Analysis
-
max time kernel
120s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 05:47
Static task
static1
Behavioral task
behavioral1
Sample
288f7b58017d6dbb77620949119109f4_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
288f7b58017d6dbb77620949119109f4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
288f7b58017d6dbb77620949119109f4_JaffaCakes118.html
-
Size
74KB
-
MD5
288f7b58017d6dbb77620949119109f4
-
SHA1
66e92515672588ac47ba6f1085c0fa5b667a7b04
-
SHA256
577f6a3274d11b471f476c02928c042fe2e2b0ef75d8e53e3cad0c971313d9f3
-
SHA512
2430025d88d116a53818a96fa75baf3087a21efb95930a557d34fe62dd32e885f44b9ebab715efef4661007d401244d52ff219309e31070121b7ed4b6662054c
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sC6hszpNE4Zj9ZCoTyS1wCZkoTyMdtbBnfBgN8/lboii:J3YTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A40199A1-0DC7-11EF-8840-6600925E2846} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00efae78d4a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000007301776e08046ea97bf7db95cc2295a26414e245b5c32e62bc5b4ca6990cd481000000000e8000000002000020000000297c4aa20fb3fc5264ce93e1ff55021488d5a18012fa4ae06d0b71a4e2fb3aa920000000ed2d2dbd9748052cbe6c1c0cd4f7b38f4c475f5f626957d7ce5cf561c2b67efa4000000077cfbbf9e29a1c5f9238c272f7d22fefdc4e75297d434b1fa060faafacfaa162496017e41894167a20678e0c4220b9a12bdd2dfe3ef5b6062ae4b43d84de13b9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421395524" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1268 iexplore.exe 1268 iexplore.exe 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1268 wrote to memory of 1668 1268 iexplore.exe 28 PID 1268 wrote to memory of 1668 1268 iexplore.exe 28 PID 1268 wrote to memory of 1668 1268 iexplore.exe 28 PID 1268 wrote to memory of 1668 1268 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\288f7b58017d6dbb77620949119109f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1268 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD555579434ec76b856f306976e9e2d5726
SHA11e5fbc3eebbcf7d23950007161f63c8fbcb9f589
SHA2561b8cad26f8952c08f551aa2b67ad8bfacf610c08af1209c5f965eca3d6bd69a2
SHA51273b4a8f3d9fce70e5035ad9f80b87b628d7ff5c86134f2c1a1fbd671cc15162a335fad547605250e84208177bcf9ee4a6b1799bd7373a65b817900f519f3210e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d31b4fcd216c1a52b6fdadae1fb5940f
SHA1df85d90c348128c178836ddd1fa7830e4df5ee30
SHA2566a1aebd5634b7dd4fe084f318f0376deb3ea82069130bf1c6b88f2715f3b9a29
SHA512b62608864568320f818472783a4df9484d147dd87033ec7feff7f61eeefbfbae6341760ff851d044110dfe31db5bafd2d116aaa1a257fec35f6a72f4e807cf8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a18dea4da56a76b9190784f5ef26d317
SHA1709fb992e8afe696219fc42e9b53ddba359d7ab4
SHA25691d2ba225ffb2b622f4e0162e3727c3825df1417638d3031e9a9fd43e00ccffe
SHA512abe4481b9618c9d066ace74a5844bb4979783d68b19a11e078c305a4b7ffe985eff22af8fa0aa1cf430df3c7ec94d03e9bd1abd99b84097688de54597db46231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD576e03b7f6e86ee89c8eb305e008cd8f3
SHA1bbd897505b4c0a3243d44b643f03d29aa27b999e
SHA25685f83b35d21ed98acbdd159bf78e92c4318d4e6dc38468e92fef6c9b04d68a2c
SHA512d53f96a3b46481616ae33384695896037ff0c8498de82e7ba558d6650bd5cbf7d4d8e4aa9da11d6dfcf36352278d9315d23fd9716e799457f006573fe81d0d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ed64437d56e7bb5cee4ce518ec7042e0
SHA1e123f464f62c84cfdd7337a5ad56c685e4f275eb
SHA25651902ba5b8e49b07576bc989c00cc2dd266294ef73e98b2eec1f9b69e37f1ccb
SHA512d144360466d59b81dacba46cde1a1f215e8d86f4f996593ebdf1dd9a956ba0744695188c8bdf07d61f912ed84e18b2c5b3bb2375e943414a33c866434028c26a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b3f967be7123a37ad2b116185cb4690d
SHA102f0860b9d8b11ea02e7ead5d6ac1728ec10d3ac
SHA2562d82fb548d5e65cc4e77f3de7d56d2ea9b96ee3f746483b78f008f846496b475
SHA5128db6d0c23b10fec6dcd91c0c81584babdc42bb0f11b6c9b2e6843c4443c690a20ccef9c2363cb505645acfc99e430e8525920b4398fc4ab286c60ab270693a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55778eeb9446697b8cd16d72ee4c6f204
SHA1f1ff0cdfbfb3124626b9d3304f378540fdf13dd5
SHA256b241e54a9e01ff9a1c0df8d7291cb9be2a4a1ef893f9e220fc1ee86f417db482
SHA5121d5649d115b9c723439d0308cc39812fc755897c047674ee1c908ba6aebbe4927cee75edc11759985085156cc4054e179b444f50d7c621705febd23af919d8a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58cc5afcebd945165e175d788c448e3d8
SHA1b9b904415e2279e008d0539e328714f2ef0644ed
SHA256ac7b834ded50daf5c9dc81e322cb231723e2eaf52b15bef3c051855ea54e61b8
SHA5123763982bdd372d60bf5912a1c15681d1ccf35f110432bb1dfb0779dc94852559bf64dce1b48e5a1dfb9bb24dcf717e5604152524bae755e48deb3c034099d57e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50e6bc5dc24f27d08adfd2ff6748a26e0
SHA18f4f11ebc7405af273948ec142d07d907e26965d
SHA256b921baa87642317e28a9b8e054bee92de272daca819764683dc54bf09e42781e
SHA51278704c1a869fc921369c6aba4013ce78c291ceb5e424025379014198bc0bc871030062cf5352ca9309b70d72d0a869d7f26cb171a7e2bdeb35b57b513419ee3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53f8977382075e619eece635c0a057889
SHA1c7bf7732cd49409a2cd35c57158a8516f51ec5ed
SHA256e9c31a932829054c2f771b3e626484d377ef8ef40f7a73543d9d6dc70f871065
SHA51247f74f9b400c51a1875e1b503c940ff0377645f0049ce76f43fabbd7e6ed9d7de488d313bce24d23968a73e02d4b369eb7383d803d2ea17dd6f69b642becaa0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b271d72a3b90bb3871ff7165f14e65ae
SHA152118f74ecb3b5e935aa09fff14fd36dae8b64fa
SHA256fb567b04f0f8fb2dbe2c7a010f19dc95ee7b79d338f230394bd3945a89dd321c
SHA51227f7fa04a736c355a424fa2681802d7e94c0af5fc20fdef8ae7706225709405b457cee69635f82ac33a28fceadfce1eb161ba8046779a422312b967f7cd8e4cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55803a703d97a4586db7b6f8a99c4675c
SHA126bd4d37111ce4258532ac318c4b0cbc509375b2
SHA256353dcf229e3a7fbb9ea067b0b1aef22ffd23e06f1bb3db3464f1c20f1b5a5689
SHA51284348e6a7c5ead54011fe8a4c72528a289e32209269c026d447954908e24300ccbce8d7fbecd13306d4a1183fce8c4f97b1582903348d2702947424e423beaae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59e6be6d92dbe64946a5758aa1a4022da
SHA19d09d3268a6be8d35e685df0641ccf2267d1c86c
SHA25653c603a1a81a5e34c556b03aac4c3a26d59fe224d88c6e96ed1206ded8e30abe
SHA512df6954549e2b95120fce3340c24324f5282e99f18696dc14e886756c2381d3dd3558a9fbfe649ec761fa5ffad79d9d3bab5f87faa7aa9cdc6851bf066b0220d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD578b6beacf404c54d46422b5279597ccd
SHA15106d3f82d448c168824bda92e78f17351df7d8d
SHA256ced167e350337fc8eaf9c880cbe5e82221f1ca0f5e31a744c32a74b922db6d04
SHA51282665a77e7fc714b3482675a787e5bb55cd2cee3c64435a22096a28c01c80dd1f091f65d77665805fd6859801d09df6c3e404475d800bf9c9b912030591d294d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD566bf7c214a05d6f45478597cd9864999
SHA1cfdd68c547f41c44fb6a178e38947d2153eff8fa
SHA2562e3d9fed821e17ab087db62b5d56d0494eba834ff8773a6ae65a57475098f484
SHA512fe9949f9fde6642a9e828bc116da06e14c89d6d5451b54a379a3110c24f3eb9fef2e01109e52d9cdac7329b2a24dd6ea0a98cdcca97e93477fa895457ab9e81a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50965dd919fb89cdad37cfe7d9b5a49e8
SHA1f548a990bac6070748312d928bee10fd888700a8
SHA256f75d5d9e0b522d18ca84d9e7888186ee3bcc31bffaa4b8353e74df43a0d3da9c
SHA512c7ed3f861f6a1afe753d15bfb672281ec9285a39cab93f8bd1e5abb827a65b55dd2b778604cf628a594391deac0908ba7834c4e0c4ae72618f6c4c4235fc5f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e03b49a3a333265facf2d18e17dd3c89
SHA141d97f7b9f14393e936728dac4baa2e8f41b5e03
SHA2565108886d6d366e1005f90a0d534a37741f621a003dd63a01ed949bfa103090fb
SHA51284fd978d23d6926c51df7018d13258a7b5ee74dd4452869c413795d3493c5dafc192b9447ca66a0914d662086d790a9a8bf01a2963c4f1d0bf59e970d0aca6eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c431b4e47f8fcf6b820c95d4980085d6
SHA142a58b1b71bfd8b28a6dbff7fec53bd24b56e0c5
SHA2564e0c9ca4724c6713b5678ef1f211aa0a3fadfadb5f0560fdb6dd65fd0a8a3c85
SHA5122a141f608745a41caf8241e15f1aac8b730566fe12d9ad6fee5e7a0a8afd88f62d8455608c2045d953664d154ccd13b20d3494d19d06876d440370ce7954514f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c3d8fbe2e650ab9f765f0405f9d17863
SHA1c1ab3026bc3fa086fd597abb50a443506e60b507
SHA25632a30161e24ae3467d7b81e6e3b790a4a211dcd655bce515cf824357d843cc8d
SHA512e4480fe2dedbbc428db0bda5db6febcb971ac310d97fcece46602c8d7a5b1fe6369920ea13f6031467f516adea540b99ee7f1b3e156fc32f32ef7e600efb4801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cc333fc8be83a5e82d042e2f3f189951
SHA13045f783c1b89dbab4d8f7cb99e5630ebabcf599
SHA256577bec1e0e52d9768ac2065d081885e3f3f5ffd7651692c3b8af8690907ed24c
SHA512b389686d1534a28e3a6fad434010f42ecf11c51f4aa53608938f741ee019eddd575fd85d4f21b18600fa1bd2a58b39633d58afadcd9aa149736dfdb453babe26
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a