Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
65b214c79c9e7c3333388b8892613b8f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65b214c79c9e7c3333388b8892613b8f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65b214c79c9e7c3333388b8892613b8f_JaffaCakes118.html
-
Size
460KB
-
MD5
65b214c79c9e7c3333388b8892613b8f
-
SHA1
df46f122677e69d4e18f63bf4ece833e0f666f3e
-
SHA256
38bb4c51cf5bc8ad972625b49f362a6b9a4f49ebb233d54abf15567c4bac9b4d
-
SHA512
9fa046cd02d9dc34fb0789b2b19e1bba69f34f91b08e1d489aabc995712aee78c1c4881b91900303e25cf775c5d13f1f78d220910ebfdddc8adcb1014529231a
-
SSDEEP
6144:SFsMYod+X3oI+YDQgsMYod+X3oI+YMsMYod+X3oI+YLsMYod+X3oI+YQ:I5d+X3R5d+X3I5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0951915f0abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000149346175569144b9e858299256273ca0000000002000000000010660000000100002000000017dacf3bdc5012f60711e5f208cd2b55898d2d85cccc8d9be3eb9b3e09eae4f0000000000e80000000020000200000005c8341bb75a344a314ce19077eebbd324cdbd9924690bd2d4834d21f4c00a52690000000b7d5596324549c133507711dbe0913ce59bedc8e1a677c966b688a923c1be6fce18c4acebb43f86dee96b2c727492a86e143f071cecd0393edcc4fed3ec74fbb1130d18de846531332552e8a516d3aefe614db50104222e3f4c9ddfc443e65e0aa25189c8f94196be843f339a31449e1575df334fcca7f11749d8cb938b9e5e2d04712232fa6a49d04740f98fdc500ad40000000e7c61c8e77f706e3b3305da1f8912ca0094e013730e6f2c71d25ab9da7b75bc76db86226a0952660dcfcb058c9369d2e08d21c87b321a38892e7323d88d16c53 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C932CE1-17E3-11EF-9034-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000149346175569144b9e858299256273ca000000000200000000001066000000010000200000002d3bd8a107c8be506d1a6aca3e7bb58c81dcebeaf844b549c0a16081a2aee3d6000000000e8000000002000020000000b91be2990aeeda08dbe44a2ca0f102bd9c2670ea7b8b1d9b108215ddcd9920d820000000db250afdcb6487dba18f8d0811dc30d0c634755e1e5b08ca3a41f5f9391b3b4640000000171d6fa44317ef332790c2e61ffc2ace6b3c395cfed2e32df2c6a36fe7fd64b260481efbd02923c8bc498a2f9fd21fffbc805ce50ef4fedfb120a76e51066d2f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422506888" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2420 iexplore.exe 2420 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2420 wrote to memory of 3040 2420 iexplore.exe IEXPLORE.EXE PID 2420 wrote to memory of 3040 2420 iexplore.exe IEXPLORE.EXE PID 2420 wrote to memory of 3040 2420 iexplore.exe IEXPLORE.EXE PID 2420 wrote to memory of 3040 2420 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65b214c79c9e7c3333388b8892613b8f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55328dd3d1076cd0818794c1a68fa4727
SHA1a016a36a1228853ec2118d3508169beef4dd6e08
SHA25615d40763c6ca52b4c6bdba1c87fba1406e7860a12b79e80d0a4624839a63d51d
SHA5129b478022409e0619408ef2d8b88c78072c387c5c44cde6eb11fc6ad352c2152a1c9baa5ba20e3e47e94097702229c4097010f7725bbabd13e9a454bc973fc879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a9a6dd6ef0dac0dfb0a57c73c5789dd
SHA151d55b69ab8f9bcb1ba1616813ec0fce82dbe6ba
SHA256860a4932d68ffa42e047c50f7da03971cbca9e6dc08c9a9d98311a5700d39ee0
SHA512353df32cd282477f86923ece465edca6aa76413b0ce7d9962231f733c2067156d47e4542ef37d77b644efdd3c8f5f62b171ee7ff11b9e8cbfe455bd37ebd6bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afed7843a3909b9d739fa64006f05ad4
SHA1aca22c0a775025224172ba1a03fc652537c2c915
SHA25606afdc4acdd02580b3bf945305552b44d9c35742fb789a3bc5dbe444e451d8c3
SHA512d080d5d45c942680df87cd2603f463683769e5da962305890e473d9a6ca89fbe6573cb7e48af8dcb25f0a76e0c89d5a194433be3a33920fb521ecb7e2d9cf312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e7047bf57f96759d8604bf10d8ec8fb
SHA1a7bf84610cd2fb5e940a95b8409ea3b7c0f4b189
SHA2565ae3fe30e25d5f2ce79af185c0c3cd81861b50f61399e2c352be318f45514a57
SHA5129e583883c4fd0d678b9b0eaef745fbade87f07f85ae0986b56ecabd848ae801c1aa9166ea902de053774c6612e9172c3dc4ba8c3b6a5d6a911bc7ac8fa552f01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551b955581a583382d6db166aa413fb6b
SHA1933b9baa37a1e9d5cfa1d54fb4729fdde581ea22
SHA2564d8e4430a0e75f06dc1fec58cb84f280f0f1820ff9554b4c6cd92c6b2a8f90f3
SHA512a140925176b09fb2d192464fb043bc278dda8554fef31fb4d1057e6760da05409f3b0804b5b1b1fb0930fe7bc22731f3bfd3c7c4465d754316a43ae364ebd957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5807806e4a0fe1716994f7a05e2d89d4d
SHA19b0e8b8b13a6e33e132b59c9a85aaebea1a89245
SHA256d013f6de8108a4ad971dbe76deef7c29ea3917ea6430fdfcc7502a1c602b8ff0
SHA512877f0a1245e894cc485f4656f1b21910d58da423bd0b23af0bb8ca5708ca9c90530f899a07bca6754acd3056d92e9bddf8baaced8b80bf62cf2044cc619af7ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572117a56b927147de9ce4c4b51eeb971
SHA1d785ecd3b2a004446f54fdb3e855e1d0c0cff7d6
SHA256d86e77a6bd272cd0d46c4d4b62da392cb97f13e50c0f2ecab476f924f2d1c4f1
SHA5124295f5937117728d533c55c1b3e3835d7f30f85d8a9a927aea438d0db0cb16ad97abb90c06b8a8aded76a19c747045a505c400d91126a9b6f2c87e58320e1a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd42e8968649d19dad445995d8e4700b
SHA1f60fc463178f9d576f19a98654a69bdbba85d887
SHA256c9ff0088b9c99a2d5309a942cf752563c48b872e6a239dac15bcafca8c05e7e0
SHA51240d27ac024defa551d94024d769a59a130aae1c8bd267a64956151895d43917e728f1ad95f3cbaed5164e6ddad950ead5ec5d3761fe3f18998747cb663b86a9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff87273e46c23b3f9809d6b281831138
SHA1762a1d808f85e2c21a0b35791d1a73493fa913c2
SHA25676adfb731ad8287d5cc199de19842191127fbfc9ace4ae037204b0c36ed745b0
SHA512713a011be2a5e212defa326e9def6413a1b6881bba7d711071db16f63aca7c4ca04c85508e577e025899da27a2a72671bf531feaf26fbe18a020a1d0e727d82d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580b4fc095c387c3ae72b8851d8a20500
SHA19b45f141f50d4d65970d98e665d0437ccf274b8b
SHA256a8e2fd09d7eb26654c57b8d16a2cbc68af9555ec7bc2b6392786c6324b4b1b92
SHA512536108b1db45e2c1b736ca462d09c25c81dbb5374f3c1dc1b8b9c2d923438284ae04bc7a3fcc3f3b19fd81aa5ffe067d504334d5cc446fc5c473aa5f783b91e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab55b28f3f2c4634b65dc6de747d8d5c
SHA1f98f3465cc55be5eae63cc7c3f8e6b94d1b87ccc
SHA2563fc774cfdeb443588b8df8639d2e0fc028f77392ad3cb13b67a49b7d6f7b3233
SHA512a1d32994af22a4cc525c4f548234bd0ddd75ba82517e375a64d067fadd4bc06bc11a65ea542d9c977ac40d1ca625e5d2377aa66d9cb0067f8d0d145b080aadd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54085a21b8e6ad1261a63035d11512550
SHA1175f119a87b74407729f15844ee504ce14378ee8
SHA256192d37bfbfa870b5ad160c41406e315e5829ec061511d5ca7481cfe26ed89998
SHA512264159574dda113e9883c6759942f8e2c13b828bb028a1358461c09d2bb9c9284c1e5e77602b5a0c22af0d74ab611fa1b5707b0e7d4930f8f639d429f6e3654c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579cc90d962f0116316b68d9313ab8ec2
SHA11e2737b9cb1af54b74fcce8b8607828f80fe2b22
SHA256af835b919ed0a1aef0b58578546b22de7cd5fa6bcd7d34304a17b53f456ed312
SHA51294c84085928caabab4322dfaac7ba14e5c53b948c888e65fe9b6fcae8a833e9f23ae9dbb38359392378d53e9ec3d4570ecbd235f759304b40f6de7ad52234c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542abd866bd9ed870fccaf29a3da21ef1
SHA14dae2fcb67408cf340611f282a013ee04b634af3
SHA2562c7b670d2d8250001da29333bf2983a827bcc2eff28087b93b20615960ddb53a
SHA51210f08e5603195639014fb7cbd4a56f6a27de0e4951f2b3112275423e5d5966e589750aed1e3cd21c6e21ea454090c3af00b488d51b9fc0796a8892234c24ff86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554035df65f77ebb694416b9884458a9c
SHA18ad76538c59898e9ed1b20a3550b29892fe33833
SHA256297c60823c0bd324c3f8daccb03be3fe5f7198488862c128cebdaa6c8859d265
SHA5123b4545073277ed2c39f804ec320436ab8603e811cb43079bd67af84c6b2cff6e3f7dc7284b4bebccecb7230564b968fb33887ac38185bd61534ed11ff76812eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574f4f92a35da8ed4968e68ad23dc1273
SHA11a3eb8f735c94c02158560d4ab7c7dab2726e5a5
SHA256dee4d14048c46ce766a9a968ade1c5552b405af7d4bded3defd8e0d468bbf11c
SHA512b6048602c0e5849718932b438de1509279c80f47753890c01939ef1d6758f2262cb110456963752389579bc671c0064d1e2c6aefe652f1eb16f454fb8e5779dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b7ef65ac9553a8b536d5aceab13f941
SHA1892e1300eecad63c098e2a69eea629f64e30317a
SHA256dece508d95af2aa8d2cf9db01b4f0776016123fd7e8e680616ce43836159559c
SHA512013f7d2ae864d6db49e6962256153b8d79b100df6ee753c65d86786abb35bb62b89ad1d0440893804e55e45799d6b9161909f956c30f2e44b73d70cefebd74ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b05f581a23d848c19a0590d5a1ab2b00
SHA16ff88cbfda4ad008d1e7e4e098067079d963fb39
SHA25615db17fe6fc87e8243ad9386aa83ffa07b3a32037c8d53ded30fc7c17c468fb5
SHA512574ce4b9ff8685802c9ad764252713091eeaec1d5836ce240fe7b7e9e822d21347985064d2ade48f32d9f6aa4847c7ca1a50c167b2d0abde474c847e0aa2ce75
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a