Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 22:17
Static task
static1
Behavioral task
behavioral1
Sample
03bfd1d9674ac82cf29b2b6dfa27b912_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03bfd1d9674ac82cf29b2b6dfa27b912_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
03bfd1d9674ac82cf29b2b6dfa27b912_JaffaCakes118.html
-
Size
818B
-
MD5
03bfd1d9674ac82cf29b2b6dfa27b912
-
SHA1
eee92705f208f074ea4439b91ee048c5f713855b
-
SHA256
ff1a875aa4083c0acdcf158d29ef2ade74efb405f51635c333afbdbf8c24e0a5
-
SHA512
58faf3d6407063e4eaa26f0ee38922561ed4d80a47c9026019755132fa350107a5fcde071fa1c27e4ca86024d53c36c8ef95028318777d47064fd2e947aaddc6
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E348A191-04E3-11EF-9201-6EAD7206CC74} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ef12a7f098da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000047698985a79d92494cd70f9f5a8c1a4e6747bf8771076ad44c79dd2eec98e904000000000e8000000002000020000000ceac9099a0ec9a631b8d80bc1dfd11027a98670e1d9df6a5e7e912e6d24c40fe90000000a406c9f076712759b6b7a7ab360637ff840a0e4ef0295c170b6790b0594c93564eafd676ba549c6d99e39f825435843228c4150f5b4f4327ba2e40c5f7c2038fdfed78a35af8ea8d355c72b8dc8b9965db6016c74fa2bf5260dd8d879d89b027ed3a70cfc81ca36f3c99a05c3a0f75e50ec7625d7346a289f7c50c3ed5acbd1b2b1394e93707a91f6eea689e9ba3b319400000003855ddb459f8d186ed3ecf0d92dbfb96891f4fa58cc4420afb38a7f50caf7172e85a9f1897f348a305862d9f17e8201c5db0b95fa2166181c83f683479a3c2fc iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000aad9b7e81389e5f3d65d9f939a64f0ea1b7327bc6c1a359b4e5c527f1acb8d02000000000e8000000002000020000000f4bf577feac3a8b50ac98ec3f576f9a10c348a256f84f58e883d77bb0492236520000000a791f1083fcdabf346a1cb085ea1ef60d3efc0d3f8d355624d6f6cdaa9711ebe400000007ba757bdcaa7ff7090b81e1a57b4a36ba2d10d77508c031050ef462455f721b1903bee379c52c0c88b61063e1dacb2390fa4fb8e9bc54f95f4206eb336d72950 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420418098" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2068 iexplore.exe 2068 iexplore.exe 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2068 wrote to memory of 2992 2068 iexplore.exe IEXPLORE.EXE PID 2068 wrote to memory of 2992 2068 iexplore.exe IEXPLORE.EXE PID 2068 wrote to memory of 2992 2068 iexplore.exe IEXPLORE.EXE PID 2068 wrote to memory of 2992 2068 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03bfd1d9674ac82cf29b2b6dfa27b912_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55db3c4a0cb9004ea75ecdc0334b5bdab
SHA1aa18dc5327cdd9a8795854756bf4898d5f4b05a5
SHA2560665487b0a81531f07d60270c8bb1d3b54e49ae3b61ab2a3050907d866139edc
SHA5123fcc04fb8ff56790957eb73dad8467a6182722a025fe3eecc490c594681299b78945bbb3a9547b2b9680c15affd2621c57586db94ebeb8b93d58f0a7117a2f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59ba5d25c10bd87fc69ce1c25adf9753c
SHA1275f7b640da59117789cbdee7587e9bc89584bcc
SHA256e3d0aebe11485651d0f0fc63fb5bb368dafda5103b6b3a59b9bf82f782967438
SHA5126ff499b0f0be20221ceb8758ab60d394eba898b395c6a4d42f04ac65997a9860679030d31a493d850f21430b2ad7aa80d97b4f953699c2150e90f0718dedc78c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ddf3150b11c2d0d5bafea04c4dd5f678
SHA199f6264a7285e939a362c6bbecc4ae009d1aeaab
SHA25640499b798724d264cb237ebcd4a46f28fc25e3e19d7031e2c51eff2888d5a77c
SHA5120ec7db0e836b069b2058bfef460a71a0ad1f61a01da6b2edf142affc7a428f06e19e3c4a39cadc804400ba0e987690fe143a8f971c2537f75f7daa82c93c774c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5086924238e5e37839cb0209e0a6ec489
SHA1e7118e6b92b8a15db6b420f8a6ced93308eedb2b
SHA2563d8367f4a45342898150e949a6b4e2cccd8fee5def4a5ac7c603430156fb2b3f
SHA512497c3df1f42c7f8d8dfcbbdc801a00cfad5ee994944380b6b843932d8f27e433542112a936f87b3604d1f71511d40aff07d682cc7515e90ccd9122318f312d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58d8ce95b74b56ce7bfd5bdab14ab5915
SHA1e8b02229712b6688c07c9ff9ce4a183ed95cf40b
SHA25653069802bca265c6a526338e0da1c3c65d620ecd9b3da364e4043f991bf5ff72
SHA5127f9943b3c5a7aad13dcfa7afa187fe18d6edc1a768fd93f79d28e015cfd9f640672222da27a8bd3191160799b79e9722c46ae651872e2cb4cf806a287d5f0fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5164db941ef89158358fd58cfbb119030
SHA112cf010cc0049b1705515e8776c7e13cc49d7827
SHA256896975c11140cbf9a40439fecacdac9ed19e9e34dcb2fd491cb5427e8a9a74d9
SHA512c4d60e27ce3e02e5b98e168f6d1941c5310ac22c10a6806a613a2c08cea359d21460cce64f526876612068c1d53009871d9c112f6e553a57b016cbc9384bad98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD545c37633f39be052194bcd86d3780ab8
SHA100358ba016e72c986edb7e55e75bee50e78bbeaa
SHA25644ecfcbed43ced1b060c3725c285dbb14e3988ec7b6a5dc96e6e7c71fc1a053f
SHA512c8ad786b5b83632fe28eb8f43829d3610c70b03ebb56be110aedee2eee1b8273353e5a333795296bcb6c6c567e742899f2568b60ce04590678bfd69c8faee61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5465b81ff27732be31b725870c82253b7
SHA1198187bd3e007090e7663c29259ede6f1b2c56e2
SHA256dfca4578c6bf706ba2d267c19745cfdd9d940664939faddb791d0a1cd152bad8
SHA5123db1b081f7635758b43ee6a5fa6ee694709e45b17c47b0a27e9b0d72c6b2564c1d3b3742bf052bb35884678ea02b2498ac8227baf1768b1dc9e6482029d86ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54191019be0f2c10957d73e96feffe523
SHA1e0480dc9aa18676ee401035439e747ded2274ac4
SHA256062dde719c24e8f4017fa53ee861a9bde02050e46176e066d8c1948a3eec3d64
SHA512eef6b76853f8ae8c4da3d1746cb04dee437c5dcedb913833ca4f34769e7738a8fde32c706cdcb73fc02003bb8471245cbe32e6003304d85f78aaf9b3a9bdfcfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57ed870e86ff94ca96d2fad18214eea7e
SHA1a90f217b1ae52f610568f17254ae2ec554ae2e7f
SHA2561c72ab23fdc22cc56aed7ea792a3072efd064566a1e07cd4a9f8b3f01990c736
SHA5121b5b7b24c44635fa9bf70271b13bd8a4d4941f296a620991da4f73bc09d5dc898fd2aecb43963b878f0793e8e2534ccaf6c6e10299cb4c71693d3e000e74003b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c80e0b2334c0236e25907780dcfbad19
SHA13128f5bc82fb49d39d1a482f31684a4cb9c4e7bd
SHA256239a11946108c7c0ea21710016f9f43336370682df331eead55c0b6d88fa0304
SHA5120076d1f8bb62025a6d25bb07e699068857983ca6f6f7a592caecae7601bbb101a8b82673d89cff57575a9803c1e05fca17d72aefb02a8bd2dc8487fe5e15e1d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50252fe484b8dfefcfb194e9c570e65e3
SHA170fed248cfc9200aa7817f9803740e9d60734bf7
SHA256e425dbe9d3f8d57cc2fa7bebeeafee1501fa9c609712782cdfea6dd3a3250eaa
SHA5122e6c103443d03b6d61268bb5a3acbbb18761f73bd87a2c238728a623fbf688d08111f8fae7abf0381580755986ea2310228536d063238532d6d2f546164a01ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a80707dace6eeda6e9e43b3e089c3ed1
SHA1c1e141fbe5e87b675a276a35050b1c8cd8e947c7
SHA256ec425516c0ec4976b733d21e6d01e159ff71c0b76324a648570225dd974a844b
SHA512978ffcf927cab74bb5466ce774711564d9fe039516707fa7dcf7e034d0921be3e90ed2607e00bb5da8c4f57391a5761be67d431e0f2626498f84d99cc9c4ac27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cb1d1a8e6e7311a091fd6e42cb682999
SHA159bf60e15c826227fb9c9beec660dffed4d60933
SHA256ad8ab793531649f2bc3f5115ac3e2afb8e666e5d9667657e3e2c83b61d681015
SHA512b8d1c38f34b774c334c7e4bd28ffc341373fea7e912447576bbdf45e471939687f9b943d3f2b4d333f560d2f9a437d6e36ed76e1d4f3785682f5f48de821828d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5aa0586d4e49d41ff57af72b20678410a
SHA14df9b64ed271900bad01de551444a7bed1747bb0
SHA2564e18e0a5e105193484aa7ea089a434bfd622f58fac147f1bc34780231059dcbc
SHA512ca24be5b1d6a66eb788e841b2afc07a66724f3b1cd57ba2084caa9a6511fa17c116d83e0cecab22ec3894b3b4558314bc6b35f030672c9099cd2d5dca365ed0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51bb99d13eaa63a704949ef4ca3ff344c
SHA148cb166d14b81ae53c973fdb12c2e050ff967c46
SHA256053302473fe20dbf99369a2d1ca809b1be974fc6a4a674d4e7162c13250cea6f
SHA512c558fba6f75c744e9bdf5f0bd8bde5dd4d8e8787b94663d7fc06291cc13bdfec0189222e856896f6b092278eab25ef1fc935dfac778f5e1c007218f4737d637d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5695173318ee0c47940e495cf5766dbb1
SHA1087efaa090caca850d7d415936ba2a2b39637833
SHA25633da6ccf312aa02eaac247b5bc68e308c27ec8fcfe7af91c55ae78ca4e3e783d
SHA5122b962f42fa310db5866f6acd79722f3042fbbad6a8629693df90115aa4c79c431a9295b184f41f525ec040f7c00b7205538adcba46420ee33d5847e6be032937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5afa699e0ef140bd2bfc22fa3b942fd21
SHA1fd41e9aaf7c9b6c9eb832dee0af416ccea38a2de
SHA2563c08033085259998ff51cebe0be8327f6806bf09766487f224f4ddb4f74a02f7
SHA512bb4b54fd84d8d23986824c97ac3cc8acda9f0c0da753ac2a9fdf857a39a90723a530027065f0e6d4f33df426f03e8a0232b52474b1101e214a9f8d57a0a3656c
-
C:\Users\Admin\AppData\Local\Temp\Cab7B7A.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar7C5B.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a