Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
65e249a97a8ae912839f71c1a1ce1f39_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65e249a97a8ae912839f71c1a1ce1f39_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65e249a97a8ae912839f71c1a1ce1f39_JaffaCakes118.html
-
Size
67KB
-
MD5
65e249a97a8ae912839f71c1a1ce1f39
-
SHA1
6095bcc3511ab32d8a4e9af749a66627d1c18fb5
-
SHA256
04c2b87ee9628b97435d2d2ff8609efa61d41485d8b21b9635734bfec01d6da2
-
SHA512
b9ddc5e106d360e25d8ad5a8268d15cb3f2a44968c6c79166a5000f05fbb842ec42d637879fce8e3ffc6b52ac16f2f842e2b8ea6de203fe245913aae899eced1
-
SSDEEP
768:JiegcMiR3sI2PDDnX0g6hqkCG21oTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVGo:JudDyTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000007a066cc411b481e0f50a9a34576be8a069a32271ae47d3ed37e349e9868be963000000000e800000000200002000000028f8aa162183a8070111c7b78b0fe9b649278d27ee76e8aa66ea48fb1a6061fe9000000067922216f5621cf12f93e1938b472ea008fb84acac207c5d453bc8f2e7bfb3a6e46d377eb3a6d10a453730b469b41aaff54fcefa25b0c8d0be9658dc5dbb74e5fbbde946c5a1484f8d51d366f1e33f54d53391530d22af70cb74896bd0d65dab34628f74bc6e4dd1bfce4b187abb8a0acf501b9adebc0c3f4feacf4570677d1afea17e809a2f2c525af24f16558698134000000027bcf602d470d65d00e2aed962c7c48f2004755e68ce0582dfa4ffbdc91dc2f68908e97f17aad5b2953abab85c55aec2a2ff3fcdb899447b6ed8218c4c4f5a49 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c009a7fdf9abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000049e52d15c6a5e67fa9248e260b413924f1945d56d6357db25f02a9a157426ceb000000000e8000000002000020000000866f86fc03d91095719cfd8e6e9c05093696b27766e6cf7a2636bee92f5117282000000061b28c02b1cf57aa7cfbcdf1dbddbfc8667c0a3abe376c6a6d76e12b76a28c8f40000000fabf580a71375997407901d554866ebb9545fae72ddb1929f916828888c0f1fec741f1f96ae795a3d9ec00c8b5b06d3f0ef44a0d6ef314c967711a299458f8dc iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422511150" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{28ED1201-17ED-11EF-88AC-F2AB90EC9A26} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2256 iexplore.exe 2256 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2256 wrote to memory of 2424 2256 iexplore.exe IEXPLORE.EXE PID 2256 wrote to memory of 2424 2256 iexplore.exe IEXPLORE.EXE PID 2256 wrote to memory of 2424 2256 iexplore.exe IEXPLORE.EXE PID 2256 wrote to memory of 2424 2256 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65e249a97a8ae912839f71c1a1ce1f39_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b44b02da06ad098150b5092270a003e8
SHA1050427eda3debf901464db6c749bbe56ac55ee64
SHA256db22f1e98a74e1b9b92541d628516e99d06a0bbebeab50e2ef00242b05cb68f2
SHA512dc22f8e86d9afa4548ce8d9a1ed2d901f6cb55766b17b735a5bc6d9110e67f5858133debdd8957ec38b56ae08c896615cb0e87ff01d9a503e677f030d2cff2ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d8e52716cb1ecd8a48dedb935780ecb
SHA12c1f1946fee408829698ea3a45753c6e26cd6ee4
SHA256901d553276abc63c9f6ade70996c6faf08ba694d3f2cb498464779117ec3e469
SHA5126d646e09ac316906ca2d68772ea6d84c105babc05082407af0f85ee7aa0afd225b1773415bb7abf74349c1000f651ae200fc8223bd2802153fbc41f0648492c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5697084ebb5bb3c005d8cc945f2f2c157
SHA1c3edaf4faf5abc68f3be38935749e7dbb3a8c69a
SHA25633b96185914a67b7347ecf565df66f76f9289816944314e9e12f460d3d1fc708
SHA512ff9725bd1263b391f467f4610cb57aa6b19eefed4c94f5680f702ec6fee700fdf40176d2d7986428305f75191d18978a0885cbc22510701cf3eda6ea574e5f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56952e56969e8bef31fe352035c4f7d2f
SHA1b6caea9c1a25b9094fa78189cee2eab572590ec1
SHA2566706bac3a40243e9d6820015d0ac7d733f37270666ad3c0055ab87bf7bff05c2
SHA5126b96a1015ef964d0c643564c02c3d6b67252cc167e7e3b445d0443ebb134a2ac477059c2ea228e1e8bd5641d69060c673c8e79be32871bfea7245c88ad907242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d004433f3e5bcf22669271d7941d4af
SHA1903608b3df38e101ad38b0ed776b57fdf70b2c75
SHA25682d31804ef27becc4ac28d36a53e47c4b373412c50f8b5328b78f5190e63fb03
SHA512f7df40fcef1a6acb3668ef5a12a696e7a603da370da15cc38cb77cfa04d5b372c1450cab34f19928c4106e739f13572f9a5bb66f4a5e2d2f0ae89b28840898c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5073a29fac6af675189e29c4c2b77aca8
SHA1fdeb01621d02075d14077c87c9e87c717dcab251
SHA25666500fbf5684eb68ccb9bb99e458c19e574e8eacfe2e91f5f19f456078a5ef12
SHA512e23c9aacb62a31b930cc104c3743b7577695e0e5c00d27097d7b24e042cbec61d8c6818d7f87c0e5efd220c85b05adb4b59528de9bffdc898954085beff29e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576e1357f0f9700ad4146c1d8d8c5cf28
SHA19c683877d2ed0496c641942444ecc9a99c6920cb
SHA256857a97c302c5fcc37a21456acccaaec584a8ff451f33e2db4a99f5102454e561
SHA512dc560ffec0d5d888b9ccfbc5aba4ef16bca97db8c825b65449179f2ae3b737b50cfe7c39064b641483b52c4852333bb30aa693fd9e88198bd4e6548382296bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5118a5cedf060a6c9e473f3df0c54a07a
SHA10bf5b7d3c1ce95139d209b6f663109bba2d21bbd
SHA256821628a230eb770391ee4f0901e79b35de66f18a1a47ba8549b85c5c43b005de
SHA512d6b619d0ec8ccc609ab4abdeb7424e916936c2413d692cedcc4aa89bf6cac014d8b077652b69f67b42d35124126fdfb2195451fc7c94276fc4f9066426b025d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574af943cbf5d1b938539c7a7d34ab674
SHA14276702e919b036c9e460a93169c1bdab1ab7cf1
SHA2567c0e259987d5158513374b77b0f92a5370bb093899767bafc02b6eb9191abe4e
SHA512dc94b44d000e13ce181a6924647a0be57c0f512569204511714fcce675a0c2ea057ef61f4066e5d99625f7b852d3127fe5e5133d53fd5854b2d7d7701bbf4cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539f056c2470e9e4255c0e504b5253cb8
SHA1deee885519c7eadd217366f780ad71bb42151f05
SHA25634e0e310492cc47c2d963dcb414044f2c4236bef1cbc15b9c0a3d5d6fe981c80
SHA512f303f05e477935b091156d0e53cd18ad31e909322463904570c319bae68d2b34c277e9443c05e62115cd5ab191ab261cf02349cd31ccc4057de19cb86ad1034f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6cee0ddc4ca03ffe49243145ef2c337
SHA1e0150f0c10abda6a4d6a16db735053fc97300bbe
SHA2563b406bff1e97d33c782d4a78ca8b5353b05f9509547a4a8974f06a08069ad425
SHA5121df1781b4cb09596396c2787ddf11920febc6ae33639007b70d9343912357be2b9e7cb692bb1d612258e6d2d03e54e37b038b84342d4f286d83b6977fdf4e25b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59be76219d9aa6117b0805ce2c5334dcf
SHA1e7739b8d266ec864944446e24062109f236a741f
SHA256bf9c5f0e150dddf19884de5c2105e693a2be02b23f4e8d657f9c7324f5fadf4c
SHA51211aab6d0a3d9788edbbf5f9d1e5581ba6a1170c7e79cab8458af9389b2384bac016cae21729b6a77c044eb5dd62b8c433c027ccbe1d380eabe8c948ae02dd1d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f53bfaebaf45ca10859db42bdb3f9c81
SHA1471970ca1e6de7552c673399f0dcafd86c1e21ed
SHA256b6c5bdb7c5a3a91b374fae401f2c4d52b3e34a1745e53b4ed88fbdb0143ce90a
SHA512c57b03c9c3880a2c771140d664481df058463a29b4f691632c05077d3b6aecab87d7c28f7074908de48e0f9c20b58fe9bb85e1dac389cb9b9d32adb4d1c89085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d260475dfbc747b6200171e4e3c8d1eb
SHA190487a97fcbc84cccd468d498ee633d29f15c52c
SHA256e4de4f5f9005a82064ce7014333f6992aeec12dd9fb5796b21002a93b582f285
SHA512829cb50c0ff37ece3153c0861cd89457d9adf6cb35512dc5cf668786c511ef808f059071360f53193fb784f6dceb7385f554f7e10215e017af6f2bd9b2d9178e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f87b5e15bb9a4e579f132e8ac998d6bf
SHA153a020830a0509cbf3621bd508e26115e95c8721
SHA25638900f542659b14b512aa8216e3fd4be61be0a52d91e5c2568a02abf61fec9b6
SHA512a356eec74d79592e909d2fb527f35bca3a4a20edd8e4eb046d8c51d9028f4a36f494dfd1723a4c127f7fb909f0337c3340ad4ce867fe2328b677db4c8db316d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1d7c58e8f93c10f7e3b859f6fc03dfd
SHA12e8fc35749c3ba4a7616095debbda8d288cb8d96
SHA25631900f559b5f8adaffe48241fade17516e3a9541efb9001416ed0bb3c1bc1d06
SHA5121c0f42a4849526cfa610d20a719a9a87c5caf17cb09ef81fd9fbeefac81fdac4f1ec19b9bfeb25733f85defeff1b76cf060b27de6259e9cca318a4225a70300b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520dc669ce6c813000beddedb5f3a63f8
SHA1df76e4641f014b219e3a9d3c416f989b3d143190
SHA2560192a5d204a5aff608807e88a1be8e3bad65cecc0e329ced393261af6fad1e3c
SHA5128c7d23f7bcad61b2ac279873deb6720d2c2f5244b2903e33357f26c6adbd8fe3277832227b26cf79161b5a36020739c79003cdd43244275a17a464e8233d90e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59792fff39da890063fc9fa9d96ed8b14
SHA18945581f4e692d051dd49437a03852791e15dca0
SHA256ef14c793a70e5ed97a415c782cc81cf4ce5233ffce2e0e7b92bff98beb720612
SHA512769d2e365c0d5864bebe032cc1eb92b2f41809fb926c345f94a7448024a0141564df7446f0734ec67ce080f9756cee90a4ba31ff1def3ecd804d427f86e2d146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592fbca4d00e4d9342702ac9abd117631
SHA167dbe621e893c91e6b791d1cfb1cbade2f0d6ab2
SHA256ea33dcadc0f4bb09113682486103dded3b6d942260b440611987e6eb3c260dde
SHA5121389a16c7663b09095f48f7d708423012beee4118f3564b91950799a5000149c0ccf87bca141909f988d4736cedd92c816e64b594e20d5deadb09af41db675d0
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a