Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
279f3b76db5c8e63c101955fdddd8924_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
279f3b76db5c8e63c101955fdddd8924_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
279f3b76db5c8e63c101955fdddd8924_JaffaCakes118.html
-
Size
3KB
-
MD5
279f3b76db5c8e63c101955fdddd8924
-
SHA1
4b12afd6f6a8f1f814489774a173a5dcc0945432
-
SHA256
2915cfe6a7b596faad230a072b05f7b30f2a2c321411de20c4d436cc2d41e051
-
SHA512
da350dbdcb6966be178c3d5592974689b9f164f3f796d030af41093c2ce6e6445e75bfebad45b063a8620e7a7c6b0cbeb352cfa659067b67bfceaff8823c7135
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6DDF6A21-0DA2-11EF-B2DC-EA263619F6CB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000070fa676068a5ec3f6110967b8f3decfef3c64b3b4be63f007759c4dca93b7001000000000e800000000200002000000071d1b9eb425405e38b8854ac1f47390899c3cff7aa74bd76c23ee6a6a45720c490000000516c52973b59738cbfe9572fce16236068505c1bbe3ca69e7b4d66d3f82ef615ca64b9d00c8a2785e85fb55cbe5c34ef8dc9e4f61f64b2637580468f18d3871df03d115ae2801d6e577e57f065a40025443d865a5f8fc636eca9f4f527398256fa157994f1d4112edba09b1e2c90842499e7b51edef522dc59abe3a876a08ec9d30c76356d8e21ea5bdbd6df827b299b40000000ed9ba60792574b555e507df3c1e5ca3a485dc7ca2ab5814c696388fda408aef43852a0cde581675af8291613db78756c3343c28f09e3f5bcf9f6a0a96765b271 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421379543" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000046fbb48ea33ff8b1790d68ef84ef0d96ac9ee66cbe64e2228d00de818d59e88d000000000e80000000020000200000004ff81539add80d34d377f1d45067c4a29d60137816b01582571b9930ff67c36120000000b8deec25227e87cc30f21e74058e9b6ecec31c3de1cc525a2a965d34112a4c67400000004f8b72f70e8b2b3afe5e6c74a5d3f006067410145b37493184b674881d828498a349203814323e976ad4338b6442c6f5bdb211cefc2420915d1d083a40341929 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0280c43afa1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2944 2904 iexplore.exe 28 PID 2904 wrote to memory of 2944 2904 iexplore.exe 28 PID 2904 wrote to memory of 2944 2904 iexplore.exe 28 PID 2904 wrote to memory of 2944 2904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\279f3b76db5c8e63c101955fdddd8924_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585febba070b510cc0c454daf0d7c5fb4
SHA170f3e0f08c6c405021f45d2bfa2ed5ede1874a28
SHA256445a78bfab31b263fafdd7faad461e201f5b60ac7649f133a95b42fbb00a92f5
SHA512e58697b145794d27e224875924d21d26dbe9621140d8ae36064b1d6299975093a167c6764360728671ab0ebfc508d2e5acf5d6df2f03de664d4683f302e90fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dab64f73ff9d6815d957b6a41a0b72d
SHA15547d30f5fd8a38b95d757284f3baebb7d3cebfb
SHA25606b766936162fdaf330053448a8f691051149fd801561f17931871fa002ebb9a
SHA51283cba7a205f94d3b1221a7852f1c5ffb53624aa72c02a39a7a927b77d3292aff326322ccbc49840f7f5f31d01493fe8499a918cc490320590481eba577f44ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571ac85360b95a71f9cae15c023cb2daf
SHA1e4b8f15bf284374310b91389b129df8d0f890be3
SHA2564dd153582aa6e4c333d1cdc8477ed102192b14b78ab19acd098899725a609971
SHA5122f78d6b965ba69fecc125ca2a6c720e13fee199d59c39f372f61ce6a63375e2c1a544abbc75814b9ce35b7eca874cf57291599240f496b1dee7aa3a71a64c89b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2bd8a21286ae432bd95d50074a16f2a
SHA1c62c943d919b7ab1b3b974cea267e6c56bc97efc
SHA2562ea2f6df2037a85826a0b34d3b3713db795a54b34fd4edc84f5fc72a8777fcaa
SHA512cfc0a9ed7ade8376911bca8f7a4d9f65aa99d9fdb8216332086f2d8fa52ce7e67c5b45f6fda3f76198466a4af032b642322b666f5473dabd2797978531b74a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea23434abb2717ec64d59263ea33afde
SHA1da97be2974d52d55f9cdba39f6c75af0aa738107
SHA2563f2b883a1f02da4286cab9387e58c97cd1ab8a462542969f6e0bdd47da9f1634
SHA51210c7491bcbe243078205fca7f8ea305b02c4d40fbb3d067d4be0596247c541a99a7102f84f2e08439c1d243a213c00ec6b6881281443c87e45e2f0c7c08ea3d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bc2c0093039134f0062796b6bc7cc86
SHA11e4b320e50c804b549632182b594a57d19f8ab1a
SHA2563763a9b7525438e023c8c76ae8c963a1ac1b66359b6704c4155631eaab0647e6
SHA51246531bacec714297365f9abc3b3205ad40cab909eb7f93dc7d84f0195fbca63412b38eec5db9adbeba35aabd21b475e5388c3c979dbb34d5c4a35e1380a55dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526a9f3ecae8d8816c1f13c9017bdb77a
SHA1bebd2955a7bfe3a9ba89412d231fa411d233ae40
SHA256b6496310bb0bd2f4a84acbae36858db91ef6e16d54d3cb0889af12f4791053bf
SHA5127ffefdbb1b2f379b0a5bd0858388e872ca7f005735121c6912f8af3e3df2ec914ff3e698414af0d9021b4a8fe6386fc69bffdc2fe1b134e57422fa004ee70862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582505102e316a149108a5da318e19979
SHA1db56178f235b1846975cf90739335149fc4d59c3
SHA256120fd38c2a0bcbbded99687c2bff4d96d18b795114f5c0cfca5acd97fa21d7b6
SHA51277417f2d4c2bf91fb6ef71eb1bddbecc5d1ab1dc1ca101a514760578e494d2f9251b38629ed114ff835d10c3bd8e87ba614a54b2c441482e59e5a043d01953ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb94466646219dc01df7bf08824e7843
SHA1d0d306ca210fe5a7875f0651f5e85b38a53c0ea4
SHA25670e9e37d10c8616dd605c1a04b0c0bfbb0ac2da1c178969e0e5c858cf1612f01
SHA512ec3340cfc07a9b52e7a0e0e28a2b2d3cbb06e761ad0e19f646cf42f22c5236a11a8f1db0f690faaf2b14d6c69d71c98729983d95790aa3e6c3aae070046d27df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549ea6a42fef9de2b4e199937bce821e5
SHA12b745a24b6387fac9c007f25e21e293dcf04d3e4
SHA256dbe2b3b1e1ea04c7a84c599c8bf03013abeb9b9eda18b1d8ad18c262c6af87bf
SHA51275ec8aece2a071f022a1da109f8c7838678a69653328d4d2e39a3ab2d38444de527a97fe64275a0fd33437a52339d3c38a4d13e67e840ae1f225137e087de5d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bab32a2bb45d5815bb28661499ce668
SHA1e0b8a13577df4a076eca1381b05671af9117faa1
SHA2567e8c6b4c26d2a1b757bf568eeafa0ddcd61f553bc001e7b7c5cdcc0044042a28
SHA512115204a4fccb5ac7dbf0690d8020b7babd83422e2f174072f7ff7e107602f9a9e696f94e97b0d8c395ee8bbfb75dee683626a29e8e010c87b3d7f9691e3b0e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d84258bbde57882eff4fc0f71fafc01
SHA12c044823cb57eab9f3243f95ea09e0b419872253
SHA25625bb55e28debf1542086113b987f41463d584a5f8675287ceb5d08b90ec4dfb3
SHA5124622e2eb2c3745c54722395d1ca4de6405ae0c915c1ab85badf2b482989e8d4ee7f0df05b92e9316258d1a8c7c5371e3056e72be0897fbc8303f375ad96e107e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca25daa02a78eeb628d4988ad82e87bb
SHA1406cf5eb3ac0bdd75e24ae6a5ff9ebc3646ce74d
SHA256291950278bebf3382736f8ba09c887b959dee507a913daea4259eb637a2f2045
SHA5120ca9ab26bc2b8685431ab19ab6c6838d4d853ba92e227369f6b3e53dc0d2e708c1c65c742a5a677e5e3658aa3ee4cedbdfd2beb3ffd66735bb2e9ef49ceab719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fb68c6995294fa89827d93708df2249
SHA1070c31c9fca6d04708490ad7ef71fa0165556427
SHA2569eeb7bee3a6453e4b34398a2879521cfea66e5aa67054b82d05ca5a695ff0ef6
SHA512f06c19ab40b683efd63ae7c4ab900d9ca5ed7450ffa279aece4aaa3dfb5e0e92c94bc2ce222661625a57b72ada6df3bc3f6f113392ac1ba1f80f211ba30b4061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f250d92a05dfb326ea99edcbc291377d
SHA14dbdd597e166abe33915b0125cee0bb50ae992b0
SHA256d28aec61e547d6dfbc8bf6ea1549811976cb7c55cc7d5f9d24530171f75e5dd2
SHA512bc3fd6f574fcbb367d1aefd629354b7d45121171951704d9660f2b919bcd519a8b0cdaf8c840ffb039815067af0559c70514dede793fc419be389a21b5b44e32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d385708c21ee82ecca796361996f76dd
SHA13b3a98528b56fc414cb5087814e5759d4c98d90a
SHA25623ce5ee4bc63450b0c8cf49a98b2e604e2373f8e09226c66083228072fa933a0
SHA5121f59715017c96fc8fb13105de2eef3680e063f62ff26a68b864dc96f966dd7d04cba7f2dd65650393e130228b4f049454bc48782136c53325c616353ee0dd414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54746de87a4943bd29358a7843fa25f02
SHA12469f452325e12e684f48cf80d332e7a4ed6b5df
SHA256fe154ab5946548cfbb8edfe438f7d09e0095a216cd2ecdfbf1b5989d760fdb1e
SHA51254eb2d912be9c9e6fa16af91a8d57f29b3e343075d87743df069ce0f73f7a28db7525414931684bb1d70a4dd36515dd95d41ec27955d62632c5e7395c76c4637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe792685ea1dd679ed61a2c73ddec71b
SHA1649abe7866cf7af189d4ac58da5688c6759cc5f6
SHA2566b0a522efe1980fc03e76b3ea143c9e6f679f8e1eae051e0c54b2c05aa928ce4
SHA5124962802abd85579ed319a8b8aba5e97f56a716c4e49078ecdfd7549e75f417cb1aab2d813f67ae1019b35ff8eef76414ee618083a178e4dc3c886963e0728807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576c3d7ea088f5e24c58b720cc93d2b86
SHA1af40c7b7fb89b9fdf37656c0b95f66eaed63e3ff
SHA2560d3a3c77a02e38f61ca505d62e05a5aaf2614a6d04e311438f9081652138f6dd
SHA51226a18c2673c4aa7615158cb0a72b37f4e36a037dde841d51a6ee4c859a88ee001fa088ccfbde63362a51fb4b6f7545ecf660443959a2f981b1b7e6b1d3b6236c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a