Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 08:05
Static task
static1
Behavioral task
behavioral1
Sample
b27c8abbf13696e2e8319e06b63c3b3f_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b27c8abbf13696e2e8319e06b63c3b3f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b27c8abbf13696e2e8319e06b63c3b3f_JaffaCakes118.html
-
Size
28KB
-
MD5
b27c8abbf13696e2e8319e06b63c3b3f
-
SHA1
907fb001520f5b3173e0410bc9c3e46c0585e3e6
-
SHA256
9c15a49bd4b148fb7eccc0d6890ace5b5a2e891bd068cd0da74078bc22201659
-
SHA512
5003252c39da2cf2e042b4ce650be6e147520d7d346cdc50f6c0c3ca6688dc1c4616d94b8afb16a932f339c6204b2e1ac6640594a4ae7448d80172a7485d7880
-
SSDEEP
768:UHS8TwziQuAr7SqtF9G9z919/ozio/InW:viQuAr7SACozio/IW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424686994" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 503e1605c4bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2FAFA341-2BB7-11EF-B848-DEDD52EED8E0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000006251d1bd3b75b9a3dbbfbc27f787813517bc43355392ea96fbc3f40f147cfb05000000000e800000000200002000000087f880fa0029eaf46fa04bb998328e6193b70ba85874de2ad642af200c4fb52520000000ad1a8dcc3ddbcb52549d52fd4d2c6e4975d92ba643f955f18c06e207d479172f4000000037585174ea2e74b86bdfacb9f2c6368678e76de708d8bd8112f22dc51d9c825d4e91a469bd1f4b7e9ebfad9385257cb848ecf606651d119fe191fce030997cbc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1936 2072 iexplore.exe 28 PID 2072 wrote to memory of 1936 2072 iexplore.exe 28 PID 2072 wrote to memory of 1936 2072 iexplore.exe 28 PID 2072 wrote to memory of 1936 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b27c8abbf13696e2e8319e06b63c3b3f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a48a9636b27bef9fd278be51f87b600e
SHA1e2431abc972345d939538eb893310d3265309d92
SHA256b6329cf8c1fc5784bdde242c0e4f0a76ea3b1496bc4c1963da458b1c7bec1766
SHA512883cc96777cdbbce894f093348ae8b64e39c2d540536772241c19c294b73a7351e22ba4dad6089da9481b50eda0815281af92369b75942f9be2b6fd35643dcad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515116b164f44fd0737490da43b2f08b3
SHA1095a5a3b391a625444390454168498ea97537032
SHA256f6bcaa6a10d0f9b50e0d9a6210da7ee82052dc1fec2689acd0aba0267ec89c42
SHA512c05c2a102728098ef060de6afdcddb838c0210bb970a0096e92bb78233df59b6311470b1f7145ee15b5af2c85bcfdce1b421f262a687802756cf5c64a8cb3df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8d51012e1371dfd6a6cb9c6e2b53a6a
SHA1a7dfe8f656e2cdd5ea828fcd5b7a82d12c9acdee
SHA2565045f1a8f86fdb93572985606eada87ca366f34ff4cc605ae05d230919c9874c
SHA51272e038f594059c87189854d5c374833ab8c345f961a2552259f14c4083b3190460a349a84a33902676a80a9d3b0429cb2b0572943919d74520f1b17ce2c33f8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d390e67be393d9edafec807a08b86e9c
SHA104e6030b2040e7b66b8305ca2059409d0f21692f
SHA256ea8d169f1b998a061ae4f8e757cf59167f2bdd992e0b9d552ca6a513ab264380
SHA512417c4732fb06f1a56935feeac05a6c04f77119ffa401e12afd11b23fe8ae27692b1208811563a1b99ec1de305a7b8f5bf9ba5c849fa9a150859dccf25214d537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbd9511eb26fcb5a8ca71d60615f0051
SHA1dc6f7f3889a70ed55343a5f5f91ef1bf82ee86a0
SHA2563272c0e498ce57188b03a83576537545f221677dd33e04acaec6d20a0457fa29
SHA512a67eef40fc87e89ede51967be54c37a13f11730cb3a5281c8febb462fb55b677630c4bf5b4fb259b25b299791f6613613938cdb97b75778ee28fb810c470ab0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1bd80bfb3dd8372084a5229cfe7bf5e
SHA1d8804246d34d0471767b8cc857bf3485df2925cd
SHA256f4fc4260c9a55dc7304dedc9bc44d2a6bc951cfc88dbccfa411d41a6eca025e2
SHA512f6fff74ef5025fc85820aab4dfb5fa333066de10d26ae6571c75b5fffe23410356124d9eae653de1eb535b25bf78613cc958d9b052e1edafaf6c26d8cfe48f4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4ff20566f72896bf3959c148a8f17d5
SHA1a0d0aa7e769d3ceac57cf6c56c7d1beafee65356
SHA25602ee4090abaf452a69d3d4c1a7dcc013a331fea84fb34c7c7b61d6032f910305
SHA5126ea3148b484e29da0f2484ee771be74687ad9ae6c01d00b5e896abb81d0b65f1a79e211535906b9f7d889e7c29bd4a88268ed1f38ab97b3085b0cafb45ebac87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55429c87784599f030109b5ef1277e9e1
SHA1c2bbed54b2a6f769df9ce33eebc2885fbca72387
SHA25600bd51da0ed2b33c55cfd39be53832f205a7ecbc2a568a5f76e7b04e1ddad3f0
SHA512f8c77383a8dce5f6407472cdb6e0cb48f389d29073d39ce85208ed92c6e87cca9b5b910d9bfe3f771ac6d00d6603828e04bc0d47727a5a6d32df30a0d1087528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e666624ebd21a64090359a99e88732ed
SHA1d5f66d7bcc01b043b26b4f5e0d33254e40334a52
SHA25675bbe963d86f7b028b7a31e84058edc2c9a109d2e2249defb178c6bb45af2487
SHA512800578b0fb4b11ed62c0c611ebee3995ca56a3e04d11b3762f1914fa53e92c28034e6ce4bdafb57e0361257b6f263451bfe81014c5ca75b90e76948da79ed86b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532d217f25e34b992c96e4ccf90a564ea
SHA1ec5a9262c6fc6c7fb8e12601ac01954cb997c210
SHA256c85b1e3a61ba0aac410bced7f2a5bf96b2a3df1e36ebc7665def4c3e900f0cce
SHA512880823e7bdd6928a24e6780f6ffb18da48817a7ed05685f39b5eadb959c67e4d96501226e703ab1fc9b031c63997da6357189cb5c7fc0f069a6096897688ac71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f276500a1e893a149404cad466329b3
SHA1b65a6a70902986085a787c080a4e649a20b001b4
SHA25622b5f27954c7715cdba954cc6657632f3c23fcd60ff898dfaf0580da1bf4848f
SHA512a8e2df268334592eb0fdc1aedd878671d2c1708a403b86a050ad3bf35a76fa93980ceb03d50960fc722e2b238ba91d659e7f51bd80306219b81671170631e3af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59579099f8d9d9bd7a109de6bc0a0eb11
SHA1c27c7071e00669f1fea2449445c22d3d8c595677
SHA256dcc56890aa25c9b5e337407045bd1ee46f272a3d219c80921c2de8d7e66ca2e4
SHA512997fb07c5d8ec591583ecf8ca1e19cc6dedfd4f0d2ff16656f6228ffbb7de06e86428d11b306f4ebd527b1b6d79881e7780a35f463118be1ac4020f44445d16b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7857a582f8ba49b36b4dd5959fd6bc8
SHA17163f44a28cbb1826e801908a26b88c81a84d260
SHA2568bd91b09d09f676515df7bbca9a6267a41b69792a6c1547eb87d870035a93b44
SHA51275147ea33cf5184d8b8e0536b761d8d3417d66e46660e68f89f915e462469d4ed80b3f408530e268923ab4223594617e700711e26048f9ecea1f72c5c9f183f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504ad2a17f34515c69dffb6ae6b3eb5af
SHA1eea85c14cc88d3fae28d4e9de9d04327dd7c59e1
SHA2562816f094b8368f8fbf6d4b11c21d9a07a1e5016a1621de95d9923b4de567441c
SHA512c58b3379ea59f1489d612fe85f0cb8e8e84833c90737d52dc914de1e57c3edf175b1f00392aa434ad78c8d91aae6bbcd674f83d083398f0e1a18982c93f2dff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c513af28a0ddeb5afa54053e612b33dd
SHA119cad68bb82e938ac2f0e0e08730c22187be4e36
SHA2562f49658b9c97b86963201812cde9a435424583657899f346e7719b5d2898be36
SHA5129c4541a0b058bcfe8213381ca38ba56c6d22b4471ee3b96f74e707718e9c2058b81e89890268517db48aba83c69e026959018114140f164a2c86a66289a27aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5083830e45f974f8a26492067e6bc80ba
SHA1b804c382e846dd88fc451bf2b8bc963468f7e817
SHA2567aa17aeb697fb44a86184290730b2496af7eb0e0f0b1fa87fe7e74b84b1ad43f
SHA512f902bb94a99a12709fc571359d083bb2a80f660f3c03e206b37c05f25d358565d1042c13ec387defc7c8be8acd6452af8533ed0f57aa285a52f89d3bf7a655f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec0e62f546d79fe736e74c58c0f0ef3c
SHA1818d3de97f326aafd7c2539f363d1f7e151d1412
SHA256b9d93734f072b9babdf3ea0dabb7a5fef121b3218da267e3cf9f5f4b2a09e930
SHA5123f28e0a1c50b8647b22a4faf8320579a64af6a3c3e6db25912414d7654d8a6d69aa63ccc564b0e632ec39b2b8c342a4b82d6576704f58b19c61e985f8a1b31ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5693fd9db2d1926d4cc4a334b8c9599a5
SHA1b667f4f83f1e8279a3520102706d9326e454852b
SHA256b2f47c58518c1be3ba4dc4b07203c116f5a8856b1e216af9589827917633b555
SHA5124a630dac66341a2f1a0062a9d1b7d41962bfe588c5a75acaaafccec3e06b827f52e39fb1e0bcb2313ee14c90830f91f25252b3d4d8a6e10a66f5be6ffdc71286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582c34cb3a7d43f8df74cea092678a345
SHA19ca5c2b2e7fb74e0ec3309d9f005aa4e4cc8fd01
SHA25606858983ba42c343ca4c166b83929d421829f27b0973a74d25e1f2275d6975cd
SHA512f86fade731eeee13043b4f9d8c21e80b962c852c4c1afc0f4c175209e7f7b81255426bef07d8650050679367ba491ad5892630baaf5d0398d209cc8b80836d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e3e5a5daa65a4ea8eca23c0a84fb2f5
SHA16dffb8d9728d50fc777bfcdf84e3f30836f456ae
SHA256ebbb551c8495b96954b5b00e3e7f0fb0863da558fc837fc62a5bba8c3cb3120e
SHA512068847586f1c3fb523d957a12db61e6c2ae0477907b7c38c1fd7cb5fc6e69e47ab7e81715e5582fbdb342c4c087ddefe78403e2812cb484faae416397138915f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c856c359bb33c884e248c9e8c6531bea
SHA1d9b95c4a2dc0edc4ed75f86066b5627b786fdef3
SHA2564748d4f436a9198fff7fd8035634ee28dd93f10003d1c0ff750cd17480dd8dd0
SHA512cf322e5696806471874411fecab04057824ebfe52486f32df2a79f849fc877f07aa9ce3bbfc8527c032109aae7e2f21825ee45f99fd961b15105aec3949604e9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b