Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 15:48
Static task
static1
Behavioral task
behavioral1
Sample
50422d3a2b90e1c16152047b0f9aa500_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
50422d3a2b90e1c16152047b0f9aa500_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
50422d3a2b90e1c16152047b0f9aa500_JaffaCakes118.html
-
Size
40KB
-
MD5
50422d3a2b90e1c16152047b0f9aa500
-
SHA1
3b40102d4c22671dee195850223f1d53ea4cbcbb
-
SHA256
fdeb9faa0c8f16b55a119e966852c5a7a531d50c2def20d962202da8da4727aa
-
SHA512
09a6e5ec342a9f991ff8678e317cb7623404b17fb026e68e942bc8b91889b84edc2780376db9dad2224a3073024a19d36ef0a0324e4e58b72afe868a5c7ae30a
-
SSDEEP
768:T6KZwlQbhEjPHoQ4F2X+r7a6ayL8+rpjkB7eJ:T6rlqQv4drf3pYB7eJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e6fec871a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F34E41E1-1464-11EF-B238-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000004c2ac4c5fa82b132c7691ed6c98b594db1a5a44382b552ec3ab409945baafd5d000000000e80000000020000200000000715520985783e13271f5cc6f30f08c22595e571d74b42ea56ea429015372b6620000000e228542ec6741538ab9d0153e9776ffe1138eacf3acf7498f960be7d9f7dfaea40000000b69976e3402facf26e4d48247ecf9625c30c1b3ab7cfe77be797c28274a8a9189529e49e34d423ee121b9f07632f5a60dfa2d2fa972b46e6691571e677eefa96 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422122796" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2872 1640 iexplore.exe 28 PID 1640 wrote to memory of 2872 1640 iexplore.exe 28 PID 1640 wrote to memory of 2872 1640 iexplore.exe 28 PID 1640 wrote to memory of 2872 1640 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\50422d3a2b90e1c16152047b0f9aa500_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab22f1ff91ddfb82e4d3deda24b81789
SHA161ec634c1af3727164bd9be83b32ff51f133c6e1
SHA2562b09c6764b51037ac26a13edaff9d60c70bd116a308b165b3fce6f0100694efb
SHA51206a6695ec56f3a41c06f4bc3fea6a3da12f402bcfb212778d4ecf1f5174677e92a4c4359fd995728b97aa1b783aa8705a7cfd97b3516ef1090a7ab927c6659d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5d0fd86bccf9300543f89218927945d
SHA1c6f013c13afbd74cdd294bfa75b0eac9b93bdf2f
SHA25661b72c69b48e2c976e16f19b3f067e5dd0b1f9a284dbaf7fcec6ebce2621eb8f
SHA5125f701230fcfc21688c4d9657f6b78e2e31fdd79994410f8d4dbc761e86b190106af136c07301e573a271d83fdf5f3a0ea5848207803f6b51a52f4c9603952182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f7846955bdef69293550ef93e8abb90
SHA13ccf4844f4ca9695b4f3700f8ebdddc5df1a8e0e
SHA25661486c15b744fdfb249b1a334f52c0517d45afaa2c02defa5d883e7c44da4a48
SHA5126c3efeb0af8125999293ff90e2b77227c21725ca6cb72cd17aee8759361692f7e7b6363c03bccdf2f17295f478262016de91534e632071e866fa8a73136712b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2aa2631693baf6e3cd02b851c6d63c9
SHA15a4fecb2bb37279bdd8662e60390dc1a308d0e51
SHA2569db5474ceaa20b4193cc1d210945a70ff341cb81a48f053a4730dbc4ebc50a62
SHA5121671cebdcb27a4a004b0be519ea07899db0a285ced1b88809ddfbb256a72b570a11b35e004906526a51aa85612bcce67efa43b73c89e312d80253b1acf1ada9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fde7056dea7e33ed094f38ff41061f53
SHA1a24bd19d8901fe4884e23237ecc4f5f666b8e954
SHA256c7abba58597ee93ce9fc242c2473a3092ff2a7075cd476c1aa27a8029a9fb8e5
SHA512f4eb1eac2f7b721d75d04481444b4c8a2f8f77fd81d082176c6691a0387775b9989238cec93362e7f40f63656ae2aeb2bb6493f1a2df2585ed4a49b56c2c75fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566c933e81ccde6cc870affecb71a3707
SHA110bf302b3dae13602761d0fcf4fd7e5a5bda186c
SHA2569056eb9b92aec6c5645e13eef8f7b9af55546aa9988d7faefca8105ef76ac650
SHA5120038ef064036d3ddfe076a956195ff57328d36150679ab620320529a31b2a861335b5ed3981cf14249aa6d467cdd1ec92142ae50d57f1f82892cb75a151e04bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533b00fc699ba07da9f99fa38e7204116
SHA1b3f3ee330d0925fe6e360682c26e873b9bf01e4c
SHA2560e2f984db49b8431aeea02e223dfa11e3a3266b97b4dfb4d16202ca48595c68f
SHA51266f2a086ef8360ee3cfc02675f0b88ca955a0c582fa30dddda436500d44c812a0f378eb635ffb88e220b4612b109471a267bb5cb9d92e8cdf655aebac547d658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f85a3ff353f6c27965d489b8fef77756
SHA12954d2249376c67d2b9f5e124197801438e7ad69
SHA25645e2554674b4a4976539e18fb1fb207de320f64b7896d0337b8a838d1bb35c15
SHA51258bb28e1ea929f352adf014aba7cfe7aa363570e77ed9a9eb6b5f9ba7ba287fa52d4b868e4da847047de92d84cbfc4813fc58559f5b7fabda6d5624fe78dd559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbf28e2b6667d1dc424ca9ac88252d64
SHA103a350d37dba34db5d8f46913fd22f57d58d7cc4
SHA25653235b9f699bb20921f2aa8e4a4bd38a5d4801ee6ea3dd33f3a6acb922b41639
SHA512161c0d86fb5b7ae057ec57ad9c439c409e0ebc1fb67dfa698a5262dcb8b0438db6d990448b62d36c56c7cc8674bafe1109dfc8affc35d5e53fe43b89fa7174fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52227551485371429942a0370c40f10fb
SHA1c472442ee2a29afbee1c23ef9ffa11c2c2f43e75
SHA25621871bc4440a4a16db5e6872a555f0559b3b958434394e929b470bf75776e21b
SHA5121db0de7f49fe36b6c9f044ec4f91bfe89d71c6981884ca4bf16ffc1ac450e59bf07768b8020578cf3e386b9186bdc06a77a0569b7dc675a2f6efeb2aa5a8ddd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5282c8f016e47d6f49348de8c7afa0085
SHA1368ec76f9674e799ae417c7ea29605b73624a85a
SHA256c00960bbee8d09d0cc4bf354cc02d67a77e97b284d7c4070dd1e16ae2907a815
SHA5121beffc6d441ae3c13645ffb20adc41999fa56d39a84631293ec23ebc6e7bc6ec8320a85328daa978c0189eeeaf53620084d586a51a2be7e2f024ef85750a66a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520a69b80fcbf2321a4384ddbaf1df0f2
SHA183ce87760356ee26f45034a71d2468215fac579b
SHA2565925cea869b7a6e0fcaf0e37bf90070f37dce8ff6d6d848c363c56096fcb61fc
SHA51294cebd0f103fd50b5ebd5dfe608429911e35df3c3f2743c302a1c699e7a9122e5ccf618e027022b973adfe55266ae70f985e9ec581a41c67d9821fb105fbb7d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543f217b8c2ed9e660ad446af4798310d
SHA18b6c074e72158cf43552a0dbf9161163be58f28e
SHA256f24d7ce7ab8ba3222efa4ca6da249e57ccf7b9323506d9b38a7de21629912a2f
SHA512712fc3be3b62b9a6fea738e654c4142748200702b45ea9979581aa628ec864dee65aa5574dc8c17af96a39abe32c7eb64c63515f2e736e984ff0ac820dc0adb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508f8ee2f7390e09b7b1e3a925f5f58cb
SHA11166f4711d8653918ecea4a01de17b0123ab20cd
SHA2568c0b5b2c9dfc1612d3b1f92fea2cafe9cb546e937b847136c7f1715910d86384
SHA51240cf4d7908e95897806fc837656c8c3b309cc44fd7d9dd9177294e97438a01fc07b37f40614fa0b3dd5b9a8323810055b375feeebc333e73efc2ca53f0c30897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5607348324a050f54f8f41e4e9cf58f2c
SHA1379be9d083086f29bff2f64229726a88b8cbe71e
SHA256a4f1194478376bfb8654b98512efb563523feae9052724850208cb9dbf3f1c3a
SHA51281f050ca4a9551d3742668b8904bf7a735f68b8fa1bdab3fd738d772328c3e2cf91306b83ae4c04eaa2797ae96482b145c285c54f4f195fa408ac7c9a71c4477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c843a86759566b7e4b0bb991e2a7ccc
SHA1c56169ae5dfdfa90674d007d17c1bd7fb9590c15
SHA256e62428f1862b36bf4c3c3fed556de14bf2b9da20064c693461bed350db5434e1
SHA5127a6d697b314717e834bc7efc788abbc60e657402742596295ac6d68fe35df0d287757ad0df334335ed0e596c955b59e5204408c22faa413843242cf3416da589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f7d25374f8ada2ff0f5d6cd49d289dd
SHA109bdfc331dad8f48f18c5941561ff0d2aed367a8
SHA25681122e99ee41e84d2cdaaa82a5736ee1d92af55e9a785182a436a2260d8e6d55
SHA5128e897e861c566de9995622cb8caaf75be68bd0e9c158f1c61b3e34049767c2af44e75b86559bf48c3e310302ddcb5f576d1b6bc93fc55d017bb99e007541103d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e73bca6e4cab9aaac1d3fcbf9ea92ca
SHA1192ec12108e23518ffed62b18d44d29c1527e455
SHA2562ddcac92ee9a45d09d9070f45e503165ca17fd1525e569f83fa288ab906a9a0f
SHA512449d7d8a576178c8b1633a0bf9f438c5cf046f907ce1b6cc5572a18e51cd5bebe057c2bccfdb2b7970dd8f9734da139f78a973f698aa22e258348d892eef2d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f46fdb69f67d159cb9be68b5bbe28864
SHA1e92c2c232b1e8f5d59798457b850008f5fbd6f8b
SHA256e4d0f94bf1c6be6d04e6245a114a3acb3544d1584eae373710deccbc920d2eaa
SHA512294ad024b5113f958a6724503855a9b4e7859a503ee51e47fdd8c399036b733005b9fa2a822b014d2b61298f1149c1648e467b85f2e22e85c292e4f271f12006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e5a4ff51253b00302d43687b30f57ef
SHA1617529556e1b986ba5dab25776cb14082660cd06
SHA256b84a89e9b966306f45303ff15c268c463fb3f088d0ed6244e84e5706ba8f6c8a
SHA512ab309cc015c89e672c10b2537c6b0f440d9923b21f056697195ce68c03dfcec8003ead1c87253903709269339ee8d8579fe0de7e23a4a93d408da006428027e1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a