Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
a37f363f1e7e2e4bf3dd2f95e550fc73_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a37f363f1e7e2e4bf3dd2f95e550fc73_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a37f363f1e7e2e4bf3dd2f95e550fc73_JaffaCakes118.html
-
Size
358KB
-
MD5
a37f363f1e7e2e4bf3dd2f95e550fc73
-
SHA1
d412ceb10d861eb5d6a4608c38d1215ed6db1e5f
-
SHA256
e83549d07ac3e29a5b656f137bb00a2af42be3a16ebc58e6ff1dbabbfd8ffcde
-
SHA512
6812b49a71bf89b0ba70f83fc6a940d24da928ab1d27814ea8f3a31c15601d1e06c427e255dfa7a55212cf0b7795344fd8f4aa4f32f70624410e5fb3a0f43be5
-
SSDEEP
1536:sFlM9CeEV8ZE/PwRIfeFqtOk9KCkcSdccttUVNiLtBErW3Etddd7NLdt9cltdBF5:mlM9CeEV8ZE/PwRIfeGoQgOFLMt
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424406451" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FEB80731-2929-11EF-AAE0-7E2A7D203091} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 608001d536bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000950cee416eae8a158d909128722c946e253b5bbaf853498d15db10106dab1bbe000000000e80000000020000200000007a13cf049c00d058680d4576b787875ad346d058e566a6ed535a25f6c099f31a20000000312f65406818c683bb65738439f0cdc1fa307ff6538ef29082f1c37bf7b2adad40000000054637cbc9529d7705626ef8771b4767fc20669a39a82a0c88fa2b25194bdbb99f9bebb1f2e33a515fb4eb202c172deeffe898c4c5e25344c6444897b557310e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2064 iexplore.exe 2064 iexplore.exe 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2616 2064 iexplore.exe 28 PID 2064 wrote to memory of 2616 2064 iexplore.exe 28 PID 2064 wrote to memory of 2616 2064 iexplore.exe 28 PID 2064 wrote to memory of 2616 2064 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a37f363f1e7e2e4bf3dd2f95e550fc73_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570273e0cf25990d116e8cd7a56928c1f
SHA18801cff8c2fecb1339a80db122f64545113bb7cd
SHA256e0f18732f33c7e877cd8fab2542a77c1fbbc698500cc78ae0e009b5976b1a81d
SHA512c908de761d7326179db9037495ca9a22ffa079572fdf970a5698939efe61d56f8df0be4bbb0fa6f0b42c9067600d81de5525b1d1e212051cffd3ef00bcd5577b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528c1493f3d8487016b799bd347691e83
SHA1914f8dab6dda04f266ec6b9da11bdcfcaa7fdac9
SHA2563ccde8dcdb76305b9ebc6dec01f3769df9bb4aa39fabaa80ef5eb7335fc49cfb
SHA51280a31a84611daadbb8169d585e314c8e47386d5f6f913f432bbc4192bc2ddf844d0a49dd9da278412b8dc61558755a175f0e2d45476a47cb05a869d9b2bc7b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd8fffb851a879c283effab524786a73
SHA199198f953550a26aadc2d45231a99e18cd23245d
SHA2561f090d56e82eb260b5a865378ee7f19049ecc96afd320cdac869cf3acc794695
SHA512f255e8d61bf949375f550b1e387178b10ee00e3b9112e1804acdefe38ab2fbb82c15e65dd20ab61b592d6890bb7a94beced7202262152398fd6468d74552ef61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a57f872442f585c7883bbc8f1f9123a5
SHA11aece0f91c3fcc4aeb47c6e5f848c57ad3d33ca5
SHA256c1c72175513bebefa83616a2ff82c40c70d7307c8f86fc7f38d2629712bdab41
SHA51271d6f8d3192f0a6f20fae479ddf2a3d543f3ca6c043f1e030034d58607eeb78b9e5f2ea6b9c334bea892ff321453c4f899dae651f922affc991b35972d4fe982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530f86c47a5b86a6e4579b4f7f64b06e5
SHA1d86d09fc7332a983071c834537361411bcb4cc92
SHA256ad391627a7a10c006120ace7acdb529f3fa00219eeadc3d86a183da142b19586
SHA512c71494d4bf567b486fa1ef3b9849d3208ab39e91ba098757492bca0b22f552c823177ba6203052673273c38ce2c8eda9a0ffae9ecd64dee63a0b43d41e864fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59152468ac42ed1d701453b227838669d
SHA155d4a249a2cf7323b86b07b4e7d484a447564b84
SHA2564cad57699cce61563299c5fb1f225e5b623140386edf827eca1b0ebc5ddea77d
SHA51201dceef5008f11f899b244d244db132b4e8651403f6a2a65882ecf2c9c0ddac514077af9e25208be235e26b964ae5fc80720ff2711bf1e5e003c8e44e9b1db47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a6e25b11e7006783fa6a10f2e9316b4
SHA14aa39877f1da1eb8c7f1edb048e6ff491f417210
SHA256d2d562825947b855239002fe0af2555105959126b0fcc56534c0bcc3f2720a29
SHA5128257c4817a79147b87d2d863c232aea098f73d28b8fa6c054ad4a7a6ff51476a720832600a221a0a05f455469cc326fdea160839f4b5938b53035af549ce03a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525947a381a16ed85ed39345354bf7ff4
SHA1c47b1f70e00dacdd532e9e00831ed159ad4c0708
SHA2567b41225a9f99ac2efa942ce693782f712eeda2a5b99058a4d29b36356ebf554f
SHA5125163c65e9adaad1f0bed8f6d67817e9c6e9a7dec51e2034f5eb9442dc636375ed4be8ebba072043f1678f54338c2a604f4bbf14a6c8ea5f11381591eaf32d166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5497ce0dd0399d5346c6eef673af1cbf8
SHA18dbf08587a5a0d3623e7fc634b33deec36e9fc1a
SHA25604ed843cac774e17d5410709b55a32ea1af8a5b08abe4661d68926615e78b301
SHA512fe2ed117a8c16c86f895295c8ebe65c929f8db1db36819859ecb8f3c347346bf738911d47d345e1d0cc360a235a4b249d86a6fe85e1e12ebf9e00d7b4901a612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5186f726cde76be88d68e3578e9fcc610
SHA1d4bf1e9400e4aca184f66c718c0ea24f1d7057fc
SHA25679527e7837dec910743d8de7fe254feb57123b90e7de31c420b143a7c764d562
SHA512c75287dca7aad81c2e32ba384758fb12f12d3879bd3884d34b3d7ad63d8338b7da5e40ec9f840464bf51d015ba248c251d24a87fa36c44de918a9e389954eb69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56645190258757409b31fe55507bd3e5b
SHA13f47b416136ec2e6d454f4adecd0a1427e58fa0c
SHA2569341af9229fdf909d1880ed4ec4b915a5be7997202aabe55dd19fd0201ce2d53
SHA51258c94944162a1905fa7bbaef17653365db389e45459e8da451ebde282bfad00bcbaabfd2b9ac287ceb3a064e1ff007c0789bfd8aad904fdc8e4d49b2178df94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b5bc7051d82a0e8d2ceb9e7c8a9931
SHA1be52f81d9e5b6a79272f5bd0269e0f3bd012979a
SHA256f629e7ff1a4b81031ccb5b9934b126d9e099b271f2fa7efa0e93c989002357c2
SHA5129877aaaf6730fcee33b0fe739707ed7d95780e739ca87e42a1e6c14d3093b472a81e52f5cb7607273ef554b831c933b9d3944e6c72c7f673a9090d52f5ff92c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ac7971e6f1a516b9bfa69dabe4eb005
SHA1c796d83b63686337aaf3173d165c99232b457dfe
SHA2569c2de60de3c1bea5f3a4c5a15e7483fe2a120cc6627120b9b15429924fe752d3
SHA512d70be97750b80e808bd42ef374230a005a0c9ce7bf234ed79e7657c2c9038a1847cc8c26d996cecf9e21ae7a4a8c18d56dfa2593a3d15eac1557e405b68388a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe88fc0c4d1e6af1719fcf884fa57e2a
SHA10b6744844cc31324b1948de4787287f77da104d7
SHA256cf252602e017959a9760b0d2c369e9b0f84d5f03abd713c6574d342663adfd2d
SHA512bcc7f59f95d85e8fa6230c169a9184628a15267cedf53f2df969e9ffa9fe007106d23cbd9321183e677f2208323d96e8622060c31e840278c89ea5bbb7b0f548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a04f17956be4b9f063b4e84f3619242
SHA1a1a2500644cc8291a0a06b201b93147e28bfe902
SHA256eeeff9e000f1cd2df9868781ce18cb680c09732ddb09cccceb63098edabc605a
SHA512724a6c5439bb2f0076936373a3ae313e672a2a85955ee34d25ac9175b494bb59cfd1fcf89586c3e3f020850dcd4ec21dab71accd3bd6c002d76aa594b2f2b125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a07733ba634fc5ba9d62903a348fa56
SHA1be2d2943bba0bc033356889204b17bdd03269c93
SHA25668127c761fc98e6356f35a3a2ff9c09b2e1ba5009a7939d7c29bb9eda752304b
SHA512aa5fc3c1e68825cea1756b9d5bd3d16fb04285c083b49f6e335d69b898d5b54ee5c35679c72707ae93f48aa472a38a34ca27a09fe2fbdba4251f88a4b46cec7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c07056fd5a9187482d4aa5138cf1a6c
SHA1db9fc668a21557c83d8d4b959e7131cabe387a4e
SHA256ce716b8f063571b8fddff8ac90f02180c8a454935dd860edb6a020ba985f22cb
SHA51212a86ea1f258018c863e1a72950867e561272209a22a6a53ef789ffc5c92cf73fe3e80752e1549a03ec1d297ef071365903c4f50e4b902b2454992dfc0917cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d837e53157ed8b25611ae58090b11777
SHA131d347adaa8bc7b3280d885be0f2857f119720a7
SHA2560aaf8d490cb0316847d8383e22a38476c3106e7526c9e692fe595532661e0c6f
SHA512331390fb9c23cb81bffead265c4578580e70ee6d249654f10756ddbdd3e96f289a94e15226b1718412690ca2bdb31e91c9815208e28e7191de2dcab961c4e16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5737cf3be3f4ca9ec5bfd66b211cf9e87
SHA1c287caab22df878c8480847a14818ee8c6909012
SHA256e8d03cf09a3bd56b2cb1056f007b0a2a64c1fdb01044455812cf6339018fc20a
SHA512932fdbee88b5b22ce8f12304ebeebc4f72efa7210e7d9ac3fe857f478cd9aabf00cfd87fc3e64f35a59bcf5b363ed743910b8277c681e4ec8ed108047bc2c5e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6600f9e8d0fcb14e5383404d7b05873
SHA1cf6eee1af27b5025ea615d624078a4f47d5da5f6
SHA256395965bbd486ccc98b99378546fa381235e012d39c12e40af51e62cd3afceb58
SHA5127523f9e85b2b491426c1903591c989472208e1bddbd24735b57b855953fd69dd68543ef56904ce584e95a0e29380506fd3b59d1c75eb40d1ea13ca0c9ddcc2f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563cd66e2d13168f6475b58ac4f390b27
SHA17142017b3eb42afa1bec390d9dd7454c6e777b14
SHA2566865f3d29e4ea8b3b3ab5efce84e7213b666950db36b74853d8b5f09db16f734
SHA51299bc1494026871d4f0f03cc817a890ec3515674cffd3adbbb9f616cbc35afda2eb47f35b980972242d72e685f67c5104851cc454805bf918e308a96db04d9220
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b