Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:42
Static task
static1
Behavioral task
behavioral1
Sample
6953893644d424cd7c2634515bd9d8c2_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6953893644d424cd7c2634515bd9d8c2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6953893644d424cd7c2634515bd9d8c2_JaffaCakes118.html
-
Size
13KB
-
MD5
6953893644d424cd7c2634515bd9d8c2
-
SHA1
52f1e3d071c6718e506ab14c851f18d2262f3e10
-
SHA256
304e04c2982bce98c0878163136e17bddf61ad14cf206543ebadffc0e31f9467
-
SHA512
2f32bca864e017863a89371f4ab8e79d564144f45ceb5b84a182e49f73d885d8057e4dd366ca096c859cb286c6592aad15d4cce9fae83279b226b2db47952aa3
-
SSDEEP
192:GSs6oUf23S3QmMTLWqRRlPFSrkHxwMIfgl/aBvERf+06XM:YP/TvRRlPFSrFMS85b
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000649242d82943f547b1dbe0bcf836375800000000020000000000106600000001000020000000b5da216544574fab52e2dd67a3071e01ffbedbc303e369167756781d00bf9cfe000000000e80000000020000200000001f80cf12da235a6cb4d93bc2a8b3646adc93444f07c790c33e55cb97ec1ce9f52000000020a2c6502f0a5f699b92eab854b979ccd633f48dbc81666ed3da4e923f9267ef400000007455189d87316c3af435104f7c684245086ef34c60d8282fbbec2bbd80405bfd490ef2b20a39689e72ca082c1c1634d2e78aa6636b90d853d9c03ce539243eaa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a019f5b0b2acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C31D3361-18A5-11EF-A4DC-6EC9990C2B7A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422590437" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2204 iexplore.exe 2204 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2204 wrote to memory of 3044 2204 iexplore.exe IEXPLORE.EXE PID 2204 wrote to memory of 3044 2204 iexplore.exe IEXPLORE.EXE PID 2204 wrote to memory of 3044 2204 iexplore.exe IEXPLORE.EXE PID 2204 wrote to memory of 3044 2204 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6953893644d424cd7c2634515bd9d8c2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b01b5e9522caa17c1ec30e5a11f4ac73
SHA133e67f73fc8545c444103982711c0762cbcb56b1
SHA2569aeeaafe3d1fc37e9ca9a71da24d52b40eb22b2e2fd30664088b4bfbb96ed7fb
SHA512ab22f8d873525fda68088fdb7867c5023f0582f5690f9992c27d8e389bfcedc0a6e079ff25fb60dade86e23ca05ff663a30cfe4d31500ccc9c8b6f75528de702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d81fde1873bf8b137a5305a49963e0d6
SHA19794f4ef0d44d19e73a4f2d4721d330282f1ce7e
SHA256d7a7b0029f45a79a5ca7cbb51f4fce2215325b10b70854c3d6d4f7c7f75955f3
SHA512e5abe3a2a808b7ae76179a0c571ce953039910e821fd7c468ae2feeb418e34e9bfe624fb77e6ec69443646d8b263ed6547327fa983826942ccae697acf4a93a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589e0c4264e3f628dc51086b0840f4001
SHA1bc92830ad70ad0532b62ee5315a6f18280d53a6c
SHA25623c50ae60863625c00064d87d86f4a7c63f4090f15418a07302a55052833c78b
SHA5122a632ce026e1366a661f57d45c3c02e4b3cd49e05993b6a3ce3e655eee971288a4142a1b3772ff477096d06e106b124314fe223bc140d3f302ffcc5baf90fef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8aca76377b12210b72161caacf7fd69
SHA174c716622b37d13dac0f32462c88edfcea2fe35f
SHA256ea76ebbfdb79ba7497667d4fb67b23ddf86f7bb87cd1a6a99a602570f813b0f3
SHA5125939a9e6316b002922903e7a2a611263b8bd6ecdb72bbcbdebc6952ee7cfe4d9acd7bc649d51e81c70c9a6b2a51602512f7e0872148f14910ed3176318a7c0ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc8abb86463d70f2ec8a40edfb454617
SHA105e4358960355dfe20a75804311050a240adaaf2
SHA2569519bf2aa7af0509481335ec5de3623222a2a191dbe7b0024b2f028d9c79e72f
SHA5121950c06a987c17230b352ff8d1ee71e1791d8f1dd645db35ba1a6cf7fe7fdca3be664aa72153f77c5739f917705ea8f8deb55f7cd0eb79c6a80929f005ae7e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4905e5d0b0a618040ea6501eb782330
SHA193cad5e2c31c953cad5fcdb12fc32b106b7ce92f
SHA25685ca634c98efc3d800201d726102061c6d65da400eb2a72cbf18c259fa0e4154
SHA5120d469f50dca3ccb17b59ef06a3de38f9c65ad7f0252f6b50eaf9e054f84bea8074a2d330b8c0e37ee72c61f27a8e51c8061f5b63a28306da76087649dfe7233d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6316b270c756c4ac6d514f51d68596c
SHA14527af7081aed5f3afcc1d7b119dd3e247b67fc2
SHA256ef080d66b193d23ebb4cf756a4a632fa8bfd13afff83dbd9b0fc06b486b5dda2
SHA5127b9993c648ce0c1fa74617f9ab787a082aeee77a7419b4c751b121cbb5d76817fcba02ea008539735de09cc2a6b340891ebec0f449922c7afcf934dbe8f70ca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511597dbfb9ea977b2897a69e4cb2f8bf
SHA15f9eaaed34f04498ed1d865dced236cf278d2459
SHA256595dce2fcc65bde5122790761967dc3cd96c88e84527ba0fcd93b56e7784ad40
SHA51205ee68deb089ece75a1b0e342393513461565aff2c43727181e5bff6b6b8e80945169231b47b70043af7bfe656553dfcf535b7e519b98f967026de4a4a7e2e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b913c15af339688b67699a8f3daeda51
SHA115a5e136c8c345342c4b042bcf78fa3df807732f
SHA2565425c49dd208af1985b0ce0e5b151ad59ce55338496446ac608a6c65005b6976
SHA5121c2729b7d1c5f51c25781c4029bd190e06e63ab867be2008be526e924749c7f9be506ea371041e66dc9908a7ef3da6bea44f68421dd590a59c443f063ef4013d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50814022795843dd2cd4b78e2f8bfc58b
SHA172d5ce2050abf09f78bf6673402d0d063d79566c
SHA256429d77160ad8beb9ee3b43b3517eeddfbbe07e9c7866bfff6fe8cda14e9a8e24
SHA51264e9142c587ff62d40c9a4af38214fea1f38f025a0e69047a90ad400ef016c2184f1b3546ed970817fc5e82c67a6211c81df4b50db07f9d88739878a0596c7c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0285373a91ecfcd66d37b6f3df2567e
SHA1fedffabfd2017d4ee1fa0c66ed4d4732d231b992
SHA2568cc9e7b918b455e3e6def783a84d68787842afb325bbf3d2b5b9131df87c7546
SHA512c9c354ae8e740c9eec1bfcc1e6f8225332f413c813487fb38db1d049a5621394d1dbdab81fe619f2392a4e2f3c3934875d467216767a2148f0bad86ae0568b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1da4b554d6e9fad45a506844c31f9a6
SHA142ddd9f9fca73b36a766faad67fa28242b65848c
SHA25618453bebb957aefd83f1f50c9b48c8d53f44fdf939fc0a6ec573aff8c3ccd281
SHA5127594e6288b94934222cfd7d96fd040750c5be7214d3982fb932899717bf5f9a498188f466de86581cdc3523edcaf19f133a8eb277b3e8506c0aa8c4f30e82d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51279c3b6d9839c34c826b09a27aa49ed
SHA148af2dc8a7abf9872c2740dd69cff10c58ab2d36
SHA256dd909e33450890abff0556a600b65b987937cf4eb45935607c5055a4b5c1d78c
SHA5123bf59de6bcd67a75a20d6354d8cf9e2e9d1994795f89583512d0d8fe9945c29a0bd26b09757ec5b92273f0e4bb609bf16bb37974c13191e1bb3d558078836289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f585f39b8d5dbdc474ca9efb1ec90b4
SHA1396f8a239e5c3994b4b65345184b89037990bec1
SHA2567f75f1fe1718d386d099256f54d2f9de95c034bad946ac2e70deb9e119360d80
SHA512a115a987a912f6f4f7e05ee236ba1ef39194c00ed57dba3884d1cd182e224f752f886f0fc71bb8304bd3d7a9d5550931328e84dba3733615cfbe1ccb303def60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9b41d7c92f48ac5e2a3ad0258724459
SHA1eb277cba96910d994d9c74ea68de34be819ec3af
SHA256bbb57e7d422f12f7896db3af8df82443f54f28a76bd21b4c285e84150299bda4
SHA512b4e3e7cac91226ebd937f54b34c31d841dd325f7db98506d26f02cda37bf7d987776b2ea9cdd71d0e53320461ab8a282ef7feaf86aa24f115ef188105b7369d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a75c48e58d04c6d30bc236160094ecdf
SHA17e8b19a99b9414e853d271c4636b0d0abcafe56e
SHA2560002ae65c290e67aacee80f54b2aca76af3641a884b0553b94d7a1385ae7918a
SHA512a802c56047ed73dc8504b46d98a3ab510c9ae3193a07b3f370ea95ee5863edce74d8594dc1a9b26bbc697d894f715ef6614e8cfe5630390262d4744a1db8796c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0b76cc7d6dcf7699a2c8a4c33306896
SHA1e247bd21fc55fcff8d613975252aa63dbf79c9e8
SHA2566e63a45ed2df4e4adfe86362fc3c4bb982b2eb0af657a6ce942e8047b012cd10
SHA51251b452ef7c0258b9227b1a068dd22ff9c4e7f4e0eb0f211bb881440640f13c0fe0660d5bc8c5e421774c25b7b72d05b3eb5a73f9b408d8872ed6c70d0de42ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f8256b7c11264cd91483873dd835411
SHA13d25b12d391f21cbe8a9a5e420755038beafc450
SHA256b5159fb43976d64b14d688ed63166fe8ded8799723f94f4cf18df458b834bd47
SHA5127e54887213f0d7c8af65a34ca4bc0bca7da798587da11346e4f2d2f8fdd14a4a0cf43eec1ad1dd1e1c3633191170b8b3dac2cf0e6faf8652896597b156109894
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a