Analysis
-
max time kernel
137s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:09
Static task
static1
Behavioral task
behavioral1
Sample
826acde412323d7f5a3146936dfbd169_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
826acde412323d7f5a3146936dfbd169_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
826acde412323d7f5a3146936dfbd169_JaffaCakes118.html
-
Size
214KB
-
MD5
826acde412323d7f5a3146936dfbd169
-
SHA1
b4bca508026c94645f3700b97141125eb4f31a17
-
SHA256
8e6777fff21ba923ab0064479d9f3c807466129bf86743a58c6a6ad62aada587
-
SHA512
e5b9c9f18594aa4ddc55787a6bf9ea9dd4825195e6e728f47ab86996a9d365053db257d56077fa606ed85c860864ed5ebb90090bcafc84576387fcf0b6f25485
-
SSDEEP
3072:PrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ9:Dz9VxLY7iAVLTBQJl9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B98AD4C1-9761-11EF-BD8C-6252F262FB8A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f4c3cd6e2bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436525014" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000005ec7d2b77d8b0352c39f7a826a4dbe75ff0f5999b028f43c51935652acec82bf000000000e80000000020000200000001f4e832679b71671c51a4abec8b87d5574629b86f83065d024456f0f872680272000000006dfe9b49ab0a2c31aa25e4884dba8a4527b55b3bdcd27301e8a6d8fff7c1ab2400000009a1d740f4eaebb99631e823810c4e676d1fff716af0a94b8d3e4df9811a30df7e97c88c91fb59ed92341c39e2bd00b2566cec419f84fa023e494df58e53e64a4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1612 iexplore.exe 1612 iexplore.exe 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2872 1612 iexplore.exe 30 PID 1612 wrote to memory of 2872 1612 iexplore.exe 30 PID 1612 wrote to memory of 2872 1612 iexplore.exe 30 PID 1612 wrote to memory of 2872 1612 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\826acde412323d7f5a3146936dfbd169_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdb0f6d1e38c45780fd24895ed0898a1
SHA1755cafc5ebb4c5d59f4386359165ac0e02505fa3
SHA25601e26749d5a91b6919f0c834c806f4c7dd70e5713a06a36c78238431c49881c8
SHA512b0b25a6b6ef62e08ef1f11d5d142bce153de5ce6565c55a3d7458b1bbdc846e844b32dbfcd69aec718d1006da7e675829a443c2444f7c42f1d4b78ebd2460071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5279ec840b5e8e315beccddc9f3ab81c8
SHA1b69b1e53641e242fbbe237ab055514a597d7655f
SHA2568f158b94f081b3d0670b35b69c9fe85a9193696b3e9d48f4a7c8d2ae104b3845
SHA512980849988f70008f98ae1e080783934893c1ae0c959f2289f0b4dc0a0714c4f80a209b210ae3dda5150a1b1e1a18ae89f0da4cf35fb6f8e24025720d3ce32119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ad32ec09566fd46615f115c0604f22b
SHA18ad66a55aa19814802bba660792d74ff0069b86f
SHA25697c3b780ebc678b31ab39b712e1563b7f864d2c5bac4a6817535ebffafb6d985
SHA512611cecad249338cfe506c8cad3528fa1ac3664eddda9f3b0ae877e3e2e03197b1c397bf5d76faa916383e5272a8b7a2e7958f383f97f0969b838dcb8bb595af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505d193324aab9f3e08e6efcc79909dba
SHA18753f574075efcfc12a922d119e5bba5348c9ae8
SHA2569c2b3fe5d34e429f5d0fc4de0ab4b13a70f8ddc57a53774c555b7bb2f219278e
SHA51214c96a6f30228317966546223985b78b82b3e20b26c4e044547da8bf2e2a8edfc9863dc8eb441692db5674060692e11d72e35df6a18be8c82f4bb43b81fc51fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5417c20dbf60360f9d2125db9f0118a94
SHA105224d6a4ef0287a84c2d841c694299e3f20d3f4
SHA256187296bef473b2315dbe8b58988f5537d9718ab04e9686fb609c2c5bfac38926
SHA512f4e3e701e4dd820642fbd230690ace565feac1cc864fde3b5ae667fc7ec22e1ec35f761c2c4a031d6c357ccf107376ea5c41aca516f2022be71ffaf38358a20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e63736a62e3f58526e44832f3d145494
SHA1f29f835230c6faf42b0dbf6076d367bd2a7e996d
SHA256bc02f1826abb3f1156de919cd1a86bd01e52cc697061af3e86df7a62aa56ca6e
SHA5126321397466712dd2e1c300c2c06c189a44ac0a4490ec759442fefcf02ea3d38e45d282d48901a56b15884ba94886aa55c22bfde4f0b61975ca1bdd1f92d5e4c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b3bb140b261f6d70ffe04b73357506e
SHA10c263a3daf2714304f263041b6cccedf512b427c
SHA256ddcc9642b2f7560922eedcf09fc7cc6f007c41f0678b013a1eca865bd491c40a
SHA5124c877bdec485f4b33655f810bff4f4560615c28914c9a359a8afc0bc53e8dbc166de8229d04f85299a5528653c82a70299c63cd40803365a543693141487e8a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528f6aebdcfdbcc027e5950217e43b593
SHA19da853633df7300f64d440d046964e4d59e0b8a5
SHA256a745924db579f6cf89c871eb63f867a9a38fa7249412c98f25c7263f42be525f
SHA51249d81775e2fb043bfb62bd1034811e89d28a2617d94faed6247aaf0d2207603cf30d84614bb53466cbbc64c5e1df3df838a818723c17b1c62a711291ed7ea57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc2658d35c04c730572038515265212e
SHA1880067cf61bd26997a409cfacde701ca973337d5
SHA2564c201c881bf6daa8c2379878dddc514c5db6aaab94ed509a91e68ceb29a848b0
SHA512dee0b489d26b0c2dac43fe552ee118e2281728c95e9a711f953e7640960db852808dec50dc8fb41bedb8826ad35602cd1e626b45026a7bff541d8a92e13d58c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556c8de1bf9280b9f23dbb5363a1d18b9
SHA14b43f082752ef8d890e8f853a661db2cc4e2d9f8
SHA25656630c094bee03e5bdbaf19491a3cc77d194bbfcd653ae3ed3c5e5b793097597
SHA512dab2abe72d2bf267be0f7f48240a6536392f860726f77d9b78bace34d0157fc3aaf6336bd25a05ffb85901a55f5a2bb4185d5b1af5fab0e5d063c5f5097fd18c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fc18e99ed683a5b0bffea8a96b885cb
SHA16f122acbd5dc7e788bd018b8fedb6f1f53b41f01
SHA256e12b47dd4c138872491309cef7d20050efbcdbbc1b1f0afeb041e83abc950df5
SHA5126683e6f6e16886ec0c5d57fb71ed36d41b580a4801f2d04484e689015226c71c8f419d8fc9db4a7a2f8af498806eb9d1ac55f696a457bd76d61d52859427bb9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7cb97d38422eb42429c59e287c2133e
SHA1b52b1476a03e270b711183434ecc52b590e10611
SHA25645130001b05dfb033bcd01558a5c37b6297afe3d4b5c91d3bfe960f0f5ca4372
SHA512ac220e9863cee5c078c296c4a0d643d778f059fa1ad8a946306836cf75b45465679d35c96476895086f32b60195fbdb80abaf178da9b31fe02d02f53e085a256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd6d3182fb4048e26eb9a72a2f57389
SHA1964e84a373661306b84ad14fe7b3c3a92ce809f9
SHA256230a8f1eb7ea48ead8f80a409f832e2ff4066b288fda2f1f717bd414f7e12ea2
SHA512cbfa5bc9e358ea4b6c00f7c168631789f4ddfb0510a9a58cb24370eb78e2ccbd717d03c1060f32eb170c0a9db3e06a2e193c7bc638bd6d20900828a0f224da15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581e9129a67cba644a8a80013bd196f74
SHA12ab6bfd6338286df05130508ffe5cc5d7d560a97
SHA256eac1f22ed50e0454803ccf5e478f9761e3083aa97a336033c2a8867ad7af8c19
SHA5120ff9f5bc812179f7f9effcfe3e9def1677b755bbc2be2d2218b08a49affcb8d80a5b34ffb4c52b8c56c9d48530eb3aafcc5ef67468bccaf11ee02eaac6929c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e270191c015caaaefe9bacc5912b12ff
SHA1dd1a596c418ccb261d691d0e75d63b6ca0c55810
SHA256bdbe0eff2156d81ffad48b033af84e742d85d100d39bd96abab00074d1d6d116
SHA512c93135556df7f8b05b687ac26773b423eaf5f55a238c6dedf6c6407bff0300908c9e61a8e88544ba3a3807da63a20ad248919d613b29c22d4bdc5876a7539af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5314f5baec6e6401c5cc4ee012eb76d7a
SHA1dc57dfdefa024a108a5973703a7b999fd76dcdd0
SHA256bad99e129f60eb878dcfd3d82126792a009ce046afef62794553243407cc9e76
SHA512f7780629ab0603c33e21583e167cafa0f9e359e625916a88972da63d2b5d4448f88d126965c8b9b7b9c4963dadb52c786ec257117d0f52c56645a428a350adbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5739eff4a3980529d2b241c67673180e6
SHA1dceb2988ac43892ffe72e6f9b2386d6799b90452
SHA256785e3206e6cb86c6f09c9f0dbb57c00b23a2cefa4b495aaf52154d240bdc32d6
SHA512b48f8706e536c7cefb453692551d7a0d53eab2f3aab5919512d218b40854caa73c154b08feb57e22971fe0fff0c76e392130487f305ccb3d166d709d9ad95938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568daa0ba4aba5574444550aa5c0f59a6
SHA13b975c3716cfa3e376ddbf0a55fb75207b30bb1f
SHA256f49c6e09804b46a0279c98fc02454e09391226c25822b0aeccc02e5aae2d45e1
SHA5123f41269528c489599ca74ccaba4b027e76ef5bd5d2aa3e6ed303a2b58153d55af0a9cf53818c1dbedfc664b6218bb4a37c1e36906748ba663d7d8992084802f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5888e7b191f6b59db5f9823b444cf27c4
SHA1488c29dd8c113b4d009b8ca141f7d54db1cc5d47
SHA256b313866ef7ea953e555b8890e3c40294b9c23dc2721568612ff4f21d7d561672
SHA512bffe5c014a8d5ade86fdf84f2d60a8cba4e9df52dbc44f28dddb7d13e7b95fe7161055956400548b6518723bfa0df5357961e5005b79060cbc2be96a786fb6c1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b