Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 20:08
Static task
static1
Behavioral task
behavioral1
Sample
9bc658ddf2d085e4455a9a1d826256c9_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9bc658ddf2d085e4455a9a1d826256c9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9bc658ddf2d085e4455a9a1d826256c9_JaffaCakes118.html
-
Size
26KB
-
MD5
9bc658ddf2d085e4455a9a1d826256c9
-
SHA1
f69cbee0513c2ee15beb2ce1cc27776eb1b4fda2
-
SHA256
796f3f5079e06592d2ea74aaac4908f320a64be634b3cb6a4a808d6afa8058af
-
SHA512
6f33f86b7ec59b617ca918749e21847870bf9d7ad6855125f9e0e8a0d28d5bbf04c9dc918af4b325548f0f11b5eec8078e30107a80e1bd1226e3942829fe1808
-
SSDEEP
384:LHf3/TVimoHf6jIBafFx8/Jets+oL9POFbeuEPiOK60HC91/CjWpsfq2jgMM8KI+:zMRSjIcfFx8/JoHHk/YgNslgLqiV3Px
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06bfef971bbda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b56eb40ded3f794bb7675a3135330a60000000000200000000001066000000010000200000005cc50936a3f83a73e8ddf2376216f1802ae8cd71dcbe044957263dc9d6e67bdc000000000e8000000002000020000000a0a06419b423c3dccac8ce67d010c710fd9e79790f16484b1afe367e77bd6cd3200000001f9ea408cb713b66bf4e9a130d50e8f4ae7ed0a04a118317eee33ba95c0ad20e400000002a846bc8fc29462a865322f79245c8346da871c2ea7a9899e701cdf13b0cb9bcf83226d4deeb926c72ee7b530805090e120707468bedf608f2f5ff59ea3f492a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424211950" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{242269F1-2765-11EF-8547-E6D98B7EB028} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2536 1640 iexplore.exe 28 PID 1640 wrote to memory of 2536 1640 iexplore.exe 28 PID 1640 wrote to memory of 2536 1640 iexplore.exe 28 PID 1640 wrote to memory of 2536 1640 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9bc658ddf2d085e4455a9a1d826256c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6396a9130986b5eac66777cd793a6ae
SHA1b46ead1de4237f073d4332d437f950a5694abb2d
SHA2561d2c426e6813f1e07829d0ee688de7717e77b65c56416e34dc32b844f94c7d0f
SHA5120ec8b3039a31cf99bec18354b5e6eddf5fa6af6cb2ccb5ff7b2936c7316f42d91c80f76b73fcd3b1bcea5c4f3ddaf56a3d13f6e5592a000b01b5bf0433c01927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57472a50d1e140104d6fa68bd3de36fe7
SHA1b757bcc8d2fe4e847f2a0f0c0e51c66bea6335f0
SHA256104811786b06cace8378d7375f73b906c5c5b30cfee1c81077c9b176c5358d2d
SHA512fb79c8caa01233da8d5b4e3f45666692ce43e0ef433e2326802095616a71e79a58fbd56fd48e9d483410ad820c856070fd8fdb155596d1249bf48df8562ef1c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3ffdf1f63ae671942798bbb2936dd20
SHA1f886f4c07a9e2ccf1e06351bd1ce86aabd04d94c
SHA25674130501aa4b585b5cb6bee011fd54c637f907a16d64d9caef30f1395f808d49
SHA512e0e9e9bcc3c4d3406af2c36bf7f901d18c1d4b25664457dbe8058fa02624fb4ee745a6f8f2c604b1159581c1831e093bfb3bc469d0b7bf080ed053db5a3aef79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50980baafb87559d1f255b926cf7c3b60
SHA1a94e1d0edce97a58acf5b6e727135a3f4ec5ee4e
SHA256601e23a1a15418fc11741d61d45ef993b828eb6daf400067737215693e5d63e3
SHA5122294ad7542b9b3802f03f001e86529414f8ec34d1ce945db0345b9711195f6f4a5d6f9a009183d3f16f5f553cdb9b63b06cb179199bf8eda5eaffb0387072144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e8b2f550b4b2469559cf79206034b2c
SHA1d527cf4fb9601f50348b295f22cd199bd55659e6
SHA2566e703460e303c4e41085ec419cf158cf056fb59d46e0bf2f6c1546440bba08ce
SHA5127cf790fa62ca8fdd1ddefda804b347e361ddea6f7a6f208cf74cbf3ccc65f9ba9eff79a867221b1f85dd02cf16e3a35e71c1ae8e85f05b78f404df640d2cb481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553883d1d4a4c6e3fed62a4b31d3b2593
SHA1a8967e377c17fd1ffd3a5d8bc5c4d2afa0c19869
SHA2567eadc3306cb296d40026b0b8828f755f8d97747bccc86167085cef4be846b70c
SHA512ac1ceb60f83504a2eaee7c5af0b0d811bf72693cbf92629184a6319f95c0d7c388ed063093a45b872e5040754cf55a592187338cdd61af8f06321c518c13a825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef37089634a4a48a5ba4c5865d76785a
SHA1240ceb6268e522fbc30fb280db322e515dcf3063
SHA256e0e420f2d7364bc1ba375b7898fe8317e14c981802e7aa95941b9332b0ee95d7
SHA51217ddc20ccc3e6ad0cfab33f89ef018cd889ad61cd4840ef1fc611e4f55d8bed11b7fcd3265e631620e34783c9bd21c26df1d676d40ac12f675491cfcc99f81ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5804408baf7ab349ae2659a78bb17eb95
SHA1c419716599d0ae03bc6cca115913b99fac23fd4b
SHA25672d0a5119d5db67386c9bc074cf0e6c6d0221548986c4d0af528346d9c73b838
SHA512c975d4cad51d6b291f73e8148a845d2fc180fd85b82e1a03f7b91fc47e493cee51a5c55473a7e116324ac323a0c30b606fc711fb09e6e5ece01d284da6b593f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c87f588c6055d0ad624a3598bc6985
SHA11d147c6a58da7be3a47ace1a316dfcbc511a343d
SHA2562d930a2a90f22a66124c23c5ea98a44553266ae23a3d2482934c49ec357f970b
SHA512c08028cfd92e9df8b515571eb6b8881ebb02e95dcf216a7f62c467a2829a20109876a34b80aab301fa5b76f0920757e0a6e570ab4c1ddfd7f976f1a5bbff60b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae3d3718b0d153faacc381616d5adb38
SHA1ad726979a422b9d70075234962260b13d3da9788
SHA256250c58c00d02186ca4ed224f0abc064aa8391846f722da24a8580022d09f457f
SHA51273bfa0fe76be9eb22df07e4dc456770e45d60659223dffaa16f963beffa778af24265ce752f5c8af241cd853d4fb6c38a6393b18ff2c7993bb94ba204915a3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6def2e4bf86f8bdded83fbe559c70f1
SHA1a25114ac650a53739e3fda3b97cdb07ef4857bfe
SHA2562ec909f02b5818b67b29800c1e58af7fbbc7859113754f5666a8aa4f1dbc0300
SHA512996c3635ffd44b6fca7b408b97408690ac31cc0155f54746ce73afabab26f83654fc23f1485075800f8534bf3f60c67a5da4b340af1c24ddcbfdc10df376c88f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581e940d9333fd00157b0915cbfd29520
SHA1d00ed8702397d321e98f64342bf54afc2cd1d65b
SHA256edecdaf9bca8cb3a2df03db43f0306af2196fd1559afcfd07149ed2b02f87ebc
SHA512787db651dad19ed1e6a004686d7ba0af1b017371371dab3bb8405c2f28e161e9def741b39715b8cf51ff94ee1dfc99f0b6095ca70e31fbf80e0a75168c7c96f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9af823367550a6805d92c5b63e71580
SHA1b08f1ec28f0c517ad5b41f0e6f1e052dbaae8472
SHA2565f5b01bc8a78615174da819750026a632d4eb502897d4a26612ca963d2559423
SHA512cb308a619e63f7a3b89706016b9d777c4101d7ce5379f770f7eb1d8861a4f639565984bd6ce92811b2404dffa3c8df52a5af0ffdef630e2da5c41100ccac427a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3d10ff5fa62648fb6013e5c25f99446
SHA1450e1ac008c74f40fc6fe3a332f010e045ceed71
SHA256bc92c2955756c974e7a284ad55b76bb1debe8801edb4d34a2faaa66134c48080
SHA51263944b074359c76985ee22e5dc097f2129a574ad67d010092906eee4fab491dc4fa2fdaf62692bd6157ef3cdf04426289e503cb207c4b45c2fe0ad22ad4ba7e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5678e663350a88cbcd23420631ea1416e
SHA1eaa18d9f8a6b5b197b8250e6457dbbcb01709e44
SHA256efa1004e9348e9ce17178a1bfa7780095f6aee1207472a8b1292af870af07b29
SHA51246a3359b8c4cacea33d9e76254fb7381857df47a60783a618718f4fda784d4895b2fbac8439fdf90907af2ee6d493a4a46dead72210a793fd019d98410b0bc59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbc27375ce529593c0352a80d5c5e263
SHA19cff0f85f3ea4ba40eb08b394fedec713a6fa30d
SHA256ac67b1d927368d9ce3d84b5c9532af56a035413d67d54df3ad89896a107a16b8
SHA512c12e67feb603da93db106abfceb63e363d652580d74503df79b5a284f80c62d271f7549e68016b92d328d6064ea46ff6dc24781befbf5ff8d3acbf7d03cc3600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503bbdd909791757cd0a356e20f130109
SHA171976ec45046c685a361b0f04cd3ffa3f2e67655
SHA256c1a28f43248de80916ad4890cd60006dfc0746c94a1154fe47c006b60b115b97
SHA512da3054057ab54bb837acc1d4ecb40ad5638ab1babeb11543ed6f994bb5b83c09bcfd115853c4a10eb7345135390c6d5a27ff647d4c087cdbbe95b58d49d28c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b00b9a9d4663ed942d467d9a14e6f5b
SHA130789bfe57e43006a9746bd954bfe0d727f713ef
SHA256526017e8cac972b2c12ef4586da584707f4345944f982374b4c359b10b961ac1
SHA5123b43b25166733ad2693fdf3e3a7f75f3ccf9d77a0aa73238ccb52f187e3f07f18f1fc91c23f5fded42afc14a8d9726503f3e4f4a9aad47b745a76261abff649c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ede7eb33bba6f9a489811ed4a54d48c
SHA10cb3e7885b7ae7c766c67975a7100cf7dadde418
SHA2569ec9447090871923dbb60c3a3baaa496f5ec25904373b7bd632545266b660199
SHA5120f3c03bb782df59bbedb9acd98812d267e091fd46f669bbb1ecfb0820f1f74713fa9befcb1db0a4a80accdcfab83710af883a5f76fa6770ea82c96186160296f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I819HQXH\oakland-pole[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b