Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 14:43
Static task
static1
Behavioral task
behavioral1
Sample
2fa1a1eec4e9f7407490d77e63984ad8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2fa1a1eec4e9f7407490d77e63984ad8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2fa1a1eec4e9f7407490d77e63984ad8_JaffaCakes118.html
-
Size
8KB
-
MD5
2fa1a1eec4e9f7407490d77e63984ad8
-
SHA1
cca731a458958d8ba66a1f9f77b2f729fc6e1ef5
-
SHA256
70bb51f83326bb06c45301f952e626de5425a2e7d142002a4e795cf6e977e6e3
-
SHA512
4b8ce7949cda4ccbf835789669975ce0e8106a79b84f1f03fb1149e81ddcf671a4beb37fb71d85601f1e13aa93f19944aea41caa4ed17584e981c40b735334b5
-
SSDEEP
192:SI+Fhri+KLF/sbF3jc00En7qVYDkvkE2F//J1lax7TR9PAlzLQ42GWGkP:SIui+ctcqncTx/XMfP8zLrWlP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B4120041-0EDB-11EF-8962-7678A7DAE141} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000040bb57ec6e9dac67518bb589cc91bb950a4d9bc1d22ee33311592bd75f72b458000000000e800000000200002000000053dd0ea6f610cc0f2506dcbb640208b32f878f6108915c18aac91d76c4af01d8200000001b3b67ea2062d548c53a2a2c462347e05becefa95751b056fac5037884d8c25f4000000016b4b6b8bf4a2698443605b31e8893b871c545f96f25f91b5beca28787d6c9b059505c0d6b451506c6c7ff169fb94ef0683094df6a67162c37ec816ab0446cc4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00bb6789e8a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421514092" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2036 iexplore.exe 2036 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2604 2036 iexplore.exe 28 PID 2036 wrote to memory of 2604 2036 iexplore.exe 28 PID 2036 wrote to memory of 2604 2036 iexplore.exe 28 PID 2036 wrote to memory of 2604 2036 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2fa1a1eec4e9f7407490d77e63984ad8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5001d53d15f7d8ee4c3410b6801a4e1
SHA106138b6a70b17424bd643493c2bad20ba048fb65
SHA2569254422bee43a740f36c77b37dbd662e73cf7125b8d284c5c90c2326b430fcee
SHA51268558cfdcaa170c6efb6a75522c0d2ee0bb4009ef99a4e277dafe6926d7a73c30a1de795056f79b0146620247ca95fb2276ded88798ffd06963d8666d3ae4159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ac455394038aef10bdfa1fc775295be
SHA176c010582d06578778cb5f432b6df96d79f3446b
SHA256c127b6a6404bef2ee6c554c6e41a3da1ca57c82828598e33c75a8bd20c3d6bc1
SHA512fdc12a9dbf850285683e30c648503eddad49df4016f91061bfd9da88b2a84ae9c10c7e8a2319b18009be4a09c20ab8772d6bccda4603c754258ebd94455d349d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5242812072452ab93b8a937b747ca5e56
SHA1b253c0004527ed3c08306f07dd12dea10764414c
SHA256cedbdfd89cfe86020f297b1fe6cbfec35681e0a560d5134d7ddc8b33225425c2
SHA51233f2a3c873d2a9fe71675e090eff6d8d846945e1b389eb4abf4b1007b8ed169209a6f1c1c8e076b9fb315ee248b4303d9272d434caaf70ba93e7d13a786b7dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5941326b2976a8ce0f14ce0850499c942
SHA14182d5eef4fed7d601fb55b3000f4a157bbcc0ae
SHA256d61932d04367c956f85f688809b188275501c694ace5c13047114fadc0d5a964
SHA5129ef867397db109961fb3df073bf41a7cc867115052bef796dbab8e62e79ca6ce3900a7c308f81fb425bbf62fc6d81be2ecaeb84c3e1e0992782b52b6c815c455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4f8f033f5a48905ae12c6f7b241e8ad
SHA1677dad9f0800bd5f969f194f2b7bbad31660ed37
SHA2563a5ee30c063be4e9437de60427884753e7c132c505d47cb23f7a627d32095d0d
SHA512e032a80ed9edef78a7a7c90b07d5aa42221268be827e7530b9353d06c5963159466cb41b76b910f9ed6e2d4964e8da123240599e5e5fabb2bc1c6ac855996b0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b72db8c339316adfb3e4077b7c65d88c
SHA11c783176ba1ad420eaef0ec82d2c9228d79b9c48
SHA2563b30df5c5140498d87f58ba7257c24ee90378288d44c5164b1437f1a7bffc767
SHA512eafd38bc4d372e3c9ec623989d4e2b5bd637ce64c26b81be108d51468222f5df0a70d1824c9f7ea872b84b7c859903a631df5979df7d12f2891bd68eecedb844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b89f81479cf2948ab92dde1f8a2acf5
SHA1fff5fdcd8eab8b61ba9e491b0658027971529405
SHA256f808a6eb2ff9acf73322b8fca30f890688862873207cadbf7e47cf9e7568080a
SHA5125fbb418f4086354ebac95d81c124338a3a393e368eddb87d5c00b5c4e81cbd87d058cc23377217f43ebc55b78f9c71b1b116dd768ee397439236b18aecc30fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5520708ed451bcfe477eb7a5f45065e6e
SHA1791f75066e4c66452bb82f6cc98e27d9331b0439
SHA25649cb391d6ff21fd1d1ed21ac443148a395a24f852411cc97442801168956967c
SHA512ea738347d2c7dcce6070e82927f87988b804e8da8fe55a5f9b8f66af0fec16a3791ac542ff69d8a062fde210e1dbd67648a69ce06fe3cb93216210ad345d8341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d5d0e6835b5d4c0ba0ee2fd1d3e9afd
SHA123e005332cde35b06cf7d2618f6f1516996923f9
SHA256a67b07f1369f17c269d26d0a59fa945966d1cce7fe2e1c5dba57be49a0d364c4
SHA5128fc23263672686573c1ed3ef3f09151decfb886e0b00e3be27f4e901a3dcdeb9d7529d2787d4b64bb37e489a049f35148114b168b2be7b2d3bcbeb7d07fdf2e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d4e20a5a5bd06c4a9ff0ec0372d0dc0
SHA15536c73a4145d92859b61987a9850f147eefa095
SHA2562734c6df2cb37d07f90c596306322ad986788a132db9943fa81301b80bae34fe
SHA5123a6609100abb7c47b4e31711b04bb56e8af664f188af5e84a651e60ade28c1b0e478fe4722799cd84d4e3a02c2503931ed07935f3d97f78cd8141b34ff3e8102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5476e524e824385ce2de14e72a6e6e251
SHA1ecc19de27c819a1d22017483c81fbd86f0e99e5b
SHA2561945ed1243c4f7d56dc65139980b15a4243ae752e009670f213e1b91d4d21616
SHA512349204abe1069831bcfda0fa634b2be242256c22171ad9efc2ea2e3d84dbd8069ca32c6b32641e9b18afad419ca133b55f0a36f4c40b6fb384e0dd1039189337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c69af81aee40a089881a889e8c7c23a6
SHA142105c647989c8106b33efcf878ce6a78a944e53
SHA2568732845b333aa23fabed9966a1f42ff468338ec6ffd743949acaa5ed13f7a164
SHA5126eebefd5dafcc503cacfb61c4057bef7c747e23fa31cb8354a08d9652baa5dd043a5776e0c956b15b0af0228a3f8b50a1e4cd0798b5fb2386997a37fe8175069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545c9c5bfdaef6d100ac048adf84186ef
SHA1028c165bcfbc685e8d5c9a47d503d28e9f5412f5
SHA2564e6dd097de979a9fe3f58fee02e1388ae03af139bde79fc64db882ac01d84dbf
SHA51215802f91dcdef58df148269c0ffb848e53d89fce221809762c366de1a8bfa170f85bdf0e209834c8d3955983e8bfe296b8f9af96786c6fc43a0744142d2f32e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd1226f0b95dd61a1f44e43aff52a696
SHA1d397138b0a10440c2567bbda07c5218ca8919507
SHA2563cfd99411d3cc1893fa6f6f32cb2976c641678a5131c8cb34066385a4227c81c
SHA512e29bdf1810819c3c750db8578bffd3ce38e55bcf454247eef21c51161a623f8b96426d88a527bbc00a34c6ef4c28ef846d34fba05f66d946ac28a8aaeffb142f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5900b2b7bd624b791c5358e2ecedfc0de
SHA1008ac0686013cbd1a36909f1f3fedcab46f4497b
SHA2568da9edf1af8909fe05a3f9b45b6dee768df9a2daba12357c65722b4644008c69
SHA5129157e6bc29d1258fa40532f1ee4373a07c7913b47c2c496657803eeff7954e59e0e5a06288a962758945cf57291123eee0f3f2e88c105f1eae76d460fd539807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4078e805691bad574d58e22e78e56fe
SHA19c3a3c225d41bcf10b123c4534d6051e36ec4895
SHA2563c87e4ca395f3a8153dd26e544145497b979e04d04c2f0e0cb1da00d663a41a7
SHA512ba22edce5af67c80869cf659f25de6c975326dd352397c33b36e35fd9d292b5b51238dd99166efc340597b58c2f30c25ff90537dc00dd640492d1bd78f45b5ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52312d13df3fee8bf16698659b6a4c23b
SHA1e39a70f72045e99ad5fad39f110ad9f0c0a90a1e
SHA2565c107eb8fddcbc70faab031ee4973f938e24db0c6686f3ec20f7f6d93be4eec4
SHA51280a0a869f4da4e3c88e94962f8271650952626b1b8d4b6e2c7485f67bf71d08b582ed893e13d3b46f2a75f59234b3a833520b8103e8752e326a6f55788e0b539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a5083526cf7616eacca43f823866fe0
SHA15c5fcbecea21c4296c9eb1fe75cba3d5463119fc
SHA256278c5ee8ffc79c144df29d69f7aa6475d54368a8571e93f965ed59bcaf7b94cd
SHA5124dcd6e74bf6608d0c8895a9a29327fb5c61a522d628235a3e46dac2000940d3c7f57e25830d9a37be1724308170be560c607957ed6ae9a5b05f61faa11b01b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fba4f2d5c6787c7442d0e760fc81ecb0
SHA1611dedb05c671709f2dfe5a925aed6c00748fad3
SHA256e44c6301090186ccbac50d5083120838c1f2d00dce848270f70efec4c616063b
SHA5127d48a9bd92d451f15572512a2838e384f5d87b2d0083a52a3773f82fdca6856a837a2eafe4b91a13fdb238d45aece7e2a33c8a326746066e0b46c467bf8ae66c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510295eace612309e532ebdb7f29e2a38
SHA1487eabdb20018f9bf56c355a3b6421a722e34c44
SHA2561ded1344386571afa3d1c6239a9dd2aa8902c7330efca2f4fe3ed2f380181303
SHA512b28377b1e7f651bdda427dd2a132749e7167efeff4adf724f9f0dd7594e1461510742507c638b49bdce9f18294557d057a60cdebcac668fa058b03740b4eae8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535e2bb9209a6be71de3be584b8a93fe8
SHA14575ac81c99e686bf53a0172edc198ea33827875
SHA2566b3429420aa6c8ef51576c605bedd3c0fea883c3fca3c0a6e2cacd2e20160ef9
SHA512a0f792b51a5760fd7bcd183194d020285fcf9c91bdd797bf048e5e46c0c75f60cfec7ae46be9c10b6cbe038c10fc32c2a02b82ef9e87944c4a400d0d9ebfe161
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a