Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
84636801d6a4a97075cca84908bab3e4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
84636801d6a4a97075cca84908bab3e4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
84636801d6a4a97075cca84908bab3e4_JaffaCakes118.html
-
Size
67KB
-
MD5
84636801d6a4a97075cca84908bab3e4
-
SHA1
0ffdfa2907d142a6a43e211808579d9298410a0c
-
SHA256
38dbb0fa3a9f2d3ee8d8a8206ee9de13d84678da2d43534d6f101002ff065008
-
SHA512
a3176d5dca14779c805451be8fb7d0c04b8eb58551da117aeb8072f26245fbf0d0f2a3f67594cc157eb6eb89e9e985113d6aa864ddfc21e02b7305b32a5a9e6a
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g6scM67Di4Nq9HoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcc:JdQxDNNq9ITzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423239370" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD48E101-1E8C-11EF-A7E9-D684AC6A5058} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000006b5fb7b0c11cc3a5e6228421f308d46a5cfcabe5b797fe0ad84e8bea43739644000000000e8000000002000020000000facbe5750db830426ed1645d8b6c1063c762ff173b90240ae5aa906f0ffaa27720000000a9a591b64a170d8e412bfbe2a64cd89d14722914dc3f74b7051bbd63f104d2d340000000f260625a5f5cd486a1113844c4866f5af110436e6d62804c10bafd6123e6caa218d4ed40590e8c1e821622a3cbfd07a8c3a45c82d3f5404179a1326ef4eb3730 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9082e88199b2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 820 IEXPLORE.EXE 820 IEXPLORE.EXE 820 IEXPLORE.EXE 820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 820 2220 iexplore.exe 28 PID 2220 wrote to memory of 820 2220 iexplore.exe 28 PID 2220 wrote to memory of 820 2220 iexplore.exe 28 PID 2220 wrote to memory of 820 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\84636801d6a4a97075cca84908bab3e4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2b3feaa935192278dd368d55b4270e8
SHA10e4bd842ec941fb52c89867bd501b0e8c43f680d
SHA256b789508e167d3bf3cb87e69ac29ec2eb3a22b3747ca90bfd8b664a1431e916c6
SHA512dbea6684da4beeed0e905a0e021a7c757b3e3fae4821a3b5ade072b30d21d2a65c0f5a6adc2dfdfd4ae809e1c5dbade4762e9bde142d02d1b733a793af0f71ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e12ef4f627e7538774f8010cf646f573
SHA193feceb59df903bf40cf337d3bae6cdb3ac4cf38
SHA256952f55c277bb8651e54e761a2ef5cd371d043194b7f2dd9ffb4d89f1304fb452
SHA5129b47df1f2d5e0b54371b4a8b202e51884e96827dd082884d4a5e97e3686c1b680464b0c17a08244e13ebdc3385dbeff8a7e7fa0e8f1307d880a819644bdf4ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583d33e3f6bda646ffe49fac091f6b566
SHA1110c3cf4509a51f88d2dc28350891544c170737a
SHA256bbad21a2370d97cc02cac4f1138ae36b9d7de3263bea806b48511e7cb432292a
SHA512114cd16c057de1fcc1c21d30cae13f9659ce56cc5a9de666312d10bc5a5ff84c1280c0306c760304680f6495d22bb68c35153720cad38c9d6012a6beaad07a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb82a626da5e1ce846db2e918db4d9f4
SHA169277150d8af82d472d339de2f2dfd59580c91f0
SHA2567a86943ff3e388d6add64bc552251fc2af85cf18451c6674bbf91949658ca715
SHA5123b3e16e04519d3ac02f64289033e691d12eccfbe18fca5cb9cba72c92d8b8376cd3f89f1aabbb2454752777cd4816a0c65378a75d7db8f9a2a02d532c1fe3110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8937262a5bd054b3d96483de5f54575
SHA1ab2f79ff62edafff6f0c2c55ef17cfb369337a83
SHA25626f7b4e1263abf364764967311741229d0f54db161cbae1d6879ac04db5c4c31
SHA512af952f62fba2266b39cbca401db98412da5c87f49a92979841e46476cd5b1f813bcbe20de66a98e1cb549af1f0e44a109537abde08f563cdfab7742064603001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2853ac6bda8d0c191d23c8800efc068
SHA15f641f0aa31c40ee269c072044a7ddc8644ab3e4
SHA256186a18171dcd1588eb3b97b2e05a091701badbab7716768aac39c0c2673754d7
SHA51219410c399ef02a8ca8de2f78e9540ce56cf0b4bff71105c1e0d192a8cde7c8ade255ec0cdb3cb304bb2d0a62a15ee878f3eb3cc26d131b92938c193144b0be14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52836b0b47d1bf072d05941f66fabf10a
SHA1337bf4b4ebfefe97e162f7246c0fb5b0c304dbb5
SHA256ec64fb5ea7261fa995ea4e76d02d88aa9feea32b9512e858c169f6a297ac95c6
SHA512510c9f7d30d143be87c179ea3991fb9bb56c1e7d8127a7bd8a7387f5e057305880b4a15cbe0a7c0fe397bdc0b392386fe04bb4745424bb790402c9b107b7dd02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a674239d02260db15c35d5fe15ad5668
SHA1599747fb1c0d32b283976d11b6b452ca8d801516
SHA256d6b0ae70a4c4047c9f8d1e2ed34151e7bf42b49e0f42ffcdef6516ca88019749
SHA512582c3fcfe5490128653c08fec8b667d86ff435cb9fb4fb2dec69e2eb1d40acc3a9b21aa05f03521900d1c92662e0ef969fdd39bfd6650a9020f5fdce4f8d4bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d58aa48cab2d6048b61c6cbf336a8a
SHA1deaf6f6838a2fffe61a4ed738a8514b20cdf84bb
SHA25622ec13babdedb02d81ed623352cc7cfe1a3682cde7f7f9946143217a60659e0c
SHA512f446589113d2ab40abaceb3fa6a321f41bd7924fbac60dcd5d8c4a178d52cfa4f05449d4f5a188f310613d4b45aea11441c0764c69cdb3b8bffb6cf6c42b084c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f29b9bdc8d65ad02f5e9da27ca6c659
SHA14458b04856b2b70765beca3dcfbb70cb07ded527
SHA256ee19de11a37d95c641cc9c6196cef82a8c2639412cb6920f28671385e3b5c2e7
SHA51237308364250ed050167fb83cef63ee35784cd94d70133c3b810da534300741d6de1835312c53ff3e91eb5e1de84d528f3295da7fa27a67fbc64eb68d055c9f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e7cf1e472ec9e9643122e3e9d3be3e
SHA1787d9014e1bbd1f28f115b4e234eeec6db099826
SHA256d4e16664c16b7edc95dd027f9b10312ef91bb3b6839a921e74e3af34d83fd87e
SHA512cbbf01c4253765d4cb7a02274d37e3e472407e6d686c64ef96eb21a65fe90edef0cebebf8e70c9109cbbbba3cbd82ef50aada6959e4e86f8c07e00603d4425a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baea6d82306e602113ae71079ce3793a
SHA14263a390ee490d909a6c3c027f8f4acfb3c4f5ab
SHA2564440cbabba81c83fe913bd417d26dce5b449aefc04ba8499ea0736199d96f48f
SHA512dd3f94cccb7b40c609ef622642a6f2445e929f58be1a7e2175e07577f31ae8771f5b2d28074f45e111ced793d08dcb1a42c4de2524fbd1e940207946e733263a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af7f29f77d6d917253afebedc0de5a45
SHA1b099e0d2744ef4b325eaeb2f782f7bb23589cadf
SHA256e15330c8ad32913fd0c37d8542178f7fa6c47129af45118312452a0f1160272b
SHA5123a886b9480e56376eb5afa466c8f9fd74125cbf61940c74046bdd62fff372a8e35c9af35e971308b816a478e0101b6befbb97209d5ff6e2d7646021263d3a59f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e64956bdcde1439cc6d5f09f08dc16
SHA16c491bf275b2e1abb762d4d57e212637d94cd6ff
SHA256844ff529964420c2ecec76f5bf749e8703793de4d199e4b0c24186a07dc91809
SHA51244b9b43c8cb4b0d7e88a1317925cad7a8c28c14010bb0b2fcb1214644c9c6132d78037e8d23248012e3769d782ce293ab47b8a6c857e2a0d98a61d2fcdffeb4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea39473da25b8b20329b224b562ed9ca
SHA11f608733608c651c7d7ca5b9b1c819e78bc00bed
SHA25617edb9c44d408e457673dc14175ce129636651b8c0ce3de1a122a58fdd3f4919
SHA512330eebb9ca193464b4d6b3383d7ba0ea17166dd8a6ade25106eb359b8058140b17220177d5e8bea22f01b9848f1475bc68004fb46f4cb6434e6e87f5e1da7167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7a5675fdfa82bfe29a9cf9308312d19
SHA1b304042501af762dd25ef959ef22dfd6f71c993a
SHA256a95b7525f620e41be4e69271ed2ca4120b022fdf3279b9cf9511432844ad6aa6
SHA512c7053c3c360cb5a22442725c20738d517935121b85331808d497b9e11f565684dc35e221f9ef223f65ee4f2450dca96fb383a6a56f4bed5c4381cde957c0af9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3fcdc895444816b13e01ddb45fd34f6
SHA1f36a26dc7697d582d91ce33c88b51c4e61bd59e7
SHA256abc4cead287c439a52ffeeb39da67cc06efc28ca1aee8fd3b2172e5604d4aa8c
SHA512a2f86450b5cb590d959242927cf26f9a6aefa7b4a151eba96447c489d0d0b21c71026d94a55b5ff64bba8254826ef1b2975d0189932fd866c7adbcdb9b91752a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b77e147a8fef3ded25b46fe488e2e8ac
SHA1ba5947ca99e0586d4bbc67751443f1ba8d64feca
SHA25628a46202031099470ca4f33fa5497d900e0feded358cd2a4f862fe90f40da176
SHA512a49de62ea2ef2369351711fd19be8502e40e9cfb57e6e1e1b3d1f170a5c8440ee1df645a3e7832646bfb32ec62125412109957f4b004d373381e979df36ba8b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5503a7a5894ac00c884efb1eff50f0c7a
SHA126fe74df5a85ad0101dd68876ca117fc08659a66
SHA25666a8fd31d5b49d1e8f86a16d0cbdcf7588862d782114c9def3184901285abf39
SHA5120780506cc51fb9e90ea59a1324f453cd1575a4e88f0c739b205b11ea67f87c2a7069cab3bb1df463fd079ad35019daa8a3c6cd2a706407ace714831ca918b77f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bae14817e13a37de8df5b49515c0768d
SHA17318212bd2905f99b661f03f19c8cced819a4f77
SHA256081a73c634adf96ff0483b26add66700ed065084265c883e6fec7965a80022b6
SHA5123a02e6d7eb79a0291f43e0833d82bff93a80fb37a696d8ff3c61cb321446330aabdab85f1d41ced57fb314edc671d0a6cecbd82482a5379f23ef472dc249fcc0
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b