Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 08:18
Static task
static1
Behavioral task
behavioral1
Sample
20034fc746616a79808b25343389af11_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
20034fc746616a79808b25343389af11_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
20034fc746616a79808b25343389af11_JaffaCakes118.html
-
Size
15KB
-
MD5
20034fc746616a79808b25343389af11
-
SHA1
5cf16f12519f648bd6a96b3a948a4faf47862e3c
-
SHA256
1968a36fcca156091dccd231eefee7db7ff715bf88eaead316574e125f818cef
-
SHA512
68b36e730f465216d32f85da638a9bc4c8881a81d67ba8c4d4da0c9604faff0ec3e57be1724103464aea55f6df08b9ccc9c0c3c092c0d6614bc1a9ada19d3784
-
SSDEEP
384:Gf+dBM0BMSBMNBMNBMsBMiHBX21jTVeAeFeBVeBXHn:1C0CSCNCNCsCak1eAeFeBVeBXH
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421231806" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 402bc34857a0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000e1c3f7b64a01b113e1b49651538f9e9b0cf13d96ba9f857fa20de436ecfe65ff000000000e80000000020000200000004ecac019d90c70b73840cbb99d775deb7641f287768670677c7adffed8c72fbe20000000f5ef0f4f4df9ce605f194e5e787a2fd96bfa0bc02f7fe82c3d2773bc81a78a0040000000f1ebd3e25d4aad04149563380931ebbbb0738240f0932ea964223d84a60f61d2982fbc9cc956129117e4eafd7ca6797a00eeb5fb6ff47c06bc7b77d90dad616d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000fb62583a0af3bb8187c46ee86ce167865397b32ef8af1cd918b74ad5a6db07b4000000000e8000000002000020000000776703b80bd96a0c681d08301123337e0d814c7cfd4eb82ce06d589319a206bb900000005ef1ee16688653eddba0135a1546383cf90eb5cdff171b702e9bf04c825920b0344216605c8693636b29738f6aa2d6b9bc727317666750a646572f3066a2829483c880a50e79bad0b5350943b6809d4f6b08f7f2b71705e97b6fd591d1a1b9f0730fb19c76df5adfca0b84f2e8ec006b830a8950fe24be07d2f0fc8f8154a1d31331b2f70cd0c923df40be8e288af3fa400000004109c74bb6ad2ea765e2dcb209b221141ef4b62b77fe04f32e6c719c2f004a287883e02a23395009cec51643e0072a03ddeaf48c1d2b69625e59411cea41d5d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73CB01A1-0C4A-11EF-BCB4-4AADDC6219DF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 3064 1712 iexplore.exe 28 PID 1712 wrote to memory of 3064 1712 iexplore.exe 28 PID 1712 wrote to memory of 3064 1712 iexplore.exe 28 PID 1712 wrote to memory of 3064 1712 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\20034fc746616a79808b25343389af11_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ff3812d7332aee147df8437efb5d52a
SHA11e0f122bb4faa43027e710bc64463c240e6a5fed
SHA2560634c579a39240bf48d1debac4ddafa3c4a1e7251d094ddf765a9e7596e22803
SHA512c201c6c44bebd3c87458cf32eb9383270da21ca7c4caa1db6d49992893bbb8805bfcbe097aeab1cea365c80ecf84cc717c857718a302a9e5128794e0c3b10f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5728b72133d38002e01fc3b062e4ee820
SHA1ee2cc3d08cecdb6a8a26b1ac2fdc67da1497783a
SHA256e1069688985b51723044434635c364f8fdd3673e93868a1e4cd36e7dd1f40fe6
SHA51228694f7a35b29c03109e48f9b6d3c87d38fff39686624c49c98352a4f906c8eefd58716a9a38ec7abba0b1f252a9657474e3574a8e78c88afa51296b1865e319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe4416a4b82bfd2bfb1741c3e7684e18
SHA15539711f40ab667a52f86f4b81d479964d691b36
SHA2566a786ce56f89e56be703f058dd559e0b8aa352e1b2d00da45ab8a97bc2177a72
SHA51261d27e101609fb313de9b71a6f3ff72ec0eac2fc9e47067caf3022e3718bf81bb0214f4a0003d2ace0d80bc6840143b469705d45a9177737b3fe15f54abf50db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a120d0be5e07b91922a08bab087ffe4
SHA13e7713fae1bab244eb4ea17fddf125e01a4ad779
SHA25623ad521e6392f85be33af6ada2d6fa85287afac574c1244cedcc7b26d01381f4
SHA5121655f371d42ce8a24d506a1c8b5d105e27f37d298679822a3343b5329dcb3a4d8644f834cdd7e2c9c75abb6e530f8bc2610c2384c261341783bc2f787a487717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0e03f0614778ac8821fe02b38f36120
SHA1f49d2639d7fe485b3a96f57739ff62e52d5906b3
SHA2562925d5904b4c4e95fcd90d159e7d4be2951564088f40ac9cf85516f9830c2667
SHA512b68d86b72f847c91e9bbfe1d2517cee3db1a96c8591ba51ca26b36e46dcee805d96b101a9525b01f3e28e16fbf4afc36d307fd6309c7060e3b38e1d4afbffa1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e252a24aae10ae22b6369374600ab3e
SHA17e8bb61a8aa4aa0b27d63f24448dfb114cf62720
SHA256375bb9c4c682f9726a86d5fc7218695f6ec0f5c9d5d563e5363d7033ee9b744b
SHA512def210ab5aea22e082b5befd625c64f572659e7672640dcd792f2beb6d5f55294e4558b92f992c37726833e84db2e3c2a257ce518008da5f8a874ef211711b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5788a65a1a7ebc01fd0f29977dcbf8e66
SHA19ad87e1927dc19a19b9b818ddf89281249863d8d
SHA256205b14c272d992daadf3a2097219acc5863872c312c1b653cc4df1d4aeca0389
SHA512d478eda8ae1edf06c892cfdedc964b597328ee65989e39c5953b7afb02ff5a0320fc3eb37fc7eade0ee98967e5f643f03a4b58542079bca2a7c6313ed2881353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cc09040805ea97d503451e6bbfe8d20
SHA1ce3d6f4a248f74cdae5f87694f00de21267ed87a
SHA256901ac4e7ce8817f247bbea4aad97365ed45714c6e73b09e4a0ff68e03e529857
SHA512db92ace9e0f12d815dc7c5d38836185197417cf68c41f6437c23db3e784ed9223252482ca4fde741419ec23207717b87d5e2de8fa225ce54030f9ee4b15975ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a00dda8c7afa8eadcbe4c0350f4beb8
SHA17375c5354535053941399c4601485f8f075d460b
SHA256cacb64c46c970c123691b01ac83cb64720935d7a7d799370ace867a193084644
SHA512979ae90f95eca7b199e2da936511946202db4a4b0ced37a74b580aaf604052b012c7131e72a5fd960ca92649d9963a3c3cfb0d1bcc94a3edae4ca1c102533c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562c417067b9e44d89ac069f97f4d93e1
SHA1e86050eacf60d7c66acc6b2af17f6076e4cf1ad3
SHA256b79a505e07ee9e99b6204470b065ba39f96d560d52a63640d7e357168028b260
SHA512be99aa324fa214a03ea97950053adf66909f70230c7f73635a589b0fae7e4c093f87b1eaba661ac84956be51ab3acd052807a96d7ba5f3730a23e7770b5306e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe01bd74f0ae36eb6cbd7e446e3fd125
SHA1d6172960c5c0184fcc64f4937ef8accd1392a2c5
SHA256b0629216623198774b45e1968a0d3d3f5eebef1be9e9ec874040890578e874a9
SHA512cc8f623dd4d4fe868415deebc607ff4ee30246b784d295f26c4b657738ecabf8bf7afeaeb9e008f0bb2881a2466babeca1dca47cc83fee15b2589d5e93028f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a3c32ae5696ef3e355cef937bf3f0b0
SHA1ed81bbecf342a77df01edd024122dfac461890b7
SHA2562aef551352b6549e9a5d2f95c2d0e3353342c0ccd22567db809ca7afd507549f
SHA512332459f5621778ede0a9fe465b7ffe437812718732d616c5e84c6f75fc7ef36e2d734590fb616a36ef1615743419da6779bd576dfb8ac972028340c6890a72f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59223af461d09b0b666a490e4fecba16e
SHA1cbca4d6bbd2025e037d0ace2223fec575c219bfd
SHA2568f964d94f6222ae62a9c2a79d97cca7f156b29d8768b5157f2ac8b12a0b86a0d
SHA51208a78855f25b49001b5291b7b93909fefdc0465c759ef8f19a1f7bea30f7d0fa9513a7a3e7190e9ba32004eba1b8b1938abe80a8d31c2e005990b4eff61b4bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583c2a971f236a743f71e2220a33b410c
SHA1d6932403558bf538e974dc9d115f96ee4838d157
SHA256030529af73f729c97a1a7523f53438c364f185e4a7f1cfcc9af701c1e3832252
SHA512a9f6444f98f24a9438875d9b002e053a29a431be70aa7a94aa988cecd67c12b6349cde4ada8d4e76a7fbae52f79036a6500aed3a6cfc435b87376d337995c6e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ceb653a72b373b037c307443c8328abf
SHA1879e5a9a71dc3227329aed6fc020b32ba8e949ef
SHA256a4c6b7406196d06dd0abe04922ee2217cd9171a33e2a2b855dee18f6369d93fd
SHA51284fe973199591bcc41496d639895e46a5df8ba3f45e2343e150d4ffb40719dd3ba23a213577bf2ae788f6d7877afb044d5c6a0c245d8cbe3113414f70c67a0fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51eb7a37f1aa779c3cfcfe0c7d9116420
SHA1ccab97fbceb5183f198e00f88ff06657b7a2a0ab
SHA2565955048cd28f1a86510962cfa110ff34319a50e3e80e60758fd40cbedaaa0b65
SHA51237d7138a8a86d56a2929e8a7705e3e19c3ef17364140ffc7ae39007b0839f5cc9fade003c42756a230a73d5c111805877f5ac82edf9b9818107013af728704f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559726c643d749144b5dc5c1c73bc35a5
SHA1740b8d3728e108606e61cbefd187be607f377f48
SHA2561eaad0c510fcf4c578266bc2e194a6fd08be858b7e5ab4807785c4e74b594a56
SHA5120515520540ec5859c7ef98a28d36505516bfb65091700923aba1f84ed7e2220334adb68dd5e1caee27189f20b288c47218501399880d11eb39a627a9ce4a237e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdb536f49a846092391f49d4525795c7
SHA128822e0845683f65e17ff0d1ef98846d0d48553c
SHA2568faa67fbc0d06040a94ec7f9fe42a8146613b0bfe3cce77fb181366ed9b220de
SHA512d13e796581e0aadf375e3294ce5f9d370fe382308fa62f8616154a519b478d937ccf7480be4cdbd03cd57185a423feba31cc4ebb5536078642ac37e9d9113b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb3d5e1476ba7c343ad3c563f54961db
SHA1dff8ce403a7908985b215a00e661bd52d7f2ae42
SHA256e1bd0e7291eb9dda2fdca3ca75cfdb53866615cc95a7b329253ec5ef6b5e1b12
SHA51233c328f14bdb0d9b0a9f5280465d5ea4e50489d067b9f1e15b98d121d1a02ae9cb0401dec603f677602e0f9136d82ce957263144fb0ef55c7840c8fe4fffa610
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a