Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:22
Static task
static1
Behavioral task
behavioral1
Sample
691ff4b6bc36ae7e407b47c95adf7c3b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
691ff4b6bc36ae7e407b47c95adf7c3b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
691ff4b6bc36ae7e407b47c95adf7c3b_JaffaCakes118.html
-
Size
462KB
-
MD5
691ff4b6bc36ae7e407b47c95adf7c3b
-
SHA1
79daa66fcb314dedcbefc8506e89a2b27bcb84bf
-
SHA256
eea82ac3c3c079778933676124dce81249e4d8576de655b2de2fb3ece71e3493
-
SHA512
b8fd3b21b31cf07383969f33820740f08f88467fab3adfda43ca367591c5f58927aeb88780d4440781b8a5e5292fc7a1ce3da0e36ed16469470bd3fbdc26df2b
-
SSDEEP
6144:SssMYod+X3oI+YSQysMYod+X3oI+YosMYod+X3oI+YLsMYod+X3oI+YQ:X5d+X3Y5d+X3c5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009673e7e21c483a44a0cb6e0e56ae0a9e000000000200000000001066000000010000200000003e88e79de79622f6e4d22e9aea68cae87a1397db58e3e9f0b6045470372930b9000000000e8000000002000020000000cfc38d09fce5d049f14b53a4c19cd9d0a06b2715468a701568d41399a8f669e7200000007ee6637f5aa93ba8e8287dcf3e0243be3f93f96215bd943b286c43e0db4fade040000000812a7d657242c1e01cb8693f3de4d79d06d949c981408826530547517536d05cc4fcacf38ecea4fd1e2f70ddbfea3ce028721845e5e1294ca149a4129652434f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D039E11-189A-11EF-A3F8-62949D229D16} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009673e7e21c483a44a0cb6e0e56ae0a9e00000000020000000000106600000001000020000000fe9d7ba2eac9ec4eb216dc9d9c0fcf47b2e7393d6a8e5ee1f1f86a1a7e8e3521000000000e800000000200002000000005fd4810ae21a361ecf2dd00d6bc36f62817c935818a6251c0a642bbbd7f999090000000d3a77a5db631823215cd1b7dc0eb78f25d5f0a9b850ceeee853ff82ca7ea71a9407d30e5f641df0f9031a57994ec783ba5280695e7677ce673859913d51f1d39348bdfec60db6e2be95c9d3e20fd22f9a0310a15631496325e50017fb9f850af34975e8e4da14430478acf930540ab7885a1e3d8012e18e11680a46e85a453581ad61115b53d213295b03bf0dae96f50400000003c55a85b6e323feccd8d2e86427c898e77a5ce0024ef5abe089e80663d1ac1301288c89ed5adc7fadc0bc1aa2b7d13a31929c28a0f4dc2c6d73fb89cd49c2a99 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d02d56a7acda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422585595" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1740 iexplore.exe 1740 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1740 wrote to memory of 2972 1740 iexplore.exe IEXPLORE.EXE PID 1740 wrote to memory of 2972 1740 iexplore.exe IEXPLORE.EXE PID 1740 wrote to memory of 2972 1740 iexplore.exe IEXPLORE.EXE PID 1740 wrote to memory of 2972 1740 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\691ff4b6bc36ae7e407b47c95adf7c3b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554c8b473f815e369a98b77b88e7e758d
SHA1ab99e4638ec7b2f6d970c38a434cd48af4c09884
SHA2568ee03bedd96eb044792a6f61f628e6131d1158a4e602a0e56e09cee7fc854f87
SHA51235a800e9c8f2a20afc286bbe0fd21538e712bb6e99b06cd9b3746f4d9e408d952dad87a395494b3aef72343a0d2eba56a90348267d45cfa9c8df39682f0c9a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9bb49b457442c25b4275b740faf9137
SHA1d5a277796117e8f581d6859b3fabdc848190ac24
SHA256af29c029bdf0487f322fc3f0e1d15e0f73ca32cbede11ad03feba0295a533651
SHA512f39f621dad8ceab3cb06a78d110472c84356c201cd2aa289b5cacf1a41bd310b5faf3199793a641c2720b1b138ddeb4a1b11482524de6a6a41df041b984c6b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9a139eab330a43c054a54d843338a65
SHA11a3504b3032dbe055d4428347067afb24755709e
SHA25676d833b9122baa34ba163b22f56b369b8fb60756817fe47750da927eb79efc78
SHA512a3c5002556f8f7eecf4b777c08d767f9b551184a124e1d95a624d9a04e5a35c30efeeefb52d391e26bce773ca6127e7075e2688028b0b00887d67d3d57778e9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a92d98d49e0b060824814c34df0493be
SHA1dbe3a24bc928aebadef39822af9fb32859fb42cb
SHA2563f6a44003757de56f407e74b839a6c14d726caba3808552b33de3d54a6ad3b1b
SHA512e0a72e265309cc8630b38f7e2cf96cc44ba9e4b7687160e87c54f33b9ba914084f3d57c690edadc5cd350995f5cb29be8289c051a69c87d7eb8257bed39bfb1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b861ff257b2d03fc09dd991d8ca3ee68
SHA1eec0df712b94dd0c6772abc18978d9d7adbe8694
SHA256d216bae98ad2e94c8d92eb7e7c2a4d23880a9e496745307094b1625172ac4321
SHA5126504a8fa71413efa37b74b10265e906d7005d6b2ea3348b3b55f27b05e7f82737e43dbeb7fd45e922ca568b0c39f1f3f6077eab5204629dd38d325d5f9232a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53006ea0e6f869a5de20ba13268bdaa2d
SHA110b95570079f6feb00629e243a8899c2a2c37185
SHA256b87be6c91ac4c67f03adda180ade6543a2aefa56c5a12c26c870236bd6269c42
SHA5128071dacd264c2326c7830d62d6f8aa272740ff94b12792e99fa7563f45daeaa2c5af110c3eb7fc60d6a76ec6acb852ca78dcc71bb49d0be104e63822f6905a7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5784df071bc0f933ac221dc05f54ea58a
SHA17119a7cfd7080383e966729d2987b446394e149b
SHA25659556e9decea900a2f405d9ad8ee0bde58ccdc0812ef766680955ab4a4570935
SHA512744793e2b6a45d0850f8338da083d0c447058587d90aae6fd56da6e4755ddaef7fe25099fd1536e14e45fc08d7cf6920d61fc93b6d7daeecd2c1bde9796db81f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5517c615a8f3d183bf63076bee53a72db
SHA12353376be9683cb5a09f1076aace8a78b88b7a80
SHA256e5250b0a93bb1e7c8330edcb51bff0729caa42c6a385f3d3fd907b767d192a60
SHA5124650ba158511d9a786fedae71a6c1e821a006e2da139b6822e832154d8d8369fea6f75c9180ff0ce3b2761b85f413ad08c342241604297fe51ac652c286a5f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fc3a77fa3b7e00dfd21b4945475767e
SHA1e8fbe99c85829c4f7cdfc6039f71cfdcdc705253
SHA256452009cde305946dfae6155668f6aae7e9bff25ddbb11c48cf65be9fa68eceeb
SHA512e7d07d6cb01816b6f4960a3384abc4a28de5b51a4e3e879ac9a661702ca7ddf78b2c17c5d3fa4ae3d00b3e16ceb16b348c3db1288417bd9ef7ece84600581b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59922e5daafd740e248ac0c3ea3337e79
SHA1b465e7e60e35bee7de16e8e276a22b394ef4cea6
SHA2569aad83b82e37c1a2a59aab16fc1d186213180e305258127d823a468426b19982
SHA5127a54a25f4d848e6dc11afcadad60f1ca857a053899c7fd116dd9013f58f8c212831f4fc4ad6be16dd7faae2dce3658e0fb974a9af9b8081c0679f92053631f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b1692446821babc63f8682b19aeb645
SHA1e1073de70acab03845c38bd16c2ce8a517be2b4c
SHA2561b9343df31c83d856c7130dc0be6317132e58d329a4c3a4bffbdcb1a0f87899c
SHA512d280f8a8785217f23bfe95dc4ef0b8c6dd8b41decf83fbe14c6c5b5e2f7ab01525cbddd6b87c524be875dfdde4ec954912241fc1fd6eed7f4d1bb062429fc940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5896af773a1eeea0c0ce1a78a849ba02d
SHA100c99411b1884c395220d231f1f028bb42870d44
SHA2562b66deac71fbc4a67b360bad107b3dac91503841e72f2cd777a2293e3c98d0a8
SHA512b02d53e39e1ab34bfc49601429f98b9050ee24c3dca279cf50ec2de9e78bffa1d7262391df284caaaced1d7a090b93149708141294c51701f29a4ba64cc159ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5deb416aae1f98457a765f5567ff50b0b
SHA14d020c22ab1953587048b3681cc1460868d3f807
SHA25666b945a99cc7392b01144acbf7c11afb55cc0d48274dfce6f35e0ea6e8bfd427
SHA512e23b1e2494e8c3b1d262cf7299078b5b6a1f6c82d49b2548bd5ad4f929ff4ba20eab74a8f5b64c126266bc047875937b26d0e6c7d7e1cf8c44b2df539315bfe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7a3e7ed0afe2a2532081c4625767025
SHA16b491ab39670ce64e2eb61b8ba7a1b6bb6d93e1b
SHA256e1e59fee1f544aab0b9dfe915ed80fd941e0a0ba5ed9b5f574772b87673a1899
SHA5127953502ac0bcf760c95d91c95fcdddb9f82889d135b87aeedfbd48c5b9eaf52445f05094499605ee75d94fb545703d769cb77775f82af348b354f09cea1df932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4ad5bbca7f103baef24d1365366ebd8
SHA1b52af25bd0a0cdfe30f84eaada203a2c04c41243
SHA2561cf28ecd0d059c5be307794077c5ada53ba6b1dbc3c183f41be47fcbb4e9f83c
SHA51299d8b5e1f0f31e910b04aff0e97b49a8fd68f16f165c6a8ab904c2f77d27bb420fbc9b4b93e118fda0749de5b1d7b28a02da10f306a14a7d7c9e5d95bd2f08cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2845a9122330de5591a9ae1af27cdfd
SHA1987fe21601f6836e659245a58bca00f6951b5032
SHA2563c5797688b33bf1dc391b2502cb50d6a0c89a093e83c7e2788f4acc5b8ff47ae
SHA512c9758edd0d81945c67c2f5c619fa805359a740c9e62b8eef767c65a85a8f134a855ea7d59e8fd4abf4fe48d0d8aba465c83b463b02a302510cadf13b26fb21d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe5125f9038339c9597d121f84844d51
SHA1d4e7f63284e4fbb5804a09986e52b0bf7761e5cb
SHA256d41e13d307539a61d688354e5ba3af9d0b5431866649f5aa69a7dd9270775b5a
SHA5123b1629460949bc8c270b049b04fd022ab5cd960e30020c9bdc821ab0295abe210db476cf8b4e7d9e26c55497f3e6d521a2e0e669648d511a3a1b93d8f69c932b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e37477aaef4a26b7d4cb1a0df3f2f5b
SHA13861acda3caa6278f60382f9bf6820136e35277f
SHA256ef021317ceda7b1ec3a79fe8af6298c16660d86ece477bbb348d789cbccaffa2
SHA512b0ce1238657f5b6cb5965fea35795752cfb66b8a21663cbf668ca5106bccfe2ae3491ddcb26ac47daf3a1a9cbe51e264aa1041c60e3586d41f992ead3e8a19e3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a