Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
29e9a9d01ad9d9843a104c5198ab10bc_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
29e9a9d01ad9d9843a104c5198ab10bc_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
29e9a9d01ad9d9843a104c5198ab10bc_JaffaCakes118.html
-
Size
17KB
-
MD5
29e9a9d01ad9d9843a104c5198ab10bc
-
SHA1
43d0c0679485f106d65921bd795d23779bfdce8c
-
SHA256
c62431846faba3c7770e580c8f28a5d69241bb76d9be1ce0208a12680e8b77dd
-
SHA512
07b5e2162b474ac1def0364df488a74bac10e4c24b2a0d20e13511be83850c9bc4fe53c41a91720689cf20c6aa10eb20743303135c58ddd89f2d0e6fd04b4d10
-
SSDEEP
192:1I3uEr0u6jv5MDwHjp9rR86iESQ1EI5HT5g0RAMflzXlsVuKNdRuEKHHXNL4Rr+r:1I+5RFvTOcoETZ
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000033f52b58b7c1720795a18c43a8c8b8580858b80babb26f37caef68a02b04babd000000000e80000000020000200000003d2cf771cd392120447f36d47f043ababedb7ccd3ef1a672aa0b35dfae0f9a2b2000000029e6839e018f0ac7d6780bbab729efb8c80e2e472c7eaae072ea812bb1d3eecb40000000b760e9123544f4fd503fef934f54a58f21360a84b26618d558bf5c3425f93a423314a5bce047dc35b0bddaa1866fbb57ece9feb7a72200a66bc342cbc835b68e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426543974" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CEC3DF21-3C9A-11EF-9AB6-F6C828CC4EA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a030c0a6a7d0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 1964 2076 iexplore.exe 30 PID 2076 wrote to memory of 1964 2076 iexplore.exe 30 PID 2076 wrote to memory of 1964 2076 iexplore.exe 30 PID 2076 wrote to memory of 1964 2076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29e9a9d01ad9d9843a104c5198ab10bc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b583874f2bdc1eb095340ec98bd7be15
SHA162d5877ba5a6f130195c14ddf0bf2cd030aa3247
SHA256eacd4776c45bd22001a2d4b67f1f003c8e0483578f5fc209dedbc0626726c18e
SHA512e4d62c55fc29917a207a91be122a6326283e67a539b8b754b67c02757228f071e417e0f7e710cc051449d4ca4bd283237ec347f6dfd337d29ed345e4a6304207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d56cfc37a0087bed5f267bcbfb0cc8e
SHA17db4a1638b78f5c9e8c73d58db908d7e6c942444
SHA256d3af6e76a5ea192f88667f9db7b195f9575b0faadf1659edcba451d4a3c84e31
SHA512b57b51111a2e00b5e254f19f4c81c19d2f07e6e79eeec0b3225641d07cfc4376426ea78d72d4dce3fcf3978ea9e6d5c9d4a2a850358b9aa3cd2b61b61b77a7ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51afdd099d494e7e8a14fa1e4a48751e2
SHA10fc82cd8d7a56bd83a44dd4517cd2bcefe12ee97
SHA256a4249a7d75f7eb9f0670bf06295ef279fc8a78e400d35908998f232e82c857b4
SHA512fd792a11c5c16032de7ce38f642b15d9e7bfa01a1902b9e43bd08f60ee4113ffee960b105e05cf150aaa3fb35b9711d2d010ac93721f2ed3b85007b0574b772b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57866aceddbc8a43dfb86578784b47f23
SHA1a1fdd3d3995f50038b157ae2092f433405c439c1
SHA2569eb930f3736514957a4ca5d144452ed867e0689637e5632d6f59ead16d1e4d5e
SHA51253889037775961a8402ae8dab44c8a9450af86d30baa24ac8c852c8326c7fa3b226d462e7fa0dfeb564922d50476db5282ecaf2f5d789520d4e69fba281f2867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5769b5d177a18bb406c17324af1ba8eae
SHA104724fee502ba6cb59b1d328ac2b874faeebe560
SHA25689803742db2cf25dd4201464521d46e5e4bffaf8c640ac1854e21292e5532083
SHA5122b87c2fe1d5285429daa5cdbfb3d8a84de1c4bd4e43a773ab799f4863baa7487635329de5927c87edf1061cf0c8580d45afcb435dd4a7501ef5f563ca5c2da90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5002576377cc6c670ca92b70404f0a57b
SHA1b5be14b7fc4f6342cc29ce36d99724ce8b61b611
SHA25643e160ae94fa9a6db2f16a7008820fb3371b4f0da0b0640afc55fe9318cb7b27
SHA512181aff211b9fe90fc393702f0cec5b9aed732adaa1c85a23e0472ea45176a21e001af4154c73d9ed48e79fb06f6ea0e05203d3dd1b9d419c190246b56dd1a08d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b6f5a5be162635340fa3ceb95b0e0b93
SHA159c6f2f7c5c18394f4b5db09cf6321244c096131
SHA256db158c69b0e3cb765fbaabd47a1d81110bd1574b43737bd5826ddf0bb976fa05
SHA51255bc82b1d8d1c019b4a0f2f5968e95ffe62b30f26498ae9ce6586689c895444177d364337b63b9d781bfac5e690706442228459fd3758361486bb340eb691cff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD512d7b81e37ec4669eca594d083a07f84
SHA198658875d0a1725b5d30a9b3b3fd0175f20f860d
SHA2565e568a1783fe0ce82385471ff9a1e9d03e43f7ebd61e744afe47c3bd0824f9fb
SHA5121be36ab84cee69622a51d10bd6bac830591a59d6f56801e920c7899019cdcd73b887c0d44d185c472ad145543996d648d60b0b71d8f048ac173a7f582b31decb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cc67282bf0371d53f33f0c6be691afe0
SHA1a188d2c49645382829d51608018c1059749feb4a
SHA25657e3b88ed651773b52d976e6d2927ae1f40b0862c2f4e511bcc80134b57d4ca0
SHA512bbf7c148eed097f6f6cb2f3594832c17d5394f72f05bd1c757d26cff7f28a60a5bd603d620c28c2ba46ca993f293e6bc4f29d7786239c617a595989bc3c96c35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56d73d5845c7c8610029b3f89dd0a63b1
SHA14cb4bc59ec495de27c4b82bfd4e90b84eb5adf7c
SHA256e7fdbd0e55919e42668293d1eee7868e9f7a62eb9cd2ca219cf413f183bf7daa
SHA5120f6ad5195ccbc6ed1ac3f686fa9c4481f78f7fff46703acefbaa2e008177248d46044ae3a728702d5445f5350b9be1c113dac9c580a8c24b2e9f04d9fe03e3cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cc2ec0e04761e85f07bcdfdfd80692f0
SHA1ccec2e868b11cb62f5122e3f85e15740cbfbfd68
SHA256022db8d5731c75fa2d7c91a00358768c5f342ff03bb5dba18f4e50a2f0f3753f
SHA512ed4238e2865236bbc2dcfccb086cfed691c4c33ad1f047eeda409886c7faa0c8a0a96afcd4f2d2e2d10ce681b1a1473f3aedcb0a3d93cf058621fce8842754e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54c605ac95b0c8d300955b71e9f36da35
SHA1642fbabef4d3ebb32c7ec227230d75864fd1dc9e
SHA25698f6a35b1ba5e2c56b9b5d6fe6914ab557ffec6ce0dea5a537c0188525660743
SHA512fdd60cc72af1957d6186882815d9d6d8c6392af8af156f1821c40436e787aae09c79d089e593eb0eec6b782a057aca73e552e4b6afa4af2b043285255cadbe2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53c191f1ad57ace75bef40408e0021933
SHA1012bc40d904e8cbfa59c8c85a607fafd995ea2de
SHA2566445225aca8df582cd0876adddf464a17f203c229d92f25121b2b66704b9026b
SHA512f19a6a6b5ef88088532e604a3ce33510d0e333cd395f8cda1de011de405ed89f947187b3ac2ee83c109edf8942d963b89a90b70968b44afe37038daedeccb9fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57b7475f05a3485052faba32da91acf82
SHA16c53095e5ad8e68b8699e6875e8811e2f64aaa82
SHA256e5495aab67cb38f689fc856c70dba99bcefd71ac2608f5011eff8f861da27709
SHA51226a69f313a122e4cf7aee4a36629d9e4ae503bdb8642be76590a1637325fe38bb92fa2622a9330d8a0ca900d2ff526e7d8d4dbdaf667b71518c36f3c9940a21a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cbb069f1a9623923c01682e31080cfae
SHA1a232d76dcadfe0852db0ea204ee4583d772f0a02
SHA256ab8ff757540207b567779ef56d5d5565c41b23542f6dc227d83ca1242958cc8f
SHA512a02a2a827d9620d6cb62a6fe6d5c3340a7aa08a2cc9dbe2f27ebd2dd07743ce0336101497e32d61c0ade07f0cbfc14ac4bf3595cd62ad377a28e0efe375399e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5841f9f7ff939bedbcd9d4a5647627c62
SHA1f6017b4a97976a3484a63fe154fe11b052eb85da
SHA256dec5391ba63d2a2d5743c286ec92cd9c089265a189c308426e9aa34471e3b5c0
SHA5126fc4ee73200ba0d39ba194df4b8e691936d4c867901638b0112b3ea78ccf1c8947912b8c8a0b234a168199d373b05b8a4407a35c511773b1a6fd4340ec6470c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53e55c3c41ec662c1f8635e2cc9266872
SHA1840b10b471911702ecfda7b65bebe1aa5b20b2c0
SHA256cbefeeae5ae702b35b90f3d58029e8566ffef1dc8f9b0fdb3a8f902a79dd2839
SHA512b5924da0d862ae0efff664fcaca34fcca890d1fa6db34769a007e14f2b4f980931aa4c8728557149511c929b1395613463c6bcc9db6a317e1cf69ae8c8c92afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d7d408916db02858b73eb7ef95c36184
SHA1f5a0883b13ef9b20bd6e7c6f5725c711c109559f
SHA2563cac41decc7f09a91550ece8a4af5cfeb396549a9658bb81e566f7ce6ce6665f
SHA512d591e349a3fc09f6e15a93b0e4eef5c523424a388858146b789a54bac04b1e344571b61de6ef66ced93acdd24c9e7192a59547491bbec5b1b2b20b18e6b31e90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56e8ab4b3fc96a3d36916544ba3d9371b
SHA113cdaac3304a0b8cc304b91ad32b40d5320aa2f0
SHA2562fbae78de02e1597f9099b2b2f71f747e32f81a47ef858efc6ec476261dab0d3
SHA51269c45a6ceb3baa818d0764f0dd7ca32fed71b05c32290111ab0a207ba4453928fc0102398c0cd6489d1e4e7692ec91303c90fa162f660aeb4b37e5b6c56f53c9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b