Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
66940cee8b7e1c42e57a5c9f14dd7b1b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
66940cee8b7e1c42e57a5c9f14dd7b1b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
66940cee8b7e1c42e57a5c9f14dd7b1b_JaffaCakes118.html
-
Size
10KB
-
MD5
66940cee8b7e1c42e57a5c9f14dd7b1b
-
SHA1
2a542c3e25a68b1abbde7d2c7d423d5182e5b667
-
SHA256
486ff0cab153b08d231dce394653de5f56568a386f5e92bafb232d86223ed08a
-
SHA512
425f8be428df6479d0b21f79bc7d7927752e06c829398d3882a668dac9a85b3f8b68a605ad9c4b1802236e31b75ca19588a9e0ea4042ce3b1d857380bb940ee2
-
SSDEEP
192:iMoUoV4WWy7VQ2dUVpcDVpnqhxpRvHArAwAvAFpA81yqaC/QC9tvJ9tKoo2+w0/V:iMoUof9H9K2+w0/e6vzqQgDu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422527052" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000dad60f68c8cfcb37f27952ce0d1e1a6b69a89bd1a18222f28ccf9e55f16df324000000000e8000000002000020000000e5d51a334c6f2c3b6e045c7786eda583923f7af7080365584f1ee3d6bd0a6b5790000000a74b9a10876665dd885b3e804a8f91cdc3f01ad5d9cc07886c3755b551afea8e11231eb946d1d1250037ee418877146f8b7d528f38477276f9681969616acff4baf673cdce1f6e3153c91d41d3c043b07b7d773c505827273447d745ede6dc0eb55a0f69494b2ea6f6ef1e642bd009358f5ecab428ee87d0e358c004e991ef2fccbe4633a9c36a4c5f0dcc9a211beb4c40000000a4b8ed7eaf67a8d942f459a89abc2fa5f6d3a24bf5180aa73898f17f6884425d82eb0443373575d14d29e5ea83babee986678f296890cdf413f36069de3f09a9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F403E01-1812-11EF-A1DE-66A5A0AB388F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805b911d1facda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000004233940a0feaaf56e7676835bc72215b046d9fcb8e81eb4e2f0968af93e1714c000000000e80000000020000200000002c922eaa9dad2afd05b5bcf48d3b1132468fd23030df3c07492471343d51b7b7200000005e181688d29d2b3e24b066c8f0b79b7926c7f75ae61f8f4276ef9400092f0a7d40000000e7bf00fcd1b08cef2177560a74a9adb231d07a418a2f3130a992e28c44b0d5f631b7dbcd000c7abff58ca1d5c2dd98a09beaf0603566d0919a472ffc00480fe3 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 iexplore.exe 1708 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2460 1708 iexplore.exe 28 PID 1708 wrote to memory of 2460 1708 iexplore.exe 28 PID 1708 wrote to memory of 2460 1708 iexplore.exe 28 PID 1708 wrote to memory of 2460 1708 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\66940cee8b7e1c42e57a5c9f14dd7b1b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7b8d8edf4040a70c4f18522c2338829
SHA1f089da3c00f0764f6dd1e0821d11fe36148b09d1
SHA2562f9682309766c05fdab448ae7414bdf2c6dc0353fcc0340efad77909ce3310e6
SHA51261166aaaa25aaf161e581567f136fb08b075071eb0a3da0eac31cb64c608e233ffe79fc2f6510749b89adab62fe9cbfbb2b48dbfb58bd853f7d8c60edb82da01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596b9ca0d9950cd99b0c2e31bd91242e6
SHA128faa1977e3b290db3c2ffd189d4b9c5db1a6244
SHA25694861bb515c9397ced62d20b215374db5282725381dba9565a9e64401dee15cb
SHA512711acd8f3bbd7f5bcfacef4095870bad9d9cdbaa040998a268263c301066def8e698761c42131704785ba2175f8dc8581e9345205026657691d7c61a87db1d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e93c9b647a95041fd94541635b2f50e
SHA1cba82e2c2066e3cea3f49be847dc842e228878b9
SHA2564dcc972c8a9f0bf1b4bceaf7d903282feff7a32c4c0484a620c112502851b963
SHA512f618de2b5e924e286e2f085eae5f189edfa7eff1ab1c645148acabbf1a95b8d2639f5329719f97741fcf46c3ceb6a5cf40ce15e5f6daf49c08ac2cebf8f3a1ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5c9664571ad45b27ab04ff88a76fa3f
SHA13293c2d101171587667a67912cd9cb122e294443
SHA25612a21420bcae8a1d74dadbdb7307fbdb30e0e415ebcbc76ad0591932daa2e0f8
SHA512bebd8fcfe551bac808d1fe1165871861ca3e8bdb20c47f02862914f83c5477575f3c2505db067fb4e6cc635d547d2e5f3959ffff793d7f43d88b54783089b253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58766c4897970bc033920985b70336f12
SHA124ec5b1fd1d9843f237305dbe625f7d02d0f5f46
SHA256ebda5d9681792ee0d5759a59b1277ecff3b8ce8838333b9e811682e3b2c6e66a
SHA512c5924c741145cc2285839da066756c80727b6d6574701bc8e1efd66fad260dc69dc2909619a4f0a6fb5e8b9da6371600bdcda90852877710fc04b6dc97dd8600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f29de77cc158cef8aa42f4bcdcfa94ce
SHA17ad0e5730861e8f423007cc3fe82e351ecc6b5b3
SHA25637772ee60109d13fd5a9f1a28f720a4a8dbd6f00a64b21b1c26a9cc878e93488
SHA512b855fede1a2104bee5815e3aaa7a70db0419bc131594a5592190b8996f45904d39ae41e0a02bc6c9afdd8460642c6e45fd9cf3b6f7dbe1c34a6237980da236a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cadb792d7e39b5c8281427f8c8316ec
SHA15a56bc871a9e59eb54a281630a416cc542c73b6d
SHA2568b3124e3fa0929dd178a8f1e3f3d1a5850172f85b08874866d5ef9d8ea2de767
SHA5121dd612bab312299f91b550cf789fdc0c88802aead3ed26553e1badbfddca6ad4c149cae96efaca73d7cabadaee2657f71c4a7754d52ee123bf21edf2148b2086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55409edf7c9a6fd1e54c4126ccda7c9b8
SHA1191947a0f7b8558963d89a11491a124ee32c9421
SHA25681fc356d9374eb72c8652a74203f402acde91cf61b9582f32d26e6f351988c5f
SHA512fba168c744a6a7da235003bceec5fdc2a3e18eb1ae658697531d48ad4365ee147b39e958350235a0b946b2677346c822486502c87eab9f7b3dff42a3ba58d402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543ebfada938e42ed92f025066fd42c89
SHA1c905ee7ddeadb06e9d4e6f0eb35c2ea9280bab82
SHA25662319a3927c67f3a67eec7b5e1fbaffe0d0484459174518f0d949411e3528e41
SHA5122a04b3060143590fc7e401366488f0a5876b305dbbae66137c1fa9fcd5e106da7f34d139c8fdab51fcae27938474343442b4856699b606b8a19e0a94efee58ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc9608d1bf8aeb5c71065612096a76d4
SHA19da67d040c5201f76dd82b0087208f38d32206c6
SHA256a7e9978ecea87a5143e8ef0280ca742bee52b88193d88502b3f23e4c6bc2ce7e
SHA512e5bffe10af6814fc2d2286b9e9498ca52d42c24e84af7723ae9ba067403d9f69db7cf209defadae3a81455a640ce29a11b2d9c06d86887ca6d3c3b7e99bdd39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52646dc72290902f5f056f1ea562e4936
SHA105afb950c0aee2685c4b11ffe8f95de6b0d180f9
SHA2567fbc128cd30d408af4215f99006063e01e761769378fff2e976aa71b554332d2
SHA512ee1788fc80262460b5a6797b2ebc689cee9bff8fd0057ae2a4f6f9db2731a63a614cafccab89ed060bc329724a71bf27c387f60c91b137f0c2705cb071aee501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54aecc53668c18d83a0f3ac1b2d13e1c0
SHA10c9e2b3fa818fb11926a4b8280c5ae3ca1e42b8c
SHA256cb89940258c55a7230bd72bd06a1fb63ccb6d18ff6b4ad3f4f271e50a78ea9cf
SHA512de3a9df77e8a6aa39e0c8938ba45b9b455f4b63e68152e9f292e987eaf316b4eaa9d5081090ffc54e5e2dac9f535b1470e7c01584f604eb4bc717876102cb6f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cdc400147ad9f8e94967f8bf47c3ab2
SHA146c72345e1a690cb466369740d89889af881b4cf
SHA2568b1b073262b28af7a349f250f417f16e96eb11ad73af16de225310947d0b6034
SHA512155609a8ecb5737904d7432f3057ac5e5824aeb14b2e55573e5094b8e5a1337fd0289d1023f7a96eb98d57a5f239b62e56053225053890d81350f8b6f4e6634c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588c960db89f086033751125ade0541e1
SHA14b309a455e58e4f56008bc601a6b803772057009
SHA256d7f139748c204dcc24149756c05f77e9474bde0c1c358510f6a939d4488f4cea
SHA512b338f3b0d92386b81eb2278b1e1800cbec9bb22d96d549d075e53d004c780cd86a8524e21bb014f45d1e917857ef95a6493c5bd9e4c52331d5f2f622b481bdb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b21ae6a54a987882a8a718008b6dc951
SHA152196d5fa111eb8331d61572c0955397123caa13
SHA25655c255526972379a1a9a1face546c50896c53a689dc5c07c84b1e10b2cbcb593
SHA5128235eb4754632bf9e137adfe3b64b401b0de0ae9f9c77a5e9c5a102f50ca260433e0f817eeaa751a82beb32e6d12dd003911f14de272a145e5c39d68aeb1a8ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562bfc1653b1675f1b51d67d25cb074ae
SHA1fa6e3e363ed3def09097ff49626af2b56db91f04
SHA256db20c964bc845741caffd986b0e8e6cf755c995f17e4e5810b6af18fe0a0ff54
SHA51251a204b2584a26d3be7f4e57c66e48e37a5a94e21026b6a1b0e8493ace3446f221bb6de4baabdaa9ebc5cbffb5b146bdb3d5990f01ba748b71bf449eb297efba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2da5d369d6f5ba383f04aa30667c2ce
SHA1e16fc521d6b63eee95cc8ce85c8c2121f7103fc7
SHA256d438713c90a7e16b16343247ad86767fd851905f040952d2266bbe2ddd915fc7
SHA5125f4f506bd517686d56636a13d69e1d17ee9765503120e98954fea8d2b6d13b4d8bf4b52978dc951602c164a67ab8c8c81a9f9b15da8546387b776c8b8ead38a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e73ff15d1fa01afeb4c2e201589bd6f
SHA161719d48326d6b45c01994a1d23d14b58b695fc9
SHA256d97b3441c6cc7634cd95d1940fa42fed24ffefaffdcd789aca7705b8c5560895
SHA512389fcb5816b9a961fbdf6b4f07e33b13164b482431b2fe3ca0e06eda7bdf553e6f08a89d5e8767e68b5ac5994e10ba33f99109adf3b0d200c3073ca943fc1c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca48592b0d67eea62f444502a12eb61d
SHA1a94303efb6c5bb40f69ef4829979cf9b73dd7996
SHA256dea92d9406e63d278b1730f6eb238d228d5cd37926f2895702d2c1657fb338c5
SHA5123b3d98a8d59c77639f162342b22fc157928a3f9e77fd4e225f2b2a5eccbb70ffda8fd9dcb25d2fe29f9035304b3bbd8fbbf67b3e5867b3713106fb47cea189b5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a