Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 04:33
Static task
static1
Behavioral task
behavioral1
Sample
2d5d1d0c34896c5350004e00369f463f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2d5d1d0c34896c5350004e00369f463f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2d5d1d0c34896c5350004e00369f463f_JaffaCakes118.html
-
Size
4KB
-
MD5
2d5d1d0c34896c5350004e00369f463f
-
SHA1
4da9baaf362a2b7edc017bb8805bbe5450784087
-
SHA256
06168e8b2219a8b7174391d827963c14a35f68766cd768ee9cc5675f129ee81c
-
SHA512
edf6fa5bb9d4d194836de73de93672f7348f5366883fcef1c9ec06abe009b63edfb7465b97b2ab963f5b193fd2b3da6db0a957da82cb36116c510bdd532c5d9c
-
SSDEEP
96:pYUIMJPmr/fNZAAZnrOMCX5nrf3om6ifFfPdoe2BaljW0xAfLM:ZXUzNZAoO4Nifxi8RWM3
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 503a2f5293a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000d9eaa3fd8292fbdf3267f6c175e69341c08bc59a5ecba170dafb8dfc7f388ca0000000000e800000000200002000000091f6bb2341334aff1d5258540a25d7a9c9a7fe522b5efac6e3141c8cf98197d320000000d801cf5fd83c8193dd6ec71cba5f489ce1e3c5a3be455dd754d92c11e26c463b40000000443f497a34a2b20934524893f4a5c75135050a1f41df749beb4174468bf7d7ac29313fcbc3439ff5c7ea824c595802b478046a239a2f31e93c637fbe394ddb2b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7AFB8831-0E86-11EF-87C3-6E6327E9C5D7} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421477490" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1032 iexplore.exe 1032 iexplore.exe 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1028 1032 iexplore.exe 28 PID 1032 wrote to memory of 1028 1032 iexplore.exe 28 PID 1032 wrote to memory of 1028 1032 iexplore.exe 28 PID 1032 wrote to memory of 1028 1032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d5d1d0c34896c5350004e00369f463f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4026bd65e0b94235e06825f19d3d757
SHA19c842bc880d25a4e1a6bfa92a99fd4720e55c707
SHA256be534c3a2e77442ce2285e0d7c532ad5c27d3ba1954650446392f0e85c17b4da
SHA512d51298316424cbfb433f7fadd4dd98766bd339f120f326a937db9568a30b0c5eeb6d3e63b2c78c28244c3f51dbab319614c61e88be5546fc80c090b0504778a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55586b3229cb3105151b28d97cf191785
SHA13c0e8123e58cc9ed2dbb42e94aad51f76ecf427a
SHA256fabafa6590bdae374852c68fff53bbe662305903040dd038db8fddce320634ab
SHA512abe58e7f24ce5701b89f203fb8f683535d889457447d3731f8ac19d5d4485773ff4e7632dee4d3d149c39bc7a95c717705b5f86113a8c02c52628bee1a5a82e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e09a0b74658d4b0fb9e4b192fa789316
SHA105e7232bb4c6248257513e80a6b542ab18b4eebd
SHA256250fd6484052b09d7709e22ac3da9131275b6f3f6a3b4fcf0430fd724c5d8c24
SHA512c77f1a5ef9fe61b359d6eb6e9815b598546f2536351db7f749e1d89ea72fb8aabc69029d761d958fd488244644f2fc35a035fb5c5034e58af1a6fd6e3d0d5647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7200bab100cd6ab6d5f208ce0a47b9f
SHA1f771870a0c4201a71f0ccc7d3597887aa7bc2082
SHA2566efa4bfaccdb95a257112d444cc20fefa7644b2f746e57352bb675c29627dfa9
SHA512ee187d61f030a8636b12ff9bb64f1fdc6a302a9ade343da23ed4f7deb4b4ee65710ad69b7853a35e89ad44c7de3f077df5fffc87dc9492548d4208827a37db96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575bace6f8104737883bdf5528915e354
SHA1ab0de0733922cfaa7ac89135fe145705c0c03745
SHA25688bc200ca45616fb95687bd409f7c62a2f3462df8d9155a2eca2e345713c6a88
SHA5127a5d7501bdb1a2278323c87ef58d119255f6130a8dd5c83b33b3794d1fbc02dbcabc5e83b05a6f7269ee714d23ea456270892f80daa47c8f3237ed624c2360c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5750ad3f10f5295f7d4f151991ad92131
SHA1fe6620989664912674b7aadcda76fa67c21a4279
SHA256fab5afea96edf9ad049885413ce0ae726d7a785683cb0ad14fafb09a45d51265
SHA5123c1d83cc9cb6e4e24c694b3eb718f0e3065f02660b464358f9220fdf601b80d40f37faeba63bdf583237a03b9f6953a47ebce310ad3380bc6d00c72a4a0d3929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550acf2fe46abfab182cac50e2ac05528
SHA182f0e18dc1278903854a4a1ca7da6522f7fc7ba6
SHA2561f333739ccb909c4aef9e00c53cd6cc100843835d8b8a339b6b1a498d6a60e82
SHA512cb398e0cec8b71bc52a7efcfd2b7c83b274a9dd4dc1066da6a41ce9f6677b2c51f622f4c75bc32288b448ef3706d35f822500ada664cd9a8b6bb94d33eb29d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0fdaaa4fb680deaadb1091549fe3663
SHA1d0d9eee913b121f3facdfcb617e3bc46a46be544
SHA2562cf318613885a026445fa5a276f103f48919792b7ab843d03fd31895f1dd10c6
SHA5128964ffbb2f5c52c19c3e36b856aff28ace333eb2ba54510f42aae8b5840949618e4615ef066a684ef09370bb36d9c00869ce48c54afb7e4e4f31363430d0a573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f1e62eb4b16c5006e6b0b4b94c13542
SHA1b6cfb1f1d4b752809b92255a233738fbbdcdcaa1
SHA25665a7e655b1341ca8e745f509d28dc61d6808d4b639bae3375b17d7db7f7bf9fa
SHA512182abbe57012ea019d4c416f2dfea73791ec9977825d057ae83b279b655196c5062e5a36427aa935740d68aed47a23faf90351f7666256ad0b7caa66abb62298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564bf09d730181bb06c9b2213b8da2976
SHA1e6718b0652d611001a9295f3d005ddb6b6196141
SHA2566585d6ea57b3ab63c887ce3cdf7d78329e874212683b8bd6d45d778b9030ed04
SHA512b2fcc540650b36f170ed2c15ee354afe817a87a3ff7a80810d59d0b531ff2552227b7c3b49a3f3b4b6a8d7506747d7366f461e55136bbce7f675e9231f8091ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571906bd354a334dac7fd1b5c2e80a284
SHA12d534890ff1c62fd01d414ecdc842649c5303b4c
SHA256331c071ba88104e25674c9b7ce800c2b124d0c284cdf5fcd08e0faafc105fc00
SHA512607b0c1fa5e42b747781611c421eedfc61866dd833dea58c2815bc4737d33e2c2796e6725cdd38ffe04852a976df30d6b6dacf0d689fb81bf364844560261262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a02b44d8873d741976e7904e9be64f31
SHA17a2677ad8064aad240cf2fdf1083da08567fe84a
SHA256de8f0e25e4b417cfe1e9ebd386d87beaca0c5c31c5e7fa8fbfd518a296520826
SHA512086e71d85c3774f7dcc7c4e93d825f4d2f5f6d53d61d27c2b7ae1d428ec250e76d08f5ba2451abbe49bb757538f7a499b284fa311b5c3914e81aa2e59c1d117f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d7a257824d19b61fc20a4eccb0ec2a7
SHA1ac51e00f3fe0ec27a19c8f2e862dd8bc66d8ff38
SHA25608aa1dd4810d31b729bf3c12eee9d6ade4c12fba3fe969ea8c88f9bded4a0d4d
SHA51260440cd19316d4253c0f79de74d0921de4195817e8865a036fdc40d9c5f1fb2e7fa69080bdf69f84d0ed162457fd7625fe59dec809132c5ebbe6b3b055d52afd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecda920ca118323f0083d68a71878fdd
SHA144943d329b4da1e5c6a931c3f11d7c735c2cedc2
SHA2564290f163717f9d9a7594ff7f1843cf1ff03ab0030c002f5108f5e8c91526978a
SHA512261f5effde14470ffd642904edfc02984e5501aea279a61749396ecf32dba48be59515d5ff44e8f7d0976cb5ad111f72ad5e0f2eb26709986b83dd7ce29be557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520996dbcfcb893347e3dff03ca08c197
SHA1be17a46963e4e282fbc583f4e66026e174ccb5a4
SHA2569be18307b401bc328b4adef6c6ce586c791423034f661b53a4d51afbc678b3da
SHA5128f4c67d4f73fc23abf9c7fe1d354e7c73e69f0d6a9d0a040b1a01f4d6dce7f503618523b0f4d4032ff947648e7507e589e39de1830d74def724975e17860401e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d184d068561a31380b7ceb1c605d383
SHA1f2401a1cd2b63468a18fb72a47afe01a490094b7
SHA25624c39296b168650ce261a080c703811f58477c64762f4655d0df27988a14f0e3
SHA512b313fbccb4068c886a65828a9f7d4764da203a2d0f9dc20b0b783b2cd8246c09c616399cbefddabb91c12d67f1b1160bebebd7b5da9bec660a93c4636e780ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5266366c6de80e23ad93a218874c80547
SHA144e547414eeb1b7d67e4c3853e3250f43f8ed266
SHA2561783c0e1c1f46d2263b7d4dff903d092e32abdd60062d509a75f61ad03833152
SHA5122db77baf074da4f7d12474aebc488a10fb2d2e7a1be5bc181538e9a82f1a6aeb2f3140c26314fc85acc4a5b4e6bf3ed5d9b5745c92d5ad4143d733f4489e4436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6d530723cba23710b5011169cf91f84
SHA110f0a61d0d9a7c8cad11222d9cd2522f103665e5
SHA256e855e32b32f53ebee31c5f506d60c187db717838635be99b426c695de345904a
SHA51263d4ccf91a4123c0d1c18ee7556703442b883113b765dca33532b9ec24fbf9acfefe6040c6afd9b3879bc5e42d1f9d26edaf994dbafa5376de8283661aced7bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f08599907c3daac3e2d8934c88c9b938
SHA1eab97dd14679c6f2f5cec7e03f483bb5399ff7bc
SHA25698a55a307ea0ba341cd593bb8688accfda23d13fab77ab09a075978dac2379ac
SHA51200c909d4b6813112d21e1879ea2d1b1e67ff89fcbc4a666a9bd174ff54e861810e1afad9a496d5120bb2b29c246141b6b8ea23c11a4555cfdd882cdc0f5f27f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552a9cc3018b2de7cc8fcd2f949663979
SHA14cb02fb5dfc278dbdd758948f833d6f8068f4b51
SHA256890c6ea96cf562b74ad4a2a73acc2bb125efb4bc548624788052f9bf94ab531d
SHA51263b61adb02c8a679ae5879163155c0b1c92266f1e60da991d92918e47111889fea2383d19466434474ce77ebeec81cc7363fa374051a65d9c62446c549d2151f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a