Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 09:24
Static task
static1
Behavioral task
behavioral1
Sample
0d89806b68bfc6ded34d54bfb7d6d3a1_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0d89806b68bfc6ded34d54bfb7d6d3a1_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0d89806b68bfc6ded34d54bfb7d6d3a1_JaffaCakes118.html
-
Size
10KB
-
MD5
0d89806b68bfc6ded34d54bfb7d6d3a1
-
SHA1
aa3bf9a5fa05876e5b493e2354997464761686b8
-
SHA256
cd978fcbd6c862efe31594c6a3da1e818e0e41335e684d63d76889d0673476f7
-
SHA512
ff18c529a5eeef742c4f674b3c2d6074d5cc90522f4c0f53cf1b0339305456e9ad8bd7882869f8e96c091a4e70ac0067d84d36bab913a95069011e63d954d941
-
SSDEEP
192:gr34Q6JIO2027P11rMIxEU1yE+KRArRKelyGKTAnHc:i35NOy3YI/DuVKC5wD
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000edb021d6d81098aee3031643a064930793baaefaad27783a33628e8b3540db5e000000000e80000000020000200000005e607b84d940a5539c6657bb83e1c30c7423e1ea59b0effec7e90c2996faf3e320000000f066276967a177a3bbaccc9baaadc6099823cadaff88b3858a55353047d39d85400000001bbcbe4641c9ca7f8cfdc2fea5d71eafe6057446f085cd210129d967c6bb0b2e3200618cb65058c8a9b36706958d5ca31bbb9024ace5a569beba469be7ded88c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b069539ae1c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C5BBF5E1-32D4-11EF-B082-427DDB91FD53} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425469357" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2700 2288 iexplore.exe 28 PID 2288 wrote to memory of 2700 2288 iexplore.exe 28 PID 2288 wrote to memory of 2700 2288 iexplore.exe 28 PID 2288 wrote to memory of 2700 2288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d89806b68bfc6ded34d54bfb7d6d3a1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526abc6d2b9845af9ad292d1a39e0ba82
SHA13d38eb6b66233298811e3dfe1be73dd685e4076a
SHA2567eb89e039eb93c5d473ab2277bed41ee2749ce7f2546729cedd3a015676dc236
SHA5122fd96dbab89277bc34cb1b0e63e0ff74d4c928584c633d413f9d3786a6244071a8e2dfbad09d964c56754ac61b25f83dbe3bff9db72dccd67cf050152ac72f1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e7c06c907de83c889a9b5b59283fdf1
SHA1d48ea5d3ed8399c66363f51cfa4f98f6be9cd507
SHA25643427bcaf168bf2be5d7f1d66dacdfd38aa474e66a2af7a98f509009feaf9c74
SHA512817e887a7b08f3098ed3653b3be10c7acbbd4c303c688f97abba10a0c10a30edf39e04168bc4abc9cfd84d67921d30e8816927add734962dbf787b29b86cb4cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6cc36f60e0eafafe47f9075249a2df9
SHA144c0222972b6f078b0b2d25027a2706ef8778ce2
SHA2561c92b1a06401efb21a48b5f6ce31ff8314c42b7a5244da8cc62d42d05385c88f
SHA512c6369385052aa4fc49ff018db485aeca5910a0cad54e5d6b786fa2ea3cba9ae7cd817860182e5976c1a2a12ab3594bc0fbd4a1e8250f4d8537dfa95329ab5390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535e628203598b08d41057043acf1f2aa
SHA136d38ea33bd068962f93a6388aafb62db453a185
SHA2567105f1fa50128875574e9f5be41e932cbc87a27eaafb75164aa868f475f200dd
SHA512a7f9f32bdfa35f592f22d7c6dda281df4d7a9bf24bb12768dbf6bbba4dbd14744b8f4a1881c921aa12916b88025dc56aae3a8c9c198c6114b22092fb5cde6d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540ba1d8f98293a9504d5f97909437f1f
SHA15b9a470272f43db52f9a6b63abe40b858b40bffa
SHA2568880b6aadaa91c84cb0899776656793252f88793edc2086751b158d21e11f09d
SHA5121ea9023fae7374efcdcf460789ce487aa83c3cd80f051f5e4410b3aeca36668bd58ed7e17321e9d101c3ee8e3483852d2e898762907060ec027ad329619012bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e585ab98dbc89ac673bcde7c0efd4ba2
SHA1083fdd222cc66246904a58e2f373e1d40c8fb452
SHA2562e779033c29002b6e0a2d2b9cf0ee6944ada8113502aee0bbab212a9119f72b1
SHA5122a93b67b3d3dee5a4eea81e8ee2d3dd09412d3763856baada43321551ba39d56ef67a83fa8a6f087386850020d69757e10f0493b62683a5e65d9e3d3ed6299e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec8196c59a181054b3192a8bf45afcde
SHA1ba72d82d30aa22802c0693dac4e05d328e1b97c8
SHA256255a4a0e11c1c9cd8524b2d3e41852f3c48f5afecb9d797228edf44abbc27917
SHA5125a5a238754542d0a2bb0c6ee3ffca7da90643e784fc9fa139853f3b77ee175f626b4ea4a8de2c2ac6053c17ec3426ac4a416ae3fe01ed6fba525492ad5acefff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d868f857629fd919b0a980cf2331eb
SHA184a851354d5cc06ea137ae071a34507310ed2537
SHA2562aa8ca097598b18f7208be206b4519e757dcf6250ae67e039bcbc9bb68d2fe73
SHA512fa8aa8c2a5faa56abdc8ec95f4efddd628dd7c0a1ed7a16576e09f670a3417ae54a13698b667159ade465b7a403f8cc178ab9039bc0c19eb7c982fa7a96f0e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ee43473c25d914367ee73b68f3f4ed7
SHA1a6eac9466c26a6d399e308a32c7ed35f9b6fbb39
SHA256719fc88142774d5558a74504a6ecca2ca8a9c4e9b874bb3b497d493685c556ac
SHA512e90f597e37b17038a0a907d2bf48408ca6ac5cd706b2fe9980f12c4b322c46959ff43dbff4f8f42558c8e59a413f9711646f6d45947a3e607a1478958dae0517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e7ffcb418d25a4435044ba29732eb05
SHA1ca05c1d4611dc712c2c949a42242a41294b63f29
SHA2567079c14db7d88e9351401a5f5b8acc7f34a4613a2f75cbad888a8bcded370a92
SHA512553425d232bda8089e1e83d99cfda43dfe904c245e23f0795eb3aeb6e46dd6dac398c35283bec4712145220be372935257f59aa81ce162ee8086f0ff1dbbf803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513a0df96420d98b537c16ee94bf7fb49
SHA11e7a850c3ddc945efc054926a8c399eefad6799d
SHA2565b945534a76877c7a04a2aabc1a1c2bcd979a6a05abb32c5db938650c91a54da
SHA512f820c452df3bebd7767ffe4de9c63a19d2ba20d63f3f928dc9ba2740f8c289e7aebc1c3064ffdf8957e1e30cdf2fc84b39bf43d78f106a4c162153091ebca0d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cb103fec2677ec269589fe38232eb13
SHA1429a9151f5a4ca8561904e932781ade119fbc7a0
SHA2569e97ffd115c31c4ec8a64df92239676dd0aaf5a119f58c0911217913394b0646
SHA512dd94a5aa3bbb54a62286ca9fd2e1541d553aacc0f09d5aecb6477a18ad51f1e57c664b19e19cd888170cea7224b8d89fb313e0681429686b2ec8707b04b5c7dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5950033c9256d2ed5cdf93f226fb13ee8
SHA1a3076b8cd44c4ffde6230ed481bb754423d343ba
SHA2562313285bc67df5167643a2d3337ade42d86b4439fb1827e7ef53cbbe81077a39
SHA5121d03ae84173ce9f72e1af2c6179cc185f24df81d5e370e72aa653d800505c9adc145019cceae39a67ec6dce23cdf995918c9e644557e340bf0f584c49b8d3bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6841f8a7984118826b85c230e41af77
SHA15660967f7c67b3fdb7034ae28679e50b65c7a3a2
SHA256a353c97b348f0bf7cd7c58350fa41fb798f3ab4a89a4e0c37b4395739b4c34ea
SHA512b48b747ca463d452e786706feb4cd929ac636e62edc4f677bfcbb52ba317b08175e31af3524ae8cb9b8a4713cccb83e926cdd2e609c1efc153cb2e7f7ae10436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3db369b525bfafd60180f5955573239
SHA118ba89ca97ccd6f5255c085386366b84088eb1bd
SHA256b2eb4392b293fb7ddfaf01dc32c5bc4afb24e711ebdd0b34e9a88bb88db1ddab
SHA512719f88ad47b292a52b4cc96f7734b2432c46f5f46f4f6b8c00797aedc93cb1537f3f3d6c44f4842f87cea8bb7f1b40dd6dba255ec56fa38944863689e7d23992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d23500bd4a8d43ae6d3ff42640070234
SHA168f1f138d07fcd7a7f15b4d723428d76bd6743cc
SHA256739a0a146ca38e3a9ecfb7b602d4be5c4bec6b74a007a75b769f9fd0beeb7038
SHA5123d4846f1c0ee6ec54ef547b708df683782121ee128a61ab9c0795b1655e4a4a44cade097fca41a8e3b89fa740b491be721d22ae5b169cd8cc5e9bdbc478feebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af8a6272e0f3e8e7fdce6bb6557edd7e
SHA1296d555ee2aeb146005c03ebe1035f8c96b86be9
SHA256eb63f698a451ad5a08391b00b9b2dda2e1792adbd9cfeb629de5a82f204b846e
SHA51289a44f5b90c95b136114baf939670ba6b3399f9aa583673205b5712164dcd427af211ab12248b8a8aa5681ef70f295ed51ebc741f0f84c47b84823729f2c28b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ef4ac9de3f90b0337a288c5eb6682cb
SHA17327e58f865206b6497057170a32520814103112
SHA2567ea536b23fc74f1b76cf3ebc411e299fedd7eda530e29db8d22790b6cd43cd3b
SHA51261ebd64d17287deb9c8c510a5d8b7d0d02125bad6b9936b2cd083c04dfa0a57b8ea551a311648f174a84d1de97384b9be4a8973ba96281e87f9bbecad8449273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bfce930617625874b9613c611bc86a6
SHA16c9a0cf1995768693f8d6b3b1481bcb69e77b300
SHA256e4954730df364efb6f405ba71754f9e213340067109907e947ab4daf36c84e9f
SHA512e2694ac37524251bf613ab4ddb933b25d2b436ea472f8cd035fec12aa205a31c3dc2b8479e0c07752800199f0e51c1a4df224556d301db15a6faccf4b686b414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c9a3a8511d4ab1dfe343d5c17cd991
SHA1615811442d623945dfe588e3fda93ebaa13d7118
SHA2567585fca52f129c00df8465eda87f1bc84b267cc3b9461d1b8879e3de11d77fcd
SHA512f112f9a58ce2046fd81888f0ff1ca0a7e9e9a5fb878684c906c7be5624aa6d08e5b96a6d58bd745f88d09ea1e104892f5a7a95b6ee26591227a77237b6cbc7c3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b