Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 05:40
Static task
static1
Behavioral task
behavioral1
Sample
663093e77e4be73bdb703325383c0b51_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
663093e77e4be73bdb703325383c0b51_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
663093e77e4be73bdb703325383c0b51_JaffaCakes118.html
-
Size
4KB
-
MD5
663093e77e4be73bdb703325383c0b51
-
SHA1
9ece499156b81dce16c68028c4d7ced5f05c5a27
-
SHA256
6b014028f3783070e2e5d4679cea7b75f3023ece94361050c2d015bf0aad78f3
-
SHA512
b5bbf2c7182511c6c0f9bd6286cbe0b914e22e089a63be8a70800a268ef7b9d862764279e10fff16b4f6e0c4b843eb8c79b2bcf8e7d3f0ae6cb41580d31bf694
-
SSDEEP
96:ziE1+OeCmV4MSEPBDvV0n47ej/hgOKiljTR1QnyneEh2qTrz:ziZOedV4GD8/h/KiZ7Qn/Ewirz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC290B91-17FD-11EF-8F9A-6A55B5C6A64E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 607cee7e0aacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000250344fbddbab8469ff094412f65b53900000000020000000000106600000001000020000000fb5bdfe2e5468b5c13ec0fe45fd0972476954e999aa3e8a6e375e01c0534a80d000000000e8000000002000020000000256ee720bbed53625eda58f376c004f3509aede5bfad2fe16239d589bbeff94b2000000053a19480fa04babb9be5e9275bf2325fbe316d4e5f62828b97dc63dca67ed308400000004380d23c1457c1d546f4e09feb4fe84a991c6531301eac3724f0f638a71bc9f51944105d222ddf6879ca33295226135f86b551cf3caab32098ee46677ae4db57 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422518270" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1244 iexplore.exe 1244 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2332 1244 iexplore.exe 28 PID 1244 wrote to memory of 2332 1244 iexplore.exe 28 PID 1244 wrote to memory of 2332 1244 iexplore.exe 28 PID 1244 wrote to memory of 2332 1244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\663093e77e4be73bdb703325383c0b51_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d4613d376bc5521fee14766689afb2b
SHA13700f9464d6cac03564f957513b16754e7534ca5
SHA256e82ef57dafd0582e684328e6b74876004075128fff3299acbd6ab1249b92d6b8
SHA51298f9efcc4881991c359e571491bb9145000d73b1f6f64a2b0044de287ab3d5557313fc0ca1a5729bfd3b3c3fe0f9c99ac7fa48ad0b60c20ea90fa5257f3db843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e00ebbe4925bc71ef74e6a04de83108
SHA15f8a471c535fb184447c87312239dff139ebacfa
SHA256cd6f64bd5608ff45fcf8f874f563e35685208362a1547c627287de18f52d965e
SHA5129e33a468936be8c517660057d3bafca31410859ba6abdae32dc42f0c579277146eb6131969d31a6e223f7fd0d21c9865ac109e3867c147f24375946d7cf1ad5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5205b2e84b6ed3f49a4c93dc54496060d
SHA195934cb1bb8ab2b782ad5b84e342ead50b54c081
SHA2567f9d11cf5d591d4e3b968ee6a1419bf088ae059e61480881424309509ee6ca7f
SHA512ff8ba6e5376600c78b92a7764131bcbe23d6c800426dd05829caa8b69cd39d764f9ac8b522364a19e8f40249888bfa362a5902436407e57a7304af01e108052d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ec357c162bd738c56e14aa8e89532bd
SHA1507d3fec621bd6ee9217f0e1f0184b3fee9892cf
SHA256af41281dba28755b5c3d4400c1b5bce42d54e2a4c80ed6a11a5d3a1620bd4f6e
SHA5123755e7d05ed437529832c647161fdc66711bcaf3d4262d472978d18a4b3904da91b501537ebb1ab54e0b1012fadaecbeaac1fbe61599e4a0853cacef64df48de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c20621ec66605d82befcc9696f6e588e
SHA1d813a688159f3402a3ccba98f79e354be234dc72
SHA256018a7cf30b0b8394d2af2f84a3f0178070fce6ae1af0b997932405acbcbff76b
SHA51232134e7bea3453bc0ed908dabc0a2742df0276ad4dcaf3e91cc86901669829e3c7eab57dcc7fe76f44b5a093efdd66a8a4c64cdf74e7b2eb543f9f7de1401572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510122c85006236ad7c9ad0f0d6ecce44
SHA1e26cc35a295c810c1fc77a96257c80cdfe19f7ac
SHA256e5eee542a6091b2354ab0399f07b8af6be259d77463cf734687e24dacc71adcf
SHA5129a6b5b9281ba67c9635bccc5e75e45a399c5ed1244d53c8d6b33d802ad96a60e6c85ae711a0c2a9bac1c1dd10287f5bc349812198aa7ad6212e18880f3f8e913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553907c8f187a91b6173637200d97cbd8
SHA15204bf66529ea31910589d95554ee0d5d55e2ccb
SHA2565ba85f5f4c3bb1f7cc93712228dfb9d846038c07bd8f571d375487666f8e5a83
SHA51270c67623d5ff7d562687db0952c03853ae828fc0dcb86672fef76e0fa69a427c84b01cec7575786005a4fb0283d29378e116ed0d994bb4b44eccd6fdaf4ad0a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b76f25ed160549c310ae961e8d14d24d
SHA14fc3ff904d29dea2169730511fb032fe55c86d9d
SHA2567ddf06fc6601f1aa4d28ae9709b26caa400dbc3fbd790d5e0ac4c9f65e50eeab
SHA51271573a1008af0409ae0f8492cd91222b171d82bd2fe5c6990ed46a051e9f0742ae297d7bc1a0f23c7c92ca3b0852672beb50a616b9c1527d0c33050173190eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e9ee1e0679a9b8c7d98214a20c437f2
SHA1ee8c69aa630d45c99ed471e54c41bc40f6bd55e4
SHA2567b047fe09c013ba1ba48e941ff7ec3600c455d6b83826c090d5c35aac36fb6de
SHA512933912ccd6d04447c7e84289b57af2093120932b01ddcd0f489004648ed1400f790a2dbf74abd61320fd49cd25a0452a5df7f46b082d2088db4a725f384883de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a04134d996c0a9cca9ec3d85cd8ac759
SHA181de749d0a63a0d35201c4d6f0efa3f8fab06bdf
SHA256085ebdb5759898135482a3e234c4d9d005bad151ad7519873a72ac84cfc81316
SHA5129675760f077975b07a67b67341bb3e1035770fedf99661862177310ccbc0e92e2129ebd08310c1ee501cb915edbe1617790057624c82b2d0e8c5fe681b03c884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5340de01f8d57a3519ad983b2b4f6fe22
SHA1a272dcdf66e7fd2cd089d8438bfee78a686e11fd
SHA256cb1760b987049599b018ff53c449be45d12d4414b850ea6c0ce810d1dce0ae4a
SHA512d57fa270bb0d47d73364a2aa68fafa476bc469b4813824a221588a8c12642d1592ae6806aa49a6f05d983c7471c0ee937ad9920d32c4f87c55bd3b3c12f520f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550d05ac23ba620edcd89c13925734aaa
SHA1ad814b34581efbeec2d91f30c19b169a707c2350
SHA2566d679220173fd88957590f5e2eb6a5f0c29c23073a43c6d86cdfcd656c34c945
SHA512dd42f87f355ad03d7eb5325f33010b5e226e4cac3cf46ec0869d21b30385e58d31ae70598ffed1221f7f55b3d573fe63610f0fc9406a43afe15a544e5b4ca6d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b4cbc8da57e172f0798449835ce2bd8
SHA1db1e99bcd5cd73744d7abefe02f7f27155c1b945
SHA25691ab468602cc1d477b71d801b383bbaf4377b730b027e16cc2da58aaae270d69
SHA512cd98077f156e9cc06b6a1e846ff50fe8b2ded156d6d2cbbb84dd07dc4ce49288411c04b28e58b6cbffc5e64e09660dd0903103ec41e667f0b20e8bb669561ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b15cd4db0ae26431a68011d782b1e60
SHA127e85675694aa1956e22c84f9f307c893d5d9fb2
SHA256914893d5bf589962059080da1b486db65b8d5fc79d77cd24c6f1f3a4183d7128
SHA5120e6b0a15291e58acaba6132ad9616f394e6cdeeb2dc0dbbef1f547e0af4bd3cf4ef0de9c19093ce11c677d3f9e61b24850275322f982db1f2fd3567247b56cdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c0e46409195b426c3a4e1d03e135b82
SHA1647aa10db6ffe2f6d612d7101c5a858f3b2f3db9
SHA2566f577866eb32f963ad79f6944314b0fcddb64af3adcec97bbdffed5300952b97
SHA512ddcce4403fc21ed781798c9596649550fddcdf77ed396fc43927bd776b02093a163f90b8c2168182cf46cad4a3818481f2a2cbf0a648eca1e221a6f15583c504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b26bc3aa75642ad3e29ebb7e7e37a53c
SHA124289edd5e7440db79e3c087b19a693e90c38e2f
SHA2569c90435b1de7f4263cd7ed4b030dd402571475438936e1a8bd12ff50ca191a1b
SHA512ea4d3669a0f350aaf3bca2328cb4145d7ded10c56152925e06cd2ea476499f5c549637d798d40b938ade4b41b7dbf1c257ba484db757716a99fa1746f8a3dfee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a57e940b4e300fd3e7c0b43c1932181
SHA1bd30a16690ff270ef3808001276e1700e40a36c5
SHA25602daab0ccd75c3d899adc0e81de949869a1f45758c8e63312d2f4656fb9df6fb
SHA512457c75592520deaec15687b9c209226784fff7e49de9baff312ebe2f9b2e56696c1dcbcde7422208c1bbbdd3475df01bceb38f5fc9bfd21a8aa6b32f4c0dfe45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53903d09e82efe3538aaacd20447c2743
SHA1b3dd8373eaec4e0c48532a7d25355f930e210818
SHA256aad394989e1a45a66ab10c3bdad8b9eb2449a0295b62d3836b41c1432da6583c
SHA512b4f26f64a21a046f48ba9bd2c6f56042a9dfd4b97ca249c62e6722843257376f738e9f86015fcae8c37eeb6e8d1fcfbafd0841f0b83ee05d67b5f8e7ee2dab44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc9be918aa7478594bd86ba201d43c46
SHA1804df6829a019bbc219c68de1b236a4794ac4f67
SHA256f232dc9c7e2a0f52aa8c769ec9cf3dcbb2db20392188399c31f9f925bb303448
SHA51225cfb480c7a9c508fdff541b817e097dced335c38845fb5b1203e962ffc897022864b9fb58f1a19ce26966879645f53c2789c084ff91c3e5bc7e5a5bf7a0fe22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcbcd1b9d2c0f513a3221374f7a35306
SHA1c036dea29e73cc7d61e3116ba0d8ce64703ccfca
SHA2566df39b5c11136e4579173ae5ae385b572e1d4d32affecd041559992c7e9bb549
SHA51232c573bd847d7388564396d45630d8726b5fec3ec336ca66f986b13a086fab0152fc3bc6b7ff07039ff638c2a3233434893c63972865fda4b6dc78e23c949118
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a