Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 09:18
Static task
static1
Behavioral task
behavioral1
Sample
d6063cf0bbb29fec4d66ecd067dbd7e5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d6063cf0bbb29fec4d66ecd067dbd7e5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6063cf0bbb29fec4d66ecd067dbd7e5_JaffaCakes118.html
-
Size
11KB
-
MD5
d6063cf0bbb29fec4d66ecd067dbd7e5
-
SHA1
08fbf9d470d8badc148e510c2432de35e0df767d
-
SHA256
16952de2ec3ebe46000a8e37d7fe7b490150633aa4e0c401d6c96bf2dc188f3f
-
SHA512
4a7d36848655d4bbd9391b328cd00535c8196b18f2bfeef18aa9f453829da596e494481065a51260789b0e61c25ef08080de2d150a0c223ba5e143fce34e5847
-
SSDEEP
192:4B6EY1tuwFT57v+T2uD04rc9WA0uFzHrNUW58Lk99yP+B3i7YseUNFtp:a6d7B57WtDM9/FTBYLk9IPeqTp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70419e469902db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000044c17253029702782ee0d74b17f5c2d3e82231b998d55d3a7bef8c0a9b374252000000000e80000000020000200000004a4bdc7bfa6dfcdce1e439276cc21352b6544eb61d4f1eb92b32af71ba195b2c20000000d3879ffe039fb6a07cf792b6b517abb9a1e6657e0a4905e4d80dff2e1953c2ba400000002b9a35146c25557fd5a85197640ef4a8428c3a78fbebe637d07aa640f4c08c40c12638baaac655198818c6d6dfbc3e4f474f4d86b75f906bd177609be17210a1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{723B2BE1-6E8C-11EF-81FA-CA26F3F7E98A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432035364" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2160 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2160 iexplore.exe 2160 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2824 2160 iexplore.exe 30 PID 2160 wrote to memory of 2824 2160 iexplore.exe 30 PID 2160 wrote to memory of 2824 2160 iexplore.exe 30 PID 2160 wrote to memory of 2824 2160 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6063cf0bbb29fec4d66ecd067dbd7e5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2160 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5704483afbefb4ccbca6b9f9cb64a636b
SHA116b3c9937f954d9a172384c01ceadf439b5fcf10
SHA256ded407d39b8d2086a260ece7e5ac7f0ac65c2f09fe9f350806bd4f5952efba17
SHA5124c8ed2ad47976dd3eb7a80c4ec4857aeb7f78feb012ee9bc025147167ea57ff17a81a403f7805f5cc2f2e9386bdc6b17efff57617432f96f07c239b5b314441a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef79ca9d3af7107aa9ddeeecfbdf3e4
SHA121a7c4cbacb0a2e91bc2db25ed88dff6cfb8d0f0
SHA2564b756dce2494aec68cfa75e90eccefeab9c9df77a1fddfef50570963018399d9
SHA51256bf1feffe72e7b59591c8307b465e59c956aa0f0b80e49056188ed0a1d953dc5168a001acfffefed9ba7c086bf4cfdbbacd32ebb9cad5bd459f3f839013bebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e36acc33beb9521ee57528b1f1d720a3
SHA12e2692a125c1da525fbe0809ce3f0a4f08f2c97e
SHA2566cc6a31a1ac5f10cab594d67c096e45be9a3a481ec0af18040f4e5986164cb3f
SHA51249fe62b76bed633e0289b95cb392b8e4bc564e4910342a3ecd618a5ec1353491783761f24ea2b3084f0665b141dbd6c3fec3e8fe41fcc95369bf96dccd7fc9be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f83bf99cc413220245286fb03da277c
SHA183f676aeb184a6091a68af962c4de3e72f59e6db
SHA256a344d9e810a522eb6c05b253d8eb53eff48e325023d6614b85ee2d18c59bd6b2
SHA512bc91df020788edefd630671f931fbb7799c8d6e0c79a328e052ec53f27ba4b5422e04a9da3b4c6c4e1a283644e67a22bc8170c8216540a8032246d8b977846df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d1b8e80d0a46da82bbd3da53f2e3293
SHA1456f8a9afca805bcb17a044aba0acdde1b21cda8
SHA2560c7314d060a106591feb2552510aa9a59150f1d11c5b02f0e978a62393765635
SHA5129eb5f960a074851ba2cde60dbbdad2b27d7841284d076e5ea1ea5bcb4e7d751c3038d1914a2ae9d7778146edbe78614664feb48c449393d4dac645fbf0e9ea8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534b9ac5d6018d2ca444534de4b8a5b37
SHA1b71133ae54dd0195bf727dd9f6282cc28b857199
SHA256d4788e6cb02a56a2cda973f0153773d2c4fc51978428fd77bcfb1a9451a4533f
SHA5128753bb05b9720187f6844553d042b8b31399d622b3cadd73a0e4638295073a0dcf313709024c780f8e443828d8a96c15b0b9a4cbc611fd895cec4c9f8f825c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cab65abd312f49a86d2567d29bf0b80
SHA1fca431d400af2a56df43135bf8177bbf77af24df
SHA256a9d0ffe502d49788a253178b5eb1bd7addc0a02c3e25f973ba9d9ce1989ef9fa
SHA512a26d8afe36c060fd3f04b047812113c385a9d606d5260283e1148a5e47f8ce26e19db078011917c39022a6f8b1a09bbb89c66164121f71e367a57ece48e50a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b1044703a6cd49b8bb42b85ffc9f9c2
SHA1bf808eb808d80209759741324954ea4a955162d3
SHA256488d8a04f1379926e27de9bfb6ca4f875b1f6ed609bbd78eec4d29b64b08ce3b
SHA512af96e3c09dfd5118a8d19a579483e9a09791f4df97e5e5308d035af059c47573c513b4fac75ef2fe048f723c8e6a4679c0732f35a2a4a1970fa751f7f3ff3f54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b34f01ce29b06996b1f5c3198c74bcc2
SHA11007578126feefe6854f7b7e1dc33a3d96ee3eb2
SHA2569605807dea3d60b139c4469167c199134914a8ea57a887375ca85205aca131a5
SHA512cb477783a1b723b9f9806cb4fef90f2efe5835486a9543aea02bb49fd65915ac87dd87709d22d201b09ec8c6daecb9504be54a8d90d4b00363cfc9ba0152e9d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ec0e921cdc7983d933ed9a8d09dc59c
SHA1215d14af7a3247ea2a8309522c70d41a32e0e8dc
SHA25611b267bb7e3cdbbc5be87f2fbdd13016cd282314b9886e258c17468decc986a2
SHA5125a1bd7e76277dcefa28d72193bc97d41575328d843da955b9c4ac3227af8cea184299592def84fd800b626fda91494de48cc062f426bd5e08cd803942dd80974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fb87091b23836c41a66415944868901
SHA19a3ccb588db1034c7c98d59ca7e74caf124758c1
SHA2567a0366d2bb9b6e87d09ecf169608f0bee7032dbd4f81f5a7e7b3e70133cea028
SHA512dbd869d37b34a8e53946a1a558b0ed7dc78a11500fbd80b79cf0bc87bc8bb4cf3d8a279725ce73578126cb14f50519fa10e63cc6d917688a6bd6b806016e7ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c70d86f059700f4f58527063296a385f
SHA1673c96cd8225e18afe0aa5936b5fda30f4b4bf39
SHA256b8854c7ba741f6dac645b18a55c69a7f8250af4fd541faeb13679e58be243007
SHA512e2a6382030538c8d752dfe5f8ff41ef33f104649fca49f76c0b3f71cf38db5d720e5ab259365231147bf0a849400ac1e3877090e55264e7b58a876df64be83a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a19a6cbc0434429c1da224479f570884
SHA17b202d0d7dad678a64ebf53441208cce666f998b
SHA256b5223d047a03da19dc390e0305e4b27f675427af57e97a487f970b6461b2a14c
SHA512272ba2b0d8d94b60294ae1e555a793507d25094d1a213b0738d787ab07bcc0edd84940c75a68e376ab07aa6039d55bd116356243dfbddbaf65dd300f5f0a212e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d8d71682fd93c6a17e73d9e5a769d3
SHA10a76335bcac3b5231cd81319929b9478397b11aa
SHA2565c459e31e4645169f1fe578317dbf6b1461be5d7af485cb6be65a672ef58ecc8
SHA5127a391e2e7e9bae710888b4acee0ad3791c0cd017591f50de90485e1d935177dbe4bea40064489883eb8ed8062f64d7bb73aa0e7bfc2b09787e325494585718a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593b77717bd51202c8cd2acf59d2d9c20
SHA140d0af08918987c1973d39307cd70a914f853e33
SHA2569c3d9dfd930d931e2f458e7d1f0e735854b8a4a0cd0cc52153913e0ce6e1b15e
SHA512bcbb368aaf5741147c3292f275fcd8f72c660d4bddb7848bbb0fd63d7505c1915a4d51ffb2e84f64a5e3d3764eb22e82cd414cd6a0b19f1ca987ee62128e388e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527a509606add60e65c3d16ed32eefc33
SHA138d7ce44d413fe270673d7af5e789eb7acbbd3d6
SHA2563e84c3ac15625a70d4a0019cebe032a8a2fa4ca710cfd5c8c1dfec65fe34b6f4
SHA51204348a2b60bce66bc18cd4f7f9d0ea8f5997f557c770b3141375926f2ae74293855a3e73b44978ab26191ec29ddb0f4359dd0b0310f77370f6f63e89a2e99343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9bf808f9baf541bb90d2143a977047f
SHA1a5d5e2d94cde19623ae278ae9fbb038aeb39ffe9
SHA2564cd84c11e474d76e5ed68f1b10ed5b1696a1999e535abdc46c3699009563b346
SHA512d458e9738eb639228d7f27d8175e5a8c855fc8f909e59229ba2666b47a9e5dbfb74e6b840c1d5d199d220ffecb1d5828f6cfdf61d0ddc9bf77d81ae910f6dfc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f70d4bb704e0d20eec1f7a23634a2a32
SHA1c8eda1b75d25b9e0e1317e150461539d036176ca
SHA256bbdfa7aa6dfda97318315b52a5c91ffe6622f47d106a6645b0d0ea3389bef0b1
SHA512dac9db4f32188ca1d2c7b2582f7c5f6daa19d57132f012407f016d475d4dc85a218a27d2a28a23a25ba0648761f98854cf0e5b5b8c415ca0b2621124bc812469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab9ab796f8aae1f8ff3393291e91ae46
SHA1340d7ce6d524660d7bbd5e41eef8824d07681760
SHA256affe87017de8675c67dd5668f786441c4a46b17a19621f5b453a3b19c2acaf83
SHA5128b5e1cdaed8236cba2b6dfdf8ae9a73c3ce55b2c7f03b2e044aa03cf3f3fabdd1180c270c8a825579a393e627a48188a66158ac4a1bc5e32701e06695d74a22a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eb89dfa4c0f0f71892b0bf5388d67e8
SHA196300d2202cd6344022fbe31e5562df36d9fbf35
SHA2569509e443186b299bae4b1d17d8350bc00423bb2048c8f10973231964d6ef613c
SHA51271a3ccc5d076101695519986a4bc03c5eb1ca07e65aa071f5eae4515fb5e49dd7c5b238a1e36abb877724c948fcd3b56cdcc14d0ba2ca3df7c61d250da14d3a9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b