Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 02:59
Static task
static1
Behavioral task
behavioral1
Sample
5cd813999ccc8349383df96fc8a7ce7b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5cd813999ccc8349383df96fc8a7ce7b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5cd813999ccc8349383df96fc8a7ce7b_JaffaCakes118.html
-
Size
1KB
-
MD5
5cd813999ccc8349383df96fc8a7ce7b
-
SHA1
f8379eb09c22abe18f9b9efd1bdee707d5cd9a7b
-
SHA256
1453d3bad541f950be116112f878f7245d7888c3edd9f8886c9d69f308d5d62f
-
SHA512
568d4c02255045be3a2e826cab47bb9bb2ffbc773d7995f3c91b45aba0ab8a8467166398d21127bc2856589bf4302e287dae75dac3b7ee450bcbb3f90366081a
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{06C4C221-1655-11EF-BEEC-D20227E6D795} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422335858" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000001eb33751fa792fd98c1d8f9fadcb286965a81da54ebf45152330992cb67f8fbf000000000e80000000020000200000009de12b2658603e7b99323c24e8bcd5406089f7d0a21cdbf9261f67486fb2948b20000000e53538119195c3519702c1b6698f27516d67b676953365005a3cb78c710e61e840000000a0e51a5e0bc5a4d94b4be4fa39c035aa6088df8ada5096a3eb0508e17c5d35349e0c2eda79d29255cf3c5e354fc420152ee6376549a9590dec44d99b0df8f29c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d139db61aada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000085ec225b6d812be617a429c906d80e807ce468855a1dacb396072636835592b6000000000e800000000200002000000068fb7044a43fede4bcdd905f5c7ce5cd96577e391c49d1252bc310bfe0030e1e900000000fbedf2e9c468c2aa9c56eef50900dc4f806f7dedbc0f4e08c45e1d6d1f94a97ff41f2b4d1c642d909adccd568bca130e2a9cecc9107ecdbbd42de87b11127572dfa38de294791ee278200f816c94b3464c270b0d4cddeff105641bc8be935a55b07579834f381f2ef2468a1634ed1ec2bbd468906e194ad2ae67436cc42ff121f893b4457175a4967a60555c2f13ba140000000c49979a2696e459e46282995ef74db9f3319cd89ec4b0e0a9230194142c5862f493a706b092cc640c7e469e4433be4262cd4c8407de3f22aa17c2b25515385e8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2484 1924 iexplore.exe 28 PID 1924 wrote to memory of 2484 1924 iexplore.exe 28 PID 1924 wrote to memory of 2484 1924 iexplore.exe 28 PID 1924 wrote to memory of 2484 1924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5cd813999ccc8349383df96fc8a7ce7b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b196d30c4d310da621f898ddec83faa
SHA1e0021a46c4503a442f3f27e02e830e38951370a6
SHA25613c1a625d74a230d9bae5e24ac70780a771461ff6c739b6b974338c28d925872
SHA5120beead6d3cd874b599c2e13a3fcd5e71ba8c951324ae13bef717b9c361f7e8af20b33376e0e803b842a8910d19bb0a9f98bf49a5d7f21598f4659f5ea1b38681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b602cb4aa04d58ba7b1549a5f5f84db
SHA174cd8da6a8c61962932e54acd49d480a7c86dde5
SHA2562dc94c6adcb1099465c57db89e9bf77dbffd9d66be818d56f7ebd83a558dcb63
SHA5126bc492f47e8a2ecf4d118a8437c40d8a936d75fa6b13fe8e2dc8f57d6d4e09c19f947073f39f21291473faf72ffb3925cca72f0e0ffb000761de229246dc0e0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d605250de3e743674c9ece607459989
SHA176bcfc690787f1d593e5edd352b38c0bf1e5537f
SHA2568c3faaaf0240609825e20f7e2c693bc46b48272d9183ac1c195b6c60c304d8d7
SHA512ae507e4f8e1d409f4d150a6429d56532f5fecba1446364ff640505fbb99a23fac7cf518c43392527adfb4991b4ea11a007a3fd47fb5760ac492b6327eb074b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5779862fc7852c200e3265fbece20a3a0
SHA11caee3c03602f91d5256bb3d504bbe66fd903426
SHA2569453876a91e8109fec3353b950dcadec4875c5b242e930d7daa1771d05417aa0
SHA5128b418ab8e261e69a9d7a3b3cf6a9272c78e80439e20bb4efe4b60a4ecf2cb5744c507f63c71dfba651be259301f22f91eb0375ae42fe9e72b59733e3eaf31c17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9524b883d36676a349dadac0449b7b0
SHA136adf27515cb487933bdad17258a045dde62851f
SHA256aa3aca0a3138488783a3272bfb16717678c59fccee97509d49da8ae6bb5c271e
SHA51217619f2749d59b8d32a39fa0c5b570857e8966a6ac99299156c8c219c0ff060b72fe99d31dd26e331adb2eb67310ce7b0ae9f397e0868f284a30d2792d77626c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5852a1f2def4f5f8215859650bb4c4575
SHA12833c02b8aafe6e3fa6a2946dbbd0654acc6eb97
SHA256b25a32e8d2c8a7c453a2a1318274529c50df7b4b986b48fa94f6417e8e136a25
SHA5122300fd74c6ab4455a17b12dbda8db55f4d1d4189d4b49de7e5de208cbddcaaa5c77e7bb6b458de90207de7dbef46e5bf20a7a690d043cceeebc59adffef59b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5026e1f67940988c1e9c06a721a68259b
SHA12af79d363bb65dc6e98be77fe93881c96438d067
SHA256dda3d457fa6ad7c7d0f0a17c3d9ff49f657923486c09c24b5b803dddf608af9f
SHA5125e847481462fd323613f872bbdb8bbaf6be6222e039b09f099c234b14a0bd5b01a12460b3fbece7b0158a1300054b6e03afad935e4c811b8e93e7b3fd400d1d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578fc28458b992d79757bce47aa7b0fcc
SHA10efbf9bc6a1e5edca85d7c7f0279c5f4d40d0db3
SHA2561702164af9df5848b42bbfb4c7ea9443123765abb1f2df3f02914a3307ccffb6
SHA5129f9840ed89df15f421e0865d7e92e21f7fcaf0c5c1b4275784286acd3954e70cc795fdec61c4eb13fedd88da9f7ab1c55136ce15e531a1c74269b960bf4ef13d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50703f1beccda074a84c2068be8c3ec99
SHA11fbb1ad32cebccc801a22709b06ed263b7ea6b67
SHA2563dca3c7ff1d3f82bf71614bd5d9ee27b830647b7da9c53d3dec17da36384e31d
SHA5128c6f9c2274342a88bee0c2e7b5ae32200a72b75ae589ee6223fc58758a63407e14b8d9ebec882b34a65f1b0c10245303a4302c9ac4d9fe2f272ba0738c035143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5610585fbd50476f081e9a6204dca499b
SHA1ede88de02ae61cae1ffb21be10430a6c3fa6117e
SHA25612da0c4175b34dd3ad692373cd0335fbc22ecc561f0958d7d30028d6b232cdfe
SHA5122f0bf4f3cee8122151f4d48172d7ae3f8e02bce39074f3121bd540220b2834d104e9864b1a8a67db192049e694148369b626f87e20075135293e72667a9d650b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523e4a3a4036daa46ffd1b7778afdc50f
SHA1a9093559944f78760f1c9ebd69899f15d78dabce
SHA2569252bcde45beff3583e6c7ca035e3cb946b7a4872a83689e05c52f1d614442c9
SHA512becea0079e32c28b0a733bd970e9ddb02b1317c0ced1d5649c446223b0d9fe22509605f370795481981112568065d2530b6961a39e8f9d62de88f5562a7d1600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5480e82fa2ed8920e782604971a956df9
SHA1eafc09450adfa3c6612b4437831c16154692d019
SHA256c176eee92772917cf18a1595d64fd27192c05eba57a886c9090cf15408b89c41
SHA512fa06eeb85a1e0558e56daa99f36ea9caa50a28c9523724dcda37cc346d1b4fa8951a49adad68dc334db8e1efff7586243c70bb3fecf74a34ae780869c692b05c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554a549d95a22b0a1425134137036e933
SHA146a9aaa613701c29dde4ca31df623035fc31233f
SHA25623354ea9642bb2d87561ab198295c074c80d2cf48d2b137d0e356cfa32e505f2
SHA5125406477369ee43a620a1c57cc49d91be2616a57621a794fde6f29bf866c1d09c44e18f73c74322317819493267deea223c60dfd03fff9da9f9ce9de6bb6cf8ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55134fda2e6aa1a57f33817e825ecd16e
SHA1ca62dfee33151918a9ad32493538608bade5794f
SHA2565f83886ac371cccc52af2285529ae3100e605f0734a0bb771d8f53b48a440976
SHA5122a960e49e956a11ae5d540b42cd7fbf1155e74b1254070d417d71b99d532e698e09469c6f31bac449342ef4a804a490b22653d10ae5bd882aa4bfe4fe8bc3ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c55f2b1e0860ea2eea41089a9fbb6eeb
SHA1c9336c48957b1de945227bc2eff96763d3702fa0
SHA256d57cfa790f6b48670924bf3bc87f3bab075c861dbcec60d39869fda1e81dc447
SHA512bb4c6b6136c82857b5ddb8a20a752b6b3f9c534d2c4adfc333d96d47c45c0f0c08c655e0ecf5a5dd6fea312d5ba655e9d0a2aa635dea9582254bc5a29194ac55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53453fec2007d48c3b112ae9a59bca247
SHA156c88eea06000d67cb020f267d07df030cb84264
SHA25648396db11ca2e18ff9d2d734877fbb7ee21beebd8c24bb0088caee1c28c968fc
SHA5122ec7f540bd81a5eaa7efa981088671001253f4746c0e5c435d4a0b2788134ba0c510a5c6ee59a7538b17243b23717c7cde5c9c57680927fdfc59373b97bd1533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d80e8011b23f21d9a34459f3f875528
SHA1e7dadab65eb40a869b835ff5480af2cc28bb2acb
SHA256faf57e9f5d9eee2c711447829647844e35189aaef91a6e33b1812e3f74bd96e1
SHA512af251526d77f11e897c935def9c99fc06803fa9dc97334c32a3e7b4f02273e6e889633d568be8e90093e78f173b758a16226cebdaf32c9fb6389d8ccc1968151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56aa670d1697ee31f929283795164fd4e
SHA1a5fa8f70b6336991a9d59555d71847c689ea162f
SHA2566dfdcab35290339538759034e6b317cfbefde13302ed07eb273549c072d548a7
SHA5120aec95d73d61d9fe3ac43d0dab81d6050d2e049fcfc63d5c44af654e830672166ee331692212305062dbdd81777334169cbb2b4a992be8487afac5feb645e09f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df11d0e3e4ac6754ad937df4c311477a
SHA1ef4258f4400fe0e6109c89eef9edbf4c8f9d1fa9
SHA25646b6b6c0b9ef5ad4df0a5bb9b46a3c440ec72742007b1545c696334aa9c8a457
SHA5129a11d261c1d51f725c332aa3e1051e362ee7f4e4549a1b5d8c7947836a28a44c68aa4eab0ce56c162f31437d319bd03231b1d873896ce733a0e5fbf37c6c1825
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a