Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
05fcce458812ad14445ebd35d23fd260_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
05fcce458812ad14445ebd35d23fd260_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
05fcce458812ad14445ebd35d23fd260_JaffaCakes118.html
-
Size
139KB
-
MD5
05fcce458812ad14445ebd35d23fd260
-
SHA1
254613df451079dc687cb1357c750402def906a9
-
SHA256
b023378635514b221b0a91e0e0beb1f7d42e779f598562fd6b33047c51d05a7e
-
SHA512
753b30372acd860732e6b9c0d990763a11ec114fa95c842c16384010e910eb34c02fc4fabb3f852336cfebbab7fed170f00aefc9bd5c371f1c63cce1f80e0481
-
SSDEEP
1536:SSN7QW4WmyHdN2rP80I2lisYyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP9:SSlRsYyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C517601-7FF8-11EF-8250-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d40fb40514db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000000f84e01dfec71a6e6f967ebc8ca127d74bd229c89bead96d5ef595db37ebb619000000000e8000000002000020000000b749b467ee864dd6c7660b7a1e6b154578576e030e5cc4e96700848dcfe51bc3200000003b25464d61c16d8aa80ec4091bcc7db6cade4806aca89ac89d6fda825c3db5ba40000000880d04720ba0c117ba05792bb1215b1151226f685d9a04ccc2347183de45c2b5b2607e966d6a6cbd0faffdea81982f55e6d5dd269697fcc482d77eaf98f98072 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433950989" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2224 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2224 iexplore.exe 2224 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2336 2224 iexplore.exe 30 PID 2224 wrote to memory of 2336 2224 iexplore.exe 30 PID 2224 wrote to memory of 2336 2224 iexplore.exe 30 PID 2224 wrote to memory of 2336 2224 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05fcce458812ad14445ebd35d23fd260_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506200302dae701369c76274656b4052e
SHA145eb09868df18b45e26967308792525bf52674cc
SHA25620f77b4844880d163fb904f543158e849e113431f2d5ba135852d0be7366f255
SHA5121b78c2abfb4cae8c5b0a581ca9357915450c640f20d2e82d1f20ecdd65d4478567acf1bba43e78e9feb863c5fd02928aff2a0e0e1dd517467463603dd22b9143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7e371404ec1812ec913cb198efc5d94
SHA12a075ebe903b5e9d4e7b41fb1147a976ee6806e4
SHA256e0bbb92e53ef07150571cfc50f5bef61e515313ceac9c0fa0487e20fe8c72402
SHA512321af46e383bfb22fd890cc2a63700aff3b543d3cdace3a728d8d8b8c768ae95a8da804af7643e96d38e11303dcd024b2d297e44ab6b19b2bb646b0f89a55eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5362607b2a8d06d003c96f920115a50f8
SHA11872df8b7a9c91e5f2ba2ce97c5f8f7efd5cae2a
SHA2566f406e5c8b9c51dbbab7f8877a114eb35d4b18a90c2ce4e2dba96ca9253044e4
SHA512ab652c213cfe149b0f0daf03e5f36dcde850b982a8e76581177a249c88cde6d01874162aae6ce777d712dc43f1dd49eac3d4d6f8b6b71315cf3cf352fc0992ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577bc44d650771532565632e9780cf756
SHA1295af560edb42c241bd825ce73d840d586a1af71
SHA2566bfb14e53466c60fe23815d31d29b21679c834cbf96671d5096d60fc64486566
SHA512cf71acfdd99c75cfeaa41f467d5fa502432b3a47cfc109130327a7619657a595f30178a8de2017229658809cac39f3b88c11840983664903e13b3715a0d637bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574c1ae37344ed696f5b7047f0f35001d
SHA13289543b8ab505945ddc5fb139e1c1436d3d700e
SHA256e1d2ca2fa61ebf01c8730656b3c55b34cd4c0c30545f124f211f598d201b9d01
SHA512c8d3968d126a56e07cf0cdb902df8f9b445b55f14f9c26069f8826db64c877aecdfc3a9b9bc16f330d11980367194224b6748e1afeebf03b61e02da9f2ae2166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56397cd8fcd36e3deac124b12f26d4142
SHA1b357c406e0892796444da019f8863c9ce215c72e
SHA2562853e627a77f2ea9920e51ab0f9d4f6738b23a824fccdeed60432ae7c0b4c2ea
SHA51245c5090ba709a48801cf55693dc247900c73e0b29e13dac1378e38cd9aa87d16881803a7c620aee91f2c3862b94099708cd2b362d9a4b665c2177f57582dad98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb628bf54b47fa2d050bf6fc2468b351
SHA17665402d5a1e26fc8ac2851f4451b03e0e874c6f
SHA256492395d93cef01bd0f84945c1ce3c3b0f4df8da3360d4aca14e9a73b03291020
SHA51220819205b0e195415259c1c9433112acc627626e2c095016b67f04450e3badcc304d704349f8a17bc81bceb83a84e5694ffc2915f22862d1ff7c87c3f0de994d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85b31728a612c236aba8c8aacf07a47
SHA1b54d4a1caa56a8323be915b95d6d8566742fa9ea
SHA256a9cd792534fa560441820127d0d5f3de53b21997744ca966e6e91062a77759b5
SHA512b259754adc04f4c8946cebc4ba6872b2c9696474f24f6bf2c0d93898f726928f11158b63c65ea6a2a2dd6012c4d448cc60331a91f86c119bc0307d454b95b38a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c8d2a2dbfb25e15f934c900db6a7dc5
SHA15e4834fed7290e5d455f60c0ae0be2e6a33b9235
SHA256a9b018a4a1b7a6c54d691bf3b1cf6101246d0a1dccf0f14a924904dba33abce9
SHA512ab00d16361290b84b85e1a28e22c9af76ba579ce94c69650c0a1c73a34fb0eb7edaede3a1fb52fcadc9799799d8a7343c615c4a405082d36ee28bceb6d00441d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e249142cf409e81f4512b73448bb6e6
SHA177cf5cc1e65ba2df93882905b275df16c82ea7d4
SHA256a8ba670696db988b8a5bb926960b369d7c698c6d6e97515e65106a6289736397
SHA512da1e9076ac4b24f643ed2a9f651ed6516a980e141ffc9bdcf96282eb7dd491fdb9a72e44fbba50e265210196b794185123401f0d8ac7cf55ab1894927f603aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5926dd92b9e72d7dfb381aec8566d5dee
SHA184c59ebab24b455a751b52835f3ac5b35b189f16
SHA2562ef42ab4fbdcb75006eb8f5c38eb84b8d544f270a3658e67ec3432097705e463
SHA5125381480944d0e6b530e7b576f540918624bf95576cdc729211affcf306e98af27920f0be26b7bd17070bbfba84a2644cc80795643bee4a35bfa98a74c763c273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f94d434bc0f5bafeb390216fcd588fe0
SHA14e495eb4cac11829ede95a5d4579e02f4275220a
SHA256f0b903ca5ea7f6e46c535c173bf665d7508e8d35f589f56775b6db309c2d2c20
SHA51242949e2306591c7da9808bf58e2b2c686093fdbf35ee46db31a72892e0d9735cdb4426b7e0d691127620182cee9b7821da82eefba2c45ac72c8565144c9b2a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5457f88cabc47779fd0a8438f5b53f1f9
SHA146ff024a6cae7f56a995e151e220cb893e1909e6
SHA256f9267bfdcff79005d44610eab8ba35db90c1f68589bde28fd9b5a7e5d0fcb07d
SHA5124d22060e4da814378f5f7815dde9929f3f749e396834ed59edbd0abc89680670799317f00e349e1fff17b8f92b6535fa7bf2f02021f84b80059a0725fa57b0b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0947110db2d5f44b6cfe46505d4094f
SHA1697975352f7d885201d445dc8c3d69c9d6eaaaa2
SHA256b66506043a63814202a5265c3344064acaa39169ed96953ac1622e19f6fd4d92
SHA5124f62906721f173451cc4fedd03e3024f65a1f13ec0a2bcc89c5d7cc26aabbcc33dbae0612322d75df9738c7c11fddd7e4deceb7462d80388a286217697557ba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572e04cbc1178609ed0c9fec744d556d0
SHA16ac7bcbf020399f6d4d4282b034a3631453f93b4
SHA256fe38ab70a568bfe2880f17e5e6229f5e87de53ea7217cc3786bf7027e8bbb8c6
SHA51211b5b23a298741d94f246759fb19ac214a4f1429f2bdabd0d18a703393ef6ee0b5f17ca307e04d6d42c3242803cca466dda8fc29cb24abb491343bcd3a7564d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb7179a75c0de972fbda9b54986abcbe
SHA1be1b082d12803926e2a2a58b9c36854ae0f01958
SHA256d4a52e5320f6699d364b8e11789a99ec98fa87e3c0342919338977185c5e7364
SHA5124405042f33dee9569452b65e326548965ae050e38c5bd75ef4c0a99ca7f8df7e308a6dc92ef1dcd925c07b9c039ee6dd9fe721db6f5c64c53fd6f6918f6930a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e43577fdfec0291a918dd9f766741f2
SHA1053e31a6f58414c508211aadfae9946df2a0bc74
SHA256655ff35ae1077efdd54785a2bee69992d9dd4c598a985ad18e9bac559ffe63b7
SHA5120f168f07e899c9d0b38ab2066e96ad4087f037da516cd69b5cf8f48c35ae2488ced70967c057860090df5cd22a7412c5ff75e0aa7a3d76a72e57cf14eb881cf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596f8a03ee5276d76c03b9c3251cb1fd3
SHA10a4843418937f0a11f7ea32188fb10fed20bb8b5
SHA2565da92d9623ce6736eeb34451170b93f9ca0838e206c86d6afa9a60a9c0b7694c
SHA5123c5e3ba2155495367330128211e19b1aa374cc0963cbdb3202205ac0e0d2303e3fbae48608b7877030141f76ea2eb346bddcd944a935fadbe45111de29524589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5164e1f0215f623890cc924282766c398
SHA131128e76f5b78d0328cfb6b535eebb84850623b1
SHA25675ec1fc18e54535a0b6cd635f2b78ef8c25e62e5f46dc9950afbea5ed0205982
SHA5121478ea5cf6ef0ad8fcba5cf6a1e72b447bbdad0b6de117bab3f758b468bc1d7d3e2faf7d0c9f82142d1fb7d294358dce1242ea055dc9763352037069f76830bf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b