Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
6609e8b4caa0d5fc86b6c44c03d60384_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6609e8b4caa0d5fc86b6c44c03d60384_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6609e8b4caa0d5fc86b6c44c03d60384_JaffaCakes118.html
-
Size
27KB
-
MD5
6609e8b4caa0d5fc86b6c44c03d60384
-
SHA1
7a8d4354b29bcc862ab177a5e3c11dc03e8be8d1
-
SHA256
ec0ee1b340554bcb18abad4cbe56e48c8ebf59ab2ce973ba5dbd9ea86287e06b
-
SHA512
63560c068c406e7acff1c26333e80fbe79d77c91753ed4def20090ebbd6656ccba1be9fba29bccab133552532c23da2239681fc86cbf9396bb97cdbcf1b4ae55
-
SSDEEP
384:CYWzhvXIxTN+k5U8wnvc4tvHVJNkvsrs1o:CYWhXIxTN+k5Knvc4RHVJNkvsY1o
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c504d602acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000841883bbcc745242b919b56cc5a057dd00000000020000000000106600000001000020000000db8f43975d741b0ae7cb0686daf60d89b3e6f5d8726ecd7e549e9dd171cd97c7000000000e8000000002000020000000bbefb1e7eb6fd1d3aba6db5e22f73e843acd50be50c9ab6b49f81fc9b1c1994b20000000f6ed6a926944bba8cacbc4aab088b223eea9912ce5398bdeb7e80edc7801bff540000000ea2fbba91a1b3a5cf3ed8b5d995830938e90bb7e82a8f3044f457892b7e4ff84798fbe338921f0daac7548d250b299072b91d350edce01608be3366751d14fc3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422514949" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00B24721-17F6-11EF-9907-E698D2733004} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000841883bbcc745242b919b56cc5a057dd0000000002000000000010660000000100002000000052c3dbdb0f6f0f3660b06197cfbc3d0a6575a97cd429cb14cd153c0604a2dc60000000000e8000000002000020000000bcafc1e57faf4b9d5d1e42afb5d900544d30153475a787d813e97dfc8f365fec90000000210a979f5c7ee1362b92b3970a703be9469f6f1d1d84f0a10c9ec72c21c2f8c3f6cc995b1959fcd2f01131e3c319a31410619a7f78bd8beb0513c3d73e77dced99a496e86ba5b33d6f43b7f338e0db0ff177d1a29191a344b8e63d8fab84b48f77d4d6809cacb2c64adc772d0bf8bea7a13b0ad085ed9b2808ef4e8cea0453bbee57658f41adb299da02132ba62147934000000065105b9b1231fc8c67d2b8700c1f349b115822eddab671a5856d0312302e48adbcd342fa1e7d6d1d7c0b5681efab97aa596ac89bd7c7e960e646a58fe6866bb3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2976 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2976 1724 iexplore.exe 28 PID 1724 wrote to memory of 2976 1724 iexplore.exe 28 PID 1724 wrote to memory of 2976 1724 iexplore.exe 28 PID 1724 wrote to memory of 2976 1724 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6609e8b4caa0d5fc86b6c44c03d60384_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7078fbb782679c0e4afdf6c4a496411
SHA11db0c677fc25c05903ee71d4afc936d770bf5c10
SHA256b38dbd3f850f612aee498470a4af7a24aa2f0e5096b7042280ec688abe775f67
SHA5126c22cd475340c74b3b6afee0d1612ca8eed08cd502030a320c159e132fe0d6897aaa71ba74a3fdabd756be9266036c7fadaa47ddb06cd5d9634393e124cd4161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9ad078af7c9ca80907e2b9a1a8daf66
SHA1088e98a34e746b7c6c03619532df17b579ca9d06
SHA256f527798e6a9ec05830e84ec98d4e905720b08b71203c51c19ca238dff7c11e08
SHA512dca60b28ddd2198945a2fc80c510e8f5da95b497bbc761aac272bfdeef76cca4d5262d00537f8bf6b14f11d64a587f9d0d3f4ebf155a89485a88f714f0547a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bae5d62bd4daac9d35731da01ac5d1b
SHA125ad435b6fb0099941157b8fc634fcc5e7dc421c
SHA256e5d77c0768ee7a17a17f5457bd589684c2d5a2dbe6add59c74936a6d4631ed1e
SHA512873a6b423aea685d45a98609a4ff8e2d009f7e90e871dc2b38d46d22234f4ba2582967230931035ca7456e26cbb305760f6feef059b9a7946685e682ef2876b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af53d4a8ff686e1e2b1ffc50c9fecacf
SHA16c222462314f3752a4855c580bf493077d106123
SHA256d521b5bc72ae756e373ec7225fe05b20bed8dc4ec0484a907f8824eb18a17e17
SHA512cbf68d7b09c1eb3b6ce18b8e579d21f604d82b4705dbddeb24a46b721447982c50a17b0734b529196df128b1f595d4863399328790fec1b007057c5508c9d9d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0262a5a89b66048d9dfe9163c42be43
SHA15104fb9cb0c4540c8751eac913ed7ee26b88338e
SHA25644aaba4a06ff6ac8e467087a6410fe49e9906e6dcc63850451f263ea33663838
SHA512c5445fdcfbe759498eb55a32d4901aef1cbc206e9324a60000b1c01c0de917a868319bac51e8589cde7be919c0aa64033122762d2e857ebdaea938250b94728a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b24eea71d6faed8400d56efb2aac66a1
SHA1022a47307f3e8fbe15e42b5d08e01719d9179004
SHA256c7d26194b788c3d724e159140d8ae8ff28a1816f5ae0b1629b517368e41084e1
SHA5122ce18eb0ab8a93c63262eec9569e5908728252789abda82e1f2d980817ba2fc23a302714c454ab8bfbef590e6946f979fff741b3a67a545f97cb59bbaa23758d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e5b0777c326ff79fc09ae2ba5e25ded
SHA15e5201db65a25abf892d22a9923fe725c6f2560d
SHA2563054679733ce3a8d52651982e7725f200fb11fdefc6319457d2f55b9a31ea3d3
SHA512de16bef320e86bbadb90ce1343413283564931ac5521d5fe299ee8869157da59cff63debb3e5d0db85837dda9cc0b0153452f9b7c42c4cb4af58a0201edba813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e4a07eaa4d3fe975e19f81ad2cce099
SHA12a5365af7482527bdf4049126a2d450e1da05d41
SHA2561c3fa118fbb5892b80a1c900f30e007863f3981fd2baf831cce41c4e712a270a
SHA51207a0ed4436dd4f122a017a5825e9c23cf41056b60ae11ede08c70486bf97f3ddeb94a7c5726dd2fd7685e8b241f9e6bc9b6ffdd63be5e413cfbf65e63ff9678c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5442183e524823c168862f79bc6f68113
SHA1d27908af0b485ea9bc12ee67445c7283c044bd2c
SHA2560fa674c59d74a3f43fc48aa1f170d106dcd5de21c4cc0aee0f7fef320c8fd933
SHA51240dd1fa4d1118613c29fcc81944a5e6e937842e9155a7dd0376e48a2a988d7feeba26a7d026d9ab84fefa7dfb67cf22a7e565fc2e6eda7843432c78293468ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6d8e0fa90f74733b8b25b197d7bb246
SHA137a89a64d87928500c9e7c888522884518481be4
SHA256bfe6bfd8d263014aa9e748e93f425eea8dd8170a1843ed7fc1c34e7873d36f88
SHA512574bef9b19b9642c51ff114e8739d9e8f3373f860653c65f004abe0e230df383a1830713d2fce9d532aa263cf1c3b598f5f6fcc224f866daf511496f5244f0e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e94b80089a7e5aaa4a870a17713c8c7d
SHA19f2c3d73db896afd7ecb3efae1f35cbb7e00a03f
SHA256bcef5369f4aaa4c5af2135426d6da25cee4d07a3571ee37b57ca7d64e8d0e52f
SHA51298b1073b18aa8027f8b15776bdb8e8cdd41d1dea24a522b04547c8dc676fa748ba03029b728ae24e70dc3858fc3faec164d04d875e81627a7d2175732e890a69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58be374405c67bdd9a101809d0216bca7
SHA123b1270244d7aaaabcb6c98c03f0bdb6c549b176
SHA256e06e778eed54b40acd82e6ea2060bbe51de30e768ce7fc625bc03860e55c35ac
SHA51225fb313ba37892de167bcc0e3c689f9b0c414e11df703efaad03f04f024318d624c2a4ad2493defe25372ed2e2fc8c61e9a49e3f83b0e514d658abf83c56d099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5733c8a22960cec12750abb3d9caa40ac
SHA14001fd9fab625ae797c453a6dce301515fdbcfa0
SHA256e64846737fa49727dbf443eea0f422fd1854cb396ddbfdfec2d7434a9f4685bf
SHA512f51718a028c93ab56161c918b922b50d2b406d24356d91b8a3323c51f3d0a7710ecd4959bce5b15d108442fb2149e838f779fd280255f387712f61e64e6edc42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554a67ca521b9f3879f7f3733b0ae92fa
SHA11120e5d510bdd4c272ff7e11c0df22367b9b87e1
SHA256381c71e5488e2ed14e91ad091e608b5beff6d7e3b76ac48ddacb5b6202c8f1a7
SHA51277f483cf21cfdad689e6fb778e5d93cc05397ebe9a9914d0e1dfbc29d4fdf1e17a3578275fc5f5fe770fe17022a3d4385d4fae96f8de954317ec71f02dd7f4d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd085c7ab01484d31c9007fdc8ceba90
SHA1fe41879728d4097cf2c4b544191b099eda151f42
SHA25609ec36797a44a784711947b016031904ac3f183068e95fd490bc27a757de50c5
SHA51267d649cd0c5be44681f3da7a75d9fdfb6d336a2130113f1e7d7b5424ed88a1753c7f3cc9e48729f5bd29fa2dba7aa0ab039113a0f9ea435a25446d4b0ed36cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55380a7e03154410dfd42cda5af5dd6b1
SHA1bb4564038a330e535f70c42376b6f5b26176d238
SHA25635c0dc76284ee5bd21cc9e5ff6bdf4051cd55885c81dbf1ed80cbf9dad6d9df1
SHA51294248c9543b160cfc75d6bce7ec45654749c2dca54b002bafd1b5ebde077853fcb9e3829f00e4a41711109f0647d2cf821f1aa42df21f63d590dab9204d94056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce80b31de887baede6ab3b1ea1fb8e8f
SHA146bad65d67c3a6882543d49e6f751c4ff25f11a5
SHA2561cc542d4cdf0f9b7a75a6f0d00e09fe4110f5902ee267b12c4cc27ec00de7c25
SHA512c50b4fbe50e3c80bdd9be36b7480ce79102397f172c2f330c1860fc673b39b040ee866f40a126526e09b5def78ec763d87f8c0fd772e77b9d45d14d6dfabfe8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f48afea151d9754e2684b175fa6223d7
SHA1ae72d1a4e7eb2064c9717e29ec424bca7b6b710a
SHA256c96d26925d8bb997922f7422865172c4230a7df5777c005ed62c44d77411abb5
SHA512ba8cea5dd121bc3c82d1919b331a867ed608b3f7d41cdeaaa444470aaa7ae0349729b4382d7a75f224746e828e572ab2d9a6e7cb6cbcc47f83070be0d1c810a0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a