Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 14:16
Static task
static1
Behavioral task
behavioral1
Sample
eff90f53281edc581ffee2706fa53eca_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eff90f53281edc581ffee2706fa53eca_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eff90f53281edc581ffee2706fa53eca_JaffaCakes118.html
-
Size
2KB
-
MD5
eff90f53281edc581ffee2706fa53eca
-
SHA1
154e5cad80e825a4dd546146311da1f62bd490bb
-
SHA256
32371729f85d207a376232487f6757e860ccaf6763c56b6bb9d2816fad63493c
-
SHA512
6dc98e34908dd80865be5a53524e374b0c601c736aecaba5f9056ed3df4891913f1bbbb381c5922c78854a26c4d84d26fb6ecac87a6467b83483557881c15afb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C58D1F1-7824-11EF-BA28-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000002ddd5581e94a917c802e9331694871465ea33356c0e540c67c8be7e8d67ec56b000000000e80000000020000200000006923fb18214d716409109fd29536d1c72d912f1709cd8340592695222bf1e75b200000004d4b2df6f96d084ea1572065434bc96545e5d652a7aebd60fe14a1308492944140000000c94bc4dadd4ade2ee7a85cff57bad64497cb1a0bf4d88c3b2339995e375be15bf5bb20b3b62de1ab27a6d854a104f0b3512cb471d598bd3f76ff20197d2e25f4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433090037" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90ede7e4300cdb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 632 iexplore.exe 632 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 632 wrote to memory of 2324 632 iexplore.exe 30 PID 632 wrote to memory of 2324 632 iexplore.exe 30 PID 632 wrote to memory of 2324 632 iexplore.exe 30 PID 632 wrote to memory of 2324 632 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eff90f53281edc581ffee2706fa53eca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:632 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54773bffc9718830efc6d94ae26d59481
SHA17632705604c5ed1e96984a53b47bc0bde4aefd5f
SHA25669fc61b4f213758e97925839e68a3a48ef8ca49cd86dee50dadbc9a9c4af9001
SHA5128cdc3ee66ca66b8f0d53239c2db3c96cb6a55c91f8eba0524d8e48228a500ad5e499e1de1417ba89e0e27d3c8b21936f2f92182fa89998cf172500956d6b1440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57151495440fbd401e52c5b1b58d9d00c
SHA120e52c8fc1064a4d8c0c83c61c6ddb7d97c61a94
SHA256b4c564e591dba442fc761b34d6e99b85614ba5ed9cfd9627fedfd44dec5a0bb3
SHA512f65e47195b38e205da0ad59d1c9c079f0fc54d2df93fc1159333d52a76eb375e400dbaa8738f8434ee661998cda11b7479c2633401e3f10c908562dcbc788b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521922141ddfb58a5af9f486bf470ebfe
SHA1180cb55fc4648da65791c6aacce1ae181a16e741
SHA2562117c2824d012ca44f9f43cc02fbc1b7af52d7c4dcc741b18ccdcf6d79108f43
SHA5120045353cf4ada9092e8e8fdb95c5f68eec76292618331c45b50b5c0dff524587e21f86e240814a81cf520233aacf22e3888dd357cbe7e30ecf6d16934e45920c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cea3ac738cf47a718469d0acd2425c1
SHA17850f00ddc42b7f13cfee386a11e1ed20de09bb0
SHA256c9f8b4c043fd95fde3890ac27da650d19bbdb02086f2b22cfc91ab1f5d4d9597
SHA512090c026925c3ee681c9da9ca4c5e2359777a8151a0bc54587fe5f453c543f20a41672246f0bd5fea33d3da9e2a3344dd325cf194949adf9e52ae90f3e931b68c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576039b74861845693f725c9333526104
SHA12fa90718fa741a0131ea2c835358eabc79c560b4
SHA2565aec6ad233f46dcd2271b4e0691c536ba91290748a8c899c3b8a032477992fcf
SHA512202b4736bfb73b28bbf7182e82841e2b990693a6042422876f042df1863b00b126497d24fc721aadbd247dbe338909bbde50b956e90920fbb8d32c83f8dd3673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b6e631714641fb4c1520baa3b11d66
SHA1a135205f6d040275abdcaebe1b8a8f88e48bc50e
SHA2564d4c2f53a21f956098a46e4ede480fcd7ecc1b4bc4b07fb61dc1ba8c0070faf4
SHA512a83880abf235b4719aeb58b819053de08c0bedde73567edfe038aba2210c7e9b0aa9c22bf08f2ce2f86ed5aa4342cf26853b2fad8778b36e85656282ae78d772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ed17c7d82e47ff5d5ac9ba6ebb2f795
SHA1323fdce0c31bb7e57c167edb1ce9de71ed0e7350
SHA256e12b8ae2057bb49d73167fa18c477a41bce533b0350e054281cdb9f7a114843b
SHA512fa7c2633bfdeb60c9e9e606ddfb4f3a4d54795cb9baf664ac77602f1369fa9e395570e157529ec62ea6f8a905084f3e98afc4fbe048fea9837eac0dc59d9c950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0fd53f0b14c067f9f6776573d2fe6e5
SHA16dfe5898be020a57ced80891e41d8df594c1bdd8
SHA25666790b6cc3464179361365f0429d546ab23d8e7931421c862288cb39df3e2417
SHA5129e9c844c2da0d78ddc2b19c86c39367aa731a69f2ed5acd2cb6aa13dfa102ac476428303716672a8b17d92bab8eae64a77bd696fb31e6c4ec879cdf0ffb32f1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589a31c8890a96032bbcd33db61e0f4bd
SHA1b6d8a21de7cc2525a18b9f1ea24554fff09484e9
SHA256cbebd3bd6aa54d3f4d2b9d61e6505b8efad6861f19ff4522e2bb3bec533c458b
SHA5129ed252b01ae4f958a8ed18a32c51ed9e0880528dc53a03b8b05d4783019e4d5f60d715edfa84cb45cc7906828d5f979abdafd9ecac7a70bf55f8f78410d48bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ae9df0b99779e3cb7e6f3dfd446743c
SHA191c4596ed71fc59554528e30f5fcba178ba2c2d0
SHA256a752d054a5b02e5af8d233bbed062467217f957fa08b302ff174c97a57be8753
SHA5123dc1e9ef7dc3444fbaeab4ee4f4bcec1d94aed1bfd9370aaf34ed66db358c36a991bdd88f6378888a32095dc9ec6e269bb9ff315d7fecc74009b186cdc528ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c70077bbf851d037afd7b1af2a915aa
SHA1053ef0aaa972bcd67c2d3f53b8980066acd4ce98
SHA2569221ea4db64f83b553c6f337eae7a9b8fe64adcaceabf2adfd91a99152ea1e39
SHA51249fc4f349fd9522b35e43b8f5ac9cd1e722f2f610a1a4dc368167cf0474d318056768fa5d13c4d67a065a2e096032d2452bf2931ffa2815c30d061612b920bf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c645d062b9dc53dd7d2edfa7a159c4cc
SHA15ef3a2867fc5e9b492184dfa91a776de28941676
SHA25693e8027447842376510bbfceeeb15d36a4e242ff448bc9716b8c4984e8eda6fa
SHA5123b99bfc4763cf1803765214b28a317e46475bf5e8aced5bc18d91ee2d07ead20fe6e563464c6ff4fb976fef12caccc9137ac83ff55dbbaf0ed0a7cdb5162e1a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c74de09c8ab49f05fa8a01bf2e56de03
SHA16b3d11a8f83508a07b2fb8adba3fa6e860dac059
SHA256c51ca83b7a0459a35657ac212c7b06bd7f49cf481ad034baa295c9b68c489d9c
SHA5125912c62957dde1336011483336f8c9dc36cbb83da6a37b5927ff0bab3eca59d0df916bdb85e3a3969c4f95974832da2795b42ce25e7b9bd7a03a31d4bbdd3766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55843f2708a5ece8adafda60eaea9cc0c
SHA10bb6c28464ce4427871f54b62bb6a095a89f60f3
SHA25662154da70c7d017b13f1557984b8aefd6236b637232a8a8ad2a161cfe91ac264
SHA5125d28c12517b672665dedbd5f83c464d7b37868e2d734da2806bfeb9a9383b3d74fa39bd7f26d2c09af51daa7be314241cbfb06fc7561202174bc18fa86fd0506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed7fe3a5f7fe7dbf858658dc1abcb0b6
SHA1cadce713b593a6a054bf80421a414bb4003890dd
SHA256f9850460712948a5a4f6a34cb56cb73ee59693bfbeb548cfd0e032c69741678a
SHA512ff0ba49a1155eb2335037f191d879aa5913a2c5eee957e910fe1108cf32fee75b7c1ebf9d6ddd027544cef51abb4e2fbc2f5efee955dfa9a7be9982233a42279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e279cabcc7bf3226b89c5b2ecda481f
SHA1988b73c23f329d35d87e2f8ac7d9857d59b67bf8
SHA256cad1dc44f920577bbb2fa066e2c48fa84831d169f0b2c1dadec3e02683de7ede
SHA5128cf5f3aa6e9068decff049b0bdeee99034bc9c353f5beb87a334717baa34596b8bf770cb2809161f8f66cb16c936a97e4836732f8336baece041565b8ce9fe1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b273d3fa32d79e3154e72cfe2ad1a3c
SHA1d553e0ca3e721baee5e8ab52fb8bba16405bda7f
SHA256e4aa49691b2a560c241a7cbf993de879ca29b825f1501943c9f2fef6165f828c
SHA5127c77454f647044fe8e2bf9ac97c05f7e1eab82d7ed88b84550147c2544577e75916dcfce8cf7946de8360a9c4ece0fefc98552996816e9ed85b3f1be34dfdd51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f328d217d1d78915a6c7cbc147e542f1
SHA1f2b5d5056bfbbdd1d83b254f31283b85a85f1422
SHA256ad3403eba4978d97cc28711b86a82e7ad112129b7d8547dfb5d8bb1595e0f742
SHA51217103327c6a3ad28c5509f75264041f5142bc4f15651fb9f9e29289c13a6bfbdda6107095fc281e1130b46c6ac3f1effa81971ca38fd923643d28069de4a4402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb72ac71b08f13aff5f842d2cd55d5e2
SHA10b68600322223a1f8bc040475e1ef1ee1dbbbaed
SHA256da4e9f0eccda8ae27a6f3ac77988b6c645f3157c66a8becaff785475d550ca77
SHA512d4207b52f4b552f37884a57ee9823e628db4d393bddeb925a4356565982dc563321a6398e7183c8dbb045c8b6d0fe156093b2e3a6bf6dfcfdd43df62b2d0958c
-
Filesize
15KB
MD5eaf8b07c076866a84737e8378f2ebbec
SHA1494ea8dc60ca2d8ad28363f3c3c83de99a7bb320
SHA2565dab9be81d7ebe8383be238d126b3a68f3d4a87231d22c5e300ec12b6446a14d
SHA51252763bc34b54bc05ad680b57c8663347937c046dad3190e134277230b37902419b1a015bfe0c520bb31e863c95032bcc2bec69bb1df8b0ab3b0419b1c0a6743f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ROLMKJ86\favicon[1].ico
Filesize14KB
MD5f3f70846cad486fc894f0d6145364266
SHA1411564130a3bac81294baa2224a763d5560a954b
SHA25645a9c8e83b8f208dbf4c775b3915396845000263afeef55c05c368d9f5271f4a
SHA51223e6c66bc61c2010f9ae36126f465e472177f513b72d20251131704d9b78d8e0fdd66f384ebdf9c184e94e8acf43347cf25403a60000b31479651f8bd4540681
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b