Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
704ec57b45c90db11cd119f0eee6cb27_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
704ec57b45c90db11cd119f0eee6cb27_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
704ec57b45c90db11cd119f0eee6cb27_JaffaCakes118.html
-
Size
65KB
-
MD5
704ec57b45c90db11cd119f0eee6cb27
-
SHA1
92bfc403762f7e3359221560210a6f15c3a68522
-
SHA256
3bc7ad143fb62a080db23d88ebf04a42d11ba92233d9eb4372daf30fbcd56c6d
-
SHA512
1774838e18cc3485de0a76206882326409b318d338f5299bde6ca3eca877240dc6fad110b98092917788d2d5084b36747b94092011b3ccc8bfed4fa960bc8c7c
-
SSDEEP
1536:Sh7FcjQ60g0jIjYtanMw+xVyZkv5vT4q1/yGEOw:SPcjQ60g0Nmi/yGEOw
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422759341" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cdcc6d0c33890b4fa5aed2f3118d43a900000000020000000000106600000001000020000000da883d7d48a944014d336317c811899b04ebe996d122319f29f136dd5c6d21ec000000000e80000000020000200000008d2e7ea4cc856dcfe11b314e0a0b79d782e9cf6c584c2ea98f1cd0e5a13b2f1f200000009130fa22555e0526c2ce92a8ac4ff9dfdf18c18f1f9f8af30c2ec98c1811793d4000000091db35ef5ecb6a78d3903426449db8c05af61aa298a24bc4396b99c2ca69f8793bfcd71cef182ff7da8cfd56bb2199304a7f2cc75fe14fd27e78db3eeec1f9f4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05B2B671-1A2F-11EF-922B-6E6327E9C5D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2059bbdc3baeda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 3032 2220 iexplore.exe 28 PID 2220 wrote to memory of 3032 2220 iexplore.exe 28 PID 2220 wrote to memory of 3032 2220 iexplore.exe 28 PID 2220 wrote to memory of 3032 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\704ec57b45c90db11cd119f0eee6cb27_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5205ab17db1a49bb831552a9b66c844a9
SHA1b3236c0ffc7b2c519a4a812f04b04ef7c73be50f
SHA25631c58f0927469e28b921dbeade980ab5c58e56e4d88315df6350362d9fdbda19
SHA512f5548dde16e8f5d381cb85b9463d3257a68d1d1a4e12f9294d9c8208b89a6e7ec4e80a59bef56a7433d6d9faaf611d03a6774f9746c5ab1b178a24e27eb58541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c45cc758e4edb9a616c9d02c9311daa
SHA133021b6f61cfbef3341c1a8eae9ed02cd683ee07
SHA25616f4f71da7ab9dd007dfb5c1c5e3ecbdeaec1731f7317dd09f5e94acc1e36d76
SHA5121f3206ea2b70bd8855aa7b338f2bff26ac292002cbdf79ffbb6bc710f73cff6c92b813d69dca2cdfb136766e959b100b6f7ac40667424d883b944c22ccc0fed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585c705c68b084138f629d77d376a8a7c
SHA1ae849bc47811528295d7cccbcc32e9e3f3e810ad
SHA2564ab41a5b0f75b206dbe6ce0642bb3c233f02ee83f72bc3f515acd79749a10c82
SHA512b02bf7a904da8467ac601a6bb9ef4bd46c5fdaa3398f34642b4c32471454481cfa58f9f30acafe2df8c0ff24580c218913de4be51910d7298472a84bb722342f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fd20c8abe013e321a051b85c9fa6f6e
SHA1162b9cad9d386573ab45690ed33000b79ba02d0a
SHA2564915a5bff3fe1052caea20150e7d1228abfc285a985cd56a41046c47f61359dd
SHA512c0d38eac2d10131bda19cb967ac7a35b45365957e63d69e2fababbb38a1e9beb1c5d404d50ba9ada6a2997b0f4586c092198f3ed8003845a09f68b9bb7cf5761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f52dfe119531645eed87b9b78ffaca6
SHA1aea2d94b43cfc216ee3ce54596abe1737bb38197
SHA256711d68949a5835178a166a20993cc8bcd091286eca792fa400fad425ccc50312
SHA5124672a07a55992b0ad4ead896eb7c4aed7648b94a304c3f2a293e0cb4f5d7c803331dfa2f68e1f26cb91c93ac65525ddc90f86dfc9ebacda8feff454d6acdb7e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8e6e007af844cba03fa0fcaab3cf517
SHA144374be58fe687f4c7833e773db504cf65743eae
SHA256f28caff7aaa9664899d590c9f0866897cc629f30e6740a05e14b534f0edf1eb6
SHA5122bcda6978429962dee4d95d496278a661fa836e8160ab3bde591c34d8c2cb7065b8251b5bc77c9c35279276191ebcca5d5e2178c3b8e95205b78c80f913052f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592798ebf27f76431c739ed5adca98cad
SHA1bccd84e037393b649daefedf0fcd86e936782278
SHA25680eeaad4ade6c7d68f3524612dad257a80ec746bdec0801307301fb675b064e0
SHA5120ae6ccc587d0422dc090bc1d539925a942be7fe01ccc7659122206def21ac8b94558bee3bfc55392fd04db14b1a40ced3bf2ca0b5d1bbe697089655eb8237790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58570abdf1b824f9be0fc8434e1b67397
SHA1aba00b01fab94af4bed5db004e71515b8724d9dc
SHA256b4d35dc6ad2a80bc81575a2607736657cc0c89f415f9645c9b9205a95937c6c7
SHA51279afa6f3863a180f017dce1d2b260cfe62d0562d3ba327f4d6800e8213dcf8c6d22b7daf6048ded22f21b1ffef29b70e9b841ee7c7ed25b5f0ea571651aa682b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccea08645761c57a95d2819816890bfd
SHA15c4ab7ea84700a3763e67e420b67434164962b44
SHA256acc54f987a8ec951d82af682d03a770b7677b871ff9c599d705de40f275b4d5f
SHA512b79d80f2fadcdad44b1b88c62ab4ca64a40098b9b4d8e66f3fe3122b4fc343cec0a9935598953e2546e7190917ecbd7a4f4efbfa32cde94a35a3986e29db7a5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d206496beb7cb31e0a6e8f469ecaef0e
SHA132dd293fba2b79cc307fa290f4439c3a3d783861
SHA25610e68c5cbd28a396c9642dec8936326bde03eb6b10bf6879780078b7b815463a
SHA51238200e11b01ebf6b234dae741d109a0efd34c8a22f24c1f05f795351ffdbad536a1e28c4e036fe467b1c212bdd9deb8d62a98d226d9c0f61562d797b3b1c14bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5861f098214040e8d7c16126d5d70f779
SHA1d98e7672cc5a5392f206097ae37aa38a32cdf2bf
SHA256e3a650cce88327351c1fc9d4042d8703fd1ce2e657ddd9cefc4cbcd009492e6a
SHA5122cdc284717f186d7a608d4ceea3929e698df9b46b0657e4f4fd7988ad73ce467fd3ec34ee4a360aa61cd3b97b68ace8c3c76ebb0b992986d05d2a8488663256b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599ab8abf5afb4188cd09e4207f7cd27b
SHA16a7fb5078fec23daacb21e73c079260b861f370a
SHA256e0414dcabeb4e00ff23f585286c2309c991b2308d21a69d817ebd4f1992758fb
SHA512db339415caecd47faf759e43da1309a9f8631467e68575b9d2dd03150bc5bb074dd5754c9846f1af88e998b7a64218764f2c31f32ea4999b421c8ea36d687722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bf11f4bbdb61aac69f3ff3b2d95ad40
SHA1e00c83d717c4682af2bbf1b395f9174939c4f9be
SHA256137f573edd77851d1dc7f6a9afd4db0dad618a1e3de25347095a3753d56af44e
SHA512d8b4024d6c0158c160855e4edf4ff3d962365677224b84d583cd4f9e92d2e80a606f1ec47ca361e20242b96cf17096c6c11c2fb4dba8d4c668896c5436bb85e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523333c73043503dc4df122af857e8ac1
SHA137d9a03cc64506a0c27e7abdb97613f7586b40f6
SHA2562285f29a70275e994c3e1e9198b0a566088116a8bc57ebeebd58fe42867e64dc
SHA512610875eb6d75662a2753cf9e2610a399465c1fd0eb6c475847f272202ceeabd86ffa6293efa88e4d4beb0b5e371f527433bf2af4c4b8b140d785292543846489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d480632078ba8e1241fb083290bd9e5
SHA1d0c8b7e9b9ec0e0d073e8304689c4727ee4ebea2
SHA2564697e2e0058f2f16359fcd41d30416aa4d0bc2161ca50bc8719b3f25154da788
SHA512294645e5216f121223e2eae307fed446558de06fd60f1fcae565d0b1760a1d6e86ab60b73e3520bb9856c5af077a2286212fdd69e78941e9d5de1837ebc2abc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d507e46a2121d4f6a894343b45eab674
SHA1f766740ed58a71d7e5fa856a8be3ed06a9e49c69
SHA25654f79d5dffa320be128ed5bfd7d5c8a134bb46d925b33b070210e94698607ad3
SHA5124f6ceb7799a751db410300b94077630646915e81c71220388d5c07da63b3667e89021c94fae3e0a86b270a74ab020581fad0d921f69c6f5944df13841f53e3ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e855a8d04aa11b4a7f99e2415c84bf0
SHA14de97406b704bc2196c3bc3f2f8ebc877604c850
SHA2568973f5d616230105b5b22a4978a37dabf4f07b931c8bbb7f37619463bc3fca13
SHA51272cf03dc710bb9d14b48345072bf4c04877d99486ff08c40abdcc053f1c8176640ac94217c9643ba4cdfb0c9431412454b1b6ce94a1184300daa8417e4e7573a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa54cc7604930a83efe1c8ce8dae6217
SHA1afa3d7315cbe1c651710403a161c137d4be422a1
SHA2561d2f6fd575cc5ca4f7e49bc35b089dd18fce3fcffd40fb3410e19f899cef9346
SHA512af2e6e69273495b90140f5aff82858ee33b41c1cf689107a5782484f7c695d715a9b716f8756c20ff2a09d04c9059aeb359d7787fd98d768f2ea9f6331260d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e44d86fc53f1b65e4eec1df48b1411de
SHA16fdfc851308b8ceb4dc585ecacd476136cf6f7d2
SHA2565a67c7e3cb323e2c2630086cb37da8984f270efddc7bd0e0ea5157a5409ce53b
SHA51279afc88642934cc9bcecb770988dda2501b56231ab8fee41925f1037cd56f615253eec7883c087f9a9275ca13104e33356073635516cfa49d1898d91f461eef7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UA1HZF3D\audio-player[1].htm
Filesize1KB
MD5052a7080ea56864ff41cf51f88891a3c
SHA1c73e62d2a5876480e10c04203d94713d53141986
SHA25610384cd1980218483de796b19b1b9c1b9692ad96e85e3eb3994e8498ee4f3392
SHA512be12319ae146f672b4d55f195273dbd9dd6b9bb3f4013f288165feb0b0fa9b4e88b404608bb46acac5a0f5c2a8f739edbf20d26e63fe9989161165f0593b2e22
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a