Analysis
-
max time kernel
119s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 20:01
Static task
static1
Behavioral task
behavioral1
Sample
dcf5253a64bc7c70bd5c21a7cfd485b9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcf5253a64bc7c70bd5c21a7cfd485b9_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
dcf5253a64bc7c70bd5c21a7cfd485b9_JaffaCakes118.html
-
Size
60KB
-
MD5
dcf5253a64bc7c70bd5c21a7cfd485b9
-
SHA1
39584f2e4d6fcf27bedb4dde2b66dfcaacf9a8c3
-
SHA256
c423fc984940677d796a9d07911b32cdcff12faf9aef9334228eb7311ef3337c
-
SHA512
6b35c239193ddc91c933f11f74c46871d95531c8b8a9436ec7ce61accf73747671e319b137d98ad643920485357d8a102cb505ae3e1f50835155fe699bf4c2bb
-
SSDEEP
1536:ykADkA7ckABKQbZkAXhTcr0IPGNMxZPdJXxPTQakAiFS7xgyieISL4LNL4Hzjj3t:ykADkAAkAIGZkARTcr0uGNMxZPdJXxPf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 406a60a14e05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000b0f4b5fd1bded21f2be6e542a86dd270dfd1a812337c7c53d71f3c67e3d27f9e000000000e8000000002000020000000e601ea87488dca1152446d3fe1911f5e5e4274438bfe83a51c0cd68ce57b70cf20000000e9def77110793c998e6934b72ca97685ac4244ced1efc5600ceb7e554cf682bf400000002f6630a6fb4aa93a1d1b14a5c55d1d460e49afc715558cd4bf01d62b51c1a4c89cd935dc202cc20f0365cea9d9c4e8bf0e52f32620d7c1ab72c86aa9f56dc398 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432333163" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA552F81-7141-11EF-841E-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2496 iexplore.exe 2496 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2972 2496 iexplore.exe 31 PID 2496 wrote to memory of 2972 2496 iexplore.exe 31 PID 2496 wrote to memory of 2972 2496 iexplore.exe 31 PID 2496 wrote to memory of 2972 2496 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dcf5253a64bc7c70bd5c21a7cfd485b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5b52875d58de93c37e0122f6da22907de
SHA1c5dd8d44af5cf03d85bafc9c80b820a4ee451287
SHA2567f5832818fc73c5a80257770410aecbc828f42636699b851b6f0b045b24867fe
SHA5127898796e069537c26bfbb3857e805ecb286ad55fad7ec46c9986c90c9587255acd1043f121633aeb65a63100bf771ea429f80cad3339080c9cf7cce10a2628ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_F968CA97A68F4E6D5C104EC7FE3DFDEA
Filesize471B
MD5a2332a00413969879158aa89799a5b8d
SHA189db73c5fdfff2085028516af168e1b6e372bc1b
SHA25603eb52927e466d8efce64b6182e8f1e015435959e884b80598ef08a4317dddf4
SHA512e6b021ed9a40f1240ca8282515a61eadb9593ca8e2d5e7941e851c708fafc799a40e2319840afd35df60292bcf3dc60bd2ad566301cae36021ac82004ed3334b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5a2f882c72b88b864b5c1ac87309d6abc
SHA17022096b9cf87040f4cbdca541df9fb6b388e749
SHA25688c42d1fc30a98c5d915c5129e9e965c3822f2c31737d3778225f419f1a8f8e1
SHA512d24365e25ec4d4812ddefa1af9957043ce41d771f0458a9a58a77e8420cc6ffa82418a899acb4c57adaef66e70ae81690602beb8199d7c432fd1b437eed0338d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD59e72cd5c065c4ba9015af23822236763
SHA120a0c28054ca9b1648a1ffcc36fa4bfdda000b1e
SHA25657f56b1599e45c31d113848f1227202c2afacbbacbba7cbc7532e390723e5d2d
SHA512c128b601fbe974d3a9d0c57ed9223493c94616704ba48476d42bcd0627e35c22b761321623ea7c3e1f2b6c3a93e32eb8966cf3f904727cb79273e99a5ec2f612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4a86a2945a40dda54cc837ba69e1fcb
SHA19cb811f89440c69103461ec5ca2190c83c9d5231
SHA25613b16f042fa15fb0f4e269e59a33ce999fe6f92e2cdeaa5ec2dd5ace5f4f0922
SHA512b79fa582f0fd35ccc9af30e460f98fc4d4d74b9298adf477fce62184e70c9a2015f6d3fe6c7d63222a98ea862198dcfd5032d69aaf0fee3cb08b9e55605e771b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e3f41cad8c509f8e9ac2116710dc88
SHA14ec2155a75dd3140c57574065f2153bea18e4a7e
SHA25688e90123fd19741c6b0ab00a463300b833afae1b1a2fb86643fb59d287476d76
SHA512a1c5be53cf478086c3fe38988ec195248c0333a12e4f9cf01c4221f746f0104dbe0b504e348aa2dad7df72a50fd11779d650635c2a0fa9232b0cff9edc1cc027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b48a92b0f87b7256d24cc2741f62e60c
SHA1ba2d18871f4fcecf40f236eabc0493791a1655b4
SHA256325d2d5ae693a74c1a90412f7219a22c4d3db76c38715a1faffd3b9b7de3ae8b
SHA512023f5061517a42e9fea33c3309a6cf6a500eab7f88225840c2692f4ea47fc3b0dbadba156fdf04fb7feb0e7763ae66936b94ec11cb389175d47a72fadf458444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583343a37565aa678f9264c9c0f1ce145
SHA14bf1c2be5cbdcd5e51789079f2f9b6633a9a2b10
SHA25684ccf1c2a983aae423a3d3cfc85642fb4eab44ee577538070faf96b29e4586ca
SHA5126b01d21f20203def5cea5bb51f380b0aa6873cc7a335073a14a763701990f4b77b296f24c97169882b22bc25d9fb4202c6bc91647b9f66e4f521a484279d7468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec9244b47c7daa3b28785f82f6f41f58
SHA19d1a6db385c7f928e4fdbc948be271527c3ac93e
SHA256874d7f7cc29a71ee0cbfa447eea42c7ca8a655c2f1a984c84739c5f40c24bd6a
SHA51218d0570e733654f756a7c1ba57f1444d2455c24eca6fea44b67dd6abc5c556128584454e46216172ea494dd14d41bf1222284bf27d8c307031f35bdad58e1371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd7de79d6448abf447b18aa2aab3e573
SHA1b0eacbfda4a84c945f8c466875db55b7a6a76552
SHA2567e1dddf180e130a31bad22f0d30bad68e1892e451e0f387720423c9bf60e48d1
SHA512ffe12167a02a1a27342b9193946accd160d311fa02500dfad143aa414fa0631934080b73e90aae6d4d29d625faa5f25fec1b8b782b79a2b11235db31618c0707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc05930363b9ccc27b61f992c25160f
SHA13145e7aadec03981180c0c837c1546aa6fcb1bd7
SHA256f77174dabd8e7e321bc308ba412cb725e3c69d0db76e785dcda815d313bb91a9
SHA512ec4f22c63fe3818edf57359cf56b5304f5b493e35617a541b9963200a382fb53ede0f23e3ad3eb53d0450486628b737a4730d57c2d079136775bed9faee60613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e713e54f6c26904fd1566297418ccaf
SHA162dfe4f18cee745af22936ba9528d831799bfebf
SHA2567844bf0b6ca1a86af8d998cf395bf9ee5ba238f390d94962362581e754932eda
SHA51259206d413139db9b11ac2882a0fb154a287ee098d2bbbb66ad6524073e371a875e336b2dc10d723faf7c0d05e2b7826f7dd91a01e13eb87718cb2b51f7df3a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed041aac3e0a41bea306be93b67479c1
SHA1e6d657b1a5d515bb5a42c80c6d750b28b583dd4f
SHA256ca24b951438a3fba9aefda560c7c39bf9279914f5150f0366a40f4e6f30b67a9
SHA51293ea2e0c37960acc5130ee180d56eaac77621c065acf4a974614aff3a51efef32e222d794f1c73ededbde2e5cbfbbb9630804819256c875f630cf460442a84e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a3d3f6855de5bc8f48508818c1cdf2f
SHA1b638c5b73cd514abe2032e13634879e276b5892d
SHA256949c5c42defceedb1933c0fedb04384f2584c86ba0b993aecae07c93ff97e8c7
SHA5125775d4df7af23ecfe906b197d93506241255ce8491968815563aa26d2538a7884e3aec10f8eee7c3e63f3fa4058f733342fd16425211ecc9e771c7cf53e7b78d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5473245f8e2c20bca5142465438c8cae1
SHA149e4f42c246b5ff363615bb6d54aab3a9255c23a
SHA256abcd7faeae0069b503dd352944a17810aebaf41e9672ff886e470ce3cb19e19b
SHA512929539e1202f01ebc07fb2b58fdca05c9ff02aa5aa20cb0c143e09b436d4e0b7527236068a8e8f3e84e3984697da41fc3635804dc929f9fd1c034957a2ee6999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576edad080677b4850ce5874843a03eed
SHA1f6e33a555442fab16fa275475c54e8b375f6af67
SHA2568fd20f58b7fbae85c3a5b08de3c4301d48bdaa1914dc6cfa4830f8bfe40b16eb
SHA5123c7e84ddba1ea584ab540380a32bee4e398181ef8ffa0528dd1be77dab04e02b5ec4dbc7bc92f0feecb54518b9f43a7ade67ca5360ad4a8e6901ea2fe0d074d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5662b52c7375ea554e2d35918a2080d69
SHA1a90298ced46dae7a38dc55f42e4db7f62ddea120
SHA256dfdc4239eca7ac55af98811d63de37d31ef425e25f6946ec6a944d7b86e67d83
SHA5120e2dfcbc3721d3c9379c0a62abb8f34e5b73aad7688ec157ee7d55a6901ed8c38dc0ce1e600cd63115534cc3beaf70f7f24094c947e86ddc6e2bb95fdf591156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af56a2061f9f2af2a8b4b22c94efb25
SHA13d40546bbbb23c8f7152b740e225989fd91a10d1
SHA256414496f748d4800f91fe97a981deb6789fc87430da38a4c89a813fe088184a6b
SHA5128f69cf34e76df0e5fe2cc87bcd5a7bae813a09f56d5514931171b8eb17cfe1736993776ea2c3d83f0abe08a068e1e74f06284fd7cc725a793d8574a1e75a0bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c50903edcc14f09d8b563b76ce0c8878
SHA1239799a81da13afac777cf07c42cb7c50b10d28e
SHA2564fefc20fffc0164dc1890b15a5759045ff24bbdd1d88ba353fbcc10862b43f31
SHA51273cb5a2fc13b6f2424ddbba58b52e7c919627b2f625fc7316813c2fdec39585dea397054b571b1a1dd3e2a95a2e2110cfe8877e33cf5404ec2fb792c5f10cd82
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b