Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 13:13
Static task
static1
Behavioral task
behavioral1
Sample
03524aed5756a1a3851e5de874507b27_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03524aed5756a1a3851e5de874507b27_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
03524aed5756a1a3851e5de874507b27_JaffaCakes118.html
-
Size
4KB
-
MD5
03524aed5756a1a3851e5de874507b27
-
SHA1
a359cca372d375aedf18b27fb3f184946c5ff56c
-
SHA256
f99b91e85da84476b1dc83e78c8b98f4c2b6193829d8189a81afcfa41c0cbcc4
-
SHA512
c6ebbcf06541c22d836eea4728b6ba02d232358fec2fa8223af98a5ce13a1000896f50e30dc0c2797a1443a139e46e88c360686bfb87b6111693dde64b7f3e33
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oAORcqhr:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109454caa498da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420385486" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000004844fd74de2f7215a1a42e9eb7ee47e9ebb78daeeb7f806c3e30c69fef40b43a000000000e8000000002000020000000a17f7758eda333df71150788c208522906f1d3cbafa1ef97e3b6e020c9080e1c2000000014d372b61cfc6ceac222a2fe5ab35761951eaee91c0070edc26b4c6afbd41d4b40000000d9214ce35bf2a982b58b70d2c877342f86b79806a310d6fa9ce7fa56c748f7e7e9af63e4652a3dc468f59b5e4c4fd55b7131b7a848d8c346050f3a976c74cfeb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5D87841-0497-11EF-8414-4A4F109F65B0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2200 3000 iexplore.exe 28 PID 3000 wrote to memory of 2200 3000 iexplore.exe 28 PID 3000 wrote to memory of 2200 3000 iexplore.exe 28 PID 3000 wrote to memory of 2200 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03524aed5756a1a3851e5de874507b27_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c437de39126b70208e5b83ac9950e54c
SHA1675a5af2ae627e595a43f8d4fcee96ad967dc67c
SHA256022fbfc9e6045a42930ca4154c85075ad0c8bdb3e8533fb8400c393bd2dd0119
SHA512b5553558eb3ca4f01df5b196f31d64e56bbee0c01f5af9a9491317866599df12c5131606572393d84f2d728f639221e987277ab0c02e5563cadc2f754afdc8ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e88a72fb9a0440a74f993ac04970012e
SHA16ec42b3d65970f0c72d5a82df9b2dfbbd73eff4f
SHA256b4797c6d6a2a80864564b0cd1cfb27ba58c59882ac09638b16e8b8d9bede5d53
SHA512fb9d186cdefde7994a369ec7b5874690468a29c1b3594952ca2bd77060b1ddc4b6fa255406b6557f2635983230e9ed780415d6f32ec74ba4e5ad246f9b44b14f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e53f531cf333cc4daf84618bbe9687a3
SHA1b8e2568c0a65cb4c88dc0cde1021a728583fa367
SHA256e86a4bf18f7f2eaf90027f9e038840871975cf9ce4e5792e47000dbcdecff8f6
SHA512aca9240929aaa7eb0830ff098d1dbcbb79b2bc39157b49aa33b92d5822dd0d00b6c9c9ee89286aa210bbe6a76a7ec8b297884a848cfce8ba504723b63a02fffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537fd1ed3ff08d2c2dfb509bcd2d2a705
SHA16b471a9e05d02f519cf85b77cd4593deebb0a96e
SHA25696a85d1ddee5d928a62c1122fc2ca32eb8e14d289c22b766f5c0ddfdf0cd080b
SHA5129963a2db5dfbb658695d1d6154940a0b04aeb3374fb1c50ded0603b66e2f75311c2b725da54faf6376237d042b992360f70fefb40664e1df72d576220fe82054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5799ca0862d4c75acc3faf42480f4547e
SHA1bd838ac5605758c64fe3e2e971872e474885703f
SHA256e46854091cf30b72171cbe03443ff110532f01474b63cf23a271f3e9a5ffd49d
SHA51214dc7523d826c47cd8422cd44bd49a8ebed35198b574ed6d1a6e3a86c186bdad75c692d1cbb616280bf0f11c15b3aad350c9a3cb1da0f0253f6f35fda8e9c101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536637f95fbd1d07badd4d434556c654f
SHA194d68c0700c4e2e9488e1f39634364fd67d142d1
SHA256ffff1ad2b6833c680a63b443d7b44da6201e554393cd63011883a36b851c5158
SHA51232c0db61f152575acecb92efa979241a9adec6241a337ea3643239ab6eb2ecf65311c6e1f000a4c82436bb993677c7045f0bc5398ad7df8dcfea2bc15432222c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dddf2691fd7bea5d615cfbbf1a2b9a2
SHA167d986c11d226108b2667666daaf554bfae43be8
SHA2560977991710d843a4a5c035520b44a33a2c438bfcc9dac8810c177aeaec8a66db
SHA512f49b915ef5fb4832481a412be82c123ed8bea746cc7633c68a37d6fe5b7467d9a2a3159c62f4fe3c1568e202033a58a1924323f894e3364e59a268fd63367e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587692051fe2f4bb78c9dc1c49818df40
SHA192930f91b7ce914bb8df15c719d2ea4861e70789
SHA2563bf62ec82b0b2c2de10822ff540c7d58587436b718595b0103a1f407ad096b7c
SHA512b90a6c90f143789d653dc56c29ab4bde8f230ab1ba470e18cd648a25360cf62eb4068153dcf028bceeecf02c4b6c0adb2f88e54e3280146a8518ab0aeb3f4a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e2c922b1a56e90a46f272ce9dda5511
SHA13e8c259f094e4e59f88a50c045f539ceeae1075a
SHA256d3ab121ef8ed184bb67040f38f61289ba7ddd2493514cc10189b9f88160ceb2a
SHA5122b6f1f24d5338e287b32a7be8b216480979f5b1eee584f5a434dcf9bf4ecb7ad8daaf5b162d7605b122dd8d969514276cecc6e3a0e1ab734644b149a0f9a0fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d468cf63f21745aeb528517721b3598e
SHA1b372994f1cca17611f12983e4249e48bf982e27a
SHA25669decbeac232597d333fae8d2cb893d881ad256e1aa091aae8e190f84b840cbe
SHA5126aaed8033114993f56705239f4bb272394b72cf4a43c61ceea0129aea756fd7fb7b25e1951a9d9048e9079c69146d88703cf83316621548d6f8114feb01fb946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52500cd25629544b2d8b5ca0fd5a6613d
SHA1ec2701de78ec92280f86ad8ce4744f754e9403ef
SHA256cc749e7356f0a6bde0a8763bfa78e075cf3dffc7ff98f0433577bb59735b3b11
SHA512117707d47820a0cece09eca837b5eea59053077fe7801ca9ff472f1350dad505d1b5a01dfb57d90ae91107d59a146635a425361418a7deff2b29f83a47408900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e14c9a6f36cac274b513390ba047ce55
SHA1b202f52dd60e0cb9ea39622ba9995bcf0877842b
SHA256ea678021ea403bb8ba0be233eb54b9ddcbc05d092d0705885f9bf1c7dfb23b26
SHA512c002973e1ca81b7b40ccf35a97f0b8866b12e1cf5d593d4a65283bd8f6e1eae3791363cd10cda46182d4ad505cb7a8bbf1aad18bdf85b5a23cafb0968b0b4948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569eb7de900db64eb64f83b1dbfff8440
SHA18c088c0a6025b70d666ee97c224cf6c9bea2e987
SHA256ea35c2a9e2efa5efd122b4f29afda97658fea1a5594aa2c07b37a544f4939031
SHA5125aa2ea4509989aa7031a06fd324607dda94492869f9617865b0cbf6862db8d72a57723f4e5f9ab1cc3336ee0bc9051d1bded14959efb464ab6ddc7c08b8d665f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508484c0a21915bc56099a81fffda2c12
SHA1936a31eea96fdb8e3d00e7865fc715371515e4c8
SHA2564d38a9d02bdbcfe0407e40908a91e23a0ca71dee15e0ebb5205107a1f745e70a
SHA512f84e6d1729aa845251dbacff8d6c769b48ba878a9dd449ad1281c543d362411dc2215dc924b9576d451ab50208805aa9a64195e4467e176cff3a71f1fcc2f9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5051452d87b6b7b836930929b6b175dbd
SHA142fea6f2b529fabfb87193be3c78e2948f9e88fd
SHA256369dd33f033b92f71d43466e93774a88316a511331b21b24adce07bc81e3bfd6
SHA512df9a7b14f6288d359ce302d3c721a0274aae705503277960544a3ec0b84ed426576b63a7c5282d23e224ad915cfbc811866774aa559910ea0ff835004354b5d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a649f96cc974df98582bd8b10868645
SHA10deb31fe18360342c621ed6af52d5cc786226510
SHA256c55a88666510d47d5f835076c7e2c29735e0b2c2bd00682c589ec771475307e9
SHA5121876172696750737b4472eaa5d6f329fc3d381d7491d127cb5ffe972aefe3365b59b7db799cf0a0efcf29d0623d1f4113e746a2bf3ec469f0bc4afcba034d250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d39204e0a46abf55aed2d0db245d5be5
SHA16136ee50ea13b455ae7d814d8004b7c5788b8ed7
SHA256c1a3c704c68109c67809988281137d93faacdba5e13550c164c81f3d79a597ef
SHA512b8a551f0c9b956d5e797e5d609c7f4ede8c0dd19cf5b46a22da5435294a2cb26f616ba5f2c6acc000db220ebaf9eac669042a9befd7c3c5a2ce8012e47741ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5091962c536e1331c47cb7350cc314310
SHA17f0b9f8d9ffae4bfd045ca762b5dd6156591f6a7
SHA256d1ab24db8f3feaab9546fc3ed093af7479660eb14c98e1ba959b33d683814c3f
SHA512a82f4353787b0caaedbb110b96f72ed17f67dbb8fbe494815955edb371965fcdcbc39f14a162a884a7dfa0667ea9721886b73247697e9eea247b969d10dbbbb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b527bf7f768a2c7717e19adefc8547d5
SHA1c2ae0d2fe243e86096c43cb8432d29f70cd447a0
SHA2562cffb5be61c56e5702aa72336e0f419255017b4e644a357710156babeb7c1cc3
SHA512465b12447ae066e548a7717b6d267fb1c96fe1b86926b952727540e7da13ecdd56965f9540efff5312bb9ffec8379de41cab8affe0a6a6757d6cc9986813c55a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf81113c2e5a68b564f688c483564f32
SHA1b32900a783a4c49c7ba43adfa16499cbbd1c0ae8
SHA256d101dc75cb313a10c76f035c50a0c0e5bc0a91eba89ccc33537cb6dc19d8db76
SHA5120507186e083a72748fc535c56fd7cedf735c021ff719bd105131670f3a21ad6a7736d3f5f84f5e62779b1a46e606329e98f1abaccb57dcda31d3bf93373be220
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a