Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 06:40
Static task
static1
Behavioral task
behavioral1
Sample
464fa4f577f7c490dc0f3888ff922316_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
464fa4f577f7c490dc0f3888ff922316_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
464fa4f577f7c490dc0f3888ff922316_JaffaCakes118.html
-
Size
6KB
-
MD5
464fa4f577f7c490dc0f3888ff922316
-
SHA1
f42d6cf5a966e91d8da4f09ea7e738b59b533407
-
SHA256
9b9dfadef01512d6fa8686951be83573ca670889bf6548544603426e50c148c7
-
SHA512
79511b06dc8400c8cca97eecfc655f315677cf1302269ded72e3f98c4daf2f63cb1fb141d995c2fb0b8b79b83c01631f1677f30c22fa4195050a430fcba24580
-
SSDEEP
192:HVfzZ3crt3L98AI9GGZ3odlo53XIN7fruIllyll2M:HRz6OAI9GGpodlo53XIN7fqIllyll2M
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30c53b47cd1edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000872e7f83d58b3041948959d14f515b88000000000200000000001066000000010000200000009c302d5233ee9b02051d2d338ac69ca4c3a65c4174ab12caa835cec69f9a0600000000000e80000000020000200000000027e5a57a26a0c455f8dab7c8e0933ff5b9db867750172a3eb9910fc4044ff79000000006f6faedd3a4240085cb7947e7478b70be0016bf9b265d9020fc3dbe52ee2687345f4960e1ee871abeb68fcb2c56ed0e594363c9fdb3cd384d6729ab5064cf797226ca5ab72a3d6dcd0039d885433238b3d3c71f3c8372680717be22233e77fa7566345e29306f34b4805d17ba3ce98e96b3a30aeda976897abef13f255993a8f0bc41842a3818c905711ea4e8e05ebc400000004155cc65097de2be2cc201995233c903f668ecf9b8fd84cc576cb0fe931f7582a34635dc10955f608bb7f628631c9a36da062ec87e002cd4a841e3e80b6bcf49 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59910971-8AC0-11EF-9FF1-E28DDE128E91} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435136289" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000872e7f83d58b3041948959d14f515b8800000000020000000000106600000001000020000000927ace824b77166e22d7da3af0080d0eb33ab7d81ecab11e028bac4177756838000000000e8000000002000020000000b01a9e226ad0f1339d421eb8542ddbe80cf775da94e926d3ceb01b75f004bff32000000045a02d27cf199e79693701b9581f571f70b995d72b9205cae5220fb82b15738440000000ab6e3a3d6b2bf64f875c770b2aa2871c9b9775c62624c33c4180ffde55719c724e309920d7172a53c9bca586edeb4a68b2d6604ffebe7389558444974bbe181d iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1504 iexplore.exe 1504 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2360 1504 iexplore.exe 30 PID 1504 wrote to memory of 2360 1504 iexplore.exe 30 PID 1504 wrote to memory of 2360 1504 iexplore.exe 30 PID 1504 wrote to memory of 2360 1504 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\464fa4f577f7c490dc0f3888ff922316_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7ff0438942ceafed3e8608fc61e09bb
SHA176dd78ac3dc3fc0528644cb376ef71e59d693c68
SHA256b28661465be5d69d72337dc0978c07b22360591dfbd0f7cf9a2a1ae9709cb4a2
SHA51282ac1bbec821cad4d9df3a6553f3327c1cf088368de5bfad0e10134058e297581bfc3039784e96f74f991aaabb12bd33ce9e397595f55c8bb80c0da905df35f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0c88b740145651e2176ecb5e7e723ed
SHA10d2d86b484c5207346d49cb155125a5fee5746d5
SHA256918ea9e4e4b20b095d3432ae2be1eeff5723af0e1eb450806a05bf8c4cd45040
SHA51264b4203a7f4ad5ae2e4506313702fe0cec1ebb01e1f7a9f1eeed0030b103b926f7b99a6b238e46970c3a964453cd828da876426c788c16e19dd6476a8949f8f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521a24a3aa52ee5e871a0d8a9145c9a0f
SHA1d89c3b19e2c5b48b1f192848dc28c5c64fdbf321
SHA256c2736d778f50472772ba5a3b1a2838cf531482f10137e665f39f89b22ec7cb6d
SHA512cf9234beacf72c6d21ce53b2ab2b6f00c28179e237c191385a1cb19fd665c7c5aa4af095cc5cacb563006e8a254482cbcedca10f7ca572babd3fe2c73d4fc03f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdce5b061ee15a529d0fb143e314c468
SHA17458c41002b687ac8deb6c907d2ee7676761930f
SHA2561e6ed562b266aed81ae13d79ac950d7470ddf02875d61faf6994744f608d313f
SHA5125bcc7756b80761524580d332ed1b592cc5c01362d3e21bafdba44f505a6cc6abc303b40a5136354bcbaaa01cb5ad5002ed9fde75a2772d823323d36354ba3186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fb850f3127ab42249bd3aa0b553facd
SHA12c07bf63ae2b458e3b21c3052677f0274de6d783
SHA256d07f4b26e0207d43c290e2969af4d123e2dd794b8722109c13e64654b7579a70
SHA51218e9b5c82a4c055b2c8900854c88cbbce840091516a30fec7d8cd732bf63c24e739dc5f4328b51902ff85290b154adfadceb660f4ee8a64841fd86ac67e91a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f8140c6abc4277188eaa290f258ed9b
SHA1181574d3960a90599604a808faec9c1dc54b9a02
SHA256b649a93896eeca24682a06012fe98c25eff4ec48de1a65daf9581f9b2005b5a0
SHA512ab33830bdb2641d407df31feaa0dbeed1e57878fa418f26ee51d8084738dd481108a0c9482ea83bb3cee6ccfef980aee05398c9e4863c4fff58a9fb8b005152f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe854892b1ab830210ee35ae7411884c
SHA172e81c466299954157b3666360341d5e2cb7414a
SHA2563e0a67bbd593992a27cf637f618642cc6762f26beb6377fb59d76ce0a6e1a05f
SHA51207458dc94bcddb91ff62871a230664156936b7a1f16a350f2a5c881e9bd2a1c551bc2790640f25312faff92286f5fae13e8be990dca103cd0a3f45f63d347150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee0634929e9733e686be9c9d5b11574
SHA19e847b116869be8857cf4cdbd9a5e40eafd05305
SHA2569d908cb90946fad2ea4e2fc1e3575a11ae7daa71c365caea81ba60bb650f8d19
SHA5122275bbe66b2948c64d47522f49aa420303a32348265638eff5512e5017b1aca7ae64af98b5719e1c4e81f99445dc4b6730de793af5c8b642a485d8307a8b74f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e1a5a409e07d5980f07ef6b5eedaa21
SHA14395d1d105b3a09fa6dbc8a9ebbc7dedf9666ea7
SHA2563ab81df86fffa3cb593e990a65866a873469e950feca2045f216387438736dea
SHA512c9f14524c6e7fe480186d2733a02ec38fb8203c3e134f1ea6013b9fd18499f5d5f73723fb930f2ae931d76909df9e83e993d7d300c5ad8c2a8cc3412fd408715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56611a513720b707844b50d1c009741fb
SHA1b1017b30264fecff928922ed0051100cf4b54669
SHA2561ff019676557bb652aab6b8ef734dded24498b8953ccc53d246e8b477072dbb9
SHA512211f10f61f593c58d2bd4a74c6f117095c7edc8ab4fcebef9f169cd7039bc0f178f88d1535ea7c085c3b109ac132ab7c774708952334675893bfd5a76c8b0923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5177997ab296e0fbddfabc7c1c36a5acb
SHA1e123e93072ff27b8fd2739f8ee3104eed0850e07
SHA256ee9afeda77aaa57fde518d0d809cd2a6033ebbfe7e473bcc8b50755547da13a3
SHA512c85a71ed0ba7a2edd2b569fe370d8a9d0702ffd8c30584ebc6fcf77e92e7e5bf6c241bce4bfd590632a0d182baae13ae3142c9adccf9044615034cf3e0816ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5446684e27e346e2524fa024b071e6ec1
SHA19da6e58f994b7855aded5328d70ccf750d6d6445
SHA256fe52c3511958144142746aa269910b1479c2a047d3b7eef193ddb151fd5f5b09
SHA512e7c2d756524cc112f8d33d24b0bfe6965412b463375cd678172727596cef282c6730f5cc82a89e63ce2615b1ebf2f8b67ee321393097de703e24d18244040951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a05a715a4f8f61854eafe030ca532a06
SHA1b4cf742a425f5216fc9063e58c8b6e0b3f8d46b8
SHA256e7d0a0d3a214e7604629e79b20bb4a3668bff8875c0cb468055b5d1e011a882f
SHA5129a5ea290d76bdb59cf251cdf8d0150cd198ee699167a78afdea5deca0a67456eb23a86908a801bd966e84d557cbbc1f995e75ab39beea8c87a53e2195b7da88e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f23c09daf81fcb1bc31212675f48f349
SHA1ae0136db9054bad9d1856f1a6879727a8f99d35a
SHA2566e6cad1d1f620ea789d5bcc51629b65b54aa8bcc86aa41ba3fabbe854e6020af
SHA512ddacc696a409fca3f113fe63ea5040ecfe2cf2661fdc81dd45aec2966240ef8acd2ee535532d0e47582fc3a1dd0f1beb757c305c4706d69ab469f2fcd0fc64ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc4e21fa5cc43428b823977b4261bf3
SHA184e1d8f7824eeb1a85829fc5dcf4dc9093d3986b
SHA2569a5990970f9487a0f13467f8634fdfe592b7b6c62c7201af7cb19dd9effbd3b2
SHA512b9d8e3f64baae1eacd8407f2bb255df86ecb090ff596233ebebfdecbab9ffaa4f4a8982595cf94c72bf5ba255d1e32ee6b798d680223c687a64cac9d8a48148e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6947db32b9889bf720916f5486d5557
SHA1d1b87340bf485ed22a62561ce34f77795b02864c
SHA256304624218fde1be70e781d4d3b959641d636643ae588a866e1352cd65c85117a
SHA512e8c2f5efe440345f6a1ed8ac6edcb26d83e83acd5f07c4dec2287774e0cf5bd50e515e577ae46444ee8bc8563abdc0b578c3f1d50ee8b48a8cf5a27354712961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce016ff49cab12be4d4e6bb7f517e655
SHA168afbb67e429a9b365d39745a0c978b284c099bd
SHA256ee74a20452c94d5df8547ba114d653e0095e5d64870c854c29aa578852b71b9c
SHA512679bc6969e1ba3a78d7969db33dcc8b6ad56be40b61a04a4462c60645bcf2e22c11ccb11a5d8a75571e16c9709f7960c587ee337890b92261647a1c3cf570574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aa6809592df69604572d37fed741883
SHA16424efae88129621f95d561482fbf01fc530ed36
SHA256a4f9c31ee6c622a1d37a43d4a139636fe865c66797d9c2c928fea2a4ec425829
SHA5123d78b80ddc66e4b6b8b7c9f06ecf788e04e7f920257f846c1172d6be201729b859e393449fc9ee45578a7f457505e2b632225d105a0c8a9a1ae1929e35327e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c56fbea6d9b98045288fe09fd579dddb
SHA1f94dad207200cec14ec708c3bbd65a3384ab4027
SHA256644bdca4781bfd32718e558dea7bff0633ea2288ce6fc2ebb92c4cac1c1d9417
SHA5126c98be252be6212292b70eab2fe8b040d915355bfc2d049711cc832d59dfff8124f7363395ad23f26fed9fc296289ac129a40bb9ac96086f6b0262cc158fcbde
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b