Analysis
-
max time kernel
68s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 12:58
Behavioral task
behavioral1
Sample
225d85788ef9d270589ba5c23aa533ff563e5a94498b8f3706307a7453e7f1d9N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
225d85788ef9d270589ba5c23aa533ff563e5a94498b8f3706307a7453e7f1d9N.exe
Resource
win10v2004-20241007-en
General
-
Target
225d85788ef9d270589ba5c23aa533ff563e5a94498b8f3706307a7453e7f1d9N.exe
-
Size
708KB
-
MD5
910d8bc2b7a25b17690e7d8bd93cbac0
-
SHA1
3da5cd11e5c3734e172e46f5aee7689077e194d7
-
SHA256
225d85788ef9d270589ba5c23aa533ff563e5a94498b8f3706307a7453e7f1d9
-
SHA512
88e7faa98b0338a47256cbaed9e1265ce86dafd1902179c2d1b41f0f4ce864af432be9c294b69336ae444444c123c3a77d846a72c0adb9faec866edd0f279020
-
SSDEEP
12288:Fglx4CxSr1hKdOactGbPbo9Lb9zq25flnyw1pra6iGR/Tkus:Oljx81hKdOalbPbo9H9WGyw11iGR/Tkj
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2892-2-0x0000000000210000-0x00000000002CB000-memory.dmp modiloader_stage2 behavioral1/memory/2380-3-0x0000000000400000-0x00000000004BB000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2380 set thread context of 2892 2380 225d85788ef9d270589ba5c23aa533ff563e5a94498b8f3706307a7453e7f1d9N.exe 29 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupWay.txt 225d85788ef9d270589ba5c23aa533ff563e5a94498b8f3706307a7453e7f1d9N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 225d85788ef9d270589ba5c23aa533ff563e5a94498b8f3706307a7453e7f1d9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442070963" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{64B82E91-C9D2-11EF-A7E1-668826FBEB66} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2892 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2892 2380 225d85788ef9d270589ba5c23aa533ff563e5a94498b8f3706307a7453e7f1d9N.exe 29 PID 2380 wrote to memory of 2892 2380 225d85788ef9d270589ba5c23aa533ff563e5a94498b8f3706307a7453e7f1d9N.exe 29 PID 2380 wrote to memory of 2892 2380 225d85788ef9d270589ba5c23aa533ff563e5a94498b8f3706307a7453e7f1d9N.exe 29 PID 2380 wrote to memory of 2892 2380 225d85788ef9d270589ba5c23aa533ff563e5a94498b8f3706307a7453e7f1d9N.exe 29 PID 2380 wrote to memory of 2892 2380 225d85788ef9d270589ba5c23aa533ff563e5a94498b8f3706307a7453e7f1d9N.exe 29 PID 2892 wrote to memory of 2840 2892 IEXPLORE.EXE 30 PID 2892 wrote to memory of 2840 2892 IEXPLORE.EXE 30 PID 2892 wrote to memory of 2840 2892 IEXPLORE.EXE 30 PID 2892 wrote to memory of 2840 2892 IEXPLORE.EXE 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\225d85788ef9d270589ba5c23aa533ff563e5a94498b8f3706307a7453e7f1d9N.exe"C:\Users\Admin\AppData\Local\Temp\225d85788ef9d270589ba5c23aa533ff563e5a94498b8f3706307a7453e7f1d9N.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55635742d9020aa857b5071bb876ccbfe
SHA110f273fced28937c2b115a17a0fe540db42acaf4
SHA256686a59dcd399ded91b8fa8abc0811638931aa208b7136f81d375e35d22d07fab
SHA5121a679b11ad437d2c2c1ab3f8a7f1cab6460981f3a85be24cb9980847a01833489a607c825d4a7aafb2b03679da75f99d9bb2696c0c85b6dbfb94241b934321ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5653989bf30d216963f01db9e88d25054
SHA198c171c9eadcc0a4aa2a8c63c5b91873b54b2d0f
SHA25600b4e49037a873e53126ddf25e3c355e41c7089f8910c294fca6091240ca802d
SHA512e57d8e3333fc5b919ac849e32107719ea4f7d12bef639bf34b3aeed765eb6cc43919fcfa7a1d4c3265a2eb588603223c4f63507d1ec2e3a5860daea3c684495e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c253a74fbc480d877020c8b02715860c
SHA1266a9698949687e5b152884e77e3e54c572eccab
SHA256f032657b578785008bf7a925c52110d9f207fbc5077df47deae2565880db6762
SHA512787008f7bcb05a1ef8f438fe29ab0fd66cecc68518d40d296c8a0e32019cae1f72c06bb2c296f783c1e243ab2203c07ce4d683b1384c79e6d136b9347e9ed6b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53facd16814c0bd428ba952564d766ef5
SHA1861bc51d4faf8d9dec782daa3f714239a39c6216
SHA2566dac1cc25565bc37557856e2c0ec9de1c56e419d57e88dc562f3e4fac5b3b967
SHA51229bf4a40c86fda9502bf1a80fe888d33d04ad763f33e48766a63981cfff832f60c7ab42c1275d49e79a2868fa20b4900962fe90170c046e0a9ef871b63c403fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d45a5e3a1995878ae4e267a2f9f626bb
SHA1d50af36bf1305f29460c4d851ba6a2d32e7ffe45
SHA2568ba77e33b729322b7a8464fa4558a79be9d1f3ddc5e5847825f2cf9262a56682
SHA51289eda64e7083d4cd070bd7931b248364b1af5798c1a88115ad00d9c4ddc920bfe33c3d96e283718e448958bd7a5a87a20e2281f9a777f20c0cc5f98729b8ed27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f901afcb54ae2dc017b9bef618efddd
SHA1732b6fb4c32f6e465263c2e8f6b20878bf3dac3d
SHA256bcacc7ee449b755b02bf6f33ffde764b08153be36e709ee897b184e4fac12e11
SHA5125766acbe9068248d88addeb443cc97976bb3f4cc9a5fa881a72f2e20128b2f7eb5058bcdc84d86f0a01b04d760e2715759a2e794c4fdbed544554f4322c3bb0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7a60176294b2f01191bd8c353c2fd08
SHA1ff8ae8af996f4e359bb4acfc39e14fb4f7f5144b
SHA256b0dcdd1fbc9001cb1d2901875b8bc6f15f4ad5fa5087d455554ec3a1a0bf3977
SHA512550c2d1cf228bd232c34af3c5dd89a33141ddea3e9293160031445375b419bab1a9ec962b96a96c0350ff61e68570cf6dc9d72a52449aaf88f637c55bc1f11c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50666d641528cc61140d5465e1a736aac
SHA118b5f2b32653f946572988d2ac3d8d10afc83376
SHA256302d1a9606ac0321e18dbbf0f399ae86b23a2085dc6f72096385dd8069c8d6a5
SHA5126149073d14a5b0899b627abae9f0d9e223057e89b684aa6b401dc098e9fc21dfa500e8888becb1ef95636b0f6d4d35a436e39013f52675f953f211a69cd01d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c6fc7b5f37196192632ae4acbdf71cd
SHA197b02fd0f99615230a3d5ee2f2cf5a55bf886c70
SHA25675d0f2a41bcc21e2c05f2061c5eb70d8ff85f5f96393ff7009e990a7e1aaab28
SHA5122ad38fcfcef7e530f808a3359723e379de701ee4f84bf6a83e68e7ca7863b76218f4a932fc13e5ae7d15e42a584d0df164d8cd27865a97b082448ed6c12af13b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5394a70682bcda026bdcea6b3063f59ce
SHA176c92f500eea54f7db0af778e1ae698c1d260f8f
SHA256aa83e3ec021963a5bc93a24f98b24a87f8b5db007c0b691fb8a910b4d031e76f
SHA512b9a6927812a22f3aff9bf5286ecb69f4f31fb1d16ff177f0bafa5be6b2b0aff0e53f572cf40b60181377e87d5423d64a6023f412197954bc78641063e6842a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5068f087762d5c8a196eea742d22c750a
SHA1a39ef50c536c62936ff9a2b0ed13b21232606c9f
SHA256d597b46868b8f0af6b1ed0f1e7806150721687d2067ab494781d4a81ed85af33
SHA512d8027047efa487f07a0d777e54e4661218ce2e2afba7f76eaa498f905278697b6d3c2443d3f91bd9874521210e7ffbbd13f7b0ae0021abd1346162c9017fd58b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cedb246ae504ca7f70d129ea26742c1b
SHA180d8136c29cef9cddba562cb3567dcbec6b7ba27
SHA256610bbe3463f5f643bfe28f5c69042b0d6bcf97c5172123ca5e045426398ab1df
SHA512619406ab9194b10ed558378550e7312823328fb188b6ea3b34fe5097d7a95cf6d7d55f92420be651e623a859a950949ad2537f3922d74e4244f22e3d89fc614c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbe7490670ddf1cfe2824787b8e08ad4
SHA1bb6b955fc9404d053d7f41472ecbdaa47b31c73c
SHA25685df07b33c1ff02d7949d3c8b6bcba7cf8954b6ee07afcf63a0ed7a727bd5609
SHA512234012f6687ea7e99e1c75ff19fbb84b01c0d5deb18d8d582f88a17e491a20101b46695f5c2453afdbad3726149ec5f7b9290b1bf4502457f780f54379a90d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c01371c6b5bfc48c18426f45ee95ed52
SHA1f519e5880ee02c21e019c9c33017ee183c918edd
SHA256b69f9bac1ba8d91adde9ccb4d017708a13f18560453c5528f4b058d30b00f53a
SHA512a6b73788bf1dd23f9224764cccf207276ee34ba38f3e7f4050cb717ad5accdabeb881decee9b9f09927be75315ffd572bfb95c4fcfe100bd2310ff68492a4531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c475ddb171e4fec9fcda61c70fcc4425
SHA1fc02d70fea7f64d2f7016fd3553d204c20c9adee
SHA256ec564b9d85457285e3844c6a4ba879b439ecbef24c5c2850b1b484aa5339091e
SHA512223802013478f078b6104a94a2bb15e127c4180c6f2fbdcf49bcdad816a38be8b972bc66116a705e60d7bd1aeff63b96ffd9aae890428ea16ac5c95171099e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e462b3a9af39e5496ebf7c053ad89aa4
SHA1d0aa432994ed2f7c48ac743e890882033570284e
SHA2561631c512427a2cb1d6020d8d7f74051be4ac8950ee12f927ad32066770a3552a
SHA512c40319514708c2a74306633f08e3fb0bb492a9667fec3970a491cb007e7613d52944b841f1de7bb700be34320a23ccb7de9c4a659bf619f874bd22d25b82382f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a99869cae76344c0cd3a889d9bc6773
SHA1a84628cc51fc26b10ad8ad76e620984931e218be
SHA2566019950f5923e90972ac10431a96153cdd16fdca2644141470e52a5ae9616ab2
SHA512904db63f75487e3836515d58d105f80c8f717424092b1e795e6ea5fff4a7e5e196e6b987b17dce774597996a26b38bfac7180fa2cd45d878925fe3df629bf30d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526fa67f764784cecf9dd5e6c6ee6a088
SHA1553a4aaef7251dd6d42aac1c2abcc25db8c6967c
SHA256e501c8cf1776bdc0083fcab63cb5e75848abed547c76843f58bca2b89eab49d7
SHA512606d9b08c39ce36e0aa879f8c7d35ca76a7f3a8b1a1f7a8006bd9d0ea9ebcaa5190b01959b9850d1e60a80c26dec1ef5eb670fb539af98697fd8b2bd663073f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571386557fbb7edd792e97acf57b1f604
SHA179ec70966329401aa1221e964598ef587324966f
SHA256d4f42a823ace0622e6846d07ae6782270d2ec494ef5ac9daa95314fad81a0e65
SHA5123fdddeda9276c90ebf0c34e31e72070f82b7960f2dda4e5320d68514a31e818d06c05430ad88e8075d481ade3d6d1b6769727913e94328009a98dbe7c4e79b0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6d96365497b92e8f949cbbc1210d4d3
SHA154a6ea68492064091e16337e5b8333b004a1a012
SHA256f3346e75839850455bc910da897546b9600297984da5707b3567289aa8562e19
SHA5123e29ad1c5af3f6a8d05995d31ff4f6e02611d26809e5340a53d95829d574255c89557e47332d23b8a0cf6b8442992db7f56686e1f1bd8e67d5ca88adf797579e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b