Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
0fde5d863ed066698cfd273bb8fc4072_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0fde5d863ed066698cfd273bb8fc4072_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0fde5d863ed066698cfd273bb8fc4072_JaffaCakes118.html
-
Size
21KB
-
MD5
0fde5d863ed066698cfd273bb8fc4072
-
SHA1
f200979fc47c2c87a43eaa0937e26aedaa2dbe9e
-
SHA256
e98e966f3449fae7942ea81021909d3c061bdd9d43e66013b4cfaa920768b68f
-
SHA512
615482651cdd2602f20447ebee188a62742e72b0cc7f2a8dc0c9ffc330fe2d2a7318a1fbe585904466b9124865d79a34d8dd403ac8484548f65166eff547714d
-
SSDEEP
192:3pIhliZTVh0dINFHMFAg998wqh4vdZixCE0PxwWvTKTrXbiiTsK4Hjs1MAujdaMj:3pIfiZX6VCg998wqh4vdsSLwMiS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434138617" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77519F91-81AD-11EF-9A25-6E295C7D81A3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2065eb4bba15db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000002cd0ef82942dd5017332ac891c8000c4768077e4926e88617a83e6887ce85b9d000000000e80000000020000200000003e13a9721332d761540c36e0638a3b6a868d3d33d32f579c00b490ba0a10279f200000003cbc209dd0fce6527933b98a4dcae81b24ffecbc8918f7d05860aa99d23c61b44000000009f702c907c6737786b641e8c0862b12745e2967c50e90c91314b4fd904134fc5dd823a77ecb9d77cd111d9103963281d84c00d0e6afa9fbe363e7e33f122c3b iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2752 3048 iexplore.exe 30 PID 3048 wrote to memory of 2752 3048 iexplore.exe 30 PID 3048 wrote to memory of 2752 3048 iexplore.exe 30 PID 3048 wrote to memory of 2752 3048 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0fde5d863ed066698cfd273bb8fc4072_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53344722e87add8722d0c26816f244f2a
SHA121695ecb66077d0553ef8717f118d7db2883da26
SHA256dd2a09fd8f2abfccc3aa6e8657ce0f946c6c31d44e6a56504aaf6b5f90190afe
SHA512a649dddefe63a219a8d2f9df69892ecea9bc0f4507644228b584811b08757105cf25d7d8461fae9eacd48af068259134aa1c4f9ef72e5bac619a8b92edd453c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd8930f68cd9e7b4612745a67946eec
SHA14fea967542b8f73b44d0d7170cc92cc2504781ec
SHA256c0a074f6b0391cc9b5ed9bbbd56c8c9e6553d5ebdc27d7ce05c018a8cae915fd
SHA5121254fd232098b996fb1b15b9d0bb7354e0afe765ca2ebcbd7e088d0bfb4533d373f84cb318b55122d8402a3c71ff35017432c441120cf7ce4bf72ae5579d5871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506abb4d9ed90f8c6de565422d3aab89c
SHA121505f4eac2ca089b55eea5df82f6bbbef29b7e6
SHA2567c65e63defd95f1311541f01b9d56dd3d4b3c11ebf1c1dfb33b09d5eaea6c8a3
SHA512e14b053b778c2ee083337297531fad37c48d497ca5b6ddeae7ff50fbe38dd2a4dc9c757e045a721e40a6af4aebb1db1719b58382c3177e0b637ba0d89ca9fc2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58495f477e85892ae2fdd55216fb3bbd0
SHA1cf223927650de2080a2e8a49aeedee67fcec134a
SHA256ddf035959622ff8790e6ec0e4692042acdd0f580404559073ae4b20616160d2c
SHA512547a12544232b7950043c91e22a0ce344a90c92f135b7dad594063f11f2116326fbcfed5e7d9c18a6c1574a8cb462e6a5c4475c304edcf5d8a7efcf10c77935a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55efc7d01f1900f9a05c073258992d0e5
SHA1bf1c747f7f7fa2ff2ba311310f00d651c2699ba8
SHA256e5a436b2f88ee9ede30981118f502448b610a9f9bb1bc1d3c0b6c0628664cc7c
SHA512b9330eb1f4029f2ad17bcbebe7d8e11dd20cab72c718a58397c670a0ffba5c8eabe3b7aa08c4e82a651debc74d951f2de2cd76f5bfbadd0b94fc3999b17964f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549998e55774b745815a3c0126f3688c9
SHA17de4d35510966cc59ad82a73e94cd47e57baa328
SHA256b5f260534b14c6d3a03c7e373f9290906257b36521fb49531ea796926a63bc0e
SHA5121c90e06deeb6270650d05418807509b42a0c9d87df723baa2f2458a89915d9f8af81d7b6a08cad332340aba3875cbdc81901dac39fb20dbe11277beabf392e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a478a33da3fea7912d90276c78120a1
SHA1e60496860162bf39aea678ceceaefdee0a36674d
SHA2569eb96e56b23ea8e7a0e05b3fc8444389236cdcc1d268d2dcd71ecd0e3c920814
SHA5125e53a5c119a2091cc5b904846179ba96d9146366778cd1960e63324cd98276cf0691adc8f1dc5dfdd9964849b623cb1bc25b89d06cc5c4f9fb07d839c4aa14fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a7159eb4e006a06fb324a92a5a6fc8e
SHA137683b3380f3989e7fe5ac20fd1f26a8f1cffc4d
SHA2567a5664c4f0dfe03eed2ad6b2f8e79362c944aa5c6121421bf4f0618d43b96721
SHA512029b80e27706a292179fe6c29b38d1d44fb13108e4077edeadfdc946b2f6290eb0a3b01532a40ac7da1a189d5d4b44bbc0cdc4aaedb7e48642d57055f6a48531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfc28c94b0cff398321c233c84fd184f
SHA1387f3c2ac14372375295f998bea583e8f6912808
SHA2563035bbe3f877a46acacdedf041a701ed53e0256ce7587e7f91bb0acfe9094ad1
SHA512eb8d6431e9287559693e4cf06b89f1f4874c670793bac7e37b5248ca9707557dccc53851262d50d1c775f8923cc63c750fd84d95ef44c4ad461f4c7ab63bfb24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de0affdd0da1b76d25feb3f905e99c6b
SHA1c8236bfe91c985e3e3d48ceeff1dba24a05188ea
SHA2568bd09403e73a00b949f5a1f50d500001f5afe62af1f71837ec202a4624b389bc
SHA5120b51e70fb50ef7fb87c8f3271ea8b924a2949ba19060b2e13dfabb22fac39da97ca64e5c121641b956315dbbd9f1e42df56c705d1f4034b18e8fdcb745eee66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f69f489ca11bcab0bec6da5a5f3943fd
SHA13f3ed37b8366c64e146191dd1cadcbdaca4f4dcf
SHA256af7af0e765a23d3933e124736f0f9856769c8c91b854c04ffd81e2312046538a
SHA5125be7d32da7eec3dc8a52a06a628bcc12257437affc928d2f649890ee426b6c502359d67aade7f49d0ea0b4c267a1dabaf3a6d6e499a7efb94d1e80f4b896aa3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583cd8debfd5e1ca0ba9f471afd521739
SHA14d6e3eb20b6848c7a2984d20c0a25f2814f0fe7f
SHA2569ecf92d12bbd3387ade9ac9fe9a0f05c3827445c6572ad25b9c74215cb48f4c1
SHA512e557e4caf815d5f4cd7a50845f72557ad72fd4053205e1676dfe22a14dc7b10a2ec592ef8662928027dcd7290be4155ba45f511ce1e7b29f910befb8dd5e7847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bdeea1b2b8a7b3bea68e07cfefcd9ee
SHA1bc99555a062c2b696740cd3e773951ef12dd8c59
SHA2565885b44bdd449f6db604b30090d8d4e8db0490e93eac61ad0bbb3017b949dc6f
SHA512621df99904e5799438cfd277ab70534bb336c890d34a27cace722a43c02ce8581d538188a305d20cb84add6b06f5ad8046bd176e2cd2883473814bc5fc5bd438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb2e6885fa2aa86d8a28bc2c53a1e5e5
SHA1f62a3d5f22fded6f198da7383aff00ce62539aa1
SHA256b08f84267179822bc2576d0891ebd41ab352e127e40fbad84917f16a6fecfb66
SHA5127ae7def06dc8a441412ddc7d9b07ca918ef1b7ec683f24ba6b5500f8d60b63d0f26d8fc1176c99746d3bdb6322557c0ec67cfcc050edff184b74cc235c159842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af546117de4fd399a139dd6fcc70415
SHA151ad230ab452f38a76ee385e927865c9adaaf78f
SHA25668d4b6a56f090b733fc95576e909475b396d5b3cafd3fed89fc96e15e6ad0500
SHA512752ebe80af6d45aa57eb7959d0a9d277b61429e7eb7f1de655ae1cbdcd7bc9c43edf8b2bf009b7979e09c2bd88f40485f809cfa92c731cefadab8ac337ec23cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509a06dbdd09a70196fcab0a3dff6bf5d
SHA17f7324184164eeb652a2698eee6ca0bc36748211
SHA25650e5c64a755bd1e97ec9c1ac4ea0174d10eed607fbd08855ba39b457ca04f16b
SHA5126fb8224d3fbf672d14cdf0bb12d551aa3a2b6951994d287f895b160a7343eb96ce415444666845b6a1c0573be3f15393b3c218ba9e7c104bf78a0c38adf2815f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1bfba4835f16c4088041f875943d180
SHA19dedb243c61de58de8add8f0d013bbe49016a22f
SHA2563ee56757b296d662dc4d56b6bb689cda6633e730a528c765a8e8a9f86bb5b4cc
SHA51273e5ce6301020195a7e75abbf7cc0d7dc51223bcfa0ba52cd991e0e7044a0b8075c37753c7b7314746f9b7201fea113665b745d793a2ebbf39c1253d0375e98c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4e977c556dd0afc7d93cea6dc2d6d33
SHA14c146b1d7795e23036e00ac06dac5e95024df159
SHA25673b5802ea38ae116a9bd6da7ea4949f28eb2c9b6d778706ed2f69d8d2c4b1a51
SHA512557423d9acd9e525fb90a0e39b5a20d1e6b36438b0c0cff5e8cf2a8864a815f3402b6ee18b5759f31b5b19d38788680e9e66f08b8b35c7c869923e1862cb2f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baab60d8d6888defba13edda06674946
SHA191606d24c7098c8a94f2c0fb74f0dfcbbc10e2a5
SHA2569b8edb6d0815218bbd6bfe26ba0c541c610d1a9b915d500f097baae85e336c35
SHA51264bd2b2ca2219566e0c9ec4bdcdb7c3f0d93a9eea59f643acbd0fa19beaf0c0ac549f9444dba99246bfa2fc71659594a3402e6d6783f028f40f1571a378aa00b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b