Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 16:49
Static task
static1
Behavioral task
behavioral1
Sample
6b9cb6bbcfb1ff479905598cc63b1ae3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b9cb6bbcfb1ff479905598cc63b1ae3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6b9cb6bbcfb1ff479905598cc63b1ae3_JaffaCakes118.html
-
Size
69KB
-
MD5
6b9cb6bbcfb1ff479905598cc63b1ae3
-
SHA1
dde0158b43aec4bbba2a218047551e7e6a4ac9cb
-
SHA256
25fcaa349c709bbf9ccefc826ac03e5f2421cc2d1e01f00ffbad1b193f15a9c0
-
SHA512
8edca007cdffe77bde432060ced1954c1dc5dad30cc9718e60bd4a42af589135ff7d9fbc9108c220604c714a1f3cc73de023ab48d95b0f483bbe224a8784dbc6
-
SSDEEP
768:Jifm7gcMWR3sI2PDDnd0g6tGooT2jwC2oTTMdtbBnfBgN8/lboethcRTQFVG8s/U:Js00T42w0tbrga9nhc1nhVa
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7fd6f63811242449e1bf528fdaf851200000000020000000000106600000001000020000000376a777906fc17e2a852c4a16cbdeadda3fc3d1ade69abf4f447f190b5311ace000000000e8000000002000020000000dca39bc59911b05764e928e0eef12c343c11d79499b7ed366be823d9e7fd3ce5200000000609e4023e6b1286b81391b1e29f017d1ffc849329c05a9472236b3e0ce909ac400000001d0d091eeef2e0b50c3fe2a229e478740f7955102653ada55e51e22994e2acec672764d5bb37ad37420f78c5d12ccd65ec97b941c7a2b20a3f010e2239532fae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D80F441-1924-11EF-989B-729E5AF85804} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0eeb03231adda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422644813" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2812 2872 iexplore.exe 28 PID 2872 wrote to memory of 2812 2872 iexplore.exe 28 PID 2872 wrote to memory of 2812 2872 iexplore.exe 28 PID 2872 wrote to memory of 2812 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6b9cb6bbcfb1ff479905598cc63b1ae3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55112b519ff497d7f14e51c5228f3cd63
SHA151d295add3986c679119767d74e93e9b56c59132
SHA2561803499f17b0ef3d763bda42db9020bac358174eb6ff58916d93e77d5715afd3
SHA512cdfafaa35c27beec0baff48adfd99c025e6ad1986de539deeeef8e522f6f9b9ca8e4c8f3af0e780df70560b331fc5768a1ff094bfd5fd67df344dafaba66c7d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52353f33e30b19293018de898458df179
SHA17496b6164e978a7a9e2afb5ec7212cb5a7b7f807
SHA25688fa0e2eddbaa7667683eea84ac647e8663c7c0c9c143b14a4624c664a321344
SHA512c91dff8a8266c0675a62ae0dd2470e12099628ef8e675a9025b6b278a4739c20b15d70cb9fa1491e2869073870a12a9781225b0c95e0bbc5c381bfe8542145eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c2a368b87b62fbc08556051358d6235
SHA14c72e986ad0596dc83f86cb00ad2cfea1e0c83e6
SHA256c0589dd482165ecc4b1b75c6b9fde0d9139a7d0e5a214f265cb532db767ad1cc
SHA51235052ae43f44f8d0c9a7196ae5c93304148006a514a8e5d679139b5f0ffbd2a5cef135b00bbec4b104221fc354a2fb4cd96ffefb750a264939b1ddb3ce1213be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6e5ed4a6694c5201492f50619dc4fc5
SHA145424d3cb8b5790174887ecee3e83763af78406d
SHA2565f7abba8a70d02b7366d5a2e86b972a4a497a8447653e60b5ced3df69487d46e
SHA5125701547b136374835fae3b9e2a36a78ab6e8b0e8abb81ef55328a82c57d6fc12a60fd3914701deceadea40e7bf6c3a6e433a157d39e8caf25b1ed979695a6334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f8a5cb07e0e258cec65ba6c625f8393
SHA1590e92ad6fe75a93383ba93d1ce7fa451c024d77
SHA256b6d24f77b6fed6d3f312758635286e95c24172ecb979783c9338f4bb2a38e168
SHA512204fc569195d6cea210e825aaed8f494b4c2977bb5c49928a24534887e138a14b2ec44d3d49ef50aa4f4fce3c08241db2bdcb9a70341d38c2af71542813ce49a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a233169bb5691e32d6c0831a2b9fc546
SHA14b57c7e1990567ed6d7ab8c4ac7f6502cfb76940
SHA256c7dfce08d10730a1242807516879fba3efc548aaa3ef3ef6c5eeba8439f4ea6c
SHA512636d010f2e5a682a54917c1a062060ba5ab66543d6b5798373fb4b65ffd9a9f23e315ac9b35de2d993dbcbb9f1d4026473e8370a0ee358020dfa2f8beea3385b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f54acb60cc7f80d64ef48e27c23b253c
SHA16973a56f985e5cd9b4c8a43444ec635b743f2b71
SHA256aaee458ffdfcc01ddfff2496e313127fca518ae9a6ec16b63637b6ed14c670a0
SHA5125460a5453d2f1933d42bd837eb5eca1b1facf188415be48f117292ed7490e49beda0b1091c401f3011690cfee195b793665be163d7709448b6bc7aa85d241f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e3463e8e8b4bfd79ce9f2aa6eb916ad
SHA19a927a768b9b0ee8b1339d2ca78c56dad63bcbbb
SHA256717f0cd203a8355fe904dee81df0ef4caaae22331c3f33e292c5c53107189926
SHA51248452ffec080d31a223276808966b2d0209852dcaa994fbfd562708c6d543fecd083566aa14f49638e98d0220d1c8ac7ebbb2449451e87e5dc6c965964ad37a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ede69b301ead2c7e301b15b92bda93cf
SHA10e68859c52e3211d66edb0d4b8aa20264aa2c5c7
SHA256f9ae148d3e9d6ea2637843b85c321dcf7d24290a441ea48c93d02121bd49ec11
SHA51207ca6accd2b4cc86c6087c8a2079ad5389e6a441c0002f0db913e19a48984ed7d7d331d3771de56991bf2319b88fe5c670daed6f094ea2a2edc03ce1c8ac7e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5588375983a1e753527882bf05c2a5f30
SHA1f8f300bd7dc3f7fb7d3334e8ec655d5154da41c6
SHA256b25d3a80a5ecafec388ae2ba266d5d334cfbc777d7462ec49a227dc1deebd8d0
SHA5129e9e42665f53518b08e5d3e1cef015140f8fac60af1aebaac10ff7bcd07c8ff9793ae2ad0e0a03496b7d47b3b9496d5f03b6d2e16127d01a88f30ab638feae49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5673270b40fd191a89251f081c6fb89ae
SHA19211440665fc2c87cf3c9ac2665e36db6c59aa80
SHA2563de59cc6bcc991808d5763f6771d4e57577ce300f7d49ff93cc21c28d36ac5df
SHA512341ff5c6ee6a45132186190aa1bde955a542c1388de063c011e0d476c429eb0ec13b1689a5b809e3c557b2969dc5b2ad40290a752f87ab53b6ab4a850c3b3fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbb13b0aae46fcd0ca828deab8bd50ca
SHA17fff913d27bafa97473cedab7230c5d673c15ce5
SHA2567a4852496e1b2b68d39c40b71a170d899cd9d73d3f967fd548880fe3c114a8cf
SHA5123f992579ab6c443a5bc440a68515538f3f46d016cc004292b21f3330a5ee35042eac0e15e83232baf6aa12a09bd83ec953f5208c7d10562e1f597f5fdacd17fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547c8974898e10fb3c2955b6c2d32e188
SHA12e0c3d02e6f03aff4b4df8a6afe5d419fd0f56c5
SHA256c3357f949ddbbb44ffb95fc109c28501e4ac1264af52af63b224111c4e80a630
SHA51254e8b7f490d661b4c353be8172f3af1229fd42a9493f20511a934fe89cfed8f85d9e65ed3123316a00aeb8718b908a195a70bdb654da34e18d5b3bc709af8b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa9972b69851e481dffe47e786e621ec
SHA1c1ea3e0480a8f6f0a9d036de9f14325005eb7655
SHA2565d0921b8cebceaa958ef4ab7765b8f5c6900fcece829dd15e57de5f9a05de255
SHA5125d7acfc4b9e66f96129b1e7668b8086cfb565678f117e1646740a4514d18d1665960048ae741660b7f9c275f66ddda7ec0dc1b63bc761e1ffb7826c2d7c0e4ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fe67efd98be233ca7c9114adb63505d
SHA182f3f72832f3ea66f0a50c86a859a243bc88df62
SHA256403581a23cd76b5c25548f83273feacb05fe2fbcd7f499ee873ff920d447e342
SHA51295b3d463856c0762fe7c9d6ea54cf9791d3e29feec2896a2f2c67ec5f5b6f34d843500d301b9fc0c673703a23c123881664d8d27f71340e0995c236ca1086aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a045d97df23770891b19caecaf13d8b
SHA18713854bf67915f3ff8282e8b5eea4ec84ddf1de
SHA25644ce0427d708fadb9a662f83cc7bf077877cb8bb095da7c68416f092bbf5c2dc
SHA51298692e78d059eaca1c04230609ab0daccca6d01a3087a806780b2c614687dba9bb8222c57f14c4d9d9ef065c63d416f2f083de36125fec606593273f3cd5e534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5956f680cdbc2e361fe158355f3d03399
SHA1d76a7cff6326d4fef2e04ee49148a7637526bed6
SHA256a7ff1e54dad8ce938d53789a69ab037aad6ab1a09aaa7141c4e1639c352b7e3a
SHA512a3f3e64158a2cd4a4f0e44ab785cebbf797833bed35080ca49d37177b79da3639b057ad8fd3629b05d7d044618b0d1c9a0dd39475dcddb3e757cee2802a305dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574d2201c724864c46cc26c280bd18584
SHA18f3c83ab50aefc98ed95d4f89c3aef4c1d9e18b0
SHA256b3f8303496b7333ad597dd57fcf739e43970c4fef3db633a568f329cb3b6787b
SHA5120e84f022df651178c2908305a72624869e6e5089e5f1598052cbcd39f502c8ce1cd35d11c523f85771c080c25cfc2ef90597b59a8979802c3a9e657de3bd3414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512bd3e6b9710b94327873722a3c7d917
SHA157c0b0e22eb8d16356df61feb157c0f95ab42f68
SHA256f4a84ab867053906b8a0072b7d28ab9f91423b706575a6e9e4cdf36c7a47c97a
SHA5125c534a52338d58810bf180bcb26d77db291caac8ca93ec5b368324c8edb9df6bba055912e387f77f767ec561b5f9273e62ce28d1c51037af7422180233d6f65b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec7b6dffb549bf2364108fd92ae7b643
SHA1682015efe068a20a7fed948cbf394e4d853ca85e
SHA256a1d02ada0234b49b58340920793afc0bac225e42ce1564bed7bd78a4ff0699fd
SHA5122547aa5ac520038e576b5ea70880c09466750f90b24d24ab748ad9342e73a2ed22de273a4761619ecbacb8baa61f0782517c2000b75405aecf76fdd56c5835b4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a