Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 21:13
Static task
static1
Behavioral task
behavioral1
Sample
6c4689edd1845af94366a570bf7675c7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6c4689edd1845af94366a570bf7675c7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6c4689edd1845af94366a570bf7675c7_JaffaCakes118.html
-
Size
3KB
-
MD5
6c4689edd1845af94366a570bf7675c7
-
SHA1
e5ebef429ba58dfd2db157277eaeba05475d92c5
-
SHA256
e0fa481fb62d3b4d1033111edab893b539160c8947f603882a58b7ca38af981a
-
SHA512
6d9a034a39ae34b5eb645bd33f673d05c472d4b656146c833e0aaf96b744c142ddab90a89d2e036a21a51c8b2eee3ef23bc2448327cb51a7a359778b4d35436c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000767e61ef9879684292b5fea24c8cf2e70000000002000000000010660000000100002000000026ba845d1b071ce702ec2109a9f1ead2459b7f2c8099e4ce217becb186ceb0f8000000000e8000000002000020000000e3d6be0ad5d327886eeb8d03235e1a7bdaae337269498e03ffe1533fd10be7f820000000049aca0895b5686307be77e616e01c305edb03be0a2b585706dd4c4961f852b84000000024c5bfd7c6003f42a80180da09746d147b89fe02daae9977f67a7c9fb94c1cebf2271e40eab28c3e841a5f42e573efcf70c0a9d194c41b3069153a931b932894 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e6d62356adda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422660680" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000767e61ef9879684292b5fea24c8cf2e70000000002000000000010660000000100002000000056be8647eed2ca3d94afdd553f41061f565073209867126c2441c5fb2cc3677c000000000e8000000002000020000000bb770c30e490d278e193fa0578b13c24aa33dc444cbfe20d03b2dfd878e032ab90000000b0548153fbf87eb2eb0c052d60085df6c6ae3316529a21df14ce2e11c74620666524f69cc504f2e7ca5649c8d522801424a65233de88b569d0e188a0c6d3fad385130fa7e59f169c34ef2d6a95d15a89296a41787ba055a14de366b3720ac785a847a55f56dc8320ff5b50afa86c46a6027a81ea4d3f3142f2c5040cd4919521accff423a74ebd89e88483dde739dcfd400000008b669638acaa2788a9c362911e66510c5732251e961d358fd9fa2f7227b865a4f92cfbc7db7792427f1c52d02a8f6cd049512bd999d242f571f38c6267cd01ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F391A01-1949-11EF-8A46-EA263619F6CB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2164 2336 iexplore.exe 28 PID 2336 wrote to memory of 2164 2336 iexplore.exe 28 PID 2336 wrote to memory of 2164 2336 iexplore.exe 28 PID 2336 wrote to memory of 2164 2336 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6c4689edd1845af94366a570bf7675c7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc48b67540b55113323978a3eb008885
SHA1d366c088b5585506e84e20f71432de66ae61cb97
SHA25652cf9a670aff225959fc5d840a42a0d6e8de33370c45133124c16cba332260c8
SHA512c13b24dcaa5f5a3d9d90e6532b7fb385428bbc6b4b17b9ba083ceb272337a8fcedc6e0575b867bb684dbad4754b5400ed3f035035db5abddfa5e574ba438b140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbdb0ca8c0df4ee492af2163c209fc9a
SHA1dca42c14b2688ead26b61abc83a712c033babd95
SHA25625a405c93b058d325ad75b69e24c20d091f5ec7b671da80f0bd4781f2a7db6fc
SHA51254ba1cf63aa4d7fafff58f421429ee3d2ab30235b09db0aa554379e6276c51643613e79cdd1f417f8f2b284d3371b5caa7a39503325b2da80d8dd89c1e8f48a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c543b2b0c2d54d65072eb05c4b074e72
SHA1a1fc98522ea64a5b99d44ac7365c81bc66b95bfc
SHA256c618e36b36b0219566a586ea5d3bd19e1f8838b591c69825653d0acf0b821474
SHA512758abf47148add0f08fe94bdffd890cf1f7e66eff7d83366f124d3345522dc5653be8778e871077194946772ba5aa6added029e61b515d904e3489a02811b5d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5712c0d85bd5d48daf6b95a0f76444515
SHA144ecb41310dc08213644ce143b19210e5af2780f
SHA25665daaa83ead63e04fdf79c3314e253f502283b471b96fc825b13d05d86996361
SHA512cf1d8eb7b16a1696e1de7ebf5d4b370e05fbee4318666fca5198561e5f2dd3d40a26b80fdcb73526e39dc8cf7f5d6c44621dbc7320398ca70811399530c9e4bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541853031f7b7247906570147bdc330f4
SHA1d295a5de6b26d0668d2adec82db3337887bc6aff
SHA256b2b994e2a18862d71ba2fff217df85fe223a935ae8bb085e8f3ada57e7d85d40
SHA512242d955fb9ef0944c38787be23b989d193476faf75879c3cc4da30b9d9b1f20eee60f4b13034e48177d6cafba3648401315ad2330f8bfe04235f1307b8bf4ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555ff6b16507d1343bb8b6e9f3d6760cd
SHA167dad6d151c131df5927b3abbb4b8c14b7555c48
SHA25628cf0730628e6070319210215e74b54a802135397e3ee82d3a17e010b29f2e8c
SHA512153706aea8d098bfecb9d939d59f12c342a992e2b42bcc7abbbf743b46f0b98d7b9a0940c585c769ed6fca71ebef5db3a78fa602ddce8f6f13611d959cb330c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58283627ceb282ab0f0f5b3b4391334f6
SHA1b78c4ee056c372558e6bce52ab91c8f528f66871
SHA25698c8c53c98a705bff73e5461a0dd4c57f294ccdacda3a1b53302fed34418e025
SHA5124bccfc7bb67aa8cf31030569da723df64cf726e37fc39632dfaa55d84b7b6eef531a8a5919fe2b752801ed60f3b03736735171f8db28cfa67122bd1d47a0aeea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2bb10fd1af667c0bc68259c4e59482b
SHA1c8c7ea6d04eb6fdd8a5782ed2d28a1c126b012b9
SHA25623640c4ff58ec27d7932722ddbe26d3e5a691d1b417f077b95f625dbe546707d
SHA5121866e54e4295d8555df63b26718fe56785b851b6e02f73dae0a9138871e47f370d081e93c1f2f4b1a59d864cfab65bbca4d715f4cbfc7add5a5085ab72b808dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd69fbb068fa5c8dbbc895b75613c1ba
SHA15c02e40dbbcd08cd55d08212f25f7d2b610b768d
SHA2561583af55c86ff53d6be062d031998fd49fc944a50561b641f1c985b19e2d1077
SHA512c459a1b8f1704ea7d0c4e7d87927676f7bf445c5c47cce92af65f4d86c27dec7b08f8411c2f83295c2eb18bb929d6dd14c53198a67bfbfd4da7c502511734733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5d5b9885572a6f1d57a915345f5ccfd
SHA1fa629582db92c699e1a43bb40228039819c7c434
SHA2567945802f776af03c84fde9f78869b5604631da8a687ec2f56b43b08643cf2141
SHA512f70f7f1b5511581c3dd175feb02a6fd127980b588de0bf23244558f9542d9429f98a65394da7ffaa84e90b98acc1d85126661f7beba185d24732b49c7dfa573b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5952fc2c1ac80697613b6084bae242e59
SHA1bd776da97ae28b267cb13a837a236968b7cd5b33
SHA25666787fb55a9401dc7074ae9ab2888d1fabd62a0d185be3eb67ae98d826f95db6
SHA512986c14d99d2122df31c94a1d742acf04ecbf7dcc7fbacaadd5a2375100821a7f0ab7d118361d155e6b7eead94130b74ed1620814d8f638bb44e2a962922b44b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5250a10dcb07cdf0fa426039390aa6a7e
SHA17dd155cdfb6bc62e3c130854731aa356b6bcb893
SHA256ce52b33fe7a48ceb07c9acc1c1e9589f4c1ff5ef53a3bdc56fc7e2035040a4d3
SHA51288cc5934b1fdab506db4ecdd6a7c26d6f3e81a1e8dc2a25808d2a3d06566e072c8648582ce8922dcfab1b84365faf45ccc64a8e1828a5a006f804d052cacfd10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b47bf4cece06d1a6aa80b7714260bafb
SHA1ff05d9cfaf122d0e7a44ac603f2a4c2281146f4a
SHA25609ec07a419820c1c68a68378d54266534bf4be926f2a889bb1b99732d8352092
SHA5127f822189fcef065c00b2dad1bf6f12c954b931879e844cc2813b525a33cc385bc7e218e4b08f53cc8f0402e829a8fe83e58eba94846c45d6e49848c1e54bff52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c241f39eb9d2bf1ba09f17968c686878
SHA1b9758892bb810da4ba46f097cc9f03885ad3934f
SHA256d8f4b17322ec1841aa8c84cb38b7f547f70e56d08e833e75973693200f7154d2
SHA5125c3e0bcd67c237c828c73c552b32c31c616642d20892b352f80e2476b256b664c42dcd0191d8be961e7da42c821152a18a826e5753c1d1f8a6351c8ffc8a77e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cf8f47d10a28c5560ca1cc93021c77d
SHA196927aa67882f655e51efc36d37c392e07e73524
SHA25621a142321a9f8e947ec69addd677b6632bb9e552773c333c3891477c0daa1883
SHA51241fe930bcfad598b5290cef0d19243354911c8c5adce2bcb45245233e843108b887bc2ffd52aa467b45005acabcd1df2782e8b96a4390a0402330a196fd313fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3856ebbbd1c738596df460038340ae0
SHA121cb631892049ca045fc04d7dcc33ff33f3b5cef
SHA25636275576924e3d45248898ac9b93cee015831c943c278bf11c9c6585bb18a763
SHA5123c542a23b802cac9fbe17d32d9055dafcf4748c061b9d3ac253d98d5096c01428be5219b47aad7d76f72889d2a4725f5bba29ccd462d226c6e816e84801839f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593eb73f29c30bed27609b44d3f2bdcc0
SHA17021fc425f62a58ab35e51ff527d78a40dddd739
SHA2565e106daf65cd5dfd15c5c59930fbcc81eb433a939b66b40a475741fddd81f701
SHA512e0e5586b7cf336edf6d0224db81a1a39d2a36a2ee43050fe35bb309a70d6f108da1b4e8a49617a68cf7476750c0a778dc9f11caf9a80f8f6f9be722d09d95f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3efbd18a65c530587e0a3b64b5295c9
SHA107ab91d5c23bbbbcac8e7c34941f599cb6be1eab
SHA256de49f37677be8647204050b705a47d4ea3fef28bab148a01fdfb706415c349d3
SHA5124f8f3364ab1359188149dbdb9d85bed172a8f920b07b4566edf84cbc3ea824a5511e308318f92aba6400194b2c110e24a92d9be77e0a34baca9a3878fddafeb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563bee88fc31fe0efb7a20fe99b714bdd
SHA174948b60a21549361e8fe2db9bba1522226beb4b
SHA256b048f9546204e2736778d8102496deee5ba500e80217afa8feba34b2f5a8a186
SHA5127835d05ce16367d2366b83a2cc9fd3cdc4fe4343f06c5b1c7c112cf6ff761ef4316c2f962e3841d69efd86efaabe77b2b15d0beae40353b17330e8508ab1c5dd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a