9c2954130d4a5d8e22f9bf7b42f01ad5f7370ca285e552b18fd34b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5675f4386e8aaaff603ddba166e42b781
SHA18db93b97b0cd2b31f1fa52dcae22a3575a57ec02
SHA25668c62c8756cd4a3da658833ee613ac230e1a08f5c4ade9c72507a6e153d8ded2
SHA5120e9122a10f19b95a91dd4a7072633fe9269e216db02925862035a318fadf89807dcbcf88af1f358c22cf6bc790040e875285d96c3185f08e146f605add1d45a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a85e1e9e19725ad50a88df10a43c4702
SHA1fbe1d9041e81ec70551a7fb9a32082f00525540c
SHA25650e16a926e5c22e71456b130cd685399839c3cb8ff88dfcb5c9b713cdfac0d7f
SHA512d5dd3810a89fc1352807f8462e8136956833de1ab9052dd2e8d0e3eec76eb590ba2b14a29895c66d39ee757167a02c6238fc12c7c6fb82e7194f91a326adf6bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530451a5b8b3b1b53110b0c6399f0b713
SHA1da3807c9ebf59a8ea8811904f46d0376678851ad
SHA2563e3afbe2f6d3ee99f43e7bd4260abc71ae1d6bce2819734df3ec18dabab1cc30
SHA512e2926f85bad19599e60fc56268dff13e51ee36dfb3572e97946b30a71bdcf34eade357b16f5f8a1408af09080ba5f4be1f13ad5d48341a6bc5cd5f0db7eb7769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fca501dab5a334ae7f38c098847622b
SHA11fe747f5a254251daf8fffbb91daf034dfdc6bdd
SHA256727eadafcb3aa546fa433a5c00dbdd773ea77737c7e6f52365847b7296fdcbfe
SHA5125d87dce3367286066921a72aec617dd31d62930e071a228f91de53df29c312cbe636efde9cfb4ef3831fcbff82c23c6ceb2e8aaf804de8da01d66997c7951403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545019e3cc899a8f489acaa8a9c6950b5
SHA1c413b2be08e50dbe57dc8b393280045d457d23c1
SHA25683501b629df63a3e5b24863f1e7eee8adb394501d1fb6b56314d338b33da6cf2
SHA5121df06a512a5ade8135b7dde2a3a0bf9ae3af953e89bc8f62095a1e1882650a2927ba6693f1cd67cf0ccbad94d94c559d5d5c620e86617f36d056f980e405d1ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7003a3a09aeabac4ca77c52aa88aaa0
SHA13f7da56be3f61804379c1dfb01acdcf72f153a4f
SHA2567cb989b4412800b310fbf74eea3adab3d9a6380fd18c190a288ef30090a01bef
SHA5123692c1d9ebde443318b1b84843861cf93765c845b4092b372cf6175bc7b2ac4dbeec4410731e328a1eb080ccd2d79a59d1b39d800bf70059ee7e7c120287339b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5e3c765623a168ff4afde96fd009281
SHA1b278b20e80487a3666bfc70304a232e0aa29d852
SHA25695f09bfcc573c4f38b4787646530a1c142e44bb725f9b6c2d42241ebb821bc8e
SHA512fcb9a3d58f49c67900b75fee7be974395d3a6a0a441885c01c26f415771347b94850cc240433ce07878ccf6bb547cf04d9041601536ccfec1bd3f9861b0dafa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53656ea9338dec630a171af2a1811baf3
SHA14eb6c996839b1eb3d102d97ee09b748658926a21
SHA2560cd1a9a7c01a0b53a1f91f65bbe1c382b53a4494450ed8d7fd3026f9fcbf57f1
SHA51285edaeb1a3fb106104cf0ff1929f232f2cccf6ec817b936365f91b9d5c9732d9c38d0ffb31866fad97ed651946883bb418b3194935963494c9c328fd2ba44978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538f81fe276d0c29772b440c3cf39ac55
SHA12e220a24697eb8ff64e60c55c38ba3656425ce30
SHA256f2782214088805e856cf8c162a918c534a16fcc2e803474d3d5bb502dae45b74
SHA5123d97984d61ce64b6e93e7487c4ba6666f431fefaf86c2151b520ff2a9fe26e840e09fa34addd230e1ca31817cb6f8631997cd97b7d0012585d7ebe998884cffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6acb6771f053c69ddaf11d9eef70e52
SHA185fd6a9d3adde9d6f4ce21ab0d61b952a0415bf0
SHA256e87575512b85be6defe9049ceeb7f8edcdfe554c869043a755ab514e90c30d3d
SHA512184a29e1be737aa3336dd5eb0a48637dc6eb051436bd0ad270eae98cde3f4d787f0201fd63986d82c7ca0763f31c630c71adcc8eaadf2eb4f9ee8fe1c2a6214c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db05326c3a96eba78a30d38c11f3f839
SHA1317ca5d7c0bc492158173a01839a9c52776c33f2
SHA256cec00cbd493ad26e9f3ff3bf877b877c46cc410767065d9c1b2fc6c68e366375
SHA512fb9c54869027a44f8bbf09358d46332ac37d24304c91d863cf28c5f8af88b833ab34d4ffe59eba732e410d222ca6ffb2c16ec9662b1b24c555859f4a8301d602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2b1ce4884aeef9d933a52be8f20d692
SHA1a5685ea206f679e72a3b69c6b4295f499fc00821
SHA2565ad10fa883d83f7d298d129053f722812a17c4dfdad99e86e1ac4f6f32b4be5a
SHA512d6c081a0470a9dc5ca531570ab749d54e34a2762afa6fdc4fbe58229e4e90b31b1cf163605f81df300be3b959a47dde56fadf35093cf8f5719b58505d9ae57a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5209d89a306ddf71a5973fd37f6f2d941
SHA1e39710518e390a27c01730f263302e5d8c8213f7
SHA25685606cea5fa32f5bdf29feac4a0c76771a9ffacf8aeaf5a5eef23ced6b4bed89
SHA512381d12f16a67d728170482094c02672444a75a2b63d8713323f0aba9a49e1d148bbce47ba0e19f3c056035e618ae0c521237cb56b4a099b6da31b7c34dd8d604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c54707a74d5790d6a816b273f68f17d8
SHA17d0dd61404b13e7483786dcf73c0fcd10982faa1
SHA256d88c1d0ea0830cff9e5646cda053ae66e0b595bb0b0cd80b853b0eeee0421c22
SHA51220d38909a6bbcedbbbc1d1a963cd41098a650396879a69e5b1a1439240d2b80e01ecf36a4d7b640762dc2341c69970dafaa960cbe6b699a9947e2e4f30c24438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5f15e4c6d7b0ebc316dbb39aa51017f
SHA191c3e6f95c6f2aa53c806bb79c9307c47f77d3af
SHA2564375bf1b91511f4860bcc6a2eff7b7df4455d96dea7ae2758d307950917c4afb
SHA512cd696eb794785a92ffd9695606c2de746554b8f6e92e340caea1b512222ca4122507541da87aca52d765443c7b43a6aac849f775d3c23ee669e1997267985688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9df03f46d9c2bf696426dda21d75665
SHA145aa0abc50143cd5e00ae1466fcc7105c8cfc047
SHA256180008e92079147b0599e5a9c0e81ccae1f7878bd3e4b9f6ceec17d89d9acd0f
SHA512b4f70a4a64e2a2568005ce89d00e167129b86c206a16c825ef20522d8db79200b2ba3d741a5823b0ee55d63a7608baecd9b47b07e6a56c5905008886f63b4463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cae75c7c4e227c664f901e611235ba96
SHA1729b13ef97a91dc21d457f10a3ab56f3704720db
SHA2566c7673f1f66740e881ef7546d2e378076fa8e99e6791077ad7bcd7f9e978d97c
SHA512ec9d674db30a32bb9b3e876a722ece89e4c41303df8cce74ad025378f4629006d1980e487b365977cefa2ce194120cdd06cd34e693e66796f1ac6cc0642928a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6e0e2892e85f175d7fa31ce1af91c99
SHA1dcaa99e3311bd8b7de0bd8e84286613370558cf1
SHA256e486c5d4b6b1255b482f76f3c41d1a0213581abbf67a91f40854bc6b8067d439
SHA51224268481885d783847e6e194b7bc57f70f92c2d50f9ea69cc1c947cc5e1ae72e2433054c8b07d77269b95ea17b3b27b8d93ea3d91df3cf001ace90543753eb5a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\content-slider[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a