Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 01:57
Static task
static1
Behavioral task
behavioral1
Sample
e8f3abb505573d65b28b94bf12ce4ef4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e8f3abb505573d65b28b94bf12ce4ef4_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e8f3abb505573d65b28b94bf12ce4ef4_JaffaCakes118.html
-
Size
30KB
-
MD5
e8f3abb505573d65b28b94bf12ce4ef4
-
SHA1
b29e759c5cb4e526692046da8bde0993a72c5975
-
SHA256
6a48c4d475e44b698c17127a446c3f9fe68fb7d6d6447630529afdcd41d48f30
-
SHA512
03954873f8cd9577724c6e0d03cec16981b57edc9bc88978beb53e6554e14ee1c2961678beaf1477547c7d1e53b1ac9ff8a39a3ec418815e5db07c260795e94e
-
SSDEEP
768:hS7SO0RVlUdu/6M0qMWi09B7Y4rcetzJK:IeOIzK26M0qMWi09lY4FtzJK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0bab27d218ada01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8AED62C1-F614-11EE-8D3D-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418789728" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ffebb09deeb747419e902f1accea58f700000000020000000000106600000001000020000000c726e48372e6414ddd3254b2fcd05d49e1e9b071760e3aae06818d7acb532c00000000000e8000000002000020000000d3348c534ecb949e414d42994618bed1166fd2d7949663d229815ea247758de420000000d77701e2043ee97821174982da6a57fcd919bcc5e97ad5ffd4388aeaf86083004000000089e41d85006b395ac4fa5cd86a4de1d14cc16c9c8654042f7276e192bb73b5a2f3fc7fd5c9d9a2c3a6dae7a13e22a6658e2946f242c03c72d5f34dcacc94db4e iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 iexplore.exe 2200 iexplore.exe 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2512 2200 iexplore.exe 28 PID 2200 wrote to memory of 2512 2200 iexplore.exe 28 PID 2200 wrote to memory of 2512 2200 iexplore.exe 28 PID 2200 wrote to memory of 2512 2200 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e8f3abb505573d65b28b94bf12ce4ef4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51031a1407179003459775f9215b09775
SHA1fe3d27735a6f378cbc52c70cdc08fd0401ec4f57
SHA256e7aa294933adbc8dc094b02f563e761445950bcaa9b2fbef0adcfb3d591ac48c
SHA512c4f55afb70eb0e99b53536b1bf0bb95026ef25e898b2e850c280deb51791b1f596cc46a208d4ee9c0d05fab5c9dd7a85828706b8aaea0bd32fc0a2614ff89f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b940f5f864e62d4dfc1cfa93b647fba4
SHA116eb0907e7a46b864cb93ce4f4064953c1daa42a
SHA25603e49054b3e694ecf16d090104b057061e4243bf041bb6caa7517f6a9f3aa055
SHA512906f7226f4f6f920cd79e7e06d51095be24e65d20ca30ba4bb4c1fd9ab5b13458dd6d52797f0e25ad8b076de941374c3823f2bfe4ffc913d8e3069f4737de3ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5291fde51fc4c0081eeb30b2aa60c89b3
SHA12c541a4b2c270a43eacdcf1310e61ee9b4635629
SHA256da85ec42d9780f8d69ce5fa4a509a690b34ab8bdec4c0b82e3aca6ef065372b3
SHA51298e25e24b46b58b16103a8cfe69e90d4261c38aeaa4bb25e14bd30ac17a1c46b955fbd04b9cfb5467e38d1c65893f15e3e30dc4de27479b304d655b53d3e97b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550f1c04801938cc71e6be58717f944d1
SHA1e058f5a53d1e124a689db98dbdee4d34dc09d53e
SHA25664fd9fe5dce04d773f7826c5030700ee61ede81377fb6eed46b249956ca5ee46
SHA5124b82b69193d34f43650d5a13c9351cccef214a69784a0823b5b12a21ae6d2e346d714ae645a593e1408f4be93cd0d7187c8a8f1705a810b2cfeccc8c3ff1fac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db785499f7cd1453f916a508766d7514
SHA1df0df88cf588c36ab145ea3c7ec3fd77bc96d738
SHA2561ba203a87330afbce18fe871a204fa6a3885822bb8b4b228d9f1c5a87642367a
SHA5125d604b4813e22ccfdb00e59eb1da372f4670efb1e353ad07c33f4eca955761335b500d3a5bc4b369f1849f5183ba3ce94344ca41acb67b044148fc4e025c900b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566f6f48bf06585e4a2d22ef2b417eeef
SHA1aae972a6b6261df06e464a70a63b83d58b742942
SHA256989eb0813c0c46161cb89cb8ba0fdbdf6f38945cc2df6d18a699b0ea4f3ae0c4
SHA51257375712953187f9f39c41409603a1e59ffa6348baebda197e881dd3e08150d21aef4de4d6bc230066eb2a1a04e07c676cb1b0acc53c3182072aeaac980509fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536705a4676635040cdfdd30ee3fe1476
SHA10dc1c61fd8248819c3ad03d1ece2c9ec9bc1e04f
SHA2561956cd7f53897b784c24159838dbf6376d2016cb0751e6e14c7089c5f8cd8ce1
SHA512fac4ea450af46103af5ee0c25848bdefa3a5825758cb748ebf455aab0a2cba92268aff381ed0ab5b544850b235de84bad68d56a74e76b5e503bd0ef4a54be719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597bf34715b799684fd13e8979e3b46fb
SHA1403bb80c4a172e843001e1d3168532c09dd77266
SHA256180e11ebbcb1b80b065d995cda675752227e4b167f1054c8bf94690a8207f793
SHA512251ccaabb6a5f57e3327b8c389212e1e16a6ab3743b0a5b8546c1f87ff8f7d9943eed0999cf957595ed9877da0fada6449a27f80f446e48a0f2af2927376d172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e201febf7fc74d5e0c2db9dd809e62c
SHA1f31a9120ebecef348e62cd63bb14f70a94421327
SHA256961a45f67512ec4ce88cf9224672cedf21b719cb96db3716d3f158d629d5643d
SHA5127b7a095e7b494f4e8a68713c8a0c3c09c88d0d19f13c8f4389945c8c3651c2c9615738a1db34a3ec9fda6910c3e0e523e274ed8ce81602f0e38fef11a963ac80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569c9efcd97ed0899410925afea48888a
SHA1fcae8636de8f0975f391373f20aec7b578109aa2
SHA256ebb9982b40cfb77c1512ab9c9892309de9e0b77ee282cccc725064b03441da62
SHA512450e323f8ad7ec566c186aa4d09c5f5f67f92de4c79d5737b3f45f063322f19bfe646ec29e7e6a67946d9ee8ab0e6b9cc6638c8c36682e871769f46d9fbec515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b02e92218f9c1417d1db3d074cf305ad
SHA1642e7fc82784c4d64ac80bfd42ac2843b141ff67
SHA2565831129c79ccd5720c64425a5fb4dbca6f49b4008dae45cc60acb74fe3e71df1
SHA512b27449777f053c6505a2fa74dbd554645cf1bec31e8363e72a91d01a621a12f390e8556fd0c904a33a72003afceee9bee33af3280481c18563403ef88d7dbf17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcc91d035e42877ee0888284352538fc
SHA1a2fc2f59299370713ffe6a3111201cf1e405835a
SHA2568b6b0e62de3b652eb9d7351741e62c7d04c5ecdb40012ddc4b732651001cb6a1
SHA512466262e3a5b8d9df250b7455e59299da13252b682864f77ae4f3f20fbc7785de8a79f080efd4e423986bdbd637b3d6982545d4c2723368eaa6306e96b135ed95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf9758f5e772cb6b5687f26795de7284
SHA1bd2c175043c452b57adc014b9e06789b49df4339
SHA2566b4dc485632f8d3ec310714f5a0198b0894f49238f5e83df3f7c9c1e4e9b2937
SHA51288d9682b6d9ce214ed707f29dd2ffa6f04d4d0a21ad3b3c4ecdbc87a2aaa26b340a98167b99414cc0ab3293c9cdb8adecb458d21cc18e292c3578804176ce54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eeecc5e6c9bc0789f79fa15888e8a814
SHA14572165a12cf61def873dcac52e2c5516e494dff
SHA256f0bc89518f020a89d298ee78e34a0f37278e5d51073884b2485a9b91c7495980
SHA512c8edadfd8571f9384b46573d21bb047528566324f91511434623e71b2e7cc71f17228010cb1973f525c8299784851aca4a70ce49b69a64d34023507176ecd39a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d16f748f583b67878356c7a4059b24bf
SHA1ff4863502a5afcd655ca31bce7587c82165f2e0a
SHA2561e181da156fd16e548f748537ec823003ae21c6c3d353bae16a6654915205781
SHA5126b3648669beb905683f83ca8dda0596359dfbe8a40709879e374368316988e1a792365d374b48c2e39c710040805915004349ecc4cf5af675a93009b35f77959
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a65428f4b4b2736028a6b5b6ce9b5b85
SHA11f15bca6b7e4d3d3a439ac03cb0b2fbe1675691e
SHA256382bb0dfe0e0fdb0b3462cfcb7f1f01fb1e492fa12f63a627beb7d6da01f671a
SHA5125eb03b45b15ca5a3d8e7d510de2b2a6c5bd5ce6136e0e9c1d280043df8d7f3c110467827f87ff5d88851d2250daeda5f38200ded930122e4955b5b2ff6bd55cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a8d7f066930923a9c98f788449d6e2c
SHA1252e01265da48a6eae6a5a25cb905b9fe5059375
SHA25631749400a71fa522eb218f6d14374f343931ae22599f7cfb9acb1d7a55720c79
SHA512515264315130e45ba20d96c10a72086a4e4723b7a07fb538b8edd9277afa01e382796a47a09a8daf5a31c1e73f2f23f74bf42e9ddc9f192feffdbf43ca87e3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aa8aefbd1772e8faa508f4d504e3b9f
SHA1bb3cf682e28e8b2080163449a899aa85e72d1c89
SHA2567a271d2de2d48f9c5795e0755102a84e788699f7943f5c40c5d753cddfb2c4b6
SHA512004eafb30004fe2679fde294f81ec94142282eabd63256abfcfbad3dbc86a394ae0e6f5ed3bb17aae3526bff96e76889fe5a26dd90193e6e16501c9d96e585f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5911de56af0452d876e73517dfd6641a5
SHA19f3951bc8df5d8ac9017fb70bbaab2afb28dfa6c
SHA25674f095cb830384295c89154aac657c9ce4a30e46ba6c57b6ccb7917f7fbd17e0
SHA51260272305f3e91c6003d72d9404e2113ba12a7d53948a2dbf94fcdcdc7193a91e168f080afd0ae1e50ec5aa69bdc02b6c238b6317e314e137b8802b7c5b7d1e9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575826e952b05cf38a235a9be6cfe7883
SHA13fa7aec108e8cf552d843fdab43aa7294980f82b
SHA25672633d05cffd1afc265aa62f9fe096bf2c5dce1b28dc8f2a9ccc6b75dd593302
SHA512b6d2e31665aaaa965e4b801f368c994558d9b748ea9de431b7b92b0b8e80d873b8a0fa619e209ba66e34f41409ee04beb3b77a186877ef0a18f71776db3c9314
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a