Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:08
Static task
static1
Behavioral task
behavioral1
Sample
638fa25fc055c6a85aab354bdcbd6e5a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
638fa25fc055c6a85aab354bdcbd6e5a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
638fa25fc055c6a85aab354bdcbd6e5a_JaffaCakes118.html
-
Size
13KB
-
MD5
638fa25fc055c6a85aab354bdcbd6e5a
-
SHA1
4ae0b830c0f20cd96b09a8e0e5b5543fee2c6d4c
-
SHA256
2639988790b05d120246ea43c633a03c0c1f618fe810a391aba46dd921e35408
-
SHA512
bb67e09749c171e5e0d9e995c1bf30aa89837947f2d45b167dafba74caef819d7799379ebb8fd2e0a5599c4ff1ce544fe1c272e4ca7436f6caaf78bc86c98d35
-
SSDEEP
192:SQ/yQ0i4vZCciZJi0C/jIBU1rzBMCul64ctTcePc8B+P0JapQNZ:SQbaC3i0C/jIBUxBMy4HePc8B+sh
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0fb8a7788abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9CEF85B1-177B-11EF-AE43-7A4B76010719} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000003e1be7452c3d4dcbf6ba71f7dbbb4a8af7db10a5a42fd6234e69887edb44d6db000000000e8000000002000020000000a0309440efe39c8d5ba46a8b52388e458c82002743f96769202a0d7a015e9828200000003129bcf83c13362b062bc502fdb0fc7e9667af700ebd2f6fee34121223789ceb40000000d7fdec15796be65221504dee5057cd1c414035de4cfabbef07cffff5d973a13af5cbff68eaac86ef65bca0b71e1ed240973902535827ebf9cee35f742257be97 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000041c3a58822a17bd9442821cb25d804bd40fd02498b89b6ddbc3e35aed456785c000000000e800000000200002000000029e3803529742672122f5d3aec252b64b95caea0da39d298f8ca831ffc2764b39000000044a674ae74e3868d44fde615e31740b0cc5a944a6cb91edc9f6b45e9c10432d380a18afa35ee63b0436007e095e536123755572da454793873d7a7af3d2de9d4e3ba1de4aecf722c669966cc23a9e04eea6a95a578852bbe1df4d7b59d6839e92c48432cd9245ff901f548975b177c3fccca64979fb780de121d6b263ef12b94c0728d0e8fe1b502fe9ee4a1d550d32240000000524cd25a6da64c87853272593e123144a878050a491f31f40ce9495d0e8127237bdf0c209b659c8942c931eb898e69944891747cb693be0e303c736d675637ff iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422462382" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2260 iexplore.exe 2260 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2260 wrote to memory of 3028 2260 iexplore.exe IEXPLORE.EXE PID 2260 wrote to memory of 3028 2260 iexplore.exe IEXPLORE.EXE PID 2260 wrote to memory of 3028 2260 iexplore.exe IEXPLORE.EXE PID 2260 wrote to memory of 3028 2260 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\638fa25fc055c6a85aab354bdcbd6e5a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2260 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2d5bffb2d2e1bd02e50c139f209313a
SHA1d400ac6da9dce1d17892844de8b0e9549777a39d
SHA25619a357a64c1068c74b424db3aa5dc70a06898ef18f3eef3e2a1a49930edd296f
SHA5124b6b1c777f479fd284ce7c3ff957e5156db5646a0dedc94dba5f2304eff4b6f3453f3b4516f9d3810a5a301d3bf185beb63d2b0377323c6652b69e76c8aabe95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522cb6051df5f38da079ad48363f803d6
SHA14aa6fdf02e515aec24d8e2befa2ae3790c7f18f0
SHA25642a29d835dd6dc72beb4eda0401a4ab9414e2e5ddd12f895fa0ae62071d3298e
SHA5121415b2e7f08ca7b36d1aae89bf5c03b1903bff01647325f71025a71df8bf0694db269c1f208d87f14ddd753318ebf9af600f03f555fb3df498613e9b022998de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d38a0460ee42cd040b52e6ad35f9659
SHA1a9a3b06a1321e3a47b276ec87f670945f153ddcf
SHA2564dc236c9bb6e6e80c0a2322c38cbf88b69282b810ec63886a81dd9493a2f079e
SHA512e329b6eb361b7883ab0a149c7e1d5e9629720a0a44e416397285fcc821101d9c901ff50ff096bcdcbf307b309cb5626093495f977681a6f3b06c8c64529dea2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530f25f2773fcb14daf256cd8e8e11fae
SHA1887ab29b748ba76a9878be06de8b92fe88ea2045
SHA2565f6ec697e9933c31a9c216249944e3c505dd345a1ac5f670a6305d36fd516a85
SHA51225b82fdf5cb4b992f9fb540a0f8e718685cf0296b5be8ed51568af59f1243165bd47726a001f037d2c04a919d8674dda1291a423332e76acf27b3176df58e7de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6dceddf446e469d6a76131230d2feca
SHA10cad93b86954bd2ab168a3900d1434149d64dc06
SHA25621b9a6b9e9a1f0a60763e5028b93333ec720746a0de156e0369bd78ceec124d1
SHA5125729f883733d570298cc57e1c478fcb5b72280d55e2bf77f694accd0563aad761edde1666e541df98dac9b5e84eb1c8bcf6c796b26e432035ad06e57379ec093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e664463678cbd2c739f6b1fd0389bf93
SHA15219301a2920985c2c5d5fe36c8adad6910683ba
SHA2562183dd6f9065b12124244982b37ff33912c7c9aa797b2baabfbb4fb474d39fb8
SHA512c69f7cb5539adf2ac0ca2195888a6982643097b8c657f84d5b546072523952519e0ef2b8237029340eb86dcdef20528091d36fc8c4bc0e23394f15d333992a82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7da465032f75f0e89441d8d0acbbd2d
SHA1c2211cfa290b3700913dec9ef2a713b384b6128d
SHA256c405e7cdc36eb543f753233ffe97142a758800a1e5a0d326e00f9228e9c57e54
SHA512b239fbe4426dc809bf6eb96c5d4342e0f0ae0102b6215471d25e91a63896888ffa0ca4a39212cf762d023b35a80af5a4532fdf5bc5e6e9d80fcd56ce7880759f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5824ed3c8b4f34b217ffa180c48d7c56d
SHA1166c1e812491e4cb40d2f755a69c5a342cea8995
SHA25694477d7c38a5c83f87ef88cb7f89f3baa781b1da6f01c75b3fc118eef1b1844e
SHA512322e476b2bf1fcd9c2d26b968d08e4cd24c496e71cfd56367ca58b1291efacb7402700eb9414c548f9ef1399750e29622c3464ea1680a67047c0ba2d7ff4d24e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57aac034c732c48028a90f39ccb80f5fc
SHA1a51dcf776a10a7446342c886422e99f998146a1b
SHA2563c2d7d99f0fdd744288c4bdbe1680aae7e47b22f602612bd0ce23db019e28722
SHA512c2214d1ce4ac379e50d357f032f1dc1e540cbfd06a5f7bd7c1fe694f4b8df11b37f242f07f194a7b36edf64db936bafd07676fa1520f4f92276dd7c80cd9fdd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565f4718d17e752e7496b106d6735b7ee
SHA1f59327a6f3ce2046ac5f5eee3cbd79e1f89716f0
SHA256487fccd15a10a7a922160be872656f38fc42d952e81b1d3f7efa8e7e7de68b00
SHA51259436873d1c43ebba14dde023281a8c27ddbb467e6a8ae974685dd7a5d5c997de191a0e44e4b561840667dcbf995115947e06f68afd5b6cb61d300f8889515c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bca0e5a46e2add917f73817838c58453
SHA11400b0e97acde35977de5e1e44e41e807a9dc8ee
SHA256f161a1abdd6ce84fb5e900c1fd6f410f3e783d9b3d7f3befce663ceceb1e7219
SHA512d6e36d9e4b172ec97ab6f995d159f667f308ef4c01c69af3a52021a81fabae0ea0c5f93daa7065bcddf1a6a5484ed97b0607254e1b87414b7f74959a98815675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536b9b6303048f2bc140dfe186b980b59
SHA140ec407cca344c2d09ae4e12fdfe2ac92ecb3448
SHA256df247de0ba3be5a3bfae2e5f0066e0affd165abd00a219dde8a11e5ce7d35180
SHA512dc72d2cdd7f8cf7990d484fde98da796610b079139fab316a132513d18e6443a79f1085793037d0f35f674b3e19925bbc56be9b8a40dfe0957fd82204878744d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d0c71f8eca92c6aa22b3daa532865eb
SHA164f926911c5419e999c2596cb1ad9b7b9ecf4e89
SHA25612b6e5e22c911871718cb20e4b1b73cfba33aa766c171a8788be2745a0743633
SHA5125cba366514faa3238130fdcf75048ee44a07ec1425925d2c4f44ef9245281d1703c3c2a9b5923b1d0774a9068f580f61decbeee94e8dcd309c91b4fb35fd662e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d07319e4b011c9f06621d1afea509d6
SHA1f66126ce42d808078766f621225292a47fdd97b6
SHA25641cc6ce59fa56fe896e7635e2cac3a97e7318ebd3a7ecd2b0c727e9b9e2f2c01
SHA512de0d92c4b237b91d9460af46bc43665d54192e6e74b97a7392e247f4b73fa32e218a42ad9773b6a4bc08c86c2c9607e0a8017017737ca81c9d232096cdd88460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563ee98d62e0cb1e6181f41f76968390c
SHA1fc6f41439eee150e5920fe9677bf9bcac8740114
SHA256374ab4426674de0392ff41948a0b7fd20b11b89b8897ceaabf7e70ce4a6dee31
SHA5123ad274e0527e859c190b7997b21269c5c29ccb06dcfb826172dac2e333d40e4883ae8cd27a9fe2ed3fe0f7fa426a8b0cbf938ab4e6608573afdb3a57e5a5d36e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff224f09f11476657e015256666fa479
SHA175fda7df6e21a66271d5371de4eda19c4581021a
SHA256792124c8080663d5a4d1f14b7d300e29dc2948268cb66d0b6b33eef630620bb4
SHA5123a2ae1932fb7474eb0c24e88b183ae1f3ace633c33d88079765933a2f749b5f3f28d6f9fb6ef015093b1d8c6a8f6a67065cad14a64831addfb8d572c3ec39426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50534e8d9d27a88a6bba8ff137b82f791
SHA11e62cf986bca04e1f2a9b1e4b43112c132d97b67
SHA256a959e6856e01b8c6fa4419d2cef94515c821f6494ee4dfacb0e9f717e22d08b0
SHA512a56c28d10a8656dddf562dae9f668b223dde851ddbeb97678eeaa7098fff5fd52853598baf54a629446a73f94ddf2dd4d55601120e06031b352cdb6450aeb711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fcf752b60f7f1c9a1883e6d42840f4f
SHA1e6c8f0194251673d07e7190a5fc449a9d077e446
SHA2568ff2fd46510a5c0007f692ecea3665887ad2a1ae6e2d5a19a2561d55ad0b682c
SHA5124184faffdc427bc4820b9fbd5b784a9e511dd0a1f74f4b5408851697d22ea96da9ae3b9bb45cb5d20107cde0dec2b5e04bd0eb18db8ac19fa8d2afa70f92a7b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a00d085b42c48d072696630bbb96bd0c
SHA178bc71dd70e4ceb9f46b17b03b78f3f7f13d3275
SHA2569045ea1151e18427c264202091f806386859dc650f14297c9286f23edc969edc
SHA512edaa85b915123824128e42c066759a2bf8477ecc113d0d7a8a3e25c50d934d6efbfd5dc9bc82ab4125d903a85feed5a8c2a6509539a1bfe1b2f13a77936b9c48
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a