Analysis
-
max time kernel
136s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:46
Static task
static1
Behavioral task
behavioral1
Sample
68935296d4d07a89ce96bbb3fdea5f43_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68935296d4d07a89ce96bbb3fdea5f43_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68935296d4d07a89ce96bbb3fdea5f43_JaffaCakes118.html
-
Size
28KB
-
MD5
68935296d4d07a89ce96bbb3fdea5f43
-
SHA1
1de58eef1997bcbe4c689b5336fb00a8c5913cb1
-
SHA256
f5824b9a769b7c26f0a0bed7abd8d7e9c3c56e349ef75a02cdb952a4de0721e1
-
SHA512
ff1932b01ac65a3c5460fe7e4556e7ea21d6ff2d19e17a5bae23279ad822f6d1cb2aacee74c980dbb58fbf85a430c76ab3ba9338539f7cca674219416dbd63f8
-
SSDEEP
768:8UidET1yFj8HR54MWrbISlo7UuNfO9ckvEi6Kbd:8UidET1yFj8HRkrbISlo7UuNfO9cuEi5
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6EAF3451-187C-11EF-9F86-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e4958622f412a04ea179cce6dc750734000000000200000000001066000000010000200000008ecc75f6bc98188ac00d16fc855d578c3780a38655b333f6351c9a0c9365afda000000000e8000000002000020000000618cae5e42f6548fdeef51b645715b53d03e784bf05f6a26439df7021c5da0bb20000000840f8ac751e0cb27ba978ed7ec552f4729cbe2e81fb854f3717931c215642c5840000000a08f93540f6ca2749546f187e7bfb3a5cdd29bab46a60346c78e0729ecdf59e3f0c172aaf768021b70e10de87cd27b5fe35ffaf56c3902cdf10971a5d70bed5b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0af368289acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422572687" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2156 iexplore.exe 2156 iexplore.exe 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2156 wrote to memory of 1880 2156 iexplore.exe IEXPLORE.EXE PID 2156 wrote to memory of 1880 2156 iexplore.exe IEXPLORE.EXE PID 2156 wrote to memory of 1880 2156 iexplore.exe IEXPLORE.EXE PID 2156 wrote to memory of 1880 2156 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68935296d4d07a89ce96bbb3fdea5f43_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f8e7e7deb93317fbb633e6c22b81fec
SHA12395c2e9035590882608ca7c04db83f135349a79
SHA25653aa5f532a1a96742fd9314c606ccefb294fdddeedd1d2cd1f23c5a8ff0c2af0
SHA512ac0dacf64cb6dc798cb90a521fd69c0240a9b1d31dd6a89ffcaa23aae9744c7047de3a57c22b1851bfbae8a5fe7ca10894c0c1fb650b5cd6410f3a19c9ce8e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531a02f297e220ac88619b45ca915cea0
SHA14a3ed0977d70664efe6883a2aa0b3b77afb90b56
SHA256426f632246cf7420216cffa727815509083fb572b4379238b60e97018cb9189b
SHA51204ca51ebbc1da57473f5503ce3de12a0dec800b5ea3efdd333a40082b4c2cf613fb3ccafe5b360a42f4e03311489ce32292412b5374527108554ec5b3ee82b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed79207ae16c52707b3d1f4bd7b9e781
SHA1795721007a7c8227bba083527f6dd5ea6bd9ef1d
SHA256b344e889b673e90944a0588ce39bfdabf2a8c471bddf2e5e80caa6eb4b4cad92
SHA512b0c582f3d6f464b14549ffa5ece136dd6a2fcb1c6ab287fb6056d3a81778551a8b4e9bad00e766994a06b31c1fc7d297a0dfd0ceb7d417ff42a114264a28949c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fa1a85300ebda2a90cfa7f7235d6937
SHA1afe64f2a12f933005347feb534f4ad6bb72d016e
SHA256ccf4372626cad5defb4420f12b8ec5339eb3f49855cc02e08933084088a5a95a
SHA51273890ab1dc0ec625f6009e400715bd8afaefd61f02ee29515e71589188a77a72da608f6ae4d1316bab701f063cca90f5b85eaab48dba63499026172732ba8f69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c5f21df15e08f15cbaedd8fb1012e0c
SHA12ae7ae7d122c2b0c5b4c5ab63e1a14abfb1a41c0
SHA25698524f32300dc32252f0f9130239911f215c148fce0786e7d6802c507faf100e
SHA512c6d29f1494bd14a3c1e973a9bd678ff604fc0dadc35d0e04f57049eb74e5a86a807376ed7578a84decaf343e5c87ed77cf183d89d5b8991cbd5a10f715749c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561a6b6e35402c83fc777e9da0193ee40
SHA11d63317d5ef459c9b6af56bb28cef73fd9980ec8
SHA256b319c73e6d878b68719aa5607805525383570f452115cf57b3c6c3e58f200c91
SHA51252a7ea3359f32e2afe14a1f3d765a912d00ae55964623c9e6c022e80f3e6b4965f6bec6335d899405d84dbf0729bccacc402c4e23e2b7458cc6b0df4ac1d58b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e391d3ed1d9f77e86e26b2dca7f5de78
SHA182b430896c90ac6730da1f1e2aa37f29013564fb
SHA256d8ccc843de83db4fe0f8647fdbf4a362c79ce7c09fb0374be5c189a69e07ee85
SHA512943a3e50898120a874c9a3dd80e195626d362df4f9d1fe1cea4f5988f331ef9c5e7312ecc2abc8bd814c85efdd64227923357df89305da9a8bf0bca57fd7a20d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f54c00f992107d4dc0d120ce22850ae
SHA1148ae1cd948e3a79408adbb8ed266dbb61f1aafe
SHA256c90c1263b27ce840beffacb6e28ce218b993ab2202a30fb066ea6dc45e27861d
SHA5120a609910abe975ce4c545419688fa3e885681dc16ed825c548207e58739431eb8a6ca1225e1798c40cc6c8ec3cc22b1a786819f0b970d5c3c4fd7c11f1e65e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5ebf311481063eca912f2a968f39fd3
SHA1aa5d4e9890b630f7b6dcd714cfe7aeba025ef292
SHA256883537fc6d7c66cb978df349a4a505fa4145eb8a0e600324586b188409b7166e
SHA51235504dce012430228b1e9501df2dd86a9cbabb0f8bc71b8481a847994b715764a645641385f3bf3d2fb4958b9f2fee0a76b024e1ab060721ea4a08d3d2da8b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5283909e21c101db283cb5a249f8eb33b
SHA143a0a0d6192b00a2c24f518e94113b133d231d3a
SHA25642853da2000ffba99bea52a7c85fef9e0a6daf99232e11c8b0d94ad3afb873b9
SHA512cb2a70c090620c0e6e58d936e46e40ad79997e0f64c346f8ea520c0e4dc3bab4bf8ade812bd6dfe39961971c2eaf4cdbe61580c7dcadcd31b6f7fc46da14df6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edcb587f6ba7a8e09dc0a75f42502da1
SHA16a8e36aac3225382881d27af3e1c562ed74cd895
SHA256be317a5ed33cfc9ba49e2b39e3fd382c3e45cc547aa6f263812bc28b7119005c
SHA51264cc09c1bb639d0663c462c3f74746f9ca262d7b7901fdeb521b6d0fd1466d9cf4cf25a4620c7f228a039fc4a6cc071989b3befd5d1633675c55ee76229babc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bcfe1d28522894a52f3de746803995f
SHA1b2fd1daca7ece41349197fdec0f616823ec03202
SHA2566e5311ec25223ad8d693a6443974383686c8eba739b0d1a6a675e0538e136d3d
SHA51236c6e3f74c7402b6cdf525066b9a559830a58551e452b8dc143fe98936f82ad2049ca373f99220d1df967ad06dfb022bd9c258a8a0fa164f851de997aa263fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5481afb2e799713f764f3bb4195c9e5bc
SHA1746f8423bb5f94bbfd48f14340d1ea4ab5d57a5a
SHA2564f8bc3ce398e94304d3273c17e63a5be152b6b2ff684f63873f707ad341a8da2
SHA51211fd2feb4549dd85849a3531eb0a73ecf97c8c69ee092264f55428943d48cd93ee88f4d052cb9cb3d19ffbd32406a3214d043a51a251296d04410ab035ae15bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d31d9725bd2f11331ca01a2b9157aa5
SHA1de4f5972470f614306811101d20e52785ec9ce2a
SHA256d60ff42c321a4e9cfbb02cc1ab89df5865be504e87ef7bf34feb1a9c4962d6a1
SHA5128a23ca8aa5d4569882ab342f41d0a5987d6ab9eacc599a726c93c758629e9e67c299f57a42ff1a65315f7e2ddca088a24a828dc771ca6c247fbd0a4d0a37d676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c6c41f18936afe88763926514cec44d
SHA19494a0bdee53b4f252a86d8d5931f5f453b0b6e4
SHA25649bd2a3d43e7917051aaab04f0e9f1c9b1fbeb8987521c20e1fe80be87f0b37d
SHA51236cac1b2741b35f0ab432496c484478fc1c285572b4f26a05daf0358f7a60df3474bc5f10e9fa9c3ab481adbd6044c091c3778613c3b7f1d573863a4bbb11172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5036c1b2f6241fba2eb38293753fe118b
SHA1cc2d9b799e3ad17b15c2fcb88613e002e0bd3a80
SHA256f3af2d282d4ec40a58ed3b5dd3d075f665116a08ec0d6e90412290a9fe620e7e
SHA512d0fa80b1798a5e2f00b5736b95c309ba50cf5516c871338e989e3e711a704bb999b45b97f26e14719e8b656d7dc834a740807ddd4dacb0fd31f373f7e897c947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517ff754af4b0b534f1ad5ffed23bbf07
SHA105e0fbc2908896a2aa0004748c2266276e07a2fa
SHA256a021def1a6a73b598fecf69f1c2eab4b0a654de7e7cf8dd1fa1f4942579b2095
SHA5129ae7196d405dcf9858b2cd03a55ce4badb4e342d4009f1270a7cdb7ee4dcc1be1fe8aec18c620dc4714889915c80f36a8a4fb7343d28171bc7c4479fc87b5f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5734c12a0b4a079863aed6c1878a9b1c8
SHA1399209fbdf1a8468c8673f903d4389e15a065e15
SHA2566f5eb37802f7a37a2e010d64cf85923f9af358a29d8e62015a065554e6737d33
SHA5129abb1322879309990f30291191e2bb669f924d4be38f2b95f4a229eb73bf4b12f7351650d192b22dd28570273701a682ffa873685c82bf7a0fe9aaa8ae6b214f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcebdf3b0e7122d5e29ff5265e8fbde8
SHA162a42fd358ac9be5bc3191e3adfa416a4f1a4b1c
SHA2562e245e136409ffbec9fbf4615500295b30d905c0f5489a512d67172d7f6b0043
SHA512e4379667b54b2569e2729b1b2595f5f1911254ade92e7167944226919e1c9c204288c0d974abb7ecaa5af52439eedfdd70c46b9fb706bbd804e63c8c1e2eb075
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\ga[1].js
Filesize45KB
MD5e9372f0ebbcf71f851e3d321ef2a8e5a
SHA12c7d19d1af7d97085c977d1b69dcb8b84483d87c
SHA2561259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
SHA512c3a1c74ac968fc2fa366d9c25442162773db9af1289adfb165fc71e7750a7e62bd22f424f241730f3c2427afff8a540c214b3b97219a360a231d4875e6ddee6f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a