Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
a1d04cb7f024937645ac1859c51aa7a5_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a1d04cb7f024937645ac1859c51aa7a5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a1d04cb7f024937645ac1859c51aa7a5_JaffaCakes118.exe
-
Size
379KB
-
MD5
a1d04cb7f024937645ac1859c51aa7a5
-
SHA1
82fd4d31dd0eef58a5aa4fd0625de2f23b4046d2
-
SHA256
0244faf7eb47d633501d7cd38e655a30fe9b9968cc564dfe97beffe7457ff7d5
-
SHA512
1c139b9bef5c6bad2303a674470b35f9004fee69121dfb3adbf879f65b1150b249729dc84bd65119426d76682dd5bfec242dbbd9f728d29fde50724b2383a75a
-
SSDEEP
6144:IWBtQYoVU9ypRgmlCjBsY6/C1ZlV2VRc7EchvEsYd/O8G2X8F42I1bARl7:lBuFVU9y3RY6/C5V2Ve7Ec5gmn2XSfQs
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1d04cb7f024937645ac1859c51aa7a5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9062404a7ef0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74DFA381-5C71-11EF-B75B-4298DBAE743E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000566ffbf2624f91523c7f9fc05ce0f0baaf4379df4400f72df5f44f54fa935fc0000000000e8000000002000020000000513d12fd6bf4035b80f461a519aceff6d54650953b05f423ebaa8ced9c8cb80920000000acd014217615c3301ef3ad1edaff0712d0919ca826ff8392edb338345d3353f64000000070beb5f4ed3e720dadf008953a0fe30a39daf08ffee9d933f072c71492fa91f61303d7e308d5f18972f5e9362fdb8bcafa1307c76644bbe72cc7b63e5076939a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430044650" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2684 iexplore.exe 2684 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2684 1368 a1d04cb7f024937645ac1859c51aa7a5_JaffaCakes118.exe 30 PID 1368 wrote to memory of 2684 1368 a1d04cb7f024937645ac1859c51aa7a5_JaffaCakes118.exe 30 PID 1368 wrote to memory of 2684 1368 a1d04cb7f024937645ac1859c51aa7a5_JaffaCakes118.exe 30 PID 1368 wrote to memory of 2684 1368 a1d04cb7f024937645ac1859c51aa7a5_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2832 2684 iexplore.exe 31 PID 2684 wrote to memory of 2832 2684 iexplore.exe 31 PID 2684 wrote to memory of 2832 2684 iexplore.exe 31 PID 2684 wrote to memory of 2832 2684 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1d04cb7f024937645ac1859c51aa7a5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a1d04cb7f024937645ac1859c51aa7a5_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://globo.com.br/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5878e122f7de5b70eedd73c11d874dcc0
SHA163c4b7744b66ce41fbdbb0123af1c6516c2e99e6
SHA256650b89b0457c9005c009505633a60586617a1ed41c0aa21ea218dbfa122e60bd
SHA512815cebb11e7ceda0f5c8aa9a4410a79bd4e8cbb81900e0e8e50b6b7530149335f9842a13e5bde1e33f2b25938a3bd9348403ea6cae77c8a16123f3eb319e4b63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaddf31742974cf0781ef9e944d5ca19
SHA19e663831efc01a635aa851c13e9f8d5b8045c03c
SHA256e2cb0118ad57e325baf672d04e0eaf51575c0f0f3b8fc7c8b261bffda3fd72f6
SHA5123eb24e3655b6de2e2555ff5359ee809e6eb1cd936be13a338270542a8543ab9ea751d105d43a215219c97ef0780940826b5a8d200de42a03743934147a657461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f319b86b98f1e6e009e9c515809f61f
SHA15e3e33672d982d84a38a96c868107ee4acd23cf6
SHA256e14344fd11d015ec6a87506b0e3267368c9436be51b980d88af2df9c6fe749a2
SHA5127ac2e8954fbfc6d2aa7684517b52b8f1b83949f50903a9287a7eecaf5fd2b2ffac2ee401e92dc940c7041d338c2771bd4a3eb9b8834dbae1d40df888b208e24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aa5fe03a8e293e23dd4ae97bdbe3c24
SHA1302e59a91ff2489e22e3d4cc71027485ce13c176
SHA2560522bdeb7ba88ed1c88aabb5f28d9ebc886c74ba834adcb5f506c0a4623d0881
SHA5126a673d2fad3d998ba8e2ab63d51f9d757c1039d6140a87e5daec584c545782b0319541b742b20242288d38e7e69c697f2c4874a9527fbe43bcde3c9ec30451dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6964757b45c26c072a52b7aa0250cb9
SHA1640a0d97638ce4f39005196c6985eedba7aeb01a
SHA256c9c4ab5880659aabe888938eba2147348150efea4169550da9608d5697cb07e7
SHA512ee155033d48f25ac76e11d57c4bb152b7cde5d59a4ae76e5b837f6d0a68cc5ac7dbe815aab663e2af01253ce8a8e7f2424fb94d9318cabe5c8d58d4bae74a03b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b268978de6acffa1bb8f6bfae91ccb54
SHA1f895cbb62b4ea4e9c57871f61c19309274f11bc2
SHA25629ba0b44fdec88f172f8e4fb88d686b16bee175b72aa66e2e294a6a791bcbb0c
SHA512c5e15f71256f7d4861b80f240df9bf41b5011018bb449f995c53ec113cd98e09c28a58b31dca5ea6092906bb8aeb23a041f36428394c363876c60505afbfac17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5961bf16091e6d5269337742260c08ecb
SHA1902d925787d6821f0d563454056ea3cf27be8520
SHA256db6e869f2973082db018b220702282ac79db2000e45096607c311a13a5b80c58
SHA512bf188ac59e8447912c3da1c6734e7aba6784de77ce950cd654988ead22cd404f609d8b8e8d7b5f22c417660c0820925d50ecf77540609c8d10aea3d67be86960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a24d32f13d73e6c65393844e45218feb
SHA1446c01b6622aec56a824dceeedb4de331a133bd5
SHA256481879feab7eafc9bb70917bbbf3067d314c235ae72ce69d9a80ffcd17b10b3b
SHA5128079f271c88eaff721472921840413a01cd19635588b209dc01cd0f77006b681d9457c5c01b27b13cfd1090ce38a24408c44675ec1bad92b16a2a32d27d13a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53011548e9ecacf147eec77e638a6fb9c
SHA1cbfc5a2d939b59aebce956710263c1f5e04519a2
SHA25629eba884b9e0ea28336ad62b938d262b2d7e42a0c32e9dd78bd272115030db36
SHA5125fe55a6b6d091ee4bf390a8f680e9fcdf912c1e0d86b2dd4c8d10dd8edefddd0fbc07dd583ce9e829ccbb5dfaccd2b8d93cdb91d9c33564bfd0bb909a2ffe642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578336498b3ec55736b72d3e28c251a0b
SHA15104d4ad9247a62a64eddc9d7f485fb0a2676709
SHA256d65ceaf06fea766e8b3eff5ef7ed684c20d042dc7c244e138a026c20d0f668a8
SHA512d6101ba3199c70d9ec568bd8263dfeb1593d9356fe040c9e04d61e5f9ebc48a35c974107332d7bdf634e76aaf3523640631fb9562723e6d4aaf77e6aa228ed7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5021469b3d91e0bf2a6fff5a0f753de27
SHA13c1797d17a191624d55d55e69cfa0359e29bd452
SHA256324e4eecd360cfa6cffda30e30a3f7810a17cd2e521bc98282a9e544274c5b03
SHA5126f8b6af8e37fc055ac5cb51ceadfbbbd7ed6ac2938a0b5068ffe70ba1e66c381d8e1c779e9a6497638c8ebbd45a93aad5e116c3596dfd34a6802727da6ee431f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567e4340aca6c4749e91a94cc63234797
SHA16703e748c7ead7e0a485f37824a7cc91f98328cf
SHA25618ea348e5009e0927925d92a8bf1fdd7fa931c0feef7e11889208d4992a3a433
SHA512888afcdc31e91628e27893603ff25849bef589faf10d92f910e7e09447a6b25e7e4669637ee246b91814c5f87b8f355f25b7f110a0cba95554c48fc6335cf948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75e75614c634696b7dd8bcf5867dc63
SHA1ccbb32847b4309ece9fcb7af75d5ba3970d43868
SHA256f8122bf7349ea8c4162c7aea5ddf4e632bf3fdeb20b42d9c7ab9e31402eb23e8
SHA512304a4df2c737459b65a8b2275935768688fd9b83275c4e97d15106a3b18c90740e226f461774f19cb5465237be51e8bca38fba20d5583c74c966acbd369d9d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53358229fa6f7a75de68e28b2f9381a18
SHA1550db0a1cd22b892a8df3b9d7fc8b8a383086f54
SHA256618788081199d5f6cef2e862625b378938737b3a04e0dbc5029bf75d8ccc3f52
SHA5120ae1e036c7780476e4d2b0627de57b493721045bd4b032af0451209c70f9e6f8f8ed247827f7c2cdec68984033c61c0683305da43489d276fa2bd9901afe3582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c45aa7925fd606cff3f8d664424bcae
SHA13ea8d7609f22e3e652ec1a8258910123b47193b3
SHA2561a421a5ca4250e0b0db598da4e05c75d890b8086f3f61855e6fbca977e1e0a20
SHA5122be90715572c2229653adabd058a7fdecdc6ad1a8314dbd7556b14bbe5b2017e91cbdc4cd7ba38ac22a17a7aeb4b164b160311869b728f5676ec1d0f4574b6df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5991d48405fc8cfeddbb08cab2a4c26e1
SHA11c0cbd6d51974128c98d6577daefdc66ae78fd0a
SHA2561c4e3e42f4ac207d93e57291457b9333e3ec96993ebab9afd11d3cdc53d88810
SHA512c70513be7834871d2ff90bfe5c37af032417e8e09d8259e90282f0eb3ad89a1c479283e0f4892b3fbf824858d408605618cd54c94fec8be5655941ba94330047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e4c8902c0a75829cf6c5edb10f2cc15
SHA1fd51f39055fd0b515b0eb79bfde4676e118efe70
SHA25692092032f211cd06f48baeeec695305b7d0507a0d3538dae87200243f2ea2fb3
SHA512ee0ab5c7baca8bec33a6592983e1ceb88e70173e2924cbb17ea7b63518c49169764a6db8da3847f8d7726eb51e14b1e03a13c61962a993ff3fbb3e2cab183c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a76432229bd723b00b5dad8657340432
SHA1017b2e7c85ab912d6f974717235e1526e7bb48b5
SHA256eab27d92bb5b0da14466be3e66e4958fb8edb9d8fa26eb2fa53a76fa81306623
SHA5120084d22895a35f9cb2d59a1b9f459d7279153a6e762000db718cad8df9f84634165e40eb5f740d223129bb7d436ae02606e0c213d1b5ff3dc9b8f19282dc30d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a506ac2714db8db09859707cf24dd6f
SHA10d0aca3a1e7a3d9cd8377ab7b20fdf0fe82aa46b
SHA2568d15a85cf82efb3f2143b8309cf2a2cff14ef4b5da894d6540a4bcd65cf8c5fc
SHA5121aed14e5afbab873cc9e2726510a204c8ead2cdad4ed4c2f15bd379020597a37ad8341b352659d13826aa6180b48e78a7f47916b6ff71a2050d604970b637512
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b