Analysis
-
max time kernel
121s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 13:57
Static task
static1
Behavioral task
behavioral1
Sample
41be9801ab7ef02a59114acbdca47227_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
41be9801ab7ef02a59114acbdca47227_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
41be9801ab7ef02a59114acbdca47227_JaffaCakes118.html
-
Size
27KB
-
MD5
41be9801ab7ef02a59114acbdca47227
-
SHA1
6ea6698a46f0928ecacbcbd4bddaab1831ce0f08
-
SHA256
f5cebb903d0b035ae31b72301d35e180a6338b999d4ae470a6e44966a9b992f0
-
SHA512
72c68baf306cb263e53876f24fef1e0322c83cccba49a44194f391256f2d2c6fc20bc320f1ec3bf052ac4e32940d61c7fee233d8a5b49780f3ae4e52f688d4b6
-
SSDEEP
768:jgVzopxsxVInem3VEZafx6xkxjpfSik6HBt:xSkBt
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421856926" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000007302b408e9abee05241a544cffda2d30c00730c8dffba781e780ba57d8c1a603000000000e8000000002000020000000cac6543477e141d1c3705d82b2656c09e4907e3de504ed54448467322b1cfde52000000067f87b78f6072e87ddb1266d21d4b9630256303755209227cbbbab8644d255b540000000523c4e61c49aca5c35a1d47d48f9c03e13606d33f097fb0fd82e78db97ca2d8ec8112f67d2208a738f56fc6437d31bd8e8f3e45e608806ffcda3da67ef4935a9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC89CEF1-11F9-11EF-B1CF-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0085f9de06a6da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 1296 2140 iexplore.exe 28 PID 2140 wrote to memory of 1296 2140 iexplore.exe 28 PID 2140 wrote to memory of 1296 2140 iexplore.exe 28 PID 2140 wrote to memory of 1296 2140 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\41be9801ab7ef02a59114acbdca47227_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6ab4d2c36c45b0c445b873b886d59eb
SHA1741829f69888cd5b18f46a29ec774d5eeb337842
SHA25667c972dca73d29cf1b49f1bcecc65539e3cfd2945e417670dd508fb7c758c54f
SHA5128d3d401b8470192a4587ff817cf179ce9c5a85fa861aaaeb13e95fd3fa948607fbdeb9081e70a59cec16dc18b6d201173de58601e6b81dbdcb650133ff760852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512fdca056da17be36883b3054418307f
SHA175346896591a3919bd2ac882992643185fccf3c9
SHA256afca394708123b0c70c799d771acbce4e20c0d76145ed79f1deacef5e3f61af3
SHA5123787ecfa11a9ca809c729b70c1f2f40ffe70a1dab6a1053fc621d4a3ac0bf5d8d0a482c56c4f7997eac4d26a88ae90ef02e53ce6c7b64f993af27088a9152e9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a67b342aa248c982eecef5ca1ade2e8
SHA1bffa39f74de28b3117de9efc2c6c51252fce1f04
SHA2567a0db425e47d4f074ec47b5d58f70160297a46a2713e1694626d26a3a727723f
SHA51262df519b12a5909cf9f9d64f8e9a12d1b86cd0d2b7fc981926c874059951b62d6c94f3891743e23696d81974ad862fd5e6b2e528d77363c75b1c419de78586cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4195cdbfec5d60a5828d8d21cc135a4
SHA1f557b3fc7da5f7e187d6a2351c0ba2abd8a43f35
SHA256db8bc7875bd5b66ebccbc75878a4ecfbe32c41187d550e145af99c492278556b
SHA5120a96cd4e4d37dca5910fa0f153014f33a894ae253f8961edc1ca1aa7b7a72c2be6b213a0c0b21abec3816049dbb0826dfd3cc195b9728234d0f566fd797adcc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d018b913ac5d437ab17e915d791928a
SHA1825d8465118f6b28989bddd120c61ba2696c8855
SHA2566fc303afd7b281c109074811877606aac006fea85f0e5c4e49713b3d9ef71ed8
SHA5125f099c81809ecdc3c2de54bcf6cd6f1db8c95427f231ead1e5471580440a17bb554594dcd2699d47788b23bcfb6425fbba7b06c25d42e0e68ab3b393c42de497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5335def5ec0179640cd38b10e890a67a3
SHA1a2c9e033967a2774d62e1d6f5b26abd40ccb903b
SHA256ee7f7f90fc5987719b801c880ec59afefc93c751e872066a15ede0a6932d7449
SHA51203f2b5c493e263ed01b88ff66a53e8249e9fb4e645d259af15a7ce5127f41ebb59eed6a4585bad0b9082c84843e3dd63773ec83fb25d6ee3df4ccb9e12029fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e8428f1179652870737bc6330f82a0e
SHA15b9c399799c764bb5fde8f4788ed03ef2c22221a
SHA256cb3a225b1b689a7890e34c1bd361c0db97e81083a8f321f7f5d1b22d02a700bb
SHA512879db5cd7ff9195845b6cf799116995b52b0956670b49b2cc63408c11a38bcd74e176a965641f18644d5dbe29b3ed75e859bba7c0577ff1aee261ddc6096b33b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d5979d1764e6a89f45f6e8511d9f005
SHA172c9cacadf568192357e6584e072357cc7d0bf10
SHA25677c5a4cde75c937105e76c07f1e51054b1fbd4cd17514150083d0b6090c8108f
SHA512d3a4c182f58f7e4edadec7cedf59c7222ad5f4104fe965a368e0bfbbfcdb3be3598c0193b15f87f55c8248f77447705583b8cfbec452d9e48056e4ff84f5a183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fa069c4adae25b6e54a74cf8dfde875
SHA1241d35f074e0d399030c0322c0cae437920f9cfe
SHA256f5d20a2fcec306cf62bb6b9e46a307720066a997908c7929f3ee063cfb32fba3
SHA512ee0dff0e561121def14b08ab5f52ebf3fe93fbdae16882d14b6f411ebb7ed5e9624f54e760d7952f930ef23eaaa1b84fb47d2a509b290519b53f667dca1acf3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dba8fc8b32c82f61cd7078c997db0541
SHA16b66bb12eccac41276819bb213bc2b3c0a465f31
SHA25622710da688451a254c2556c51dae5ad7e59fb68855069f8aa58e04aa65badaf6
SHA5126d68a4bf9c4d12d46eb03f09c79113d9d68acd87dc26af8ae27af06e333e4938c01d80556de7bd1323792a7d5d9698e9c84de6c9defe0acf0b9ac5459b70e9c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5190e4de17fba0d55a9a041f352b62c5a
SHA168ce62f8ffcaa526cce1c488cbdbc42877b84772
SHA2563ff71c979c56b8340091da6aae7408511526c25c5f5f82f7d43544c6886ff23a
SHA5129be71a360df46b7842a97fed483ab726f1d8daa2dbbb491c9deb5fbe74f6edf2fb4e81d57d07b105ae15bd416554008f1b4b6a1167b9a7fbeb1f19401803afe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccbbf9d2315ea4ab80258f6acc1ae44f
SHA17561372841e9653b69c43bacb6cf76638fd3f91b
SHA256f11ce6d183fdedebe1847db2ba0809bf47c06229c3f61de76474a249ad622e45
SHA5122862784d40248b5714984e5a32a518f79cc76dd651ddf91971cb18d7f52aa16f2fd5557fc9144cae83c0c0caad5ab010ec7cd35b5224144d37b11f55dd72b0cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1a11256b728b0297dc5fdf5a761ba21
SHA1c31bdbe87690ea736631865b2393a0d9425c2723
SHA256f176ca99c53ae8d19b01c9e5753bd17f7a9b50464affc7f71398adcc803c9530
SHA512cee93fccce4485de68fc9ddb49577f8707f2a44ced6f4558a3913dea698d4a73dfac2dfdac7d3da348fc124af577d96b0b8fa52761d1bf25010fba1ef9c65d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537929d4d8d044265d12c9c7d6ddd5fba
SHA1665f5157702a6ad702f303fb4c013644661b4d85
SHA25665fd8a058222a4ee841c7ea5dcd652e9ed80482464ed1d8d255524e7c05b27e7
SHA512fbdb0c66359eed94fcf25bc449ac23af2cea14fcf9f9e1ad18b807f41094b6dece0576e910e23f1d4f55b0817b11e6e659c3af4e794e16fa3bc6d5f3bcb92127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bd44179d91bffc95b4e94526b8bc3fa
SHA1aa744fc3fa4284c5548157b0d0a6f31238399400
SHA2561287c47ec17c5eb85e00a4539f233aa5bd90dc04d22618d1a88f37d08fdcf82f
SHA512a3944404f996f0979c5df48c55c64ec050ab7af4a3b5c0dfac3c03bc789f8e1b791eda52ddb21ea2b3d5fbbc560bd0b0b89aaff0661d5be58f7c6603f58a2f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b687e04fe0465f9bd57a2806e0d48b3
SHA1ee7d22256f08a711cbcbbc9ec9c936569859eb7e
SHA2564504f5d1fb2d06898ad7b8fd819118bf5f0dccab5fb2b44f9f2a6283238f346d
SHA512a0f5e9549d01e4bcc5f8308514919a25cd8a50043201c1754975ec60ffcfed61631dc21f1f90f7e1c56c7d1fd3ba0d3af30251b8fc00f5e9ef469367b19ad569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525f7b9b26e32c54febe762195e679e2f
SHA113aae15416fbda37af8fa801dcce117683d35c88
SHA2563a3b36ef1319cb87cdda8308643bf883781254ca653c75196bd790bd7a04fc87
SHA51216734312761ec2066957c7b0b8bee004fc28a602f2943dca6ffc513a8693dd1e8c2bec2f4ff033219b6e2b0aca049e35c026259973d3020951ef796cb0906c89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cffddf144299bb9fdce87dee5d88dbe3
SHA1f9fa41c9fcdf4d8b9310bbc06be654fc23137e73
SHA256017bc2c57f9eda4a01753f0b485137328bca5e5fcde64615ef0717daf2d9361f
SHA512f6a034a8b10e31815fd0c7bffdf373c22dc5f8f40e224f3aeeacf15ea0d374d855ef34a3878dcfe3e00cb8e11a8beae17ae1197fdd1046fb2c8af2c89c32bdd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510895ca74a4f3ac665e26999451ba9ea
SHA13a489315f8fbcd8a4f45e76a1077b0a4c7e19f46
SHA256ec6db357909285d3e4c789e40c06d3d423cc7bc05858b4d41889bc05beb4756e
SHA512037d2078d31766d3771020c62b5e25bbf02d826a00514d6d11a68ddafd0b2e43058aea6cee82584a97640164c83c4dc308e965411173f31ad8f4122b48c3e8dd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\suspendedpage[1].htm
Filesize4KB
MD54fb3c2c41ebe520e73728382509026fc
SHA1dec3eb5d964dfdbf2305fa444888ee9cb1895e45
SHA256d87c40d18631c45c7072aadcc3f731a0781bfd224d1a28c329e37f6254571b05
SHA51273605313c1e81dbe358b611de223f406183b37211451f585a1a36e1bced332823f318269f4226753dd1d76b23d7df31d2294aa886866f5ff926f49193088d157
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a