Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
0eb21994f7a40d16dfdff963c0f07bae_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0eb21994f7a40d16dfdff963c0f07bae_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0eb21994f7a40d16dfdff963c0f07bae_JaffaCakes118.html
-
Size
460KB
-
MD5
0eb21994f7a40d16dfdff963c0f07bae
-
SHA1
e8d24bf564b83272c9888e4d7f00f7804dc1a004
-
SHA256
1a60e873e0636557c4c4c9aaf9bfadc0cba11e85c96e0f0b8ea9e1464e86e63f
-
SHA512
99a90f588e6be7d397225867f287367bf032f2e26fdc0c96265435202b7eec50f7db286cae9c1729cfb198738b231bcbf94bf83af9233f28f0b187c2c2c119b3
-
SSDEEP
6144:SvsMYod+X3oI+YEQCsMYod+X3oI+YPsMYod+X3oI+YLsMYod+X3oI+YQ:U5d+X325d+X3Z5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000017a00f54cdc450d49d98109a4dd487885c464931fdfbe1625d6dbd51a5ad5105000000000e80000000020000200000002a3018f3425376bf4662a6b4ad8f16a64ffd898fbc355f80a2e2d96cdf87128a2000000045a13dae6c35e8ac406162cf845a0492e03d5a6e268b6e3561d064bebece76fc40000000f7af31dd67b513d0665e5782b95f90a595e387051f0996c31f4e09cddd1dfade520262fd93f63ea3d0ef037a01d842c0fe17dc6ed039df3a926bcf252924c7b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{48E128F1-088C-11EF-8A04-E6AC171B5DA5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420820276" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e26421999cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2636 2008 iexplore.exe 28 PID 2008 wrote to memory of 2636 2008 iexplore.exe 28 PID 2008 wrote to memory of 2636 2008 iexplore.exe 28 PID 2008 wrote to memory of 2636 2008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0eb21994f7a40d16dfdff963c0f07bae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1c3a2a11f15008f2d67de2155108a91
SHA1b756c4d55bbcc4cdc9c754face69ead483b5814f
SHA25651c01f85de1bba9b9c50075f9fed27ae2bd5ba19ca29b57c60b93bfc98330bef
SHA512da957eb8b102972d58901e797730a412434857db9330606a471055c1cb3c97353a04bb0b22979ca9884657d379a8f2fa9ecd1620bd3d87a0928dbddc125f17ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd1db6fd18a38241ad3bfa1b9330e121
SHA1bf9fe16013cde2d2d80ce4fdec43709802ebefe8
SHA256dd84d0ec0989d01b5150670c899c69b2570b6b261e94f29f6c0b69c98e970a44
SHA512cb3f6174667b9f91f462d3b985bd18fd911b4908c51157d7e4cdb36ad19b740246547b63e14fcdbf82fdeeb39cb91c7c0a676d55fe4560d0abf5da2e3fe564b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0d5c07cd3e961e7e07b5ba17bc23d07
SHA1e678cd78a0559692e97ff3752c7d12b8aab4ecaf
SHA2566abfeebdea64cefe9d15d3d1ff654c9187bc91fc0b1c9cf0e1fd5b02b5cc1ebc
SHA512ccea3aef73405dd56a3a6d0da516a0dd207cd89d79500f2c4a5395d0821743d9a4b776c5317ff400262275bd2fd51fc96a64013a9898b759d6b946ee563014b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1d912df7b8c5fead4986fab35f8b113
SHA1a07a8aa980c8955ee64dce75b6d5d9d38ae9e1c7
SHA256fd15e370300d11cd36fd578f6d2873ae6840d7f2d7d52e8add520a7bfa19054a
SHA51213d87def3d3cc003d9c189c72655a02b386b0084f40664e8e734b80b181cf0097938f987f528bd7de5c40ebb23a416a246c8f8b78ca88490e8a5e9378a1b96d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540685d35db6d5f79ec4d1ec40e0b86dc
SHA1ee8e8fc69872e8ad0a655a07ab36bd246d878e32
SHA256a21f2ee9274008e71047d54fc8c0496ff12c8d35af115727d57fdc08fb954587
SHA5126d4fac75c08bcd24af5ef80db1c31b6525a0dd09e95e13f67f14f1c0e50f00301eea9ecbc831adc8c2017e257d9f06a34b48b73a31fcbfc465c2fa4f53eacd5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e925bb670114dfc07b56f0c7fb3c475
SHA118e0416f93461a85f93553a9104e78e67c612c9c
SHA256799ee960ec5d4c3434a9a2d94940ac76182bb26e1822e520d5757c8ddceff760
SHA51294070c8574f9b7a0fa081db975162b7af019d70a32862473ab958a1d0a51d8420d781d8d4df7b686a75327df65ff7273d8580fad3068f8a77ecc668cc0a96790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55460e92a6ed9b0b581ab3fa72b5be35a
SHA1d29f484f0c9479f53e112bc994d87173d6a85878
SHA256aea8f619db33566eeada8545cb6ea77078577e2d236580da9d0d8c9ef4d1931d
SHA5125baaf7c9f5ea72081f38f1a54c42743bd4f49a55f009c6feac3ceaeac3ca20c5b3e811349c465d1c9c3fc56ef29681f55bb1b8677318f26434040cff5c2112a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54258af581fada15635856847e29a8ab9
SHA1e9e3ef91a20cc8671e607ae52ad7632c30bc766b
SHA256d8aa909e87d9c416810d0f355d5247e028e5d4cbc485af86b0d4ba56951e01ea
SHA512c23f7db199db2718aacc93254cce453d2c173e2b69f59e484914e056a2f35acc0f1e63c8b94da7810a63187299e8c08fdce787bade280063c733d9005639ff92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae266db8703d41968c8b91a8d7b5cac0
SHA1c4b168036a571f1a047f14365ee540b54fd18afb
SHA256f1c88982efd22209e230473d5b4278e3feffa0544c3a07be50b92bbee6370c9f
SHA512404ad420ce013b591d69850d788d8a410c25f2fdbe8b3bf1a2804c1794ead3f77ed780df7cfaa15b5087fa956e69865e687b7dcb0cc07c6fa5cddb5886dcc245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eddec89b2546460a6ca40aebc29ad415
SHA1ea82db78f06f1935dd63d0518a472e31a47c041b
SHA256c4231340068afeadd8940933c3cea6ce3778970332d2ac9e57047e763b97e843
SHA5121270ea5cfa495d05f09ca23b3516549d40486a70a41e821fa6ca498b2711db4aab9f3a1c3f0ca06fee5894583e215d9860a22179cf67de6afba31c3d843493eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559ede4fbe531d35bce25af375076edef
SHA1bfd6361737802ae67d21917075c0f43e8c0bc23c
SHA2564ecf8ce0cd947d3ae9dc5d00f1bae15dbf604f9599c4b5b363da848d29b4d9b3
SHA51236ab572fdcf8027184410cd24bfe21a3967f71f3fbe3b8836aa36fe034b343c06bcd1711debffc9ce115c74fe3d03e0a8ae21f7b204a396545a290b6509898e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d145e46833197351dd590173089bab6b
SHA101b0fa93969f41f4e31e1d9538552a0c4b142ad6
SHA2563e1ce4bbe3177ff1d965251e2c9833fb8f59b45092636327ba373a42a5f03726
SHA5125f23c5736b201ee182bc4806c57a6498738ba2d5d5f4a747620242c838cc590f4eff7657f43aad02da54b5718816b8092c06a04dad73c9d8d53b0bf29cb2ab36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594b104c04eccefc7bec522471ef10286
SHA155beccf81636f3ebeaaf61736d49e5e76f47a3bb
SHA25626a7f8d510fe9eee506e115cd838cd8dd071ef0bed49145295bc9a37e28e5747
SHA5122a1dbed94adf6a49bbc1afa661a76d651a00677236e0e3f02ab3ba8893837171eb3129110708316684bbc1b2ff3aad70840e0f56b4e0ffd509054238008b700e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b0eb81ec4c0535f5de5393cae540a8c
SHA1fed1b26ae8726f71d0a61e851307e94f141d1d3e
SHA2563ec9f4197ba18172120a81a602ec83a14216a4735041b584800d73cdb24fe79c
SHA512855f8db868a54c8dd64c3fbbe102fbc856af0aff6951c6a271205144750f7375003fa6a49edb963c07cf8b610b349535642761ab17e53b89aecf63c5df319544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e48b73b1374be81f187deaa48578330
SHA1fc31c158a532a6a8036e7b388f14d489b55f9a27
SHA256e986c7054bef2e9a379dd73d2a34d9356a90d2f67754fe9bc9c700b5bbacf5b6
SHA5120189dd3a7deb565ede1570895ad89342dbc8f731c76c51a2d2b5d7d28e2d0140ad9fedb2dd489ba12da52c44e881de1b313e0c476c3944dd764f2c7971a3b140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc9aa37673d0853f5fd4e0658f8b4856
SHA1d453b87fba9403532839ab9cc973c11a3ac36e84
SHA2566009eace8f0199e51899c9a96fe31d8ae0ca1dc086a6c899b818edd18fa5bbd5
SHA5126ed07a373d74ee6bdc4a4262aa51953b1cacf05757e1f883411f5b0878b008acba1b5e247b3a47de5020b2b4d937f2be38a6a3eea9d5c4b1502c196c128eb092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558009f2c5d3554d5ae976874691ba0d9
SHA15af4bef6555e09c3e351147abce534ec7c444250
SHA2565e28df1319f9cf0adb590e2db56dee7ef891a99d05ebf40a456e9b529deb92df
SHA5120b4978a9f17b10d091992cd5bd19da0781e85adb276161a8cee7462cc9a37dd1d872c2d79f116e8c8531763ccfce5163698d6a34cfefb6166e57716ac00fed0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5064c7cc179fa42ffe9170964f79f8a17
SHA15134142770b755670019d5d2fa93bd39c9bb78d0
SHA25616a2cfb888c00c73a36e4304cb76e2e47c97fcee844b00a9e71d4011b5048753
SHA5122a4fe75a5c442018511021739298689eb38be7885119abb4e666d0cf01466f2e73feaef673ccd532bdb7f14a56f38cee322d2ce6a3a86af58d4e67b8ae6e0321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee35eb4361152c947eb1ab47d0416f75
SHA1498ed76a5aaccc456614045e9987414f3053de22
SHA25606ff472664a4889ad9f2d8aa890f7bb0143ad799678ca942148094a109321935
SHA5128e7944784aa87fb48083e25983d5d79546e235c71cd110e1b054abcd639e271099126940ebd0f2a1775a56cbf0aa3f28b0de284e61ab4d8605c00dadc7843469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5511d701367784bbc8a7e51ff0287d127
SHA12d47576e4845b329ba5f0b8afba87d5106afdf2e
SHA256e636dd462628a88da96697ed983f16b8681b7de206c2eb70922d29403d6f4e3b
SHA5120c1bd7ca1c6103d3a3983007a16d00102a148eaff11bdc51b469c5c32fe7c5a0b59108a66d6a8fd4f5fa29d98ff9ec51bd3161db8e0d755ee379f5f83f520798
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a