Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 04:59
Static task
static1
Behavioral task
behavioral1
Sample
4e838167408e2b4492fbb4431f16928f_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4e838167408e2b4492fbb4431f16928f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4e838167408e2b4492fbb4431f16928f_JaffaCakes118.html
-
Size
6KB
-
MD5
4e838167408e2b4492fbb4431f16928f
-
SHA1
99599bb946e594a22bb13fdc9fe3a8f35c389dfb
-
SHA256
7d16261ee23eb9953c4f4a7a6888fc747404252d7f68ac54ccf95f8f3ade5fd1
-
SHA512
18d8e5263d45346991d2f2e0dbfcb1bb804e397ed880acda646d623d16bfc90db2e0a171e4ca9e487b590a25427f74ed35db682dde18be64c136fc4760382175
-
SSDEEP
192:Is9PQbNPa2uNUh5hJALVWlF2jIEtT/W3K:B9Pd2u8rKU+vO3K
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0c7770917a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34FBD311-140A-11EF-AD30-660F20EB2E2E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000f7fa0f40f9547a22cd5ec7892666c98623e4f1dd7d4adcb5531fc087237ed47d000000000e800000000200002000000025e88be4b2e803a007707929a48c9da9f9b5b85485883703ac0f17130439e13e200000002aa3889285b9df1cb4dcb05238c26d001755cdf0366574f849567ad247879a3440000000f33deee574f7d48214405075fb224793277bc612fd89c08287a5f2c5c715db51b554e652a92ad0080254e00aa3c474569d8dae1495be0ce87d04838320e1f12f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422083822" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2696 2072 iexplore.exe 28 PID 2072 wrote to memory of 2696 2072 iexplore.exe 28 PID 2072 wrote to memory of 2696 2072 iexplore.exe 28 PID 2072 wrote to memory of 2696 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4e838167408e2b4492fbb4431f16928f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7d6852d7cf0263d101b500e68dd0b90
SHA146e54b7f0d5e72c1b73a2fde455701bbfa9dc895
SHA2562309a182a617f58001d1aa3cd86956bc8effc95a057b27fb1a4cc499262e04bd
SHA512e034087af06a07b6e081f616cd8f1ee5ab86267af550a9b507dc0bfd42fe3207836dfebb06e776271b6c8de542a74b0be36117e8ccfbe2f45a03097f0fe46b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd319e59d7dc84366d2b1ce68a194d44
SHA18d946d8a7025f9d67f433519de2321bbb2a7369a
SHA2563f6becc23d9921f8ed4d2abf16f4a241648fe46735fd81a3e247e52d6d098f63
SHA51211e97e94b47198ba8fa4a4f27f56a0c31c7eb2676ffd45976f6192243fa48f6571cadd0138310364b56d3b077f2db7e1fa90a70f2145c990f0dc7379fc8852a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511e2f3cb49b1064f703a82010b5c3a1f
SHA1f775f13b9933ac45d047fdfa30ebadfb1b6920fe
SHA2569556614b52f9ec1003d3776506268ac372165af41c8efbae547ed515bde0b903
SHA512d00ef13574a1220b250caa565b5fa22640d469e1e89b74ab093b8fe6079568a5706d76e31812ec269a67ace8f936471f5eb3a6aebec4f8f2fbd04aefcc664f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffae840ef6ce522f76984eb120e6206a
SHA1b772e5933e970999ea02f07806f68b311d2c153e
SHA256c3dcadc32953ed640df13f98a3e2597f3625e5311d5b40ebf2129534f9b57b4f
SHA51224efcd01154ddbacf977920eafb3f91dd1603c3b7793500d1ee4a83c958cf0e8541d6cf744b52b56596272ebc377bf4e05e3d40a655f9bf9382e9cdb202d60df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f06c000a1091e095274274408fce0a82
SHA14dc52de1b5b6639dce2b9cdcaff3fd688d1aa751
SHA25607ebb17a2c6c16f1085d5aa2459eaa767554079ce8b1b18e4d88ce981d5fc691
SHA512305308459255a38eea09bdd6b6161d6ca20264bafb4828f95ed72041fa6a8ae7a64b4b2d4e5e1ca1123b4fb86cd95941eee0d5e6bcbd0907a1a47be324427775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f32d6a82e50ec79cdbd9273e94e18e1b
SHA1a55be7ffa64ed09e93da9b89cb1eeac93a2ea122
SHA256206073350c5be77304e9b3da1c82f7e9bd6dba99902b93bdb8fe56a0dd42986d
SHA51200ead03424e6ad6daa289aeb16d248f4a4736f23f3dbd279e973931878ceae1dad3094781791e259e22941368137a3169859eb0c9196a926401eeff95b04ae02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557f74a941d1bc86f1b3451de53a1af23
SHA1e69fdb14ff0c9bd7ea04e73752b5963ab5c66290
SHA25662159cc1c4686932bea14cecad18964fdb1daf3e8116fb78cd5ff64e94aff7e0
SHA5120fdd8b315d051f0a12f179df534f299b23d99c359a0bd5040a23ffd9e081453eb8024bfecb1f97a3d9cfd82d4c1a0064e9f3ccc85fb9965087eab937e034ae06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c80c1ab57c441e1704243e4ad21f86c3
SHA1a3b191e84c8cdf24b012d31840d5c41767b88f17
SHA2564100a35630b95130d8f1a8aba603a3211151b4c0be4c7468b12b94b0cc2276cc
SHA512ace8f81353e5a87ac3ba864971099148709f0b75be3bff946443a56617cdcf2df20b999580bc35ba26f7870e76ad9b83642f7e249f5e5eac2b1e059933acf9c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517f8766917497bcbfabcaafc9edda8c4
SHA13b3dbc8493fa012ca17b2d99ab936e51357e7df3
SHA2565fa6005f60a616313efee74dad29e5b20518f032f4ef9fe701f149d32111feee
SHA51294d4f9f4b234a2088ae147e979575015a0d5a2971ae3ed163d050f52e87c19cbe4b5c5059f7518e05f51ba5e86d4abedf4cee2f4da1bdb9e787991723312d9ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5733d0210e0adc89f1fe951ec7aa7de57
SHA1b5c39dde3f97901c7270659a7d4c10264907b68e
SHA25631efb4a054bd9d21b4f3a6ed27be03fdd904682a98cfbde31c6cc66831455ca5
SHA5122773cb12d049541ca87ef0e87913fe7bb91ca955562700a139716bd65e376aa0b60ee51f331dcabfa46584e336a1481b4cbeed301346aabe3e2cf7fe8983a1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f57cdbb5f18452e854e9cc422dd52677
SHA1e06f923b44d1cb3586228004c1d191596d191b72
SHA256d64ff9c6ad79503ae3061578092d7ec1d5ca67d2af4a94643de30624ebdaa86d
SHA512c9e5baea6c06ad7e4f45243a78cd86f0c9533fbe336f1bd6995668daa3ed24f3cc44b32c3e26b652fa38ba625a92af2fb8fa16906c73594c7d61175479f7ac49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6635e4aa38963b1daa83ac39c1d41e8
SHA16b1500f81a8b8ba1a300ad77f3ca25e0973325bc
SHA25630ff3bc11213d2aa725b40edf604a65c4502856b985f7cb6bbea8b11f2a2dfab
SHA51278c32c7c1a853a7f6c06d1fa5da314e9dc7e64a536c8cf5689a5422d0043badc950691fae534d9f53b266d838462755077066cf1086604c1532293b7794152f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5daff04aa7c471eb287c3c2ae23252e0f
SHA17debb72358904463d65963ee7e3f81502b07aa37
SHA256798244c36e821c1162538807790cd9f9cdffecde26e4c8502655f5f6b790d85d
SHA5127f7967425a1293d3a4ebf2bca5dcdeb8983690483589e1e58a0fce849ac46b8d6b31b8c61fcd0982ccfb276f846c0d0c12c3c93ae7d70a10f5b7698f5ddf3cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d88b979bedf0c7ca625f3fdb95a03475
SHA1c83175886b148e50732134191742f1960d31bbc0
SHA256fd194b6afbeec56737bafa106da149c1978701d7ee57fbab10baa9ed5a487265
SHA512485818c939faef6bc48cd1352e815c1a0d5f285055cac088682f21de0bdfdfbb995d8332e10993d929ed1ff257f67d81058c9681f9f5283c49f1f68d4cf7e692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bdbcdc0e517bd66ddb6c580eb66d307
SHA1f6dea86f2dc023aaf645672c70f43a41839d9de9
SHA256f239c288730fb4d4d934ff3eca2e5da26a2c31d87f550b61eb7c92f0981ad9f0
SHA512d658fef06faad72db4ffcce4a131fa4fb8326dcc05655ddcf538768c009e154c9a2bcb48fce54eaf9c91bbd24f3daa7c98800c3958b9dbebd707a0f77e48d295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ca3e961c70b50f258dd2a4688b70650
SHA19bd2669532c43550fc268e9ce71b8a1a5b3364ec
SHA256e232c64f6465ca788f0e4dbdc65e985393249b0f04d2f784f013d4c5c4660ac3
SHA512065b87257adb8cb86469bc6f849e121df2247a65586dd97d39eb9f69c820c867d91d3b5216405824c0c390577f6a45ec72d6a43e194268bddb3829f764c1eb8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5187085d3ef00456e3128fe329c5dcd24
SHA16837a5b6632e0a5f784b30840f0e526d2c4e26e2
SHA2569be6e5110135f4b26c2f6c49b802f829813acc97b6fb294de33132a9f960dbd2
SHA5127906a760b86794f43761072654e1dbea175bb012e09b137ffa7cc7e6ba6d045f83176392f462bb1984168c3da4f1bfbf5e3b98fcfdd3d4bb94a934841ba2c744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cd0c8abcd390be312378e2f8e3c5719
SHA10d462c4eec4516e68a8b08797f6775301b34c8df
SHA256c3b229ca95fb34ff96ebf87c13d836fd586e95d1c6248075c0ec83ea1941cf21
SHA5124aeb19740f615fe70234919c3e0c3f0d982f50303db1e2f91e2800dab6f1bd869e95930d2b6ea1489f1daa2614313776e683c1bf0eed2a7fcfaaae8f68981bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53eb24bca09e409507f08ead0291cef4f
SHA1c9158a3ad6c206c44049097d2de445b0fa1eaa2a
SHA256b92cd08d14d502ca4259adf8069ad64425bd55ab35517e2c3f59cdeb95c4881a
SHA5126b7b1fdc66d0400c2bfd4e2a3dca1d65ce0c38880c684ddb063a25c83d44261eaacd58e33fc80b40337bc5968cd152d95db7688aea5986951b57da9aa141fdec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50caf85499c33126e9df2e317bec0370d
SHA10a2f4a0ffdbb54cdf5fc392af6aa92b5b7769c00
SHA256a9ebc53f5e1e8342b46ec38b238036a25c515380a6e40a7b713468bc49737363
SHA51214b6905b25c528a5682ee8aea0eed1ecf296917a88e04363348fb246578f4a1d7a266552b5b84563bb49c9843afb20fa1796e632b28a6aeb2007d15dd7ab51ac
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a