Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
390eb66061978c56eae9765d14513280_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
390eb66061978c56eae9765d14513280_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
390eb66061978c56eae9765d14513280_JaffaCakes118.html
-
Size
49KB
-
MD5
390eb66061978c56eae9765d14513280
-
SHA1
9c91c6167159b93188f3454963e5c3a0a333aad1
-
SHA256
0d679d95989e8e1147dc975e8af5942ca81a58ba703225e57bad6be8d19c62f4
-
SHA512
c32539cc072db04c6101f6fa4f23847f36d3029ba5ddb1c1d2be6b8025d1f535c762499090324a1f2e212209ab0cae78a3c65a7dc06f46b04ebd9da2eba4eede
-
SSDEEP
1536:Dux6TWQI9x+hwqePIpOz7KmVeOEOvAfavSLSy:E6TW2OvAfavg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D7ECB891-886E-11EF-8B1E-52DE62627832} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b13190000000002000000000010660000000100002000000077bed2a9d1ea46ac80b168934e21b7fa9cae0d46ec7bc57df5176c7ccc718de0000000000e8000000002000020000000a7b8fb346807edcc05857c3e8f494d2b8afa469885e5f6b61fed56356f92cad620000000820b1899a40d1cde2d3d5f4b069e0a85350957b634fce6b16a7ccecf045c6cd440000000551aa6cfeed045fea45d378338f3d6f2882f65225156d2270583416c480e43f33950d26a9110a27ea3215b5c49c2569da6b848c1bad7dcca6bba4085cfacdd3e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434881381" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705e85af7b1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2800 2888 iexplore.exe 30 PID 2888 wrote to memory of 2800 2888 iexplore.exe 30 PID 2888 wrote to memory of 2800 2888 iexplore.exe 30 PID 2888 wrote to memory of 2800 2888 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\390eb66061978c56eae9765d14513280_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57be34357055f47819ad3e1e4a5012864
SHA155e3caca26c39672e5415c4fef38aec4c6715d25
SHA2563c0b9bb0bb74b4cb300a40a7e1a05a22444d52e3fa18981f39a1d18288eacd1c
SHA51275f0ec87d885a0d41f25cbc8a490f2d7bc4867ecdd909adcd80191fa1c47135ce83eee1a4ac40b081947c25dd4bf6d8f8ca42c1713a7743c9390b57a0b9e6bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5908af14b628c5c39882961117393d9b9
SHA1a27ae9718128d670a0dd5769ad8ef5682a706752
SHA256f64a59f84f88ea3d7e201308676995783b18fc11af67288e8e202b7419542e6c
SHA512bcf405600440736e3eba614b1eb1ab8cce73c10206d9e9319af03754fbed1acc5a4d198e480e19a36661ec42ac98478a234eb1efbfd863f7a49569d0aeb74ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587abf009a71e7e70f0a741eb04b4dd83
SHA1e00981a6a96a501c364c01cd922d643770a98447
SHA2568e4db82e55e85b76e74dff4d55fdc1eb0b4eac44035b82bba51705d56680c866
SHA5126eac2ae89de5ac65948bd9b438fad76113f6e113ac130c4a97c116fbef40a0d4b2af2e76328844deec5d5078409c954144ad7c6080975b46cfc504c520f26fad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb46d15cadca05be0633724df5cc6d50
SHA1720ff03c528fefa923e64e598d52ab60c70e5c5d
SHA2564f6bdd658552e2a296191122e9f1c9b2894d9d5434495e315d9c27e03c4fc7ce
SHA51233b839f685ac373521b26a6f484a072846a0f01978dcfd9759a94d96a8ae7d7fbc7eaa44906975dea9ea4dd5d8782114f408e5e630c0d2374bdc5efd5cd7658f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515b3701bfd3a798de013d93bb2db6197
SHA17be1e5e41d230a61e7095db55b7571ef547d6ad2
SHA2566da2a2c0028da20159c415bae93b5b97327f79ec16ca674d5aa6ec21ad2dff46
SHA5122abe85044a14a40d4abc015472f1c6ede00ae5b1b88c4afc5507566bef54bb6ae6ca593da9aec24d823ba682ac2f5d09496dac910ec81fcdf33e2ca943e58871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8f693dd72267c89e21dbeb5e942457f
SHA12c6726880e2f11bd6f432c08b90968c884c92205
SHA256cb5717be6fac1c456d6c095b4f11a3ea489a7f3e4d12164fdcb3886747112ba2
SHA51206c820ceb926eda94213a5a302bac858142d910aa36db2ce6912188ea88f745aa277658a7d992234dd23ab67d2d81655f792af8d34bcca6802503884d3d2a971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582b17dc481328152e8721bf3104aa83a
SHA1f524d2b7e1c197df4d88a72746d1551931dcc4ea
SHA256348efc2860a6cbbace1f476fa0c700d301fa55fb19b44c43c2d94c3bb8223777
SHA5122a6e5df274afe5b9d987c8d863f60f9f32b4d8adfa6a81c2135bc4e19b31a49f0d4f91fba5e65cff05a9e59d82e8a1790bdb0d2ca31cf381a1068c53a75c0de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eb69cf3ccd0d0ebefe524fbaa321000
SHA158a7fd071bf598951fa9be2aac5cb9b95c43e4f3
SHA2561f9416534457a4f4ebd8ea4158902ea80b33c9595918a9b2649867d0de2311d1
SHA512e765e13d7f1ca4c468758721986d5f26eb3263a7a89fb849de6f34ce6cd992e9b84e4c61623980ee432913875b6b1fa00cbb6bddf48bbbf508d698560ed2d6c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea27bb51f186a98cd328e17429fb2ca7
SHA17786dc8ab7a578b3d187f8eaef26f0e11248ec0c
SHA256a95e2cea958254e6fd0043dfc2708df015c8327be93d3cf727e9982fc16215b0
SHA512ee2b5b17b0043fd0f440079b2f855d02bafb33be3c64a324b2906923bffb9ded31a17f2f158d0597c67679bb04a62f2349db9c0f0d549375381a489394e43fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5951a4584041c68ef5250b673aabe42f4
SHA14f4df3c24534a78dcea1fc0e889090eacfe6c2f4
SHA256d3badfdc3809c7b50342c2ae5bb452e664cdaf7a003099a677a54f9771007f8c
SHA512d4f8c8e0538bcbca9e77a4541da512114c58617baf437e24b93eca12cd22eb91f7121e2d0ace3596f8a8480295c461f1a392b91c4fc5e0bf54a97b555694df00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc34a1957c397274ddea9b4bfdc55665
SHA1c282b317a6d543b8f1a251931697daaf7fd520a0
SHA2564681a77273ebd467d5cdfcc252105baaefb06d58ab220bc2af4f696feec04dc2
SHA5121fd860309534531a224be263d7b1118e11b7c119a17da286e404b28786c97512f3cfa4ec5cdf4f9ba02dfecc11e4bfe6d0e9610b204386f79453923f50066b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ee4008d1e3f696c6568b53a4c7da8fd
SHA1c1f2a05296ed1fafe1817f66a54b0ba41d62ade2
SHA2560eef5cb02d86db814a1b9248b1078b01b3ad326ee45350308afd1905eb186a26
SHA51232b79d6fe027490ce2658dcba321c8ca42d4aca6a20f87a5a9ccc3882634c0701e210d3d7b4abac79993839ce1fad1d9dc6a637f29b7fe7f3467d53a5c523a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ce837410fbbd96ef1095f327c97babf
SHA1110592965edfe95858c7c639207724d60649441f
SHA25629f2d17a39762a2bc92f4af007c60d114c07c003bb56c7bd81bb758c07e76e80
SHA512cd04d843086fa390e7cbb0839a8ae9d7e57fa5ad17dec49892496965065b456cf45da35258b15fd706b1418c046041940d6c142d2158cf55f3ba01c5b3121af6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591cf412e6a9fd5c4a875fa4db5406824
SHA1f75cfcb91661990769e4be359139accdac231407
SHA256aa33a53386786c57eeea372edd4a73058b3d8809bbfa66c86aad816bd350a834
SHA512db98af8a5bd2376f212d477ce5128e542ca51db7079f273e17ca140f984769c493b06532b99d4977bb79cb34f34dff03037b3e07e9af40157da8db8a9063e9d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50159b222a27c2072bc761f439f8ea7e3
SHA133823d64e4c013d3205227fe0fd904810744e14b
SHA256eef7fdb8a9fd0c9c55504688c358e6a6916ecfbc25ad155eb0d50f6fc23739c9
SHA512917edb213471c50b32f76be5ec3bfb85178345d8fb16a4191bc6f90a6b67efcaa3010f4d8ccaee507c80f9a1d584e91e8735ee4745399812c727a38e3ffbdd1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555644f66f6182a182b8cbcd545069e81
SHA1f3b8a294892400928bd79142ba0e0345af486453
SHA2560d06ddd50eeed749eb17c9aef01b4eb3f2a617102be30ad86528ac337c41eda5
SHA5127c331d2af47d07b8ddc3eae808fd301a60c7041fbe8596962d5c97519c1b5f5deab5d7fd6675fa1d78e31b7f7f916d227910c9076fa9777f92f1d77d82a44bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9a29aa0be73a3215d74b1b89ff97fb7
SHA1fe9c33680c31727eba7c743da4c8acf8f7da6bf4
SHA2561699ad2e388028a8b6251fc7d5939c62269349dfbf1e9ddfe41e5b8d2d2fe455
SHA512a33f12b8aa6362ea5db175b2c7acbe06be740213b8b5fd07b34f789c94e6cce79038aa35feafdd69d57d241ff4fcd743c886c19dfcc8d3e7711ba5061f86dd98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec0058fb91df75110e807b53ea94b97e
SHA1c67714b02ea5a93954982b2da50561b38f6e0481
SHA2565c1976ae3b43188b92eba15a0f98cf90016ffad887c82560079ba449d653bbeb
SHA5127fc9e976d45b98149f49e174f10993bd71c602e6774eb8c6dc19449324742c7051fe89d1f1048c021a2f0903b0ed6b55b24336dc0c4a31a9f22e4b023952d937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c02322daaaac84be7ada4fbf11feefd
SHA1a18616546f78df3e3929936afccc058b6dc6ddd1
SHA256988cc6ea252618b693dc0c199910321d8292b53191e72333ac945c6c89b65a01
SHA512bc527723b5d3a8ca0a4bc5127cdd54cb68a1052dcb4b8931deb932eb4b5865864364a3dd3124914b0f7e6e447c4ba8d224ec35b01741a518aff6e2370b689f8c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b