Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
77cd7710d9630c2ff0fc42a1880a7740_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
77cd7710d9630c2ff0fc42a1880a7740_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
77cd7710d9630c2ff0fc42a1880a7740_JaffaCakes118.html
-
Size
1KB
-
MD5
77cd7710d9630c2ff0fc42a1880a7740
-
SHA1
a1c7ff04754efad6d2b39b57220adceb0198e928
-
SHA256
b3e1b8a07f712363201edefc285e584379ca65c4abf25de1af4c2413dc36de0e
-
SHA512
f3c81cb0cb945afed9bf5a00308f7214a09a4e19f1b53c90fe9c83f1d46f1062aa3b76e9a868a7657b7c2ee3d952d4ecc2c4ebc0f77815c6e7c1c2d35acc0083
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{18823931-1BDB-11EF-9960-CAFA5A0A62FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d08589ede7afda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003958c6a85a2b8646bd2bdfc3343c3d8b00000000020000000000106600000001000020000000a94b7bbde858db6e041d12d500bf144f3d3b217ca4693fea5cdd95352568c3ff000000000e800000000200002000000008fc860c1b96d91a3a3b4baeb0f591371141262c6c538d17140ba16c7b37970390000000b7be89b1f3737ef7808524059c76413512f81003657a4e9f4096752e0f6aa4632972d197dbd4aad8c18037add668ce7ce2f20c3044f3242b3e1d221d7b1a38586c6f98e0700f63d1a6bd71e07da154d47e78e00ec71dcd0be797d3c5daee16cba20dd9519f434394bf46d7f3b929781c89afdba75516fa049ebb4f86797b368e75fd755cce7003e0b861259e2e3e357b4000000015b9b0d6456f0c0ce2c028d26a84966da5bb08936f1cf49ee88f9d25c8110f75da07a9dc9212fe2390eaf766dfe08dc233d5e8c06c3766ef7b04e7bc4c204ee6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422943198" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003958c6a85a2b8646bd2bdfc3343c3d8b000000000200000000001066000000010000200000007bfeaf7bb739db45d57cc79f18e898cb6b962f743c40abaf00f8a4ff2a52d05d000000000e80000000020000200000001384c12cfc139d39a1f63d0e1a975461c6773bd76019f96af1908f45bac7c71e2000000065235fa9294f97154d64b584aa8ef386cbf650471f537af726b338bb8db02caf40000000b1248e8fed6d9e4c58b29add88b2a86049d4bc5d10384b826fb79b373be7b7a71487fb8f3fc2e4619fd28819fe84e791cb134f3a18471f3f89c267b1b3ef1c50 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1368 iexplore.exe 1368 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2828 1368 iexplore.exe 28 PID 1368 wrote to memory of 2828 1368 iexplore.exe 28 PID 1368 wrote to memory of 2828 1368 iexplore.exe 28 PID 1368 wrote to memory of 2828 1368 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77cd7710d9630c2ff0fc42a1880a7740_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c78bda718191f18f7485f4e2352545f2
SHA179dfe40ac73adaa523abe3c35c38ed647c283f61
SHA2564124141fbf4a50965dfd57d853c07d920a05861d5001792195724411146495fe
SHA512ca3d9d9489532c30183036e749ab008f94a85be77a7f67148397e2780f6e2025446f4365899b06af13a15f605f00d92ef78de3ce22f521e76a68b498e879bcc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543ea57095fd75a3891bfc330d5d33b4a
SHA19cc6c61851cd6b46980485d92744c10be886e372
SHA25666279978db200bf0583bb052a6c246cf9b094f322d26dbdc04fb22fc819564cb
SHA512a685bf7672d1a5fee5650b76e66bc031df9c073405e036ab4804e4f0a6ac8d0636d3faf81faf1322e942530667d9fad77d3d3f662222ac857d694882bbd48c94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5c1f0a19bfefcfdf0c145c0559bf965
SHA1abef802924ecf768025df7a051087a953e2eea8d
SHA2561ec6b81fc34c2eb2c78c9d2ec7c709729737249968e95d0e3c41a6b8f98eba28
SHA5129cb39713a0c8e8d3fcd0e03cff5a7df40b319054c29ddf98f54d3c6a5a789ad4b4e6967896a183e67202a460fecef992476343b321352b0891f12fecdef05f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd220882f2f39c51be9e0f7a6012ab4c
SHA154cc40ac239eff753994c88a3bc9f5e76d13dfb5
SHA2562315487e3e26894147d8d700952fc7e18295be4070df28c011a939d215fe456f
SHA51237531ccd15953708a886bba1c32f8c572bd8951a3b35da5071cb4be9ff9bc79c6f534d3132b3629cea5313dcc0552c49882feb352b4ee39ad1f50aa6e1ff7c68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cd5ae0d665cf5609efc9b75cbd54521
SHA16b157893cb4fe3cd1693fb3bf7d0a3f6292ae6ce
SHA25649cc53ff04986810dd56054473e4736eb7bd06c69d32aa69d51daabe2e80ed12
SHA5121f164c87eb41d334b6a7d98e2462313c0667c839d4e4730343a9cbb07dfddc7b891614662e5faa3d42a48765b7f5072d628646d16e89384918aa2a472c32cb2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7b154f5f76ae097b77925a6be11bae0
SHA12159657e117ec3ab1c59e584a310f360c404e7d5
SHA256a7a5e0eec2d2e42e343d007aedec68f51e1f31347ba3bd7a2d904aecaaf2fb6e
SHA512ce2331a75a7873a4052bb54ab88cfcca71dc00c3c9fd885605f41eac471b11daa778ad9afce744787026c184919f5f94b594a2985f800ae11c2f443d0aa6d761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cf3faba2acf8c9933065c4aded99cc3
SHA17b7801b62a7d63d7b3453b43822f316d64563510
SHA256b3d6cd6c86fbe52250c10cbbb546209428c91a71316e85aae2058b6f86f3a266
SHA51248db742370c915be2504e62124766c9be5ad416400c27a5aeb283eae61d4cfdd023edd5c2183512ef0c85048aef988784b6691b8c2f780f9061776b64f0ec3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd9576fd5fc670147dcac6b1deac6934
SHA1f221ec08292702392dec2c3f742e145163745987
SHA2569cc249c92db196af8459963ea273be0bb123107fd674756d2898aa4b07d3b51a
SHA512f0716e55efa36a3d56f53d4158e2a87ebe8b7fb2d8e26be4e4ba731ecd60a7cf05b9240ec6849a07fcfa6243fccd6b324bd216553bd29ccb2b04c380e6a600b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572959a5752fef563906c62a2350d088a
SHA12cdb9e15c53e3e83669432d1d9d4f589e1cde52e
SHA256214028115976ec0b4cdfe7455be671e9236c049b537da322fab98870ab68f2b1
SHA512a4bd20764242ef5397bc03c004b06da2ed5a334037b2d47b65fbe6c78a831896e1de2534a06761bf10f5d3b9e2012a92ea6c58de21ac93bfe5411f5a0772280e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fff156cf9c20bb7f769863254a0f120d
SHA182de853efedeba63bc875e07fedc3fdd38b9e793
SHA256860e9960b188d77a6a529f7a8ee6a6ecdf52e358b6d9680327625c4ebc5bc3bc
SHA512536e38cedf39c55efae4a8f821fb65f2f1f2a1cfee2dc3b4fe63f60ac04cfdde00e44abec1fd92c463739cbe3f8b1aa9a7ba2154b3d02b8e38ebad8c46cd4f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579687c98f6c43b773b0356fd94c5b5f6
SHA1c8a8ef59d6f8728422e29c456ab7fa8489360f1d
SHA256640455f2219320dd0887af4cf19b9533d452d9f6be043ffb0306d81e01b4019c
SHA51222b8a8849470a52b39b55c969cfd8c462733874a1cbee81e152c2249fde452e57802986cee09942cad925d44c6bf626ba16427ecb786dd24e94ec851d93aa807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c589f3437afd2bef8a037b4e778770b
SHA131fcc21f0dc2a8e0e13515d0cd257c63f8e31918
SHA25676580cd6fcb0c0b5acabb34e32dfa867ace5461c1daa5b53b6c3a64a3747bc50
SHA51218982ec6f92edf1fe8af83e29b230a857d09d753613798f817e13fdcd1dd175f6dc6d18b032ce465f5aec6053fb24bd5b23760d9ceb10efa248a412990c37943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567b8a285530d35bd175695932edf5fce
SHA175f31c8eae95ac344baa24ae1bd19bcfb106a1c1
SHA25616e0a350546794aad369e21e9a51d20a86c090f8a59a4e691dc42aba77b8764a
SHA5122963d3ba03798b03b1732d299a5d2795c1294f4bc22cbfcfaba25ae96a696f9a94fbdb960da03cf8df1f5677bb2886ecf32e1125a0741c81f9507d06ef0986dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d3e6698d656f2f6cd31212d3d8ed47d
SHA144e788b9aa1f9e397ece52797294610e4f89f303
SHA2565a5efca136a94f929f6894ddd3f15b9c5f75e74ff42170750f81cd987f809981
SHA512b95bfb9a36cb38eaa458c7bd9057d415e55c8712de6e85ba9da2615a8ef1ef59c193e707bcaff84fe397207fe51f17c3afa2cf0be0277276eda96b374d7b13ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2dd4c8026fb82d2e6eed8070c6fb7b6
SHA1fe5598f7df184cd7bfa8aea49ea1faa1cb9439a1
SHA256cea0407d9f8d537fd693ca47ac7d3bfa1e508d2284c66544daa4a2af49970196
SHA512b7732dda12fb395d38c58c3abdc529f0870db739b5f4eb7f3045fb6908ba595a64ed840a4fc2e931fbfb91a1975739129cc604becd4d4d1016d2690254884c1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbfde76a1592ce07bc14960e06238ef7
SHA18240c9377292db54ea929e9d3a4f3b7d08d330a8
SHA256d84f8bdb06d47e20b247d3313f661b185e0476fd6a8d000cb220adc35072dd64
SHA5126084e78d5262239e4a146c3ee67b47ab8c46e0867c580ff1c55fbf7e66565474c82a89668ed35dde96dec79a527e0db3f54b77dc2da619c98475f985556496f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e88025a02c261af3dbe36274f1240250
SHA1647aaa3b239a0eca8593a6e1324138a4ab88cecf
SHA256115ee8441b4fb8c15200eea47af815218a1b44435e506b15d0eb78678c262252
SHA512db7dfc23d77e7c57565e5d2959c0ed72e12b90fd3f23ee8100829fc4b272034dedb0c54936f56055d0a2a5855570d1d1797995997e2a3adcabf6220f569452e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545e46b152abd556c1594a8676ca57d7d
SHA1424d8341b18670846696eb8fbf6889432e4f36ea
SHA2560f9a18e807c4473a7e1faba42aab0559987eb503aa2ab50ba52943e9ef303f77
SHA51237630c51bc792d0c33456122fcc8ee1a2acaf97fea551f245b7d76d1325064d7b41212055fad7fca4565653fe63cdc72be5f6440d9163bb963e98a04630751df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c1111b12e7802a4f7a5a4b7788368d7
SHA1b5f0f5efdf7e8d0c97ef26228eaf841c8f300058
SHA256ea10869c89a4c6969ffcde50d6532ef7b19bee9e41d6a1425c2e5fe5cb4d3125
SHA512fc1f6e3f07d9667b5ee71f0a126f0a0bb633535edbf731bcc6ebd084c960d4a6beabdf076bc5b0b8ffda0128d3b553c6fed08ffcb75765488c8fff3a87224cda
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a