Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 12:25
Static task
static1
Behavioral task
behavioral1
Sample
033e545590f6648ae1c865ef7fc0b0f8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
033e545590f6648ae1c865ef7fc0b0f8_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
033e545590f6648ae1c865ef7fc0b0f8_JaffaCakes118.html
-
Size
3KB
-
MD5
033e545590f6648ae1c865ef7fc0b0f8
-
SHA1
e1dedeae656dc0d3add17272c8ad5f11a4bd221f
-
SHA256
4aa29384d73bbdb1a112e494060251c68fa5b0ba8b226939483e3b2f7216f807
-
SHA512
f29da5ef7228b28ee68cc202a01b25601f1c997d137b3d89f4790a373cb2fadf90dc4589b507e2db45f149db63bdeb720fefc38daa1fa6e2ae57c47496ad964d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420382582" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32826C81-0491-11EF-A336-7EEA931DE775} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e766079e98da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000076037c092d2c2d20900282cb73f223b4cc87c1180d037960b0fa7794f35eeccb000000000e8000000002000020000000be855a3cafae1a10228a6064b81fa3a1f99c7c3c53bf94b95e33583ff9538e3c9000000017a904df4d50ba6a1ec97f61c2614b28a3b06c9585726ba09ffb6a12ff0e13c0f12736c8c49c993a12aeff2b66081131b64caf8d0e51b4ebe255311799feac6699a3c72de728e3ac648411e0345bfce6b10a8a163365214cccce6bc74dc74872972124afbceb4be9864a92cf0bf5ac07cd34f5aedd1a0ebb7b3492f329a4ddfe98b61ddf4c0e4d0662f0a48a1325cb8f4000000074c1e8378c18a700ad3c8368009e42ec146d4e8188386a95fcff9dced2d9772245893f6a1595b962c23e69c7a25af924f95d204fe715d8bfc10db7d035d7f538 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000002f9ca7ce168402c5d383062a95e00723d7848055b66bfdf601ea436b97d2b652000000000e8000000002000020000000d4d0e679a94999ef12ef4604df1358de9ffe23d81f87e33cb6f6b77cae9c059320000000e5a53b12d733eec91955be5dcd062c5c31735ec01286b001f493f80ddde51d7c400000007af90bdcfe96b9562b01ee6bbc7796baf3713c90eab9743db7d6c1d5b226a66f73fd87f6185ad5deec9755c7ff41066eb84f5d90431c162b8edeb52122167682 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2692 1720 iexplore.exe 28 PID 1720 wrote to memory of 2692 1720 iexplore.exe 28 PID 1720 wrote to memory of 2692 1720 iexplore.exe 28 PID 1720 wrote to memory of 2692 1720 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\033e545590f6648ae1c865ef7fc0b0f8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500cc7e9368d6dd318d125e1b48e7711b
SHA149d9a60a46dc68aff58e29440557bc5ceed9f8f0
SHA256dcbf80b03904693d1bd2a5467302415cf207d7af53bcbdb303f2e0c9cef80946
SHA5123ee4b49a184f32b81725955288722e92a8784672a3360d639c938268ae4f75825212f1740141830df4a559d2b9a72b391fc3ddcb6becc2502f1ae5ae101ece9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0847934f1e5ccfe1ad56327a3004ce1
SHA11546a07409ea243b7e58a62b4b06aa6a4d3ce2e4
SHA25673e9f6cd0e496b9f7882f7ada0c77ccdaf7d78817352d856cb66e5418d3340d6
SHA51282d745f4c98f9a3e71cc41ba881a6d3b5f85b8ce0aa21822e9ba575f6e08da6f4f81504f625c848c9b560ea0967e5bf1737e02522bce178b2afbaf59b58c78da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cc2d18cac904768e9ab87f8eb2d8731
SHA14e3c67b36f853a3cf1eb2e19e4ce2cd1cda6b896
SHA2562f792a6797324184d68cca361ea29b04fba6aae598e620def5776e1a90c71f1c
SHA512a8c98dbd4319eea78a205bfc4a903afafa33c7adc9ea78b98d4651c2d3c4ce95ec759401d8222d414827ce2e3e01cce3efbf1fbb7029bb6cb526a6bd01b57ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52428568865c43397e61ab38fd16084ae
SHA142ee253d85943ea167bef13e030afb437afd4eae
SHA2561c954442c88073acf32b3beaf8a42ecf0c9fab8b052d4e837c485971dd762d4c
SHA512ab44b7ee7c5319dae55233dc48fde0422558fbe368ebb0d7ff24dfda1c9a02f97794750c8e2c5716ac967b14c12e1eff675570c1e576e1ae91a05afbb5325754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a85678dafb8f3b9f685a26e784c22a1a
SHA116f8947bfc4c5bbe5a9941b812523d6fb208c013
SHA256a2a086f53287036f42517b96ffb510828cf0c98e50a70a277af1b6b360bc5af8
SHA512b82dddc4e75c29c1b1c44bb12544a6046073ed20b4cba33c412bfdb3ca2d41b4056af8d54f42cbac87a633a0e661217fff63c76fdf885fd60fa4dd2708cc1afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d434c7f8992f18549ebc4b9b200c68b1
SHA1a51de68465d342115ddb5c2d7899ce12c7940344
SHA2568a6348cc4097392e47cbe6ca956dd9468664dd2fffd1a757c3fae1f95a1a34f2
SHA51212c7d26407f91008d328a35016bea1f64dceba51d6067a0ed4719fb65ecc4cc06c3cfb2a157425f5561ac1dfcfbb5df5bc785792e3b76de711e601324bb74133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567c201a83f7ae804cfb6d8f825cc7035
SHA19dd4e5e81bafdfce9e7417013a4dafdf25c01487
SHA256b6d1fb4bed5bc2e73c6d5f2b8b3d8df6b8ddcf11fe2a889311f4c9666244c69e
SHA512c4b2af74534ca873f7d9e7d085fa384dddb94138182967fa1bacebf300252e45c487953cda8b569c210d19b3d1a425fdc2bc75815bff2580aeeb7a712cd34e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2a9cb406d80135aaca4f8914f570281
SHA19bd63a339c4c439e5d7d1b7ba4c20b9d304a6901
SHA2560dcce0d9a05b7317445dae3ee39afe50cf2934873cb20e8f7e899220b70829e1
SHA512f54cc3755e281a577f3f1991634466a670f83f48869b8b03338f882411e63947c55f8364f3f9a2503d3c16100b34a7541b6e9ab09b50ebc34920bc40429d80d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505d5ace9eb6c88c1f1728a3be517a3b6
SHA1b0d26e6ee17fbd2def488b75ddab23d7f611afac
SHA256e451728956a6d70616fcb1c08c4765f4a69f2b6e9c6de5d05fbb6a7acc05b62c
SHA51263d24fbd15e32565887f43194be6a421078e93b788a687082e6e33c7f847063ce7adefedb14bf5c384d5df3979bbb155641d87c207b4cb2d39423d0f87b041a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac3fb84da3771acd3465b31f118e413d
SHA19e77473c8a84a9349859318e6f303bf1e9ed9a7e
SHA256532c9623b685627dc0a4f3ab9939b6078b705af65f25dae6360b5ef63d339710
SHA512b49585fc79ce152451bb6f114512ad1db8b08ebcf6b78dffbb92aa7364dac982fb555060c10dd9d4abb1bc8643b94dbe2ddb23cb3c94a2c57406f4404252c2b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8d4973763423aaff00474f90e3f4871
SHA1a260d813165de3135251605c4d0c3b9223fb3e4f
SHA256532dbba2c2ea76a092b609f66a72ebd34d4a584a30e0d58076bea54fc7a6717c
SHA512dcfcf3d14fdfb00c938b1fb0de859aa7470a56fd5db73fb33d5f5e67dffc82659d612188eeef1790c9381de1c9eb19556eb42b2874d75182959e7724820bc013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d20a246566f32b09de25e52f76b1ea0
SHA12719d144e8958fdca3bc5f1ff2606406e3c278d0
SHA2562d7ea75b72dbd01def31eff299baf986b0508e0a82adec681ea36385227d298b
SHA512a23a7fb20700b91484d22cd27de4a55f921aeb47adbebeda1365f79613cef364d0d179fcf4153563afebea21b401001253b2c6b55b3fa49086dd8d638190fdb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583e156036212075d4d5166a6b527fbc6
SHA11ba080c824f4540a1bb109bf7372b9fc05b38240
SHA256b63b45c6366d359e722b0797170e3433ec09e8996fc6290763bf86b0496f9052
SHA512ab455614d1e3250d18245e97ed508ba552ceca1cdce650b94e42aa47afce6322ecd4b12c767933e98049f4e40306543eb6bd84174f04e1fd339d9f768289e488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dca93ac2a481ea69619ded3fec4fca78
SHA10d94d28f0bce47f12614ed741af7aaeae7d483eb
SHA25697c5cbe86bb37bc65b15b540c79e96bee5f0b7214246cd5d75080fdc2d110407
SHA51207c780460f607c00f4f63c55db59fc70d98341c69727a656125d0c038831cf24b875cf8ea9fd590e1fb957a0f9c7cc5b3f6457e2db25200e15816ab1dd13e01c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f2f79135cc58c825ea00180fc0fdbcc
SHA1f40cb3dcc3eb2f23d941e164902446f0c9d61b9e
SHA256966da1d8657a94391008038cf6550514b30b545c5afb0fc15e4ef8ae6536eec6
SHA51208cc2d7f6d74a0f709d1c3fe26d1ea06aa3213e5059dd9b2006531c1643da1987492534a4773765e19f46b622dc0447dbfa105c57c8dc6fbbc22677626d62d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532e73f5fbdbea933cf0a41a7fe0d9ae5
SHA16d4f5524681c5462be73f3ecde502c8ec2eaf07f
SHA256b25e6a0af46f7af37150678d60c85169b6378cc685a87e7471e53ea8c08ae495
SHA512484dcd5bf50ea4605f9b7649647ecda358c0a1c2e36007d4269ce54d3caa71e7aee6af7d02869488122003e60836384a42b98df93836ce03eaca9ea15639b352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b92420ac7154b4ff0349c342e71a5b4
SHA17e07d5aac812e94a2127fb1ec045fb490159bd7b
SHA256dc5faf66dc7a931954b0c5b55073a386cd4fe1bec49fdbfa7ff38b57ed259e87
SHA51221969449e0c044a5515047dd93cfa5838683c694220e5bf360cd8d7bb99e76a03d29afd7c611312c092956695051d6b60dd443e5ba9b3525009db989304b7d97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a2b79eb9db0c1391e4be0020a112ed8
SHA1e7ff3687b4715cf31cd802e167faa093d248a0f1
SHA25684590b339a089862227f459217107cacfe644621e0b129d322918c08a22cb422
SHA51233f26398b4da5a2ce7b131c0594e40420479ba6768d27d8b8598e781f648a1f6170334342d36343e82a4ad9933b8132b13cc5886897097a7879a50388214bc9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53979e2a26c89dce10dde8e0742e32e80
SHA13ef69032dd210822b5502ce3e654121a60ed9db0
SHA256b7d8c476cbd1f868d2f1377d646d5d95f84f6c1fa93fdd36282ce2b8f4a7f03b
SHA51274992858a9c26732f59606588438e0a43c213ba7561bea61ee54a890a3ef7b2da12b2d4c0e1d4ff935b047b7de123728955cfcac84ae256215ac156d2303756f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a