Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
ef1a0c469a1ccfb31e907fcbecbdb54c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef1a0c469a1ccfb31e907fcbecbdb54c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef1a0c469a1ccfb31e907fcbecbdb54c_JaffaCakes118.html
-
Size
130KB
-
MD5
ef1a0c469a1ccfb31e907fcbecbdb54c
-
SHA1
0930874be5c941b437cc96581ed1d4d8e7a4d9f4
-
SHA256
914e3c5e0128bcd14c870a4a9f9d8220ffa15ab9357e25baf447a543c6ce6dcd
-
SHA512
bd0d001830002202e33e512468f301ee4a52394d7cf8afa032f3bf3fb7927a0e6cf833db6fc2324f7166121ce5e91f813056712e2223f5f22e4614d09dd66cd1
-
SSDEEP
1536:IYxEV+X4IGA9LGPOq0OcRBr+WtXROpTR9oAfYFKsrmy1I8AgqfTOvYOcdvjIwOOn:KU4I9PjxoY2f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000d045055451edf5176cabe4012efb854d218799ac38a7053e24ae1f75aa073ae6000000000e80000000020000200000004c9e914d5cc047f88343c059f3cb1350fe255ae2ef607752daea3b9f406ab1772000000008a6f4d06592b746a833e8e5b20164003c0437c2d7c6238664c0d245d93b660e400000000bf8657bca5f070ec9a6723d3312abe6e543cd52be06b77e2a6bd0a57fc689883ef72787daeebe45adbb79f9fe977917c8175f64caf2d5e3d62b64eeaf91af49 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{89B0A7D1-77D5-11EF-ABA3-46BBF83CD43C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433056316" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40a8b361e20bdb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2572 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2572 iexplore.exe 2572 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 3016 2572 iexplore.exe 31 PID 2572 wrote to memory of 3016 2572 iexplore.exe 31 PID 2572 wrote to memory of 3016 2572 iexplore.exe 31 PID 2572 wrote to memory of 3016 2572 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef1a0c469a1ccfb31e907fcbecbdb54c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ac8d2aa324963b1fa2e1d37cb2311e
SHA1582eec863cbb9223c0d1406318b76c91240fbfbf
SHA25656dd5ec4fe379a4cf4b59a6fe12f8b2e6c1d74b87fe619ba3d070858d8cd95cb
SHA512399f6560fc00d36c4838e9dc7f13ff27d92c3a5c63adac7c6c7c0046bce55b574f41fb3d4ab8fb6eb71fa371984ac39ab4e49e8e299a795978bee440438733a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5866694d66394e85c43534771ab91fab9
SHA111bf68612e61ecf14f306acb34e792693ebc4485
SHA2562615a0773e410c25b0da7c6987f34468b8683563ebe116482c9d646c53c2cd87
SHA51252c8567b852c13ea2c85b4da2ff5aa7a042f864dabaf2a0753515c5298da7fbb862e4b54d507905303a09086811f8f09fb6457a0d194bc2c8ef104364475e7fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5f1a8226d276cc2fe87a876aec534ad
SHA163683b8d30777dda36432f342c2692975264f0ac
SHA256979f501b8b0ceebc61cfd3ec73150cfc9d8eea4afa8828614aa7cab9e855c797
SHA5127d5fa821b24da2c32685f76ad5c64b2fa9591127b4afcea1949ea8f130eafe569cd00b07bc1b5f2e8cb8f4e6c78985a3862166f4ea683fb783ee991c50f65bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdfde97fb086e0b913f984283493d0a1
SHA1e6c73843b7b38df5e844d92b47182c3b02aac1ac
SHA2561be3f9a6e2aea389560fd44dc409659e83fbbb43fb6b4eeffaad25b20af24009
SHA51293cd7d70acbe0f2c083b7a56d1cf37534ed3419880ea77888881c2f293bd83486de89506c5ad9bc9d2c0417a16489845adeb11987430e67cfe463ec9096030a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548d33f4bfe329b97eaa813ca4db14064
SHA1346fffc88b4b595923037baf7f3bd748361dfb80
SHA25663bd70260149cf770d76edcee23f827363735e64f08b6c1137910b29b9f53695
SHA5127d6c049553c85cd998b0383a7c6ae433af819193bb35631e1fcfdfcf8cc5a137df58a31e0843f3f395bb437e6a7a06b064dfab9c3aca6f093606b8d7bf213994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572afc044d68254e07daf54f8d8e121e7
SHA1794fb9c1a462ea88699ffc9564b5e33cf0e19c47
SHA25605b9a36b3e5d130a2839b118c7070fb8022fee8893a36783924fc91e8314c7d9
SHA51233ec53d2cf6f93cb538fc166eb7d020fa2ffa49a04bbe65fc1450daeccc5e95a9560162dc19839af319fa68e0055bade110c6f00d45f2f325394676ef8e5ce7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3ff9b684a0b873e88e2b8b573af6362
SHA1e81e73cdd4c5f5cbf14d5593b616d31a85daa5cf
SHA2567f49ddb802314c7439a420304f0558dd803776e7b1af7a2836f325070f256e8d
SHA512d9edf4305de4d08a7c1ee368df218fb24ff7612b91e9675fec9193454a35be87132874ec7a7bea4ec9d2825ba2c865baa910e0736ce6bd56091316dca5c977c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d62aa53d93193e82d39395db100f728
SHA1cc2d578659fa9aedff0547e350247f09bdcf1bf6
SHA256ac7f7b2744db9dfa07d9f9810dcb8413d1b6239726f6280ecf2880790469bf60
SHA512b40cb61c37aead165f6f41bd58b435aeb5f3bcc7bde07fa47eb203c1845155293b3c39bf00a61aa83581cc0be71324577bb71a3cfe753a7efcbc1ac81baec26a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bfe03e7f465911d1d6ebb7f90801077
SHA189bfb0e45e4eaecb98b68d43ce1e4f4f8ed25446
SHA2569b4674e73bf6f7dffc3acba2f3425d3b9e8269af14a4246b269201520eeba3b5
SHA5121f44f3e804750ace0e41aed642ddfdc7e978f2c84654a5e569792415b48d51fee8c9205f9f2b2f0d8e2152a6c11a8bd9f4b8ae9898c7927f43dafbbd1e9e18eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518cdfe842518e507b1353cc6a9d97a29
SHA140c0f32e4b92c9bad2fcb7059371a3cb95cf89ca
SHA256f269ff735b198f6eac012d2570121fa09bace3ccae0f913bba21332f9dca317a
SHA512d7c6b2e6723798f11cadcd44a339606420aa3649df6caca3b8b549d528dd6c99082cae12c8f5a43ebcd7f72e7a63aab1e6548aeca4e2703847d2c9d6bba3a655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53174f592cc0c7c1a01224ad6c38b3fcb
SHA1b9ce2eb5a47d5207828fc939049c0d1eed530d57
SHA2566353c4815cdd1fff8d42d7eadea0143347937c055033e53d39bcb5ee004d1660
SHA512d2de2ece688ecf20a3f8bc31c2bcd42d7181b2af72f6987a61cf22ff6e78652d8f86ea8dedc928975d7fedf7e2d6777bdaca584250f8b4d49a7f6ddfa94b184b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d31c12975bd8b8386995b44dc86a82d3
SHA1d598214646cc236e3c73dd325419f3481de92540
SHA256f888d9808474a92e95985f7b529a63774dc24ca1649b7dfe826023eb5beca294
SHA512aaae293daa056b25c650174c70707f9f9a1110602507b015e1f85c6bf8e0472060c9c0bf43bfc896bc3df366e64654648a79478fefc2d957eb3420655130ec20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ed2170c45efe054fc783a827fadce23
SHA1b652476e39b0c0811767a32ea790e4da497ceda7
SHA256d3d887d31d68bf589e8c4808424870a3aec1f7c5e28f26126fc037aa59bbf820
SHA51255ff0040054fa9a925912583ff90ed7e405f0ca04dbd4916b2d88b562494e398acb3cf17c59593998d5e09a135b6f6b72a631e121f136a10c7e288355033597e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5810de2bef366a4be9c8394e55edb0356
SHA1a7852eb1b671a349f55d80e38c2be8c6e4beee25
SHA256511c85608a9b290646747c1f074dfddc0b3ed82d32d50389a0c9fc048997df5b
SHA512fb5f87aebf0a976cdf79d34b242544715be70ae050e4dc94e0e5bb92b459823c1bab2b2a33a8a45d3707d6941e7c6041e65343bf39227bf8f6562162b8b1dfd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546bcdc09081c7d523e7b624688317e16
SHA14ee40ce0fd5ce49c7b2c27315d3e2bb5c2cd8ec6
SHA256f121a066c4327e2d5ea08c26fee6be044f4deb703ac1dc4ffc0f217d5b521aee
SHA512aa68c0c6c2ec236ce5adb1115dedc5f9eb4a159783966e23408279b53c410ae33a6eb6db5bb8fe9bb3364146a80ab9bc4c8a4d0ed22d58d27b5cb895ca66f244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503f9d9e71a7e010eaf493ec608de2215
SHA17eaf59ab72ddad76104ec7333aa26438eb1a8a6a
SHA25613d70da6c9eac514d6fa7bee5e5eee381ccf75a2f9fea7f63b3dc4620a6203f9
SHA5122be0912415e24592514e7c700850008cd5ec353064f726dc6ef1a8a777b4fb45ba70292878244ed1fae9ade71e8bf485e54a712e60987b2484bd7901ff733f8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2dfd23e32bd58d313ae329d93cf24b1
SHA1393e46a972a7141897761b0c70a3a041c2b0bf81
SHA25666d0f228c67c807c55a6c3c97206addc822c78abd5d784387809b892adbba052
SHA512e7d156dce3e60ecfac132173c9cfc6d808c39d1f37230553db0931185ea503d5806126f7e7c772a0f59a1efd8604f48694fcf62e3f635477b32491a376113b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5426005fcb9781091cdf6a3610c22aff3
SHA1a99ce731274c0d6dbdb95184e4f24b02b033d35f
SHA25603f6e4fcc6017eb385c09550d6f86ed7eeafdd76674a7712b0c0f2b27eb766dc
SHA51210f73aeaf96ee65d8c17b3d4189c5952c3b4459eed5680ff5d82d794f8b7814ca0bc48ec6c668c00883f8046840f8bf79913ce0a984371c721c0d9b49a8d28e4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\sharethis[2].htm
Filesize167B
MD5f5d40b7259645010f9a248858ad14178
SHA1b3051d17a6ec8c9e166bf09a62b48261ab86957b
SHA2567f5007068d2b56ea9735e2490d60cff2e72cae312024ac1f6c91158eba47d05d
SHA5121e82bc2d067f726670b3e6054d73e57868f6e7c50eb979696bf927daeef699f2d8f8de201e8252b86b0e9f86dc69e5037fc9fa08ef6c271b033f29d4f0f4c1aa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S8GI6B9B\f[1].txt
Filesize40KB
MD54f9334909d3ecb457c630973ac039f1f
SHA1fdc201153de9849109b4ab22a55d613923e202b4
SHA25696cb2bf2bd974fa653ebdf292a37ae3912093cd384c31b5721812197071731cc
SHA5129f665d32d184b9458f87511b043dda649343f635970be9eb2cd30619a1ae3b58ace5c8153c2128644d6413e93a7aa82fa9283c3daf119f869d717d88f5246232
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b