Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 05:54
Static task
static1
Behavioral task
behavioral1
Sample
3e1d197480dd112ddee52fefdb919316_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3e1d197480dd112ddee52fefdb919316_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3e1d197480dd112ddee52fefdb919316_JaffaCakes118.html
-
Size
169KB
-
MD5
3e1d197480dd112ddee52fefdb919316
-
SHA1
1263c36cc02582811dc812e1bbcf922c0a86372a
-
SHA256
c75d9bc954dcda1857a8571773c2c852f297ee78196b4a29c50c73b7bbed3046
-
SHA512
cce7e039fc5d4ef4d8d8f1ed300b60aec708d0329a5160bffcb5d51b43af205e9f6edc4ed07e09f2c5b0487bec7a92329a27b23d2a94583c09870a8c6d12b68d
-
SSDEEP
3072:HyfkMY+BES09JXAnyrZalI+Yf9NgY4+zv:SsMYod+X3oI+YVKY4+zv
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6DA6C9F1-11B6-11EF-AE27-76C100907C10} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e00e3e42c3a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421827936" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000063504098e0ff04d1a5c203dc2ccee38e263d020f96804d1be3c19659fde26cd4000000000e8000000002000020000000696322d9712da61a971a5f5601fff81ba3d8f3b43e03ae543fa748e51361deff20000000631e5581be585aa17af41c9c0e3b4dab54719745f340e6a05fe2859ac2843a3f400000001eeea8601687e11b2d4bb34755d8a2d6828daa1c77d3fe3df3c6466a1586a416a20f5db629a353347b98b62c1e2d18a1ddc50df2c500fc8890b83248f9dd0691 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1752 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1752 iexplore.exe 1752 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1752 wrote to memory of 3060 1752 iexplore.exe 28 PID 1752 wrote to memory of 3060 1752 iexplore.exe 28 PID 1752 wrote to memory of 3060 1752 iexplore.exe 28 PID 1752 wrote to memory of 3060 1752 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e1d197480dd112ddee52fefdb919316_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d90a3671c09685f3973ce379109c2c9
SHA178dcf9915fcf7a90d27cf15fcfe911396c86104c
SHA256d0f9c5f5078fe54f70cfbf1f9e29ffb9d1dd88a26c7e81eb625df026360aada9
SHA5125d8f371a74893666ad6792616e4ccd65296cee0c36909d2f457733f220257e1a6d7d734169634c0f89788ed8ff1a1ef659fb94a05b5a8d8d6f685fb70c5b7359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e55d88109911a9177063a29091ca622
SHA139e5b41d7acecb4a8a9cab678cda428f6dc9aff1
SHA256f485d92081d940370781bbe4287de412ffeb69e0c14afd84e3f05b31f4cc461c
SHA5129523765af24ff348dd809ff24e5494c1f625f8761131c8f015da1aea458ddf4b5e09a4c1acb527a55573748cbfa82afadfeff229b6813a21ef897d00a0db8e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6a62e050f22e41f0ab0591a7feeb724
SHA15456ad4e3e0465b65a14a69d714cff5f98406a49
SHA2562c37595a62388502edbd6d9da9604b6ecd7be4beb9caebcf89486b72c6bb0090
SHA512134365c106ab0b316375c8209ef5e15e0e1dca99483f748e8d9799d118ea6c7ae3ae406b775e758bf2775f5a792275022150a2e8e72ababa83f5d9fadb3b49a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519611441647149ce147c9e92058c9bdc
SHA102a2922d60e26554f9a95d6b29a8cb3957c84ad6
SHA256b94337eb7e30350e3022b545a1e3e15319514485eb4a0089d7210b240a0ecfaa
SHA512e449fab89a8841f811c2ba326aa5141fe97ccd4f9e25584e6fae3b6041ee1252714d284cbf98346b1307df8ebb61177b77f7e931faf1d503dd32b498021d511c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eba65c0a089b9ad269e615d723d1b30
SHA1dadea6f478f88098a4c27591008ff6ce50a64509
SHA25670b92e076b12b175db1af88feb3594e544a17d03ef286b9b15a22f08da73fbcb
SHA51298ec0a46d4094c1c0200ceb2f14dc664d0bde16347bf7a33fbaad51052c264322e7ebd65b3c9267e03a00e5ff31af1e0e58f1c9197bde80aeb959e5b96c8a52a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5095ad2d94d5f238cf5474ae38a9f8545
SHA17328c14de6f1c7bbbc54488d997e30d6e9bed012
SHA256623de8061d454244aff305f566468453d4cf70bbbf6e1e4749929f8f35b24fe7
SHA51286f41db876a6e43c00eea667fda5adb0ea3cb04e6308de95ad4592d9103a8fb9262c4b7df5c73ae937c8f9d40068c73cf4d049b76e771e51b449cc42e7cb328b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba125b7ac72d1a68dadde2e3b01bbfc4
SHA125d038222e499c4bb0a3d3f98af748e5da280f57
SHA25675a41ff242735d41c6d32055c96dadcef162f343c4514926826888cf0a8f7f88
SHA512f593a547ecedce1e3a2e87f0c8f992c80c2fce867254a46bcf8ea9d399ceada124369f4b1ce5bd45887cb869d179487a441efc603e80dca5459832f0093ee10d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8af4ed59de7ddebccdedabe84ee872a
SHA12819bd838855233a5d808f7badddd771f82ee9ab
SHA25696481fe7765b6559547d3eaabeb119a929e5a155f3fd99a82b1de8adc2ba3627
SHA5120e6764ad9c652ca3651f663cddfe3dad21ba26796a758f032cbbd1450e8862dd18b3dd0f7974b481081e02f71ac8e7cdf628ac8092de0f95d466123f868db164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f79c97ebc6ca470cba0aee41022fc29
SHA1726abde853ab3348ad24b0f14ce9bd8e43d661ba
SHA256805ae5469f2a1abd3e062a83c34d96fcc99b4beb9f29128fad2930921478f4f7
SHA51267592608af1034b8cd76d26b7ac0783a8a44708afb4d7b581a080193de4dc4683cd4b01fbae206abb3a46e6bf8c25fd5319ba2c4bcb3ee060d3110c445ec2312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522bd3463677debaa49e9f5ad30c5aa08
SHA1cadf147dd3e3b59d9fbc04e232d1af1ee9da5674
SHA256c0675fa388e731a777fa13a1f3c9d63408897e9260c3800da1e16c7d302a25bc
SHA512bff657de41dbc72977f00c271a7b9e60ecc3a52935c4327d0396676c64bc984539d012b5ea571127a75a08bd6a4c2318e0434900b2054a90297cc375f9232577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570117a91ddda34673147aae9beb52b65
SHA145196ff4cb2a36fdd0d11214d6cbeeecdcee5f3c
SHA2563907b618413477ddf675e4e9822055647cc6c7e777566af0b476ce31459cc233
SHA5120ed9778e3a7e0ef374fd9ff835bbe1fc4086c7cce6b7784f69ec4e2f60e2c889ec67cf58a94eaf044b15e2aef56a78f73566dfe40a462ec5a23df52bc47fa95a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1de703b806926d6c92ad4a6e0d036a2
SHA169de605d0f2c7afebb2db4a457b3ccaf8796ad0a
SHA25616fe44ea0012ebf5d77f8fef073fab262e83a8d8427e04c20df73ae170240b2f
SHA51259eac22d6b700f9b5f14548f3e2af9579f80a2992579f5e41211de00c01acae1da68ab20d4e5f9db47792453da8aa9e7dda6fbc969be0b0e5c223ef554be6174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dbfdd750512b9ed74144e351b9d4d85
SHA1c5d6f78831b13b6363678b60cf9c417ec847b056
SHA25679a99422dbad9a938bd02cee9228dfab6e7fa87d1b745526579a577a0d01924a
SHA5129a642c1a43381b2fb686965ca5ce792efdf05a7b47638ace79ad2da724c2bbc5e2cff5e5ea0d14405ed5c9d14daf3de70e5c66497f14b1219bdc439499eaa3f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e19d0538da01c6a2f6a17d4465817c2f
SHA1138c643c76e12608671e7cd732758e99da6053ce
SHA256ae64361fd2a01e8767834564d5e29b114f92b679eb2b8695d64c93d7571e8f46
SHA5128b2fe43d8c29faeca853585b1c40330d382a504653e2006d45f8f3c641afc2848e830cfc61aff2317958e0109a53030e55ba33799f9b979deb0644f6e0bbabc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc9a7a342eb075673e0218421a19cf91
SHA11ef44b87e4ff601c91f249d06817d3d71a259dfb
SHA2565e3a62b25fd14e54e89ce36a5ddde21e5f711415d7de034f79978152fa4e2631
SHA512a9c74f1297c93fbf3a69843315419c5ac19119169d05f5485ecfb767c964b4350e280e9695a13d708c2c2e48d0775170541da6fb69ebcd0806bbe50987003e32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5680b030374c15893d39642d37acf0052
SHA1152959fbbfe0d184c49f1c00e8b141a4b932793d
SHA256a20247be310a8c005beb573a6dae1f2c080d20b1000cf63c79ef4df578f162da
SHA5122bdd42257b57e3c5f49a2e2723c1dac53c9d39208bbcadaf6bd3b538099ead4d432975e7c9c58b7a5a8537e250e94944b84861610e870c8b4b8448573b0b9a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a00b86ced7143c76c1c727fe6e9a009
SHA15cfcdcd05aaef36d6f98a25b5ffc369617553ced
SHA2561ec4eb000bbdd7700e2cdd01f74ecf883e3774f92c6455f61caba3d541d7c036
SHA512789ff968d6af54942fbf648482e4205248515533a0524e22cd1534970938a666142cebec48f56398bf3ea7d3054f947d820f86d6e731c3ff179e9d9996cdc7f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee583789aa04481c76fe9f12829e3935
SHA141e877baa96cad3c0ec24de5f8fe3867c78b2a76
SHA25634fb7e6ce0d7f33dc878cb4567388f1a641cbb08be86cc6535c37c544eed3279
SHA5125ddc3cc6c40f6dcde210b8977652c6d46019adf6632f20da13b2a4e59f5cc388de125bcfd0059576d947ce62371b4b51dfe10989e50a462669169d3fa5ac991d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f1ce8f9641f031c535358124627ddc1
SHA1bca9455066e986815fe6c959067af3edb3824245
SHA25698fe5c675994a36afc8e3c657cc70d4b6f238ac8b81c14a9187ff48563a86131
SHA51288a834e46584e7542b1fd1b346d6d52dc4fa248d216c4b71c706f275fd805f55c072dc56d121aa56ef651dd0136529e1ec2a4810a9428075fa30c32555ba63a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550ce04bfc6a615816818c91be01fab60
SHA1d4146446872544ec95e598fb680f8f1c5a7d3abc
SHA256996a9d6d7c256931aa6a77a0b72d0bbaba019d1cf15bbc8c293219af1d7ad296
SHA512c47d363362554dd347c246b15a488dc87c4db0f18ef49e92311b54e130709c3f9e48969dbdd99ed71852f117037eb4e7ed46d03c0051c5e1bb373a1827924de0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b8127861034a08a34de7c8f9f73a7b2
SHA157416ea8dbd40a39baa850b6ae5ac27f1df3cff4
SHA25676bb51ac4eb7d1a80cd884c52c76ef5cfd85dfc7c508e41d6f7d264f65da35a4
SHA51214977829b1229138947a09c97b244cbec82c9e45b2554e2add59455d362d27c64f329b23925b2c913961e38fcd643119308e6eda794c7c274c46ca359ff019ff
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a