Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
910a8319e5a122f5c0e717a514586b2d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
910a8319e5a122f5c0e717a514586b2d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
910a8319e5a122f5c0e717a514586b2d_JaffaCakes118.html
-
Size
9KB
-
MD5
910a8319e5a122f5c0e717a514586b2d
-
SHA1
60a06542fffc257ff35c87c0125e8f94423c6cf0
-
SHA256
df238a4a2564e94fae01fbedd7ce5bccdc29f784616cf3041c33f2d7413e3bff
-
SHA512
5ae921f59c55dfe011333f79f6196544635e4fd0a878c1802b8529faf2c50f67a82822563ea50cb735bdd598c6cbab76828231c992451ff46d5f8624c0759dd3
-
SSDEEP
96:SfGd5wGiZC1APYHsDHObhjXbr14BMCHUyoPq9x6qST/bnGarpWDQYsk72nSkdQ/r:SfGd5oOd4BMCp8rbnGd3Rh/mArnG4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05e78648cb5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423563585" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000049b8f9132372655b8f2adb17a123a68b33f3fd1eb3162825b878ee8fe7ab5851000000000e8000000002000020000000f747e907389a40414e9cb461e969d664e0a30f590839e576384dc4fdd60c265d20000000e68a5ec5bd7f6bf208cd5d73a5ea7cca46245d9b98465db158cd43563a3d354140000000a39e4f82fc74e1cea764fd768bc7ee2f83a29219fb228c02cdae91cf9d82e9cbf2c39900f1afbbd275b821c6c3fcbe819ecf845d240f0ffb0fe0e621ac229e53 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8D0B4D11-217F-11EF-A4F7-5A451966104F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2080 2132 iexplore.exe 28 PID 2132 wrote to memory of 2080 2132 iexplore.exe 28 PID 2132 wrote to memory of 2080 2132 iexplore.exe 28 PID 2132 wrote to memory of 2080 2132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\910a8319e5a122f5c0e717a514586b2d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58128839eec459aba63dc816c903c729e
SHA17bef76a85b5fcf9c5f6475d4a0ae93a87bc11b31
SHA25632b56c1b12b1f6f4274a1beb2acc1a98d101b2a935157c9300930d4483d6f26e
SHA5121121f7a0cc9f29ccc01fa7421844f340cfed16d0106bcc05dc76fb7535ef2bae3001a490ee161a3a98e5c5314dca36f2b0c6fe6b95a43a531e83c4f018f97de3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5453c107e968bc8535453847267ea6347
SHA1d495e8c1606467d4db5c5f21c4e62b514226fa1d
SHA256713fa7492e2e676376dd8dd3eceb305320d4c9070512783c68eb613fa6ac6808
SHA512dfb8ea33741a6fe2a8deea9eecf7723209632f8f4f170e76a76855ae6e29666cf2f089c4a383ff47038a8295473ad91d1d9bd82b2e01605fa0da28d191bc2198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50830f110c58a1f48b14abb877b0d9035
SHA1d11efe744a14e555e8a19663a2ea40a332cec884
SHA256001224338bd985aa37fed459141b12019b95c8f5552b56c5cea21e895cf5be08
SHA5126860cb4d85bb9ccb4e4910b9dabed471cda0bfe0496ebf18e437713dc43876ba29898856bf639b5340fb586a571cb1238bf34280966c3de4b8e95b24200079fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5aa3b397fa840984089bea0d2b6299c
SHA16d65e9c8f5b6e5ea94e0958e9944903d9c98b7be
SHA2560f1eed7463dc35dee045223f8a585ddc55a0578351c5e9beb6c8b645afd988aa
SHA512f64b9edbe5e5cfd22e531185b053acb72301fd22a28975a69e2f8ac7c90beef5e189f1a1b52f5551b4ca794a1582df717ecba7f2ef463dd9eb579dd023b09483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c0bbb3f1df0b941309f1ba0f3be1633
SHA15f4d245a8bc309ad44334010aa5e55f645dd5469
SHA256a432232ca60a22fdbe255bef7af0d1c202e83c47fdb8ec73d45b9ac94368854c
SHA512da469deb0fde2a56f20a13524db7e89c057ba68e950325cd97d1b7e6948a12444488467a996eb5af97b5155110a83252aca2852f44b8ac6e75a6c84012245e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d93ed26d00c5fbdc2872cdb4bff28bf0
SHA16c78aa7f188ef0c07dd2f9b25855d0ec4e68c8bf
SHA2567d7a068219d85949da96ae5cc84f4400826c9419e4e91fc0c5344135e3f9eb5b
SHA51261282366080e34705ea6048aea0ed0c6c8ee5aecf1404357b63aa9f157ee13c6bc65615eb24d63a402702e4fb38dde219d15014443629a076b531bccbf5a4780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5996bff74c0de4f51c36c9fffc0f82dc2
SHA172cb4cfa1b5338f2866bced04d5c5df02efef96f
SHA256cfb9c1be27019cf59233247591ade1daaf32536b5d60be9abf93102565c68a0d
SHA512e484a71316cdbd385b1640fed1723587830d3d464197cf60c8cce3e37b46cf57bee753f2e0b138fc7b3c348621a7012165d2010bca20e5d156708e0c7c3676a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b6f2668dae86395e04913cf92c481b8
SHA1cf80a97a621f4df329c5b6a59d3c330abd690573
SHA256e959d6eff6c901705a347cca55d12a0bb1dec31dd99db7bc0b28810786c19f95
SHA512d531426e234088ab842c8563cf2f629da1617048b7227664eb5794024cf198904c49f7ec3b1de84b1e4955e59cc8d8434381ed278e2effbd0aff79f1172d540f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5687f46e7abb6a4b0224146f924377a20
SHA1fc475f4505570d157bc756156ca1610f1f767303
SHA25613d378576bd55290a439c93c7fa28789b66f73dc2f802ad5f370ad4562141bb6
SHA5128ed3219da26ae6251f0f958da210d6e41cee27fdbf425a25dff0151561d94b121953da4428a66ea3c6ed921459288836c017defbdbc89cf47f344799976dc99b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5309bd39fcbeb220af0a1fd918fe2de5c
SHA14ee86bb1e74426dd726061083f630d8464d9fc8b
SHA256478aa1390de83729f1ef76994516e77f79b6e7970fd57edbc756b72f3211f2d5
SHA5122d70e080abe5e12d37b9a85214a4f3dc084a18f57043ce7700c01d4f7d88ae9ea1fb4b0b81edffa480f834c3b7430c5b6380e089d4cd6297ce24e3e8cf03dc33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59142b80d3a99c08e69de42e4bf56593d
SHA190cd0759a2ed57361eb579e4ed32eacc67980533
SHA256ce228240feb8b73c9657347e0d3a15ef591a659667d80c12037421d9dac2b9ba
SHA5128237f6c7a3b4f47cd681010b02f0fced1bd056e48a53b9f5a67dadcc1ca46729102b6d7caa15883a4abbf13f931b7e4e8eaf0b6e537445a72c3a86d9ee600263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fbb9d6954e7c494843226bff6a156fa
SHA189af85fc7ebcd8533398fd2324bb3f16149b9422
SHA2569b1e5b95b16da4c2e62d9b17c2b0e4a0b7ab1d5d8fb80cfa3c58aa9f2c37c029
SHA5124b20c7d8411be248c9f311a8b14383a21ce0a573ae8ce9dd2bb3d6751a7420bbc2623fe45e8daecba66a221cae237dd900a40cb1bb4f3a6b9e529b9a67bc0e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdac17923797499edad2256b4a6a5af4
SHA1953b5b4f45a6389151864bbad69ed20418d7a6cf
SHA256389ee0b51fe939de184fdff1f0b5c743458b073d2a0d3fb9c4949a7ac3b44f78
SHA5129b629921c0519949c57ece8bfbcc92681edd97cab390e0e516c5372588301b7d56dd3ee0437963a9872ccf056d9841e46584fd0b226adf25bf696675b9fd76b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564b423bbbf7e72daccf47c494a1d1f7d
SHA137e10ffaffe07ee52b8b65ba1ff68661f34a6d61
SHA256339fef77ee5bbd1ec4f4331f8c5485acc70832375dfd8f08b6bcf1fb69c6afec
SHA51223db36e03991b86d5cdcfd0e3c774e40b1b66dd939b7091677c691cf2608b0c55144ea8e40676b4c7f4d9989c8ac420f0d9a3d4f4fcc40661c778a33979d33e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b936dfc61dd707647d7420de681e4f43
SHA1857173160ad632a4e2e9c29e536a7b64c2bd8e90
SHA256f18484ed5fa6e569ffee28be9cdabe8d003175fdbd4befca7efd9865738c5d0a
SHA51258b415f89582f896428233d38999d873ecda297a3942443534c455fb13d1e18fc486b6b4603360666398cade45b82a37916d157aacde1a4c73cf10802d8fc015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afea35efb32a7809caecd31f0e814e36
SHA1d95a68b29960a2f9b860352fb5df0d25791a31eb
SHA2561492ca60e3bb254a7896cfc179a7f3c488ebc93a6dbb4fd376957578ebf4edd8
SHA5124e95b61243862c0975b3eefeaf45390de25311b737ec3c171fa216e2faf1f91cdcf3c1b95a4f5305c4ccdd83f071093f55759065ddfc16925a90d8c92f08a0b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b50794da5e60e401f56f05b58f4eada3
SHA14575b597f41e83fb9c240ad5df7133efd7da550e
SHA2567be04864325a43e9b82724e2727ab9ef4a6463a5ff37058e02b786f8d58bcab2
SHA5124954c35087e23b50b8b86345cfb444bd31e65862d9831a8b21ad17a85054970241400098c46b4b0345cf1ab3856697bbb761362d02b2caff059f724b28628edc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0dcf1e4c4d7dde965f73f1fa2d8c00e
SHA11b583dcf34562e7592de7707a42e9adc79bc2d57
SHA256da7b8e08e1516e2ad2b8f52eb9a5cfa2199dd48977f508bb5f15d599ba0e33ae
SHA512921102981675c4f4b17fb364916b2c8cf37aaa4a64fc90070cc0a665b5005c329238bc0248c0bd7152b53e1d8758c79adc8d97bd89af4c984ce4992d455b6f95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5fb1caa2e8359bb56a833ea20f57f52
SHA12169470ef860440f992760bc615c84a70a08e5de
SHA2563c71e70c826ae9eee6101686c16903e63159e8f46580cfe89bc63fca9e98a916
SHA512f38e19effd624e85d607e4fa76d1d1b73aa79bc110eb3faf2cb37ca1007ab6fdac1473d05b30c30bc05d606d462fbe6bef2984687a98739f4a7fbdc00516b306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb6518b8ee3a8c0736831ede45065e14
SHA14da8bdbf3b0fea2ed531a51ec48d73022551168f
SHA25635479146d13e1aa7ffb69e1494c6b52eb50d8ffcf1e083622c76edaba8ca38df
SHA512f9d0a71905adbc5c35fbe496fcf570f119375f4a1fe28ca6884ee5fd8922ea5e5bce8f8370561747d3697db91db43b8083d86f30aa77bdd0021f45376f8dce9a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b