Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 15:27
Static task
static1
Behavioral task
behavioral1
Sample
094fdbde2564da50b63436c2c60e9e98_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
094fdbde2564da50b63436c2c60e9e98_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
094fdbde2564da50b63436c2c60e9e98_JaffaCakes118.html
-
Size
53KB
-
MD5
094fdbde2564da50b63436c2c60e9e98
-
SHA1
6de7aae97bfd0c9dfd420e3520c7a5ff443b19ce
-
SHA256
49681fb30826311c4712f4a724fd7acccebb173296ba89f4464181d2df95ab0f
-
SHA512
c744f20236d0ff7bbb75d89309ae0d29bbc6d663e9be9c7af5d7df294db2840bcde787bbd28bc58a7d9e8740129949c64ed599555bfac18179ad0b2bda25bdaf
-
SSDEEP
1536:CkgUiIakTqGivi+PyUsrunlYBo63Nj+q5Vy0R0w2AzTICbbvo68/t9M/dNwIUTDV:CkgUiIakTqGivi+PyUsrunlYC63Nj+qS
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b71ffd566a68a4db083c5d424da739900000000020000000000106600000001000020000000756185f423f563ccac43048f2c220f8ec4d3c447abab63e2c2c51dfc1554d2e5000000000e8000000002000020000000426fa1dbe9241855b296849a388a13aee13e06f24abbd773181bb04f543b53e520000000f357d3af6f3e12435ac1ec9df6c937b15028a1e3b81a161f06a037ec38c48a1140000000ed3d596422df9cbc3ff7399540babcd3af0ac4b6f7d38326d072baaf5f5d3b1ecb31df4e88dd460cffab25f492ca52935852bb43d15248a4403e8ab9cf968421 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425404696" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{382310B1-323E-11EF-9F86-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 204bd50d4bc6da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1880 2156 iexplore.exe 28 PID 2156 wrote to memory of 1880 2156 iexplore.exe 28 PID 2156 wrote to memory of 1880 2156 iexplore.exe 28 PID 2156 wrote to memory of 1880 2156 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\094fdbde2564da50b63436c2c60e9e98_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2a3cef20e54ec4b9829911c7817f77b
SHA1f6ac2c3ae43c7f318110cce57f73888e1fdb64a3
SHA2565665abc16a034e8c5bc9cab8cbd198c67e2fde0e0c3e0778b6b044d7f9e4b30b
SHA5121b2e472c85f4f2beb30e213f2dc71ffbf1b2562a65d9d3c0eeba8ed2f2ead5acd07ca002d6c229862636790042e9a956a7e61ab1d66f1edabdc49c2b6161ef57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a26bce6d33dc5473c55a2b0ab04c751
SHA1c8584e661097c77ad02a94883d5e1746daae2b2c
SHA2569cf480bee855eb4121897f14eb828c51a14d23eb645387a12b92dc91391e11bd
SHA512ca72b77a5333a5ad1c99f524e39d9fa14f397a4eff53b0a29b11323030a6cd5c4c17abda0b397e7f6f79293bbae0d2323969f36ad8c525748461ee4ac9d2dabb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57adce5e11ddae231ad9e22b3d4d967dd
SHA130dbb9638f120373cc07180154e45de7c9dd259d
SHA256f95257cad8e5d1251ff6cfde9e2f6c628a7f1db9b66249009f25b68222e54b31
SHA51261d236ad887c38a2e1d7223ea0dd1be123a536cf453746ad98a4368ca8196374a8ca18f4442556a18fff0dd36012f82a355ce569f85d585e5666a7f0b4608315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534356ce9b7d7b026bda3eb5b41e8a71a
SHA1b1017435faa78e0aeb6fbdf69b9bc97f0209b967
SHA2560ed9bd8c983d3a0072b85fb9c1ff2a5578cd8b9c27bba720f7db3652f5a174de
SHA5125c16a53347ba40c4910862f2e7e97524324a585e03fa421bd836cdeb11e5d73411ec312b8e240cfe9e837ff7ca56bbc04bb6d410ae955aa917ffb33e1f244b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2b07320b00cdb704870264b781fb8cb
SHA13979f23e6144f4a756e24ac806fae238c828769c
SHA256d1954e1c927f25fde45604a06ee2efd1acad5bca04852feb36192bd21780b368
SHA512287de4afa4aedbba9996f9c422c14ba981fd70fb43902e82100089ea116e3880f7c0f95228e1947553dad5f1ae1eb11429c1af9ed4c6deb83617434df0f10c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c289756a6cc388b130914849e82fd54
SHA10a656e7440a4bae18c4f3bc0e7c525ea63e30813
SHA256716846a7a87e8d584b5c482d256cb9d2caa4b545bd44fe198752f77ad815d93d
SHA512f7e44c45c9862bfba80652f06ce5087a2f777c7fe999f8142f1eab2cedb5c80e6f1dda5aca6bacb264536b6bf59e9700168ce9e51be5e99719f7bbed4f77dc2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d0dbde76de3986962c23f08e53bb717
SHA1663b29fb5660770521745dbd5f1c6f0832390817
SHA256bba3c2dbe9d679715613173e079b9c6129028533f212c195faa26cac53df8bd6
SHA5123726afbe1a57d37ace61ff738f49d172da538c09bf268b237bca9cee0ea904ef6d09aaad0c63129bf19883cf171fbc4cdf49e6e28724eae260f28b3d35e49df0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5278223ab40485bc2d8d82a1b2bd19b2c
SHA18e64e2d1954c5e675829b0e025c22a5640807de6
SHA256d9429396d07c6d65b35424d81ccf185ee49b5e418a0bf933f57270c9403543ab
SHA512321ceb16b5786cad2e2b06b4d6317343982a54f5aa982fbe0bbe470883cb9060e769af21657ffdad87a2c3a8fb224ddaf809756f3448389b924cca9585de5397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f8db24600e3204cf8683fbca1443767
SHA1d445fc4e2406fe35e05ad336341b5469c4da8091
SHA2566f23ac8222dd87df6d2a8a04be73ecad11feb622cb272b396458807b8b9f18c3
SHA512da4257639ca086c4ecbc486b8b6822f82ca034621b5962cbd6411be4f3edcd73446f49ed3b7249474c6b3edb6756e228515e5e7e70b9d94db6e5615309dee949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef790212c4326f3d392615ed8fd290dd
SHA171f33067912f89e690ca865e0179df7d8114e957
SHA25621ee3afda7991439f90ffed5832f2d0e66d94124ed47b86aba6de89148437fa6
SHA51249ba396902a704cad9fa5433dd9787cb80b04b9822e47d66e181f07127bff53c5fdb00f0a2475ea6f48a34a2d456906dae02fbf954019117441c11ecb2a79be8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5252d5cbc1d0a2f16850efde43444fb6c
SHA11fbcff458796c59c8c80045a40ee792138e94c5a
SHA256c9d58e5ec61175f02899f46665d051f99ccab783fc096665557451c2104af110
SHA5126ac75ef7ddf5f4bccacb012c9b1a6b6da68803524fb6dc6a0f2296c8d04694508880753e70c090519c2ca630d77271da47a7efd46de3296562af7e146be6c0d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5705f7d6dddeddd0e908e97c0e5c3ad0d
SHA14894e5c5062016d5344cff7e6da3cd0fc5bb67df
SHA256d99c5f65306bdd597038e120a668f5e0504c6d21c840c5d47d108fb74b6a1fc5
SHA512e6d224812877f9e54ab59ceb7d97e335977f2f2656a3511b809276fe872f2fbd7b1cf96436a6ee6f604686c1dce48fc1f6b4ada54ba812e4b6748e8dc29d9482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54deea3bdc15bc68ff04cde68ab31e94a
SHA1e5a42798058db14ae332093da7a233aa7b008c73
SHA2564ee2287cc18214a732eee4f4866ad2fb41b432f5b115b60efa534158499dadc6
SHA5126fcb626459c6b0443c40fff80ab4cb0e0996115177b9615d2eb25dbe697d082922aa74d56ae42137b1ebb367d9c03a04cd2f0a79f570bbad015378dbd4607318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57309761f47f66fb3cf982802a16d68f5
SHA12bc2a333651b8ff33b7dfbe2eb0b26034d4dcab3
SHA25650335038f90d3ccf2e8d04cab63c08e7f68644bb68d8b920a04748f175eba3e2
SHA5125a6dece9ca84cdfc7b2fd7cbbc384fbf494bf086e4c746cc5198e742231ce3960ecdc44b6d8a9d81f00ea235acc10df87a9e519ec66973e93225fa45d5d9cf30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545587a879293561b171c4ccdc0218754
SHA163d4109768f409a066ff2137a70a34a6b2e24f5e
SHA256281a229832d3b21208a602b050ac458cdcb2c5781b10df8f773736c216be2077
SHA51227180b0e299eb8a163a2b2cc65a287d12d042b52095fbffbb335f397f098b00303063af6eabc0d712389ea65d83f0da7f8216304561b517b63861e763787af99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5823be63bd7206de6c4f3357c1c30ba39
SHA136010dc0a3270a239856ac0d50c32cadeda695de
SHA256de254f1a2cc611442b6dc4748ecdeff037a69728a577c0f28b0051b178970840
SHA512200363e40d35a35bde7677ccc2861397f2ab5a4411bcb76dbe07d4777088b9e5399d4adc8c88a24ec3f6c19354f50cb0efcf968490a529f02327faeae71668d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520c43e58f6eb06894622a43b1e4038ab
SHA100a8c90c5a35e669102097ecf4f031393c251707
SHA25695f949145ff6512fb25c516146e0191e82f0d15e5669b03ad241df10161fe5b2
SHA512cb7d608c7c390ffe85165da94cd446fe1317f27b707d477db447c836e471a9abb4ecb525109280b06f0688ffee2a95d1284ef68e998721c5a2dfc90ab19c3623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b56b10476b2eca50c40ce6aca6b1f5c3
SHA17830916e84aa677fbafb94a2761f0ab0418465c3
SHA256e397d3e2c239d25437d2753fb8f59347554f819b5fff5dc1aa66efbd4300159d
SHA512e40bc50e497deac63d3c645edd71104f7c4e4e8fe1e467a6a34a030b5fb8cca721db30ea828fa0bb9c44f54519248cac64768f26a3eed1b2d26721a693a41c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb7b61e6a8ec990a4e58d6c8a6c97a9a
SHA14cc52fcbc1e5eb656394541f3f888c1600e24924
SHA256ceac54def8970ff8437bc264a875217964ef57596f66128b573037f679cfb35d
SHA51205e38828bb55ea7ca3c0910c1c995bf55635fe7f46bcf8e60c7d7700e640bc739244137b1a5dbcec87989492178b16f213baf01859c655a41d04ee83f667c85e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b