Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 05:52
Static task
static1
Behavioral task
behavioral1
Sample
2893f9281f922652676b8a9e6e16a41b_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2893f9281f922652676b8a9e6e16a41b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2893f9281f922652676b8a9e6e16a41b_JaffaCakes118.html
-
Size
460KB
-
MD5
2893f9281f922652676b8a9e6e16a41b
-
SHA1
42823f83402fb7cfccc41cf4e8cd18fd0bb1f35f
-
SHA256
3828077ecc3a2f96f91308e590f41828b8a228eb0692153dd9959cf94eacbd79
-
SHA512
9a2fc2610d199e43ca17e55e996080265bb234b138d86e7591e6b56b5fba9d2620d2428f1d62310caf32fd7a20bd1a8b8d6b5515abee03910b318a1205d98840
-
SSDEEP
6144:S2sMYod+X3oI+Y7xsMYod+X3oI+YhsMYod+X3oI+YLsMYod+X3oI+YQ:55d+X3d95d+X3P5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000418d8b0783d2d305c4e6dc4f6cd98efa81ec8da2cabcf10a934609821f4e5f51000000000e8000000002000020000000ff20c1fba1af9e2fcfafb8ca5f4a1282032613b2367e9c063c38aea7cba691219000000074c6c71587e07e708788af9c278216c049972919bdfd7cdf08f6d96ae916497795c21f1a321c306ea88049f5af444eb5a58b57dbab94bd85192b2d1b8e4ca4183e1e7a766c1b705d4781620ef139400f1664d99d0e135cf85bc46f038cd508d58fefbf26cfd7addf9b700ddf4080486cadd8f54d22fc005910b30a86b075f42644a27baca375600c4db2d03f150551c3400000007ed088501c23121c2ccb77642df9c4d6c5d14b98b55b0a1dc0adf6a87aa1a534ff838c58ba25f35c9000734be9b443388307c89d28142c61fdf61e7fc9602bae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000088ac2657d09c269e3e9ae3b4051a0c2d44d2e6a4778229cbca5a4cb42e2c403f000000000e800000000200002000000084deb94e6fb028ad81c6ec9266f9c7616fc5e82061a92ee2646e4a4e05d23e92200000001fe4de9d0c126016d05618360680d332390ac470b6f441f0b8f6d7c208ed2f1540000000b0980cfdcc28e59457371ccc47996bae7c0ddd0a67ac48c96c0ab103f495e00b4a4a38aa0a2ce95a4d621c44443b1ba65e63afef3c3ac4db08903b59eaf8f987 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c7902dd5a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55094D61-0DC8-11EF-84D8-C2F93164A635} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421395821" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2612 1760 iexplore.exe 28 PID 1760 wrote to memory of 2612 1760 iexplore.exe 28 PID 1760 wrote to memory of 2612 1760 iexplore.exe 28 PID 1760 wrote to memory of 2612 1760 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2893f9281f922652676b8a9e6e16a41b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ecc06fc3f189eddca444cd9753d39d2
SHA16eda1c757f9146cfee05d9b29135c9efaf2f300d
SHA256e00e1d3baf36bb5b253dbb6b0cbacb1d09f1d8c6e056d21c09ad4532e8e3ef72
SHA512edaeffbfe93e208d60f8f57567324f4a698c9ac71e4fe23fa16ae9456505ae9b5c85d1e41074d35ada6fc53f4821e8ae49b536f5636fdc8ca86ada79d8c66aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b01f96a2d7af88a165b174df23531b95
SHA1bad08c317e3b75769b5e51004a4ad73fbd184576
SHA256b9ae83d5fd35b6d83d2dbc456133a1e793d5ddd16e7353a520875ebc9700516a
SHA512344ceec8385178c44fb4d350be756fccc0179f8e9c9b077bd49cccdc050d132602da3f157797f62d4bfafc5eadd95e35f4abcfad374b736ee7ee8e6595036d9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567c78a6603a76c3ce2eb62d5bbb3dcf6
SHA1776ea5c6ee516c71136fb230e8fcf4b981ab745c
SHA256f01d1eb0a84214b9e86c17e1a4f956f21d816a7ec1d550dbfe58da0b9c49ca74
SHA5122eae0562e45f473d24652cf5ca4cc5581096ee1d5d96422ef09af5266ee8cefa4ea5479691ca7905242c50f8e649f781ac76efd01f891a1b8719ae7ffdb729cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57de1383da7a6f9c9bfd57cbca6649bc6
SHA1192360411d1b6bf6ae0b5be6555144c990e31d35
SHA2569c34cfa8be0a3e0e4626f10cc23d622a3a7301dbf1a78de48c60944d199d1cca
SHA512d08b4436a4de2d9ed04922e8d24c48d86e988f381d92f8cdbc782b9be72c82fd2a888d67dcd8037da00a3da887ff0f5c2a7874dc1480bcdaa7ee8401220c0d87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507bec68189a58337da2a47c0cdb29bd5
SHA1180d36b38605118afd1ff9059bcb2c9cea3bca6a
SHA256a4224573afb5cf54d2bbe26c22378f74a1b56e93b32a748769b810ef73500dca
SHA512c699cd8fa75d0631bea9157ede39479d757aa1c4da22047be521c242d721092da4b1e1dce51db1083c8c7b012913e61e785bb6fbddb4d809a9f5ae9bb727f2c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b263abea3056a4e809463cf4a5131bc2
SHA16538281482e08def7d3381aa9cba80bc2369fc51
SHA2568a449fa481f5121ac5b06161dce0e7025396f394949ab71dcf1b5cafbff4448f
SHA512da51276ca2a7fde6d82f1611f8c213ebb6e82c0796589d462dd1e5f1d3ecea43db235b78cecb361039541b029b587b4f35169482d7f0c69f74744de5650fa187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5971fe648d77b789d85a73be8ad8b55
SHA16809c201fba37416721671b3ce1bd6e7df62d35b
SHA256ab8b0034e33239ea24822939a01666c7812c5a19481421b959ce7ef84bbd8ea8
SHA51203447bb6a11e69ee806d5a1d1d3bf1bcd7ed75aaa97f398b3cd2472ee639e296b4508ddb334a163e0691d308bcc0a2021a5f3369d02cfd92f7b627d20883eb33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5fd823cf6cad9d2e3abb87401802c72
SHA1f3d8d267905a07ea194d38318dd932cb5b1a0d12
SHA256cbda50bd3922ca693a61164a65523829fff5f04c58ced8218e5c95105f5e50fc
SHA5120a8d463fb6a48c601af086910fe4411362d5dbc625a988bbc457686cf5d54dfba5bc887491823a8f0abc373d29ea97bd32fe57798fb1bf79ac4aa21b03130525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9e6b2a6d8ba1e5f17502df7e94c42db
SHA16f19811b71852059d3771c9147b03b9cebc9d0a4
SHA2560b0311a6cbc9eee7978df293b049727651bc5f7e3cab65ae0f77f2081e6be17e
SHA512759ca4c88be1430c2145cae53f47177acd642aa8ca557ffa460698aa1d9fda00fea6c4f813b8c7c76b48da84f4bed38c80a7ab438aa59d294d29e373e6b6ad3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a10921be274ecb46ccbf781f318b79b6
SHA1e76a3546d702da34c6f05307cbc6ccf4ecaef197
SHA2560326a69b9cac52b851fb630ee98c1c8cb8f42313875285c540a397f87c428004
SHA51203a341fd2fe7cb4c4b6f47bc0c76ab4495e8ad34c36fe7ece03bd3dad1ad936e80db7dce1f5d9d7c0bfc5582eb63f9ae69ab50ba0b7b1f1ee034962b7d677e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8a2a236c0dd2dbf855905a5c2b03a85
SHA1ddd4e0bb2a3060eee14102dd53b91a09d2b61b19
SHA256cbb0e43125637ca338715dad55eaef9c50ffbb3a642cea0667649b40e528d4c3
SHA51264f8cab15e5d0c74aa07bc6a8ba53c4e77e56dd3ee8fc578673305c95f48823d6109d6b0cc2e00c663cdc0d57499833a4762aa20a75bc6f0373ddec3ca7204ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e23a304b0e4f035cdfa35a25dbf80276
SHA1344978b9c142e45c440b81942ff52e6b2ae55c03
SHA2563de5142f1d085a84c07d7eabb496e675de9cf2e61f95f7eb8ee1c5dc15d808d1
SHA512bc19330c4719ea30ac571566b4fec77a0d60a24a48d0a5307234fc462ab0033807b230572573d3981c0d31ea2b1fa092661c38ef2e35f9754bd76c8ec2b6da83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f50ade71a5acf7ec4026e5f6b565916d
SHA122abf82655b06b3dddf225b8181e73f7f7a1ff18
SHA256733c3820a32f108b8eb9f6c4ddc6461ce3b10897394aa0ede4d9be440a170c71
SHA51224910a5528beb71c7c907bfbdb9ac83d89048e541cc12bab88066c38e5d8dd2eae4b9a53eb2b293559aa3a0755b3b6ee908572a1960059a12fbd5e6c3805d215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534db948ac53d3e101f2697b4164e919f
SHA13255f5d545cfdacd8ba9a64ea338ac4ad77ce797
SHA2569bac77a9b8997df3eeae3a19a4cc3d59c9f16365ffa6a81aa04ab1e95f472169
SHA51215ca9aefeba9d32e2a94e0b9412f6918b890d2fad37b8d285990f0f489267e67486bb9dbe21d54ce8fa564b454158f62fa5e5910ace1d122779620c29c66f2ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587299eb80faf0341e2539c4fda803098
SHA18e3ac454e9313b2ba3a9b1204cf6661ea7673ff0
SHA2560b0cdc1ca28c14f6a693ef7ef50b433b4da92aa9e3cab819936dede7dedeb9dd
SHA5128cf101cd270138876512409fcf85636a1b901fc633a9a750e985b8dc6ea5f65baea4a8af290ee3f79ef80679cc7df7004fec7b13ed3472e4c7369d7a9391815b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5224a4384eb57eeba66c6b525e2b6d55d
SHA1c957743cdc63ea4263228ee8bbfbe3e36e7bdd8e
SHA2563e4cf5f042cbf74b4eeca1d9e2fc7ac53d5d2ee033e4f00f77778a9f42ea1ae5
SHA51246dd776210c9e43231891932a97d940061b5c94008a638e38c74bc20781a244038d1ee52e65014cccc735dbe1f9ee5558cdf43b48bdfd81e13a29ec91afc4b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551ccb7370365e1f999c85809d28eb3c4
SHA106996bb6ddd7ae0044fbc675ae2c477da71bb8a8
SHA256e010cf255ba2831205e0008b12855223794db8b224865a02d81a32c7c8625867
SHA51236dfad97fd2a6f2aba1439aca81cfad5af14862d8014f28bb3e6580bcfc7c4172587e3473b10841a84de72e9bd6ec6ec7b9304bdb4b4ec27b97dd77ab871bc5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542648defbd725898942887e52849bb33
SHA1a4c65b055b8787a02749898e4b7f2df8e182319f
SHA25686d7fcb504a9b61ef8d791aabb4bb78a05f1d938000e7017b4a7ee1799c6922a
SHA5129497beb4e411015d949f28b5838c4a57d27b95ef8111f41d8536cdf973dcfbf7fa836b484343094764eedb9f020c1233add23762a45a0ff0382008943952deed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fdb68f3a2bec234ec21ecaaf5c78d95
SHA147e8d617d583dc37da73e2ca396e4b2e14fc3f42
SHA256a3e69f735d56111035255651a92bd06d5b28146bd740a111ca6cb6e4849c3f00
SHA5126b92b23f3a2d9be33284af655df29861fa91dabd57e9942e6548c103fa197509f7b2949c50bb6447dfe1c32494769b3b69e4221ac55af1c611e5df1279faf80a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a