Analysis
-
max time kernel
119s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:54
Static task
static1
Behavioral task
behavioral1
Sample
6598d84d7e13cfb88b49e3a68befe11e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6598d84d7e13cfb88b49e3a68befe11e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6598d84d7e13cfb88b49e3a68befe11e_JaffaCakes118.html
-
Size
9KB
-
MD5
6598d84d7e13cfb88b49e3a68befe11e
-
SHA1
e673bb514ae3993d0f25333332f170a5a1b9d337
-
SHA256
4d311ee14acfe7abffd5a600a957fe0610d57345546abc8d1ee3c739b00e8f7e
-
SHA512
3d4c111fb608dcae8b1a8c92fcfea6c09ea5dcd3cd90f928b508607b2f2e49d208390e66ed4eb80aa3df49db6b70a555bc8685afc4889d69b7d3787e59739a13
-
SSDEEP
192:aHst3Oefcfdma1CXcFL397NdcAGRoOQiP8G:3fclma1CMFL397TcAmoOnh
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000866a73d803b9ac40b696a24e399fcf8f00000000020000000000106600000001000020000000c959d03dc0066e89be060f820f21833140dc676f825fe04db9d28c4ed7a8427e000000000e80000000020000200000005ace93c93b63c6618bc19332d408037427f11fb1aad64523c8de660aca40dd5720000000b5daaede8731abc45d69a58b6f8d6050c86d01314363f1499fe843900e5e400a40000000b3d11ecd331bf5072a0e162a833c834529e6c1eaedb487110d59c34c769078f92703617e2e783a42658da78cf69c80a5106ccd578bcecbfda0d61a68ee9f9722 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 005e2e05ebabda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422504722" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{302D1471-17DE-11EF-8706-CEEE273A2359} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1184 iexplore.exe 1184 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1184 wrote to memory of 2088 1184 iexplore.exe IEXPLORE.EXE PID 1184 wrote to memory of 2088 1184 iexplore.exe IEXPLORE.EXE PID 1184 wrote to memory of 2088 1184 iexplore.exe IEXPLORE.EXE PID 1184 wrote to memory of 2088 1184 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6598d84d7e13cfb88b49e3a68befe11e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f8e2f560b2d46683f77856203222d64
SHA1241e3368d1122a60d1276a2d4933a5a83d2900a3
SHA256fa25b4b7f459c7c82db3e47098733a8f0aaf0ade38c1b712919deb1a00e256b7
SHA512953cc5389ff573674195946b9501c2c8574e113b48af3f15a2eb9caa3ec765b15189a58b13c9cedd24a1741613e7cef73082908feb14a51ecb46afa64743ff69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a7f0c80b0d42705f9fe95198a6af4c7
SHA11b69676d05bcd5ca316c99c1e78fc2c8e545e0ca
SHA2561e26381a600fd2d02c125dafcae2b5f630c347ccb3e9829439cb31bc5fc5f487
SHA512ed8c1f4479daadc74c1a4a1e6587ea4049abcd230d4d24170ec29885bd260954057a5b432432099a15006b780aa02ae8f037a76e5e27c4813d8e25842a9ccb21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556b1dcadc48788154d60ee06f907894c
SHA1a0fc0522a7d5bfb9d052fb7fa3a07d094d132f86
SHA256dec42470fbd863e8e4086aa1259677eebe4fa403d9a7319a233aee85f8ba2ee6
SHA51254c8bb6ec877939de965797d37975c59391b21722c5123cc2d9f102fb2ecd35190b435bcd593a2a141e1bd8a97d26970de6e008b1d93b0bd80913d1a9c1be629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dc5f1f2c4aefd7510dac3ef85508984
SHA14f6e11e618b859b0bd9614b7d9a6e5697154b4d2
SHA256c4ca9e0276005c4031507f4487b165e62af84a828a716067a8117638a31e61d2
SHA5123c2077418d55a157a3db80f56e042123cd529c2f495f37b9b5b4fe0fc053046fd577f1b73754cb20929e86dd0b9b905d1c2ec8b0b60ca5a766ff8f1de57acc9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3fb40e59b318874b2352f64999cd84d
SHA175ff37541ad95f0846b53a4876d05d7140d66e9e
SHA25605d4e56f094b887bcc0c708a7d275fd764b684a926fd4c5beb5fd1e2232f4446
SHA512a8261098b4909d4319aef38958a5d354ff5d2dbca0e417db8f329dd67a4ca84c1984f8c76db5c499487d128d0debcc0318a363794011d475efd6a17ad2d1458a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a567ae1a3473f40c978586c2f5427f2
SHA1d61e1a32d6ac32afd9250914ec9d6299163b677e
SHA2565e6f1232c76242970c2df73991e6b1cebf3b3e706422e38bd8b7386b3e3b249f
SHA512041293635dc37fe86791af591107a0432531170ed39764991c40f113f3fed52ef67b3092b3cd1236b30dc251ddee5f79b38324bbe772ec099a9e1eda76eb746c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5339be420467eea02b028f2589a32f84f
SHA16022c5a754dbe1efce2b2cf45daae27dec72985c
SHA256b03dc87e6b06cdbac2d1b77e9c66da2d2a2d1f1de12f68472381b0f3a0abea7c
SHA512c1c59fe46481b4dde0ec272511f29465771f7eab780aecd15940ea0f7f02e84995fd7ee9aa04eb36a838798f5ebeca8daab2e07768a58b191956d39f661a8400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fa181b156b35ef8890d7ac3ecf56ccb
SHA168015ae7128576e4dcb34781067b387f48225a7e
SHA256faf6c5bb80cc5964ac8e0fed7dddc03432be5bd31135d316e5db066c29b6a74d
SHA51206f9eb1447882dd48c297780cb3ac61c458a67df767c6d41bfc0dd5f3838132a3a6a3b8de7e455a1b0f9985b27d342d805eda3fe68170041f5289a5f77619c1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de601140ccd581a3fbdb66ac8fa56eba
SHA1c7e8e22cfce904f12c6fa1bd986fd0699e825fca
SHA256e1ee79c53d6becf792b5d593760e6dec4346d7d2ace2e6ccf36a4ffaf06edaad
SHA51227e73e8f876654ed316bb07ec8dde2cc6da2ae788f9447bb10b7f4e9f9b4a43574b520864999c6d161ab3754ff53374bbe237ce606fa03afd950f28867d58416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50654adc14669b75a9b3124c5e4c62a05
SHA154a2d294ab7cf69bb48cd3f7b07af424891bc795
SHA2561ea90dfdd98afde62a4e696daf3f21398ff08a9a8eb83f6bd275a3666a1ee3e0
SHA5128586291d0ff6c3c46ef987ef6d690b3c9511f43c008a802a50eea37e81c79c21522dd2a34884f5e7a5e93b31388c88bf3be8e3b44c67a5dac499965795e04909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee0d42ef1caf1b080207353be58641d6
SHA14ee723a9104fb117728de8fc02c335c5290bd268
SHA2564b89aea8ed29c4eeb461e5c1893994504964eab810c500c8bc9ae1aa0fad399d
SHA5120232984a0af6fefbeccecbb632c8a4439c56f3dd5301c6249a07373d4d0e65294974958187bfe2d707609f690a539a0b54d7ff3a00156474dc7c909c651ccca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f17a16eef545b0561783ddf4728f7fb
SHA1c05c29f7b3af6595c7cfebeda6976f34782987cf
SHA256892018b57e304780eede8bef83824dba79829b0fbbf9935649f3a57e405c171f
SHA512c6c36fe0981979d436ff9a84fb21aa1011bdbb07b981c00853c3fb6721cc1aacb5aacc3f14444b99a564782a3ad555f15476c897d990338e5703fc345c01cf14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec5a0572e69be2066aa0e596fcf2086b
SHA1a0782973a0e90c13f7c332e244eed234489316a5
SHA256e8ea619721b503aef41ca131d365b27ac854ae6d90e88557e83f1cbe083c2b08
SHA5127397b4aca674422f0b6262a70bc853c46d90b2ee08c89c0442fb45dc219b1d7bc988f261e28ad3152efa59b081c3e68e7958c785d5269b4ffe179a44af4c043a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cba8b7cc3b1266ff9c290e875e28ab6
SHA16597f0f833d34b71f9e778bb37b080eacd04716c
SHA256909ee3acbc8320e240d48865a7f5fa67a9474fc2f23e1c862187bba9ddc496d6
SHA512f551f632426911616b3546729370070c947edf81f2f9f98eba70773b39151051909ba494d563d8f10e032ff2e4a7e4fe64685a2bd87eac9512648e416b33fb8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cee433db0ce8e817efa9e8ebce21810
SHA1bc1743f51b72ddbaa24a822e6329f4a7eecb0cc0
SHA25650a01ae86041434d8ec2d8bcc959c45695c216e4c372880e3d29555c33af0cfa
SHA51250404023441e14536de232537bccdd576bf6c46d5778076fca70cb895e4509d1d2d91d8e0129f0149efd3b7e914a94f6b7ff4f7dbb2cd4221fc57e7b49b2bff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eef8f2678487f2cf34134f75a3ffe832
SHA18511046e8d19edb740e686ede54b441803a8f725
SHA2567f18864d322bf8d2b2fb0c919d85d234828808596b0fb7f375793a319ba906e8
SHA512d9ebeddb458e321722764c10981c83e9c5b65dde66878fdceed87bdfc47634fdf2f6126959b12253940a580d0e2f5342d0faea85d5eddd9b480cee5c63dacbeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b9df71c2214c051403400106c4f9675
SHA1bd5a45c860f1e2dd3e72934c55283c2ef9266ed0
SHA25663a7a883ddea2f90a3fa3070634c56dc6ced5fa5adf6cfaaf014d086200f499d
SHA512c1872cdc72a2883da823437026c90424890a97e8615955f635d8bfd4813d708979c3889b832d66d53a25c5a9cc6715d667b4456d27a1225aed7edbdb6fed44d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54367dc9fd9a8f1f66d916840f749320e
SHA1bbd3ffb690e22c8bed17c017c447695115baf629
SHA25627a54ab024d39feed79f14d335b4c73e9cb95e6889adc24a7576126adf10068e
SHA512ae8c948c1909ad5bb26e6567ca75e6db08dc83412413cc65d5d034aa0657349bf8baa46824e8daec2f177079a533d8d08dcf4740c89d005b9c522d6bfd0ed023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3b9b1512a4d3077247162f1080b21f5
SHA19cc9ad419f58e8710f0f6d9325fd2ed1fb45f358
SHA256caaca1e1920f6eb176f0f7c279e029ce069feb83cc0c002b6f77c6571cba5bb1
SHA512887abc07a8c91abd237e6c080b10f01150e713d770a1e140accac864028822bc3debb56527de4f24e2e2bd01216fe3114a1b80fc68b0b2df6718043ec7b2a3e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db368f7dcb3b113ed6e1558e602f5679
SHA1215044193b323452d222ebddc86df2fb31b4ecba
SHA256f3bc8b2dc896ca5119d044b58cccaf5bf9f97f87f5f33b05c3847501a9b3b3ef
SHA51280b5df096db842b35d9bcd96a1f549227fd70f18eeb093bd93708d49962b1452b78658eeb7ba759d83ae6f3d9df59ac3e3828efc821613aa3598e1bbbd953b06
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a