Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:22
Static task
static1
Behavioral task
behavioral1
Sample
65d662a9476c444e63c7e0aebd1d9d2f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65d662a9476c444e63c7e0aebd1d9d2f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65d662a9476c444e63c7e0aebd1d9d2f_JaffaCakes118.html
-
Size
138KB
-
MD5
65d662a9476c444e63c7e0aebd1d9d2f
-
SHA1
23d5ae8441bac22e7faba894f477a08c4f75b916
-
SHA256
11dc028c7f612bdcd0137a4b2de14794dc55f17d2c158eef2c70f6f3065bc98a
-
SHA512
8c7735937cc9bc3c12a3ee2077274d93f4fd5c14da99344dee8b34d81d7382cb90c3923a4e8e7e7ca0d5e84b627738b1fb6428cc4bdc3a2040f27f37556ac228
-
SSDEEP
1536:SSfDcmlJyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy+:SShyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000e6188d84559591eaea8bf612753dd6046ec8e9e2342e45099217686d5dadec02000000000e8000000002000020000000289f71359f240f3e3ab530d196141fb16de2b97bca45970dc591e4f01675d20b200000005d9eb26e3a1df7e4e81f785077a1b5344fd6d8e8e62c9c4a8168ba9d8708007a40000000814ed733a2240ab563e7b041df96df4f04343af57bcb8e999afbbdbcf8fa0f1bdcbb9bbb0bc42bf696217bf701628677d209a102b2cbd23852f939aca2612c74 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0446da3f7abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8D600101-17EA-11EF-B8F6-D6B84878A518} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422510030" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2984 iexplore.exe 2984 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2984 wrote to memory of 2812 2984 iexplore.exe IEXPLORE.EXE PID 2984 wrote to memory of 2812 2984 iexplore.exe IEXPLORE.EXE PID 2984 wrote to memory of 2812 2984 iexplore.exe IEXPLORE.EXE PID 2984 wrote to memory of 2812 2984 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65d662a9476c444e63c7e0aebd1d9d2f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573184a81311b24a38552b41481bbfdfb
SHA14f55d0740d80341b09418c018443ab2ea7c190f8
SHA256c1aca69e934cc68220a0b31923fcd5de208ced03ecdd77e422ea736d525267ea
SHA512208f6ebef68dcd7295bee9661e5ac56096335eb06666fee0dbc41807c2ad0e9262b979a66edc544e19273491cc4aa59c0d6f00a571638c5a6cca0d21147b6394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571d249981eef66b043800909e068cc2d
SHA191812086efb5523e195e4af791a18ed67e3b3761
SHA256a40d16db0519385a8b29925cf82c9d6d8bcb27d1af0a0accdf46d91e53d024c3
SHA5127c468cabc54f574db6cc2879458119bf88243f8a24ef452629f8e1f4f2f604bc8b71c48499a12697b81eae5130969d282324033a6c0440116f5597b3a94d82b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a89d4dec824511e71b6909105595fe94
SHA1abffc1eeb7ff4b13eb3727f03792e675776b3b8c
SHA25662ccb63f8c7e8091f37948d665baa54cefcbdbc721f3222df69357b589ea278f
SHA512d5cabfc30880eba49be9cd251ffb6378a9ab2b76cdc1f37dc6b441f5c002ded97fca90dc92ea4406ba1eedbb36186602ae1b0f06792ce7fff4b6b7c4a6166ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552d5c481e00a5f0fbdd6d350301e3dc2
SHA1337c56a9134398c7ea41194b783c63605676da9c
SHA256653d371c731c85f691acdc0554c73477111174be535e0f13108fda3426f413a8
SHA51293f52118caa13cf308c53393a2d7dfbd000e3d4430532bdb8a1b558f9e5462362cb84f8cdbc7d0fd145e01a4965d4acc7a69599c38689614158155f3f24e8d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555611a57f65046f4b371c83e3720fe18
SHA1f5ad4ec215fff397964387e98d378fd26a9d3926
SHA256154ec694ad943137da0289df27fcd479483d78a4a46206e89c73bb108bb19b07
SHA51261a07d3ff9c105b1757b4edfe12236484af63dedd57d5928f62b639564fde23896a4cb41e01af5efd8e9414f4a1d2f33f39aac7aec94d30a5e0ee79674242ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9f5be57915dd0d19054512f7def8f45
SHA1d8ade4d7dcae5eac6001452ea4e03dcbb57d8346
SHA2561353e4f4aa435d5b6128b931836e11c43ecb0aa5dc8f9d52db3fb7216174ca3c
SHA51263f264a4ddcd9bce6860159fa9591f224ba2c8038d52a3f6ad1c7602ed81edd74c5dbc47337566348b7dd6da6d89544e260e485ba318a1f1256bbeced7f9511b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0f5a8f1b4fbb631853e8b3a8fd86e08
SHA15f5f72110cfc82486cca114c09730a7ffb293945
SHA2568573c70283ca30ad2e78e12063a7a4eeabf9b02fa94c40e44aa99e2795b1e2b7
SHA51299e27069295d4bc95321b7c0cdae2f07883413017e7ac5e3efad4028bfda9f493321b57e417b582530c1b1e01cc49613641a492435b6405b05e85e3ce81e5512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536bf298e0657d037c16d981f075bbf55
SHA1d2db6d826e818b3910129f95256aa10541ac4a64
SHA2569a9575f65ee31314f6325bfa67108a97400dbecf9848ff25ff598dbc8ff35e21
SHA512d59d1f283506100eb9825eaba699a556208f5e9a129960f57cb3df45a0b779ae68a8496579cb83942816dc942e6b5b4899690db075633e580ad033f8572d296a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55053cc6beecf89e50bfec506c3c5b6ca
SHA177cdfcb4552f7e807fd137b3253218694b1a03d8
SHA256144ad27e939891cc6699f2ba3f451aaccfcea796560566a00a201be489dd531b
SHA512b02c148ff37691ef3b021c6ddb73704673a295fb7e40d2d58354133e77c2383875025762913575400f890d2af1fafd8aa3761ae6c588de357ed6a731d885f7fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b6730014b7a412f3caf4d5678d17513
SHA10dcccadaa580f4a3accdb50bcbe2ef8ba5de6951
SHA256db0886cf2fd2e7c0c2260469b5c285c3f0a960accca122e367b7d8d9c211a91f
SHA5127de911a79e18b594cb2b011963e1ce6f8d5d49320360633afc7be3ceb718ee5fcbe1f9f60fd307613385ff0ace4b67616630b323db8c2c1ec46cb383eb96c376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9992e204d8c4ceaac07b69d372ab9e2
SHA17444f0c4f2a641dcb0b9766beda5caa086880c5f
SHA25602e249b3a2f404d409bd8a690c13ada59ccd99bd3af91039dcedc729c792e222
SHA51205e476d823abcb69c24615d5b98b1bfd93eaf54e69a0594ce93848fc2e09f035f0c5a638666cf0c00a5c8e966a753aa200c3ba4e93be371d655c3c3b469205cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526f7bfad6d68cb2940658b341ecb2e9e
SHA112ac35067571f5daf7ac0e570c409d499b133883
SHA25627f42dd90996df95beaa585d54bad0577cd208a429b1eca0692dd0c1003bf1e7
SHA5120a70698e1f322a3863e39a6d57b70b67f75bdbaf2c0540c843c5ef946db5aadd76f65c86c44b4cd59662a22f0079e9eb230f3ac2c6da8ed4089f808132f7b3f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef9baed60ca00b92504ce1fe87d6c02e
SHA13c723372c0375ad807c6035028e843833b6898a7
SHA256178f2d77259b1b7a7fc8b789aedd3a972766d91e690f3f4ef9298a6453a809ac
SHA512691ae39262bcd97736b6db756aff184b17754b96f2ed48957b064b9dc28e28d158835e90eccc541a0e1112b0231218999b9d43642720a86112091ef4008fe1ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc71a30d7a530ced2911f7a275697b54
SHA15c5b945cddbd4c539adddd7bdd9e8ecfd124a08e
SHA2567d6ca5f03ea88e7ab1477f4c4c33f4383b5fe13483261b26196ff1539acacae8
SHA512e603ea40f27f4d0e0c9df8128534ffc1f0d6f931a6208db498f4403a438272514d363eedc97bd47299dd7c535abe505e1c48fb5cd75bca8fd38e4a16cb66fe28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec6f3cf951fb199ad9c19e8cff41f998
SHA1ccb7659ab70f557ca5b4fadbb22484e3d8460502
SHA256660e73745613ad54d12f36d4042c7933104236c419fe444aa41b431d636688ef
SHA5126722c8d3b4f985f8b18fdb8cb80a11b94e38f22335329247de97cc3d1af1d77b4b05e728da149fa5431fd726fef6d5ef8d183aac118dc3d0af288ea9eb4f850e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557de46e2799c7caf0380295e57f7ac96
SHA1b49f4fc2dbce6a6ddea3f0003735630cb33a844f
SHA256038132f4a182ece44e0f71d227e2064103dedc9a327d1073d90475ca93e194f2
SHA51283790ed584e96318cba5b6f0f3097dc4bf070efd88410b19dab4c40c19e49c2021e50385da961d1a9097737e452174573d9a45169bde5daf02184d55f434467c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddb2c2b649632c3932b9f52b11291ec7
SHA1b5f1b2709f02fdd325fc80a5ac7ed67b707e6d12
SHA25661a3c21b48e4b47e7f36091304fc0bdec317380f15a0c97062abc747d55853f1
SHA512931f31874cad48ae73ef012c6501d7e8e5cb1ca29a1d53e25f7aa81464f500d2f3d167f9a9a40b3618e530a5789efed73c3a8bddb4f48a199a4350e30a847c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3620cc758456ab11cfe0099774c6bd7
SHA1ed9bca7af8ff3e954505d9b23c71c68742a28943
SHA2569e3862de7536220387a6bb04bdc2899970ecc04e343b823e1068479e5111b00a
SHA51244af7142911010be819d94ac9dcc4d2ca7dfb9d5d245cbb378664c6c89fa5d13987895e38be9bc9c940718b0b5c946817af9b844be4f6053f75a33713f95ea0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf6a76be49d9b7eca926136a8b87a57e
SHA103c9ca73aa6e814f041900b482b1079e3f32606c
SHA2569829e23fa6ac7c4d93947dd8ad47306c426e9c08082a358fb8b63f5f1f516fa1
SHA5127404141419cce1cea2052044f4bbce51764f450892d9a6e800f91877ef28252a161085635a48a605709f971c1eba7de71dc3ce68551f1d0af62daf441c6437fa
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a