Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
085801d7d75cd7129384fc1190e18539_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
085801d7d75cd7129384fc1190e18539_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
085801d7d75cd7129384fc1190e18539_JaffaCakes118.html
-
Size
4KB
-
MD5
085801d7d75cd7129384fc1190e18539
-
SHA1
e4abc350ed2fb44975570cb029fa27ed151a16c7
-
SHA256
f286697f6166d3abf169edf3b1eb6370429da2da7a7344142ab2863e34bc9067
-
SHA512
fbcba305489f11ba42608262a508dc8918d8cbacf8fe39382dd4214b55a194d3e6a8b0ee5476040b8b69b18bcbd7284c9eef6d5eaf566aa9b52271fabf09d6a1
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oxsvdsZd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420577561" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2044a700649ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C0F62F1-0657-11EF-B20D-42D1C15895C4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000066bb27f97374f57099e1a1f12fb7d38529e2d41a79d5a21aae8c9ebde53c8ea9000000000e8000000002000020000000e423b4cc42422c95f45ec33217a30cfcbba408ed456a0eb50b9da3eb6f35933520000000ad4bc4d7e6f1290bf3e1dc6531263b65b587431c7d2a084108f1d8ad349c497b400000006b397399c3adf22d9a02cd601fbee0b24eda4ac9f772f3d110241cb4407c2ac7587b099e3128a00561ba6806aaf6f49841f6f7dbe3c254841bfa5bffdf1d19fd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2488 2220 iexplore.exe 28 PID 2220 wrote to memory of 2488 2220 iexplore.exe 28 PID 2220 wrote to memory of 2488 2220 iexplore.exe 28 PID 2220 wrote to memory of 2488 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\085801d7d75cd7129384fc1190e18539_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3e636e3aae15ab165a7dee45867d0ab
SHA1d36a88471428383b5d704bbe56232ef6b1f1ff6c
SHA256c80fb1969d4fc05f262662a9561389e1e0d5baebc760c6d5e4035d0305242e1f
SHA512f75238dddb96947febd3c91c4163798edc1f11f689ad5d5f3d582a4edb555eba79fe0e2ca85de6b795d19e4f2ee64c0f48ab627365461213c9a94f55917a53c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e17e4bbfdef576342d7d002da72f1bf5
SHA1d4a5d9f2c4ca49b8232a038e5f9c5790beb6687d
SHA25680a96237da20f6ef1a694226d9430a6ab78633fb7eb8f70a7b77fdd40d1c52a0
SHA512e16e4400f1bc2f42f47900b0c5852c06b52a22c1bdae67c8bc520b7f9c2347e4ea9a4672807095bc3f22edcb68bda30c92f3c2d45a9c53bc490587524bfa5777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b28c9d5f0a6fcfc177ef95c74be17c00
SHA1cea0c3881c5eed9a2b9ada220c6017f6caace007
SHA256d44254121b974c4fc62d5776278d9df6a014c689833f1cc95829ce838fbbe7ec
SHA512537f02431c1dd43f6b3a7061d43611824b0569d3f89b703f4a876b6a0b715dfebf39a4cddad96b0dcb8296c68be4c9b0807b0bc83765f9b44cb27a4b40c212a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6540a383b832adfa14725f7ae401493
SHA1f068c57ace9d8f1d536ceeafe6f0b53c647d6ae3
SHA256b7cea7b651df516147e7717e6d091ef91f0ade3273e6218fb766d053c6eeb3e8
SHA512eefc07b83768ecb74992ce8a62a0db3d4d73ad92906a3cc5477cee6e45d1eed9d409b749c6bcb03974edb4d4f48534b77027c5e73963d7e9a4d6b98dbd4e6b04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2fab00ad61e32bde853fcac32c2013b
SHA178fe708042de8e1ae4fcc8e2fd6d15c6dc741053
SHA2568d946ea00869c5f0a946f8d2dd55a4e0812d0feabb314b3f528320bd2fd682bf
SHA512bc809ccddae832908b869d26c4ad21298a3187f8d664e8f3eb2890f1e4c379e321844e2188863f952a8983305c536b802389931461c596fd2fcc65c9690d1080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af0e3e7c4652f61e9b9f3b36ac509fd9
SHA1496431636989673d4b181a7ccfc3ad28e947de05
SHA25682ce2ca28eda09169107f91496623b9546b3a91f1e2a892182f8d5514a89a129
SHA5128e991abe0219e7519e7ae2ed7bc87412eca672585355be90cdfbadac8f452c9794e5a8805acebe85d3d3657dd9ce2c0a5f8b79c181f18b2ee0c50291d32737c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594a42b3f693067859f4605dbc1fa16db
SHA1a86263165f8e04ea504a80ad289fb54374a27b16
SHA25696dbaf8a12ffc651a40e378b2a525812d819953a8cf87fca9b64c3960a0c761e
SHA512149f139f71e1c57f3bcf9f80a939b96f04442ed52da8c9d851d50de615bdb062aa8ca4500dba7f2abc93e83520ae1d526edef14fd676bf70bcfe265dc31ba9bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ac23aeee3c3e43c246b3104ad6a1ae5
SHA1f265a40b19abde4ad3235d8895fa1c80aca732fe
SHA256ccd78a29fa30b95334d9879991739c0bc6acf663767d2d17766e36347ce0b0de
SHA512b453408cb82e2dc420eeffc1365cc0ffd6fae2be87a34e226c12540520e6a72fd4c2623b88423f061369602bda199b9147c11e8eed19adfb1595d0fde1bd7731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57af8374e0b59d920614ef3901fa128c5
SHA1828b1b1057451dd1017d867288f7f8946769abc3
SHA256326da6c9de018725bb22e82b0727adca6f1d4d0a3fe4dafe5009e4a46443b353
SHA5126c62e6bc651289b8d41e92108c2e4049af5beb990674658b9f8dd669b4ecc01e96b58a108ea0ba283161437b52391af72739a730c2fc3dd3c6deff7679177a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56703bafff5e03b3f4991317148e27fca
SHA12ccce5e52b55c9e3457d1212f1289b91045f3f92
SHA2568c2ce2bc98bfb05981765474d73205655bcdd87c00fffe0710d30eda6827a97f
SHA512a29ba22e4e1fca40f01da6fe45fd152bb7bf119b5eacbf5c42935522d2c2cc49468eb35c545c4b839f80445acb5ad7739af1d3fcce59aaf580a43009ad7ca705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e39387a0dad10da0abd901eb8bd45c7
SHA1d5cfb6a4335be554594fe7e7e752fb964da71046
SHA25689376d85efcc6a0b8de1d815905ea284fdda1833f1b4c82655fa636ba49fb2a5
SHA512f333a520d53a19018167ff56818ddba0ecff4e539fcbe19029727111c3bb1e8c097630ee63fcba4fdfebb626ab8b2b35fbfb9f8f5597ee9e14ea66a762aef4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b49ad9400bd7407ea4452f113366e85
SHA1877aec661dd164ba027ac843531b78bf0d5266bf
SHA256a878bdec8f1a37809cc327e7f1a2d4602c58fdd0de5ea7359f7a11df70f21f68
SHA5129a7a5c5b8b5aee4ee3502f88650ffb498f10bd04137dcd65c49f1a570e56bb065d36616b1a7d3720a88a449667f2671c2c72d05af62989f6ef8f281cc63a5758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cd720a31453b0e719d0595356c737fe
SHA12aea2773b9961c565100f4216fb0f40b2df701e9
SHA256872bb21a9addd14d59e3ab1e66f726c17aebce9de146535d43d10c43102c67e6
SHA512e26bbe93e6d6e42fd19b1106d751a5c7893615c2afd866d5485ab1ae505df7c2ef60cc5f59aaa60a5bb4ad184bd4ca274fe6f344155db3b07f96db635e738bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597be668b78f740a47b5302286a1b1553
SHA10eb74826a2881c884af8357599221e851c3e1f92
SHA256b248b4f553315bc7a29933ae0aea76aea8506286b2562628077c5cf70f362dbd
SHA51230725ecfc8b7e797142e78be93821daaa9ce90d5f641223b248a1c15aa04684870503ebfff4528f417062fab1e5b468d492c5382cf439d18d1c754655dd2e105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59717eda69845a6cf23ed5ccaad5da28c
SHA17ed1936451fb709483cc5679bd1dd89172b0039d
SHA25630d45e4209cf3c0d50393cff0f735d6f08159f48cd16f3dc0064a3250d3f17c8
SHA512d0b26aad79b97b6c029055b65db879d7ba2012d530b9512b8efa73e269f073812ed68f5f72181e80457fff39d6d33e0730f1af1fdbbd4e846af047f59abd8d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffb93a2ecfdf8a2748682e576eaf02b1
SHA101f00441e93c764f96163f0f01e7378b0973e153
SHA2560c55d522b2666a1f955d7ccd2f5b96b9e5e9eb9daf3f01c382ec03d5a773d367
SHA5126a4e6cee5862b759ae4bba957ed7945a4477532b1e5a09c5fcfe3e21c91d21df876e66673c527e02e3759dbd2037679ef5c5332c4845239e3ccc0b0cbffba6bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1cb1c483395d6e8ed4d48b60eb9f448
SHA129c196ea67cd87c3f221d325f4725e76a06d0ffa
SHA256d47d94def49cabb6ae37be4c5e18368b073928ccdbab9ab56f23d875d6cbd403
SHA512434de01b641ac483d84aa78094b3261f2c330fa531215af2c0424183dec382d56af7c3725cc6a579b0ab58a9dff138b740cc76a290b1c376bda2d7146fa4d2cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59744acc56f4fbd7ba970397aa188df31
SHA1e96166935be869c42c60bf0d4cd6c8e79e6343a9
SHA25683121157b44c174982790c34bb868a4091ca82081ced37172101b76a07ab49b9
SHA512092102dff12429dd0350ba5e2f19b0a4e1ea570b7bc5f966dda93dc46cf435c095d3d2c7d6d07ff5d7fe86921da8f9c9ba3613ac604b44d111b1f1465d74fc07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd41b26113abcdcac4db7a5822d4c111
SHA14b5b961b65eb305681797751fedef6b90191b7cc
SHA25624162e968cfb2b9760b1bc683a222f381e039355d7e152911fdf82e245d2b919
SHA512c5b7ef3f5201afe88bb4116c83646b4d6d1adf7c375b734181ef296126195a9a570831be903f17b3cb5cbd9a5160683524208672c203bc2d7739dac1afc033ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0ebd68110cbb0c7af073fd320f3e934
SHA1aa8f8d3d6525120cabd6d8bec4fff529fe923e80
SHA256a4eb56efc4ceb9d8bdde5b3f2f88c64fe855270dac8d666261f5907684820e06
SHA512bfe647401d588c997acf8836e16ad77b97a179dd78bf837d3c6b5a4516d88198f6d945417b01023a054898e304c85213905588a78047ecc5fc68b1f3bb881cac
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a