Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:28
Static task
static1
Behavioral task
behavioral1
Sample
ea95bf879021db5b109ad7f9c3f5e652_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea95bf879021db5b109ad7f9c3f5e652_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea95bf879021db5b109ad7f9c3f5e652_JaffaCakes118.html
-
Size
53KB
-
MD5
ea95bf879021db5b109ad7f9c3f5e652
-
SHA1
1675bb08f41d9e6d3a6452e71c9c456a36332364
-
SHA256
9da2d6f8a112cc59f02ad7c0bb0d1e8ce64aa0079c1e9c6229ff1ea4c6ab40ce
-
SHA512
c3ee85f1becd27cd0c8d083282f20ba6b38fa039e0715399d33c6a1b60ab72cdce7c18097754f78123e7fdd584e49a84c48173e6d26743b4f8ae940c8b04adc4
-
SSDEEP
1536:vYQZm2r9wt7U6rW6An74x2GeXFbeOLGsoMGeJCMFFt4tUxmUqNbrZSV:vYCz9wt7U6rW6An740TLGsoMVCMFFt4o
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0B3CD51-763F-11EF-AC61-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432881980" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000041c90ad28e8a8462f8831c295d2ed52835ef24f0864632e95cac400d99507907000000000e8000000002000020000000e0fc181bc95983c7223361410f95b649fe011b004f14f35903648f39bae0c0cf200000005c11baf6f42db12a8c77b2e24502acebe2ca21e0fbd09110add86e83a71ddeff400000006459f15900234cb1107baa3e394934721a580b148c7d9a9e8d25f3de95778c65cbe8b09430c61b1908d29bc7fe96acb318d89096f517b3be9e8b0e2026b3e9af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501636764c0adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2704 2980 iexplore.exe 30 PID 2980 wrote to memory of 2704 2980 iexplore.exe 30 PID 2980 wrote to memory of 2704 2980 iexplore.exe 30 PID 2980 wrote to memory of 2704 2980 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea95bf879021db5b109ad7f9c3f5e652_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_4B65292BF8E4474E2D57D38A629C5318
Filesize471B
MD5f395d47bbc67186879baa8a5d46ee5df
SHA107e79ad7f4a7c378c8804593e22d9c6d960bd4f4
SHA256bbe30d891f4b57290da56244d4a1db03915e290fed8a603701cebf69be7e271f
SHA5127825f8eb311c2bf06dca6ad833e6e9f16d7becfd3c28b51c12016022c4769d8608e6e4030f5b3c6977f8df5dbe10a4dae1f1b4ca7ae2a9dba2423d915f5a37b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3ad8250ca0b35e1d5b24a21ec9ee757
SHA1c114bc5198e5e8eecf15750d43d02a3fbd77c0b7
SHA2569eca28af7329f9a77ec3ceeb18af21b8c8511256aa5be6242f3508608bf685fc
SHA512c66069cba172630c076633cacb4c27d8e2152481ee36990b513313a2f80a7f9a96ceedb02f0d2aaeaa633e665b2d453a1f54f822885a1ab49bfb5f7e8b331463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daf3d827df2052882a3ec23052b2a1fb
SHA15c8c908846230d08a9161bf3730fe151e70c229b
SHA256d53c9f3d2f7f1c71fd698a58efcaf10ba42e026654923b4c27af09382bae35e7
SHA51254eab9945653f57a4e811fd845af7ea7c5fb5d097c3f9e5ebb1ca798a50c02a6c46fa8fb3cb5e81c5a5fafa0fb22781815fd3fafd2ba4b3fc6717a4eea132b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515aeeea5a8814a22ae08a09d4f4a00f3
SHA1c8434d78a1ad285304144bc74bc8d03fddf14d04
SHA256da38859fe5d54310259b27f015df5180380c06848deaf9bef1e47f1a5c22afda
SHA5128fb9f294c72299be9b653d603967cb244de5fa26e495cb2570dd4aa9522b740ed0ea1d618c42180e55d3b4598e7d1363d061321dac4337cb555d8d0f1b455e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc3ec8b063936b261fac13ab88db55dc
SHA157b9441af9520b748f8ca8dd628c0cf84901aaa5
SHA2569386a94caefe65c55410b87db81ed559b6a1318ca149dce18ac3035bc8068c8d
SHA5128b03bfdebf1c386080e96b6009175f98a205c1468fe2fdff7eab6ff40155b74c421a5e3851f028c0db57a488572152c48327f0ea852967321d449814ee17e44d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9e5b18a81ace8d8e9f8489c81626c7b
SHA145a5d2ab812ba51a8cfca4af5e773f81ca2c646f
SHA256f91445a024ffb0cf08094427f7687986a9ec7a6041d619c4fb5b29f388f9d888
SHA5126b578d1a0e40cb8560dd42f2fc21f9ec76d7fa6937c8cfc21959ffdf110517bddbfe258a18e2e518eb1c1b35dfac329a000d99bde7086ef6b9e650737bdfb8bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f7588922a990834fb55430ed410f4f9
SHA1f1211d058c901ec1a38bfa14c583dcdb25beede4
SHA256a48bc024d4de66949ec4cbadfa4b201669d896b066defc6534cc79ae5e09594b
SHA5126b1cece5ed132ff6b3e27465ca3b4b300276de4370a45ab9606f9389332e0022dd5ebdb930bfeb3e50644908fb342805df03e8a2a6a88637b5377c0326c7fabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce41e0bb59ada2797e47015f15c5743e
SHA1d8bce6e142367a36dc2c8194d4add51f78dda841
SHA25677db62e76b94b5607b9acc8c35e639c8aa08c9f41d2b78cb87e75d4caf852311
SHA512c82e41dde93ca5ca5399bbb6834a870961b92c8137fb5565772e85ac0e68e3e20cedc90a645a2b15d0c6db06e8270aa28e64ec38d8d38c8159173bcf41123ca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592560432a3fe3942cd1e81caf3a719f0
SHA158fa372aa528fb951015db3c745d2051006d5678
SHA256711f5faa029bb872b4f1959f491aab7f822082a873e59254da8578af85c81edf
SHA51273a60f29185d5c01c0a2b682e9b8d479b3f28613a6c045da537afe5fe17bf44af441be13e60210341b5382bc7443b7db484c4520d5d2e5bca996906b6744a782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e39100fa254bd5c4ee16a10a7cfeb80
SHA1f7a70997a310b95ee9ca3ebcb0c411b172bad474
SHA256116f0bf529306341f775ee9b17da89ff8cb3fe04da78e851e1e99919c108c1cc
SHA5120e57da0ff023321f2185200ecc92f2df3157ed14584f90ec45abf778c9518e6f4b6ec4d0cbbc8818b7ab26cb0d386d8855cd2a1a61679b985a8fac368623918e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5445ccc3f610ac552f96030cd1533b891
SHA1619dd35c0b27dfc6b86a70372090ca9799c70843
SHA256508b94c5d1792f7a2a35bcc79c01a4164ee5de813014fa23a917858114ea0a32
SHA51258a5c2db5abedbe447373dfaadba07c3acbf14b85dcfe92d5c117d09db760c1c54db7c61d7920fdd988f673bd7aa300694d0c56c842fcc87b0cee20475ace1d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a5b1b16c5f9268019fabb7748edb792
SHA178068c3f503e1287669f4c43ac1d0c1bc3cc31c6
SHA2566352610439bfb32cc3b62d65921ead53cb5229cfdf445b6611742928fedd7033
SHA512e3a1de1396341eac0ce44c6cf600e880c2fe8aee51b92f7045ce37af03c885003c2bef15678a7e79447ade476d36ede2c98cb83082aaffcc7049d6d8d8fbf374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a69f6e240bd4d0f94f3db7de726298a
SHA12c1c5ea0b8613961bb17a80f1ac54412fc9b00de
SHA2562542ae5ae457c0b0e8cf945f7f19fb733a97940909f91e897442de5a735df8cd
SHA5127c5fefc02e397b1e21df8e0297506d017c8a62a2423ee0e2a9fde5660333388d707ed4f602097996c53cc33d7782362e1ab34f9152b331855654cdaf7ec70e99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e01b1e7fb8e72fa9b8a47b949f83b383
SHA1bd615b14b145f77810af6686c3b224e47adfc375
SHA2568d28442974fcaa30abd6c927a040caeb172b0077760c17cab9416710dc150e05
SHA5122a394c82cd01c218608fe3cd1c1fdf372d436258cbea547a1bc9e96491f010db0f6055503e00b43f08c8bbf2bf6db4009e10fb92f84d14ae947b5c399e3c9df6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d252d12b4df376e695fbc5285d9a7b8e
SHA1b18062425184dbf27b80e40b43aa0cac2c215cc5
SHA256d47c5f8284eb6fc033033070177cacfca3a587ab282289b37a54083a66479417
SHA512e265aa2cdc59de6b2b211d529b1194ae577305fa5e052d0a24e6b8f9736f1cb96fae75a33445a7d83f2da80a8e4992b5ff1daf83184731d7d89fa8a37a87c09d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5355ad0ff37a52cd8c2519643699b4640
SHA1f93e349ef41d689bf1f51d570de5ec53685ce44c
SHA256be1c6828a81907d973f4cb1844e2c4e04ad46394e1c938401e3237fd5ef21f28
SHA512c1eaf7923ef1695a4279d3443d78dd6b2a71b85ddb5e1698fe4aaeea1587e5dec40e8b52883b11663c8002f6ef3da6b05c54e654c745e239af1cdf0a9ca0f5cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550a788e81d2cf05e24b79efba667fbd9
SHA16ed5f89191f1637e5cb1cdfda07e256faed26227
SHA256c2f17d61b370da0273b24a10a610efd893f0b7b9701955cf0e55df05354e4033
SHA5128044d6979872ba620bb688e4ae7606ea5d46e8d4b520272e2dcb60e60c2bcf1593b1b07797c25a8d58f4c0fe2faa0cc0c70245749a8c6fdb18c93514dbeb211b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7ee0eb27c10d40c7a78a6a5253d08a0
SHA1685739de327449ceba5ec97cb0ce20306c8005d0
SHA256e9e875d9ab3b6de8ca71e86c32caa55be97e5d028027bc7fb51bb3477913cf2f
SHA51295ed0a9c132002a9bb8435831ea2a060d4f74a9c7eabad444aa495f017b34ec7db1d069313bd6611f1cf3e358cf446bb39dbcec8bac2c306d5aff5d3d4a11e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b1ca7cfe02540a0d17d756ae344bf0
SHA1ccf9788c233542917645e7028a7c5ef5cf5a8e05
SHA256ff6cf463b4169dc6190b3a7de97f1f8c935f0c2913428b29255d541ff2b4cb04
SHA512920d7f1679732200dbd394dd92270127cc916d82aa0f107c672d47f06f90c5f4eea439e3703c91bd6dde63c8cc658b45619966ef2958b9ba71e90540cd94ab34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5e57513f521972d94bc462b74fbe14a
SHA1bd76eb2c746d855c446faa5e9f8b96e226bd211f
SHA256237b85c1e816f5acf27c041128b87242735576a4812aa60e71a4d817b0b8e8dc
SHA5128b76f58eb0a4ed751eaa7d867208d21dfff02b60115ff334b45379011b54721873622468c286d99663d7757aa6fc9ca38f71aa55f148b9d3151166a1cb4279b8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b