Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
aa98fac27efa243b94ba87aa0e5a2165_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aa98fac27efa243b94ba87aa0e5a2165_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
aa98fac27efa243b94ba87aa0e5a2165_JaffaCakes118.html
-
Size
31KB
-
MD5
aa98fac27efa243b94ba87aa0e5a2165
-
SHA1
4272d5114162e5c8cd8b0b961de8682bc2a47c91
-
SHA256
b66a5199492118ba1c5918a9ceb29e1f5795ffd7a5e4bcaaa64448c44c3689de
-
SHA512
b43238bc1870149f2e146a48a9be12639886900d7ecc5be7b9695ad5364f4cceeaff93fdb7e8dde1f263613d2ae5f9513856d1958691dc9e1e973b570b60160c
-
SSDEEP
384:dnNzKlx84axUDSUu2sSmP2EJ6q3jRL5jl0loEGbQjkxIobLqhmHs+r24gxjLilaH:R5qx84peUu2m+EH3jx5jyloltWeB9Xkx
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424543279" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0dd0a8a75beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93972BD1-2A68-11EF-B6C6-7E1039193522} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000ba9688f143cab7cb743605dda7fda01e90598a910c888afa07fea9edc0c53d09000000000e800000000200002000000049f09526204a0b9456698d15d5b189101428c01b352bffd958882de7dce9e4202000000054bc07e66c6bac927c04118c760c8414b50f6c7fb84f8ca5d0acd14c13e31da0400000000f95907c47aacc84f8e92527463ee668ebfc5e939223d97efd674150a0e02f44b8319abf75346de0caa11af977658589312cbb48d52cb5ad34889d02d30f1a1b iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000780e88839f088c21368d10cf1f380283ab62499b6cb2b12e0507cdd89dbcfa2c000000000e8000000002000020000000f1af0fcf0410750b54d358100a12e24a6283ea2ee3d5056504e126dccb14c91a900000007effaa163e46f9b47dd9b981a950db719a8da46bf365db76f6b903e7ceb5ede16173167f0459589c6cc7bf10a61bebf77607f5c37030bdf44f861a20665cbebcbc6e3bf70152c6d69134e6412996f9026e55734c84bddaddf32352e4be3be18b9dc5c85b3d00b973f6f3da69eb5ceb12a5a3d3bf25684397a80f28d71bc903fa72df4dc4859c296b2a37ef43957fb5ed40000000a496e0f003917bf1f15a1dd186e6549baa86e8f1488efe9c65cd03fd96f00bfe96b5e8c165a2a9072d1f2f6cbe76794c5648381a6ef6cbe9e0077e0f4dcca7c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1876 iexplore.exe 1876 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2524 1876 iexplore.exe 28 PID 1876 wrote to memory of 2524 1876 iexplore.exe 28 PID 1876 wrote to memory of 2524 1876 iexplore.exe 28 PID 1876 wrote to memory of 2524 1876 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aa98fac27efa243b94ba87aa0e5a2165_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4f21a516cba68ac6415d674a93a7d23
SHA1b71a3aa7325723b7cd5c30cba09febdbfe5a1e10
SHA2561164a28c1b74743c0cf5b6951729c5c4cad957e9bbedc981c40c64d254190ac1
SHA51278e7a1b3b354bb9706082dad8bbde43a4b321e4b4adb8c838544b2ee137e6db870fe4444685c87787ef0ddf0fd4b26d23b393bcb42c94217dba90b9a8b4eab02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507c5884105ad3591560d36622421fc93
SHA1150f81c0af78664f22fb0ee37583e175501d0d61
SHA2561a4b64f447a68cb47433013bf76de1c8494f2d6dc3d50ae692999dd5557d79f6
SHA51236e5c548b1fa69d62c6ab630b513a10ea4b1196475dd1d3a0c469f547b5d9c2d4d526f734fd7e5f04b10a37ba07632ba1ec1644fee045df931ae41630b29c624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b3ec520489fb07c61524f9f69156e9e
SHA13e36916f22e693ac5ea1f40e6bfcd83bcc5a6e2c
SHA256f0d6aad04e92fc52562c3aad2b1bf6cb0384a47ba540d858683026e23f1b890a
SHA512635a586f61cff565d16deef78a641a4a66ccbedd865d308fcfc1a65c7d4ddd614b170bcd12350e61dffc8b1edaa3ddbf8071b3761df4732ce20c8ba01c135ff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ac0a4776e9f6fe49f28b6f792d6c9d4
SHA1e569eb4e2006acb58dfe529da8e926ef9b331616
SHA2563aa47ccd3548f0c80e42eb941061a6f1ff150d09d1f422c1e906af59141b52c9
SHA512c7771ffabc9336f6066f6639a6f7b1c92f3c935cce7e57d09fd77c7000ffb88ec6b773303622e428f33a6e3c4aec36f32ccd165027ce7e055b80f7da661ec637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8d13cca69227e8abb6573f5533848cf
SHA1927ab045b3c9e39d7d6f9f1c610786265d810560
SHA256d5b5e0b4540dc45430d1f766aab6b1fbcc02101933c73f1befae306fc1845212
SHA5120f8d38370d49c47d6312af207ecedaffb8a2c613a09767c2fe5a4c3206757039f977dd1ea5ff0d8060f687ad680004cb52fcd44b4313c6b31b391ae865132b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9cf161f6fb11c93f074a6e232d1a227
SHA1f8c7c0cbc1f8fed19a7572c7ec104c1993e03045
SHA256cbeecf34441cbdfca3869871f92878835d463260d91b905e22d14f6191843a3f
SHA51214cea0a8ba8f504b434629b32ded5adbdae90e5ef0cac2a3d48e26fd61585a8a056a3d56c85e29f5e6f12a8ec1fdd940c4f58a7672682eb6775a4df876c8db2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd7c2aebcac6df80fcf5bd5438eb8471
SHA1dc56402f7989a108cc37bb8d39f3aa0339069e13
SHA25600a377fdcd4f0a3042cc91b94c52ffe8db670b2367e1d25a9e0ff64537c276b9
SHA51286022f54e622d3f37a921e3e2c98fdd8cdd084ffb353084c5d3af61eede7ce62dd7aab02871d743a3a55ac5c69f9f5d9d438800d6b7b295e7152303bf39464a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca825f96d41fe53c4d91bda0815fa835
SHA1d2b5fe447a8d87d120f482951d1304e44d6590cb
SHA2567f782b564042406131e054011a53227019a9f425157c19843fca8e10328fecb8
SHA51262ffd9d8fb8ff4175bdeadb8ca4eba807686635e57ddb96b1b651bfe216d919861b535fc823a9222cf521638a5bb874e416f9ecda1e0ac181e91a742f37bed4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b86eba9b17175f8050e34ea1b4946977
SHA1b1b520b2bd3e0b514ff185ffbd68ae0fd5b8bba7
SHA2569590fbe8196895045e983b39a11c5cebc863b5500783ada163199daffd2cef9e
SHA512b2b8e7b2b98ef7e2020e239f638bd410c38ba4e4ca8c196db532acf16d9f7d886061e6030c932756bc7671de6d5138e3aed2449da2761951998b0cfaa347256d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532b494c03dfa60245788ce977ff0c02c
SHA1fff021ec4197c6161d44813aaf504538ef310369
SHA256bb467e842711991a3659d26dac6a361125e4a5105e0ad0224486aed6fce88584
SHA512363e128ef3a4885f4891184a8ad7b0b30d4dc3f7c10ea92cb3e141f60cd670ae7583addac3ac6bf3fbb2664bdedc01dc633861cc0c06eaa5dac6f2084ad4720f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537c788ccb9a6b0256eb50659fdfda385
SHA14c526cfb83b1104cbae7485d83c41e58d86ad0aa
SHA256171b2a86eb946c64268930b94ae052f9f67d7b2ad8ecf7e0fa9ded6ca2b01680
SHA512936677c3827f28ca603de40e2cb76cd77daf617ea75bf72ae5def3a94fb1b7c2795a6417b82fca64be9f6b72c78e2c0c1e3762a3d406ce6d0c9a7a1b2e3e7e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e9c53af08792c75c152dd3c58c31446
SHA184a50e612a51a657b35e001eb9da9a2780c023cc
SHA256ffc94310cc576e3c56b93bf73d9b574cefa7bfa429e14d058e82fc784bf4e25b
SHA5121181bc369a14b071447ac161ab30f307169501d2a8127736496fcdb4cdcd876614ebfef1512cada4142c68342fe177a5fa86b07927809956170634aa6d19ba4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563bb0f0ecce121b569cdc6bedcd64366
SHA1e63b6d84811ea3e890cf75e919f794ee603376e5
SHA256511fbd267dddcfe1bdc5953ea789b206299e7d4469922bf8fef8edac4ecf24f0
SHA5120541660d6a16ee26bb34acd6d34869eb0d7509a254697268797a96cb56f91987e0a3ff0e4658fcfa586816a6e9494ec05c32cdf5b3fe5840da6ce0717d91ed65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcabd9622b414c2d359409730a5a43fe
SHA170ccfd4fcc8df92e969805af40585b1fa83ea28f
SHA256c9c48a247fd025f3658a4156b47388f66e0463273acd9ba89ac8236e254510b4
SHA5120f24fbb53456382535eb28ef5ee52d9019bcb3433def27955f79f9a028304c2b6339ec2affe8cb92c928b89fe30e6ae5c40cc7aa4386413f009a570e355d07f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b48025da73c30e50839ff3399663dc44
SHA193fcad1ef790803de457f81cbb9883f03ad25e48
SHA25633c8f84221f1c8bb68d31f3fd17284cfc8f605a05589ec6ec7ec1411aa7f4e45
SHA5126d6cf9be33fedff1be78c06784da448bdf8903e70b5e2f766f233369929e4ff31e953246cd6e9bd997dc0250e4c25c8d71b3a0de1b83e7c855efeb2e78327d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b900f7f35d22b4804ff6795c2c99515
SHA15546d0a2fbd3012eea6fc30d205454c564104965
SHA2566f9a044b60c979487d0e9b42639d675f8843788c58a335a4c4cff74dd963c931
SHA512ad8e7ccf0253f86f47861d3ed371e235edadfb243b615d944e6c0daa90a8c95792849640ec6ac67e52019279ae4986be18ebb6beae17dc669197fc835a76b273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de9af5fca451a7475609c371ec1a97d
SHA1afbb1e4bf8c700610d51366c2f6474185a9d7b1f
SHA2560e03eef978662928c7e159344117c56e8aa77f7510fd000ec6404d800807761c
SHA5120ea0d0ef3ff5dae5bcc05e08693134820b4c64cdd41cac2f27c1135217bb796cac44f37e3406bbc33bc48eb26f2cd88d1427e93d1d08c7af58e5bb4dacf62926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ae297f8038f18d3b5e32925774cf05d
SHA1f9f343441a99af638ebba3ecab4e2397adcfcc1b
SHA256f14ca9f15d9a42c3fc8f4874769a0304df06290fbbac0c2daa2e7676ded8c589
SHA5125e0f3e140dcbc67d0cf099a8953e66bfb0e15b5bfab749f5fbcd449875136b2f58fb8389bce6ae7f749c00fec182c8e439ecd52bd60a4b1b62f04ca61792169a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56de3c8d979a2e1b9cf0070c034b9daeb
SHA1536a944af2d381370bc8b16b9b181554605206cc
SHA2562191f333a72e1100473f5c34403909fac3a977c991bcb7b852e564efb6a8703d
SHA5126a8d7bdb1133b359b54690be308db7b33ce49ef3437e44d9784bdfd209bedadc5147c8e97adb4c08e779895647c0d3e61860a00e7099b4b6b604836ce1b725fa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b