Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
0843612c010f9f7358387caead2eb8be_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0843612c010f9f7358387caead2eb8be_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0843612c010f9f7358387caead2eb8be_JaffaCakes118.html
-
Size
89KB
-
MD5
0843612c010f9f7358387caead2eb8be
-
SHA1
41395449917142a54d4b1898a7269960a69d6872
-
SHA256
705026c8fe866976f10a3929bcf01d6416242a1cbb48604424aa8295cadf2998
-
SHA512
602506c403c94f35b3d82905bbbae20f85ffcac7fab763aea888ff1e0c378c50be693820b0bb8de8fde6d1962a26eadcb15c6f1a9b7a35a04f5889b78d328e19
-
SSDEEP
1536:gQZBCCOdk0IxCfrXX3BsBabDpBRXvIt1b6+3Xk43d/cinVGJhXwK7Pq6lgk3BKzr:gk2C0IxBPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000254791c578253ecd5fc3d4a016ed7c6bab31ff606d003ef23bc728f2ba09a059000000000e800000000200002000000043b96763fa25f07cd7754f5750e0f3c0df741cf1e44e901722ec2f69dadb889690000000f7002a15bad5ae3c9526fdb132bfe9cbd5f15af06a01318f25a0c39fa6fdce256f4fbabcc85f493d514e2fdef2a1114c358dbf7ae4e9b8a5aeef9dd0a98a4494f0e2c7a15be285af56f3c001cacfbc9fd1e46bc1be400fff7bbc9049ccce3eb6a323752ddccd43ef4c7deee51e50e35d046a8d41f161e69883977bafaedfa21943caa270679905f290083a3c5db97ccc40000000d4c55fdb670200f3b25836d8f62088065dc80547155804e5bd42f68dd6244f4cc549ccd0199fd9f66f5ba46b3d9febfbd384cccd32e123eaf0bf3889dd606335 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 909f6af06a14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000001762d8860a4669ff3291ec5ffb069cb74cc46b76da040d86d7f27b0f9cc50d67000000000e8000000002000020000000c4f2f92c0fd8c8161c0a956eb51f55c2fe4008d91667239d3ac7ea1ab038f902200000006117656d9ba9e9324d8f129fbfcd0e5eeac2e0c4bf43927336853c8f68049ec64000000054295358e2b42e1c3f0de39dc5628283f11dbfa414e1fec4fc9c592a44123beafc480de226728b2d9890d92a303a6e52eee6efeb8309bc44a6da3c2658db9c30 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{196008E1-805E-11EF-ADF2-46BBF83CD43C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433994579" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 iexplore.exe 3036 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 3056 3036 iexplore.exe 30 PID 3036 wrote to memory of 3056 3036 iexplore.exe 30 PID 3036 wrote to memory of 3056 3036 iexplore.exe 30 PID 3036 wrote to memory of 3056 3036 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0843612c010f9f7358387caead2eb8be_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55744f86e3559e1630eb1752973fa9ffe
SHA1272cbdc94a81e56381a277880ee8aefd772adf22
SHA256ed5c5b384d5b6000804dd50d1293724c049a4ab68e39e13da6468a938a6b7e0c
SHA5121cd6165e307ca0428e07d3563cf9e31b42f036c476cb6317dca0f9ae73fff7773a1350ff510ee7dab3421627504b31b56051536f4067ba8c555e77eae011d7f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4cbbd16f3786d69df3d5c904d0d658e
SHA1e4cfc3f3aa012f43e0bba0702cbf5027661649ca
SHA256d2503a332e52f0866a68a22c6a6b2beb43be750e74223b3aba2fff971edb7afe
SHA512e7e378558ea5ece1f699abd48232c0a03ed0e8ffee81d953919c39cd267aaa56998f499d6526c57fdb95c62057ae7e423977ef678a6e17a356a3b70f853b055a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd18515d74c4d87acef19721fdfefb20
SHA1893ac7a5d3af432d03a521454e8cebe63570c0bb
SHA256debe0d24ffdaf211181700b6b790eed8f008f5e08e0b9262c8a2f2008694bf11
SHA51222d0768c1f5e626d429d32e5144a358fcc61b0c016cad8e376c6b29e15b36a2f5b8d71fe5fd0bba9d86c857c92301e5b6737e4e3f95169d2f678d879083ab1bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579690d21d3ac962c59442042ee4d1346
SHA104df40dc4024779866296275529d00ba7e730b9c
SHA2564296a357390085198c7b63347487db4079a8cf88a549feccd8613dcf249c478d
SHA5122625fc9e533feb42706387032d0b4cce5bdc899cb0b2e7d4846ff11f83b029900f0a15fbd02a869be32df0d604aafcd76c572136732e1701d04e8819f61ebebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c3484812ac863e1d18f340a5bd4d4a8
SHA12ddfc167be56051981d423db7c45e1e0b6034da2
SHA25651aca6c1e1858f438e2383c2031721efe37bc1967eec3ce39257460e69d334ce
SHA512840b5a6887e7de87c05e1223e70093766327fa95ca00845fb1e6321454fca27ac2053081629711471a3860c3023e68d7fbb55f47212d8a834622bf09aaf50fec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b628e0bcf54518f2f8040b1960a8fc99
SHA132bc70eece0f4693670b0751a1f004d95cf59ca6
SHA2560983d2d72451ccee0b09d96be781c826dade75e050a6834863b9b9674700f42e
SHA512761d9c5681eff777151d141b2342f96600f8c6f56178d0cac74688a2446fdf2dc9a456ffd492ad47411128e7c284241977e94f0333bd8c7a41029ee6952cc64b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500257e419ef1f358afadb98146292aea
SHA101a23c0a10d213edc83c6f1989e64f2d976ac964
SHA256314a6b87cd8c891972378b560236faab636ad438a64f0328f8b0bd3ff9625f0f
SHA512adcbfd53ded38a03c509ac6c92c1791900eae8c079f7b536aca4f59ccf4b40e20d95183362af99f8461bc76109c84f20f5e6d43c5acc8e9657b611952a4ccb35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b1c4e79c533da422ff2032d14cb9cf9
SHA119413f309dc4915d32409a34de5948619e8a5244
SHA256bbc04623d9326850e921444a62949502d9f4f0f6ffd6542828153fed6e79d014
SHA51254f6bf6ac778fcfdbfede8e52d7f8160b9d094515413104d50089373898ca5030f649e2732133bc8c5187c61e80323a8c689c48c4889810b8a7a5bde3497586f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afc8393d80aaaf623cc0a3acaba8f11a
SHA12060b74f43d3809f723adb60f6531bf3e47bb75e
SHA25610200000164280d8e6f15c03a10cd3b796025e1e0ff2090ab9a45abfe720a34b
SHA51245d1d8b690410884696e6d509d7c6ba912757e19aac9219638df424aa3c604a72d3fe779e1c5fc3d4aeb405fde06a42ed9eb4616e046978896a4c6a28745a0c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f74d4211d5fdbdc02455fb45d002c5ad
SHA18b2590990fb6ed7a53d498ee51637b77ec22b093
SHA256669514c635e076012fd922b496861c6d29c9f73e1ffde72cb0e2345912e02297
SHA51222c37947b73d1a3fa344dee4463c1edf7d5a0f64224ab1d8bce5e1957be8c5a280f5c4e85f176db39945fc95ce448663895c71d7459493529cf0926a409db18f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad97e880ab40398f8d176e8b755d680e
SHA16442e1eff0a204c8e83296dbf2fe9a1e2bfee269
SHA25607bb2e8147ce6dceb8eaad0861066c3725b024f28d4b75136803e7d8977c28bd
SHA5127a1947495bbf7cc5ea5717d49133c827ac4d09868d483b92b946ddf7432c89bce8eb5b3c5caab560f3c64e2016c0d1c8cf8e340cdaa87d0598cf072d9b3c3c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551229603f158da5ed24a9c172def79ff
SHA1facf10feb291d4369218b18ae725d8d63e978c9c
SHA256f29240f44ec44c9414d6301143f35c5fc3b876c428153c791febfcc27dd8ef11
SHA51289ce6379de4e18d79a7c8798b71ee831dc4180a9e3a5bf5dc18259876ff058a314399680fea671b9bf922328a1191d47113178502e167f588767e7baf4528df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d45828b14fe9cb5d14173cdccfe1507
SHA1016b49c4d6ceb225aaf0c7b6210ed69a4c64bee7
SHA256e435ec11c2c00dfed7ca9c31638a90336ef453759d44fe59174fb27f4e65b664
SHA512286bcdde92b0451dbcf44a1d98eb46cf79436715a679460b7c16592428ab94d3bca6abf3fafcc18a9c55dd5b8e0f134f75bb9fb8e880f7e262b385e3d3419fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b2371caf9ca544a209ee0e36255f839
SHA1a6e89f10eb57352e5b18f3c3582184a9db8f5f7f
SHA256b46b0f3a1ef2d9d9de87bbb7b4640d1361f889e5e811537b75804e012dc57c7a
SHA5125c46a11b90acdb0b12c36c20c5301d15e61df47fe4eaa336c997f6d8792587fb918d97870ab104c105d05837d6576c605462cccc98e5179e1909df290d5a3972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590cc96b20fe3a49bc7bed5d2e8524485
SHA1b1d18f94e1606b453c5b8cf06fdb636e52625e89
SHA256b769078d5617626c17ad882cbc776853ffc85478d8a1c3bbfeeff92a7b53ae1b
SHA512347888756cfbc987a4d94432a93e4109ca1c81242210db21e992a8139625f270f96212762840923c027582ddd02caebcb81edb70563a7234596ffc63b6b4b9a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5259e29e3e8c34089431c8ed5ffb36ccc
SHA18d0ea8b075edb4aa2a06506f567c78603abf1fa9
SHA2560ad081284527b6687231cee2d53763575ed2c99b5c77ce88ce869130b61370aa
SHA512770838ae0a5a1e2e2eadbab6af68c45ddd937b6822958e8eed8adea5bd1943c66a40697f128ef288546906085ef8fc630c380af866caaec11dbfd9ab4b23732a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58041d0130f4a67e3194809912af4ced7
SHA1ff8a230ae4c1966ea1344cc020e7f3975ec3e8d0
SHA2563d7a7659ccc0d93cc6a64b4c91ddaa382727a6bbd5a96062cd04941fad97686e
SHA5124ba8e1d1c9f5a462da5088df21334c6e0d16b15181c8477c2b9be7d9b01080994d5577e1ca7f667d129ec9f68cd33179a01e1a531cfd6f82c0be68c7e187f6e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4979e458c90658aa21fdace0df4ea01
SHA1bac9620a0c8791c0de652ad9ce0f083b991e1fd1
SHA256dc821871deef79a84f8fa86273fd5c94e308c4a15fcc98d8fa9b30ef36007f36
SHA51278d19b55882687d5a76ccba860c830b729b1ecacd217f9b6c2bf382ff75ac40d8c60ba09ce2c980e63563e1b0945c3cf356e887d8ebb23b2dad0191fdc55fb41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557bac50c1343c6e7a82fdcf93a341757
SHA16c6c019883320d5f8992f7707f1448036f845012
SHA256f66b1fdd7c7534da02ae05ea2e6ca14ed7b358bc6f3bcacfad50dc4dc82b9896
SHA51284b13ba23cc969d61edafec453b4c37492fb8e9495e92215e23d889165bdb308bd0a069b9e9fe6737b32e35e4d6ef93cfb81780f091eb6ac8732129504eb403c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b