Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 17:16
Static task
static1
Behavioral task
behavioral1
Sample
fcc600b120badd1e334a7871a36ab98c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fcc600b120badd1e334a7871a36ab98c_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
fcc600b120badd1e334a7871a36ab98c_JaffaCakes118.html
-
Size
12KB
-
MD5
fcc600b120badd1e334a7871a36ab98c
-
SHA1
4319db4c986599748a4157b50fca0f514fda36c4
-
SHA256
7869090ccdf52db9d7612ce8823a57b302422e91914154b6698dfb9b0aa3a8f7
-
SHA512
693a84d3a8c6bc64f21a3cf6929aa240213882ea06a68d14223af8953d68c55abfc2db5eb8920ca781a06116c20cd998fdb5e5034215f29ae6f7c40a300a0bc3
-
SSDEEP
192:+aQSA3yB/xf9qGPpPatvIXh1pQp7/Z9OLdL53Y:h5J9lpPa9IXzpG7WL/I
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000ffff4131e3b27b976b312ba65143b37d55894e0cd23235662d2a8fb7562fb6c3000000000e8000000002000020000000a7719ac2363c8d9352fee1c4409b8ac9f21acfa4b0e11727171f11f84585ba7190000000055c994418ed7f408d67f424b0512a732c93e081fba899d6d3bf4a26040d051300c0761d86d7ead68477fce967a58899c9744a35bb7e1c7c4f5ad477ba005dad3bd0ab6c1f520128889c61c074fb1e4636d1c9eb549c8ca22151743c33c46e8017ff7da80986df0589cf843d1da4550ca9004ece7328c68a0c2c3dec8cb5f11ee35ccc39e1544f1e622d30aad8085e704000000006e7a02e2889e208dc82ddc4a763d0d096e14fdc207392f40ed70e6899ce09ca5de3ba560e4777008abac815cdcb099269218fd2c90a8d80a9388b8b45b44722 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000bd4944d907640e8a25f41c822fff220c5eb9e250722775666da7aa8ca4080ec3000000000e8000000002000020000000c49a0900f8c6320be03141cb48882c4daaafa5788d6d82cc4340294c5ce160eb20000000db410dddb26b24d6157c872fc7106eb08991fc743f67d8522ab2b0f38e0161ca400000007766864d67f9986b387dbb102912cdae9d874d460d26e1b70de8b533f69b8c3df0b494c2e57e1b24b669ecb1e9b8097b72d110d8b241ea2cd527c9f9f4ca79b8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C50AA41-7DBD-11EF-BEB7-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0fb9032ca11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433705639" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2376 iexplore.exe 2376 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2548 2376 iexplore.exe 30 PID 2376 wrote to memory of 2548 2376 iexplore.exe 30 PID 2376 wrote to memory of 2548 2376 iexplore.exe 30 PID 2376 wrote to memory of 2548 2376 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fcc600b120badd1e334a7871a36ab98c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506f8372e1c0fb103c73a23b9d351c515
SHA115eeec2f872083e6e46facbcb6c1a5db7d38ac5e
SHA256685737920c0e89aeeb91a84b5978f58edeb3d16d38c7d432300497ba0ab0fa52
SHA5129088bb880c1685aa0b38b672c43e4a18c737e4fb1264e37bfff07883493cf9231d770ad62ab3998198dba4801f0af16e2253519bb33b94f4f4b98f6c527080c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c2e47e14196043f82d51a7313d1aa90
SHA1779e261267085a72a282fe6faf691e30cbe9d14a
SHA25638f1ecd7ec597400f2ae81c6f9530d95d70568fc69a22fd023573375f853ab2e
SHA51287b2b1eb6264d20af44d3925aee46d4303e52bf5ae0e5a2a8a86f54918e47e04353fdbd34b01bb78caa412233d7d1219d7465876b00df5ebc743b9cbe8cb21d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3bdb81cde5598f8e8ad768257194861
SHA1fd2bd8f2c0763a6adbadc9f418912fdd7a08e082
SHA2560a53172f62d5f24a3adff0ae96fc339864ec39acfff8aa188346c4ba086078ea
SHA512cf30cc917b83cb32ff81e0f9be14e22757358c2eab40e5a1ce37f84926d430a31923e13b5881d1f3ec90c692c92d1a7b50f1aad121f6949f46922cb11e7ab9d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f7179b3b7a151c63ae1ce1e2efe3270
SHA1d53cd6963a33141e001cae3698b120a212eafc19
SHA2564178ea60081c96e8f40da3dfccfeff5d5a452f874abfe3f04a4ab561178c80fb
SHA512b43213335b1046e9decacbd360b6dc115e1fec53606f69ae29e9b4b04c898da770988bcc5e6823bb1739caef466695c60beb80ea184a4b52580c8399f907ab7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5062e59eaad3e5bd0422d2fd222274000
SHA181127de81d71b9a9ccd170955a5258612a591786
SHA25677650b7403fab167681dbe45415c2c98fcf245d2527014eb1b71b8be091cab98
SHA51201b469bd28fd9e7c806775b13d40030084c470f14e767fa5d32d90ad3be4abc509413357dd749286894f4d7d866378482e9ae1b25f5848eca4e7238fac401341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572f75b4fcdf0056877f03e0cb2aafb7e
SHA1541a948341dc00582ea129c2c35bc7cdee9b33f2
SHA25667b6809f4686da29d623ac91b4b0bf49473ba46825fbc18f0a6a512bf6ad03a9
SHA5124fc5757b341d035ac3f866244f38d74981b14070abc7b1cb8c6d63eeb3f72879e16a76ce4a75dedfcdb71abac39220d10f0591a0abc85ab1bb942c41f71e068d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e354aed7668b9f000baaddd75f159596
SHA1a4d88844a13401e782fba3b227f84e514be25bc0
SHA256307aa754e8172094426a8b3e92f7d785cc61c23e72b8602096619653f4da79c1
SHA512d805c461498c5b96c28990f32921a4878e2a80993c67ed3f10fcdad70e41e95059fdba1775805ba97096f22624a9e6a85613b72349ca66c443d5f2dc248eaed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504856e9fb4eea02200a35374bd211480
SHA1f5bed30d332482bc7fc34b25742904a84ce5de5a
SHA256ac7a1ddfae61a5251b5a0840b8524a8a7018e9d0626381a48130a789160cca2f
SHA512ae96a4dd9c485eb8945e747623e11fd5fd8f15054ffe78850535b8bd6b2e2f50470c5f5a7e4f87edca3468a6180046874816684eacaaae36dee0e2f07b1c048d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537dab08805f19a9bcc4b8f7c619dd706
SHA160aed15d49f7754d693f37cf33f879c7909c3a5c
SHA256207457d7d61fd4d04637d1e789eb690886c6b4d043293e6a8479e7ceee5f207c
SHA5121d1e0c4d2a5fd10469672b425b2cb7f67e637d47576eaed5da030cd702939249d3882e64d5c02611ee70030390f9cc7be1d33fa3ba93adc0cbfcc036da3c7782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed4682e8781cfc26bea4f5fa57cc6c50
SHA1fbf745a50e33295dba1e7ffae5d6df89490cd2df
SHA256e657e51844ff2dc88b1bd1946ba75defb57aaca668273406744926bc2ca56a63
SHA512c2daafa8b1e88c48e114eb060cba7cc02157b2d71a9d790b7fbf6b0b47162e73735b9a22064e0be765ef469bd65aa904dee66ded923060b9598706053d4ac401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510f7cdb996986bd432661dd8eedc0b43
SHA1dede401a1765d1ee41c8c69d3f6299972d4fabbb
SHA25629daf3db05cb19b2af01297233fca45f820fd9e8bc84a1f5c8f151fdd4b7cdab
SHA512a6cf80738b3ffdd86462261703940bdd12c309528b0e8982a4d9be88fc38d81713f50379a2653d17e3305e5709d64410105ecce34e99958fc7da0b2ff6fb989f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec984eacb6c9f9e32573856c347b45e4
SHA1eb6855d587343c69ca7948fbc8d0e6719d80ad3a
SHA2564dfd190d2ffcb60d2dac1b9a8822691db49d84be2a9ee3b2c0829c1c0044e085
SHA5125381a18d031c7a689b0166286c820faa83cf385ae8150b31bab71a5c553809f9d9778f2ebcd4c224eb7197f1bc9b2c55fbfe80cec688752a1268b134fb4cecd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c275412b17cff232c40b92114ae4cba1
SHA1e616b5e1d3ce1bfe311a3982318bce78f16119aa
SHA2569ab4aedbdf7041264a5f3687c8517ce48864f9910a216a44811bf3f68dd0f109
SHA512711750a393f37e79105bb9de8d9b8006d3713bbc7959dc8907dc0994b709463107296051359aac1eb6904b096488e012817d132a13dca988d9bf700c98cd26f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a14cf215a4ab8a6c5371c0989931997
SHA17ffabda714942c0f71c951107f0a48d58469cbbf
SHA2568d55b52f2fd8516c4382b0f823fac830830017b01407a22ded12d99658509a1d
SHA5121915a443b83d3e92eaaab3484b345564dc9aca4fdcb3c788ea6ab610822f3220fb2ce7384fcaa42029f5f92a83f8c8865299165c64a3f98afd8a68c3c5491208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549748cb07c0baa0b8423c160f8e0bef1
SHA1b9c755c0c56a7b8a61090d1bf3044566865cfa6d
SHA2566a9e338d7b4af7ee78139fcef1bdbb26a96a9b87eae8dd7dc2ecc7c26b7e1628
SHA512ebcd4d025e15129b4ec8f8ec3ccb8d1f92ca0aef066d180211e6896ee3bcea161b43290b27f13eb9b3b48c92edff8e8a535a3f4068d815c7d019160e5fd140ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0562edeeeaf7008c42356aa9f12e843
SHA1779f2dfe50b652b8e440aa46b17360d6b7c8476d
SHA2563e0ad3544d924a6f6e7c4040fb91cad37981b33fb6f30488112b8825970f91e2
SHA5122e47ee9e951c007ec85317fcd64ba42e9491f0e75642c124ce9622ca2c669c30f573cd2f072a5b3272bc579f6acab9b89c3621af563fdd57cdf4fc4fc0e3aee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b0c5954fd25864011b1d90f67bde5a4
SHA1d9fef175bea66e4dcc006a533cf4ca3fe96a9fd2
SHA256883f073345414c40e9130d2be48f65e90971a54ad31d3804507ec2ae4c646267
SHA512909338ac879329e62085330a86875a69f93e335c9251d1a6dbe5dc501ad2bcac5aef42cb85c36f9b7adabd7286f747eed54d9d83e219681a0fa8c3dbf8856b9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa709d0a2fdbf300606b42e3dad64c7
SHA1555ed5e332b4d0bd7c51b702a1b3f45150bcd214
SHA25659641ccacffca3d49f8de359c0df213fbe2412e38818a8224b70f99a743e4a73
SHA5125d678ea1a4f7a9989043822fca53207f37548bb312ee91146a3cb0a0a519e6b0b87b7477f22543fa5b6bd38ad55b67a451fe59369781147cc3a3aa2cd5d8a9b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ed57ab0522bdda0a43c69b3369540e6
SHA11136fa7d255568e3d3ed8910e8dd863856861f7b
SHA256c1cdfc748d5a3f8f19a730dd7e4fc98b299ed62b0ae8a3127f36bc96dfbc7da2
SHA5127f50845b10c29069366d5b0aae3d43e9bce884eb8ec42b074c6d4f981980b1e9490fac02de9533bca00dbfca9d0995db93e9b2f736b010cc02ea9ab527487fd6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b