Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 10:16
Static task
static1
Behavioral task
behavioral1
Sample
297cf0dc9906bd0753b49a519d825830_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
297cf0dc9906bd0753b49a519d825830_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
297cf0dc9906bd0753b49a519d825830_JaffaCakes118.html
-
Size
157KB
-
MD5
297cf0dc9906bd0753b49a519d825830
-
SHA1
ab5916dba44d3376e526c55d85e4c94063f45409
-
SHA256
598190fbb15de73e39d9201af1ba23c9cbbf9e8b30a63683d4ad5776eaccd888
-
SHA512
c6ef45e9739a08833e852648c5e067fc107b1219610c95cf49ab548850d19269492f13f1c19929e6926f7c8e960d3c60edf6727c9d0751c511b0f273c2f71ecb
-
SSDEEP
3072:Sj0FrtRKCyK7zeajKmk6Vu3crRAdMcNM8QRXcUd5LXJ2mMV5yfkMY+BES09JXAnZ:Sj6rtRKCyK7zeajKmk6Vu3crRAdMcNMH
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703f1e32faa1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421411642" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2B171D01-0DED-11EF-B082-427DDB91FD53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000aa3945e06269eb4ff2d7a2b175db5e2c4f2f9d955e6371a4c4d42e9a3a541fbd000000000e8000000002000020000000a7d3aba560404adece3d0096e5c1af4ef2be1de8086e8edc94e4b761463d8a892000000066509a299d478771c6b9b7a363780f56a6dbb5f9fc3a175e28399f906da31ce240000000115bb224a1a824799e987c1d03c92a385adfd54b30a3079086e7f9e12ea1b639df4ee780cbe7bc5b843c98e0e3bd1c22268d8ade21555435eccf427907f1feaa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2112 2372 iexplore.exe 28 PID 2372 wrote to memory of 2112 2372 iexplore.exe 28 PID 2372 wrote to memory of 2112 2372 iexplore.exe 28 PID 2372 wrote to memory of 2112 2372 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\297cf0dc9906bd0753b49a519d825830_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581cc591e50812d8930c05226cf2e3711
SHA1585e1fecf491f600722b09fb70f3bd463235fa0d
SHA2564533abae96cf83a8d1cad9e239adcda42e5ef9f51c6e4985eb95ca8b314a054a
SHA5122c39bb9acda311de401be56073b33134614b9f71edd47f855c76a81a839cde94730fbfd9da8ea0bcbe34cd229761d11dab32ad578fc27fef6a4553be1017eebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2da247694537b575cfc185fb814c00a
SHA12fb15791c580ab45c945b4957a01bd4a5dad97fd
SHA256ae92beea1f52cabd2f8cdf31b90abda61a1cc92b176fb8c106e7a2f4142fd8c4
SHA512b472543216513fb754a9886537fa9b00f2ab4c092dfe361148a4c10c858e57879191dfe636a478fbce7af8ba3bd126b4dd4f9504b5f20d8e12cf63c68ea1f708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2dcc2424c38d11725a2df5b2477a7c0
SHA10d0dccda8ff6eb4b88edecfe445722a0119dbe68
SHA256e4b4f5b9d373b566e7b84ed0d9e605660060f321beb8036eddb04ea5e39b42f8
SHA51221b933144c361d4d369f98e0a634ec72216066ba9dbcb351d8a6ee173d0c6b4e71b6aa5c915e6c5a922390494325e85275f16a85e884ee4b7195fb194f62c892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5946af009345b04b0af7604896a437c27
SHA13b943b9d933bdb00cf3c26e0d7a692fcb5670ff6
SHA2564276556fc7e308a9345fc0d126ed81c6736ac3334727699ddf105df8892d1ad7
SHA51278e79d0f01e4dc159cc36162a3e150fade83d2086f68c1428dd78736e5a7c81c1db3887af6d589d5fe4ac05a1a4b92f880cc927870821fb9c416c06559d1f068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d24f0716689144efb0017614c66500c2
SHA1428a9adfe0ae16a57619207b1ed979a5c1f87973
SHA25629fec1e62be0925a5eeca326e752d8e9986721d01f2f5b81bdd4a886ed3067f4
SHA5120cc0b541de02e65f20053f5928b323e83aea23fe835abbb0362ae1d5a2bffce7b2e401a55a68fd7561915f498a217d3f4c4c1004561df453829becdc53f94302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c267aea5233874c10aa9d055d6ef974
SHA1c448f9f63c66c53fe174bb6f61f5866175aa4783
SHA256b2bb6f821b42bba439c63237780a3f3217678f87effae48e4ddb958107722bf0
SHA5126aa77b41e95559785eb50d809cdfb7f012731de2765f534358962438ab5cbcb50b39a4fc343095a2b4d77a675b9a7b3fc201a9c706fdf911f0d5b2d37415d72e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53710a13b89a67a2b3e2f694f6e31dc55
SHA11cabddac164d39e8fdec859da795e16303a79ad0
SHA256d116b1d6c2428dc4f924034ffdd53167aff95d1736af0be6bc367dc3c61c6fa5
SHA512dad688759e89f3205b57e44f60ca372998e66a0cbb6bfb05f33a05aa714739b826a3ebadcdfc0de9fff8cb66d6c7fa224fcb0976aa3116de10585e6e29f227fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f76885ac8766f736751ea8ae50fc25db
SHA1de0b3e56a7a96db1746b631312a004d8be70e42c
SHA2565303f6a9b87ae513b5ffd35383f7632bd5b9642fde4ba73be427fbfda6a7c020
SHA51265ad34f7f6acdac6667321f63780c57823e8b179ed43960bcdd0a0f071bff0fea60494902dfb3b8636b7c95e6e79603a095a7d3d2063a4b2c5021042e2378977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5532458ed13f411adaaef9cd9c008a016
SHA18a62bf96ee9395f868c6d1ac609852dcba3e4269
SHA256f61623c1d89c48e67ada91b3129450e0b5ed07ffd0476f948f229f3b858070cb
SHA512fa4d44a9cd4555f57fb9ebce04c00f51902dcf2553521c5ffe4ca88b754e4cad6de789f599d2d8dd182c50897953bd26df39473b2eb9251ee790c6f46f2297ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d60271b854aa6694f6783814a2ceb9e
SHA1904f61e7f9aa951d1d3764571b2f2448c8b69c22
SHA256f9247b1d02d556c175a49682972ce6ef5e88605ec20045f910c2ec35973ccd1c
SHA512e570facbc57de4843bec0b0059f3ca4947a903925b724b6083b588b0269cab1e0c47547a05f744e262d2a8e31e9222fbc44b286ce88176487e1c6c4ee8866878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55112d144e4f4138f0a10253c00b04bca
SHA101aba70a457e2e0302a4868ed65229c385e69dc1
SHA256e89b491f37e6114bbf51508cdfb237f61303eda5483b9626b647927ee150e52a
SHA5122d617b989d3a55f8d31a9882cc551b763f5c7f04627d5c8460b6885f83f5c5cfa58756ad0b512242010960626cc14d2cbd4f5d8e0e33a830eedbc4cf6b2f1eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a6cce194b1706823cdd7fcd3768c22c
SHA1f54d0f0d2810eb1045b117f2193613d139d7af11
SHA256885b383e5cd2adb7887b940ccd4b9a618a404b456ae8213a56682f6f5cf7d190
SHA5120154a87b44beb1b1756b0610e7ab2e24b408a084633aa52738a9ad859670ccd21cef8fe21bb646d8f0a31a7a6089b9be205692e67694e93391d40bf5b38bd5ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4b171561daf9b8ff0fa030682474d76
SHA10c6acf0a9b384961845abf471fc53beeebc61bde
SHA256ad2cba4eafd2847ddb0092fe61541ee6c884126d47626b9447a3fb732102d42a
SHA512a50bd09f94a7190c9f42557bf75b2f7ed648c58b77ee7cb091031db3857d2070d229c2edf0e9921a910b4694efe22c68ed482439274704d148b8373e703adbd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fd3709b3cc2091f4de952b51d2cfab2
SHA1163c9adcd374c0df569d403afba539a49d0294d5
SHA25657e212c1cc6c36ac1182376c00463693a50eb8e143c6791c2d7fda81a187c64b
SHA51221b18406341c3ff85f2655947058987286d15e120763469178c3c42c5417a53302afc16e0fe7368a0b859505126b3be5d318ef9ceb8d90c0ed8f97d63161f9f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a523888d08f29d5f1d2d80842e664dda
SHA1282658e4021534c7f142806094fdf5c077192f9d
SHA2560d35a5be9f260e90f0a2aa6fd2d5abecc3f995f632503ef09fa4a3527f657f12
SHA512bbe24179bb233c6be8051434d01eefa1037ab526c7f6dc76e12a91f10f1b19d19d14705414551485874e66350bbf7d4549da95294702e58b573d5461c020fbba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fa9381ed2dd5fd5954e9b19807f06ec
SHA177b84f8a78783dc9b162a99d1c81013003f62796
SHA256bb69bbb90d1710ad1d038ad6ae0a1340d070f83351bc60f48047cc9bb0be65c3
SHA512b27960ab729439bf2809de55e6a2e6afff5b0901a7ec33d9e2f8f802c2ecfb8a31a062261b30f4d3b991462d19068ed9c7862d69911b4dae0e645bcc18d76398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537c44a411d7b058ed6c82e741d760e26
SHA12776599fcb5eb3d7e87f64c6f9e2d55aa47f2acc
SHA25634e9ee483c8dfe92bdad7c2fe5a63db97742903787e0f9f69e92d15e1fdd6090
SHA51268f271c6b86329e4b1de79f9dc2b523b88583242368c48846ae9db08d79da35262a958ba5f9cddba1eaceff283ef132a80855bcfe77895f60deebed3f653859d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebf85c4f3ffe6605cf2fa1b5f023bf3b
SHA1cd4387e6b09eade164443f2739e1435354c06519
SHA256e6f92118f3b98f8a014520beaecff17e3204e3e36064b3afaa3ff43ed5cc29c7
SHA512227f72e5980da8255543ace03850f9d14e53c55fa1ce8075b6be24a6d950beed6f48c00dae93a2ac58a0ccfe82620a5a8ca9072dfe5f7465609e36063354fd72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6b518e980bd67f9892241ac39c29202
SHA199c0f133121582d3cd772d071bce202a2b10cb18
SHA256f664cf1331dc72db49a8801d9b126ea15e5c5926dddbb381285bb104d9b13fa7
SHA512def67f716faecd244c260e9ad63631a3e09361199fbfbaa7675956e35ae63451fa2aad029b88df1ed6528a2d627c2ec8329f8bfbecdf917d4a46086d36be462d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59af267aca0480d28361d31a783a0068f
SHA19ef7ba289100511f45c6dd3c2a252f2a920dcc2c
SHA2567d76fac02535ccee2e0d3cd65a504f321dbb44ccd3ba151bde425463673821db
SHA5127c35215ba232be21f44bc59ca78795304e333979a4d411ce66bff6aeeb586d57edd117ceab60314fcd01ae722daf093c252ba2c6bf630cc5293d37bb81de0d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc631bbd6eb779a5d9984ee0f4f04d83
SHA1f0e35c189c010d3303f237e5ffd8eced28fc850d
SHA25663278ce34809304b6a410debe7662654caebf52488c27fa1b75557c2f6669fda
SHA512a7af5783e735f1be118a7a8d92e7223ac3f732b54262cad94fc118b1c4a68b27f9ceb18eca34c1238070ba70679adec64597ef9c0ef03c8840ec5dcba3833cfd
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a