Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 08:33
Static task
static1
Behavioral task
behavioral1
Sample
a00bb9e312bc25f8542df22bcb5cff64_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a00bb9e312bc25f8542df22bcb5cff64_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a00bb9e312bc25f8542df22bcb5cff64_JaffaCakes118.html
-
Size
218KB
-
MD5
a00bb9e312bc25f8542df22bcb5cff64
-
SHA1
3cf8dc630c1933183736e0e536fb47bf0b2a5143
-
SHA256
ea8004c0c91ee2e76e89455261e16d80a7111eb20a7c39cdcd9545fe3e7f4b77
-
SHA512
cf870bd740d0d78cbb865164be0ee44b9412470905f1b0a6c937858c59737237c2f84e3a5ddcc9968c4f1a84c40aea4917626dd0cb9b9530d662fdf1f251fd20
-
SSDEEP
3072:SOMaEXLsnPW1VQyyfkMY+BES09JXAnyrZalI+YQ:SOMPsv3sMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb810000000002000000000010660000000100002000000006d499b51b4873ed7ecd505c724409d392aa96bda021877a50a6aff6e4d7f7b3000000000e8000000002000020000000eede0ea4cdacc44f66dc3abb10e723a67b00a48cee15aa03ec7bf5366512594b200000001ee245891b8c37d59c2fa4dc26a4192c8286b015f6fb44ae33b01c79cdf5a152400000008178b75edd9c47ad44eabacf76c35687cd11f2acc0f86093588c6fa10a839fb87e1e0a79c4090131f2f0fb52be89359bd6a1abbe80e3ef37f73cb033fe667c3c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0dcc785a3bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6DBDCF01-2896-11EF-9A0D-7EE57A38E3C7} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424343070" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2280 2212 iexplore.exe 28 PID 2212 wrote to memory of 2280 2212 iexplore.exe 28 PID 2212 wrote to memory of 2280 2212 iexplore.exe 28 PID 2212 wrote to memory of 2280 2212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a00bb9e312bc25f8542df22bcb5cff64_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a64f827125e8d1852ec9d17619849d7
SHA13639f04d32633a6b14ca639c6c8f39ea34bc9273
SHA256657ac2d1c5db7e96fe3b9c52c22edbc838ba9cc7d75208906c1cd30c115fde39
SHA5125f1f0ef96e8ba5fbf2607e409144cc7e3595869bf6594ccaf3425f9b4deb68c327f8f53f10bf1d40fe053b3f0f8df080daa4447e48cb2deb4af6a24536cc376f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb616a33f1a1df83d10c2b9045b9ffe2
SHA12fa68a7add2bcd04dcebc39cf6a093126577ac96
SHA256d82465f0e2f37593f83927d1bee326fbab0b70740d1f840bbed958e94d93ffea
SHA5127782e00c7d09f214bdaf473701558a9b1a65e7b637b7896357b621535868dc3c166a1ed9ae04e280e7c3a5ed5c33411427c474bbd4e260542dd68e4d95f0ef47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ead830abae120ddae2346a729c6de2e
SHA11d2b2e72d55d134abdab90f918620e0623e06a49
SHA256513c06fa2eb8009b7be751b82ef02828348853743a4cbb6cc2923ea818590158
SHA512ca8f37f87c926c58f64c9f5ed11e09083a6491c6bd194f1849683a8791367588a2c36c5859aa48822ff49a112b628e112736e868e62280a732ad739d9c695786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf5ce3a6261cf9c4bd7624a5099d324e
SHA1427c9b0564312fbb23e41690bf09e85496b36f7d
SHA2569f41fba0575b24eb0d52290a4fa7c5a583b15ea5add21c382c8b9e0c60115c64
SHA512df3053faf85f1ecf61b5902c1e22a5f907693949764685b196ec53d7a3913e166dfd032dd98d9a0816dbc198f53fb7219a14abed14072220ca2c16dda0015eb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e74dcd5d7a17e7725d4e17af6dec68
SHA1d9d63207020f224fadd8ca273cc49083f311278e
SHA256de566c67f1ce368c25d993753963af137e1345c0ce6cab3beaa4e73f65789cc5
SHA5120fd3f479e112189dc1bad2616b6a7c3e312b57b4994d65b5f01d6e89e3cd427ac7911cf7f7c4293a8fe18d4d98d9b89515f19c0dd4ef43b80542a89526ff54bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501206d8ff6d5652631f36d4298bef808
SHA1e243f10d1057d7893c190ef6c20fe9ef88dc16eb
SHA2563d3a6d057caaaa6b40c58ea4cb51c45882c1ebe6702f7c22e62fcb1dab988a91
SHA512857189003a97b5f97c87cb1c3b3b2910bb13973e99fdbdb5862fffbe8e75bd6dccea8d5886b5fbffe4b6c1cb4fd5aa056d59a4fc372aac8f44347bc1b0ce9dd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512d9dc44625f0a6c27b5a93665b55ecc
SHA1f1c214700ac77488f3dc051cbe13ad628470b959
SHA2565f547f73fdfd0cca38b1a97664b4153b902e8a8f63b20141e84e0e6495f1e6ab
SHA512545fbc9baba9d16ce6cceca254e5f86823e08a2a5f7cb4e099b6b18adcce42da7809a3773d8ba102d34c5e311b029d8816d6a05f9d70b8464467c8eaed231888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dbf6b99fce08f96d99cdbf902e5768c
SHA115a611f4929567281f34613a450b34e707b9af72
SHA25638bc128a86cdc4ca6d844fc3282ea13b8fbea8a1443e0dfc0c315aa2951ec193
SHA5124a205957aa5505e1d1fa73f0691151e2d456371ebcf0d2d006a68e6c739503ed15c07ecb20a1ed88a768a1dcce3fe690c0dd798c49c70e2714069d3bdff70931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5738dc38413596db629af223001733594
SHA1fd8260932066c25264a71eb2893d001f5d2eb995
SHA2567f11a1608360ded939890ad3037a42159c30737db8cf14cb9d1bbc5a9d1327b1
SHA5129daf362e114bc6bbc78be829b24f27f5be0a74e59b4e482154a562f732c7a603c58cc83c281d9c30682dc7ae620d2718cae0b0ab680c345bb9b053041f3299bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501885480d5a7f0e26fa88de5a880d08d
SHA161cc7cd601a39f2dfdbd0cab269c45b1fda56f7e
SHA2566e39edaa590463746adb8f0d2024c573200b80dc34d61b9e2ead20c9c3127384
SHA512d764e9db5922a35684d1325b229af121c58c67402a7ebffbfd3480d48bb14aea5c17b82398c26bf452305938e79ce07ec869bcb65e8c97b0b3f4af82d94cceaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56378123c9177290f658733bc60b49c4e
SHA1eab47bc084b2f8f1bd1a254d0571bd1cff2755e4
SHA256f1489edfcccb3fbf728d6b18f251d691c63ba3cf7a6af12dc58d249762770174
SHA51286828d83f68b3c1296e1724da11e669a3fbc9f22886a80a01b321baf154c6144f7264d2f6d60833d10af461e0581d21bd08e2e84336026c2ed37d4d8176448fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82a88e368645d3917309617f7cd8863
SHA11e92349fe1d64bb103968cf556e8cfcb68360a92
SHA256c56b48bc711b280ae2dd09a1b141218bedf349f480f6ff6b6b8135e0d02dabf9
SHA512143fbcd01b4ab35aade4a513915f5891ff1aa97fd71affbebcd9c45c5094e97316df3362be964db54d0791a4b01a7167a37e9b89d4f545337843aca0edb233e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c755638202fa9fa8d00bbb983975c898
SHA145dacc1cfb6d5ff375e832ba5abde42af783a489
SHA256ca415bdb2752ae4016d0534df9b963fda456a16b66eae66a116dc2dc9eca9439
SHA51221b64722d2613f68845aa3720f8cfe188c9ebe46182a58ed63491495a26a40f7cecd3e2cc7ac64d3568d7478c00be457379e658186743e770679911dcbbfff23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a06a86f9ee7fb778e70160b9fba8ae2
SHA110d6fda3090c72ae226ad307d8ab1432cb396669
SHA256d21f3462d2a54ea33c0d4e3c89826c03ee2b4c813b0e17b3de8b713eb2d29399
SHA5128e33adb9ca0810bf9131d48bdf4b1a6cc8b8025539f03bd0b0b8099000355eecb29190a5869ad72449752a4fc1695afa6c31bff55e38f7a68c8ab8364df66de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6436fecee8fa696468db533ce82abec
SHA1f557cc2084bb1b84a958c093ecfc356172701dad
SHA25664baa2f62b8c6a4a1ae1a278abb23e27b227f830244f8f81d34e47bc0bb72242
SHA512bdcc752151ad5d34f9a1497c6fb6fefaa3951270c583ee6c28fb6fec8df1c79c728d92f5ed7923e49220b6e567b2b30650065aee480b440f26d0d49c9f5472d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536c4ffa6821fa39ceac79dca1eb00408
SHA1c950e14f9016f82ae6265d358b435aab029a49f9
SHA25628161c2076462e97becd1b13dd2ded57b5c9a9ae892b64c95358e569c26459a0
SHA5120eb803abb3dbd81bb8b67007e79c56f6333cbae5d4227b7f946bdb2f358bf9b008eb446958264cd6549453147dc5ce36584326422a0c161a108c3dfc4e0cd89b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4fd11fcbf7d18a4a6a8c782fef1c37b
SHA1f7be2e1b12e4c5d05db68b0cf8b7395618f52f91
SHA25618f83e1a92014bdd0e26408968f87b48196a618cd9efe14ba7e91db7b371a2a0
SHA51227472170020d112aa9cacf45b720b68b55bdf295b42b911b27fd6e6e34e153c1424fbc22f3ecf1faf512b3f1e29bac9c7d70db79828c55da42a78e76f40cc15a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f48f246c9f505ead9ce44bba85484848
SHA1e0469aabe3d1a3a6144af3376523896397d98505
SHA2566a5e3955505de7d23fae5716447f2c03ee2ad6ecf485776c82708d1be61aa589
SHA5127090995d19f116b955630a627523ad25881c4531b7bbe91a2bd1805040c8a065c7e2b7d4e2df55d8fcf779bb1420267a23522c27907d6b7b0f3a80e9e948ec68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a785d0b1b41be43dd5b8d46c1ebc7d5
SHA1495582de1e4f5658f3545152232b32e990c50393
SHA256354cb1ad18c2daae62ef70b20c40d56cf724904e9a7fc37c63b5eaad7c0d56c9
SHA51275f9643a89b15cbc7aba72afa78a84259498d32f19333b819ab9b57108d946f3de530577b555aada736063235c4cb9dd0f0524beaa5613a00dc9df7b5799e65d
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b