Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 08:56
Static task
static1
Behavioral task
behavioral1
Sample
da0038aa54280e161b7de8b58310a6d0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da0038aa54280e161b7de8b58310a6d0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da0038aa54280e161b7de8b58310a6d0_JaffaCakes118.html
-
Size
23KB
-
MD5
da0038aa54280e161b7de8b58310a6d0
-
SHA1
9a55e7e1b0a5ef87dfdb39224c0583feee773315
-
SHA256
9eed995d0029dc853ceaf24c296365bcad230bbb8ff8c25f19a69bb36bd10cc8
-
SHA512
c48b63e8aa3d4fab3a159f5822abd6195b991737bb336f802f7c76108858b5cb08cb5d8b11fd5c48c7b633199c9afe217eacb35a4c33777a041d0f9b49898740
-
SSDEEP
384:VSecEvdVEDSCAPHfiepRSxeWVi22PGsY0s/:V8bCHlpRTWVi22PKN/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432206864" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000d36f0ee864651a98c1dd00ea3e9bbedce366ef67fd2bf332876e2f40c64dee8a000000000e8000000002000020000000ecadab1dfe1c2c753f03666b1347b2312d13e5a30f062151c656ff3320f5dec820000000d504ad3de1a2d4e244d9be7811955040994e8a381f63bdfd15b4c7b052b63d3b400000002558293cf98caa165ef28a4d6167e78baef8df3fab3e13e19112c383047529ddacce30a71975bc654529386958c53619949372b0ecaf042892d3a3300d5ac485 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803ddf952804db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0D047F1-701B-11EF-8F55-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2636 iexplore.exe 2636 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2804 2636 iexplore.exe 31 PID 2636 wrote to memory of 2804 2636 iexplore.exe 31 PID 2636 wrote to memory of 2804 2636 iexplore.exe 31 PID 2636 wrote to memory of 2804 2636 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da0038aa54280e161b7de8b58310a6d0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55992298e8a9f4317f1876a581a631aff
SHA1933a4704239d3bc26d1090b3746ea5818243c89c
SHA256b0df7a5585682fda4117df3f0af7570607d3e4d2379c22f5979c6023e738de15
SHA512fe31d9343cc8a46a631f2bd635891dfb4e3c82cfb9a0e3c80b0bbc36ca8f6de8586240627d471b9a5e9ebaa308782b274c79ff7c399282ba058762e0517c4014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e977a3f7062649e1e207cbbd913a92f
SHA14e983a7e13ed394b45eac29791ecff694fc89023
SHA256c19fcd895f726ec67d166f66353d3336f4d3fb5f52c35e51a5d4567bf178bc71
SHA5127fbcaecb572fbde15c777fa94c51a7f0aeb8f521c628d851795d35843f97d5b5327c33769e07ce711e0f6d027ac4676c4f5178ea7cf55f4f61b7c21269c394a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ee9bbb5cdf0d1358c8b178100008ae2
SHA1ca9781da5b0baf1746450159bd273a518077edb2
SHA2565e4f1af3d01435ea7426b9d721ff1c24be8b997995dd2dfc727acc26589a12d1
SHA5125f774e5d8686c03e03411b3274a23ce4b3ca3f0491602a6ea1ad72723d17f7ebe88aa713e2be3573489c578b9d3bc422a43daa26a08e1a352d890a146b1bba93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecc92db59e161359fbcbb3d1bbe99a1e
SHA1a7e2a9026d197f88a740718551804bd564abf22b
SHA25667af74590b4428dbe094da85ba22673f76368ca5b6d6a6ef823e5ee353ce9ec7
SHA5127e60aa9cbf4ba39d17ac30f76a43e659df654e98bc4b9c2f5cc551602508d080b37252283f1bf88a9bdeecfd061a08f1353eb1ff0183d1612c640608b8fab7a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f7216f70099bf699e71d22ca0e8f632
SHA152a9d2c5f99fb5f0111afd8f91e9d80085b5848d
SHA256fef4e248e7c9acaf7d68a3e0c5ca9ed7b78c530e14ed1528a8625a27c0fa6cab
SHA512aa82fc292384a638d28b8fcae365a19719dc7ed6fff097f05e8e04699a6759055c39b90e5471cb441024fee759b0bb76598ef9d8e6b3d4c5e17592559b4a0542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520010c0b67101435f51ee91bd633c10b
SHA1851e1b2ed91114f99f2c4d3183ffac13627013f3
SHA256e37aa9e6a4c8a30a991bfb4e021edbbfc47d28bfd11d5afb6097e2088cacd499
SHA5123c8e1afc3c6d3a44a87d21894c80942736561cda4651311d364c4dc38151a6eb9ba70151777596e51a3294aa938427deba985a33b7fa66548b1f80a87b7da1dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59426a25d9dede8292bd41a5fc507c103
SHA1baf422f051144a818992d1ef9227a317c55fa3a3
SHA2564f60f72fe1b9422ca8ad6af8bdd350dcad9dc96db1bfaf7f5cd69e82827e92aa
SHA512063857ff50dc1173e4b9e929acc113a53c5b3ba3a1b61af8e52bc2a44f51aeb364d2ab61e6f75ba01cc08ad9467237e017f1c04834fcb5eee99751045a92754f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ad86c7e893bd5785b8c37b46d4088c6
SHA1a8a8504c31d56d3c42822b9624de3f87203a8131
SHA2560388b67e7310d4f84b017a590cea1e08d6bf51a67037d065f54d78440917dc86
SHA5128797d319e08450fd3b2afe0ee10d667638cb03c1473ef791587bd39900098d17bbc638cb2770647d2d217d4a113b33bc0e044fef5b7b1c9bc0fdddd28801b413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588192f1ac2ae6e1d99be87daeb001264
SHA156fa622e519889560d9ec6a2e398f6a979423bb9
SHA2565ed0045de5a93732f3f7ed13f9760f257d99aaefb4c364e1a0a835c9f89408d8
SHA5121f37f5128bfe5903b244e85d517803a0f6ddb31085e258657ce558b5547118b7502456f31b7665287840b364df2bba00e201b2e929f5eac3d91481754b64960c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596ee9f57831f34f59eeed3ffce305b5b
SHA120a795f5b992ade9217868764095eee86b34f8dc
SHA2566a0254990b1b5ee34d28ca1d1699017db03f26be356912d065f8cea4788262c0
SHA512b31d1dfff7fbc1fc4e29b0030083a63ec09d03b0881279fa31180fa51f38a377782890c871889c92ff619c953529f462e856f1bc5d103b02539f515703fe0cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf44166f9c3a856e8f4b35abba308fe1
SHA1412465c1e3d301b0c12e58a6dfdcc667d72a2ce9
SHA256fea78f162678b3fcf20cb69891cc2ec1c877fee681cd9adb178874c85b816e13
SHA512ec1135671baffda9c8619b4155bfd6e33edaf503540b55c66878fa5bcc4742e1a4bc3ecb0b8af8d1df911306d317cbed543081ad59a806f965222243ec74d88e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515a45f35bc0085d7d37795ede96c8a90
SHA177344ccb78abd74d9fa2325c18c87aa4322ed1fc
SHA25602ae78fe573db96439cfda14ffb8c51fe0a98fc3eabd9a67c097fd4ca51f1cf7
SHA512b8e4d41d73f8aa4694bc3bb6f238341d49f5d7f229a3a899433918fe3ed330b55ee900d15bdb4586b43656d2a6b50c7c83021262eaf61cabb4cfab31f68f84e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560f744ce71fea959626b656310d1ac68
SHA128891b66e6a0a6f43026772a7020ad5433cac101
SHA256e450040fb05489a08c0ba8de2eaf6a78e8285e6e89affab5d82a4d904c84ca76
SHA5127e6d4cf1fb751b9b452ce32244c9e1ab8cf7c49ac3f7adcdff8974230cbeb08d7fbb7b24359ba6c9865aeafb132e2acb758f263b2a76ddd349862285869cf69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513da15ca7a79d67dbe8a62a87cc4ce19
SHA14edcaea953fbbbf2d0443c22552d714167bd0b1c
SHA256b39740d1e89d8cba00dd8b7eb24bbde73de781aa064e28a39b91a3f986b76f4a
SHA5121f6f52dae4dc10f970e6f38dafdc2e9939a2b5253e5e585f98c13a0edee18ed211c53f6fdafd2119b482f3df7193f932f2136560917d50d4ff1a52f58630e2bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f198416880573dc3863971d61fbf531
SHA1b649c0fc1439c1a1569725ebefbfb263e9b52202
SHA256a60ff0de944d22014a81b1c2c2addb8b4a6595d44760a12c55ac2581f9543402
SHA512fd9766d79b0c33d5edc32888579bf768b1187c8de0f2e5bc395068b9e3c891b55be7b7c01190f3d68df2a0d445d7ca26265e1b67e759a2f161ffd42dbfee4bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bc598bf3805f5d20ac55a70e3d2c414
SHA178bd1c06921ca8dc6d1d8be18758d7a4a7828aea
SHA256fb45d98784b4abefc06e40e74e11bb264ade9614d90dcc7b3867e99d5328108d
SHA51211b865962c337854c12ca248b7404dfa43f1cf8a0550eb088c105899f4cf1b26a9ec1da684b963fac9ba0d2f8c17f7d719bea9ae150eab22ffce3addef1ce89e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56daefac20be431120fb542bf4a2cfa47
SHA17377b34825e787d3f6bd709f13dbcc922165e80a
SHA2566efe68a485166b4b1ff7d609a615cb6a9e12478d2ed072f58cefe70e3bd4e49b
SHA51242ceab1e68a625b15af43269d2d0f36870a684e6495022c2e395c30fed8d2e77a2699f34d50f2f32db62cc7561c448b9af754d017184c3500b16812338a8a11b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5486d6a0cb78a446c284aefc26e3bb527
SHA18a54da0f4e152ef2698e2e3453e6d7204464df75
SHA256950e449252e01fba503c4364d8f6d69879da8ea19c3f5df3ebe22ef5461c2ab7
SHA5127023c5e2bdd2cd49474384717f773bb3256d25e91d8850803d12af09a7c660d1ee552501c5394125978cbe432ce9bd2ab5cf78333f4659234f91c2cef11f6904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50266797f86b54ca4347a5056ccb78cc3
SHA1b68ef5fd1c5fe7bd762af576733f5f6d101181c6
SHA256fb2ff541b831640e8967453c8c19a705174d9019dec8fa031e783af55280b237
SHA512fcc955299bc657e71ce22188272337839b9ba8ddfdf448c7ff661bd76e3bc6b59d990e1889e3ba66f2dabdb108da0808102cd3250ab0a8eb579d4e95b939fb9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5092902361795f4a88cc0e19695800361
SHA1ed55c7363164dfc0416324286e4fa93310417544
SHA25643c1eb2c43bd7962aae6b7d690760059aeec57838c5fa906a1a7d551e0e5989d
SHA5129c3c9ad917ec843e3a6803981b334769720fc284a40ebdec464707805d07dc5e675508e0fbfaa76ae9c875da845bb32bb47064938534f2bca554a501e0fb9059
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\f[1].txt
Filesize39KB
MD5caee3c788d2a1ca1043607328bae27d7
SHA19c5088b6d3294b72088aaa965ae7d75cb330d985
SHA256d671658fe6853ad62d541ca6ce4df5c37a6e165801b453fd44c3387e68f0fbf3
SHA512fa3e0ef32fa3c6ce60fabacad184960b29c903c83b86d9b9317f98d91e2cda1900045d636568c39e04bccaae63f4bd424a294fc7218a546ce6c45dad5824101c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b