Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:09
Static task
static1
Behavioral task
behavioral1
Sample
63e86176a3fd9d9745884f51537daf64_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
63e86176a3fd9d9745884f51537daf64_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63e86176a3fd9d9745884f51537daf64_JaffaCakes118.html
-
Size
797B
-
MD5
63e86176a3fd9d9745884f51537daf64
-
SHA1
01c118b02660bf83616881ddede8c62b62d7818a
-
SHA256
0a36077514d9c4ba51477ae7b28ac41595ecd7bb05337fbb6fb562fb0bf2e205
-
SHA512
5e5271d11ad28aa7a51704fc2a539d4b7b05d86a4ed86791ac1f119c26111b4c49bc7cd3d996e82a9a747ff5bcd6069a70eedc15460b8aef43e98fc98b701579
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000064e5d94401a94b40b20f1cf1bb8a381e000000000200000000001066000000010000200000005ff28099f704b759385bd99d2a6ebde54666cfb031311c18fe29acf53df97ddc000000000e80000000020000200000000338a3ba609b29fc7f1144fe53e6d03c0a31bd9df9924241d5daa344a0b9e76120000000262773fe5a3b6975009567faa57a8e65be56c1283db300cd1d6b86c1c6e4191f400000007984d87788bdff3b8eda4a4c52a6022babcdcb9b041009683fd9eea37953fcbcf7155eb182f155dcd9084a0a839a94e52ca0297a574f09be620d87525df3620d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78EDA821-178C-11EF-8ECF-42D431E39B11} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422469624" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8006323f99abda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1664 iexplore.exe 1664 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1664 wrote to memory of 3036 1664 iexplore.exe IEXPLORE.EXE PID 1664 wrote to memory of 3036 1664 iexplore.exe IEXPLORE.EXE PID 1664 wrote to memory of 3036 1664 iexplore.exe IEXPLORE.EXE PID 1664 wrote to memory of 3036 1664 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63e86176a3fd9d9745884f51537daf64_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1664 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8da58e70f81df354085ed12b32d2c4d
SHA10fa34223df8455f1d671d9eddf91d6242074a3a2
SHA25643389174de74eea6b3730fe45c258f64131bafaefd88fd430e903b6354c74ef7
SHA5124da45315158fba80da523427ea61d3c527b7fe37c75ad7ee6c11d9f334c99b161ab767f4e3674775b18340e037d9c9ec5e63a45012ab373b25836434c11a7fc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5a00d2b7498342e3507b3b7e9a16e71
SHA15225f0fa084cb818eccc9bd8b4590b8263a3619b
SHA2563d9f1e403c6a98a84199ff82b85cc49fe9d80aa648634660b4a0d0fffa5b4de4
SHA512ff4c6943cc715564a60d0216002ccf3b831fa62f8445a607738391421935df2ea559e1a42f5976658d92893b44ecb396dcb5e9ef4e9465bd46413920c7f5f06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ff56eb93b44acbf82f796dfb2f08f7e
SHA1890bf7fcf3d9fb32c20763c060456360060e8933
SHA256f5a6f32460b4c4f6143bfeee71d2c0a08122feb513521d13f512bb15e944d43a
SHA512a20a1c8cf6da7e12d621a5d617bd04ac3f2ae84f2b9f09ac45ab3d483a07f7babe350f7c920d3c494b364592624fe5d1a1837a34739f13c269a955a161e14ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b858e09f47ec64effb999f27e723eb5
SHA1a2968a6205f3ddb96a29461bb75876c900d8f8ea
SHA25664b990e88d613c7f9ed824cbc250c3d353e056ea8ddb66c93fe08d2331f69391
SHA512d6273ec06066ed06696cd0ed2c7f2c7edd70ac3d2ebee530ce75bc31184a15536121ad0c4e6269d75fb52ae6deb0f1a671dba46ec584e8d03de52ff36ae44806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b65a59846c33796a956562c384746fa
SHA1855247e1663f2b8842d87751f990293469a78bb5
SHA256c6ced0fa31257e68e2ad06d5e1fd7f71b003388999f15737532204c594078870
SHA5124a7ace0a33d541fe5db8434dfc9c85e03b06bf8a7e07634728ee9198545732daf7bbf0c8e154fc869cd14c08c1024475356680017530f7ce1e4fcfbe707792f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e9aa7f153829be92f29443143862c66
SHA1235d94cd65d5c28d2939e991522e22aacae8e595
SHA256cdcf3e5a6878eb4fd4caeaf6245bb490aa2c867294503b4527ca25d5e05c70c4
SHA512b3da6201ecef6bada8153e9a7b45445885b5c4f7df66133ab3023f27261ed3c38b635f94cc7b7a60d8e3618d5d92c218899d4625b7b3bc0ee62f6f7c5bb20920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52447087566d86b85a1367dae1059d469
SHA1695c3bcc36085bd31ae5d20ddce6822ed3ba2c33
SHA256c1d82a4860a6a04052b318ed76727cc242d61f33ff529fb3b79ce9096d91730a
SHA51216bdeb1f2da6c49a73cf5399e9d0cffc6c82d47f96fb9afebc9fe1bc43f8e16fe302ad29f39d5be4785552c3c0a7a554bf0be6f8a384c07dfebdea1e3fdb8ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d08ecafa93426e5bcaa5c07ccbe45a4
SHA1d26fb7bfbe707a4c0ede097ec534fe4a73773691
SHA2560999deebfa88ff83c7b82eccda26feeff69dca67776feb815ba30cdd1f852903
SHA51228224c1aacd6c1f0604827ba3d5859f56de9e7f9efeb28b874c65e94642371133d653b5d01ed8c2516e78bffd0023a9dc9f3524f8f1b492f2cdb5778a4002e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc6871bf15fb99c7fe5b884758923b4c
SHA1ea24db6bf4447ad555c4aa62bc556fc3c2e8d1d1
SHA256ad75cede2e9c44bcbdbedb5e2e604df910cb2827c89b2ee34795a73db1ca280d
SHA512f6bfc05c5c427b1e2250aa665c6db029f5926fbf0fef1288e75db8af7cce6d66d6dc6dc52cca06946996380ebcbfd9165cb408b62475b1284ababf527ae0b055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c78fd7e24b2b0daaa1e14d871599f433
SHA19df9f0021fa51dfdf990998366bf7769f3ea1b43
SHA256571bc550f3155b1b0bbceae8e81b05400611c17487446a31c086ae2a53563fb0
SHA5128fc93bcbab0375b59352e27ef51beac810af3807c05c2c8f6407a64fce05ab682d6e80a81afb3e77a64f2dbdbe43db3e7f6a318f60e47173eb362d51fb602049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a210b2db618da9bc34e74903131f3b11
SHA1af006cc13c14adb4a1bc2dcea10fb1cdda24af2a
SHA25683c3ca8d967ed034fb99954faee226fe7cc50db47a2c9c8dd0c7c1326b210179
SHA5124f8c3a3aea68efdc595f057b528a3a696f00dadd54334e38f7667bdee7940b250b6508a26f94d8276866b5151b5951b66707cd17729f48d335c01a7fe4565e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511987c6a8fafb9e4b4bdcb25cc91da70
SHA1ded716b579a61f61831f908c6b46cdcabdd5fb91
SHA2561702f1a299fe56180fd8917c587e3aebf778160592bf4093a4e5c77ecfe7e46f
SHA512e1b2c722fec5dbb7729c8d05f5e36fa934cadfbacd1fd610445ebfd4a48dbb705683892eb3b3e9f5a7b0750064ada76b8a80de1cedd34a650a9d703948223c72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb8c3fff0882a8924771d2f18f281068
SHA1cddddc6557def0ea82a85f07c34ce06c587b9af9
SHA25616eeb41feace6bded275e9f45d4cb0501f5a3bd5876d5bb820d0009dff62a97a
SHA5129dd0694721cd1fe42440f3b54bd79a334faa31995d8ac5e0fc8283dfc7e7829433dba23799c794a96bed26274dda13ea2c1cefb3f93c462b09c66a04355dcffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad17371eb16d757e3d7d65c0b7849265
SHA1ff98beca044f100181e6585003627926f733e468
SHA256b4c016ff3b66e424e336696a7d24dc829a780e67509b6a207f49627ddb2e2ed2
SHA512a24d7fe43a1a13fb6796fa59d12f523479be65006a2f2bf72a1b3b88155b56b39c3dcf596ecf478ed034c452864f93fba62d545324c19f5326dd8e8efb89e278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6a969fa34f8577cb2cadc193d068c30
SHA1950373dc7bb07e131d0dcb2f6de1bf611a3e2dd2
SHA2564d78b6ef9a91008f6015fdb90c202c46a80741bd9407fe31c9c38dd9f545f74c
SHA512e241358ac100eabdfd2e29caaf8443560b14c1d134f813f3590c8230bc87c6a5652c04e8ef756cc500a24ac81f8c77dc636940504c3d0a2b41561a4fce8d3abc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5800bf4cbd6f693ecdf91474698e71e
SHA1faaa396a94d5d7a6ee1fc15a568e17dd9fce5cf7
SHA256ae672a696c802fd0764c792a81e0e37414fdc6da09228e1518345065b72c835a
SHA51217cb1983890fe42f956fe748e1d4bd4f858e4a81a12afa17385dc9a6fea8e777da3327b86b23bc56b5b4c7542b7484d4f856f9451b38c3a44370ae1e505fa401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4f09234714d985f33f571278abec0e2
SHA13135ef5342c12fdaa3e7f827fab45a517aed8e81
SHA256da90735f63f317e7d29c0edb719f59126991cba13a2ad9bb7225701e0004b09f
SHA512df91e65892001ee5b859941944efa32e50658036819ab4fae5c20901b1975d32537660bf1ed6af14b5ae0694d49e1193a43c12e503db67d4418e3337089f29ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dd6d1706155b923c77660d477a5c9dd
SHA111a417472c1e03d6ac03da343ee72274d87fb4b5
SHA2567980a43a6c8f60c9d1fafa0baa546a10b0f9940d72af7723de28113012b25cde
SHA512b1e94582a8bf0bc593891113e1e57f72e1ad198df3865cdf06e780e80633d5b074ad4210111bc78fd2dd7a90c2484c9a214e45832fbc7e55a0a50d15d6cdc817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a8acdc043daf787fb6fa0ccd12781a8
SHA10a8e2d9db42054afecc1d7ab3397c474b6b0a0a4
SHA25685b3e297b31ba423b97c0cb7b8124aa258648527368f3fe6144800f347da8191
SHA5121cf87caebddead37845baccec1c85332e0eccaee5ff5e28bdacaf6f4f847bc6c63dca5ba4981ee1aff5d2db69196c276de83eb09cbc67c14f5ae185c7dd9372f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3fbdfd8f4f3c5b775dd0919f4284af4
SHA1f672884e23a4e2ef754ad3362d2f6558309bc394
SHA25696998fec8abcf7a989305710960b7fc765a0fe1d3aa0e468241ed20b8f00233f
SHA512780e7297d71d68f58eae7d8382bf26d1ee567cd9f0ab2a687e6694b80e09a3c9de563b7b115d13a14fcddff76e89ee4ed57e449b45de63b5daab3c7091262538
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a