Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:09
Static task
static1
Behavioral task
behavioral1
Sample
65782e77f416b9738f37c4b194e1fbfa_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65782e77f416b9738f37c4b194e1fbfa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65782e77f416b9738f37c4b194e1fbfa_JaffaCakes118.html
-
Size
26KB
-
MD5
65782e77f416b9738f37c4b194e1fbfa
-
SHA1
2539d1d14ed784617770cc0a10b478c151b2ae36
-
SHA256
fa1099e50955f7688f0ca0528c970264fdf1788f3c2e8c5ace9bc961e4b76cc3
-
SHA512
985c85a09f76287bcdfc23c5031ef107e50f6c3c35dbdbf01b2e97d887ba31ff32255a7db06457ec95448ac93a4d3f02bbdb71a6fca9d4454b688b6538e95bb7
-
SSDEEP
192:1o2CouG7b5ngnQjLntQ/DnQieXnsnQOkrnt9GnQTbn6nQCkRo7StMo+EwrTvMlnR:1rCoPFQ/0W6gO
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422502069" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0f793d8e4abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000008574e6784264a42fda78191359c5522b93dee6597902b513cc49d65f029cee64000000000e80000000020000200000003e7c13ac22268828f1bf465728f8db44fa0a845a31ecb4d2010ea769ecb39a6e90000000492557966dd5f3073ef2ffda4490537d0216e982bb7b23f113286daa52afe9a9a176a563ed254887353e47785f1a3e6320ac4f287a46f8172ded28b4b04f7e8831fce8b605004ad7cec79270aed29966c4f8132979fcb670b2751ea0793c02675aa5875caf152ef85ca7fd656acbd8fef6b582ad1360a4dd92a959abe683fd1fbc5ce989851b72691215f85d144cf23c4000000033b985bc2f2fe12e27c2e85d8879e31eed4d3f412c03b04098c6734bf83675d56c60c066b6629742c839c5ffc2a4713977906dfb199db59c0c7e4ccae1d44bd7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{039F5091-17D8-11EF-88AC-F2AB90EC9A26} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000002a876cb8035b42511f5648c77c87d16995032a0aa86dfb767a6a9633dd715d5b000000000e8000000002000020000000cc0c335755feb5fec92bd878a7a902f9fdf5507f4d24cd45681bd61592c5f600200000006541f6a17c9a3e1a1bea3c5568ecac55aa7a19668092fb41e4325614c1f1e24340000000e0fbea702e2659b74c50904bb9a8d0988f63d1228657f0fc15b61361f42dc2df8b3903014eb275b003b4293908032b8a1891f82a2e99186d92600067ec10c505 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2264 iexplore.exe 2264 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2264 wrote to memory of 2556 2264 iexplore.exe IEXPLORE.EXE PID 2264 wrote to memory of 2556 2264 iexplore.exe IEXPLORE.EXE PID 2264 wrote to memory of 2556 2264 iexplore.exe IEXPLORE.EXE PID 2264 wrote to memory of 2556 2264 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65782e77f416b9738f37c4b194e1fbfa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594ff90eefa3f85a3d940fb7780b0de9d
SHA12c7404d10c1ad4cabbab9b14cc511e7f327ca38e
SHA256ff8a336a767f9fafbdf19d39038838143e2b970f82ab137715d7df8c2675a314
SHA512eb1364a55b546a2d928656277ead88117349274322f0eb28d5ed9ab700870a466806f43c63ee54f2d1a2465089122911f8659b48af5043e332e5931a5aa07b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5667ad719a4711bc48f1da6fa0ce99acc
SHA11824b06a6cd86ff009a67980761325fc4ff91c97
SHA2561fbd0dd06df87aa545fac66cda77dd18ae5396c264c34ab3880720334bf5491e
SHA5121d70f9924e333059e79e12aa3c7670cd0f4fb2b52df82fcb9b9f03edce81222c3e00f053f05c3ae496df5cd39087a3ea44eeeed931ba1f7851de69ab90ab8039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b203b3d06fe2e60965d63bbaf6c1c87
SHA12cc37e8288bbf7c84efab6f22d9cd1f5baf421b4
SHA256cfee2f7fcc8526a6d3078d2e5289b2bb4f8a54189667dd112bd299de9ec6605f
SHA512bb586593f9236d92bf221e6b454084ae77b8baf00603a640f636e644b23951dace8fb792873af1816e58c722fd80e44f432df4663fb6d56c863e64a9448aafa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5483f029e017eba9b563d9b9382aaed39
SHA1cbd7d8c0707615329359db0b3a4dd896d99a188b
SHA2565e42a71d5152b454efaccfdfa74ffcdd9165d30d9b60976783dbd0a494e0fb7e
SHA512cd82c714676139ba451dd7136ecdb8966647c8766a411e977353cfc844e94a10a00cf5cef60fb10024ba6ba591dce3fa0575bd7ce2a77c012b9bf3e7091cdc62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59051f7f22ffc53e418d2838dc1271609
SHA1d77babba2ca7d43d1ddb60a7fcbe061c6292df7b
SHA256045de22893d55bcf6882e9992622d654d5736538afe22778e0c2e538fc0d06b8
SHA5125b0ad9ed6f8bb0301f2228741fd54bee133c49c014a405ac4f1ef1ce7966f4839083cbbf4b529cb6d46031fe9c160dedebfc22497ac021a6227b40834ccf9b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537173a26ef0f87f9d3f3bd37652e32cb
SHA1a7c505ef9b37e14b66ff48e5243f1479ff4d9f77
SHA2565641428a29969d8c78223be58b2d328105c046f17c435c078d76d07b17eeda75
SHA512cd67a05f9aac60d9705d7860d0785461b44589b7e8750940f30ae9969f875f677cbb557a84b7be08eb97f96f19471618c7de275359ea41a295e539ccb9101f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc3346d45ac9e695d06c15367e94ce02
SHA19171c776f22b88a03710a561af09276370c66322
SHA2562c4bce60e8e0f54d1848161a57a59f38e3d1282e6a7be13c1580a8c8d0e60b9d
SHA5121eacf936c19610c63e7c304113fd6a8b43d4117fabf8ed3c24820cc2d37b65abd74a26d22327e10c79c3aa0cf0458e8fe1a2971d3e7c3476ffc6f54062ea39c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed10967f521808d2062e15b78eb48582
SHA113dae355b3bf690d4013ceb263f5a04b7b7344c6
SHA25677ee52be346b78f48e8684311b21e429b0edc4a5d70e4be62ee27c3db5f395fd
SHA512d041a50eab9f30533700cf2a5ee994ebd64955b0ad415003c3f764f8c476260a314d8214c2f637de57dcd256497e506aa21b40f636508780eadf4549bef2f4f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592409f875f9f79ecdc08a970a6142f4f
SHA10adcb79c6f2649320ef7fe2ed18ce2840db1f977
SHA256a98add9f6d940624745b7438bc8c63beb8440da2d73d68a730704cf817eacb16
SHA51219669e684556f8829dbdb0e1aa7e5241a3363951c262bb5fd9a87f7397b8af05804d00e16d562cecba8fe3e04d13547780d5fa47ef7341312414f725e737cdb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8f73c332b1bfd9214d46c620ffdbeed
SHA1cc93b7b7a60f80b605f6b708be218ec8a2431401
SHA25639f8958c3bc4cbaaa5849fa33e9040d38fbd0ac78c6bc4b23d87ec7531397545
SHA512d6f305ab58f46b192e5d92280b76cbde6693ccc582c573f799fd83403b96ffc0380e0559d2231eb001ebc7e7a628a8571d502e63726149d843e8b1d78b7af25f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539bb52fd83ff1117476156f01c0304d8
SHA15c6dbb9ecf6014a10ec7f81dcc7c508ae2a2a9db
SHA2563fff287974d43d88dd7a5ffa7cb0f0b26f2c7c7715a938e8df8beba54ab3b14f
SHA512e8ca9095f4da37f7478c9eeceda78e3bcdf44fe29307b676376cb34cd3e59608872ec1878c1c151bb4ea497271bb3a5789128c6d890cf741cec75f696a705336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc89d6e39e0db88a5a393aeca42b1213
SHA1099c6bd648190f12f57c7d80232250d4b2d3fb5e
SHA256aa43190bae62c1799df7947758642c92780840eafc3c5e531111878ea0da95eb
SHA512b6123bfa46ef94b1a83f3f5db797be0a988c4d88cf6796168de6da73ff3b5c354d672d46e8635294164a0b83ec008395e8307ba2fddad944fddaec63a3b58483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf21ab15194ed6b00ccbb7172a332b7f
SHA116f2cb100fd9550f40569125d92521004dbc2f05
SHA256d3c95bc8455f9ed712b93acadb15da0a8b761fd914625a0195ddb65d02862ee5
SHA512c452e9582ed32afec6e2f3f8640876ea2644ea65b0b20fa62a2c5d329a09f615c18ed747f6deb485b03e09b4f8c02bb07f135eca409b110b9faa4115c4401034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5613c6f2676b512744e5959b62a82e597
SHA1bf74c9301e9498a2cc0dd3d8423a3e70e8b845ee
SHA25611432bb1bf7a253b4f8f7b0efd26126e1296dfbe316c43dbd31f78fe2434e4fe
SHA5127042b5f86be02006478f657f7ecf28b03587af90668ec56dc7028dd547381f59d3d4ebf25224a5801f2e5afcba5ac65120e91c83f8ba92ed204d1d6813f69417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503f624791613af9df627c25489a02da7
SHA11f5c4a0284d9d903f89e533a463cf3ee25a0fa49
SHA2565068aeec2ab8a7ec85fac9fb5e63bfb034242ef934702a4bfeb2a03758b4c045
SHA512d017bafbe2b76259f5012aeca23909e307e983e1b3244b52aa8db490ee77772bd1d2dbd9597b6751a11e0bd4d4a6648ec2ae205f12ef783b4f1e69c6582752fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e63a845d65aa55f4fefcfd9dbf762d9
SHA195019cab13e4d59e6e1bf2152e2d40f5de04481c
SHA25610d4972f7e4d516e93f00d62fa892134171bd456b2221340b8059e339e6b611a
SHA5121fe14e9309d2d2505bdb20719a5096843ade5b819dd6a9b9c77aaa921020155cb08a31074d0d2b553895b9ae4d58aeefd3134ccfeaf638d9727ecf446a572ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1b473291784bc86d7128556d9052f6b
SHA1a5b43309e61b8089b755385d50c06d788500cd60
SHA2568b245e2f1f069cf063d08e4fb749b0b78cdecb8ebe42cf6257dd88f8e5b55e95
SHA512fa11c383c4eedd8c1fe7882fe3f733ab5b027542ca65d36bdfafc3581e501d64a6ba49f0eb8d2998c1207b8e3fe63dd39e2ce8bc23106c43a8fdec6a09d0b293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590162da40997a8f9bb2d79514b852822
SHA1e8a771f3ec14de364c3239665e3a3423f9f283be
SHA25618bc207d5c7037f36b429a891846cd9e82f2dece0503bb627d01bf44a547f4b3
SHA5129167ba85a5d06bc9cd3b4fad623f7275866f0e04945d50ab05c67d635fdb777dc1799e14d9ac0dff29d3a24d125a3acc77edb1289f2921109ee0c783ada3bdbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566b669c698ea632f753a3c341602840a
SHA1858e8e28f13be14a810d98c0a6bf08c06d6440f9
SHA256b2c013527126d90fef164abff130dbcd6fb1d75735e96a845ed8003150c22017
SHA512ecdb39fe161e94391969d6bde700837e776965c995a3b3e0e82612b0fa7758cda5dcf22186a948cd189492378962dfb76574edfba966839a8bf97fb83bcbac90
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a