Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 04:10
Static task
static1
Behavioral task
behavioral1
Sample
2ef2fdde1fdfdc1ea073f6fa30e79a65_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2ef2fdde1fdfdc1ea073f6fa30e79a65_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2ef2fdde1fdfdc1ea073f6fa30e79a65_JaffaCakes118.html
-
Size
15KB
-
MD5
2ef2fdde1fdfdc1ea073f6fa30e79a65
-
SHA1
a7a52644d58035d022b608ce17a97d7f730e9a58
-
SHA256
9489a15f9b9cb2a457da898678965f57f478e821c64072aebe8e3fa521daf23b
-
SHA512
2b200a6a61fd8d5d933618902fe079e6865dbc5044890913dd1662e1929872343cf409810c376ae5a3bee9b3b0ec745f361c51c0c82dc71052149116fd1e89a7
-
SSDEEP
192:JuU5tMEs3Zf6S7ns7g72w6Zg+zBv1g//zLzwifX9OUigVXk/rMenK1vVjdvr21nL:aDsMSNOUfz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000003b4e23b39338401962e1d45f716c54e32a61a4a34b06b6d7cd7fd56aa34bfbb1000000000e80000000020000200000005995da63177eb478c5c43b1055f56715be041dee5bbbf03dcbab01c14f99dcdd9000000050e87a49d72b8c360e3e867f0a77d2130fd971bfccd457c508227d064d5f738b1ffec136644d9fbc4db4d4ffbecffca2c96d41a52891ddb4eb722a83e958ecdd57eaf17926412df3d0b83e371d96806a85dc8c584d42ed5eeb6736a2a6d2154785a80d711cc072f46674b001603e99868a75b16f7342a723a2fa6ebc9f79aad0895d6f7d19d3425cb4167e6eea9debcf40000000019936c4ad656204402bbf12d6ff7a01fd01a6e620ee170c34407591cabc62c1ac0c26c03a2267d579e76f2aa7be903c4317ec61352321bed3bc8fd3e1052c57 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08ec1f0dfd1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000004e8f135da4cbe3b6c6f6d297395dfd146aa078664830c97e578e9ea2d287ef04000000000e8000000002000020000000027a4a793071e0add45efd011f03e058e3b149edf0d0946d449ad5882b8622432000000001b116de69991952be3f559c3e1ba7c4468d4722479083f3058ffe7277bef91f400000008acfc171ab98122771f76e2edd4c4af5038fc4ae2461a0a8be45da05ab232fd77a3fb4ddd313508dce30c27b1977d55843d9dcf48997a1946703598c0356c167 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C42AC21-3DD3-11EF-9CB4-D238DC34531D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426678107" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2916 2324 iexplore.exe 31 PID 2324 wrote to memory of 2916 2324 iexplore.exe 31 PID 2324 wrote to memory of 2916 2324 iexplore.exe 31 PID 2324 wrote to memory of 2916 2324 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ef2fdde1fdfdc1ea073f6fa30e79a65_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573c022dea4ad3f4ad34b2c55bd3f59c2
SHA1fcaa960ec1e1ba5cb433b89d9e1c89eb7517a1d4
SHA25629685cd3ea17c0e4c1bc9b3c969508a502b5a843bf28cd60fffb298b64f501e1
SHA512da9e980c88fdf5361622d668649c78cccf7dad83e9b8b8f137182e5b89078d2314e6dc37855bef59007f09fb36d2183b8ad6b600a8b3a482b703e7eec29602f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56291906387f2d9cb5ae4fd14f6d67cad
SHA176f1bc4e94fcf7fa8d3824b17381045f08ca6721
SHA25648bd1f34a5b119ef84a2877a7bc056991c669d6631d4b8f29bbc960fbb30c67b
SHA5120cdda323cb9188ec116375c9dd3dda8dc5aaa3c8df7016f446e1d26b59db67d52f0470c2f603ddb4a93f886aa121d0dbaa0bd530aabc07284d9fec7665f73f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f6518ef49043d44896e973f62a3b00f
SHA19d8ed7dd8a9c3fc39b087cf7f7c8e63ad5caf647
SHA256589621e4a4055cd47f459bd0c1f317358aabe9e13e9e592d3475411309b56867
SHA512c0a72b7697a0f4472f4cf9d3b406fd8bb1bb1049bd25ec16c5f658cf59da52b7440fa55205d265bcfe010f57240c5a2dae28be46ec480f2cb01f9a9b135fff7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555a36653b1086b6a9ee95eb4a4092be1
SHA18a11ee2b708014c92629c678f214c92f70679451
SHA256591e555e8a4bdd74f5d883b475bb9105e647b9104434b5a7c52034634261cad5
SHA512cfd396abb128376d0bd78dc1c2b1557aa3aa7c40bb01c25fe7b4e5218df1f32ccef15298fe2cc503abf91f176de8f9cb1fe890239c3dfb596161cfef4dee4e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56757cb5ff069d591564fb14d5bb38d97
SHA13896bd8d6de41dd3a2e0ea90765824ed29d98fec
SHA2561af9b01252b28d1805bae1ce1c09a06fb191d7a3711ead1754de503be05d785e
SHA5124a7d53663fe0ed41a791117ee9b33e29c620907dfd823fcf20f509365db43f9f8bbc2de7695a8b7befb6d14d6074e0a3b592bfbf584e1c3a882020f42f3cad76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc3fcb17e170aec9f2bd3bd1ea81532d
SHA1a0d2ecedc993b254315995898f8777cb7f15af82
SHA256cf3669a21dc61c377558c45fbc701baf513a5008584defdad5a53088842aa3db
SHA5121d9dac562ec28b83bab27345bf8b105ccaea069a34c9d0cd1d5159e71a3fe6497c881a1885f17a5faa20dbc688ffcdebdb079f338976add9c228fd260efcbde4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57da794c29b42e0ce069691d35ff4c52a
SHA19e0feb5a3089774f09b66af3e44dd563ce7670ce
SHA25676e6a751d78afc49d944e6b2ff9019d5dd90048b0354072ab56e2e7cfb3848bd
SHA512eaf1b9ca9be2f09fb09e19ccbcfed869497e54043011a3ea2ad73d56c7c69ceedffd9eb1c2c0fc67011826ed410eb9787c36e7cac44c0f926ae14886cab03a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f07229d17cc0ec5e21a0143dfa31bcc
SHA1bbef09e115595b09a9d5d851d8ba80b1e9b43b06
SHA25693bd5d7daf21ccbab0245e0b3ccd7d666e42575f40ff7a373295bf1e189a7270
SHA512c2850bc34f331b82de1d267facf7f97cbeee0a1a3cbb33cf396e6dd614bca425fd497d509a29adbaf80e3e938826415b6f18729ae6800786470231f4e4775b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5615adcb04cce7cffe631e61794082366
SHA11b54e5b874a935fe6396eb4d6f4ad3bba5d3c401
SHA256e3b912a59ae259141baaa81c0114e4460a4364149c1ffad30d08d33772798fe9
SHA512cc41524e4e785ff2768f60a3f931be9d0098ae5cd25f7b67dd7f2aea0d9c2f26abc24ec097a419b4aabae1155a2dbd01a3809b6b5f46b9d7fce405f704baf9c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8209b770f8558530422c49466d6a094
SHA16400d169d4c9b67824e25ee7984fc372465bac81
SHA25669cf3967dbf61e39d65be57083ecf1b810dabe7bbcefafc4a88d38e61c06606e
SHA512249191b391c9a58ebd8c3d587cd3490c1ec6c2f4f5b3ba3ea07d96b5ac27f00e137d15830b3df72da70a0f18923c12243a8ff2a0c854d061be7a012f946bc679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570242279579e31de61bcc5c9597e2ba0
SHA157484d03318703e8d2d3851f178b6e2f95b545b0
SHA256a64d7218230b61ee7c8b6169ec2fcde4b72ea17eeed67f67e22537d1b0bbf87c
SHA512f9b4de32c4883b45ed2ce2f5544804b54fd0e9bcdd2caf00f4d647d776560ee1f9f1649fe4583a4978b9ab1085438b8e510d6aa2a92713b52a81d6e212e222cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5817794c6ee2d4fe3cd065f9218b0b426
SHA1c7f6d57c6369b06e6061fee6254da36d60105d9d
SHA256eddc5a72716043d341c68aa2bb68b40636b5dcdf9a3d85903f25373945ff7076
SHA51220028ea67f86342d32a36bf491d6369c4c56a827ce65382411b166bad8f23e96894f275e096a0f778aae0678fe9226c1a5c91a8b13c7aad3cecfe0736cf4b51c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52548fd99bb09b0b199754776ccda9bb3
SHA1e414b528de713b104599f92782251a2bef48227e
SHA256b4b1b35bd3e1b8250397e221f507fbb2f57cbf5460b885318c841adc0372107f
SHA5121d45708bbf03ff0291de2bd578cd182fd5eea85b0688ea13d6274cf0db62918af1232e44e933b62e8c8346f6b55ed757bef0b224235a10e0937a1558b240105e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c0f19d69433f11a79326f7bf0e97545
SHA1cd428408370979a5ba6d581b828a29690a8f7e8e
SHA2560fb452dedd5c2871188c4082069d89f81ff75db0c0cfba6a378ef3bed46eea61
SHA512833e82751140b9d103f374065d7184e6f5a283c1b7d61849b4d2d515957f7d432957fb62003f5ff7c7ea10322f317bfb1fbac76289973a77a7a20397ce16fded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5196b9d64daf539123e098b5a58400e6a
SHA1fc543cfbe9d8c894ae0a89a7a1e874e0ef164aef
SHA25697fe86db4779e9029c1a00e90fe89a892f17b9dc7d9665d00ca3fee7859b2011
SHA51211f6c209f97557d53f625b3f92b1f9c201581044ff9edef9eea118e2df3d0872aa232c0f1d758aa68358b9286966be3f8b9dd7ae2384015a9fc729b289448852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548c72a6f609e46dd3636224ae539e7b6
SHA1dcbb953274f950cc4572bd25aee377191e94356e
SHA256160c283939408e4279933d90d43a9339bea95118d00a1e51ecdb4ebdaa552a33
SHA51230bf6211fd02174749559d440b28252f581ab868189fe18b11ad9b12df67248676d6cd087baeb27f47846a0106c5e964e87c9961f0c9aab8281d3533ef4526d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a60a051df367e83e562c65e92114e563
SHA14eb1df9803e7f90e0d1ee45a20188e4531365f35
SHA256b26a2ef9d13bf3608f7de059faba02dc1dfd7f15bca56abe313276c81a55224a
SHA512eff3e80064aafe7b94a7d3e5e584bcf013eac8953749ad45c93f41844f1f99975b5dff51e88e47d766ce400c25989e7ff5da4be95d3c9fbd706e0828e76b9d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52af05d22255f60b977845ec9e2d56b80
SHA14b7ea1d1f6abe8cc7a1baa50b6fd6e48454c1422
SHA25601a3e363e79e0fe1447399da1c8fb9025e8ed124a1bc37af9f392e4ae5f4ddb7
SHA512fd7a9268a5d4671af129b30c9127ab656645e446be6cedb6e6916c57d93449073983aed4afe6800b630b36790be834d2d64c8c9652cd37d4165e28cbea28545f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1f57e7691bb5e055fae78cc09c363b7
SHA1f98f387f91e3f5e5b3e6792cba439b98c12abc2d
SHA256d2fd7c99785c5990f211c791c174aabd79589e4d0a1299d8ec9e4b38c6830bdf
SHA512853cd40c69067ea0dfbf8896efa7936f0e0b62334788445d050227251f10f330938e6e1079d3db52381c59c9ac28b022b3b6d736ce7cdc22998f97025fd9aac2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b