Analysis
-
max time kernel
136s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 21:09
Static task
static1
Behavioral task
behavioral1
Sample
7a893966ab5487d6679fb0ba927a2efa_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7a893966ab5487d6679fb0ba927a2efa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7a893966ab5487d6679fb0ba927a2efa_JaffaCakes118.html
-
Size
52KB
-
MD5
7a893966ab5487d6679fb0ba927a2efa
-
SHA1
3e6f2e7c25500d476bec5f9754c08478869bf495
-
SHA256
6af749ceebe4c6ce2fc77fbb1cdccbd1e7209bcf5375c40b3dfda335ec6a1491
-
SHA512
7299dfd6ece96f436952b46962800e7a676efabb38b5e6191d4fa463bfc9f97d13833e7b48a8cf4bad8b33430995a76b87cfbeed9e8734b8abb9ecaef3bf985b
-
SSDEEP
1536:TPdj1gCnecGs2MMx39fBX9osOnBragF82:Tp/UMS/SseRR
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F262AC1-1C6D-11EF-8004-DAAF2542C58D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40b995827ab0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000003f60286f4756c7019661aea15923f7fb4001ac274928de545a914afbcafc532d000000000e8000000002000020000000aad77f28ad23ec75845c7cb4d19951641e884ee0a94c0d733c4a5fc4ce9ec201200000001c38f387e80a0bf7ef91ca04fc1d3d2e73952c1780cd817794b594d1f052cfce4000000064e184fa48f35aecbd0051277a3b71d00c13a7fb3015f0ea901146166ef79235a2eadc7073525367d7041eafb1f031aea42f60a85cb25bc517626d9c0836bf0f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423006049" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 632 IEXPLORE.EXE 632 IEXPLORE.EXE 632 IEXPLORE.EXE 632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 632 2288 iexplore.exe 28 PID 2288 wrote to memory of 632 2288 iexplore.exe 28 PID 2288 wrote to memory of 632 2288 iexplore.exe 28 PID 2288 wrote to memory of 632 2288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7a893966ab5487d6679fb0ba927a2efa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5716c352cbd14224a03c80f304e7869d3
SHA180ae41281d6aa7397d58a9cae3881d5707e25798
SHA25683ae2b99f5a4f7d35034d3fd4011c2099c8128263daf21a5f114d87037c2d0fd
SHA512ee777cd6a5587eaeb4ae88f7974171ff4319d70e52ea693a81621049b419dfebc7e46e3d08f239eaa960947fca7f9ff86dc47445f379f663d6a5198c3ae5c688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ada6f34ea9e936ea7c1ee6ec5b4d8a9f
SHA1b8a0943aa87d0ce7950c09c0d9f9ecab3e3976c0
SHA256de0e2519fdcf24d61650288d014a09305268cb5534d0255e45bd20411124bd9d
SHA51282481ffafa8ec8ac20f6c9552ed5589f47970ce0aca3ac7e521ce4341e8961a573918178bf633a4e7216c25b073020f3472d74b4fd88216cab3252bb9addc945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a5a75e942a509803beb2513b59d547d
SHA15429b68ba3c7cffea00232440a4153346f0e411c
SHA256af835bcb4d7daf037a2ac417218eaa98ca06efacec51343711b0826b0c5928ec
SHA5125e319ce0608eed25d61ba822b71ad5783acc2df13bfce01f5fc654cadc536c9f27a274c04ae9dc4ab42c0d03e03356d014c604cf4530234261cbcfb3d0d4c877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5402b4530f106857388f45f603445b01e
SHA10e63a31195a2453d7150950d52861e78b3d7f0c7
SHA2561a4e50e8203135987dc619999bb25e3557f4970822fabab3dbbafa6ebdf2c0e9
SHA512400d0fe51a571fa94f352ca301295111383e46265e14ff77e8d4dc62dfb32c00781e4041cbbc1822dea18f189b712b6a80a36606dce1bf9ed10f2ee1aaf46338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdb9e382ceb8e25aa339a7818b23b83f
SHA1d266e1123dc239787d16525ecee12d44d405bd93
SHA256f3412f72eb3cb40deddf2bd5226e2086043d43da1f5777950cb18f9750a18700
SHA5121e9c9b6daeaf79096fff4fa81515fb487ae258a540c322b0fa76edf8cc4f1c5e49edc780d0519104433b93d17f4d0e3bdd5e26de31ea823c773948e53f878e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53607dce124afeb55c099c5745a735f78
SHA157db7a3e80a630fe7dc73a5dae2b128f433e7bb7
SHA256fb86958daaa4315284a955bd3a0d86607d17264ba8f1da5d0d88e978c3540ee2
SHA512de132deb0f0c8c36d75c8d23b4d4622a0943f3224aaec9b741b836594d3322978ab726f8d6a6fd216c1ce36823357b76f8de081c4dd551eec8b60b43ee871579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d56f55b0056847828232a2dcd56f4930
SHA160db7bdcae707e1a244d11cafa872bfce44b1d8f
SHA2568d75318daa1339a72625993f76c2e593ba429233bb99a89568cc0a11fdee10fc
SHA51297785142d8c45dc8e765812cf86595d2bbfe404b378b23906ca1c6673f45d4a1f12db5542e112b21ac5040c8edc9c8c810b2cd12650f65eefb770d410fb80577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5028daeed6d04ffac8c3e8398e5c1dfee
SHA112b53b428f50f693794de8f32307d754db37e25e
SHA25659a62713ccebe7535cdfc5f9529fa315f54a2d88f4a2098ac0018f6a15e34fc3
SHA5123022c1f6600dacc6b4119fd7b74fdca291d1659c7acd98ea651072e7dc7e1b869fe101b833e07cffbcc9d38b7f6f29aa4608b22f725c18000f160acf9e5c2c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53be1bcff3bd3f86e4bff25326155b80b
SHA17e43daa65a166b39580ae077a9d43e1e5beb2c29
SHA256ab29e3fc887845d9dbecd97cb4671c158dff4ab6cfdfff209ece6c72baab5e81
SHA5122cc5767caaf6b3e0e9814b80a6037b91f0a24cf03b504388c37bdae48207dca4de3cee9ca6f46078ab462891168e74eccf6729e8ffe81f93ec5f5e985adbf6f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2142c22d7ab1fc0b8e67c532cfebfc9
SHA1073050aa1e4c7cf0e9e5ae2b59b37ad28c3d34fc
SHA2563f5432482044f14ab59eff9de204d199f4c80a0db5591bf489d9126b144bac93
SHA5122a921a6f0ee34f4ccf985326d3e19daf253447dfc943ee3644def6991f5e7c01ce5a059d7ec47235e5ea65e9353ca4d8b743e72295d30e73a43dca07e7fe09c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f55c80309e2a524309938ac35b47a16d
SHA125e42349915938cbe78e8bfa9e5685d3afea273a
SHA2566a8424185da19f1e704645be45a248d72732a1019e81366f127f3fb66d75d558
SHA51239592a95d46823d459855e4eb892fd2a697c68780f83285fbfcde300e20969db14a2786af1ae388748da4e2ee0d45652f2fa32368814f6f2a7d6c13acdfcd622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d1f8ce4636051507bf3a053443b658a
SHA19a7f997b1cce5965b57fe301aae7ee0ad7c2c5f7
SHA256afa2932d01814e1f7c82a4eee99cac46a980a664fc7cba70502567c688865de7
SHA512f377c755e5de6791ec56e129e8255b117cab394a4e0cd7d74ada36a32775b989815e7d05f6073a1e51eb730dfd9cee031531f8d0dd1d18d489ea26ddf8f5904b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e75580a7e40b5b4bf1a3818702a3578f
SHA1343e46ea6bd3b2560518c1f55995944c85a2ca1a
SHA256af49dc21dee0238fd8580ba29694479ee35d098e716a3cf94704824229e1a35a
SHA512c2cfda6a241b9d0d14e7668066412f1590937e09b785182a253a85708379bd16877f458fcbd8529dd8e48cbd47dbd5c09c4999803edd9e05547b0102c1300f8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557c3b8b2499d4af5282f5014576d219e
SHA1e6034f0d73932d83ef4a4373028ec08c5749c3ba
SHA2562095b1288006d93e3ed3dd859045fb654719874de44fd93a628d44ec994afca4
SHA512e5c51963244d4f2038bf42774e092ac1cb7d784c58df2a7ae3eb747f2824ad9518dfe1d5c149e193eabc062b3e5c18484b1ffc6fa8c7918ff46d2d02076498ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb8b90344d2e59e5ad766479ea7715fb
SHA14be3fd6b59ba5b8c1d3a82e9b0e0fe5c5bc1e4c0
SHA256d6c37320d856319a391fcacc92ae037d3e76b882536cf129abfae7fb14dd1d8a
SHA512d85e5980d2fab77a0366ce649e132014e0e0a35cb200ba943c987911616ab4809c2703a687613364b2e99cfd46776f9ced3f6a8a73cff993ad516b202b5b760c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521a779831cb14a97227ec909b426ef0b
SHA12b7a946369ed7da0ce3e8b41af0291f5882c0505
SHA25638e5a5c1564a3647b82fe65cedb4e9f9ec0d0734871a2fd4951408581b53f464
SHA5125423aad4cb14711bd9fe239dd54baa31189fa36987d962a9e297bdb299a2ee07e596fbf17b34515553dd69c092019f55b860268468a036075d5f17629b3a7b60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549b179673f22be234168110fdb73fee0
SHA10e7c6f1db8a593024ccf6ac0752173ca514c429c
SHA256a5dc71ec64d6d6837608fc4e59af009b5a39e450973301d555ff18a27735335b
SHA512f6b306cb2715bae3f608ac30d48e661b1e533b2f5d2c4e1d33c92cc2ec1785ed9cd17fcfde10464f18620d5b1e5db03c0c1a42695701d9de05b516fa5d2f98ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5594932c074abd4d3870e701787822a0b
SHA192e9c2518c65e0bb045fa863520c1ae4cbfc8f6c
SHA256511ed28457f96f6239396660615e939780162edd8ae17a981786052b2843c94e
SHA512d28f42d00b74f09a9e179ec47776c9efe59c89f7c501558719b68052af3aa820ccdaa45a9d993e1dc34d98d63aed608f6981362419add9c94ccc1f0ba8ad2027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d718cee2a7ff1b2bd785c532b05d80f
SHA1cf2ed676f0e3164aaa4308d0741794d42bd14c4a
SHA2569aa7de0c03ffc801981d3485643a11c4c6be402816964d7d9b20adb12edd317b
SHA5128058f417563b793a652a8c0c408f1cc2320cc32174e7b1448d726e18c542b3d5c8f79535b966e81a4b8932585895c65d25c03f8aaf910f7d73d79942abe552ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa55f3308b90b5c8375640cfc1fce09b
SHA1ddb54fad42d6a14739b5804d2eb44459732aa0d2
SHA256a2cae1c6c23dc0b5eb33449de21b6aa60b7a77da5a05c857a1fd10e2c6bec4cb
SHA5128d6792ecd6664e30186bc34c45f69b6ea3998d5b57fc8a49a0ccb699b8c324852bcf5d49806eeb19be6a12353dee70443dede4e481d49dd3b7e2ca5723a7bfd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e30a1527270cc4d21cb1fbe201ebd93
SHA1e89f46b4416b9fcf40c9523939342ae93a2fe1ca
SHA256ee47aa46ea7f7c86d310ac43cf9ec89346116a452c51cbdcd59919fd75be90f7
SHA512efaf3368fbe9986f0d1b34b5fecc88f6cf65f28746919ab08aef04764d6f720311ddedb7d4038fab89f71bddc07fdf16aa1b16117cf57083f56e799c359b685f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a