Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:26
Static task
static1
Behavioral task
behavioral1
Sample
65af44e54f4923cc036e506a5c858e82_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65af44e54f4923cc036e506a5c858e82_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65af44e54f4923cc036e506a5c858e82_JaffaCakes118.html
-
Size
461KB
-
MD5
65af44e54f4923cc036e506a5c858e82
-
SHA1
15d024565d4bbdc6857dbf447e7e81e8dbd00de0
-
SHA256
6189e8258e5cec94541c5121c2c80d2ab3cb4ba431088947d139ff1a503eb4ba
-
SHA512
99777f9dc0c54f0e2dcd2add898132b2d40d83cd0981aa83ac81ae0543bad5753acfcd0cd1849d2c76e0c470f4a9399b6894c8d3050ad7b2351c6beb3594d24a
-
SSDEEP
6144:SasMYod+X3oI+Y/sMYod+X3oI+YPsMYod+X3oI+YLsMYod+X3oI+YQ:55d+X3J5d+X3x5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422506672" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30be6e94efabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BBD818E1-17E2-11EF-9A0E-5A3343F4B92A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000062f167d334f5385e27a659c808205a04008b26c107727d98712ab3589739e095000000000e8000000002000020000000b40d49b2c183db76fdb0a391255849cebb801f9b0dc7b3819fc17a87de3ed84a2000000034d7219b0eb66d93c33c08d1c4a131e8a277955c184ca5d2e31ce65d448904c440000000357a988468c47f85308435a460eda0b10deeddc487341fff787775f7b314cb497eb9e41d9d3f78b99d791aed28c9803b7da6b4915d4148b042133d47aa1500b6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000ac39cc557a4f9e7890cd28ce859fd03805bcc3c74d8bd7e53b1ee0fde313b713000000000e8000000002000020000000c1f0e603906b766a2f97215418f252dee86d2cc60262211bdb0e77b5abb648a290000000d4d41a231ad350d55845172a9b8a747539d5aea6bc3c42eaf77db13c24138fc0102effe943d1da72d4c593039a10a06cc0dc44c92ae805d0c08a57fb198984bbb8c1ae057db8130ba9270cc350bd1e58cdb395c9c1557b4e8fa9e874908b99669c0c815d24c5c82acd9b413cd29d532f4ade0da36da8f8f44172525b31267129fab4c2d13f1b64f6f0532a80d9000ec640000000c98c61b49b162e706d6c35fc15de2b2db4fe89ec21d3d7fa2f33719cc0e096fe17c434610c74c55e2ba6ec4bbb5819aa8fc91f9b2e0a7087ad56f83a18abc899 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3008 iexplore.exe 3008 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3008 wrote to memory of 2712 3008 iexplore.exe IEXPLORE.EXE PID 3008 wrote to memory of 2712 3008 iexplore.exe IEXPLORE.EXE PID 3008 wrote to memory of 2712 3008 iexplore.exe IEXPLORE.EXE PID 3008 wrote to memory of 2712 3008 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65af44e54f4923cc036e506a5c858e82_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d5ab98015153fcf8ccdd33a6bfc96bc
SHA10b233f6b609bd74d78ece0bf34f136e31756f72e
SHA2562db82f6df0a72b87049aa2761fd3b72ec6b7d26859f530ea7b5c7338ff0cf8fc
SHA5123cc0bab3e0605d97c23ce49e2e202871f1bb3025f53c01c2da6d724386cdaecdc3846307fd4700402097e2344a86bac3be56b46b892bf1bd5005ee2f9f84b27a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59390f42f2979957a7c404666129a908c
SHA11df1f56353410142767e861b73e132cf7bc59561
SHA256926c3692a838712bf058065f53276b19a3512333c50be7d187bc7890bce23a60
SHA512fb1e490e17bfc79a0624c43376bcf9da85e9ae54a4c00c48ddc8a0d05b840f2706fab8bb3c17440557e6676f2a4bd11d8cd4eecb36b9d88bd8e3d54943b51632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a0cb10867a42efa5ddde168914addfe
SHA187394847b60aac532ba9577f922835102f98c11a
SHA2567b70ba2802339602116b3a0f6e25ca129f04dd5a49e71ab4089d78570d53b48d
SHA512560244c6cca76c94b025e714953730f3faa8706ad83511085dc2f1051ba31bef5faa98baac6583cef7ec1e3207ea926c3c3cfce5323dae943e0613f09f754c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4aa4ba1381ec010d0a1f5d2ec0277a1
SHA12a62bc9ce3d340cdd1790083084e4fc8ecb5daef
SHA256eca916655c94ccc87570da7b110f9a1f96ef9d4e0e8a5d20554815b1b8030279
SHA512e2daa9fb8c893ebad3fa11f0aae794d9426d50d327aef6a8e88910db1eae584bfbcd4817daf8e2e812c5b33b5dd2a98329fe72fa09abaa3b1ea385fe4dd27f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5e729cc23f05a7c5ffea24634a8c438
SHA12cd1768257b414cb00f480b5703b00ba3a9722d4
SHA256904e7cbddbaabacf313fedce889321ea2b1613d6bc7abadae2a93f189c8f76a5
SHA512ce716b95d68f64d9d8caf7e1a02c09589d79ec2d17bc2368be675f6daf3c0f6334112706e5d34dbc6f7d0cea7318c25b4d618254ccc7680029656ed24f0a3049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59964d937ba4a9a04585edc099f515b52
SHA1f71d991f615c086f6a6a5fff6f164792b0471dcb
SHA2567f45627baa6fd5adefc74c7db460e76e7701032e11b4fb267287df8ac34f2fba
SHA512f1bd4bafbd7f68094b5c63f27f5e8a2abc8f3df2517dd34463c143addf09d3be26685134a9979830d0d9a0a6d2c4bf75c6a39fcc0bc98506c00f72fb9ac073c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dde78d081a2fd05f01292c4def3ea5f1
SHA13ce17226aa03eef51f56f4875ee69ae7385dc929
SHA25655ff23ed9e2a0cf3b2e955c51dc788517dca116d32b2c1a5d765a9811df12d4a
SHA5121c033e2dc0635f6cc42843b849558518e23f40703530b461636aaae9bea8ac0a9af2441d39a87d686011e284cd6d24b63cecd282b1035667b1a68f5fb68d72bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598578d77efaf25f0282101371811176a
SHA1c2b059ab5d5634ca9e9dedc8d50c661bf2a1d7b9
SHA256c952e81f527294a2b1a0d3fcf30932d890f53cce74db05d1a4c65d3d85bda593
SHA512ebcd70b9eb994e286d2f8d3f19b1c089ec41209e666ef1a229f7f5ac51f093fc8c89a12eab2673de423019730cdfc08a8996feab1b551433285847948d086aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a342ba62b48e2287bf191ae46619e55
SHA1f553a4d11d6dd43c379f53bfc48bcc31fb8a9cf9
SHA256eea0510e37a396b73766fa16f6c54cbf2475730e48cccff63b2d3205a143327c
SHA51237039d44efbddbd82d33649f43f8015de330b33d39d27533523620fe88e2c105b46924ad5430d5c226c5cc043b6229bf8a5ccd3be494895b2ba1fe0f7412fddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f7a022bd15a58be8f7b1e9c466e0adf
SHA1f0cbc28291a981595e8c878a4b3277b4781420d2
SHA25668c1f5a28c9d9f0d9ccdb90dfe511890f18bc3e5baa3492a81784f2f281a6dfe
SHA512c98498bd87b378e6c63b1429c4f448843c34959d57f5620eb95bf6c683d083dab46532aed78d5d18c93dfb8b8ac8d953214387267591ceeba24ea3ca8bd42933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e63594538cf1a4ce37824d3460dba812
SHA1d305b86978a2193c33d337f5933f3879b90ccf04
SHA2567a4a6afb63b1a9d91c211d3a6070f11273466e0391cf71f8c13b01917371542f
SHA5128842729b39ece8084cb9ddb2b6e3a34ead84f9e9524b82071d2d013221545c1ba018e12d20c695ff6b9a1a4ba56ea2938653535f5ae68e36aee20d414b8a4a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b8c219088cdc04713e3d7cee5ecc291
SHA1aaaf69f4457feadd58a68c4d94c19c90223f3efe
SHA25654f311f22d824dd11c05e285ded1d8dbc387c3f7858b4a6b9e5d02b1c8856b82
SHA5124f085487080d4fac92c20cef0aed24183686ef76a5cb9e868348a869c3868512588085ef793bfd1df7f085226a8c6d0e95aa22323ae490dc940ac2274b1921ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff8c21abc64fde8b8570180b938c8e75
SHA1ee66f424f0381ec238e3447cc03207dd2b4cb453
SHA256098eb9a1b09c49f52aba136b3acaf56e3848c065144107a892860a1dc6c94bb6
SHA51230e91bf708d7588168b822dbca45ac88bd4ca679bc3176b08638bf5af4d6248b89bce8c466e89e7e61ee9440488826c0206e27bbf3b9a0facfbcf15dff3f0a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539c903c641501ee0bdff0450b919ec65
SHA146feafda877a1bde93e64ee2bc1161e11bc6f002
SHA25681a23005ca10632ae262af05ef26f40e02abbc12b277d64a864e66db0bea7da5
SHA512e855c77bc7de9a06d4c462f0cedee8ac305f7da0c0149d2133624b98e70902695063ce61efe52ff3692723bfe5be91c91722d08243e95478f569160327ebfe5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593606e2e288a347274903e1db1dbdc6b
SHA1fdee3c63b1e90bcf6340657c0366b42ebf7978fe
SHA256f7dc6b9cf17398044ba59a6f991d4bf27fca5520daa6e7da026e939fd6fb5c6d
SHA5120d9ff87ea0655f3b104182287152957aeb4d177e02e9ad419f285c056dc91e08c6581514674dd8c6fadda36f7e525b686a001b44c43093fa054d503f62007463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b106e81cb68462146fbfd9d3ba002b0
SHA1ff4b9a212b623da7b5d1c4b6762c4cb28fdc9a7c
SHA256528e708f37ea8952acb3ca25d7543786fbd5c2af6f6bb082a54631835ca69f7e
SHA512e38fb1c009ece0f9088612b5e3e37fb3198bacfffa4d89e51950d8cc8aed65b1a74bb249ab0787cea426b0c42882ed244591f94ea70c73412fb01f8503176617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e94a1468516cafae4d16eec8b002f1fb
SHA1c049868cd19d4b42b506fa675c8b2eb141ab1dbd
SHA256e369d988731f159ade0a86868a168067a53315affa3cd241b16947e10bc9508f
SHA5126439c4fb4f2a1162ec2b55b2d112bac04fb77a51f4aae2a0f9f4f2ed4d03d781df8edf6c73715d83ae3ffb760b294230c9e5bcb21109e7fefc231a4367ee4591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dac3f54f38e3db398db0ec1a5f835b8f
SHA1b460dbbcb287533e8898826c240cd0a10daedecc
SHA2561f5d57a11ec6aa34a64217e984be9b4c61cd70d4790053b21ec58ed3d4436e18
SHA512c793f97ab7318cb718985688fc04931c25052829123dc97554ffcbd91d12738d98bd5a2810777cf5567027ac12567cfd325dacbdf3cdb78933ebf23b3ffb96f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59098383301ed8cf7384a99017a59b71c
SHA1f876a6bab17850d023929cbbce0b066fa61c372e
SHA25651d1473b9a581360bc108404e9c54ac4b1e6e8287d69741269079ad317b6f388
SHA51230ba6108c31a02b46fcdf5ee4c4b0a322f23c90e6caa8390afddf0c48060dc28b574dbaecf23ea624825b9bc5d550bc9939623f3227e78ede04f6bfc567df177
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a