Analysis
-
max time kernel
69s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 16:36
Static task
static1
Behavioral task
behavioral1
Sample
39eb819f981fa2713cb2b98fa386dc17_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
39eb819f981fa2713cb2b98fa386dc17_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
39eb819f981fa2713cb2b98fa386dc17_JaffaCakes118.html
-
Size
6KB
-
MD5
39eb819f981fa2713cb2b98fa386dc17
-
SHA1
d037b863ef05ea60ca7938e8cde44e1478dd4aa0
-
SHA256
da5599e01e99e987e557168e41b56c2451390f9ebceb997a7b548b0a00e79851
-
SHA512
6cad22149d2fbbdcd4b29bd6cc2bacf16eb84fa4725a5fc91cceec472fc8d04774bca79b619cb1eb6bece0ca00672ceb3f5edeb8893f482f44f59fd10857983a
-
SSDEEP
96:uzVs+ux7DILLY1k9o84d12ef7CSTUqocEZ7ru7f:csz7DIAYS/Mb76f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000928688b482047117183ddeedf3893eb2061629267553af06191671218383f40f000000000e800000000200002000000035cbe8f32962c374aab2dc8f2ea7dc328e1f6131ce5f54fd444736ea54f5805320000000ff2a4363555c662c22412351c9d4dc054744eb24362e59c7725d1218a1d84f45400000001a8c59d21a1bfd010f9baff09720c7364d618588c3aad7f1e1ce653df4178311597fdf93fd366f4ca6c681b4742d3399a4d1536033875b977179f4b750ae6045 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426877663" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70061591b0d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BBADD6F1-3FA3-11EF-BD1F-566676D6F1CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2732 1952 iexplore.exe 30 PID 1952 wrote to memory of 2732 1952 iexplore.exe 30 PID 1952 wrote to memory of 2732 1952 iexplore.exe 30 PID 1952 wrote to memory of 2732 1952 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39eb819f981fa2713cb2b98fa386dc17_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2665cd345e9cd109a40ed0d099c5099
SHA1350b0727acbccd85dce7918a2fcee972cf415f09
SHA2560856641a2a79412822c7a44d23987f7a4720309a0552e58572793eecb6549f30
SHA512442afa395440db633b049e56420201b6e2cc04ed41c4d524bd3498cf0326b423bdd0672ee61074b2361022bea538fb4bf25bed2df58565e5d1a1ffb34df0de4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d56af4dd0c50179b748cb9a3e36a88f
SHA1fc7ca885aaf0b6590ced566905895d1523b44e89
SHA256b892d7f94f96284b2c1838d131c5c3a6671137b29f6fa8a01937824c896436a5
SHA512b77c96b2479b19123bd7f66558ee7262c3c29c015dda5cb9047abe1e557212bc50dc2e92179c9d755a0e7aa68d3c217a9a9a567df21dcc4eef237b99370a5554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55019545679491da43eeedb0c1dff828c
SHA1b32689c4f01844d0c6e3066fe89d8dc367565bbc
SHA256c6e6a239a9f256a99e2c9dc9e3e9b0837d086f6c41f32b633fdc597de4b13985
SHA51243157250647c9211d893a5434ca78a41fb8f12c973feded401d8c144139a5cc5c60f294e4d91aad90edd9ed518a37fb3c6b712d6e7097e57e8fbc34bbec2717e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b62bafd79fbd458f1d91c043c8071fbf
SHA183dba403aeb7c6d4c0b3c431e60390f0add50d10
SHA256a44aa3381f9d7230b816014a9e203c2adc23bc6580ab91963346e135fc27e0c3
SHA512d2ed2a96f9302dad28ac48a9f9eba96a6ff5e485a237747dbdeab6ac5630fc656cafbfd8e3e16b2eadf1370c01fa23543ef45c41fb99229247060c85f6f46339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de7ec48c6cbdfe4fc9b5126c32a4dcea
SHA12a7fed77f68ae96ac8a4c21afd666d9898667e1b
SHA2560afa9b20c8804bf3097926d0996c9cc5f0ca3b845a2b35875307226169d329d0
SHA5120a7fc6a87ce059eec1bdcc6e3070be8711be115116d6970cd3d6f1268f45be7b48271e85430326f5c1128c72d982062442131f7ca81b13baa0a9f4b991d3e8ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c298cbaa69aa178eaf955a24deff6683
SHA1f4fe3a2a460da306ef6b3ef16b73ac2b20ac8f13
SHA256d094cf4ee76354207ea311f9686b1c61711986f659eef834b812fe84b99aa80a
SHA512f617424d12abebdc59f2e373f513d2b120b0489a04db2bcc60bf4ab3eee393cf386a3c836ec629068b94bdde505c7590795b07a355329f23edfba83d1b273360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5365e9c8ce12181fd21f2809ff8983424
SHA182a37a38e6f4df7199f8c3783285072c3999d52c
SHA256a7c5695a8f4e628f215357910f51690d6e8d532f92a90890dc3e6e0e8e79f344
SHA51277a2f6f0b8426b4a257ba7474c92e428cb60cef0fe6b6c0546614b2d5a4175b949dd449713ada918789e97c1fada7277e150d5b5c75e71b835b365ea812942e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f39532bd222987a181df5a0bda885f6c
SHA1fbb1277e6e30c2119b0bf22f5ea9d882f4f94087
SHA256fe25bd9cabb1c191a4e71ed79fed96402962cec77bb428369215f6d7e9fee2d1
SHA512e3dc9b9fbf1113d50085b4201a7c874714d54f394252866feb508c2fea9511b0f7bda8e6f88419f43f58a982c30254c7feb9652a30bf040fc628e70a19e23fda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588efe05ef6a89a0d4ea47e7a3558bf03
SHA10c316b23d694cc4a552d3c88ee318d88a7ef9f48
SHA25682629ae91772a6b7f644edb247c2810d04492fd22cc20c9ff5d05af3cab7f607
SHA512db9153b058b7bb58eccd6465adbe7f54797ea3d8df01d40dc28d79acb5c70e27f18a821f3e4debe4d457dce459d7cd974a96ecdd4618f403972f2235aef31e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50915d4b03413ac5440e1603350712baf
SHA18db06b90ff944c8a5ded08177af5f37b98b93f74
SHA25618fb26ea0b0f1e784d73cc85ccf9c7a14d363014bd3209bb58b476f1a5b418b3
SHA5126c11c8d021760a9b16265aad5826b3ac3c91e4e1a3d3e50b2984f0cca3dea95999f870a9ddd560d7b59319e070704d3a412a003ee428d72124f8a3da41ffe50a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507a141aab6a7296790dfe9b7d9e74c89
SHA1f5a76d7ae8cfb6a5f68cfd866997d6e0463623a6
SHA256cb832c67a5061e84a844a9434a592e4e98976280661a1539cd86e53ff5197ee3
SHA512886a8db2ef2d504843ef62fb391c4791e730d7dc80b9eb525a5c7c2127cab6d794649dfa1e34cf2d4fae3da0edebcb556083027247165717853acff7f1bdae66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b18cfd1296df5056a25edf1fe2e55ee5
SHA1f6692ce4048c16b0ab4826d5973a85c6081604f7
SHA2569a6bdc6a95b4e364b913699413a1dddec5bf977d2b7fa73ddb0ce2b3c2093a0b
SHA51280f59978c89531508e4b0bb11f2b7524bdcbcc80dc700c490ff755e8c070c51a45861568fb115085e60e77f699ac080f21048cb51d72f3b888ce95612ddb7ce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb517854b58359233bd3e4c9392ed47d
SHA1cf3f01765c44fa1fcb88daaaa7353c7e0297b226
SHA25635c09d7083ea22492281fb9819982fa9c029101edfba8a13c6a29ded6a89a540
SHA512b92ab2a4beb812d79a7e60abbe36f85b42d93f879e082ffd9f2f86ad3cff5635f34e2e0431fc2d07d7432800afa32c784c41fb87e27a3716543106cf4e85d49a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de2b2372fdbd7cba562b2013d8904a8f
SHA103c8ac8eee6e7e7616b1bec348daee2cda9bab9f
SHA2562b40444cb4a466898c6ce0b0fe9c36a6b5ff0ebebc78a5d78fa8d5dda4b0e5ac
SHA512b642b039550586a75c8b401200e3f3dd3646eeef215ff7ceb752dbf749817019c0a898213855ce318b080e36fd97abe287a3929a35ff024f45fb2473114b9a6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54640a3f60c9b0c69699f08c85d275aef
SHA17ca8c0c846e0f638c530847a5f1f093771594617
SHA2569d18be4d8a7b16400054dabc53e599303efdf001490465e015ad374163fc1306
SHA5120fa257026580fa508f57508af8a023532ba05625e60522fbbc3eff873d8ba116fab400487104cad55a2c544e641abb513c1449eda5889999fd34b9971ca44d66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f85bcfc482c9b48ea849585a4fec51
SHA1f383ababb630e2ea2245f16998192214c41aa350
SHA25693c3893f428315b6e6b0040896f822c3db0a468dc6510f76ccb3bf92c602a21e
SHA512b07d709bcfe7cd53bce80910fd2f1b47a900271ff1e61165109f1f98d74bf8ad4a5b3524af7cf5c65c50347a769c3726755c586803874dba18cbfb8e37c92675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5765a1f3b006cd04f0d91155086d426b3
SHA1a51d64a34e469e6fce9f69f39c8cd07548971b76
SHA2563043385a414dfab281c430296346f15f17304031c1f1da8dcddf21f223d8775e
SHA51203d58d126f290806471a6cd8c4987529cc3f5aebc452806214ec1c127c5352e7a0104e17c173995c79ca492a97a23b742ef3bbd32250712209f6805057eafaf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59300555e8fe0b20e0e030273af1d514a
SHA104518b7f4337e1aed00904168f6823bc1d7ea4ba
SHA2565949c02712335845ba326b657cc280058d9f1e11e654d8e603ada7038838dd79
SHA5128cefd7d47f0eceff35c31b06e0e9e646921603b80dd91239c50b4bde89ba58b4e8bdf49a87f0e08419c9d0e0b444dde0539db1d75dde491fc934dcdcfcacea5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e11b6d40872a0aedc9ee7ab767bc62d8
SHA1c6d06ded98d73a6f28757520bfcf607e4920784d
SHA2567ac511febb4b07e27c34e82e99d2671650a81df4edb491afd6b19c1b15cdf127
SHA51241239d3a18c7b4912c03702a09503804bc04b2ab8374d7b247c95d2fb4d1a67a652dc1099b41ac1b516ded42339bce283388d7c270794e97e394f432365986e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7dd0fe77dbc8e548842dc47a17a7fd0
SHA1fec5cdbf6273cff69bbea663fd8088d1f65094df
SHA256d8ea67f07f034b30c22ce9edfbe29053d0605ce393420666940362e2402c2c6b
SHA512ce840048ccaee29bd52740da03d640e72869357092a35b3f4ece834168f1f2a51784e03a1a358656a1d451cd52dd5c4a7b0de91397eb0a080199c48967fd1ef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c9d687953c92071efa360fbc981877c
SHA163d934d5a609c47377d52ffa7adc5ae832af1052
SHA256e10b5ace204a68bca5d7ba8b06fd30aaf8bf79a80dfb211759d2ea6215f943d1
SHA512508524dbaace8d2ce3e9c6ba4f6988b8ba5d6469299a7d321ed71f6213b90eab48971bbf120122837646e66314ea2faf29935b183fefee7ba243721cb24b7207
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b