Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
618a73e87034c586d924cdfeff8d497b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
618a73e87034c586d924cdfeff8d497b_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
618a73e87034c586d924cdfeff8d497b_JaffaCakes118.html
-
Size
4KB
-
MD5
618a73e87034c586d924cdfeff8d497b
-
SHA1
e9178b145de1bf62e0e841d08168b7d8fe0e0543
-
SHA256
67d5887067a24d66e41aba78dbcd8573dac1ba3b42096bbbb9628ba2118a4dc8
-
SHA512
e61ac4f6f6d64a6c1cc07a19eb2af18ca68c3be1958c7d9c1f6a73e0e4211b7a61f4d3718dda83ccd75aa5c8ff429155f36ed45b7debbd5795c3f4eae1b9a371
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ogCEsd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000218aec7701e26cb86ade45783cddd6966dd7386b7251db1f8d5ec197e1191f9f000000000e80000000020000200000002d933bad351138ca8194b3641a69013c146a503a5d09779c8488cf784f9989592000000064dbe439020bc0ab076f7b86ec17377de9ad432a987b4b230ac7899b79ddcea040000000ceb35dda06c78b6047f65ac70eabef37a6fe29a7675d5cb839cff0f8e17cd50a4ae5fb375aa22cb126419db10c7961fd6893e2a6a5ed813749bf01ff90ddca10 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4C191E1-170D-11EF-AB84-52AF0AAB4D51} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30693ea91aabda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000f467644d33ba39c33b1996315e637f3a0996be71abe0f78060e493c3e87e8437000000000e800000000200002000000024fa892e3d84340b3ecab8e432f02f722bdd738f02071a8e24013fc5fbb093f590000000841eca17108eb0fce4e1b8c977dc938af3e27b2d35278ff83d2aaba9629e108f8f43123fc2a8704be7f986b6b17373164d3dec78d7b8d60d15d8d1c3bca0bdbe284b47e3b8cb7e63146430cdc9f49438b18d23c12e6f751f2444b6b304956c085d9c2ac8019eed20a8b72ef3f84413c69cd66e48d9134d02462641a1b146db61c64b5f20ec216e06899446c551c5e810400000008b9dcd7f08980283c8376c5f7a6c3acbfcc4789e0e53d8ed0d6d7d48979b76f4fadfad3fa75a296074e9480e4b800b743efe69c39dca71d52369cd6801fc99d7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422415231" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2428 2020 iexplore.exe 28 PID 2020 wrote to memory of 2428 2020 iexplore.exe 28 PID 2020 wrote to memory of 2428 2020 iexplore.exe 28 PID 2020 wrote to memory of 2428 2020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\618a73e87034c586d924cdfeff8d497b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e75391e3c7c21dd7f91170f3d7ea0bc2
SHA19532e3e736fb7d3f0a2c1d3bfac56491eb7e1c70
SHA256f269b60a16fe397d4018cd4ec5891db2cf0a9a0a968cfdf793d77b05d3e21e43
SHA51279f53baeb674769a8c3f07f1d1058ac923da39c6f8449126f250ed1bae9eba48e0e8f91eb9eaa0cc44c272480c21ebbccc60eff11d7db52b97d81bffb7c5af82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d406ae3046436e4bf584be893e6c8328
SHA142e26b912fd2f699c281f2990aaa59c8a8c25b3a
SHA256a904f72ceb1d02a30df209f6d0f7303d30d784cf6702fa057c6513c99d80ecd3
SHA51238c9bdf43d046e9f13053dcbe307cb5a57207834de12cddd55bbbf4393a0fb5709edca9e1ae2ab16dbe91d07c963eeaf0798ea9354f850cdbeec8438771c0cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566f8c7339e154af453604a9a7105cb76
SHA10ec3453042035ee0f5a076827037e5ebbfa8145a
SHA2566ed3462e736c246cf6a6bc2f78bb8920664aa8c1a0ad99fef3341645a5a4aa4e
SHA51223ffd744bc18b353631d307ad3eb740b7829265d1f7c0381bc2f09aff1e2e8643fbd3950cbb5a8c437b3b43a1bd86ee34ddf55321e4dd222adbaca5e93ce50ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560a94c8d45a1a04cfd72c51017230bc3
SHA12268492e48b8b15470f18ba639a0e7457e1f151a
SHA25616f9f8f0162cb91c2e4d888a0dd664727e3d8ba8ae4c89ccaa159c9f6d248936
SHA512263a8a326fde41ae126ba7989b19f70fe7f852ab2e6abc232247cd8f79ac7df02c7815481462c1b4a39425ae64b9124c26c4491b59170151cc473739077a9844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f56aa42e0ae360c46e7c310ac936b88
SHA1e117cfbbe7b46c8f27dce2a21fc6fbcdbe7c5f40
SHA2561f3d76b24fb18de2c0d8dfbf3ed36bc18c9ca843820e4a4d4e57252f2faee498
SHA5121125a936da379d6d8c79fa9c61dd050e1d38173695daf24e689e5a2d3ec8f523f9978397ee2356b052284256d51b3c922ab979b0ea8597fd6d5c734c2a848d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf315d4f17726b8536347479f98a8f57
SHA1459c6ed61ff394a90f887ea73a28448625657978
SHA256b68c4b1b5d30d8321cbb2f0975c5d39fa4e579d1b613542a3f1c6a4d52b776b6
SHA5124803b4db4f9c0a33644223a58b4015c72b2bbb8223dff29519505dabb9e7eb6d193525b46d11818ce2933e589ab4ec195ca10bdff0d13188101d5c85fb9f2825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58af2499102ae7c42d68ec177db800367
SHA1c8aa821962ad4a3d701571d799b8e4f84315f5c3
SHA25624ca6676284d585474919977a0e2d7f46fad15be95091dfabe04bc7d971bd5d1
SHA512e72c69c2be937f47a738b95444a62398f6d6839c1c08c4d963e2f7bd1c7e0ce76f0fb2950c743cb8a09a32e06a14763d4845ccb1da200490129a47f1c388a9d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eeff786d46162e813edc69c3d319721d
SHA184f8a551b606389980ca4b1a259d0c649cb57057
SHA256adbc2934d8febdcae240ff3ea046f5e48160277c06a8b4efa1f61825d28726a0
SHA512d7641f976044ef84e9fc92016ef19660a0de6cf65b42e3b2e1edd624b3fe6396f3e492ef2f2034cda199b35dbff67e6be06e43857f4aab1db4ac9abd3e847c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5723a8710abaf7e57a2a722eaac27eab7
SHA1a13aad50381220d50b06c5c3efb16377aca6e393
SHA2564e1ba633291301888797d65db0e543d76ff91d2ff3d92af89d3f38cf14a0f4f5
SHA512a9167c0b22b7ed003a53c2db165fb15d53819c057946ff243b0d73a79f722f957b8888e2967628f0adf22c661802c18680a66e74414bcf07580345af3006b2a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1bfe37b6c6903f389931b8692f61b74
SHA13d032875b0fff29aa5431c86c6bdb40fc17e0fd8
SHA25651ec58d6a091cba3cb8251ed1f6a4b28d8e3056de9ea02f9983e73bb7bec3c0d
SHA512ddc7dffa807c50e81b0ff57224691196b5b6e6474de52768ebf6e60884627095ad5b6e41cfb0c2ae51687debae74b6e414096d91a123048adbc0b0fd80f4b62e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f7bf1f1a978874240ff858ccb614443
SHA104007440a64a773b6daf31b0f05f9cdf50b4dde5
SHA256822918d1747c3445b2e9b40d0745bdd1b76284b813f0401c7d4fe31ec55ba16a
SHA512be2e5aa199a995edd7333783cbc0ead2f2b5fdb7faffc1392969cc6a98ff724c08b3c8defe41e55552c88a9cd26a6233d0294074ffcb70c297c8703afb5ec4ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506fa9f71f3b1a62ab6679c77066d3db9
SHA11855140dfdb2886413f679b3bc8827158bbe00b7
SHA2562d127eab1e580ae4a1c4f8ab932988edbb534e55ba3523d6cd470b036fc255f4
SHA5121e40f53e28b753a8cf5e3fd8ebaa3adf61da602b59c84bf0c67756536f78fce6adc013d5f24c40f100e98a27bff9427062c90dfb5c06c67fade742c15b510eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dffc8bd77722614c2c8d1ba9f8c6e32
SHA1e0f4f3aaf2f183e8bcab9103cb3263e111592aab
SHA25628f839828631d5bb36560fbe662794d529708a186fc569331ef5bb1ddbe3b3a1
SHA512b30e466fa4cf3f4923f0091766ad88c68218f34d46538dce1ec827874bf8c14d5bc4625bbb37258742a0d97b01cdf81268fc4083b26780145f89da02d722694c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532f2e6d0ff548f372b9439fa66b1fc78
SHA17fcecbfa334c48466133cf82ba44aed126742332
SHA256187014ee010c2e32e7833a58382e2403f0a5944545d63250076ef94e8d26ae3c
SHA51263b8c6c247d6c2bc7af8a60d141977758a00c08bb97166f28aeeeac1f1a706a20bd7e8179ef69191807a73498d28b9cf01d08dbc5a5a205fb7f01178f8a1cbbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7412ae123e0249f55aa4f1ba5cb4f84
SHA12a431f4e224d73716be5ac834960d2db5013cd41
SHA256c6ba1b5b6b448c427309d97070d42bb82662ca192aae1bb238870c8b933fda18
SHA5123ea6a32048db898dcf681dfd6dd0928f5ed9ac58156ab272ce5dfedb46f4308a707283b9533902db90792f19482a3c1226eb68848b19ee25261f2fbe150f2961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53168ba4b9011ea90bf1ce0ccc514a34d
SHA1f48cdb0874f27e67c511b835401966794465b323
SHA25610732526d5f9663ab0ce4a3b482038ad06a982da43f331d141cc4fa62a3fd025
SHA5127847ce162f2f4cbe8b6941ba8670b2f367fec0b6404c6277b1bc8cf927585014a929cfe71519e459066cf89f51caad4a427026d54ef3977bb9582dbb261e2a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b02b72e70ce3f149775dde512008e745
SHA1669361f3fd8568d7b825dd200ea7e257dbb1a1fd
SHA256c993fdf36f9ca5e7dfc0f2bf05bb7fad378fb3ca7a6012477872818dd3a31c16
SHA51238efcfa4f4267f5567986b7403f7721cfe8bc7aa79d492f6ce8bb47f16bbe63f6e06a1a85e459215c04186484ca24a99f20f23c7a805f3b012a9110e0e0059cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d96dbd10d8d2bb62ae94585139db7b7a
SHA1e2d8220d03f139be1701c77a30186c12b73251f7
SHA256a150160d57c91448bcaa2cea3efc2d3c870773b7f594c9301d239ee628959f55
SHA512f83f61b3e8569f5ae67017da77496128f437cadf1fa538cd1b8a1620fdfbaaac3e4177bcec4d405b711169ec9dc27562722edba5bec357b0cfe9db743b8e83d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c09b91a4213920da42c2db9b01fb4a97
SHA1d6f186d6b7088ef71be13688e4abe26cc13967bd
SHA2561f3006a6d6b37afc11f22456049f754fbe205b0b3152de248486ba77c5d3081b
SHA5126876cddc4547c78a4603fb7d1fe652ca054b742b149e685f45d71f28c31d1e6f549baeec74fbd51ae2464339e155a8f5d728a8061dfa5c30901df5aab494a592
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a