Analysis
-
max time kernel
68s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 06:18
Static task
static1
Behavioral task
behavioral1
Sample
a9eaf5004b267390d1e8961bd3d8fc67_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a9eaf5004b267390d1e8961bd3d8fc67_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a9eaf5004b267390d1e8961bd3d8fc67_JaffaCakes118.html
-
Size
53KB
-
MD5
a9eaf5004b267390d1e8961bd3d8fc67
-
SHA1
06f3b9f4b30deb85197434e6e656b2814fb2902a
-
SHA256
1819f273e1e0d9d2fe23db9d0cfa52cc278f245b8e994a1dde1e1c906d3c50f1
-
SHA512
bc1ba42028799ce77dad7b6d83325256ec21898ddc65ddfc731e3bf0ae4e386cb80b2e3b37eb2d60eeaa21395792a3467e620bbe3907e6bd4fdd01939a9a89d3
-
SSDEEP
1536:CkgUiIakTqGivi+PyUi5runlYV63Nj+q5VyvR0w2AzTICbbyo+/t9M/dNwIUTDmd:CkgUiIakTqGivi+PyUwrunlYV63Nj+q+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430210204" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA19C181-5DF2-11EF-A17A-428A07572FD0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4037adc1fff1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000f7b340c549b61309088198caade2285c9000b1451f18ed8d9b0569ad95837d9e000000000e800000000200002000000036c278066d16abe389ca8042c537c0dfda87347991140bf029042eeda340615f2000000073e272e6538a9958c226b71500ef547178d582973298bf2c9d65fcf796f926714000000051d4e458d935050bf9ad23d566a7dcc36bc47c339fc7a32d478de7b3a12627e61bc35e4f4ea444b801f1fb67cc92a86096ca8bd9f8d730d10d285aa313404f1e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2724 2716 iexplore.exe 30 PID 2716 wrote to memory of 2724 2716 iexplore.exe 30 PID 2716 wrote to memory of 2724 2716 iexplore.exe 30 PID 2716 wrote to memory of 2724 2716 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a9eaf5004b267390d1e8961bd3d8fc67_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5775a4907219d0bc90c4f9361c540db85
SHA16f9d5a6f4cee2f475b30e383af1883799186b3eb
SHA2562de366c5ded60ab06507be435418279f79581658db64f0717c9a1fc68ee68fa2
SHA512b20fdcd51f36d8202aea4e862243577046fac67ceac48eb82bd5656261e0237c9d8be76480767db446397e38d10d29e35a3dab06913169fffb453d40293b4b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8e2ab09c86b73323aa0c7daa0e43358
SHA1572f63b5c095debff3901928e85caaf5405c52fa
SHA256889ee95996df890125ee53ba54b786d9ab858fd4cd5a408cd496bb83eecb14fa
SHA51230228e38e3416f34e15e53f5b7e346008d2014cb0fd0681af68c1f32b027a433fd9c9e8ef601893ec2b4600c65f1613fc8a4bf6cc623d9de87e9c6072333e422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bcce0e17265d9adda56bdb253c45853
SHA1bf2922841076645d7582736d94c7d2932658d356
SHA256cd899c1a8666e0c5230933bb589c50413661906d0f8df5a90c40952d93865d20
SHA5123204603eee45fc076cc0964ae8a113c869aea158197343fe05fee1ad93b8b973e562abf23bf2a9e3f595dd41f4bc1d7569f74bb2dcfd164c2841e841646c18f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2e02e02e232d27187cb2d991d965d9b
SHA1de76e8e16eeb6e06674ed0d4c322c64aa2b44980
SHA256471334de1d5b52986529d4a4a0731c9e9a4f3bd870ac6a837fa8de0f09fc1c4a
SHA51254b2b1e9789b5a8fe3c17ae4a567c32a6a0bb5095583feda9aabedd27c4263d0a642283b7c54be64bdfa77a8355dd49f8ef51f912437e95742641a92be88bf0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5061fdcff96b307e8fbf388bc13577739
SHA136fed1271d62bd05c72ec242f2e4b7ad914acf06
SHA25659d3ab01b7cfdb5f29e1859a835db9a9c0a9c6d7d2bc4db72da9651d123d7078
SHA512cf9113d1a2cdba238c6f40b6fc3a426d902bccded097b3c05f4fe09e11a948163bbcf038c0984b87508f0970d7b88fd59ff7f3258522659ab140d39337c21b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5492e40ae7dc962df1f5b80d281d8eb01
SHA180a2782327f695af291c183e9744f57c0725cf71
SHA256ac1787e523ca74ed51c6a72c82fbe58869bd64bec846b0f1929de42d037d0464
SHA51263eff21d468b187ef759f687132ecdba0c3348f9c6fb5cfce2394dd1863f4d86e2991628a4f17ce8188d249e7abf7a6ba642991d149745b89cdbdd8e38ba1050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c357e12181d97071a293d5e978d9bf91
SHA10d2c32f41e6bb611f8ee18a9934432fbc51a39ff
SHA256e3ea42d2a4cf65b4fd34e1c86d2c904373f743fd3a78cd01c6dbd3021d5c9480
SHA512a553b6b9b7c1fb1253872c3bfb49606a6b7f3bf5368eca71be5da4610895dccbbea19c20a4d6944e1af4bc2e0d820df3347b9cd73dafc914359d9ee0b0e18b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fea3e8f201249abaa20e1427def5a2a6
SHA19f0397184c446397850ed4c1755eed789941c0a7
SHA2564c5141fa1f4806dfdc1a8d0ceaa30e6afc28b3d5ee16bac327497e84f41ceb02
SHA5127bd7518fda737c74d1bc6cdc28357e486cd0d86d98e4c53d5854453e4eaff1616564259bc8eac7ab94a72fd7939074a5ac74ea4d49e9d9f2c613439bdbc25823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a38996af64f5ea655175b3b4c2f94933
SHA19cc494d801cf7e098f133e01af96cc78926073bb
SHA256cac11e0a6cd2d6719ef3bf2936c30a8a26d51a2ab90e2cc8c906ac2d77501628
SHA5123b4c4654c7d5b79d58d0662ff0d1ccdee810f236e017f14423d7fe998dec4da708dd80297cd3ffcd9385b243c34ee1ef3a58a7ffbec89558e67d2c8aadf94a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571d5e9a3fd07ab237673085c4317fb93
SHA1658f71e8f7ae3a5b662a8442a04976d438925e53
SHA2568d30c3c76c6f74f2b6768f55a0f0d255ceb59f8ba2da867b753f97870b8cb1d2
SHA5129bebf8ea99361d93f3cebb3dcd7168b01ecb182a7d8cd3cf0bb36707e7c3fc30f1a452e944cd419e63bd7a04c811f41c949808d5871ce0f1040468b4b5a44aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f54700422b7f1b8786f6ebdfad1baf
SHA1ccbaa21cedd938feb9c5f38ac5af68d456880caa
SHA256b411dac7f73d9a2d58eec0e12b162411954ddc948f3514e99ed0aea5ff4901ce
SHA5128e0889e8fcd815c325a85e6128b191b5799a259aa0fefbbfe0d74b9dcdd7b84e5bbc0b395174a1aed84f6b33ebb8f0c8c41b5afae5d15e8c59bba1e7e4e120d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582dc9ae0709572c5b00cacd3ab127c13
SHA16ce93df9bf57b0296d817a75fc01c403dbd6d21b
SHA25692cf98122472d16a50d526f109768f67383ae322ab446bb8f4df3179f59daa07
SHA512261d307a57c730f142f27c4813f1429d3a0ee5b71dab2c9671184670a9776446a5cad49dec5375f1335c5a3b9f9691bb0f07d2af88b5ff44710ccb184f2f1c06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5906e0174980d6602d7ac6eabdfd78c7b
SHA14eb3e036e45d41c67e015f15d20b3ee21fb69065
SHA2569bf5790ca8f3cf5863a32e66084f03931c03c498528bd3c2374feaad9b6a9322
SHA5123d77d89ffb0e8ae8678bba79b66219e42dd2d62ecf9e6028bda6f0b808a7f23f9dceb51e4563eeec293405311c0700f123a260c7a8bb37ac8e57c04f1bc620ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c707cf9fded853e71457450201ff4f8c
SHA13afe7db6fd91fb53f3d206320c6c96fd4f388d78
SHA256188630dfbd6e66aba98e89d70a71444b1a1815202b883f55ff9eb0eec792c870
SHA51211c66cde07df478bc21f311bd7855a5ff2aceb2d6195f0814a023716af427667569a9e2838bbeed631aa6f65bdc6a909f77c4225319fc1b611a96576f188d91c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503f8bdb34dd677927f82da353e83a918
SHA108faeb4ce7ab7c8897a2d76c869a8ab33592ca48
SHA25665ae0561f9a291aecbf81b6004723d8fe813f25c7c5b253e6b1d6906937ba3f2
SHA512fbb82fac34100b8f4284f694d39a4fdee53e5240f91f2224a4a1c7b4a12bafe8cf63df67413afd68fb99601130fc55267895925873bb59fc6d19e34b8bbb2e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5266548e73de9d0185264ee3e047d12e3
SHA197911670396bf3222811557f17bcb84b76deb142
SHA25607f1d6946b276f8f2a39929bbe220f486e9c6924a308f04f2ee5cbb1a806cb11
SHA5128b431e60b6ccb60d3bc6916c8a5e56c6aa4e70e494acb6f8cd6dd41fd603ac00451fd611e5d1fe7617ca2d571006726d24ec5f3a9a0b8b045b94e79ae33e6028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3feebd3b858e7be1b9f062c6e3c7379
SHA1a550c833bfdbb15e8988b7fb9f8cffe8fd978c3f
SHA2564fcad8ee99b3fc4f46d6e921d4e1949758136e47fef4f66a0181346ea17a3c3c
SHA512de4c56feffee0fa49ce77c6a099ce9613ce2b788391c3ae0f3dbad2659476ce8a080e2b92cc9aabadf88d83c2de12501f9e00c7ebba1507b5cd175fbcfe14690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562da6edf4008118e0627a336b462e1c3
SHA1909034dd51a23edd05c2ea7adfd2bb77ecd320d3
SHA256ff69841cd5a81203705f26bd69e82823e095433ff43a56a8de2649d4bb876861
SHA512dfdb736a2ecb938acf765fef775580f8539a1d6b17f1c5050f2000a127e9084810c6b7bdaa868d489c8ca9313f9ac98562576f9075b9962c04d331a904fb15fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb310744e6d317560b2262840534f1d6
SHA180dad32f58533062607b0813e79d8181fb0bf9fd
SHA256c9b910346d76ec362d0b50eda570506da03e5edff05438af81a4a39d5003d1dc
SHA51215aba810ceeb85caffef26cfd4e752979089e7804d6ae974e531a9b88e932e5aacbe0e7752573a09a9b0650050ccb5cae21ae19cbf3f880b6c33fbdd95655148
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6GL24G53\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b