Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
fe142e7c05ec43727e32bad7e96f888a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe142e7c05ec43727e32bad7e96f888a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe142e7c05ec43727e32bad7e96f888a_JaffaCakes118.html
-
Size
24KB
-
MD5
fe142e7c05ec43727e32bad7e96f888a
-
SHA1
a3d6e67775e7142bfa8f7dab97d68eec9b961e6d
-
SHA256
8ef5d677e6092a83e4e4d48a0b8d833b7692149fb65160bbd879ed2bce3a657b
-
SHA512
385d3b19c78ac473fb75d4097f9cd5813a4f3ad3b04d4d936f77f20c9c07d108ea8f298a7c374810aebb18b90ff3981fb91289df88e075159b1daaab0cc20aac
-
SSDEEP
384:zL8RDVY62yYIfz3qvZExG3LpoE4fYgQGIB+O80+umQ8wK18/jL680h3DZVlp5OFA:zL8RYImB6AojZwqM8x
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF72D221-7E36-11EF-85C5-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07585c84312db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000005c8a2942a1d3864b60b97b96fdde0f2685aa484153e6b091fa246796a37dd9da000000000e8000000002000020000000e5b1ca215ac17a020033f84f85554b35f088a750072ea6f64399c58053cbb7b120000000a80bd1b7bf0734e5ae4b2ad069140a88e73317d5c328256f81c2b0330835115b4000000027f448fcb2b7a0c7b8f04035201ef98812caaa6cc80136b16602dd6fc02b88a111a4cf9aee63a2850e887b3c7cd7d151a302cdb578e2fde813a75b762abc8204 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000003f811f3afe480417314067b387f51edf1574327ae1aa9f5e2086fd9c96bd2ec2000000000e80000000020000200000002691e455a34f217ba9106afb98823c88aa7508a523b37dde430e882208dab4bf9000000065a7081411b3003549cc763b18854462725f4fc3fa23aa23119094b1cca0538309cbbf8de6c2b89d8e003398da1689e4153373852451cbb529f911ec2c5477afec029327317d6052b7a059a5f6dc023cec16e00a75fccc6199b3ff6b4aaf683cf3e99c40941475a658e1c1c245540186ce4249cda61d8a73adc74626b96ab36d7eff2a9b8468588048bd9d13867d5f3740000000bb44e56a6d8b93bc93e89f78702405ae5a4842b1ceeb5dfa908e077c7857bc28a74b50d8fd0df2b105f8bf6b3df21d89c78c9230c696acf4439fb522a316f813 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433757856" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2352 2532 iexplore.exe 31 PID 2532 wrote to memory of 2352 2532 iexplore.exe 31 PID 2532 wrote to memory of 2352 2532 iexplore.exe 31 PID 2532 wrote to memory of 2352 2532 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe142e7c05ec43727e32bad7e96f888a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555dcbc44826efc5cec98ece95f2c5e3b
SHA1d73c6ed868da875f579a11b7b87946f6daae4066
SHA256ceee3e9a52140090292a153f00782cc601e85974dab33949f94addd71647ae23
SHA51242d985307ad23de51a4a4c088527c302e6673a1568b83f2e1d28d2be01b618b617f1c0d5e11860198febd24f54564ea3e0d9a47f476830fecbab174a33bfc559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50488c6eb21072a9ac01eaa878d458ecf
SHA1c7341a62c7e56b92869f1aef3fca4934abd6b527
SHA25603b740a40a292e31d0b348caa3cac8ed2a5737721ff1d56d5429f6b927b56886
SHA5124ca8c22fc7d3503be073977556c2c46eff2d869d23d733362f4407314592f984efd1b077ea20bdf160437565d2e98ace80f133d5198fcfc0e540c5ad073749ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50abf4dae35ca401289709d4475ac750b
SHA107afcf587a70bf48cbdee4c88a274a37ea3ddc52
SHA2561c9aaf733a6a40a8d031c5b620761e05f59287cdf464d009605c703ad58fef23
SHA5121865bd799102a6063d5a2192cc38c141d77c8434ed0856e4cde1177434664643f1a5102fca8ca6df2e126711f1a9558f8be9e1813bc5c22542e328da283b6946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e66039ae2bd8d94875dac8975340efca
SHA15806e8b033a490672222a7eff4763b9d9e150736
SHA25616613365fdd765618106b77c4fcdcd01d2340e4c522b52276e905486e546bee1
SHA512df1ef1c8d0c0e069eb90ec99d38244b21c2abb0a0f664dfc960cdbfbc5d908cca3259d799239f98612cfe0267b93cc16ddcbc19858ab50ba68fae2aa777cfa60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eae531730bbff64ba92cafa84d67d0cc
SHA1ec01ecc6556ae607eb5ce7c1d401fb74cfa67c76
SHA256f0d378e949e7b1bc078eff5638049a27544559d58e1294a69935dff1ed37fea7
SHA5120b9394534e3acf563d983eeb82db0897da462e11141afd89ad045b2bdc1727fb7e60ea83aa59f0a68957756fc1d21d9700669c17502a9acd1c615d68150d0066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc9eafc781a654ba808c2c35e6947c60
SHA1811eeb285f1d455804b17f90ef9c044f77a9eaf8
SHA256ad2cef8b090cb48ace4017b0d8ff050b70c083d8d6978ec4949a7be2e3d426d5
SHA512fef3fce227b026641393357559d5ba14c2654bda92a5b2083f1b1871e8f4255d1a5c265d6f32068aed709a6c9737e752114a0a217e18405b23997f318587482f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac9e79e0e19c3c1a6bc4b4aabf3490ee
SHA1e2fb78d175a24edb4b914cf5262a08da9c6e9f89
SHA2563742c8a3ec6c512d276a9c2c4f7e392976a9c1803c92f9b8bab35fbb5a5475f8
SHA51226955ee81e7e96dc0391b8a2a2a25f1f3a652e6dd32449114c0e3ad69e2a73d9b798f93517fcedd9d32ae414bea6e398873cc2e855c66e140b8c1b77a4c25f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545fae1adfdf0ec7d6e84af1fb0f51173
SHA1666082ae954991c55d1d8ba7757abbc23c73d820
SHA2562755d1848d76749f347ef487b360108a23fc682a6878180946947048c76dd406
SHA51241af06ae8c353582a1437932176baecd2ab7f379c7f51227009afdc3203e3bae6961d45b21c71ddff5c49b373e1eb73734be28a923c65897f3db65b4e0a88999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f0073da7508e47d476a8b1bc29303b2
SHA1958bb4c304e0158c0f29ae6d1dd38a759d3c8d62
SHA256b8ee4fb9af866a559f359f6d5a9bfaf73385678d01a6594503161556245e9b6f
SHA51262d917d6b2102b63b00f1ad268a3ca630b0b69c87234bee638a3f71b5de0c2e4ce08488a0388b5c3ae72b429ce3efe104331c50be421dbd57d90f7b32f89f2a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c2c2a3b265de47d46e74780bb11e3e
SHA1689042f35d8074a57a52c1d049ec7ce5b834bb3a
SHA256f60278f2d1f48eea5665e5e6665010baeccb7f4344536e348bfa070d5a239f12
SHA51245187b0f399c179cbeacef09fee9051a60df75be4582dd1296a2a43b23dd0c263bf6dabf1e79334aa952f8b9e899efc8bb2e891688799b7ebbf1f6580139827a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e426014b8a50627dde6fde250b363436
SHA1da2b9e470653343050a6f6d67892697b72ee4f7d
SHA256fcf2b918ea4db65294cb0d65ecf5bb3d37d1ac9b979069f1733e9333e491a800
SHA512b1a575b9b4a688976c398634709b99e30e8985437934b1f9ea787cdeba044d96fb2de0c8d75f5b696c7d5362ebbac8871304ae66620bb83679fd0b19865d18be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e6f7f613dbdc9266145ad00d0e46058
SHA1e4ed5ef7a2bb6644bc07faa7fba4131ebcd64fb0
SHA25646d429e3a2deefbe5b9e745958c42195d71e04c99a4e7832c42d68313c2395e5
SHA51289d55dee9f3286c0cf425f57ba035d9d14139f045266b294a5345c54cb9047a13ed823f4a6faa560346993071db1971916d92435c538816236049562e1234c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577dad63b0b8f0966c81c2a40023a7a9c
SHA18c887c599eb2a88c6f9d2f5d0333158b3a1d8d8b
SHA256e58945750aa2d487c4fd3c24f8a542b4f9d3650dc78edfa549d7fbbe9186f5fc
SHA512fbf15598ed1c6c22b366c5e866cca0b2141055a76a661f532e69280fb0f8a4312b77fca20607412d82911861efdd2eee9dc8b610403aa7a587a17138319a6ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51909dd8bcb366c801c77ab7eb4baf5bc
SHA168709127b44c23c1f5c3fbda55de21ee01c1df9c
SHA2560428a07cf6613b7f1f8ef3115562f5290eb251f4325116e7471e5432f6d44568
SHA512240840d18d22fe112f5a7762daf4e89b4933f956079cc88009016741491344322b6d5ec68b05b32315946300162dec53fe36f2319da5e9e8ae011bba67807ce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c56ccedc824c269b7d84abe684078926
SHA1a7f2ed7028dd8055c00c354c6cd0562c96bc95a9
SHA25636c0010cdd80e6b07eb290f81eac45699540eefdf54ee10b4a879cd2d014cde1
SHA51222e8d0448ed4727275eaa071b56e45cd794abb571425a7c6b32fb5feb4970efffb6a379556c1e567ea60a823858860d475135c50e1c62665d1b3bd85b8b0f5af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e243617fcd08b58d34be0e268dc5ded
SHA1d6de68408188aadc60fa4f59f686c72ff2b93c30
SHA256e9bd9fdbbf712665ed394e652d5e38d906c1f37a1f1814b79f63d21e90b31a62
SHA512ce6c6c23e41f9c76b3a7ca47ba0db83bfb564623a449d7a8ed9314c66e5e7ece8a20e53821663ce7a93a526c416e6686534de7366e35882d805adbb9c361833b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5495eadbd00cd2236eff9ffb624b75a82
SHA147d997db5da521f157ed8d81e6c023947e3d284d
SHA25624d7b67093e6d3f2c661d12e09847553cbf4d9763d2a361252e4e54f7b0edb0a
SHA512b9d426925a9092546be8dd86b99791f60623e589e46d8c7e1e4967ac1337dd78ebe8e52cf2a0004b59753f970495ecb78b94a03a4e9fe4afda74256aa29a540a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5042ca944882098a99372c8bbed369097
SHA1c5f580a40810642ddeb0c3a4fad23bb0123859ab
SHA256321ad36c6bd66cc3dfc6e7f4b0f337d6059861a8a647add01818098d76ae30fa
SHA51265861be975c7a1c4797179ffdba0c1cd455492f6a440bdb9fb13b0351f7aefa3f84a3a34e86aa25c5b65e667f62b5b2bc7d9a35d77c5ff3c7cd505c60d42c2e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582e01a47393cc76e001f5dcdbdb1c00b
SHA1cbd56520928e75ddf63d1ad7d85d4543240c56b9
SHA256c912cbc4448c50eb4e7950e4e25da6afeb537882f844636444e808a02f364f05
SHA51203a28c5b77476ece9fa2cbd79a375ff7d7361400cc2b682d7604cac3f569992d546228ef7703a6578d0224c37ad1427f9357c15bfe820577de71252fa4c23c8e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b