Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 14:29
Static task
static1
Behavioral task
behavioral1
Sample
2547635be6f31d24ae0736e43c74624c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2547635be6f31d24ae0736e43c74624c_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2547635be6f31d24ae0736e43c74624c_JaffaCakes118.html
-
Size
460KB
-
MD5
2547635be6f31d24ae0736e43c74624c
-
SHA1
a1ccfc195521c42931934fbc9f6744a1c807c2f3
-
SHA256
73da3a44ab7a2ea5a052645aba93f17b52227c6d3cf3c32fbf565e06233c79ad
-
SHA512
df150a49e7250b8917a7ab1d4259e6a187542b0d51ee9a2c376c121aa664af279524f3841bbf8066489dd25d75240e08c8de88ba1e891ba33e72e7d29b5d08c8
-
SSDEEP
6144:SSsMYod+X3oI+YEsMYod+X3oI+Y4sMYod+X3oI+YLsMYod+X3oI+YQ:b5d+X3I5d+X3c5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B31DDE1-0D47-11EF-BC57-569FD5A164C1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6034bf4354a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421340454" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000000eb63911476522a22eb2cf03dce6550e6157222c910067f7d67dd5670d72df1000000000e800000000200002000000011c6305bec23f9d8cf223cae8d1dd6a06632b2d70af467f0aad92d3b9e202cf8200000004c3e60609faec99dbce6447e90d51c97b4004fe26d2013896b7cbe91be68dd7540000000c447c09bb9cb90b7a669377ae68d1c36c7cc0af74ef2d211c7a4dafb19ea52b88c9f0ca0220aebf7794e7e8956a9f56a1cd4de4b5b93496285749ebb99081e50 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 3052 2104 iexplore.exe 28 PID 2104 wrote to memory of 3052 2104 iexplore.exe 28 PID 2104 wrote to memory of 3052 2104 iexplore.exe 28 PID 2104 wrote to memory of 3052 2104 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2547635be6f31d24ae0736e43c74624c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f63191a9752032709b95faff7afe06a
SHA1a7ac29567cea1a3c0f0579300a9bbebda6a883ba
SHA2560e260dc534b222362853fb69dbc2e74f527a6b575ebf0b080b19b43384c1117c
SHA512962ba6dda3abed7e4a0888203521f2d34d0ff20427aaeb58ad926661d0eba7448d83ee6be538ae4b80511cf5523220db52a7e7ad68ecb3ec38882a5f4773ba20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54eb223faba81c9e04cb0f475b195b1ba
SHA1f621836ff50fc75bc8f77328fe16f48edecbc7b0
SHA256b81222e52dd7c7bc5297491e0114e5aafd47937faf54efdec5ff66f9b2f796a4
SHA5125ed660e6254462e42dce524b8c652dca824f021c1540a7fc4de08cacc24586b695ab94fe4541a35779a78cf5d2f76715e09244b362c9d28798db16e41bb2556a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fd203b23ee84dce67deb2240f0d7396
SHA1e5e2f0e98d7013c2b5ad7135b387119d2858f8d5
SHA25616bbc34da5963380f40e28b2486b8e87ea4815ba6492de571b5dfa87d784fa9e
SHA5128757281966e133cf2a23f17086e916493186075e1a9e19ee17755f56e201add5d0b578e81c73e8b9961852f7aabe70e5a8a704ed23980c5e2a32baa5da508e4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54107d2da10be3bf06ed6a9fa8c03d647
SHA12b70bcd9abc4939acf3217c821c3126e61a66ec1
SHA2561e6d7127b8219957c3a8b91ed7debe343194ad79782cd7957d31a266082d982b
SHA512e3c9deabc6200d341c5c53941ca10ce9391f2e36b7f3637919ea99e5ebea6f941d5743fca158d377bef40883fa457147b4b98c00dfd40640474d38cc5ac8a16f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adcece94c7d2d7d254143edc9f28dc72
SHA1aa8f6e4e286622e5ffabb3f0698a78ba07b097e0
SHA256fc74281f3baa6f02ccd187f21f5af8d6dcd7b647cb046325b8030996159e96c4
SHA5129352e0a0811c1513b8ee3e7b845f3e76853653c87f0215fb5cbbfbeb01ed24a72d581e7104af59adbd1e5458d9176df0e9d74bb4da283747b5759f9f6268266e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52eb1c7222529a1d122c3288af8c149c3
SHA121c061925fe7db7748473fdcbcc20e7aa36042ac
SHA256f86948dca56f3b61e8dca0317f81b712dce980c69b815c2ddd10f9abbba73e92
SHA51200891e843adcc682bc935034c5622568890ded65b7742c80a96328c4e9b1cd31ba1af6b666f6dfe9a4a259e52ee39ad08f9bfa7327e5995ebc6d4c0bfb82e46a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558130db7fdc13750ed539f37eb68a8ae
SHA15f19199a034b83b23711ccea1476e7d4f8f0f581
SHA25665a376fdff2c912b3193fa18131210a80a66c127879abc830e208531c2f8e0aa
SHA51200e7c3380192be959775174faed2b53e28d03e05e9fe187daa05b661cdfc0c48447d32228e0d3ba83f6ed95acbc50da5cd164bea04987ea1de6c925ddaa118ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fca1b46dda319dbe081086108efbe1de
SHA1cb5e19e8a4a209e02a4257ae48756b27208d4dda
SHA25632fba97afbce74a3e1fcbc621be479d57ed57c856eccb0f632595efa63c53c75
SHA51242262f86473a2ed74d77bce07a696e386c9aaf9ed930ec77b8bd0bc7e48cec994f32528b1952554412a5cf7b188db0cb0e9ca26c28d624dfad8678c19a4b648f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6a27326376015e195a2130b3172c168
SHA143a3ee4956f7c792bffb5f796abafc837f98bbb8
SHA25653daed993214d2b5a043983d086a9c75e467a68253acbae50d4cdbffbf1468ff
SHA51260151de7782ec39b4da6e8b2088072326b13549d066ae853ace53df4b47c1337d0f18c30d9f5fbe9e8d4461a2ee1a7dc542b85139bafaec255c910ec8037ceb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e3f50deba6aac8dd9ba7d74be3e478d
SHA1e8081e3ac71633fef05b417c06a06cd90b232112
SHA25659d1ab02759306ede043672918d07a8df44bed00f19e912db4518d5e5448a72e
SHA5129cec12059c16506ac4cfbdf4058ebc713cc1a3ce31317bebbb4009301f6e0ffd64592f457a9fdc66dae9dcb6893d4d96756c5ecab30ed78bdc96717fd35bcbd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5000f05cd8d95d7a67638188a4619c54f
SHA1f4c9c4b4df0d1d83ea06c20bc1b04fe68b27cb0d
SHA256b989a9dd9bd1be9084420e5b946495984bfa23d4598a872830dc44c56e742e10
SHA512a54bb2c7570ab324b876ee8f9a4c64561de730da9fd11a5f06d6a1cc1d1955672bed88796818179e855eed519e5a5246f4b1524127b358f2fdc53d0c3cbbfe54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e62540546a6ca674cb7644a3e48822d6
SHA1ca754640edcb20ada974d59261229e8ce8d73a8d
SHA256d4a0efafc2520e89398600e4d249cc0ef87bf1c8a6b321d9a5a78de32c545358
SHA512e1129d8e3201a2a0dfc9e6d014508b1a318cdd41d50f5cb79cacc11c4883781417ecbe53d0f40f2d6f91c30cbe3296a98a8fdc35f9e351864a00514712e7f9bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcebcea72539d15d3b4cb94c3e163ad5
SHA157be367b515c023928e529e32704016723127611
SHA2562ee812e301f513e71290b10331b60eabd697292f78f1598865851b47b16b63cd
SHA512cd424af0b9c282c0028bf9f2ce50923e8bc3a3edfbfead27f0d788803bddb3e346fb4caea87391c8d21ead8caa1156916790480329ed79a27de24ead32cfd026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542a156d4d033d5a018e7ab82d133b2d1
SHA14bd8981944ddc51dafed32714eed8526d40bbf80
SHA256120c3adb6765696927a06a35ca90d2b1e1f06d77f001bab469a0dfaef64132fe
SHA51276a45252d8d06ae8661fe2c283f46444ea4d3e1c7a1abe6aa1b8a1d93859cf2238a5ee6a3fe1bdd42066bee724a50942e4cceccbb841c9245198d03c6bf958ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a56af9289526467b1590a225090ecf1d
SHA17d942270bc14c883846264c4052537b08f8e53f2
SHA256a5a9949721d524eb990415a5cd1fbe5fe346ee913c07e6ee135a60ca7d6ed297
SHA512397954759526df4020c11a81954b3379277043b84ffac18ee4791c67466b58816edcf5bc162fa963316fad20ea78c61fa1bb47cdf2b53dcabd6785d28c475a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594e8d838237e751d9d3e6983ec9fb70f
SHA12d61eba02b8c0aa9853339ea109844189b5b3731
SHA256c6e68eff66e76176b82236b0db2fad37d1a4b4c8c182dc681ca8652e41934ca3
SHA512cab02d6e462181e512f9177ca5cf83c94123195e18a6537e43ba8eaccbf7ff94b530bf6ae35ff454d9f56bf6303cced4800afbc1831f4710e157cb34b815e16c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50318a75dbdd805dc106e96fd139e35d0
SHA18783e5aec14ccce7477ed3ba5d72a547073d7907
SHA256075ff9b5b18d9249eae8e62f5800ca599574fe6e9948657fe9dcb7f1e1d30108
SHA512e75c017f596f6171490bfb5fbfa9812ac1eec1c960bab6545d0ba5a8c5ad01a5a71b5bb91bd0ada709e065ed6c4f12e66d065ac4a63399b6054631f1d5884af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5740ff38a5876e1e2682f563dd30d8524
SHA11bed018ae3736ff06206c7766f382af9252ec5fa
SHA2561b47b169b1809b290da1e8d3306fa0c7d9a77adb5f525e972eed82182c924ffb
SHA512ed656cd20ec5d42f11269458d608cfcd22df410e64293a279c1a422aa0a5a93b0db47e7bb0d07abe73456e8aac74e9385cee1f17b5a5a83e5ab828ffb245c310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505f5afacf28361b4dce0c541082307df
SHA1fe2ef74f95b9be544906a1e920d2a09b8558edf9
SHA25685a0adb4b59690f9f3842ab4c8c6a73358857c9cdf84ba04ec521fcb0eee98af
SHA5128d9557cd063c5e13e24487ef6b56ccf710b8158db54d2bb876662c200713f33108ff89eb049b7649608ff964262e865686c4227409b18e8cbfd7b965f0a4880b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59de4438d70c45063d4fb32642ed304ec
SHA17bb6a045b7c4451d99206881f1e13b06c7fd858c
SHA2561056451f7001033c473a6747a91b68629dd4b85f5bc4659c193fb86c4a36ba54
SHA512ab3400453ad91a1d7a560f1b3eae3e06b580fcf009cd35b63c8c8d46fe432a84b340f12c1e9a112e6a275493f2d4e252cef3863c3173838be8e573191979315a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a