Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 00:46
Static task
static1
Behavioral task
behavioral1
Sample
0f49349e41daafb2dab2805a903cb2dd_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0f49349e41daafb2dab2805a903cb2dd_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0f49349e41daafb2dab2805a903cb2dd_JaffaCakes118.html
-
Size
59KB
-
MD5
0f49349e41daafb2dab2805a903cb2dd
-
SHA1
8aa4a9e979ebbdcab0663ce0a43c19dc0451b6d1
-
SHA256
606c633baf1ee4dd23646ec53fd75c642408d8e167d10c650dac1042ca4f9081
-
SHA512
8b426cce9aeda54de99b432a4cbaad350e1635533eeee058de692dd34b8ce7f386fe9a7be5af49128387f067e832968fdb3abf66d0878aa72730a268e42cb68a
-
SSDEEP
1536:yRZxAsIib8Kt+Wy9a3umloID/s2cCdD9n:yRZxAsIibvt+Wy9a+mloID/slCdD9n
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420859072" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000001091cac4d0677fd080e8ce04155527a8494dc6b70f8c0ea76a47accd301bc0c5000000000e8000000002000020000000a38e30cbd39ea23c9c54d3eeb3a3d289ae6b07fc0020ae2e599ba600731406b22000000003763ac248b2ba71c6f7def4975140ed19240e33ed1e75df18917273b355a5f1400000009eb98863883aa52966ccb291a0e55cd96629b46da1ee352d70d646e6cae23ea56efc259d95f89efb7d857384fdd33657a4438137fdb2a4cd478bf2dd43637555 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9DB11071-08E6-11EF-8004-DAAF2542C58D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30bbd374f39cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1148 iexplore.exe 1148 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1148 wrote to memory of 2240 1148 iexplore.exe 28 PID 1148 wrote to memory of 2240 1148 iexplore.exe 28 PID 1148 wrote to memory of 2240 1148 iexplore.exe 28 PID 1148 wrote to memory of 2240 1148 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f49349e41daafb2dab2805a903cb2dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1148 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acd34d2f83ae1193548d0ed14aca4267
SHA13b8a84eeb489c7b013518c02412e0890c4a83984
SHA256c86894c29995dc8ab95c749641590a5c9fa9f9de73ec873f7a581f7075a4526f
SHA5121fe1569c81247758cae29ebdcd1de30802ff3e50ef794431aae5f4ec9b246438213ca558b31f4f2dc9ac6342a257714a2e1d83e06bdc52dafaa0b801a20f91cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfb9cd05d0700d661d6c42727d2268ec
SHA17c46f7fbdff21c0d3f207a946ee08638e42929ff
SHA25675574b829486c35b12490dd129e9df9223424c8440c5f4014663e965f5263b82
SHA51266ec166f8f78894c84984b717051aafbae2f4aff06b686149e2d8b86896a3dd2b7f38e62079c814c66578fb1842aa6601289dda54c1bba15b5abd25673424399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a382fed87304bb68b4c201ebbe60406b
SHA1b0869a5ccc22c2ec6d87dffee7967303f941682b
SHA2564b4af58960a963bf5535a695443745b44682da076457b1124ae09a0e05bdcc6e
SHA5128636123eed8a3e72b03fefdcdf93c58b3234fca3653bd19be2838cb22dceffc10cc286c1269c05c4aadd11684d14ac6ab16648634ed3e647a262e9781b7de529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cd0cb427a74f32db929c287937bc288
SHA1fae5e63f5948894bf85e8d3fd61d51f8e91ffd3f
SHA25694f649ea9f146edd23982eb0abb0fae6847c2694cd20adda8c35005331f268b0
SHA512463e8b2f205648d57725e417d41c5205af62bdd3b01afb627f2accd4e55726029cf5371e8c0ee79dc52062d467bb2f7df809fa362a1542db24b32a0ae10538d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553ef64763ab880ad1e849f76189bc717
SHA12253d2761c0dbed418a44680cd995e2de4519672
SHA2563f490be7d5d46519b632e3b4279c66a5bd5583114ccedaa94463d3593514b0af
SHA51227090a2120983c2a9fb4e25e0c7c40627dfc9fecce35b0ea4a4a1856b91a61d7637e841ed37fb9269c8ab20dec0e1706d68a440ea1ba339be903541cbf9d20a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51136cf372342b58e247e54389b949470
SHA1041c68ea7ca3b6b29849c22894274715cb1bb908
SHA25643724664820513c3f5ee4b36356302106a96289331b4fc8cbc98a4a18b4aac1f
SHA5121cee9b147f3bc8e9ec1a4150e8d0bd05e38627d7e07ce237334f4bb0cd8cd5f7ac3ab0373ba15f6f2bf6bd5b36082f630d3d5d44e658509512de907d779d4d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dedd5194c3db22cf04b80dc98f444ba6
SHA18ee7c08218bfccaead3c70a83445c52aa423ecb4
SHA256d0083cc3746a36c7c8e926d2455e2647be58b918ecac661d6b7358dabdf10020
SHA512254254a3210ba5a2de93bac051ef9451916a6f957236a27bb56737b5555935cd09d032749be3a210bb5727149c102859e86c0c2a1cecf77fa90dcea4514588a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58db2a080989e1c62313b823a633efa8f
SHA1f95e0a13487de2d1e5369caa866df8cc9588d39e
SHA25601ea724632b1be3dde9cb7a5c0c59ad6f78e7b28ca9b9f80a6c5b7fd9922fb6b
SHA5121e99025416a61081e16815c52e45e94ea643d0f7ce82d973b79ca084e07ac3f4646944bcb76cb664be3b59610aa215bf4d27365a515dadef878fd0968f1d3c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c93b1da65dd0719e663c77eaaf75ca5a
SHA1f2542df31c7b21fbd9998f79e2fafb852a59eeb4
SHA2562cb786a5dad6375620138a5a5343be7cb3c40f905be07319acef7ec180bf3d97
SHA51281ce12401cf05ef22e197d87d5d3238795d94bcf822c16a25af005829a2c3c8359c3b460dbd56a59170ec7d5114f99fb6ab6dd43b82974899ced91ac12c6ed09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e3a3484d3f08bab76fb4fb8ffbcd320
SHA1c37d1a3ef96336451a36488ec51e7b72e726a0f3
SHA2568843881602259d377a80d9186687261662f4717fa441e1ea0bb4481aac83aac9
SHA5129d9f9a8ca5fc3fcb8f305924ab623669a09dc75e957ff9fca2a9b6c8d771ed71961e103a3b718999abacb03591983aa3e9f1bb6d36554980eb1301f038456054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bac274b6b79d806bae8ee16a89ba7713
SHA1fc8360b0eeaedaaa82171225c9f1c57d1f6d1a5d
SHA25607c9d1e53fa4852f18800d0cc844506d823d382847338c1a85627883c55f8099
SHA5127a5a1a532c62086b6836e82730360629597d79e9da339ed12f4e87e30e4495b9b996eeee698d42b3963a4867b971f72b9884644d889012cce78f8a8f514df126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51733f9800f58b4854c4b6f96064cebbd
SHA12817fb4e06c9a5dabc666d08ba10b7e3c4eeff2b
SHA256de4b5a4908e8da0672fc5a4f48940f2af5481aaba1af130fc985390327e6d701
SHA512318918c9be50028c4e39c9800e5ef5f8e6adc5346c8e93bc846349269bfe6aee36dc8da96fa5ca8c1fcce3141bbedb87c23b1efc81b5574fb2cd96042c421584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d657396e97f2b9e8708687ad64b80b17
SHA13e2fcd0b414def467c7222aba48b2b097531de2c
SHA2567d4cfbe262cb9e3ec30f784a962e4dae5898c6941e596a5bc9b8f5808b97dea5
SHA512401de70a01ad75831e4ca3b2260ddfcd0accdf24597f5f3f92235c6cac357e53cb9107353c2a8e75cb694cda4c79aac3741fcfa9787fc3fdc45bd039789eae17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a78c01d0ca76e6b905c175268f24c16f
SHA1feca10a8883152b3d7167f90b21753a48d2bcd9c
SHA25642fba77afc1662fa7d8fef23ad6376533a27a85313dafb150b010bcd55cc44c4
SHA512d49a61888b029ab7b16ea252b5d1c6929bb6690fb9404e7b1a49c7fdff4c4faa2af2340d0ddd6dd1e92da8fe71b35494804a8874b16f33adff896a976c447707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5b3a63b0ccf37cb1340935771a03b4a
SHA10a60464c0fc629b2b591416a2326c2a6a4fe6a81
SHA256f0ebbb792a628a2f615f86da1a80a37af74e1325bc0177579f4fa4178d53ff11
SHA512cc4d75443264a42be1e8c13699b09332c8f3da30d2f2058fbc27687d2c38995ff0082599f068478433995cbded03e9121294e435d44e179a327c1ccb2f65ee0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bb8ee0b49121cd27497813923601232
SHA1c6fca9fce05e7d005370caa8b322c5504316cebb
SHA256d16aabb8cac7c5001a9ed718497caeb3b292e5eb1c50823437a957bdd80d91c9
SHA512af32484e6c0067bb808c65848e1a97c4e4463e48bbe4c4ab014c4ee73ad26f5977f8e734b5c3df60c7d9eafdd91b2921eb40e6fe5142f81525ede5efb3e3e768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8d78fd2a0157e77880124e938c66c8b
SHA1b01248fa55ce4fe392d8975b222f8446a98dafca
SHA256ab8905f0f21b53282c69a469647927ae7391349bc37937721d32808958fa10ea
SHA51213fe1c2f88293e092e2acd4ba2d92ee55cdf17094d7aa0b3614f417cf0c76e198f7f05262b5061826695c0403c308ccb5e46a217b640453f9c3483172c41d68f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e26167bdd08477f20e24784822975823
SHA1ad25a111126cead84d43fad47b2d8f5cab9fffb1
SHA256c8446eb59f33e64c64ae238e01ebec8e5ce3b1e6e3b109ebcf2c83d2789184c9
SHA5123dd4501efc685eea7645de02a087b402f447ee5f371001f33f8eacaffa6f113dc541f92dfba371f0f88d3f76ac8241e6918c4cb343739cf4222c104fe2488af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff43f6d9dfb73b55287c6c71abab6a5f
SHA1660bdb1cded0ad6e90166035fb45a08e932a0735
SHA256693ec725dc47d44a21ad4f9771caf9fb240e8f0e3b89a1600f14d764fbe6e76a
SHA512d5adfd03d211029dfc52ec705ae9fca7ff01e787a7c78d618625d177bd75f76dc6882870e1e4e96148d17eb8af591e3bc381e9b216296e00e93876789ee66705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d208b52966318e306b0f5d135d18420
SHA17dfaed52b7f90bff0a0de85df0201ec76571c3fd
SHA256ca74d358683aa3b84564fd8f4e79feccb6b7dc2015df6642c11448f65a787b03
SHA51262ed41625ee6c3c14206b4ec0fbe015e3cbe1a94740913e288ef8fbe4ad32d7a533a9cb42409570e691693bc7177675a65e7593f98ac2df4282bb1e8ea1a7d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52236334ba95d1943be691fac97c89f34
SHA1443f9f3304822234979fc80f46d43f624ffceb6a
SHA256c6d1a0f26ba2f70730aea43951813f1724bf9d7c3e43253fbecfecbe90d31122
SHA512a574b8fb63045ff2ab1fdd815d2561c445d4b7207e8e88ff2a0179228bc8cc04adbeabf353f31a7e50b814049ea62eed7371eff7170be2ebc08521905ad3b24d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a