Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 03:22
Static task
static1
Behavioral task
behavioral1
Sample
04303aae55b1f3ea6aa160a137af279d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04303aae55b1f3ea6aa160a137af279d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
04303aae55b1f3ea6aa160a137af279d_JaffaCakes118.html
-
Size
26KB
-
MD5
04303aae55b1f3ea6aa160a137af279d
-
SHA1
694cfa88e606f0b13a344f5d8b02007bc3994125
-
SHA256
eb891fa3163ce36c3c6630c54002a8d9d37635322bdfe0d78e4725c3749b5eb3
-
SHA512
0823e424085a3db2453c1841eefa8f4b046296c7ac658985531786583da71d00e219d535d84198726644da15a51bdb0e3c3d5bb2ad65c12acbae587106a06208
-
SSDEEP
768:SbmBjtpOhxtP1knavMt335vnRb4dCSUeCEy2GUTLmQS:SSBjtIztP1GavMt335vnRb4dCSUeCErW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433914835" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70716c47b113db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6ED994E1-7FA4-11EF-8C6C-D686196AC2C0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000a7345bd9687586828be39abd913c24737bdaa7c8881530a1ff0bce83778598a7000000000e8000000002000020000000ec2908b1adbf104c42f2254b549c2a1b631660465546e4da04517d661a8943c520000000722b339be1bc6ced7bf06e7cede34eff7d387d27f60791c6429e24164d92c6d640000000bfec55110701474e6289ff1cdec7f058235b478ced1df5185748d65dbebf699b31948c451678c215fc09f7676af8784f92193031ac13aeab07316876e8a0f6d3 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 764 iexplore.exe 764 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 764 wrote to memory of 2964 764 iexplore.exe 30 PID 764 wrote to memory of 2964 764 iexplore.exe 30 PID 764 wrote to memory of 2964 764 iexplore.exe 30 PID 764 wrote to memory of 2964 764 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\04303aae55b1f3ea6aa160a137af279d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:764 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c28cb21a3e29fedffd658210e18ddff9
SHA1fe7150f7e5d4864c3064b5ab567ee44b571e2ada
SHA2567dcecb586e918641d010d4e04fea452255d00ffc117aeb89540dff0afb1679a6
SHA5120bae122a496cec1959ef27861378df0bc37866d8faa9b96c8f9e1e8d31ad21815efea6594692532e77aaebebc62d0dacf3ae7801983b90969d14a6926544c152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebd39d06dcc562909908544b86c26954
SHA1bdeb047ec22e250e9357bb80af15a70303c29ec6
SHA25645fd47d9c02e5cff949f02cc2fc8d623709780bdb02a1d771e5f398a154e7661
SHA51277b4d514f21d405e8c3a4e633845794d992eef81b9438be9253f4e104cdbf030ea0a19c47f5e715b2b3bef1439c3170d2d11d6c6373ff51f3bcfd55362ba4937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6c13e6dca444c2b462557ae4ea3b674
SHA1e906887ba11d8e431a41df7b9d6d5c1cde27fc07
SHA256ee172b10f29247f51b4605567fe1721b6ea143bf8d38481daacab3f98dddb152
SHA512ac42040086417165ae04705e77b95319047d269e247ea6104cb78edb422f4394863c66fcfa10ef21cc8284622d295587e71ad17c9e66f549827c217c75ece44b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b5d30f2746851cfda09cd7be5f19ec8
SHA1ba2b92eafa3c2a80aa42ef64056321d98d99572a
SHA2568d8e8b07a2162388cd13d7c9407e87c0d66855d317b6d667bc45ec1f44baef91
SHA51248f17838d58c6b16317d40bc9fe4a4bf94abdc671ecb27bca55898a734ff99efde122b4837e51e53cd843a254d09e8d27cca9ca9429bcbf9aeb40999d2e2f938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ab11aff9deb784f4cbc6d38483ffb6b
SHA14aea3182c5c20ebf07108c0d18fde4713abd2281
SHA256f1171dfc37e94221023887250fa72406bea6230bfb9cf06bc29864f9a0542ca3
SHA512d2da62eb4d290719a98708f5f4bfc39480d718d5ed11c349d2a0ab41040ce4630da5d5a129d098fe7a0dc9984dd7cdb48eac845e43d3fc40f3e43248f0672b12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e679ab907700b9d7e5d0c8250b207e0
SHA1f8159f9fe104d8cc1e4fdc3824bc434af533d2c5
SHA2562a970eec8fd48faa5ecbe689da5ed2dbfb34f5b3c9cf7ce5746dba0b80ad94be
SHA51293851c1bb38e064c0dc04583e5e9434a3f33f32fc801558d6aa42ea80e3759ce18b75a0a774aac9966527748da0aebc2257fd8034d26909b5411607c9073aaa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c653e6334a6e1d4c3d5cada0808678f
SHA171bf83853f72235acb5e93a3862232706cf030c2
SHA2561a40e6e307e71b98b56e0864803f69c88399cab53721aa184aee9041f4d051ec
SHA51273fc61a44a097d471c32e6bab43fa70fce6fd810d4fb7a4fa5e2dd966da969dc730dea29992f89999b929f88f088a2ca5dfc74d8401c913c97690c98d2e0e56e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed1558190fbfdbf35ba4808882edd0eb
SHA15eed6d451ec219bb6906cfae11599c7c7d78264c
SHA256b06c734939446ea1d422b2f45cd465bf9023dcc309b7cd933f7651f33f052d2a
SHA512cae20da273c8f57eadf404d159112a9b422a17f2eadfcdda2f741ad81a76c679ce24b7344a5f4d5dbd4db2350f6cf313dbf7fac3829e25567b88c2c1c8166439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cb363387f8c82073f273d88fa5657c7
SHA1df01a0546388b9b1ccdb8a0c0fb2f5dc41be00bf
SHA256e5df5f8f56888e628523763d74d486406cdc747b17daa6f09a484b55c348ca02
SHA512e4319b6386080d412d8d29e6ca8d9335a6190cd6008bbf3ac92cece2c85e0f5cd5e95858cfe048faf30aec5f064f609046d70e48700d4f668ded237d0134c828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef548b5e23418285ab598930900e03bb
SHA1a2ad35577c3903b4485902b343f97f28e80e94d7
SHA256a10017713f5f36e0912670dd596221bcd3bdd00bbbdfa308593a8f6ff5d85796
SHA51231eda98350db5f0a0ae2b9b712927e290108766b33d07355ace2710ae009a06a13ea5f470b650401a2c6739c501be43aede5d0b7b5a2b4a520d501342b4b621a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc396de88afef20d45e90a3d82f6822
SHA10f25648827a9711545924ae0706fccbb64f4f408
SHA256cb19d535f4f16247098ae68d5527bebea490af10de5e88f5bdc175512df7636b
SHA5127f6a21f69c0f9eae04c5c6c57e85e7c9494891bee6b106707e58ffe11e7b71b9a1fcca3587dadc390ffaa9ed4bcc344ba3681671a6fc54a19f4eac25f536a258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561024b0b8081ff3ed1f13886ab8ad542
SHA1ab5ed6722d34def9486188e1fafe1b09f33073b9
SHA2564a6c7f53961e7d7dd297ed94e8acac4a6ae1a99dde58b7e9d8a44b40cefde10d
SHA512495a3c660c6e6c0d7f7be98f9462f0f930e3765749d19516b8138c0f602aca9141ae9874dbfffc6867f1fb01727df113324c823be63b5a6e52742aa73326d85b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc74d09fbbcc7879cb03d9603e3921c7
SHA197ddc431d4e8216dd69bb5525db4f1ed8dd05830
SHA2561b94ff483a37aec2bb93c5fbd6f147d00c56f5f8cbef1a0e24c4c12558a04621
SHA512367e77ad5b386e59aa14a96be26001f782787e0777a4e605545e1d1270737a1e0644f481fdd38d65ebccbcba608f40588bd01707a23e8ce820f93f548ec35ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d8e2afaa5969dbb04c363fae5a0383b
SHA17029136ab4cad024cde4c67bf490813f754b4fb9
SHA25656cefa278fe36f6e67d44a2e1be692b3ee52981695d9c5cc50086c96083ab4b1
SHA512596d8c599992b27bf3b50709081dacb904059ec2888f7564f88dc5ac972baee47ad9d6f83797e637a3352ce419711af0a4734a9225274c95c36233fc8e32f215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555fdc45273031f63121633d75608324f
SHA11c80a7c82a2f4944a92d80fac009dde839810ccb
SHA256b48ef92370f838fd1e9b9696baf2ad73736be971638382e312030f0aaa4313dd
SHA512401e59fd19ecc66fe2b80fb0313aa5501fe3ca63cfac8abfab19244275f16282ebfc04660166103eb3e4044036f7b414a612f8f0116e82ba05f512e5d74d2bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f18ecaac409c757d718640112d6a7c55
SHA10d6c9ea7a5fd53bd60575b67e4a67325eb1716ec
SHA2567f809b7f99662f9a579c0e5e09bbf9f5872a61b77f551bd9723c8dfc9b67892d
SHA512dac4d166e8207f045a5254249711c3cbc444d9bfc11d60c2a581a86b664ffe76f50d416af7dddf94921c4e28c0821e587c1332fa8e924f8a20f8642e6379ad7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0a7e896fa8d1941e10cbb99147baae0
SHA1106af4c9bbf75c79868069cfcb7f25af1ed8d7bc
SHA2564cee2ee1902da7cd6cec7d3f47fce9cb8ac40af22794f7dd1c1f54befe738f44
SHA512623eca231f02ae5170e8d01002dc5f8c1cf5aca9c58e0cd4b01f910b9266eea45378ca143c5b3a23f3ab80e19d3b9c9a6c59ac82f7ade16967ac5607db68a732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57489ca81f26ec11f0501e24433e04c19
SHA1b180c841b89da1e68c851b2c988782ce3e060a61
SHA256c9192b057b148fe6380b045fee3a8dfe8b922c112c3c7a7ae4ca9b3eec25e3b9
SHA5128e276315e70c417121c45a37e3770c294ff13c0798fc79810b5373dfd7839cfbcfe0b2472506f6893bf3b7995af5f4eae96b40b069cba8d4bde47f3f18df4e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596d3940b6e18aebe59d6cd94c755c001
SHA129546b380748e1575aa921f898f3b41f71e2074b
SHA2560031d0a3994718a709feed113e4e6a3eb89b8464903b469c9f1284ccdf959e45
SHA512a8df3b8057534e560968dab609168f6e7007f1d22a95982dabf57c0119d62ea9e1c7c4856a11b4c80b5818c7752a8f2d804f0b7bd4a52a257fa2cb36f8c4629e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b