Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-03-2024 12:27
Static task
static1
Behavioral task
behavioral1
Sample
0595bdaa67c27293fd261d33d4d69f03_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0595bdaa67c27293fd261d33d4d69f03_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
0595bdaa67c27293fd261d33d4d69f03_JaffaCakes118.html
-
Size
10KB
-
MD5
0595bdaa67c27293fd261d33d4d69f03
-
SHA1
c2d2577ed7174985c9825f3c60643223d9e5f995
-
SHA256
715827485c9ae3cfc8f9f2ab7ea3d60da8c22b2c598c59efc1a658545778b1e4
-
SHA512
780e2b8466928ea2d2aad9bde3e966978b9eedfb906fe3b1add8b0b920d6ad961390cc542d2e216c14649d5bede39a7a0fb318e8b3e90bebdf1374182103ac98
-
SSDEEP
192:iJI/l7vFZ7vdy2qCHfIWkHrVu/V2orUudu4pWAO4mKOYoMqdqJvR3YH2d+HftZq7:oIhfly2qCHf0HJyV2oAa7pLOtKpqdqJP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ffebb09deeb747419e902f1accea58f70000000002000000000010660000000100002000000071cbcbeb431d7eb6878b86be28ae2baf9ee399662198ec9915188ed8a1bd17e4000000000e80000000020000200000004894e662d00ed10c9acf534aee7b5c4a21e88366ff2dad954cb44486d398887c20000000342532008fa8b4e5bae9cb87bf7d41a7bcb01ae468588cf41bf9993a3a3e507e40000000405ae017a51d549af646894c5ed75c4e944c6dff7b72491f03265105ce6fc94dab38d4301f4a2955a83f189890fed806d7f5a13c5792db76e2420c1b9f1f84c3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c0086b0b81da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{955618C1-ECFE-11EE-8C39-CAFA5A0A62FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417790736" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2264 iexplore.exe 2264 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 3056 2264 iexplore.exe 28 PID 2264 wrote to memory of 3056 2264 iexplore.exe 28 PID 2264 wrote to memory of 3056 2264 iexplore.exe 28 PID 2264 wrote to memory of 3056 2264 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0595bdaa67c27293fd261d33d4d69f03_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55233db1df5051a398c3a411810f81761
SHA10432f65c89e8c6eae6d79def72594d37375ac76a
SHA25672384807261c91809a1d8fe99e296afb66787ff13db135f7a4d9e8f878d7ab23
SHA51265997d9780f91917c96a22f4a9676d29b1ec5d700fe4b5567d22f2ab95017ca3d46e15cbdaf416451163e2f238bdce365502783c845bd61d4fb6e41a70ce6056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be45c462d45f4974c61d80f7a35fdeb6
SHA1e39c0b863a34aa9030f95dd04e7d34f95e7e943b
SHA256095e25b26e88cacdf6b2de4c33dc339ccf746a408520f5d2a984d86e9b8fdaef
SHA5123a1104996ae5043a1583b3904b8ea21178d8959637d908a665313a9d65d06ac5bc9f192f09d54ccf88d564d338e151f2c3d81b4ef3b184530ff8ecc0de95fed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5954dd9388ce16cd0787703ac64c511f3
SHA1af6ef8343f606a7be2d71411af3be29d3d22369d
SHA256080e4673bc428a075b757ffdc9aeca48bc2f9ad4141b3a6dfca0bbade3a75a57
SHA512aa53f45686fc1ec594e02795cc11dd9f7103e63e8bf5f742f10f88cd13e9ed1e44f11423b49b72c9927576c7a82d1b773a7b54125193070ff7c35ead5157ff74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5816bd9dbe04072953a0b64824bd83b20
SHA14943a51d0d49cab1f8318b9b730e1b6e4a798976
SHA2569c305f26f8c8ac288e94db4f7e0ccc0871736c8a3034bd5eeffdeb3d6bb3ebcd
SHA512a26c2ff37e36e79bd182089af3393b36e29803a913d16b561e24679781bb2caf86abafbc0ea6a87babada6c8692741645e615ca614e64f3b224e32a21da7b7f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521910820e9c99fd6c88757d2456f8172
SHA1fbc498ed711e4db6f3b5a98af2c212fdefd03c67
SHA2565fc4d51b1a2cd274b88617e425af5dbb14ae2ed92280247a13609e044db0178c
SHA51254eaab03ccd507dbdd0bc54571d884c5b9d2bef4ea94ce6d9c4b9dc9171d7cb59da5c9b1d8414c59ce950ae6d919e32ca2d56b75f5c876cc1ffb3808021dea0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ed8c5f7d5b684bcd04d994a303e5c0a
SHA140a93c92233cc77cf8a4925642ad5fc3064fed5e
SHA2563a71bcac1fda484bff1a79ae726c9a0a2c421473ebadc1025df0a102e4417a32
SHA512798f0ac04d25ba31d8c2cb6dea50f3fda8881d216e7396dd0754e6b12cc5312d195c8b383addc79abc5856546fc3af83faadf1498a7fd19021c934d0d90d9c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e130344b3ad0cca28971196e61089df
SHA10a19c85074442ca740325db6cf7015ec9ea9cede
SHA25615f2c3727faf3b7f676ee1755300a374b6859c219bc658ac217e4732084222f6
SHA5124057e1e0e00d7465df7d17edfa014fe62aba81d8b62160df26c5d5148474754b4c903351c1ecea5ad8ed7395980db8a6474c68f4a46e030a274a19c920217a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5babff65dc53fa17849053dc451ea70
SHA1ec289df3eca5faeb4ba9837ae63dee429ccc63bb
SHA2562af2727c65d90afaaaae82426f45db4b75d86adb0c11c02e6b88109431d1533d
SHA5126e327d48695c99716d0b9ce45c73cd507189911d6414f09f1008b9f3a862cf21c9c2df2b3ff59fd49a56b712213e8510bbfd732ac7bc498553f93c815f18b8ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ffea95f716184b4593406127f99dcfc
SHA1ecd7e61af2b5d44545f2ad716a75bfaf06689077
SHA256d8ec368dc90e06eeadf699a968320325da3551f9d0f4b9f5d0c4bc4e273624f2
SHA512160dc80b9531b16247ad21a17530ced49e5300d6ac301df18916a72fd7e3f0135a345cfdeff0ff0a8155714b63bd654ac53d16994548ff462a57406f7f5c09d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5798286ca516a2b67c9373611ae71d57d
SHA16c6731060c81f7eec0d0324e0ffd9f618afdff2a
SHA25605d1b7f39c1a02d0e62d3a52d3c6d2d0e0b3081739a37d559b23fbe464ee74e1
SHA512f2116c13c65f36140c4aba15dea37af882c0cb4ef3b1582dfcb0de0c452a1e5606d7bd32a0cb9757dfd207eee1825ae1bf15231adcb78795be7a655310c23d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5361d50e07109fe68254a424012ffeb26
SHA15fb6a9e39291678a9db76494a8ca69ec6c0fe9e0
SHA2560248bcaa38848e4cc06bc0bbb314fb82f8bf8a57715f83aee92dd0db48c5c55c
SHA51233ee2f63ddbc155d56408b940e2610a30c26c6858b31401bec5d9bf5a7a2264354605c9e49f67109a9ee4c8f9a2cf87dc22bc7b33cc197a0033d11b1ff028a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544942f74cd4ef4ed457dca69f1bc8d9b
SHA1c11814aa54b840961595c87091d6a121be1dde1a
SHA256f40c12686e5390bdd0dccad67c915ed65e63423cfe0b63d6b4cd502e00ba4c97
SHA51207fcddce2914217f23aa2b1220682938983f18a325abb292c2ad786d7b9c42ad371b24d99194fd6f5a4032853e1de81c0b5b03c751777406b3de33c5d66106d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1c4b72f0c79e493cb6af3de117321a6
SHA16ea0882b301459f9842f1393e5eb17fd8fed1181
SHA256b45c38094eb3d092e0987f0902969733a8883c39813cb73f2024ce05345e6953
SHA512d6975e957b627a913cf6d89dc8280f1e967524e82c2832345451ab80b4761e56ca357f879796d4baf004834e6182070184bce08486801394ef9952d02307271b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d7572f129d777d03ace2188695be317
SHA10db876c5127b5d7db628de508c58e86dd6657415
SHA2569c739a17402b92f9e0e79366ea695700cc0f90349bb4d04262f447ef65948772
SHA5124f7351b3f74656b8297e5ae8e04339b2b8271ae36fe34e817ace0783f442894dbfa8f1c677b62b07052ea4bd0debdea81d86c0e6d9521d89a1954041fbb8365a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593457c2b978f0193ab86ab40cf27e91d
SHA134731e51586e51ae001bc123ab52f729e946dc4b
SHA256dab81fdf900549f9c53900930fb3dd124de17aedce3b893ee440c27c1d84894d
SHA51214a42277b895c51f330df8b31a489a8b61fbdd259886c629979c76403e38e95234a3ebd22d5aa04e1bf5873edac4423e1f5a73c2095a15cc363647b5c03d5e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccacc1160f8799678eec3c240b0bd250
SHA13a258af43be7972c57916ac65ab8b822957774fb
SHA256914e13fb2044db2d35fb21db23f426ec263c53837b752b7c819b79b825cf558f
SHA512863a596684a5bebb41dc1ecde6006ab642a542f4529144933df812f344376ae260ad6f0f0cc4233ba0b864d59f49a352411e4f0d46d439ed190c9956c5213182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565d19f43814c6763a68cee2ba51b642d
SHA1402111ed36a5b97301e9a27af8755c1a63b32262
SHA256142e1f6f8a398199449a0dd0b849a0dd85855eedbc0070c64bbb4524b49ea754
SHA51218d50998fe9cfcc58b12f95b3c4970f03b85b96a7f5f650a0b9a6464ed892afee13eda060294b4e62d30838cc2d86b6d7c7855ea553576fdd0a6f98a7cef86d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51dfa1468872a72357fa068aa490d11be
SHA1739e58c9fd0baf4c530338e60c259c3625ee5f84
SHA256f04a2c7d4210285c46217f80b87a44c6dce3fb7ed33da0849f16b6e69a8f49e9
SHA512030c907c02d7e9587c106c8ee0ae5e91171aec1bbfb0829340cb6bdb997b5c910ff3db60b19cb5b21a78dfafd4c41847b6885c82cb935341affc54d38fff79d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ca665933e0c376b612637e967e648e6
SHA100e975fc0164f1378c3acfe9aab2a7a956902e32
SHA256c36c12b639ab1ca9adacad697c8cb5154e964754963ec6796d74712e711fd2c6
SHA5123f788ec6099e99bfb59a7783e54fd89d490a79f33a119ae611fdf4836998196942d961ea9d0496eadf3e29a65735d0b749d7f51e276a4e0e49fa1117bebabbcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b42c97006a6111c89bf67bfbeccd7a8
SHA1d78d7ecfb8f23d1c12191d2afee3087d404e72c4
SHA256b5470f2d6a5e073ac5d490011a293662c611f97694006fe8cb61e249cc07f2b0
SHA51243d7dccbc7f090e6009adc006b71f10cee3f0113ce150e37894b0e7f9b1877589f5477574ebf640bd19e86c015cbc4fae758b0bbad3afdde646e8c53a4069ede
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a