Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 07:04
Static task
static1
Behavioral task
behavioral1
Sample
a457d511f25cb1632abbcd69de023db6_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a457d511f25cb1632abbcd69de023db6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a457d511f25cb1632abbcd69de023db6_JaffaCakes118.html
-
Size
94KB
-
MD5
a457d511f25cb1632abbcd69de023db6
-
SHA1
01dcb38e5d6ed1c796b9a0d8e909d651b0a49fbd
-
SHA256
a6866bba65933fb13dd5dfb053dc38f1a40f268d71babded8435fd1394ecab87
-
SHA512
6c3ab11fda653e4f4e5dbecda64e1f96fe7badfbdae7a180ef73496f9a7730478c7d37e3d472a55a504a5f03bb22ac6fc97a65f72693c177124df9c7a288b86e
-
SSDEEP
1536:WMLiNjHfLZhD29FLMif/pNrVCxnv17LVyM6bTZ9BdkrY8mgHC+qpEyW:WAi1M3BdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3103FCC1-2953-11EF-A5A7-5A32F786089A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70d15d0760bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424424143" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d21768ce6af2ef449e34cff8be783e8d00000000020000000000106600000001000020000000ab7d5fa29a1e976c100b9a9291b295393aee57dbd75a77279f975d35dd36fb3c000000000e80000000020000200000001a7d3e27e940c2a7861816d14e262b78fa7393e11e1fba4ca6501fd94e7569f32000000066081fbec2c4e3e59fcdc8f142a7fcdda1a7967b7f348dca6d938814161383db4000000026110b5545a411b1c260db513de1b184f9f2f9834da289340148a3567bafdda6a7fbe29566c12c0bcd36f9f8980cab1f469fcb8cb58f0f2f6fcb8831230f6d4c iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2668 2912 iexplore.exe 28 PID 2912 wrote to memory of 2668 2912 iexplore.exe 28 PID 2912 wrote to memory of 2668 2912 iexplore.exe 28 PID 2912 wrote to memory of 2668 2912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a457d511f25cb1632abbcd69de023db6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52187853d7d0d30af45c9dcda50a7217e
SHA10893628e0b2efe33c7b999706b5efd016f725370
SHA256918d1d05940d4cbab7a815a5c03c701c8b694b7e9bf17be66267403c19878b81
SHA512f7ad23f6643617c5f16f2233e263fa8eb932e34ff096d453e6336e9ba08085456307cd9b8a242adb71bbd24460ebd4b556a8f10b05a45ce0581c30d49ca8d083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c4d3406ecc8e928030f24b98c080ff5
SHA186757da1fdc5e2493fefc449fa2f4524d13612aa
SHA2563bce810ba1543b5f165226082cd1b5fce19ceb71475dd158c3712686368d1631
SHA51293293f845080febf9c21d26c78b3aa10adbfbb4bbab640adb15a803ed71d141961ab4011f916ab1a50128d38596079a6cc670299bff8f5cdab666abd9e96d348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5282140e285b576a6c26278dcb99d2ff7
SHA1201cc8a521bb14ccc895aeb562f562b67539c04f
SHA256b4e758c2738acbad3c2f3f4a92fe5a8d59618ae6a2505e5d4f1f10c2bb75d0c0
SHA512b2cb0b9443f99c5c3c645217d201c60b3b2e0b99488aa895cf5134fae8f390c9f3ee8dc34d86519f947bac5b14f706a38f4c08c2babfcfa039d3ddfd030011c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50448aed3ac1489e06394ef5d7bfff595
SHA1379224c870ec96b8ebb7613f66074829daecd38c
SHA256c44e742e2f3ecd68add0b0876b13a382333c254a9c301feda50a6d3695d11566
SHA512c096d859d57824257721447f5903f791b7b6055c36a1dc54a24d75f989317fd2b35b16b31c771599b754a029d4176abd869228cd6cbd6fe19b77330f65d6898c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d29dfd36f9b5ca46b45615bbd380281
SHA1e7c3e11e4ab233fb36cde62f8171878fa470ff8a
SHA256083310917b7bb56696cd93ee8a40bddb2c3b9b59cb05db738fc103a19b81a0f7
SHA512b6b571655b908f3f5ceb25094e9b5430454eed6d7c010a7ea1e217f8a6feb3d357d0624a086a8a80c57ded280562002386b3e2257b38a88dd0faf3611121f267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef6b1fbd62ec27170a936f4f7a9d6c9
SHA11505ed1817480cfe8f730429a09cb00adbfad8d8
SHA25674e2d46c3c7eea76e092f771ba0e426ed683521d991f66d08253721582036f11
SHA512b693e37de13b292c8df87cec68f38456e046c28ba86ed65a471f3e09d23a22fe699248935e90867da60c7dbaf4cc6f7ae41eadc0fa99a0558df422cc53b70fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50938170aa9d49fc290f23e5c14957323
SHA12701a6afab674da776c828eed27d37f9b45ccb5a
SHA25615b78b0ce0578c9e8d4a6fad6a60d7a3f27050cda14818184347bf69de8fdb74
SHA512d146fc05b28ab4e0e9aac363d765bf7774af06230f5683df66d5803dbd52fc9bfec19b78ab47149a8453ab3ee9a69fe42c08a610f65e76b2a92a6a72a79d9577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d236a0014f93f8aadf6d4db9d8515fbe
SHA18edade7b232189df50116c27aa0743dbb9588f74
SHA25695ee6ac464be6cbf6add3597418650111ee99adf3b0e299dbdcde2a761865dcc
SHA5121dbfe052eeb2b7625a2b8df1dfd4eccf2cb2d850e525b5ae6febe0485ccedef67b5d00b9f6afa6b9b04c036f7f9b2dfa7fabf21380ec69848278cadbe1661bf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ec22dca32a7d2fffe5f19b2361f0444
SHA12981258c81ebbd761db2727b3165d81eec563d2d
SHA25640c774e8c2da19dbd023b0afcac799ff86fd8c75c039931bc5bae8cf61b506d6
SHA512c6f8070e4668078f231036ac11e20d0ed6821d05db9ac47368cb9e1b584c6f33b827973cfb6e9bd9134ff85a20e18d467e53966acce806f41fe8e79b73725254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593652d5998c24fe96cde922e42232c25
SHA17b4ff586e8635a1ea2bc804370983640b5b2876a
SHA256fdeb4fe35947f3840ba6a9c41a7d23b69ae1d91499f72abf0fba0ec185736681
SHA512dc763ae7c4da437f2b859f13df41cb9841f93b596a28668d05e9336c0ca50a3f510b38532e6f621b67495d6ac3bb28197fd2c39681bd0fdfd8584f3f4d97cabb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5589159bce6de117e69067900fe2901b6
SHA19bae5164938e09283307de69f594c55f72769eb0
SHA256ca76697af2e37960f2498f189a3eeb806e6a47ccacf8abdb12315d787b38cff2
SHA5129e4d0017fc40c57b488c3ee5d59d277ed83bc0b7a85177f2c53aad46b37102289d1c8ce182a7a5acf8a62ec705fb0ae54569243761138cf00322ff25556d77e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543d4f7f89da6db4a775ca019e6ea28c7
SHA1c5f63ce4d0389f77463044bb15873fff4db5e061
SHA25605a0a510bf47e791f7d34bbd498a419cc868d98b4376e0c6c1fec97ac985efdc
SHA512253d69eb6d6062f39ffbf3da855baec36e76ca9c7765b7eb100517bdbf1b58ae5f0cd18917f106a8627122680d045905dd10adeb0072d06fbc532d513bf69045
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be91adf47bbe867868a86e07e8ceeab5
SHA1ec25404b85a3d81e31f255003ad614d76abc039d
SHA256c590cbfe3a6aee89af8103759dc2baed08985e2c0d30cd4a0f8da86497df2eda
SHA512795b8575b95b68b2141c1939a3021ba74b47a57659c1070f43ce63ec62c9b752eb7ba413e350965e9857f35e91a6db06bb2b7a741963b20888edaa6d82f1b3bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d113a4cc44fb76f5d68012fc00c30bcc
SHA131b4450dc4cd5fa5b954c4740115b6c155a2c427
SHA2562e275cf6e1d67812bb7542a149f0f61d0217c88a6f783c8ae97da44cb4d1ce99
SHA512e0b62b163a59a9cc912ff4574433dd0c27502f17464853ab0f99814b6678c9c32fab9f2847dae8e4e890a49f04d9e5e647aeede8fb16b4c8c86cc97b20648aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d97b052159040c7c79b61852ddb15dff
SHA1fd624fb19c058482f03780dabe5390be3b7a24b9
SHA256251edb9d59bfc38f7ea4d88e6cb1cdd863f76edb6816a2662f81ec33c9f276ae
SHA512c63599a1e5a6da0cc24879c02362698f102309a37339a21f9054fcabc7b7275f304cf6ccf7959a8b64c10ecc79cebf13effa9b8309ff4f7d0c32e9bf45c4db6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ebc133fdce8b9d9ae73c82c6bf72593
SHA158ca2dfe1f98e75f7fadd5af908844eae69e246e
SHA256bab527f2b9c699a2b8495056f2da2f760c401fa5efcf64e54c7bbb0cf63b9444
SHA512bbef80cdd1e9756d7b66cae8e9c6a8939a0de800a6df8e76bff3abbb1d8e0feadd2d63b664be22c84803de36025927f163289c4cfb1b2068fbfda4f73d952cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591f969be78e476637f5377cf3c38bfa0
SHA1280eababffcd651bb9bd4445d627eb5eda5f13fd
SHA2563c05f08fe7ff4f33971c268c44f6726a80f30989a7b481ed1fe44be760f0c0ef
SHA51287ecdc7ef83969e66b4bb7a188a5774693a3051e992e024a4dc272377d99c5e681caf900cb865ca6f98f30ec857779ee3fe3c22ebd2177c50d7f47f019677a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f25ae4816a5ea52c10d3d14e437f8df
SHA10a9135d721a9104c8198986979f2354d6cd8dcdb
SHA2564aa61dafa2983328a5601511e9d568b9d1133b8c6e8754976a14ca307f487578
SHA512937127e62596719968fa04d69b4918d0937eddfe1e74177b9add8cb5184ae6bfc5f7ed0f149bc901d2481e7415932e8b06a8f5199ad05a9067dec4e1fa7120d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d10f142419bcbd57976ec34e4d00b4
SHA1ba2fa7c7f4e1df2899aa9a668a631f4f2df1527d
SHA256bbcfd46ff5731b5643b711b15529bb7d9bb25be2f1423fb56de691f55eecb5ee
SHA51251db276cc379e248884fb45e52de77663b6f4e4144cee12da590e123b9b1d28dbcdfab8101d7dcfe9829bcbf760c862c20d40237734503f467fd9ddc706e0645
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I819HQXH\gmap[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b