Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 19:39
Static task
static1
Behavioral task
behavioral1
Sample
512762f29573da950aebec786f89f1da_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
512762f29573da950aebec786f89f1da_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
512762f29573da950aebec786f89f1da_JaffaCakes118.html
-
Size
25KB
-
MD5
512762f29573da950aebec786f89f1da
-
SHA1
0b7a59e1f95c6ddf44dd0cac67e3e6545bdb06df
-
SHA256
bae414a23e9cd990854cb2ab966e10858101b799ac1d4be7a5effd690ba22e1d
-
SHA512
0487f0b1dc03fecc90ce2ccdf895aa855ed43c7d7d4c315875f72423c2e25231806af380281fd612ca7410cc089b3326b836a8fa08f2d8b22edbedd56e6593dc
-
SSDEEP
384:ziftLKnZHb74CVBD8cWQ3RQxrXrQDfMqmL++qcfIk99hetDbzVc9m:zifAbrgc53uJ7QD9mmOIk9StD3qm
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422136627" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2741AC61-1485-11EF-B1D1-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000002317a53fcdaddf512c3f0e048db02244c54a7e0676a2564ff56de8548b97b678000000000e80000000020000200000006bde034cfa7cd07b8bc2eba9a9bfee31084e1188fba86d7810dcd89e331a261f20000000373d447b814b93578f1fc519464a4ae3449433ccded95bde8e6f1679d417722f400000006ff124695808a7e18f9cc5b7c0eadc2daa8be27f009cda899da7dcaa9b18d4ffb2af3f17c456a1f5e6a0a0d4a4c4214aebe90c1eff8848613ea718a8160e762a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d91dfc91a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 3024 1628 iexplore.exe 28 PID 1628 wrote to memory of 3024 1628 iexplore.exe 28 PID 1628 wrote to memory of 3024 1628 iexplore.exe 28 PID 1628 wrote to memory of 3024 1628 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\512762f29573da950aebec786f89f1da_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587da724ecb8d4be43b04bcf773a66145
SHA16aceb3f9326360d33aa1d991b4a6ee442b63e4e9
SHA2569556e3242141d0746f99487888148764d812cbda275877b060fdf7ee4ab0432d
SHA512adf9c697a3abbd8f4ce77b4ae7cf8aa2b4b8e99ead59f13c003e2d27e2b191fceeddd79d2bb802abd0e1326aaae4c59a3ee6a1033b07483c5c261eb558eb4186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8db4a327ac47a763e390231675ec685
SHA1dc6b769298821914d41aec03cc1070955efffb5d
SHA256eb6f600e037693769a9fa1eb37992bd2b1e4fbce94995eb4aec7b8ce0a1458a8
SHA5125262671a582e4273115e7a716719a25eae3aabdc48de9b25d95b727026148c145199822cf210bc6da9889568238757cbb6a16996614eba8544b6847c7376805b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5364f25c0d3431cab29bf32a06dbb8780
SHA10186d84d5c828e10a01b4223f08434080560f263
SHA256925f06bfe23fd1437cfea503519a6606a854a72cf981101687509ecb613efb9e
SHA512ef865afc83b0ba4fdaabce9789e18865934298cc24adde9c43aad337f7e397dca9d85a36cf4bc513c1a946674d9ede4e26e2fe8007fd63990e715357d9bd3e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d63a11fb056be68a92ac781c7afd7501
SHA132400d5f10def0ae9afaa7474f559417edd0d643
SHA25621458104a2e997fc5c0d4a9d7000090b076c1b592a93cab409bb695c4f257deb
SHA5120d0837ca8e1e2df51bdf16de3df41b2665112622a7ba0c89ad7b069040081628bbb5401f314c8d09af80d08786601376ae2b0b75bdc2d87c060cff3d92736ca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce42205acecdb2004d4dfdc54a012a6d
SHA14d9b97fc3954319e24216dbb9515c56b18464289
SHA256281892d6805c07339028d58784589349cc7ea1ba857e2e776b38c7b6d5afa538
SHA5126fd0bf93b2b1bf887f526ed0be6560c556995c41ff26509e3d619085572ea1ca00be0f0ba8026738b3d28a6a0d85bab969a4a11cfbb28a9bc3e517bf270e35f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e299c568fe00c30f4755d29afea01df
SHA18b4635c324c6dd53ddd9376415685ec7b7bbe33a
SHA256c3893093eb58f3be42d6d3719a7ddf1aa5e40c8c0b5d32c03c83f28ebc3da71a
SHA512319180ca63b5cbe2fb244a4aef0142f3388d4ab07b69d26f9272f88db2663a856d8aa7e23a31da277236c3f6d3a4020e1f9c9a7167a65fa67910681e00fe7e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5867c1b85660832aa72d9b1c2206a290e
SHA115862dbb605d6b74730a12aa4552e47067e52403
SHA25618bfba935fe916e35e4bfa26c0138ec43a7e4adf2246f6582f7fc69bcdffa3cb
SHA51237f7c3b1082d32f1a0284e62db1d80611b22d24453caef90ef9efbb8555dcc5b7d22c0b3424d550d61d33920140b8c3c5664f99d3263a318ab32c768f89a34b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a9451eb784e8667d5b9f80aaffe490e
SHA1d89d9e8028c455bef64ebd4a2c457c5f8b79c6d3
SHA2561605adc8190b24e5643d367abb65ecb458088aaa45a6f95f5a36d96b102132a3
SHA5129bfce5acfd31529d45906635699a16c936718f393a4786bf3b3a50662ef6f4d29b73b316f3af51ea4092f98ebc38fd640ef7e21a4bb4b588333d9108576acecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e8d3f4d5e68177d50d153473cd1b970
SHA1722f63c7aa5900aeeecd6233fac557d4e671a0dc
SHA256204c0526ac24a6afa282bd20cc903275a38f6b48b75d210e9468095648944abf
SHA51278aadcc80ba8fcf3bcb6d3fc7750413dc956c5b40370276272757d886d187916f4774f0a7859dc2061b932bac6b0d5765949104a7986816170a32b3f0661b072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58161a5a463688b961fa678aed7cf8559
SHA13f29a9325d49022e3fd94e64862eb9629fd27537
SHA256e7d4ea193c4b4065a337fee5493f5b3e0c0b41a1da352cf17f15b43c0911d3f3
SHA51263928fbd08708ad7aea5390e8d18fdeb0da69b02c8a0ccd8db782503f921df8c49991e670bf380c90f91aaab3c9e42c7725406a798ee71f550e40c424f7f9f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51aa01e8e2d7a19933dc8ad6d3058dcf8
SHA15e9ed80c535102efbd154672ee1aa43ce0630487
SHA256db3596af489adabf50f66f048f18a948388fabbc11464eb2c8c81b3ebb8d42e7
SHA512cb0d7c533f510b4f74c44fdd86d2784b22816a2f5ba650c7817dc4b10288028e8fbd42e96c8740933da6185cc24f474e03b1060ea208f8c563d03b07183f3e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b92b9d2872ed3cef7eb86bd43e7489f
SHA14ec2ce2e18ff022c2c25bf7057e6c48153f9acd4
SHA256598f43dad3bf80ca6e6183e10a41db692f4c50447bbf40d5face698bcf5f485d
SHA512c2bed0dd043ee959dca2fedeeb438020f1748ef3aeb8e1aa5082a229ddc5745c91c16d7736db8c040010d0210f1b40e0d7653abbac92eb795fb6a3ad56a47327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5def168c04490eeaa05fcb039e163d8ed
SHA17cf8fd30f3aacfbbdc914bc40c47bd0c27cc93ee
SHA2568b815077a3618b6bddc0575b634cbbbf796ec3516d1fecc0f0494dd20c9a3d79
SHA512c5abd6908b46556e614131d12f6ab55e9ea1de8579b3a17e590365976d6d8311cf3a5c8fb7cff7d5042949b35f0433fe4965c3bfdcbef221402462a7c87dee36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eae6445dad608f47bcbb9640af1e57e7
SHA1a274c262be563ba701b767d79978223e6410a59d
SHA256eb83fb08e51e69e3773c11a336e47337dcb3a8cedb48293296a9aa537cc28dcf
SHA512ffdbe7d3ae9d825d4de428c97e5c331c0d056f057ea11119039ace7f730e047bc5346d39a9876991dedef41b90455bb067d9c68471b5ad3d9408e676dbb0a916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539ab6f92e4b2fd9bacf2a28c97b2d1da
SHA1fb54221f8387cdc66cc183afe628b05a078f60e2
SHA256c8deb770c0510c7793e95c76ccc96e702485bd1ece98d9e7529a3ab100abaf97
SHA512fcdb19bee138f5ff891eb23715b33252448131d2185db5b5a7fd27e4d8c4b335046d1a7ccf22f57ad7b16ccc8b513a854e9113f44bab6d84da5d18c8120660e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5424d907d316bf5c86715a9d9372484d6
SHA1137c97de752c6a7fca218d2c468944a6f1ff3219
SHA2560719dd984131fa4587732ab44929ca1f5367e22134ae735ee6446ff8a4f9ad8b
SHA512ca224efc7c378858a95512954b1fd8b4496d93d663cbb2285d46615a5474f694838416a444a911412aba163a508469445698226023ddb0bdb4090eb7f02b6d81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a139655e873247ec1f8f77332639c5d
SHA19cb21d000ea3bae18eefe383bd9fbe358f353d5d
SHA25667890d3e3ba35c3c2ee3141420f5a1b9f783db48c3d57ae61b3ea6e5e33c15f1
SHA51268143a66158b72e12dc6cedc3f4b09859b8b5b57b8cdd5696af714c61350f6e5d1bc5dc8a13f6786fd9bc53eb4dfb4ba8f74e178ecdacdb5dd0ab9196fc6dc61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5519aeb5e73bc04d4c50154fc7e270d32
SHA195cb156a0e2f1f2ce296b80eb355e83b468fe783
SHA2563962d0620a008a16d7099c30265bcd464bb7b5d9f0bb851b0ebb7d0987ecea98
SHA5120395400e85302e7ab0fc70931aba78b9d9b1b6247d918e30e406b1d6c4bf13481e945ff518899c0355496628662ade0613a8605f2f4d4ebe96cbf127fdbb6688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5196ccf290d3c4b109a820b38e8e40571
SHA10af80269e9abe8003bbc8348cb04c050e316c419
SHA256f9a1d638ca2c39aaff11a9c9f17f6b3fcfa041e97d4763e3fc3e55a2ee6c55af
SHA5120a1790a7d3f6771165025979e1b434b3138e5324bc7cffd0068ba0a85840b5820ed158efdf2c5b447171ef9e0beaa844ee746d79e8a5cacca579777f1680e43c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581400e9268b621815d556cd690815c17
SHA113e64ba9d1ba2233ecdc58c95592450bbef99f29
SHA256b1318b5dbbe4b2d8b9929ecc35a07898cd8f4893d84086ee8f022319677e1863
SHA512a1ffcae37f3a556a490680fc583182bb6278c857cc7e3fdcd3f1f096279bedd683732876139337ddf3837c441d8844420d60aa5de596e2293b63d1e52e172a13
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a