Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 14:11
Static task
static1
Behavioral task
behavioral1
Sample
5f7f8e2bb5d4ce2fd616625404eefb1f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5f7f8e2bb5d4ce2fd616625404eefb1f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5f7f8e2bb5d4ce2fd616625404eefb1f_JaffaCakes118.html
-
Size
2KB
-
MD5
5f7f8e2bb5d4ce2fd616625404eefb1f
-
SHA1
6405913d07d1f1cd7f616e33e074b720c8eda3fe
-
SHA256
52ab194846df45b6e08b621624a530bb8fa8b1ad5fc3adfa33f72d98692af425
-
SHA512
ed3e37d5c6cd59dde866d6866ba14cc1a769e69322c9bcecc370dcb2438f885d648c586ec398a6c61c6968981d2de2c79c6428137ed79256e17178344974cb27
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422376186" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000f1b7170c4be873f8aeb9016cef78bd81fe4fff9113764cedae9e0c43c82562f0000000000e80000000020000200000007fd559e7ffe5b26c5b69d5efdb72b76688735cdfab45409ded9c3201f5cf4e8420000000eae36c94c29fffe41ed443e525398ca8d905ac263b4e1d6be069f7cc97f0db0740000000462fadd00f2b6882b2560b5210d298b1eb380598fd32945c353ca086c6eb148371fb6cd65a50ab00c4c2da1f159144c154ce066f30605d935079836810a4e7ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB85FFC1-16B2-11EF-805B-F637117826CF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f06147c0bfaada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2436 iexplore.exe 2436 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2348 2436 iexplore.exe 28 PID 2436 wrote to memory of 2348 2436 iexplore.exe 28 PID 2436 wrote to memory of 2348 2436 iexplore.exe 28 PID 2436 wrote to memory of 2348 2436 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5f7f8e2bb5d4ce2fd616625404eefb1f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e38b4cd49ba80d5a800cd83cc80c496
SHA1272afb14ded8fee95e2d93ff4d4189174de2a698
SHA256c4d2144626f9d2e56efa5ae97d13652890f6e6e652dbe2217c2c9ba3c08a6947
SHA5124e3e2883dfb3abf831ca5fecf839ed53cfa1b02bfac3b46c6570e57d4b8ede385e1092e6924e2fd4baff2b5f27cff4b4461850674307b99e2f267d878b9b3af6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7de08dd593460579b81eb0be9ed253f
SHA13172214238d74a99d7292c15f81590c24e0a747d
SHA2567a8f8382c823f2521489e9932edd3e2deefbb47e85068a16e3734d5c956a985b
SHA512add970483f8588a01363f8658e877623d9b6e44c19db2fd0ca317aa345a8b4ecd9366d655d387d13e9231f1aad716b1dc006f9996c0670d1e90d9283a71f3ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2cd5de238f0d55544aa5f4817867f77
SHA1ebc2441bedaaa0dd34523460ef8add1c77b61194
SHA2561ce270676bee41d136cdecd606a9e5c2f6d545388f40955664364fbac672859a
SHA512c56ceb1050f0f31ce5745f8f6e438976e15c5664855fb97b334948a0f9c60e5027d9388d269d87f0bd179d622f7c88d3c565da37e5fd224241e6ece88f1c0975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc15a20cef8e23947df5d5dbc3d04ee4
SHA15178dda27b61c427ca0b522282cdef7fa585674e
SHA2566ac9ccdb98aa2aa456f72f85d576afd1fcf94c92aad67fb15fb843ad867d9381
SHA5128ce6ce435fa0cf7e2e2a071e0a345a8ba661bc64615056ec15c35a00371f4c7364f570338d23c7591395b440777c771ab325ebf9923e25eba1a6fe3d0d559a3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d54e5a60ed71b232e1e3aa0154b57709
SHA1fdc2e62548b6c5bf622a11ebe08eafa3b5eb6cc2
SHA2560d9a4e7ba0584bd23f4f972a30dc3e4637e8159c61a2959ac3e915f883f2af49
SHA512c0ec0825d5f28c567a73bff3090b222624f0a8d7d9d765d00a09b46f09d60e5dda75085b5063329e0a289af79e870442078e74a11adb2eb54d69f88f3cf0a8d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f323df2368090628544923a51b67dec0
SHA1eebff8dc9a228e5d4272ec4528e6822a0ab00865
SHA256ce969bc7a34da0f61820abf9662b412c90feb5679684552a82481651076ea238
SHA5125d680a1afa7db175517a8d8f9f0081311aeb4e4b4a48e9ec32c930ef8d8c373aec472f94daeced9e5341eec351d8485123650542bc0bd10e2146ce7d4bb8f403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504ef96bde763be28a44be0816a7b5853
SHA10ab85200cbc10f0721476c8818ed89e876960804
SHA256640bad418722343df24643debab443fea699886f5b51d43f12b0e9dab7a2ce5b
SHA5121d8feba89d01b2351595e299503be326d1d5c728a30b45b2221590d17dc75635d5f0fc95e4bdd9c8e3c822cd6af90e3993af7bddd6c3a55674d5dbf9a9008566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af1f6acfe257a1843ea4c1deceb9a1dc
SHA17c886fafa0393706f44a3c553f48a0abe1a2d857
SHA2561ddd592e085c3bc9ae27b53e925b278abac61a510e8494dacf4190cf7fb7fe1c
SHA5122d8c22c5bf5aab56470fbf11732e0917692c93d28b3609950c3a22646a3ae72bdb8d843a91152160f809c5efdc5f6228f044ab9d11ffbfcd1ee7c1f3537d77df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569c94909d131160160200b7fb1b0679c
SHA15ad7ee6e873438494dcfe352314d5faa2893b92c
SHA25655d8362292879063515edb5a22da310854fac37289e9558fdd856b18c5cd1352
SHA512df51cc3aa65decbaf952000fe46bb4fdb022d950d8abccca5012a013738d010afdd5559f518f7cd92d61caa36e643af2be6db24098fd0548321efbe83563c4f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e138a46ef8852dfe5266cec4260a004b
SHA1fd2cafaee319c63217f0728478282f1d315d3217
SHA2565df8f5d57f57e5bab708666c9e5eeda4612bb86dfab2725354c1f0d61034e08d
SHA512420aaaa48b3aa2c5c6048cb0e4e7ee7992fe399b0ec261fd410aa8e30cfc9676cf862bb50ab33c40fa900e780a34188dc1926b287ea445f5804659dfde9951db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9f9a0413163ce1b66b36ae27591667a
SHA10342cb2ef80899f13d78e0ee062a84e48a216a00
SHA25626ec77efd30a250eb56972b323b1ccc2c208db75a79255886d97cf649f4d6e24
SHA512fcf325520a2dad4422ba91103192ea779e86269894d04f2286f668456fa25ef2b8b26f57ed0cb7e5ef53364556f1e1c5b2fade6e89f189b32e2ecd39c4990580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e384c639ff9f31ea8d894bea8c6b078f
SHA1c61ba138f5119409914693c5a3f112c110a4a1d3
SHA256d774b8b67369f11bbd999981ba3153b38fe7ea98a1efaa485c5db3c572b47e95
SHA5121bccaa51d40c0e7c212b2a55a11b5015c96a1691ef7bc1f10f07b3551db4b813b4dff9c1fb0688a14ca2ba504ba0a2bf6eb91d4501801a81fa1b0a22e20ffabe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce583405e510fd068d01d43ec0558fde
SHA126d89c9d54c45f847634044ebab29adeff0f7cc3
SHA25672de210bd18c4cb9cd4ca4475d12bcf9fb1f6c429a8322f4f0759cea4912ff44
SHA5126bc7f2878455396662215a1880a06c7fef7528a0a48dafd567a22b6ef19f60ce2612bfcaf11806510f5531f74e908cc482d07b9f728e6f8829c3d6f590642e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f5e236095c66970dd6744a0f56a1b0b
SHA1e011bad39128ecdd7ca48de33d60e807235b6e5f
SHA256415f1b93f5fd1b0d93aab902b39d36108efe20eb667f6095604ef6690a3f8873
SHA512d9d35000fae2fb5f576bf3f5374052af37f8cb2c4726370b33d170e941e65844ff4823b347fa67c52bc59c44f7f2aa58a8ace04fe15f487bc9ef4c39a1172a44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bde877fed351e220c30d5486a117a54
SHA119bd0d3e8b12e13a3f68b665147f606e2c3ee2b7
SHA25665c93c6d167a38619e5d31c87d0e018926fac8fc623fbc29d8a2c6dbed41bcfe
SHA5122f0bfbd28ef2ef925e0b2d9679d70e1a61ba924afa8b5c573a3c7d38967533331b85efd79b0beb4d3d50e9eff7c26a08716030a9ef40f8e7805f68e9a1a170bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e8543befb9a05552b7326cf98db99cd
SHA11c6a718bdc13d7ae8569e88956f30aecb2ad39ad
SHA256ded49887f510fdcc47dc7d00b97045c4770560a152c52514e2553f7723f6b033
SHA5126b347733f61985245db645042c4ddf33bdcbfaceb2c6e9fc9f063d029ee9bbb2b9a2ff94e07aae5d1a0cacc5e44524cfda83352395c2f7bc8f1441a48fdbde0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5851f3aa8071d9e2069cfb22506661e58
SHA1e7dbc14acacf45b7d341a2b6d260487e9ee0167a
SHA25679d433043c86796e74824d29ca5ea719e5d3ee531e331466e8a4ced923993a8a
SHA51217e66e28bfc15e1a219faee3b4c96b9223d5faa803f4c621c738f07ea159590449066c44abdecc14d21616b07c7dc11f36d6d261570a934067c5c565f97c4034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585cc88f05e3d09f280e197f939a8d0ba
SHA16fff5e6003b02b1b894ed2fc717d1373c832c491
SHA256703e41bc8876b932348f5bf797e9c6ee3e1012bef84c5e35d36e45e58e764d41
SHA512f4ee4caee1bd15a16c08189f0265dcaa43ee9e2d4afe4e931e7f28379ea6498583a7a3f034976889b8fedefddf9ce057ba6cbc741483ce0cbecb204a19309580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baa978c58e94e7a113ec3ebdb0f1deb3
SHA1129472c8ec28599f22a1f0b0535466fd60523cb8
SHA2568cdcfd7fb7472a1aa71ab654d60f9582600098200c857a1f9ff67ce2413ea3d7
SHA512b79a1ab2d3afee24be9dc779fb7c77d5ef1829cd1366e9638e01aebd8fa2217b9d95f4d2b276595e5e93f63b51a7d319614ca036f488e068aac75c7be4a77e51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53245cfa5313423f4af493d921047e060
SHA1713d68f36f4253659bc85c29bbe5eeb4d5b5422f
SHA256c49cf3dda7a4590ab1a22719dead4a07c32c26a1cb4760aeca5a6488b87a6d2d
SHA51241a0278d64578b543a443ee551a51f4c036faa1e94857b1467801a4ee046d6992bb68ae1739db6619c1a2b319f2660160c19d23c2ea0f1571261309288f5105c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d891b485274706501bc094bde77ef872
SHA17e5fcd02270d0e187672edf3eb4c5f8e0ee63214
SHA2564fdc73043837a2de4b4115771213295dc905a16fb88c5fa3ca3cff36e9f080d6
SHA512428ea507b581aa69f11e0b51130d65005db3670c59ee4adc94de191e563eddf4c57390bab8f1070455895da303dc0f286c2adbd2c881c72154d83bc7caa0e3f0
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a