Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 22:55
Static task
static1
Behavioral task
behavioral1
Sample
c1c24919d3cb7e2e4e7bc8002f97f533_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c1c24919d3cb7e2e4e7bc8002f97f533_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1c24919d3cb7e2e4e7bc8002f97f533_JaffaCakes118.html
-
Size
1KB
-
MD5
c1c24919d3cb7e2e4e7bc8002f97f533
-
SHA1
3ac0abc68f9178c2a83e98298cfb7cb440b0eb9e
-
SHA256
fe1afcaa459675679100f03e8f4ab2af096c15e44cf0bd5cdb24c5d5673a4af0
-
SHA512
e6137ef9fefc799204a760b5b0cd82b39c3eb947ebb3e5b1af6436d5aadfebd4314d4482ba4d9ecc08bf4cfdce97a632ea3a6e3eb5a5cd0e98b8c123f589c93f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C6AF1D1-6335-11EF-8995-CA26F3F7E98A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000003b6ec7ee719ff4e59c01eb07a9020f439176fc9d047b0a1c11d3ef3d0df2f802000000000e80000000020000200000002f3394df4397eb00ca1cf9168976a9257bc7771f3f294ea23f74459da236275590000000cefec2db6c1a9b7ffd5605b8b7c87d9395ec99186b6bb6e8e87928dd19d1f13664dd258f06040d484dbdb935e7750cbe17ede3a795bfaa9070101da1af5bcd703404005689279f9538dd8ca84bb370a650b69a2884a341c453eba819d19103f6f85a877bb87711db2f8a0610325748b63fa56d87a97264ad21d03c7b88175082f019d5d635c1b270022f447296b70358400000007c7f846b3ac9954a4466c509efaa90253cd993f55c9cf32fefdf8abbc74708189c1a3dc1ee2c018904e91e739849e382bc5f6e75a822069e78f4d70b69d37bb4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000de9b047f4a64488d9fc7f964e9aeae3d038db5a1314bccca35b9e6e069502cb3000000000e8000000002000020000000b6aa9d195c3068be0a979ecdc8088a053f41c8e0087fc64b7d22f4da080fa19f20000000417dbff131e67a9a758a2687216faef157e02e61018de000d5c43aecf491aa584000000013958937d84987cf8804f67b85b842bd0656ad2af129762986738196cf1ea1223a8b2201d4f7b8fe7d90d6ed1e85dca6257983c8944fecf976e5832a98f383e9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430788390" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a03a6bf941f7da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 264 IEXPLORE.EXE 264 IEXPLORE.EXE 264 IEXPLORE.EXE 264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 264 2524 iexplore.exe 30 PID 2524 wrote to memory of 264 2524 iexplore.exe 30 PID 2524 wrote to memory of 264 2524 iexplore.exe 30 PID 2524 wrote to memory of 264 2524 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1c24919d3cb7e2e4e7bc8002f97f533_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a513d9375ba143411c29b1d663a3021
SHA15ca6332ded8b13c8c64023fa1c8f16994af8c225
SHA2565fbe5b1103cd1673ba8023ad129dea0d65673dd3c6b2c4c6c33344f2d42e2ffd
SHA512ba61f9e8790319ee0b10c305b30393bd0f817119904800c95872bb1512431874c9e4e8a1bd5f58fe9d774b8ec3670e095e998b58275f53b61a7e79db7d3ac71d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5203e02cc008bf071ff9a75ab1983a59f
SHA18d16d01521d476485b2e6e2044b15b61ff45a90c
SHA256754b3e58836bc1a8ecbbd4fed6597cdf34d5e66b8ae5913f7dfa3f6bcabf2737
SHA512ea21fa9b84f36fdedc7035faf812fe8a74b15c2d40587b341a6cb268a98704216604bcedd604e949833d0d1eb8d20b2877d585c6aa8a262313b43a2f285aae43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5400399d8b3c50c5d0d06119d39acaf98
SHA1adc48a697cd6bb079cab1a2a152a4b3ef76b7da0
SHA256c7aebf6ff5e0241a1c256aaf0de7ea1e9c97526309ae697a99e1efdc4d6bb022
SHA51253b35c1dea419d3043f64be0de709b47e6a32d90e7885898074d52bb740547394352fa6cd9c0e7cdfe013e83fa1f231c52a663ba2477ae8628326e0fab500849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb065f27a56c77135d9d4932511867ae
SHA1d902fc012f7f8563c1fb3dd92ff55ac6c0d98c10
SHA256d3c6a0b423c5487fa329992ba803336afa72be25a5a9457a014c33ab32b50e1b
SHA512c72c825bf055db4233b4de255c176bfdbd5e2651bf8d7de822d6e494eac03f088084d6b736c1ce0c333043c8b4db34839ca75a5ee1811e23b83eb33885cb1db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504dea0627927def09fb85936b6a2edef
SHA1e06197f6236746d6cc67962702cf3fa4614c9607
SHA256a10cb21343bfdffaf3b5464d40d5d9c86cbd5b055c26520fa33c2bf76628d745
SHA5124842578007eb479683be9a11854b3a4428d0ccdbf884ef628071455bb4d075c070a002b9df6b7a5ed991c796fcc982f76756f058ed5bba16ad9d4fb7ece37052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9229c5fabf8f77cf0ae49c8da625b69
SHA17091652c76ab0a6743895ce16305fb6a2e6f0a48
SHA25647f4c4f853f0286d1e6ad19eee6b5c3505c5653ef408d69532210d337a051867
SHA512de23819965f21ddecac5a4d84676c0043b7d3a4dc9c533d1c9a937463b9c791a1b32e95c4532b4668aec1f37c92ee21188438753d028ccad29dc5a8a6e0f2efc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7e576557b2980d82cd3a2eb2942970f
SHA15b1a942cc37c67cb16e64dd98a443a45443ca6ec
SHA256f15cda481a598198878f6ca0264d37d9f6c3c283c4e6571ccb25c8bac2436ca2
SHA512f685a29c1351563513c2d6730b934aa62e0a1968fa7bf916d00099c85f9c7e4248d8c91ba0e58a20b90002b980d0b51155f5e91ffe88e53a5154a26a9f23d137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de6d3a9786d52612b878193d30d58f81
SHA16155d42ae22dfb646802821ed69f54413a50eec0
SHA2561c19f2f3dfd68487683b2ff84797e1bed07828bd826e9d58ca883432437a8106
SHA5127bd1d5bfaf06b6ecdb0bcea240bd1b4f124d3222efcf02c2becddf8c2e22abdf83ad358564ca550546e510804e552331619fd640aa494483636cdb12e5767041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50298803ded1ab9fe3bea57c067977dbe
SHA1bb8ae33c4c3c91d9bd3ba734a216942733b94798
SHA2567da49c30e3ab1d9e755baec45c0f5aa8900678a924b396e62485553eb5981bc4
SHA5126bae1beb37076e98ed36ed01b8b3d36ce94040f12ff4d2e534e50a12bf4ab76597914ba5582cb396a37bfd14f595271b67a83cc32e4b575a569fca680e39ccb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545c53f940d0845a33ab360b589e1c147
SHA11447175ccc88eb40c6dc26f927693b3b5fb5eddb
SHA256d6a3cfa2445b3377af16ec1e7c359e857e038e78a60a4fca2b5aa4bc8c211a88
SHA512aebd047be97fba220cfb3fdf054d5fe1536dfd8d49a6580f5417f5a89691f32fd9b62d317068cb042e615b8b542f7e700c5e409032f05c7b6ed9912e54e95201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570a1186e373bb3fd6477ef8e48efe678
SHA17be00f7409c91f00416555fdc4e5cea08e5de292
SHA25613181876f877c467c90b4de3b16b7a520659d3e40956aac43d43cabb26b20982
SHA512abfdfc9bd100fdb8f46aafd619ed95d617130630edd0bab8a1787d349abbb163ddb8d467bcde821da22dcd0c8a21ca05d2bbd81a58b1dc262cc3d537e4d89d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504abf1ce985dd90f692c610766e9d5a2
SHA1d183348a2a74477b5dae3323e28d77db2e6442f6
SHA2562aff3ecd4a96ed8b1f64e18a4e6a8bbbddb487f5f0df3e1baad93a4a9b236c34
SHA51287dc114fd726d2a10fb7ad135787febb86c8fef3cb5f43f37118c7ee315ab2a872ecb461667fb4e72de37070e83b6c39ed69d542e779497c223e47779a6ea73d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abb21ef35f1c1ca864fbba0fc5566f7b
SHA10270642f08dcf30d829cdf0db5fd5685f547d881
SHA25639008534e87fc7d0cffcb6df10d4cd376c600059b438e9e498bffa15554319b1
SHA51238e3d27f0ccb18280efb1a1896d358e698a8807c7015bb0660f32f28071271a33d76e03588ccd70b69c1b6c3e756defa6594bcfece6dbadf929d2aa190d56b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543348112031b255993668747d3ddfad7
SHA19d6d6e2e562f1f8378f78b16de7ac58a9fe59c10
SHA25684d09494b9f677b7cb6fbd54eb49ae61c0db31a852977ffcc96761809a7b285d
SHA512c63b35d3592b56e35e6b58edef37874c75b307a7cd35e19e15a7a83df0e19631c354ec674271f032d967f7b939a4fab87e8b287b642150a83ac7ae586654de1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e59d96118f5ca96c720e26a1e26f156d
SHA1db507ba9d06ba941b6459721209fb24a6a25cd1e
SHA25642ce86321b800dc591ecbb88668ffb0b424e86b78191320ea061d7794594fe6b
SHA512a4c0b1e049c3a570c247799cdde2ebdcb6b65e8375d404b871f283310f5a7177ad3f5acddfaae9d0c1414f4fdb5edd2db8a1aca30d43b1c1cff8d76df04fa56d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5526b90e29012c297f64c16a32038895f
SHA1ab2db2472de61e7ab8aaf94d3f53b6f8fead1d38
SHA25653f69d3b9d44990788927853e84208a4e2f3eda90f99dc8db3b8e9eabf534e4f
SHA5124796ad78304baa5a69bf16efe11bfe927f50d1ad90a9a3b0ed08bb94f53db73c5d39e2452a6843cf4e761de8e6f9e125c2bc5de67ee32a72ffffad06017b0b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554695b89675a565b81366b15129659ac
SHA132433be8bbd2c17a733b8a52b86a6a1577d93152
SHA2560553c25c07fd341f4fd507018771fa9010433a28026b5513feb9ee039c7da011
SHA5129795515c2425026272d0dc4346e1a1ba78048107590750b5a4e6bd37ad88e454caff180e79f46f5d3745dc870fa31ffdae101efb76d9cbd127062c1abbfd567a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5985a1d9dca1e38cee8d8e8b0e3973a0d
SHA19ecfa71c5315527ca134649a4604e723ffe42df3
SHA256be21f1521acfffb4edaedb50bcfda1cad62ebb2c970d07d6ed88efe727068230
SHA512d074f4f42d5833e354f8c4b07b3685154b831a0c14245f66ef4283e35aff0151d712a166897a4997e9937219d912c481ce6c1568d590d550944f00fc4d866133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d14691e055ded4cac05ca7f171da0827
SHA10d15e5d90b550d0e817978e21d75def73fb288cd
SHA256bde24f6f02d8c00dc71166d950142b5ff6bc215394ab9220276c40d462e60c1c
SHA5129a5b04401b6be9edec33632dd8cea052dc2c02284808ea89f37040f7cfcda08966d6f0faf122b5fe2a3d4364b351fb6f8151d8f108529222c87ac382c300f229
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b