Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
8c815082d6ffc32005b1027f44bfa148_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8c815082d6ffc32005b1027f44bfa148_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8c815082d6ffc32005b1027f44bfa148_JaffaCakes118.html
-
Size
25KB
-
MD5
8c815082d6ffc32005b1027f44bfa148
-
SHA1
4b381e8d89a44f9360725589a2d9e2d204130cc8
-
SHA256
af83aeea78d5aef7a5a85246a210d0c00b3c76f239a954681fa5e0614396d4b2
-
SHA512
ec54bbfb2d8feb7ceeebd01d868107c346f4ee10fd3e4cac1d9fb1340f08d62b854e5f431dbcc1d3051f22c0c8c2641789e9282e947800824db6d07930bca88c
-
SSDEEP
768:AFwRfVekhuEUCDCKC5C5CCEgIOuj4mUDH6ddjkJuE+:AFwRfVekhuEU+jKKPEtjxddgJuE+
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E8F40941-2081-11EF-A296-4A24C526E2E4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423454647" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000feae081d5f190443b44cdd3ef563043e0000000002000000000010660000000100002000000064e29f45f0c83a8d26e6d7beaf0ced9fd28ff105317846cd92a0e4b34e3b75b1000000000e800000000200002000000011bf1001abf032099633afdd4cf67c4bea355429514b6d24b871d50e30af0a2d2000000073b3079080a28ac3a576544c4b778b7732d40acc95d20e9763f145c0e2056af1400000004dcdf23a23b728169884ef983381c5108e6f7036cb39e3cd8bf6e6d099ef86e03338718984e1488f42dcdb03e8eb38588945cac0cea8b642ef369891730c993b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 306486d98eb4da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1660 iexplore.exe 1660 iexplore.exe 352 IEXPLORE.EXE 352 IEXPLORE.EXE 352 IEXPLORE.EXE 352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 352 1660 iexplore.exe 28 PID 1660 wrote to memory of 352 1660 iexplore.exe 28 PID 1660 wrote to memory of 352 1660 iexplore.exe 28 PID 1660 wrote to memory of 352 1660 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8c815082d6ffc32005b1027f44bfa148_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebc85e5a5f6efbd3bb111580f36fb312
SHA1b4269cce81c9887ed21d253845e89041aa6e0e18
SHA2560b87b2d69650c4ba28c276a0deae4742a30ba27c5a785eae195b7fe622b8bc6d
SHA51205ef1ff568c489bd7c9aa1238cfd42c077a3eaafc3fb96386d293a80de73cf3c497367dc93a8719bb9ee8f8891951a7704a26c57eada9b479eaf143075ce1513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c96a60291ac0f9cf71f73ff4ab108e0a
SHA1750561ead8acfcfb408f8d7f98d4ed48565e953b
SHA256185677ba9d22fd204067974063b8c8ddc0c7ef340ca9c1096380d82c4ab3c2a0
SHA51243dd361a10dd8c3f58dd19ce5b4f524c98e0c4d9d183c4653ca3ce95535079f08a0a8efe3f2b914aaeb2e1b7f41c6abf4c98ac8d2364c5cd977f1e6e6102b58e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed3d052ac21dfcc4dd217386678e2962
SHA1f48a5654a63ce8418c348bea44812c6a2f01e4f1
SHA2564ad768e15594c2f858d6f8edc6aadc11e11e72967fb6dd88fc744219d245d707
SHA5129a90d49605da467e36c451aebdd7f38b280e86f58202cf84f65f832af19a8e5b666db5e8c6151c4689cc67cf7e6378eec759aa97b178f9aeb5feb59d925d8887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5824eeedcb51bf2fc3b12eb90f5492855
SHA18850315a57fe069744c590d7153d9fb8e57a7d7b
SHA2569e666c6ee8e1fbae3ad53410a6fb837abdfec80c89da3b52dd6eca250b942983
SHA512a18c570a33d3a955320d84e7cfd47b729d12045eed392d8668d0d366753163e1785f75811672f951cbe0ac69a53294949de4b475b0a354659c7e0c063eaf31ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5493c028eac8536d7ccc465cf8e981dc2
SHA1d1b68dd98244dbb0dac8ecc4e406bd8a17524d59
SHA256413118586982f3210199b5e2d73ff9b2bddb1f9dee142cd83655ef8d2c07cbe3
SHA51204afbfa5f87fb5b7078884cb9d168eff17809dc7eee980704b8c0af3e6d1859148683a1da5faf72e6771553d725b01ed0b99ae8bbb7b01b50d08739f09638193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b49a39dfb0a9c375cdd0d42c4e78f5b0
SHA1bf73a3dd227fe1b38dcd3a9ee2bcd0ef7b66fed3
SHA256b474867a1d8fa48b4bf957142658c7bd5786caa588d77bb1259c1592584bfc71
SHA512a5979459091972f4e71af12d07980770cbf47e9d007aa2f570caaf55220e1cffc3fb378b5c971b295dab4052e7bbf75ded57114e9b01fda35f60f73a6d7589d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc95cf87e3a31dba0be8c3f0f560ba03
SHA11f6af257465c8adc9db3787ba3f852d60119f57e
SHA256773a341a3b506dc5039d761ac37d6560295b043217bfaa079855cc51ce5775dc
SHA51205f3df1d9f1dd8278f541b695c10b4c8c9f82bdcfaf25dfb934c2e38e766f8c7c4f5c8a3f68f2da6cd8a7cf3d87d7770caf4348b438fd7f0343aa64f0fa309c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5694a878f9397b5a03b150ee987ba1e53
SHA1804315b30eb4539506c5869c58468340c0f52816
SHA256b30b40f2869b25663e4d8d489acea14a77f54432a662fe8b481ee0a7d624a130
SHA5120e7e44e722e68395eb5b8785922cd0274f56b9bf3c5e43f4c52b4a0a27d377ac2a6e63cd2e4a5c7dadc56e7429ec307feed5867b7a34f8737b302ff2fd24b0b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560219cb1490a83feac192b8cabe75aad
SHA1cdd66517ae0ebafe3a35d1d1870148a4811479bd
SHA256749fae451fd0f0a15d87e1c337a767071bf83f87976a1a9763ac5552110bfffb
SHA51241af27275b066a25bce8b716469816467ae410736c15c92292aa895e626f3d80defd8fde9898fc3e9cfc325537a42904f2782e9d42d28737ed0764278e6dbcdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e71472b2f0e17ced0c0d17de3589d55b
SHA1e82ee8086eeb1e1cc8eead32f1d5504e0ff09e8b
SHA2563e4c9c0f82f1407bd229c3b94a7fefedaa3b48d10402f88de4f09aa0663364ba
SHA512f8621c5aee0e18e38822928a2a0a287124a6b131e7f80dbf2d86070947d6b29d624304ad73acc62350a37415259cbc587563bd448d009c4ad308d18f3f04dcaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5f5480a7834dec4a3c0432a2d7a0619
SHA1b033ed7ecd0cfdfeeb9b119e3fda8adcba8ecd37
SHA25643205c2375c2c021eb31338e65c493076e6e93b2d10db4cb8e431e695aa4a939
SHA512fd14e51c530d51d3d8235630a86a48a2164df24b826e5130d27be84b0abe42aa2cf0288e29d1e43a680fddb44356c2302587e5a4c98c190abcdeaa7a72be6e42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de6a00e9b87872e5feaec035e74bf05c
SHA1f793f52b7035ebee1251cee0890fc47c9085a7ae
SHA256758cd91c610062dc1e2eab63759951455cb83672f4f06f48064dc970cb70a95e
SHA512dd811e447fdab2f3d1a2b784606f8e5d63f368b25c53cdfcc4a347403ae43103be494babef9fe27c7d8f5043e46f56fe264975229118b95dcafa43c083f7a49a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cb1ed0075e2251988cadf428669cff0
SHA1e909b5f9622c8ac43f88b9fe690383a03d714c35
SHA256599fb3a803e194606019d2d3bad406cef7301d32fd248e2b6b3658c74e1e0adf
SHA512231f331b10e523a803dcf4fc579f52056bad7de30e263761ccce88eead424806a48ec58e8d7453bc28edfcd53c653f9098a96ad40830fd55579e0ff24a1abf9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f174fd6dab27b9f8e92f32ee685383
SHA18e0abade524366fefa3fb25272f9886ee3292987
SHA25646a557e5e9e5e9d6acace061375c3a9c93c72dd66c8578779f749ee24d54631c
SHA512d0d79eaf429cf70ae8866212ac32fb86c7a09fa3c92ba799da0ca7d1343905b0acb329e37ebb36cc3b104f97b910728750655086ec96ea28a07a54e9e662597f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c41517cfc388638ec4dedbcbd87f2238
SHA1ce5a3a1ff77178db39200752b95436be95992b2c
SHA2567fc94be8330fb3fb52d5e13a55f13dbf3fc1c30236cf7c6ec2d8c4f1eec2d98e
SHA51239e181bf66ddf949cc74f77afd379da879f9fa2726d560e6cff71f148395c17c1bfe5dfc1084c6822125be7ab7f963f6d405029e4ce21dd3b56f8c28f20bd008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501e6bfeed8dbee14364532cf6df8d2ed
SHA170bbf37f9b01b5a2fb33f5ed5285d423a23e35c4
SHA256fc284ef37bea27bb81884d0299948163833b4fc23f89a231082bb610139a75d9
SHA51262bb78875ee8250a28563cd89803ef53353f86859e2fe9c4f85c63a4db87e4b955747629bf0dd34409d722ebfaa830538a46addd597759ec5a88ede442621ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e726ed2751768f95c59d3eb8f41cd3a7
SHA15765c4936c300a8aeb1c08fb16ee8a6f42559cb5
SHA256e98eb0931b989c5dbb6358f2c80f9e9324edf079a144f3cb683b6d2231c6083a
SHA51232bde2b096a006369361a35e636a4997a1ad0e2bb400a7645b7d515f1fd6df8c38c40ac23f54233b3dbd9f46c6eeceb8c23281eadd59c1eed39a0cce7cb29fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a77a02e5c67dbc05e25673d97d8e0bf
SHA1283ba14c061ba4cd24650d2e12525095c998bae6
SHA256ca3564461312b9cb1edb7f432e42f289e7c179081028eae621cd570aae6f7166
SHA512d899494854cec6b3f2b36f00f299e173f646256dc2b3412a8a8a756850802d76a8f15b8b826b056e6936d6efc61fca6997776b2672f31a07947466c0d534a903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54589c3ac7d90044c3c4978588ca7fc17
SHA18df7362d10067cda9b389f4bf54c90b41c6fdc92
SHA256eac18093084b0fe72ae69e34e85b703ffca0d7f277ce27f53c4162d5c9ec32c2
SHA5124a8d0308ebd0a2dd6698d286fa706d9f99ed294204560a4b85de7e8ccd40c79a536354cb0d697bb40b83b502ed062b3390c2af3a386ab182787691d4e5b12cc1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I819HQXH\ga[1].js
Filesize45KB
MD5e9372f0ebbcf71f851e3d321ef2a8e5a
SHA12c7d19d1af7d97085c977d1b69dcb8b84483d87c
SHA2561259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
SHA512c3a1c74ac968fc2fa366d9c25442162773db9af1289adfb165fc71e7750a7e62bd22f424f241730f3c2427afff8a540c214b3b97219a360a231d4875e6ddee6f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b