Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 11:40
Static task
static1
Behavioral task
behavioral1
Sample
da44c3f7e2715c9139b62af66a4858b1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
da44c3f7e2715c9139b62af66a4858b1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da44c3f7e2715c9139b62af66a4858b1_JaffaCakes118.html
-
Size
6KB
-
MD5
da44c3f7e2715c9139b62af66a4858b1
-
SHA1
39d1b6745a24c08c469846567276d89f7f75f547
-
SHA256
8475ad5681ebc8849e83583c77ba9198508877fda7689cc333483100762c645b
-
SHA512
fa61b397ae2f2d4f2899864e4e079a87ff9b334e9055b01d5928bc7866ab2c3833b42bcdaa00edcbe645a54d1bba211b5ef412850816cc73c32817858c16a30b
-
SSDEEP
192:Zy/O8yw4RlDEvHLgszgA5ZbydXDChAiqEuf:8/O8yXRiLgszgA5h8iqEuf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432216677" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{993CD841-7032-11EF-A14F-CEBD2182E735} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000009a716299b5f860d49125c3f0a7a095f42563be9243107aed1eea3c3c29ece197000000000e8000000002000020000000563044b074729be314897a1108adbd3d99c47ec84890df3062c78f91289b188190000000d2a5fe538b56ca8a9e0a7fd01af056eb36f750caf0c32b6790d8d92a9dd84958a4d719587f382360016b6fe7b29a08a70f97a9ba826ee9c741eacd26b3e162e884e754393ef33aacc70f9e696b9150fdef27257a678dacc5910cdd9708ad1c98fd0304bc5f12d1de62ff765f3c3d63a66eef1494c3bb3961cff93c448805e9bde94b32247887ac2b85fb6fe223176eb240000000452b9f47cbdfe4ba4d0f88c6bc0e405007146cf64826b14e0e27907b34cd33e4b828f5404df6ef9f0ce58052ce844231dfccb73ba379c40af85b65c577a571c7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000ae3223e5f0da58fe90a2200bea04dda7827fafed58557a436680c4efe915afb3000000000e80000000020000200000002943e04c86ed17e9b84517836528ccafb2ad91afeb5bd395eb208641620102f7200000003e377827672083e7f9af4d3943d529fc3a20334883c554d9977084b6ad8e58ce400000004f93c1a250341b7cf94a5206a62e6476d25075e515b861935c577a1515881552098466c54ecce1ad3a2833b3b10cae3269b5eeb27653d509227dcc5f50403cd7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d060f56d3f04db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2704 2516 iexplore.exe 30 PID 2516 wrote to memory of 2704 2516 iexplore.exe 30 PID 2516 wrote to memory of 2704 2516 iexplore.exe 30 PID 2516 wrote to memory of 2704 2516 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da44c3f7e2715c9139b62af66a4858b1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d143adcfd68242c82e2d19fdad6fea
SHA1831d476e34b2061baad5f86a76ea5da5bf032a5c
SHA256fe0014213126a74b803d43223abb442d25909bc1e22566272c9713baa93c4648
SHA512e9bf120a731c7e0e0c7187ae9d1de832a5aa69d8230dcd153ed603a6ed2587597528f833d666bcb5fae3faf3512be61a02dd403c205cb1cee7a7f255149da3e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b8d0cf796e186f905783330bc182af4
SHA11877e6e09f8a50544d2c186dc9b97789c0a544a1
SHA256ef62e521eb7e6def7d5e55620ef94c79f3675abc67504497e61c7917180cb6dd
SHA51267eb6e6934cbcf3bba66f8b449fb40c4db240a0ccf1b65fca021f6a4a14fadaac09c47fe70fa4646f015b2fb67c29966ce155515c77347449b65bd9dffe77f9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a1ba795f3c4d23eb74709b4e9111261
SHA17cb745ee2fe0c17bdcf542f3c97f304375cd8388
SHA2568d8f8f436302245f8d7c763c27e5eb26c0a118bf3887d071875b4c41a3d6c7f6
SHA512bf9092fd159dfa474caa93fde3a0f402561ff8deb984b76a4c8e778be333e9c3dcc432c6a6798c59b408c1d202d2289b2d686f4b9c2fd9fb43cfa694ce19024e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbf37a2d20ec94850cbe2a4a37724ae5
SHA142a55e917ae665ca66c4b27eb019fa1e0bb5a2ed
SHA256a36ddaedab863ef2d312b353b7d2e6d8225d881d3c9c8f3b6716566ff6b06d2c
SHA5127e9daa9aaba30492051a5be63cd81ffdc363aee40fd4070519c0a51311aa82bc1f6f9bfebf6fc8e9ac24181ef41f4341af93eebf196feb881d143845c793088b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b74727ce369427215cf3038b534d429f
SHA1fe81fdf435ef85dd66978d07ec4374abc40fafab
SHA256ba9d310188a140d3313e7d9360ff4661c65abf82987e84dd5679d8403313a6bf
SHA512da3e196d6fbfe7ee182bb9644c122e62838274d6641dba178c473a156febfc8416b2d661115d1f74aa2095d87c42f691b23cfd905f9de5eefcd24ffaee61553c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5326c9b463387440a45d5e11fd03894fb
SHA161531a66078c56c2cbfcd953a1369ee3b7e122bd
SHA256a5c9c93537347411aaf6e431492a1353927ab9872b73620b56d9502ce1fdab49
SHA51226940383b0b95e8f25af2a85469184966fd4abc624f38eb29f7f94edbfb4e0efe66844c0cc04d14fed5f1e91ecb3b1252682eae6f763d7d6d821461033de05cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503de46236bfa3f8661dd701e8092d421
SHA119727f028d3e1440eab54cd465ac590214ebe56c
SHA2561b4d3fed07c65d6d81f9c8fd6052299ea6e87a2574619bb56bc5db6809a8ea6d
SHA5129dad50762e4b58fd27718c1bae096029617d4e522a36d7b40ac5ddbd8e29f54b4f0db5f7aed93a6ce8a1e641898c1004c7e532012384b9cd54e7975cc35588e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de9969ff49f4bf325dcbb99ddb8d894
SHA1f2424eaa14c2c5fb315155af7b765e4b36f93a5b
SHA2565f6797c919a78092a0cb59d0ab9b642c236f3836ff64d97403e22ba96a9c8f73
SHA512674a12ec2d9d9bd5c81dd6a7bee894809d7a5802ff7e33e589175e1b75f62ee2d137b8bc6ef646c8a5d4b670bab6920be48a1ea89deed30e41989d124c848de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554f744492ee2a7e72701207d76aa398f
SHA19955c21a018d5489adb785171f78fecbdf842282
SHA2561d644ee79aa6065a40f281758a23e0a9f2800ed6d37401dee25c5f86f9d52987
SHA512bbacd207a90f93cabc8a767669a6df48e731a13db63bc11088fd27f0bdaf34e7064164a05f6ec5af274abe2490f7ac2e43f754629c8484b89ddfdbeffb135eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f07c4bb2b694d9138bd56fcbab7c18be
SHA131a8fdde3b172a4608491face0db939faf22da53
SHA256d60b12e93e7c05b0a46bb09ade0ca5f5a814e4a081ded9d7df282775a266ee66
SHA51278339e7fccc8a6eca0021b426e8734f6e9ff9019ef7d20740a2bba9f0dd6b830d1c2ea41e64f1959905c6291e75948d08586943699aa59c79c88382cc7c97e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5985c81fd34a97765d089e10b79440817
SHA124cceb666922f86739a4f554a75aa090459d36bd
SHA25639dc64b791443fe087bf3530220b39c124ce13971b51d658919b5b22768fa537
SHA51280c55f88149ef14781ce55a220423237b0d8ca6d4c61f99e7d1c69ff8c271522ecc57bb122d4cfe27091449e1d53693843225158f98564bfeb80740833c6cefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b670d14df6570b833083210d9519446d
SHA1d2ec302120fffbd0379784a16eb13e0fd76bc6f1
SHA2560a9dc24fd93d36782986beb6ca313bbb400ac6417208e4c8f24d57b8c936b2ed
SHA512902a937a9cf142c88f4b1317039f1991f722704610e07ac4372cd9c3448f71f317e36fb6bec2b05b3bbee84f888261e31739cb4dac8c88b09497be33da8ef546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51169f0fdd87893fa4959e390a987c082
SHA1e3a624f3ade35f35e9afadef8edcd1838e3b9709
SHA2565c3566f0774c144b9573c944851965b12dbdc955dcf7026ef38d510700051c1e
SHA512d0aaa4ec84b191242d949ac3c824a76b16cd64c68ac428c947f2bc4f52ee844c5207347f940b0daa9c9b1a2cca04e7fd5390f81fd8f23f4e14b7ee483b88b256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9ba12ad2a104fbf9f7795fda62b8abf
SHA1bf380e58e463e9ab79a8a0f28f554ea0cbe00499
SHA256c668115d427775ec1d8e18be3a6e13c5eaafd41a06679f27f64aa0ca632a710d
SHA512ab76f13994adc44f0077ab447292b1fd35e33bf30e3d9bff3e09f1aad5a40f8a555318944103e8733270f62653d1829d6598b46bb9a3e4dc40f318e77c5017ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e702e83d93d04329388931903fc3084
SHA1b1f89e86f58852947768b9ab65006bbbab072c73
SHA25632a68014b3e093bb02b99ef782a26738d877a877743c00c303aded37d3dca317
SHA5120b2de80cbff8310235c15618e1cfbdd1f3d30a7b0a78b1b24aaa5af3e24f66fc54a775dc754fe5779b75357f9835d993b1abb04443f13743b467649c7a715076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be90c8d2438ded58409d73f6f343fb74
SHA15560412700e6c35b32c2582dbed13f2e9cea7f5a
SHA25602bd94b9164b269d8e26b048af684610a11fc1df6b8f303923f0038bfa98dfc2
SHA5124b83f4e76b5556c293ca1e512d3cd951ea7f8419d2f13e54f10bc5696a8f423f1fda8a98f442a16bb243a6d7052fb83fff7e0d53931b842626de868ef8a45f15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59034059e4a6318599ef9e2a0825d5ffb
SHA1b197ecc68808bc5facf34ef9f34b263d38e01758
SHA256c45ad7ff5314df3efd5a22490f6d71a04b5b6af1302ec0d44851eb192893f631
SHA5121241a865945e1f498e586834fde716ec9550ebaafee6f9dbb8ad25396c50293d538918f62d7dfc1a8c3db7105c5f02fc1bfcae665dcba324d8886b8d601cfe15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f62b59b2f659386bf82835d928ae664
SHA144cb2a7ee8797ad4b04677a461d8a368c9ed0487
SHA256f94637ad6b119a02ecc93c67897ecbaedb8f48cd41bc570e1c5e8772dad76b88
SHA51278fdd499de2e98cd62b9c51b835f62113fc7aa5dccb1a35f8a63b14e1ace919949a90e5f7d7aae5a6e1d0323d2cc622ddd4b2ff172813cf82c5fb28b76ecc44a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5999194c941ae47a2eb2e6dea8b0ac38b
SHA1749a6af5152f099d5d4c2a1fb8445f0043af0a40
SHA25671c53fb5b8826471ed2a1faca2a633ea8e861528471f8da332212a04956a56e7
SHA5129fc1a3d0e293d34a020a130a6ef8e76b59e116a25a1029dda3bcc30becf1ad81409f1e7193df758c7016946ad2e035602bb023996c40ff359ea59e43fa904375
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b