Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
306c52662768caf122ada2b733906d81_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
306c52662768caf122ada2b733906d81_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
306c52662768caf122ada2b733906d81_JaffaCakes118.html
-
Size
894B
-
MD5
306c52662768caf122ada2b733906d81
-
SHA1
4804467330ab946812f435d53cd70bf6bf7ed512
-
SHA256
c1e7b50ae2ad52c9478917eeaf8b11c2a2e90268578468ebc491b567f1bcab3f
-
SHA512
3217bdc6639dde21e05451d88bf4d16073cc220acd8925fa59f6fc1957f1fa56882287c7ad5d7d81452757e528c425f52471bcd2ab25a3e660163e28ba56c716
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000004a5bd9a6d389963cdc541b4db636ccd6b15f6bd55368e18919341a0db52e7bb6000000000e8000000002000020000000c3091089f46144d7ad464c4b872fbc29c9d89cca3bd9745656d2544ff4128e2f90000000cbc9bcb4244267c6ae5f3868ad19407ab07a4a628797b11dc060e3db6290d9c10a2ee593603c7160bbac4bb8f329ee5282de1eb356a18ec328ce4265628eacd192841efd47151686a62829cac01dd90f3963465351caa5690ff1252881c0f3ef816f1d5bfe4af1d540f150a01d326c898203f39ef30dc4a95501220882974ec820d5abd325aec7367347d295379a995b40000000d6d11a82365ea9d33f58df5afd148639d70af811463953aa7a94ed130fb8f6245f58b6d6ff31661d2760126fd6e7142e7d5dd9834b2993285bbb76f9cf2b7766 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705db8e406a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{21337CD1-0EFA-11EF-A3F8-62949D229D16} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000d2ed0b73df42f4c7b7b0bea669c69537d472cdd76472f3f94740c8f27639955f000000000e8000000002000020000000a88e76197c8cd30cca8a106764d9fb7be1d2b6f960f9500a7d6a455f2c21ab2720000000ad7ba103aa326d5f0f2494c07c5d30eef5545f666c88dbe664ce98183f85935e400000001e9359853c85c383e0f890cda70564be851c96d6d57eee4849c4a0f4ddeb92c34a4dfa940e95822a2d8e7b4eb90d9a4821317140a0c03321d95d1f38bd36b3b7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421527162" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2888 1976 iexplore.exe 28 PID 1976 wrote to memory of 2888 1976 iexplore.exe 28 PID 1976 wrote to memory of 2888 1976 iexplore.exe 28 PID 1976 wrote to memory of 2888 1976 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\306c52662768caf122ada2b733906d81_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c048fb1efff376de34fd6016eaf97b11
SHA1db71d1d3e9a82d0376f0e8202863c958a945c0c3
SHA256bb922efaf6050d90f4d0396952d16726b0ab4e536deb781271e4505e80d7346d
SHA51263992af26b92948c852e6cde07e01ccdc18364856300cb6952ad74b135e2317c1f13996b034c01b744a15900a0c8154c5be1d7e5454529f7e1aac3e3c46077bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535e0682b63a13b3fb52d616bad7da02b
SHA11221ff1f80bcd14d2a09cffcaba477841f265917
SHA256bae564bc24daec8fc8f7c6603f26f819cbbc81379e3b4bfb3fa2d42d29163c5e
SHA512682afb0790095e81ad967306c32b4cbefd299554bc3c663a44122de332e76683a4516c6b968f11fcab28b9b2fe87aa5d11f1dbafce82fe60ba40f2cd0f077cb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554a8f49346dfe1b733c04808cc9bc702
SHA1b8feddcc59842d87c9deaa3e5f988353d690d265
SHA2564d6ca73bf540e37409d7286c87d9624904b89e0569ec33b8d1f732fe074d3dcf
SHA51273fe9d32007b4dcff4db7b00fb5e9e7271892dfa47608e97d2ccb343394329ccff4c38cf8c31d4a211d730923f78f62dfa1e39785786e618e08e57a4e022087a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b48e01537c5d0482f5c34c75a755f337
SHA16b714bd7e5b1e200a4d6f87b2d74d2e3016e6ef3
SHA2561ef0c6b82d4f25576a0c7ef907b039542381325f4b153d9ca479d7fbf82b2174
SHA5120d2b647a3f93d8a0c8132a7ec04afc7704cc94bb6ed3ee1efd915abadad5010772b6baa04416c3b68ec7cd8d0d1123b34a0182e6bbcd643b67795b67d2b1a616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c89e0d2ff5eb806bead85edacdc4cad
SHA13df0642ef6af1a95a1ca5e3a4b68e8935c3fb808
SHA2561744c50cef59cdbaf48a356ea893e5faaf64adf1739fb7580903da2e51b7e7de
SHA51242395051d01da3ca388ff97b83483211c62863d83b23ef0fac6212bd98718b4df79313255c83db150b347dd6415e7a79a00dddd755ed0e7adb3fe677020d43eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6aa2f99aff9a42964bca2817e89fb1f
SHA1556ac5c178f8e79ff19c3ba4f7e7eb16ad283233
SHA256f2c2819b6c914095341dfed5a6904b0bbf404cdcf7b259fa4a684cd37863d733
SHA512bc79fd4e530b5dd4116419eaddabd8620fab390f966d2f818e7e67f43c078ecc94d4627b6194dd5e193fdcfac0cbc8beec320ccb8c36d51889503a81f71ec06f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a6765dbcd359b256eb06b78f62ab9ef
SHA146988358815b64e467e99cbde241722dd37c710b
SHA256990f1db8cdf6974d34763373a6a129a4e4006867d3553b451088adf383b3a33e
SHA512ecdedbe8facbea54274c9eef0332ff68bdc8ea38b4f3b57ac043e11082b9c3eec8996237cc49ae92d617da6501a17aa6cb3d19fd5196c3049913c0b166c86c4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507784f1538e4f5e3d475302797512034
SHA172e895e0141a51e92e7a43ee8b3b80d60c289a4b
SHA25692fb927c56cb433ec60ebea23818a09bd2ab2fa5b18fd18275273f5c5dfcf140
SHA51275c79f789e27975a3ecc3e78b6d3db42866379f3b533752a3b657a29d23a390e9f7afc00249d0b205ea845d64242e0f86e3328b56efbce99f3c555250665c8fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d308618da9a332a9265fa68f85a66608
SHA1afef15da887f27c0e088719559935f01190c271e
SHA2562522125c1bfea43ed3faf8ece512767d3175df366eda417dba6ff6e13b3bc6a4
SHA5127fc7c360f222c81b0250ecbb24e9306df10df35d3040261ce75ef0e7faae38a421f45ab0d2596203463de81b2e1946bef61e454eb7b2ee73d94dbf1c56451fd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3edabab9cf0d8875f014efcaf4a6719
SHA15a55803e189cc46127f1f16db084b6ce33017365
SHA256bf47905fb99a4e20ca0e43cd319efa9e891cfb66ff724c054987481ba8016d5d
SHA51249f5548d9af30cf6b153e26e83e82aa8fe57e559a97e9092f45b6a9330cedfcd61583ec6ba55c0ec99cd775d76c36d9b2ed8d4c57d8b81658ecdb94c8f7bb157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514d77d754cd205328ca8eb0dd1b06897
SHA1ed847abaf3f98d83e9f086d5d059fc64b42b14b9
SHA256d7fdc56f8e6c46a9596a46110076bf9a2550c6e4c14b8fde26aa5bde238d6394
SHA512aa0b04285c20f53db136a75d50f9621eee07d2950f7db3f3b33db088e12ca0280a87f1c09725cd11674ecf270bed08a59666ac57543bf2c7419bf02d189e3806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56663fe12449419387a1731a8d4b908b9
SHA1d9830173c3fcff1984d83cf691120dd96943d232
SHA256ef0302b3bb71c691d75d730cc92914a6a52411158c9a9da89a0f5a10ad66b67a
SHA5123ab889a7f0b78e7c0c8673b9152b7caa69c3c37f232d24c070d1c11e09ae4a9e910b343b29ad55aae4764190361a7aa1b27bc926bc7df5a62da5331460ebedae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5719f11d36f4e36a22951930df9c52ccf
SHA11483128cf14c2fed1160c43c611b1ef8497584c5
SHA25646adc86b3837f6472391bb79a78da857824914a4ad5dcdc8781729f82ccc3b91
SHA512a020fde0b41f0cc6aabede25259abf9912fb836e1180ad01745e53c7fa2c51711411c46a0e585ae281584df115ba560b66c2fee09b4ddcc965cb27a682ecccb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523605160c009aac42cec7e42b8f2eb40
SHA1e69390ef2620ef4c7cd5361a0ad77dd5cf964a72
SHA256e56035be659547fc4ce3232765a7ef56b179fcb128ee104ecedfda3809351c33
SHA512824b931110441eb7de2f2d71add247628fadb6d42a31c4a1bbde6fcf63cf2fb8bd82c2112ed3ec2cc893c7c7b9700326b1230dbcd687699d636914a481f94f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561324f09b3019111679dc879edfa8fdd
SHA11effa34475fc898e094044e6425ec60f10c64490
SHA2563a08e7f0ed220938135276f64bb6356bf0163435173d1ed8f0a5a5103acda235
SHA512480fdfc82869bf3358153ae67781c785ba28f9650c19cddd57fcabadff091f56644baea3ed49544f2caecbdaf4498c218cdbef5d6373484a1760d5e6222fa270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517f3a82d507d77bcad84830cdbbc7f41
SHA16b310201d2b0d836743ac9b7fd791d7b9f2ef8e9
SHA256070d1f93f7719f578230550e1a9d060286c421fba017185305ef85f26e03138d
SHA5128dc8cac2dcc173e82201f532be8e8ebe1f7a17f3c452e7926982ece7f4d476ad6bd5bec386b185aa474c4b6fe571589a24b3c8465b25dfbcc725b2fc4f8583b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56efb1a5fa2f6473bafce3051e4cb4a3e
SHA1654d90d0955c35820bed9775eab96bbfeb622a2e
SHA256a722d14feb63aedc1af39e81b712f92e39cc9a44d2930ae49403c1225b36a46d
SHA512b9da4931dc05b057608e44a546e0b66fdb55d9ce4fe5e469168aba516c110cc6414b500abb65153e5a510e15a63b2b12bd2fa1072d79f611548fbfe10ca91b66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b61522b8c50b3ef8dbfb246751e4af2d
SHA1fda6704fb1c6c95d8000aa23895d6c4e29a7aa68
SHA256533811c9887c3d75e45bb2f3170d934463a6daa1a0849b5883f240e0768bdc79
SHA512c6d1897fae1bd225c6c5fda34cc59ff0863c6cc429eb6ea5e93fd22dd6ac26225cdb0012417755d875df6c5223a2d9bc1656f9fc489952dca827f24940a59ca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5522fe88690f8dbd67f52e9406ce0f1d7
SHA196d3bc32bd5dc490782e530a3d94ff9a4077390b
SHA256630221fbb375b8fcc90d013dc0a0ecb7b96c7ff5651890d60ce4a6f50af8c9fc
SHA51285b41846b82947fb97a0b4c0299e0a21ac01d6916ced8d2fe8b78d8ab2376a968181895d3bbffdc9c343a871bb057879bb63c1f10939266b268541bb30147d92
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a