Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 19:49
Static task
static1
Behavioral task
behavioral1
Sample
68683d8a2d26c1b8c7b85cb8364fe04b_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
68683d8a2d26c1b8c7b85cb8364fe04b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68683d8a2d26c1b8c7b85cb8364fe04b_JaffaCakes118.html
-
Size
25KB
-
MD5
68683d8a2d26c1b8c7b85cb8364fe04b
-
SHA1
580bf78d2f0c5947b2846fc64daf2f50ae5c4fa6
-
SHA256
4055740d1109544436d0e9a979ee9eb0692486c4e8bda17ea4161365fbde00e6
-
SHA512
5bbc79da075f617a7da74b21dec7f5443a1c3b4f7b4897dc658b4f0d3a74ab0a0c35fc82f235106858430dd9d67eb6f99f529b1e3fe5e0122b315355593c2fcd
-
SSDEEP
384:4soLNo40Uy6cX7qFMVXY9QW4hQgaQ/zIMCyy9RPhcG2qau91WdbaPze0wL:oo9DB
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422569224" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000008b221a38e0326bc7cc7d43e56c215ad72e01a5936f880199a354ae796265350c000000000e80000000020000200000005d8334a24bfd8ede073114d479ceaa8f890f6ce3cc0a513531b3ca34c09db73420000000e8802141968cc94dfefbf2aec413087b0cd21837007b7aa8b5abba9fa0c0136940000000eaa045abe31dfed008bc48643df621fea43da4eac1297738a3d37e9a22e82eceb722b000485495a6c33a8e0fe5a44a1a289a78aa1a90d45a1bc87be5cf76030c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80bcba3581acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000e963b1167cd02888c83819ffe59cc2266d30ade5239cce7084d79ff44e2dc6bd000000000e800000000200002000000040f99944b60330aa357f28858ad7b8e73aa72084ec867245052a54b9bf45f91a90000000e95f50fafd828dcdb29718ae22db2bb031a4858ed3c35b29e58688ebb8d87d26d0a4aff44bdb06f096e1430c91fb89d3054767ae60676b9692e9dcbe3678bda59c6baac73fa4e8e8fff46377b71a615efb4172a6491c8a32492309dd3160ee24f0d6e0c85aeaba2c1cd99e89080880f27951ee0ebfd90479a46ae36d6694251b66d7858f33fda251b3564184206062f74000000037c8732edd776223d01d08e2a604b0dd93ee9346c36300984974ae3ce056defba415df31eb2dc43b204f3ad560434c3fbe5c5e9e2d5a52f218c9365d5444c6e7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5FBFC111-1874-11EF-88AC-F2AB90EC9A26} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2248 iexplore.exe 2248 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2248 wrote to memory of 3048 2248 iexplore.exe IEXPLORE.EXE PID 2248 wrote to memory of 3048 2248 iexplore.exe IEXPLORE.EXE PID 2248 wrote to memory of 3048 2248 iexplore.exe IEXPLORE.EXE PID 2248 wrote to memory of 3048 2248 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68683d8a2d26c1b8c7b85cb8364fe04b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aed02d48e3a5c91e7fba7824e8761569
SHA182169eaf1e46df3e66219d816ca511169383b28f
SHA2569486c3f410e11b8366bf7c0dc668bcfb138576e17708db017881b3c8d925b22d
SHA512163b622ae80734211231a7a2202e662a220f46df9024b0fafca51517e02669aa222186651776c94a2c3a26688a1e61ee866d3b6ab9e21e72976732edb997f7d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ad4098b57445a61ad656c71a564d6bc
SHA1c3be65e77a72943f486342d00569ff18527d1070
SHA2562a717791b5bb957b2522504f461af280104aad3895a38cb12dcfada1c44a75ea
SHA5125d72289c5c0b13b67ab5bda077bacf577b76c60b876c46d6e6c80b902d453fce868fdefeb11af4391dec656dfb9da2999764c7bb13b6415b67f64e039d86b8c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b32e8871c142b2355554ae2c6548d39
SHA1143d251d6f80c7b2f0aaa265363ecf5d499bcfad
SHA256c57fd7d20c707974fccc8312f1eee0dd425b8b5e8e12488f729e8b2c18de01d9
SHA512a63c04b9bee0ccf8f15b857f6be05915138699dbae0feacdae772329541c35b206043a72a32ad21fe27d8e7dca412101c1b03321c8d1d1a6e79e4ad48adae873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519ce753cde499770827a7f333b214d32
SHA159651b85cf34b4f7dcc8ea16a962af8722be35c1
SHA25656442076852216f76d80b9ee04a49001ee019927cd5d086ce5c82f45e202add7
SHA512c0c49bf97264bf1eafaa55357e8a20552ba51b29dd743b5f6cd3e4cec6c9287601ebd320bbabc229fc91acbf91e910ab84bfe10552766425bce218fc6533ca5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8d0eeeb2c62395d598607c52e7d3dca
SHA1286223ecf00facc9307f142fec2d955cd2f82184
SHA2560f171a6b59a81b2114e9e44c24b7eddcc0150eff938254c5c9b47d25cdb5d0e4
SHA5120008addc5445487e4ec7b9a9aee0c8ee263027412c3174825a58aa32f28b5c36a938680426a1c995deb1aa127563a6355d7b812d3f5387e6eace52e7cf523809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e1127454d2c6c2c09caaa84b6de7826
SHA16b0ccd5f8110898605edf6d85cb16d883ccd1a92
SHA25688b6bece8e9ac134f842538b89404d773abb41b5d465520c305e47707f4ea233
SHA51261baad4a73995de3abb5c0ae2010fc48578637ddd654fc08bd00f3976b2a7a6d78fd4191a467e1fdae6225124bddcac027289b1c2301647cf316ca42e36ddaf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e509b33dc37c2e61aed56886928f55ec
SHA1331254568eb75d2126c1e06136a4bead8d34ce17
SHA25618374e68cc68f1a7e1495e93e5a1a4258ac29aee2676c1e25ec4899d40cfe035
SHA5125607175cc8c731eba3a2c5cf862533b5a961a4e467b481225949ec14c3c04b307ba0b8fc666c95a5b5870c833cfb4efce3477fcf5b33d1a044e1a1001b094fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad51e7b46c9d60aee094c5a9362c255a
SHA1e164cf8639fee396609a5758bada80b192f1bcdb
SHA256701fd9e8f5fb86b80e432c301e637cb25db168b5eab429d7f6e60349afae871f
SHA51280e706cd56d86cf9cdc8445a169844eca8d1238c6fdb5251d4aef5219afe924b6c2365f21ca005fe9d1c2820b107234a4e99d1a813beaddbd56cdea623b040dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d5b1e9bcb6c8bbebd867d6103fc10b4
SHA15c7eef67e52af34d375b79489fba69af027b3ca6
SHA256fd9299ce22095a2f51c1ebe082c8c2898f07e32a6e0865a485c814a8cd392537
SHA5124574c8d768970c61f7590446db5b1beee0a3b6f7e5be21533d3fe45bd9263d6c4c19cf7e8a945f202125e425bfc1eb54b70db75cdc6c78e19e9fa6f9f7f51d69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545a6fce452b11f48fd6d8fe2c3e4fd7b
SHA1fbf392d09bcfaf73bded54fe5785a50e59792ca7
SHA256e966b6e53def6940b37be07cf52bf2dfd8cbb9dd0104dd84f37e21c8a2377c9f
SHA5129ef1b70747c33bb8ee0e5c119b2eae31aee1adc153b56c19d3b58dcfc4c08933cbef4958d876cf4bc1c35dd88ba4e88a4b982141ab46d805a50d774fe5e6e9eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54637d6f86c1995f00f93490570779db6
SHA1257a183d77f66cb66228af2b95d0e06e98582b4a
SHA256f5d0dad51da02854cbb75b8e33f12ff6c0046e0987d77152afb426188d753991
SHA5122129a4de747d337cbb53e3a31701d805ff7b5e813912f519f58f2aba27654b2a6eca41ec5d972ffef392f481a9704235bee9c11af2004ed5c1bc58b1cd23aadc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576aebddf0e3f9cb49b8cf7ef571517f9
SHA185d18105b6c3914963c426383b509b8f4958a0dd
SHA2566b6eef5267242dc25b4d4f821c91b59dd9ca6f73d5d93983f305213d612eea18
SHA5125c7aee7b5e9a9c8d17dac880d03922201c4a699adc81100f7461e9a3a9b543b0011f41bc43178a28c93ab2d03d18ccbfa40f12df3fe638a390e872279d6b8b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eacbe0c6aadff9223c5e969ff199570
SHA10aee03d8d5646b13bc934ac0f010160a4614c750
SHA25652802e01f7df372f4bdb8247c175ffbf34bec04bc03f827c02333398640d432d
SHA512258e43ea2b4e540c9ea3c1b681d1c3ec1f43faaa8e7182f54174af746c179f693a3d8280ff25f692bbd601677acc9d8f5f9142d012ec81948db89034bf9cdf6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57016c2ddf7033303213cd0e361b76e7c
SHA109f72a2ca0b30a49a5491dd2420faaac4917d2bd
SHA25601d81cdb6c08fd53dbd981249f24f175b4ad838cf59303efd92e3d5b35e20787
SHA512c249240ae77c4d29648c874dbac4fd4a210cce9928a481db840dbd5a3fa2d3c7b69277d76e427c7286ce5ab4a4861739c6df951318c1826188cbbce201e2fdc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d20c9f082a7ec0674da8a6a0dee418df
SHA1923f59a574155be1d44bb236c5e0d3e4c557e3c6
SHA2568715f4118a611a61808c80c8e7a013796c043cddcf2f53f5a55b7f4f461e86b6
SHA512be03ed5c1246da27b22c48180abd9e6ea6e594844af3f77aeec81da9696153346da29514c4fc8420b8533560bf3453c50a7ad0ba8c169269a558ae2f74c47633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca5293dfa90f1baa0032555c67b397d4
SHA125ffa9a314dc28d8355fa6d668abbaf7cd82ef92
SHA2565c00dbf2de85c65be0381f15d05f3a9f577807e600d1f76bcf44337aa452a112
SHA512d4274f42302b2f76124705bd87cbaebfb1a58126c9913da0576ff14e12be82c7211ed0df5b281989ed2dfeb1d16aa96deb6dbdecbfd543589361e29c136aa4a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e54f03d3c156d3f88a0b4900fe64aa3
SHA1bc932ea9ddb5357e38f5387e29858e0b217af3eb
SHA25696efda17533027da9c03c2313c011277fead6f14f1c4c949c2998b038f3797a2
SHA51251c7864384a459c5c48a7e4e75fae1cf2b046c758a1d475b8b3e412cdd95634877dfec9a07a40cbd9a17de8f188eb1d9d2ab154df8bd1d32a8b081243ffae5fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6d7e83c05f20f55731a37c566dcfada
SHA13cb137f61342b4bbae8df2ec26bbc0734768de17
SHA25685db0d542ae53ef086a6cfc5d6be000f501782fbbed3514a21bfc3313188c7b9
SHA512d05453d86b2bbd4f09082fc8c9761265c38c6b2fc0d36efeafb8031d18348e13a2826d92728ccbb52b39b0ca087f035aecda49ff6ba46fba938935db381c3b8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ea3fb26d0c02627f3e4ae58a634b519
SHA1382cdb9600536abd19a000650ff91d306595f016
SHA2560dbc0e5e20037bbbfaa794f995211a491e61d7f34e806f039d9b679921a2eaff
SHA5120a9889e2c660f807650836d6c8b41928b3b9327544a5f2356eb531e248e3b62d4213ba6fc776fad0e802c92812a7d8c59f12c359fee4accb8996de0e939c371e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a