Analysis
-
max time kernel
91s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
f9843e9024fb384d37cb78b017f837df_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f9843e9024fb384d37cb78b017f837df_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9843e9024fb384d37cb78b017f837df_JaffaCakes118.html
-
Size
3KB
-
MD5
f9843e9024fb384d37cb78b017f837df
-
SHA1
e637b0ddf7bf9945d89858194e97877c063c3514
-
SHA256
913035025f48ab476c2469da770fff854ca8e16a666935de8497eccd73ddff0b
-
SHA512
8a06d341fdc3effcd5b89049c11910f296130d6e9ec039dd08e3b8add9d0c1394a0dcd608287671e6f715c9fb1b6642b20daf7fb150035b65111e363a4652afc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EDBF8C11-7C75-11EF-A4A7-66E045FF78A1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000005df1b53b694149e1d71c2ffff2e65b7c8df7090d03bbe720d3fc0f3a8053f453000000000e80000000020000200000003a894644de600cac205019ce84c7be5d6470d2d2fec84edb243ff90d4e9e22482000000079933298d8e221fa724ef15410973285eab5e27d359ed4f47fd9d770615741f24000000098497af33d8b03eb7d57a9c36537063799c3572af36f1ed2911b44aef158704344d206a3b3c577df3c4381e8c04528ac04c05c3552a17eaad9bec7e69e9dbbf5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433565008" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e09629c28210db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2636 iexplore.exe 2636 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2672 2636 iexplore.exe 30 PID 2636 wrote to memory of 2672 2636 iexplore.exe 30 PID 2636 wrote to memory of 2672 2636 iexplore.exe 30 PID 2636 wrote to memory of 2672 2636 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9843e9024fb384d37cb78b017f837df_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4d8f113d6335c9e3f5417f194a04dec
SHA186064eb5a6382f34fb23900eb26d9f0b6300262c
SHA25688f0a015ad04bd21fe399bf8cd29180e6a42f03843f7c2cf98e42c5eb72e9dc7
SHA5121c4d3c7ef91d6b86c7206bd2f72dc3951e7dede813c2945d95101f26420f60048f24cf70c1500500386e58c268c48f92b64a40d45e6bff871060a1fa027e93ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5250aeedbf32c62de219c24f91aee8322
SHA17473cbd4940b1665af9298294a961739c5faecc9
SHA256f153cbad857e818e53979b9b34aefa76f0cbfaf5079813ee239da96891ae3b5e
SHA512f18ab6b8918cbc1fafa2cd934657251cc01d5518aa111a9a1567d04528bc237fdd9c677e33f34ce8894c092246f3895e11b882c38d27edf80f90eaf5f46ed641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5394034194c97f9b7ee6c996d501f9cef
SHA118273759ae7e6df198c99a79de4aba8d0abf7ee7
SHA2561797daaddcf9f57e4f9c89a59c2d5db34eda66a539db0bc101494e0d9115a9e7
SHA51236d6a28ca7449ef833394d743da70e5eb712ffc8920dae2df68392e9fb2df103e681564731ea6f3dc41f19249fe0739e1707d890d0fd4d3fe530f3cfdaa44db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6ad39fe597238123fc6a7f219462475
SHA1f2231471634f1667434bf0a5f73fb72017272326
SHA2563f61dba947141bc1d7c3c9be6bff5630f384f30e7c5f0e93166e08c0bab698ff
SHA5128aa0e1b84e3610156c9b7ff99bc418add2680cf638f2791572cfb2cc27573a8827502d703d1a80f2159ae33a10c32fcba342cfe0a97a3cbfa8033e51d371ffd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f7b54eaa77faecabb17793382f7d267
SHA100cb977d7c1876364d75d5e51936a2e3c9b88f6f
SHA256e229199c8dbcd95e5519c74cbdb44931df29a70670d5eb40509ce9882f75cfc6
SHA5129e97590f3f13182f5a517d50cf0292781e23252ed200223cc91fea2d44a82a1da6f3803d2477a4d42c905da39cc4b819990a1bf1e4bdd332a363958633f7e6fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566d792622c8f0391f90dbe31f0e8e6ba
SHA1935288639ec308dd959f9de0c3508b9e92f08d5f
SHA2563bd34804089e6300557804e1bf378b2046fd349a9e98e22522543bee4372255b
SHA512b69786727baa011ce6ffbbb96a94f16012e17ff32db3f8af6cf5f6b1f92aa8a5bae8735756a57dee6051a0c22044270bc05f7603286e9e093c05c980f02d3754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d1ecdf2edd78195eef8757732abadd6
SHA1107f37496eb6b57216c45bf996a18feacf6c9222
SHA2569669befb5f1ee1e735063306ed3e61f2ba24888a1bcdc24985cda78b6eabcf2a
SHA512cda4fa1bf646d64550d29990ae635527b318b196155885a316de574f49d9493aa881786316ec16ec0c05ff510eaf06272196a0913eee9860585e8e183efb3aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5337e902422848315cf93248676291299
SHA146eaf9040776b8d84adf36e6ba2f035d5a1d5fa1
SHA2562243f0029290d807dbc7a7816877b69da28290087d697ac180afcedfd6b554ad
SHA512fa55dcbfdf30bba6abc3aeeb690fa4df119f2216b90ca034a6a5cf231b69254de8ce94f3b568e862f09143ce0627c17a3681179afdd8b8eba3e9949357899132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562710bbabe9e764bdd67181c45902d27
SHA19cb552781afa637e9a3f608287dcd8fb1602999f
SHA256ba1464160c0e782099813d08c4276f950cd05567dfe30a8f31aa931e00c9c0bf
SHA512554acf48354c0d75bf0adbebca71e14fc72449d427f55ee84637a1325dad4c671b82d87b1a1a4441f9fc003093f5906f78adfed0432c828087104298c88f58b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568151188a77ee9d04a5280f10023b211
SHA17393deba1d5fc7e7f883ebfb924083539c9d2015
SHA25632ba9e7a5aae6f7cace2bb07041f9ac9b1e88e66c43017d935f9b6596f31d1b2
SHA5123aa6038a45068c596810711ecdd2390499b1aee5548dc014bd52e7d3abbf07a07aab267d0c2a6db99598bc8522b66ed63f747252c8e08ce5f540c0fc24ebeee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f7c8ff5b540e1d10a1faf34f750247c
SHA1b071be144ed7ef36c82e9175f5d937183f57a633
SHA256bb65c680f32cdd9c0258a82242b863794643f011a963a331c79a87c56dcfdb5b
SHA51259aedc6f10d52c8b5491c11e23ab0e119f3141c47ba3a81c20c92297c013c933d8f364c1fc3541e6eba6950000c14c50cd2ac913129bc72f1d049b03a4560dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad1cfa0dcc1954869169882307cca86a
SHA1ea69eb62e305d6c9e21866894eb044aed20ebdf5
SHA2565e4b46ffa0101d8b3e8530f3c6691207d062c1125f70e6a9309301c08aa5a877
SHA5129844f237cadea50b5715f9d8e8367f21c615930e6457c2d8db02409ea095dabe5a3bc7d5432ae1381d84d667e28b63a44c8ff43a9108723af98f6a92b8f5915a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562d96b87cc968346f213d9d98337841c
SHA18a8eb3b1b1f9cb1c692d8a0deee58f8ede33b129
SHA2569f54c678d0ced8363017570b52c3dca0c691dc34ebebcb86ffb3f42aa4ab63d4
SHA5128389d7aaf8aa56fb6344df8ba38e2d99237384422e5fa30e5a0504a685d3835a7982cb2a4c05a82b9c35e6ca939926de2bfb4d436ae079ce758aa81b1a584a0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5badb88b0bd11504ccd8a49b0af6de2fd
SHA15b13d72a3f2cdb4a7c87525a6e7a3198d39169bb
SHA25672a1f817d095bacd35e8b0603444c81c0bd8a3ec6e5e23fe40797a09cd8e1132
SHA512993f3fb6a85d83edb4d087ef0764070c78f49101897983ad913c276e12dc5e09a826bea273e62bc5488ae929e4dd840728de89563f6b2f4ef09df5a3669be429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c6341108367d7d3b036811a1e35a7c0
SHA15f517357317807e8976291b3fc7eabd2cd739286
SHA256d607972bcf8584b2b5c01c295492bdb7c53dee579de3d1915efa7374718ad001
SHA512e83ce51ed765f001437de5cebcd2f1e43f4f166d276560053dbbc7948727579b4ae1378750e68397fd1ea273ea1ac155b9d1ad79b3a6c9f59d71aa043da3258b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5461e082730979f73e08ec88f7ab7da9a
SHA13f505861aae9c374326ea1e7926c26403b096c90
SHA25641fb3ec8dff0c131ac2e15ada37c4d00005786d8661edc3a46df67324f6b6f6f
SHA512f9b42f5ec2cac5a3fd006d48d5ce721019304978a6dfd2471e3f1e355c165a090b2c1a208ce54ef6528994aaf421948323a13b70301229c4da60e9b3c768a464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ff7f11f2f6004e795009ec5db8cb652
SHA19c85536fd718359d23ac1677edcf8e81c1e63fc4
SHA256d11d24a51d738722468bf31ea8654142e94479febff4ba9d9faae4fe84ef8fea
SHA512327111d1940b30e025c78724192c7bcfb3069b0242a2a291672a30a5f247e8d55478941399aee4759d9ba49737c794fddebd225b9d0bb6d62c1af2cfe9d9483d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d89a261ff530595ece7a11e216343dc1
SHA18eb3a1004cab22630431347d3535b505112cadb7
SHA256da0d3db07285f1d8d8d90aaa4c802916d8aa39ac80fdda0742377f60836726d0
SHA51211cbbde9ec190e5389c92b2bd68aa6053bccc2846fc28910a3be93bb37b57485637f788f894e30cb841c959a4a0b10e317d266c888b390fb059df993c5383172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a954251b6a7f311742ba967eca332b55
SHA14068cd76fcf2c8c2ebd8fd54e810fcd26c011b3a
SHA256cce30bc20463881b81fb4944f3162ea9e151e2adf95519de3d0c41fb14676df8
SHA5121a99dd0255fb6bbe8d005c4972acfe3ac801819422e6e475a754a0e16519f0c380b7d8f2ed6872583ccabe6c22a7a8a7d879caa240a9a685b09aac6012fea7b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54988d74104cf98401fe81746ee3739ce
SHA1fa6c0f3b20c5b12093900d0c6c8ebcf00f03c44b
SHA256e7b41771da67301eddfea46af570bbecddb3f14b2ebaa101d843afeb80f03bed
SHA512d68568884927c5c42ac0696ae8c30d1b67a8b88a09c956ce4766b34f89c7164d449bf70ab0bd0f98229aa43b6b8d7a547af8227197feae9c07b1704165ccb058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56561cea9feb753ae365ae5d6561c5f75
SHA19b58619d1b895a5bc906c75f5b632cd9c4eeafea
SHA256363b3e0e31fb21847e687383d7fe7e86ddf49592f8feecc73bb32b2de8834329
SHA512d88bdfc1bfccea81339be399d4b0efe3b9abce7c9cdbff37f2a0aaa71f12662ef8a0dd07d3bf7872357d01054583697e06a70566353bba2ca5c4622b358ad339
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b