Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 08:45
Static task
static1
Behavioral task
behavioral1
Sample
04ce6af2bedefd58655e14d222240cc7_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
04ce6af2bedefd58655e14d222240cc7_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
04ce6af2bedefd58655e14d222240cc7_JaffaCakes118.html
-
Size
94KB
-
MD5
04ce6af2bedefd58655e14d222240cc7
-
SHA1
b2d8f078cdc429170bc1f39110666a3b0104bf24
-
SHA256
5b233298352af2db359b01e98bc78547e9030bea7f06f480a11986e221c98840
-
SHA512
c296335a40b6d95236b871a22031e5dc62d7440da214eb50179c2f39ad906db66940b2c3d395f9c71e9195e73638d4421bde990474c006f1bef2c11d25d9debc
-
SSDEEP
1536:WMLiNHrv/pOkxfN7LX6H6yrU4RhXt9F6QmGZFy6BdkrY8mgHC+qpEyW:WAi3MDBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420455794" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A94A87D1-053B-11EF-BC03-E626464F593A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000055effdae4950ecdfc1aaf16fa94bd713f5af769c0c08361a73b695c84a7954b7000000000e8000000002000020000000880f54c68d569d5689728498e71adb849db33969223ccbc2a11341980a5291d3200000003b7fe266221d31930a248fc668106ed56d0545f0f9bd2b01b622cc5da4d0bf93400000006fd2f9c65aea2d1e4f9735ae3f5734c0ac779e8da6f3c98ad5395289a73dda10b5cdaffa1e2c5add9e2191c7aa98e465a4ba6506b17246105e74af46c522bc95 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f2a97f4899da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1888 iexplore.exe 1888 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2924 1888 iexplore.exe 28 PID 1888 wrote to memory of 2924 1888 iexplore.exe 28 PID 1888 wrote to memory of 2924 1888 iexplore.exe 28 PID 1888 wrote to memory of 2924 1888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\04ce6af2bedefd58655e14d222240cc7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ec99d975d94afa82e69b80ae210d961
SHA11aaafbd68a58c5df2ff3945a80c1dca9f274c9a1
SHA25699a83ff8c295e8b0eb3c878af47f277dad44e979c03aef5c5f1f3860afd36deb
SHA5121575f8922a88423531a2e6a58935d7d62cc73aff6963571c700c2d3cac948a661ddf28fe5a6d86e5c1e2b477507529c8dc4fcecd3c99ba859c72e2b0fac5208b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df06108cb4d2b729619afa0ade09d29e
SHA123b06aaf938ea2938610f32984a94b53bae02297
SHA256816fc2d22fca30e25cc263a22a28eb45c73c8ded69d7a4c6f6edcda3647d6da0
SHA51258b7b90ecc99431295fbda5d7b700e2947905148765e2ddf601af25f9e655d5e0777d082bc011eddf5666049866c02f3be2c122de5149ba309e42d3c8363f28c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55908424dd2e3ed30b7d4211dbd2a85a0
SHA1489a0fd2f655cf0c68ad865067483dc84e605064
SHA256e54352cd07c866acb1943337c883424af9fa9acce15fd449626f2116e64bf519
SHA512e4e5b723ae719e32c1cc18e7a0b4c8fa1d8306a36ea3a8cd9b53de8abb1fafd8c0ffb78f2f8bf6d098867d2ddbff7f04c5d6666f84df0e19c16dd5ebec7b0ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59258441198eb5afc4aebebb339012184
SHA1f24e7686f9930c4a2178c4474a68d207cdf43525
SHA2568015668145ede61056277508e865505a4e23366aea56d5c7c551c7aa3955e8fb
SHA512741a22bd31aac3f6a448c8de65ba1eff7289445a4c3fbfdefa4c01baf4415f954dcfbcdc249aa912ee24e69477f74d0c5098d82c0ab4dfff83568dd83022f16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f24f1eed6bfcd028cb89c528ca4eee1
SHA1d1cf68d13901c88d252301935891bb49d105fc66
SHA256513510388358a3960a6fb8fee01eee6d28bc06a9a70e73259bb7b27ab7cff43a
SHA51267529e5e838eb2d5278ca899544ea2a238e373d9e9baf88e5f4e4e33111102761542fb0b2f6ee7e3b177c8d7e0f3a87e2e6f0cd2a9f74a967508dc0c146b4e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1fa4fb53f2203742e65e38f064acb8d
SHA12b0b5d706254f26a960f902a8b5bed482262b800
SHA256a8a529e5c6f72aa798dab55ca3f1e8d294e43635ebeb2c8310e7f47145873830
SHA5121b63249d2acc4610614852b02f4d187556a0ea4ae9b3c8c248a9be3889e01239beb703abcc2d36be147c877a64d06e6b936c7bbda862501484ce35bb795006f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0d7ba45f4f28daf8df6c07b811c9a90
SHA19ae8db555c012b9c7d26bcc86e0b10498e9aea9b
SHA256fd20a35e736bfa719543f3ce18f97888ecc027b47ccc131fb9131aa1d062ae8d
SHA512f626411176f88f4cc6b867d787d0d037c7f41b85a70e7cdcc91c646f041517922d5c564594082ef3bf0b674df72e4e930fb498a209e2de524037da44eb880489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524d25249fdd84c2847c7cd4f99de77c1
SHA15646280585455876aeb28bb28ac21c958a0a14a2
SHA2565fe670ac701355742a056d5a266290fed491cc8ecf0606b721ee83652dfb7276
SHA512c60f09e378fa4d40621eee9ec7a5b050d8d27580c8708c552eb28df2a6d90d28994033d64f9869f4b6e182096030490a915e0ed0aa4df9e8f3188f24deaaa767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f7c09b14a4ceeab0f1080614e2bf204
SHA1f38bcbce19d95fec90df49e77abad7ac8a879045
SHA25604beb9e2f02c3cdf38ee7da697a7a01c865954e28adad0ffceaf98ca3ffc6ec9
SHA5122b702b09e45dbc184101734461a7af7ad278eb314a0a61146044a2a31b472ef7e3860eb77c75845a2d1e6c90e60e48939605004fe4db858056e89422c1ced15c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5916b0cdd29783d4e4ee0f081ea258a91
SHA112fe15ffe642a11fcbd2ec27c2cd71474febc987
SHA25671bedb740740caa840b094465df8af59f14d3af021afc87318957a89671985a5
SHA512aa6b24a740ea2f678103256909f83dd76e2dec62c8bb4f71b6e97b119201ceb46856cd6e0e422d49c981f94cf11801576c106b3a0d4f1e5f1ca03089308b389c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eca72c275213271d13142a76ad20f266
SHA15dd6dd798c668cdbab900712e5f229a654bbae4b
SHA256d3c415e12ea0e6efcdc69410a93f04f6371bf18f10a6155ba77ca9b17d8ae94d
SHA512318eb3551e5d9f52138a4716980e80d93bc599029be5fa0f701abb5b969afc56515fb506a1f6bcb224b53d6d7db4763928fa7c0dbebca20c1c07efc9c52226a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5961916e0f752d032afa29fa82d707567
SHA14da85a860ef83d35191280c52f10c26e0407d166
SHA256f7b16845813714176446273e2a7db483d609d80979512b80d60cc9c3fcd32c56
SHA512fc38b556563681abe03b57ea8a72907b512a3eec94c4c59fbddd8c78c04f736d47528861c76f9091c286928f7ab959d117a6a0b3b3e68a9f156f3ea23f641421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd960ff8a05a45a61e743ffa6e16d314
SHA139c5019a57eb0415ddfb312b356529c49b2717c4
SHA256901146d6bdf4a60bb545f394866020c524f7809b6b8e26504c4ca7bb98f5afcd
SHA51235ef6aa54b075f8a89b519fdbb74df0178c9c67f61be553b8bcf40d6bad0e9b957ea80766e0df9fb3be75dd8104577025a80cab6073478e48bf280210bffb91a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc6add15af3f1cabb009bd4fc72f050a
SHA11ff977a4b0a6b3b160e548b1e856546d455d8cbe
SHA256b7b8d2526b7d7c905a88d4798f1021f40d260dc290ab0e23a2a9dff91441fb19
SHA5128be4a568336a232c0d9bdb1471094452769b9fac69bbf5ae814ce0f4b193dfd8e5c8be3c34bcb847dadd421698602c1f275eb58f18a45e828b07785f3a135d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9de7c5a775187a21ff058f48d908a33
SHA1a6c03a4025c4e0a6824aaca39fbef1a00ed6fea8
SHA256c68454689d9c895890f7a3801d0456ff48b8c8ff7a8f705a6bdbb7338a904088
SHA512129c29f80f7c91c0f777856762fca26a26e86928c795f173c54f11a9cc89a6f3692791cac46f37463d411b9b138be0816aa3bc69df530a271fe9a2d870be4e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fa8ee76031e2b9ea415db62e93f609c
SHA13191e547749312ebda2fda847ce9c7703e5bcb31
SHA256a3ecb21d1097468785692ed7b9b1349b1fce4c21e78a9ff750ba70e0e3ab2927
SHA51219ac2e1c86ff7f0c991cbcc75d549fba44fffd8ff56089d5aec22c36456d318f4d63721ae8091d6ec8c5be0c2c40fceb731ed4cfe3fd1b04516af2a49e148dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5975aec4b91f5b26fc21e6cf0b7b5580b
SHA12a28d2147c26af5f786062b5a4534f96e512e45c
SHA256eabce40bac773b4ff03dcc57a9f2caa72badb40523720e7ef34ba4d09ea37fd9
SHA512ac0ab3fbfced2ef0de7c46077cafddfa1d07cb98e178de07d335818b460e81a4db5c8e07868089eb705308be93590a4cc0752549e1691ef7593a24c5a55a3a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1b21a3576bc17dd6e6426cf09a6d95f
SHA103d8c04078c8b87c4a9a7b6d15354c4412f9ab7b
SHA2569853929913f4cea16fc9a9a4434db55c374e3beaf12a9d2468755ae34bb66e9b
SHA512767f7aca6660d8012abfe62b334dfaabdad3e0a0ccd169201dd72593185e8c7755a7a11778861a4b6ab778d89e436f40f7b7840a8d89b3da0965055c015ec0d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5441c676c7ad1074c189527b71abd53af
SHA165f95d017d57f19b609f8b06d09f4a3b757711ae
SHA256714be1ca2ddcb016415dded1a1f88dfecf3611e6c47f88f0d7067214e2ad6293
SHA51289e4486a6871bfd13bf8faddf89b2838153ff702f4486cc20c80c558d2d343089d4b4f19dbdc2bc8370cc911df7a18ebaf14f6f5d65a1276d8c83102b915a14a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\902LKC6A\style[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a