Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:05
Static task
static1
Behavioral task
behavioral1
Sample
638d6c2615a30c97b0a95b147f009665_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
638d6c2615a30c97b0a95b147f009665_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
638d6c2615a30c97b0a95b147f009665_JaffaCakes118.html
-
Size
4KB
-
MD5
638d6c2615a30c97b0a95b147f009665
-
SHA1
77774faca16baf71e7dcde3f3bb3bc0b7c584db2
-
SHA256
c77cbf987d8a6c0db847c8db45a3b5ada6f127aff5ec4f87b0d78b3fd52f36c3
-
SHA512
44a26b9346b63e75ef7fa0388559b6cff32cf80c5d38e26aa30c9ff6bae6fd3d0523440b4625649ce70251df7600d59c3e47c6db92ff729e06d6061b667c45e2
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ooQ7fXod:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDZ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C4F4ED1-177B-11EF-B8F6-D6B84878A518} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a4050188abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422462194" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000008d7159c2254a3ad737e859343781fc0ee4b2210f044a56b12cdb2ce5f12f643f000000000e8000000002000020000000f1ea721c102947bca20517299cd070ec6fd37b44d4565cb22993768ad9c9a67190000000a1f226e62299c1dbf33c037755f4dab8e9ec127f682300cb2674495848fb470aeddd0b645b4daf0c9c1e1f877cc80d0ba60782da2435076cc8fc77f325ccbdaeb1de13f69bd34fccd691bb58e9a6d5327f39de053a98fd0ec9aa800404acf0802b8e9026442fdf5d00a383cbf8be8b87963f2ecd0b7b42f62c73c213252275da2098e65bf1055f93715ccd7cec6454a340000000ff6e3ccb68e5c06476d330907f66fa0d08fcae78bab21d81749164442935147c491e1982938424fe54888f0b30a5de2e97faa3e39fba776ce9c013e0022158f2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000d3f8df44fae04967f903bffa79a0edfacc7bb56983e79e2ba1d6ed7fc686c579000000000e8000000002000020000000df85d303eff4d240a803000b5d634327cb88849ee0d236871d419d48c05ab9b120000000d4f1fffa765dd98193b5e346be3b5b959eebd6c0c0d19593b9db6136132ed73a400000003dc5f832060274b9123912a75abb4de84f492562eb6dae977d415899147c5b7d41600eb9d338960d367f7bd610982527b8692fe18023c4adf955d633bed88663 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2988 iexplore.exe 2988 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2988 wrote to memory of 2812 2988 iexplore.exe IEXPLORE.EXE PID 2988 wrote to memory of 2812 2988 iexplore.exe IEXPLORE.EXE PID 2988 wrote to memory of 2812 2988 iexplore.exe IEXPLORE.EXE PID 2988 wrote to memory of 2812 2988 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\638d6c2615a30c97b0a95b147f009665_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5add7e7979f4ca56c31a9cfcb0ef16c30
SHA1ea0d8489f2d43a5d93e84deb8bcdf06b9ed5d3c6
SHA256ec981b3d9a4cdcca320928111ad099d202d1e8da919484e1ddecf81f3bc7d9f1
SHA512b154ec99affbcc1a3a9a29d9d14850980011d3e91dcdee30496e8641c0e7ba1a08bc796bb996981b80c7d4a8cbccd4f329b81ac813d370c8c317771243ffbd6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ec05c2e5f771f8bca4a6e15e67beab8
SHA118fa88fa30469d62857ea739afd1c1eb20b353ee
SHA256aa5bbc15428744c82d13b94f3255da926464db5c224db0300a9f3c9e1dc0724a
SHA51202c284a00276395ce56c98230038985964ca2fd2879ad9dc47d33e3e00c370725df553d9672affb653d34df69189af6567afc369025da2fc0772a69ac77916b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b55b0a24eba90179f8e7a9f3b4f5a5e5
SHA181fd1190ec54e9f6f1c8bb042540df2164402951
SHA256290d490d36107ab37e1d40fa9e9a58467233eebee649f9096383dea378cdbadd
SHA5128c355b664b59779da3684a6e76f0213e35662d247f539fcbd05a87c2d027b1cebcbf113ec2a1d43f39861d1e86d0fe6bdd885c0fa60075c2cd6201f52dc4e483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b537a4517f19a140f8bd22650582ad99
SHA14ec8e6ac07dcdfdce14bdaf7c07453f5f9d578bd
SHA256eabc77ab2df6b47b4d7e993eaaaf6eeb78e0753ef519a54f0a968c8e03b56824
SHA5120be61da36672a15e86d664ff59b546a0f15188c5a6bc52fb9c9956a1c29a855d9299a0e21e53831c21e216f3ecfc4f2c08cb77740bf9203d463cd2ed452e3c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538cf5a6cdc86cbef05801113a2c84369
SHA1da9d452884533f2f3c9a78175db23f6b60d8fa0e
SHA256c928242b4e00e72edfd557e2ffceb8affbe6f30e78583744be8e104f9fef12d9
SHA5121d93df695157b5c88555e9029b999198ef67ae192ca0c9a02f3d0d197065b0cd80fb8b9b9b2daf622f936594f35234f230674ceda69e4754764e739d5fdef2ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc10dd8081e69e38593fe8bd2d442ead
SHA13021f7e0e696d9d584c27d6de1919064f19d010e
SHA2560084b5da94fc2a4a0d818984139bae1e8ad83ba83157bc469dfb96191014cbf0
SHA512d9b67468a463eee9804d94193c3931eaeaef5f3682a20b2ced0190f6dd272c10c9a28bf03492399dff5f50544ef83bcdf70497683e799921494821a43bac86f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550cb2e92408267aa119e7a41455a1478
SHA1caa178e14e4684c23f85d60d7e6cd8cab31d0dd9
SHA25636e1ab79049ff0a550b214498de0896240d812e6efe605b6de67dc26ffdf8d99
SHA51288179df69976bb13bcd310bd85573c6641b1f95ef6f71fc8ee98b855032b877393ff3f98204fdf3e532f3a5f32f8f08aab40d6c736aff4bcb2aadbb4c6d34889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537919c2a7587aa6c15c6dcb86e1ba797
SHA10cba56c90697b7c431b216924f85274b8c138eb1
SHA256fd3a19e15ba5987e54526a7310ba775cc75d762ea2c3e37f5a3b99bf8c85bb5c
SHA51233c8563098e32705ca6bd539e5655edf3d7209d371347d5fd2fd641a4c60f9ca231264872435cc24745f3ee448510cf91182d7ef713443f6555ca1ab3bc38a39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa84694d726b5002a2d40f10de2a36f9
SHA111fee26beb455bd5fefd865433532497b614344a
SHA256aee52af18722d7a0431484b04140b5e405d63717de6b43c1dc42ee57680e7472
SHA512d5d17ea12c977c421d6fd51376426155961a13aa87fe7225912c52961a29fca1d656a89c7ef5ad160eb984313530b5cbe1251368f03d70d46faf99099b19f6c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f40698966cd66b68164ab1c78405bae
SHA1332bcd00cda5b9b220c1cb8a741b36783b625965
SHA2562ef074f83092f040c777516ee4794b6314ee791b01ae306e4be79e1da5532589
SHA5128b6b5bdec7bef4e06f354a2dea9c1ae795492a4e4e8b022bc7cf16a07c070d887d73b70c365770e85b712489f1df2eec6597bc01bf112b7a3070ac5820541b36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dc6be143e830404c7e3b48530674f9b
SHA105471a87e7ae80949d8980df50b2c5544b6378f4
SHA2567556c023ea783c2b1ba9978e5b76cf9287478fcdf9e697d3c041036bfb49d8b5
SHA5125c1816215908590e162aa550642cb829e79e0bf2fc75dcdc4b8721c3d8cf248997d61ae4256eeadf1ecd958a95069d259e33b1ba87f6e0851bbfc24fa6df4111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f84f014d9261e3745eaf500bff87c8a6
SHA1ad23cf80eef2a3019bbcf4ab6718aec485676368
SHA256cee707fe5c0ae272552db1ab6756e25529dbf2346a7b0509de6c9f821b40b407
SHA512057f0b3de3dfaa2a704247de8ba251f1cae3e636dc6335e02dd705bc99d8358ac3e2cd65bd367c91b07508311228b5650d36689a7476baa52fcf59a89c0f693f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd7c3ca7a8b8b87e34e8b57a5821775d
SHA1685f9dcb00896784219540762995306a80023986
SHA2566b1023dd15344f6c20b62312709937b57c670ffee6815aec4fab532474d14e1c
SHA51239895f74c4b67d196f1f74bbf82f709556308cac61b41ca7db9b21d8c3393ea93625547ace62e4e96969b3d2ca3dc496045e25834323199e4daa0a5cb5c5a440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562454701b5b694497c72e44a72ecaf6a
SHA1bd967096f4ab2911cb88baaa34ef584e712afdc6
SHA25613c3a3387c80b638f6e41d60093d7e8fa531f5932b688a64142f2cb0f41425c8
SHA5121071973985fad61ee99ccea28e1165a3be8835f8a84dc2a594c8325e5a4d2911edf5de5ac97de5ad54c81c6ac450b18f9fc3e2de75dfd2b7666a6b8fc5821af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df14f30bcfccf03f6c0338fce7663674
SHA12ab8111bc627031cabe5e6accc679818e4ecce48
SHA2565c92574b3d3f4831a0f3822afa7fbb9352bbb09a2730d7142323cf9a176cf322
SHA51212e9f8bbd5a68ce706fd4e537346a5a085a8d79d8070e9d9ae899ecce5a52bf80136d0c9790d3150c973e7540e3b3684fdf77a1e04802688f2a31f34121e078e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3e8d0d5702cf8904c0d36f9081268a9
SHA1671b8abd4da5d350f00c4c8855c614117593485b
SHA25688e9619a9edc2f75a796238c457d1e148f16114e7c656aef9fdd52c2006bb115
SHA5120713d1ab9b70393a3efc7fb93b80c0cacd557fb848c228e5ccdb2130513881e276f9364c44a94b0352a034c4912ecf4af11059f491e621e9967c2f7346693384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1070978f1d0981ba7164aaedf342abf
SHA1076ebe2d39e7c141e0c63f15df08e22197872cc8
SHA256e14ec0d2da7fec0ce42295bba561c11f12fd4ef5ab31b28a6ded68449fbdebae
SHA5121265772b9631c919c84c3805a26bcbf22a205b6c4388aeea348446df6e5d7c25bb26206ea61d043cfca1a56a1b9563009b903ada0a91c40ad5998ca1355ab56f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5649f8496ddeb17509c8378b25dcbcf84
SHA1142c21316c5fee7a04fca23ad7a332cbd222998d
SHA25698537b657f4ed8bab3f0bd7a4380ce256ee8f45d049e8127662f83755fdb4b87
SHA5120f9b8f4f305125cebccadc69d6db6939ec46df3374a58835c78ad700ce075ef1721402e55d90ddcd796cf272625183bf34a332451c82b860081f7225eaf2b6de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a44eab3ff0bcf2d12988332ae6ab7855
SHA12dc45a9cbdd9ac7f5554c43ccb736edd2c48dfbb
SHA25695c69219e57ab670eb791134dac099adc52cd598293edc8c384f1de69db730f6
SHA51223a9e851b58c9d96ede98610149596a820cf7c9cd8299ce612759c0d1863b314afa5a65f7c372082c1b1c3b87442f84ad55eb7c04c726c44fc7b8c1b4c07fb50
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a