Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe
-
Size
311KB
-
MD5
d28274894da19ccbcad3a2ed93da481d
-
SHA1
911a426e6f31e139f14fca3ef39ee58777d00746
-
SHA256
a6bcf7096614b005b4a76df83fa07953cab1a342a245ccd58eab72bdc0f7b6dd
-
SHA512
5049fe6027bf1c86988439fcce9107abc00794018d1c53f26c5ed9e8e0da84755a5485de754e4f98f2470f9871cbfacf9533f3de10779a44f2ce848be494c511
-
SSDEEP
6144:sTfFDbRnOTWbaRGm4vUW+t82MmRu+F2+UVm3Ar8QsVgbomacS0:+5O6m4vo7DU9oQB6cB
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4624 ssec.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/744-3-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral2/memory/744-5-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral2/memory/744-4-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral2/memory/744-27-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral2/memory/744-19-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral2/memory/744-18-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral2/memory/744-7-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral2/memory/744-6-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral2/memory/744-17-0x00000000023E0000-0x000000000346E000-memory.dmp upx behavioral2/memory/744-38-0x00000000023E0000-0x000000000346E000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe File created C:\Windows\__tmp_rar_sfx_access_check_240619609 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe File created C:\Windows\ssec.exe d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe File opened for modification C:\Windows\ssec.exe d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe File created C:\Windows\a.jpg d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe File opened for modification C:\Windows\a.jpg d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4780 4624 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ssec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 744 wrote to memory of 776 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 8 PID 744 wrote to memory of 784 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 9 PID 744 wrote to memory of 64 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 13 PID 744 wrote to memory of 2652 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 44 PID 744 wrote to memory of 2660 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 45 PID 744 wrote to memory of 2832 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 49 PID 744 wrote to memory of 3504 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 56 PID 744 wrote to memory of 3636 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 57 PID 744 wrote to memory of 3820 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 58 PID 744 wrote to memory of 3912 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 59 PID 744 wrote to memory of 3980 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 60 PID 744 wrote to memory of 4060 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 61 PID 744 wrote to memory of 4132 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 62 PID 744 wrote to memory of 5112 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 74 PID 744 wrote to memory of 4980 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 76 PID 744 wrote to memory of 4564 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 81 PID 744 wrote to memory of 4624 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 83 PID 744 wrote to memory of 4624 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 83 PID 744 wrote to memory of 4624 744 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 83 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:776
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:64
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2660
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2832
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Checks computer location settings
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:744 -
C:\Windows\ssec.exe"C:\Windows\ssec.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 2164⤵
- Program crash
PID:4780
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3636
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3820
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3912
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3980
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4060
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4132
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:5112
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4980
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:4564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4624 -ip 46241⤵PID:1640
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234KB
MD53bb386b07341490c2da019b0a8a6e637
SHA1ae0ae7bca4b25e90f086e025d919c8dd22064f9f
SHA256c45ed4da96f10b56577c54e3a40120812dccf7cb72cd791afdf29661e78b9f0d
SHA512939cc275f06dbb2f6a32af510593961c388197a8866352dd324bfc98fa600432f300835cc9bf34b1d7dae492f249c4c961d3c4c42f6891e9c40c085c0c4a1ae8
-
Filesize
163KB
MD5538b91459a3e9aa6a82eed1146d7552c
SHA1d5feea713bded87788c1f44f6f047af53837832c
SHA256183756c4db9f2188a215fb97d15542cc4ec7f3b44e5334ef248d7aae1a49a708
SHA5126c952e4a6cd2010fd668e1fc1335375f92562ecbd62adb2a7e50ebc2fb7982b8de5dbd67eec4d9425b43e2cd53ff62e2402f16a05d0875c4d56d4aa0a8899336