Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
3c78193c2504cab776b26ff659fde7c6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3c78193c2504cab776b26ff659fde7c6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3c78193c2504cab776b26ff659fde7c6_JaffaCakes118.html
-
Size
53KB
-
MD5
3c78193c2504cab776b26ff659fde7c6
-
SHA1
e344a44d18817ca5f7aa2b66e71eac30530ddf51
-
SHA256
bdaca39d7922ba5c91e56c65b31d51597da9acc155c947d10daeda25a4f2ee86
-
SHA512
3d0becc20f36739ce8d6fa74f529ae71bf5ee689196a1153d3b85680ecb229a5eb52024ea555253dc33e2813f975773288ebaa3e60b39302b4663d7f5af1677a
-
SSDEEP
1536:CkgUiIakTqGivi+PyUyrunlYA63Nj+q5VyvR0w2AzTICbb3oV/t9M/dNwIUTDmDB:CkgUiIakTqGivi+PyUyrunlYA63Nj+q0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{64E3AD21-88ED-11EF-8CC8-424588269AE0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434935732" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2058a93afa1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f3a7c5e05121ef4caf7c1aec1e639c5f000000000200000000001066000000010000200000004681a49699be1b18fb102c2aefd8e6867dd4e9f1bb17ceb17321f761f5c5448c000000000e80000000020000200000007442102386c4dd7b147b11280e3130114e9492d7b35b3a2a665744c8c701d74b200000008b669c452e08b8c7d460cf507e99acd1ab0dff962e7d7cb8675b0fc7285439a1400000000ad3941c855f7eb5d3fc331c45f3069a78e2948dea860c93f7dc4853a89fe35926c850718ef5d11ab7c89c0b5cb69dbc15a1cea171818441cfe756bc74451858 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2900 3024 iexplore.exe 30 PID 3024 wrote to memory of 2900 3024 iexplore.exe 30 PID 3024 wrote to memory of 2900 3024 iexplore.exe 30 PID 3024 wrote to memory of 2900 3024 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3c78193c2504cab776b26ff659fde7c6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3208f1c1afd3be6d0391f173607fe59
SHA180e39de69ef5c06b40b72faa9e88cf109bdf2ef9
SHA256ea25a60921ec87def34cd9cd75bc14e125339f670684c2ed577d4978a341d6d1
SHA51259b49a6cf67e445a566d13a73c573bbd44bf54d855b7d28b5c0a491c111274dc824092b22f6accc723133b41c1785476c91d095eeb1989c85d9e6d5bf332d9c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d3206fb7fd367f9d7804e2a36b39fd
SHA1487a1ce858a87bea6081e036562bb5b21aedca6f
SHA25693058960d25e57af625f9b7c97eecd7658ea1deebaecd4c277e4c6f882c4c039
SHA5124820f26f9648d77a366171af5de5c9c3be6e7df9b25674f1c078756fa9b4ef0b739a21d4d0ff3d74dd6ff2789b51ff670de290c0bdfb608026ebd112b485be76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c21fb805afc5cfa1721c0aba3cc2818
SHA107dd2f7fb2282a501497879d7e886d91885757f8
SHA2568dffab2d56fb25d29448c62b8100d96856d553ef00d0f74d434e602ae9ac94f5
SHA512950044529fabfca63020134349cddc26fa66f4334613edbdf1c835492be73dbedbd2e86331dc679018f640dfc782d2148d7cb10b9a2542c25118636c4876f030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8d0b9a7b1ffacb83068fba61e9d56a7
SHA12371be85c8b127a0a0d157f96604a9d6bfe9d65e
SHA256e218c432f038f24822fcacf1d201d44eb54f4dbd46e247cf990c465b10e3cb97
SHA512d033be94f4da978b5d0f30a824d13c4678f57c76cf681fabd2cd1901ea669753ef282aa6c3533dc52fb84cfa3a672d8544c9fd28deb135f183a1180906fe9f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572d2bd8a3eb6739878ecf799a14b6b93
SHA11ea00895a7835c42bc84254da8d1e0122b1740de
SHA256ee46409ca65cd81455426aaad3f3cce9eac00ae350edd801c1d38e425b093371
SHA512d7d486d25487ab2eb5dd140c47b5104eb259200774484ba9fb3a1924f3527ee45149cf866b982576e2657c9eb95a715d3bb77ddd9a32ab98f1fcc7366d6cfacd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0c98974542b58921b68b8a2a36fee16
SHA165ba3e6d7d223ec4ee809875f8bf3dddb122eeae
SHA25635f8490947e87716ef597860f1fc18c202a9d7972f54fc15e9c214adb80b51fe
SHA5121dd2d8ee62fbe096977cddcb00e894b9d9861fdb0a9d7a869127f2ab912b5b6e5ad258efbeb74dc0de424af8fd798825a29b4343f5f24269ebe44fa165d36121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1402f86e5fe0408bcfd560b25475a33
SHA1c82cb9d8aca71320d9e21d379daba687da201149
SHA2566bd7cc173fa0eef63f18cedb706e907a46f17761cab33b0ff30dc736f72a2de7
SHA5125da29c701d9d79d65d31470d3cbf4274e29d61e76d1c9f81ef545e7a025589ff6326301f613881bd5d4b03a58b618ba74d8da464c62436221f916dc2017dba4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9ff13b211b3acfa66a905e3a84c0183
SHA1a1f5f2f43f5ab6429d8faae49994fdedb193848d
SHA2561c6b3fe4a1d8df9d98e9e159523de8700714183cedd737e33e7866f006394f7b
SHA5123380bf2b38427c200a73c22bdaf3f3ed8f743cc9df04e6952a336474ef16f2aa264dd476b8acd1c64106b8569b9d7049f48ca163316d29b871598743d40925e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2f7a006f30418bc53e1cdb3d340935b
SHA1dbb28e6e283d85af87811ea918c8840776db1db0
SHA256560ab252b93f6c2d770ec8ac2a009fb1daf77c1444ed5c8e62bff4cfd2f74226
SHA512718e28301c6c5cc837389289fb3415cb62bf01828b1bb05cfb4930424f9bb27d98b152c5cc49f2b5f2441cb9e1fb7d8e8e79ab8daf901a0e652a97d1dad3aaaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5250d4324d5599d209f43fe10839e30fe
SHA1c3bf38ea4962a512bf4f1fa9d6aa4d916c80c796
SHA25650e0542f94e12b8f726947c7bb8946b9df9584bc37c448cf267306ca56768fd2
SHA51208b59be94d8f4449d4e488dc95f78624fff0869f194a137cb6ffa0340326e3c8c963c4f071918fb2dd524ab33049de17f6c67c0b8fc2848a4157d9efe4893305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a6ef197913e9768007850aa9bf6c1dd
SHA1ffa792503c31db400875e9b443782cb3bdb7ee87
SHA256f9521e669f9a7af46ce84d7dc765c6baa98b145d0d0cec5933bac409b9c8ddb8
SHA512353d45d23970e00410543ad96caa1cdc748ce6665cd3a47b28304c9aa4f6ab72d5d31ca59fc70e42eb90f49928df8857d71bfd7f6697728652598ee23d4ad96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec317e337be88cec36432b2d798f841d
SHA1e35207552dd3c4d0ef4a774c1e7d7ff49d81940d
SHA256e7d4776f5fadc522a95905adc2433f4941e6b6a8fb7f1f541b2c289f0d212a58
SHA5126b2a6be3a2e5ae5314648d8376f926320c8787a86b9da98406503a19b3ebac9cfefd14682d2eaaa03abbda6643ba49af6fcc63c8fb234d2c740d4d55b078ce47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534589e8304fbd2c64a093907a47d9a4e
SHA170a10f52b684582c7b38a8cf2bc4d367283999b4
SHA256162d87beb2a5ddb1bebd3d9608947cc3e3367ca81680b2e0898fef0eaf48767b
SHA51210c5ebc0e07e4c895db22d37b261b2c19081b0be8dde477803cde0d4a8547d71565ebd2360a0923b5ac4afb1907340bebb83bbb1373efd3292541989780e027b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5523d0af356d43ebe15871127da90da2d
SHA121b0b85940bac6b1a221f303df755364685c9796
SHA2565fe18d5e09ae8e5e2922e6b13a3691e2b0c1c9a210dbffba1e86b0c62cbec05f
SHA51209422afe58657b1dc5a2f3dae4bbf9e18b31af52a298f2076bf99151efa622713216a65e8f80e87e41a519b4d8f98e35cfc28cacb674d08effee3b93d32218d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0d49d7581af4dc627cdd64016aa7ed6
SHA1f6ff04e97fb2b106fa6c1f3d42ffd10b7be18e05
SHA256ba48e0d4f210ae3260bad17e76182c3336299b01944d64171940a3d6ca834185
SHA512fbc5a6507199b5a16709087e870bc22cb93d33a66b146db2cf42698f6c4a2b7f7b55544f38d40aee7c3b60a8d3b8f8118039da78221cb06d278a70b1f2490aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546d964b91b0094b57eac7f4e2a8f2eb0
SHA15c4a716f36604a064423a2dc5233c69bab7b5d79
SHA256cc05e974ec0b0f27506af4b73c72b819ba25a687972e58cf928329ea1279a33a
SHA5122a313f82b08bae41f0efc2271fb68688156a52a3905949ca31e1fe19b44e6c8215ec92ed850cadb213cfd51152b7652d16dbcf6014f1f18259463d0f4632501f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529864e973c67bc89cf902641c4ed87b5
SHA1ff67179325c04cf2645040b58d919a52adacf68c
SHA256480883f3fb4ade73be85f9851bdb826f9bb3e3cb330d22be7214631a3bb18fac
SHA512d9e442edfa7cf4f85a1941a81d28727c97c526fc28a96ed5d2a38802b3142c1b13f1e7267debdb13dd1bbf37ddc7e0ae311d8b6b192c9992382ee0eee26f0ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b379d33270ca5e20d987536a0a75572b
SHA13ec60b88958c11c7808adbd833d44ffb6f643fc9
SHA2567843ef5af1fa3cee8bf643bf17b873857edbfd4e974e675b2204d25c6e0f6a56
SHA5127f79d7ba8e08418f2a8a796795fdd3a72ea8dfc3190305d2408175c3d094be03aec45c30e4bcb8719f66f7099a1ee22e5412326a2a746cbb54e2631938c9d9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7fcf0b8cb0b85e8c1a59be24b4e2bb4
SHA1afbd790b84730f0d1f58cc4b9816eb6b68817642
SHA256a7d71af81748b51af1c25366f80c8fb83736fb10b630eb2d5cf502780a47a13e
SHA51296edab6c50f30bacfac0114b43f5c271dc8790ff50575f94fb5b21f86c36e980e170bc324f20f8f347ca1086d5e6bc2d0fa637bc3054f3a5c19ae5148f5a520f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b