Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 06:24
Static task
static1
Behavioral task
behavioral1
Sample
a43034ec71f6255c77ee7df06048128c_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a43034ec71f6255c77ee7df06048128c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a43034ec71f6255c77ee7df06048128c_JaffaCakes118.html
-
Size
93KB
-
MD5
a43034ec71f6255c77ee7df06048128c
-
SHA1
80da5f50f1d2038cba2dfe99806bfb87a57cf86c
-
SHA256
caa4335b761ff6f3c8f32a2d171efd6ca111867c1ce955c593959e33dbe611bb
-
SHA512
f99add6e9bcb875798a83113792ea75e12b894d70cc64c94207610c47085ccb62dc9498e7de4d9cf288e2d38d75ebe9d7d3c8261ab42c3ef1b86c24d8c67e3cd
-
SSDEEP
1536:tyCcYktcjIr5FbynzS+iEfPHqZljQAE9etKVYvyKR5XeB8waAGBNR:UCcYktcx2BNR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424421763" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000b2373a381e2f7c9f15b99b16e305fce6910726ee7cc3879360ab2063d79aeb86000000000e8000000002000020000000c769033c737242638c8784858b5dc0669dd731193abae566bf599562ef3d393020000000951969cc3088d4fb2404b11054b87dac066805a0e059e33e9273760300be3d6a40000000678f7c67e1e896b3c6d7594990be39e2eb542e372dcd1c7497a501c08f1c630dd9bbc7ba6b09bfa1337894833ccf27471b5500e5d3d70af9f11ed73592929f29 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A70B6081-294D-11EF-B477-E6415F422194} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d28a7c5abdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2340 2108 iexplore.exe 28 PID 2108 wrote to memory of 2340 2108 iexplore.exe 28 PID 2108 wrote to memory of 2340 2108 iexplore.exe 28 PID 2108 wrote to memory of 2340 2108 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a43034ec71f6255c77ee7df06048128c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5420a37aa0ef41a48daa04b6440818d39
SHA18b8d158ddfaf9b05a2e771284f61ddfa0f4d644c
SHA256416b410dc58cb2a2fb282e7e884a2a8c0c4ccaff2d308842bcaa95df176a0175
SHA512d5ab5c37a5a3a936567032c304d4300b26f950ee12f9ef606ca758e8e2e84768d97383811ad3cb00d20acc118c3c32a1bb7c1a28ca049fcfda296fccd1f34dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545a647fe5843323593ad6d599a189fc1
SHA12d8b06b73a07191b8f67471151920c833583746d
SHA2568fe99b4f0c7f1f94fefc5211918bfdbe972bc6bdf3990ee389324fb8047a7c22
SHA51234ca59b1beb511ca639ae767242dcbd8789ea0af801f306860df7a88b470b2c99c92fb71f8e7102a749a8b0f68227f0f354cc394a0791d3cf17e1ffc2a5e753a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a1fa0242c1a731683c73313c854968d
SHA1251d68e255f00b3f91ed629a9a932653fee57b4b
SHA2568843874dff4371e53ecafa6182eb14048458847f83cc52daefff824d8d8c995a
SHA5129091f073ff5557d8fda0846366b29f90840c615c645ae92559337bcd3790fcfaf9f0686282751a85fa5ba7415eeaf324d9b78efb5786228690c3a8dc4e802e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5450fca680d4df8b7d4bd47645ceccff0
SHA1672c3e88f4ca8c251cfd9bc30a0b415fa3baa0b3
SHA25629b771abcfdd9adb54aa9c61a14aa57b10e5ae509be97ba5a15f9938379aca0d
SHA512156ced3a3e078bbc8d6926b42ed29d10a393ca50a2d56db5d4738183c744145f0792c78524b8976425b5469875de54f2fbb2a300d9263b76c1e553b01e8a8c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1eaca3d777c4777dacb4e4c62b42073
SHA132f506e7e71c393f5a34caa96fc93963d19db12d
SHA256259b3917232aaf82ff3ba63746bbb61128064415754b8b308a27a9596839ddd9
SHA51226cd5091a44b649449c9201947b90b01537389645fb17b4d6968eda4c633ecc0f3fb724e3920ddbb8622abfd869d90c5d7a47ef9d29dd3ee8b96122252e45c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5645e5fd4353390ae48c37f7eed215825
SHA15850788819f2b3df2922049b2c784a43f67466ee
SHA256d0aeb56486189d903bffde9cfe13777e2b37c57ff41ab805254274cf43a349b1
SHA512090b77ac88a75d154da740be20233f365844e4b0033d81744f8e33d611696012556071f43af16252792fd178b9a15f07af7f00d2ecebca87e8fc6b80abbab09f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a80cd7b2457cf168bee30687df3809
SHA1a171ba2efe545244fc3ec595c31b95ad452ff0a2
SHA256e92794e06920a02b409f9ecde54ea4316662a9a3f7555097562233af6d17dc4d
SHA5121208662749c399a4c467bb75235f193b300b2cd53c203634ff206a2db33f2cb24d85e878e23035bdfeb5af38c67f7c95279c1211817c3b6419d7de61b71d3ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f70c3e4f727383cd3e990be76eea626
SHA1e01a1605f71b9e94acd94e2a7121d5fa7850b1d6
SHA256ddc1546c2e11ebed3c359fb4c2f4721678a5786548cd6b54b0541f92e8416b57
SHA512d9c200d0404372ccf1e598a9e7fec90647c43f16a29e4c2ad13dfc01aea936c3493294052ca56e75b2e47194d1e4b1f320923906f3cbcffb51e36c71969ea3f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591b054b46986e8974cafb0152ba7e6c0
SHA1cedb35fbcae54b5e13a2e0c448e936a86f30f474
SHA256be529a34cfa56810ade75cdb2a887df7606723b74f43f1f263d2e2e1c7bbcd37
SHA51252a7d663f447b1a82461447755bb31fe702da10cec2ba6aef22b92a0c1b7061cbac20b8b6ef3d4334605417d185a10e06058c6fc41bcf491a867c589c7d3b1df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53520adaceaf95887b4b1be59ede15fbb
SHA1cd551130c7b4356d9e00b896086ffab15ffaaf3b
SHA2564f5b84f5a7007131e1189f57d22548e927bc473151fe74c0ac98b725d0faec0e
SHA51276439211df2872cabc656869d6d3bc08e2b058b8ca8f3a9428cd7e99e2dd82f0d29e96fe175fc08e3610baf8429ccfcb5781c362596728126d72d5294f45928f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e84109f9f9081ef5b42bdede7e20ae7
SHA148c840fe89edaf577acf4a9d1c85776805498b0e
SHA25656f7196f1938839657787da9760354373af58ce381cc1e44a1bfe8244f27d9b5
SHA512b2c7607556165c529aa7604865dc6ab376f6a2d90ca96ce85a4a1aa3c41f3ad69f4c58814e09b7f701232ce0e778d156f94f998794b3a64b289d1142438cd13e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506cef3cc98b865a83adce2733fed8a78
SHA1baf0e577f518163fdc30d1fb2105a30c27a6e8ee
SHA25672ed9085906f8b476c59f8d29b88943c89e4f79515affa597fb418ad55903109
SHA512b791759b3ee4c28c6573d578ab6371226431e257bffe8ec8dcb0800c84c108fefa2f2abcaace5996fac61b67d44418a0786aebc7ae23781c0cce6f4ab853c0ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55071115276aac1dee70be48511498d6b
SHA1836b20e180855d7ce3b91df9cc96ffc0fcc27a71
SHA256eb7644f2fddefab669654580f720f0aaac9c889b0d76eb3b04abd937ff8f1dcf
SHA512163c8349435ddfb5594dc87e3bc2e2db1241749fa9406d1fc0a0cfe841f1850fbc165301b2c5948db889c9d0358b2edb1568fcd529d698fa8494844172e58c93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a782e0df12ee36fcabd64adc4916b90
SHA1c6fb227ba42b514fdbf048a52c4f5de654fd33e8
SHA256f2835262d1bb2352155997117de5ebc12a6ef93a2cbea2429d7005c033fe8e75
SHA5124d11f7b01c60ef7b6460198573bb8b12daca4932251128dfa4ba363e334e80644c5af5be84f1846152378589e42f4e1b26ee77c1ef5d91b000edf7f18d70e143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e33a2cdfaa6875c3f2eeea030d96a05c
SHA122af44180260976afa66c20650ae88742b7c4c9d
SHA256c90f916c4efcb8fa961c3f49563882cd357e38d95be1d9626e053daaf70bb333
SHA512900aec834b7c05a74ca6b8fd1940ff0256cec3697679e55a52ad546a8dda83ef0139a9825d6e604ce9a2cc5451bb064cf1d849ebca1c923c4ef0abf3a65da872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf8918da896520ff7d5ae131ced48901
SHA1e237c9a0b568ce2842698b7d1f54b46e86e7a766
SHA256f45845467a3558f2a078d4197bfe5c2ec259900e870db8b10dab2975cd26eded
SHA512f35e9a407c2e7f402f342dee8eacc19b94de4e7390bff822dcf2b78244a624ccebcc61b4f1cc75ec85e40a08ee4f8a913178cc6bbdd868df230c819d3549c3b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579e675b4a6e71ef78310e1db02f30226
SHA16156e850eb102a2ac6627a9616e5f3f25e1afe1b
SHA256919da2bb7e147a9cbc86e0490a38c92d1215a2c4ce26e363ff79fda0e6ddd2d0
SHA5126253bc7af58a0c822aa5929362fea2214e1fefbaecb41c993433a2c4af14cd836a40d1469d4d5d522a1bb6eb03991daea2f35c29547f9ae6014ba9a58ffe9011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c2dcfba7e1b75883cba07ec7842bc5b
SHA1b0bd3f1013b5f1b0c5f88ce3b4bd86a834384ada
SHA2564a200b413e602d087ec1a668cecbaf5d1910df630f07e94d8dc67098178c99c9
SHA512f10e3173f5f81fda029dd7512ba0f9a85b6f76910c94158d9713f510b6527188a34be65f962aa395bb37b1261b25827346cb6406c39b7ae1ad5dce7ed966e5a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5451bd63b3a3d219f2668624d18bab97c
SHA14455c0cba788d662e3c0cfed358635b0908f1888
SHA2565bc87fc641f18948e245322b5a82edcf88fdb423859b5a20c1e2f4e5e823a0cb
SHA5122d9af55813791fef768e3940d2805d74fda46fa4963e93d9927d580cee89567c4b7c64225d863775417b28dead4b6e7c5bdaabed3960888ede58830753b4e96b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4e15464bc1185c6c5ec7210a1506817
SHA1df1aa1d9e5dba75dbff37ed08824b4a2ef0c319b
SHA2565fb3c5133b3c49f034765187f904197c03507adc9da47ed100c82977398bb1d3
SHA5125e680c37ba4c98e39a6a90b7a4546c43c47f6daad7c6105407bd88d3fb78771de6700c798c1cb6323dcc36fb317e3b4812dc35837f1846adc262a9ffcf59d5b8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FY3LN490\jquery.min[1].js
Filesize76KB
MD573a9c334c5ca71d70d092b42064f6476
SHA1b75990598ee8d3895448ed9d08726af63109f842
SHA256517364f2d45162fb5037437b5b6cb953d00d9b2b3b79ba87d9fe57ea6ee6070c
SHA512b5c7b19a6d0f05cfa33a7f54c1b8075698d922578429789fd4c0a4ce035f563857283c7062e9ab08ec61679b486971f3d83a44135e217e3167e49fada5a1520a
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b