Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:23
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2e34261ae1423aa6eaed9f536439937.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2e34261ae1423aa6eaed9f536439937.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2e34261ae1423aa6eaed9f536439937.html
-
Size
22KB
-
MD5
e2e34261ae1423aa6eaed9f536439937
-
SHA1
c524c2ff8bbdca60aac43743d3650dbd7c4239b0
-
SHA256
4c39350856106e9c5467a1e8db5a46779e606c3608b66707d89bd639a83a29f9
-
SHA512
a69651dde215177b87b1ef5f87992182cf3e151aacad8e79ab01d3eab66c8a819d14a49b1bd326163cefa0ebd3e250b567eee6aec2daefc40bbc3e8b01d05571
-
SSDEEP
384:wWR4lIcmt449xGTH1WHbhTIIWXJ6n6Z8P/gbbAguLZ:wem4G8ngnAxLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 200a69201d6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{335B6921-D710-11EF-A059-6E295C7D81A3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c622c5f3755db4297729f3ad05aec430000000002000000000010660000000100002000000009f61f338f2ad9575e86404e4412a3bc919ee690aa6e2ed13e5b55083fc1eb73000000000e8000000002000020000000b70b28040ff927d189bbf9b02bdbdf32a4d66cab4b1a89e9fd6b1525fec7bff820000000b08d60a34ac1689efe066bd7189bedcb17c735263f1d767c61aa9942c7ae9a684000000005704804783e89b6610f8959862b969c78f6c32f753ff5d5b8ddc1234b5f3450635f300a03f9294d6c60a9f1aa49aef3ba7a4bdf19e7b89e080b52c612648077 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443526872" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c622c5f3755db4297729f3ad05aec4300000000020000000000106600000001000020000000fc9ecdc7d9ae6fc0e89f8a609d514cc7dcef9e7637fbe2642c6364b66d7811d5000000000e800000000200002000000079a79956391d4162137de03d784b999b09ba3a19caf82efa45641b647c173d1c90000000a558b793a6fc200a8183a0830a13c2a8a14d7a223743cc17e20bbcc10e34cb3f8deea83eeedd2fe717608bfe5c6ef14334a8ab0d405d19a6c3d4e7a8af3bc29334ee62dfa0119b616b15c91f9e3b3e70c4c4b69b60239421353cf46d99abddb55a12c122df7b4fa394a03a958410091f009744803a19ad54ff6dae6e67a8cf800614c04cd35b4f3a89ceabca919915fd40000000e82e318de3e52b9087a6fe1be2e10bc13f69321957160069ed60d59b305539055729694f818d2b2fad40348de4751007c2ac6a9585ac51b27b70a8d17a35f7c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2164 2204 iexplore.exe 31 PID 2204 wrote to memory of 2164 2204 iexplore.exe 31 PID 2204 wrote to memory of 2164 2204 iexplore.exe 31 PID 2204 wrote to memory of 2164 2204 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2e34261ae1423aa6eaed9f536439937.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df27f4304f26d26d873aa3c98f1822cd
SHA163003adf451f2fbc7c6c0c062472d2b0a5fc109e
SHA25640fabc7e38f7b791a996079493cdee01f3b07cf4127fbd551e3f21ac385a575f
SHA51234e7198c598f824231c8fe467c0d623fd1b509a2b6ae4c8289cb7bf836e361d40887b40cfbb20ea558aa19d667e211ba10b36a74efcf41f1179c205670b55652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6042a35790635d803b2be6eeafd1092
SHA193c936dbf85bd3d9dd285b73a34faa2c3cf45f59
SHA2562b8b34b22d06f9261dfc429e6532fef3a083a61760d480e35d6958e4d04c1b19
SHA512e40419ab269c804f6b8871c0d010c84be432f4e2323f78f5bf157b0097287969123a20b9b56c41293c51215d454dd86bf35b6c7db32891c71f0b2adf3b22e681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae236415fda3ae3e5e16a98c6c0662db
SHA16c008d9c7b5287a68642a0ea6122365311ab3287
SHA256cbfc8fa2adf78b9f7b615bfdea68bc8ce32334d9f4b99f15239319f78812c1a7
SHA512ac74bd19f9b1bec8e332bc0ead72fdd31043dc25d9a9087a2c4e71fd51d9cc451f7eb381b8ed243294ab24c272357148de83b1dbb62ded410c22bce6e96f1850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cf3bedbc1e32ef2ac7716c6d5ea97a9
SHA11910c7e19cb033607989f942a4fd051e91f9cb9d
SHA2568f582b34e01e66218745936daf77264cb52bd692fd86a70ca66b0b8f9b428c03
SHA512b9c63cad0f88cf78e7bf179fe8c41d5bf5cb474e24292cd5e1faad97588b7ccff5cc333ec810a8fcd5e44996197ced45f2c5617c8d4d842f73554b0bfa438ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e48c3d0747ecd6a19edd17162e5184
SHA121810db8059ad97306330cebc1513d0790056c95
SHA2564c1f3362f523448aa7149c4d5001d0d61ffed2da8099a00e37f6c694bb844116
SHA512e5321a3afc661866d34731626cd4e5b7744e236153f866c235c06176d2fa5027e26c19f0ca6b306cbae8d5e93620408f43528331cdb4db874a9a8ddb16ee4d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c657bcde65b8ce516fa5abdd2e173f0
SHA13eaae599da3746dcf683651e83b473bf49e03793
SHA2563fca3f9601ab916482201e1f438d442de112ff56dc4d5b71e25066df333a1920
SHA512267c72aa2c0b9781734db65495cd2fb2cc268159685d3839926535d75ce1377a016be10de9dfc95726af4fd6536658246dfdabc526c9734f384bc578a3e3f020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522b5263f8fd6cb9257668873dd709492
SHA1883623bfae043a1d60da0f3f4acd449e93ec7691
SHA2567c59da5025f72cc3496d0243341959a44e28bf8fb41dd87e384292a6b80f8b40
SHA5122b9d8b541126701a0960cbd2d995bb16fd4f03c9c5fd0ccad3109904acaf4eec3f603bb96c382944a71d86bf0cd419ecfa94627c3a0fb0124a20a7577ed6abc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc3c2be121c3b5565fa5f28115ff19d7
SHA1976ddde58da310fea4fa5aa9953d94020f60cf22
SHA2568760bb32ca3ce082b10f5bc3da7149324f114f25e5074fb1b8aa8606594d4d9c
SHA51201f213fe05e62417d48c6d008ad990d4a3b5464919b58c55fd1ab156a75cb3c0ba8b8a6d2d6e759670b163dcd88505ade030e8a2de1af89fdd726427ab56e913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5226df01c252373a74fa054362cf3de03
SHA1bba3636ec2815571f0e68717c56aacafbeef260f
SHA256d3f5c74c167b77ecc1190a04e7399b80ba381cd6c00b609867e9a6fb2cdb52cd
SHA512b9fac36edb771cb45dbca9f7e160cf47fa834fa84c1ca4ac4851dc3a71d5f3112cd25ae1f3b0c0653a2163ff3d6acb078e32f293532505cc5c1fda54ec102025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c98fc91510409f146c90edec5bdc5933
SHA1eb1ec2924dc7c3afba1f1b2ce3de7c38fb77407a
SHA2563056fd392467b03525952891622f2c4b90f4076349fde7da63b17c1674a5bc49
SHA512ab7303d6b3a91ec55a147f8a47babc1eedf00dcdbb3de0270d8a82106700314c5cd5a5c9cdf5c81d7978f6a7d8eb6dbba9fea58cac3ee5284f50e5e6e0e67060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fd8315a4bdc8e4c42a8336539a2796e
SHA1338bd182827927fe3d0de40d03dff928ac2672c6
SHA256aa77a9830124e0d7fca3ce196b3d7f76b5d1813282c78fe9e83388c1bf50f0a7
SHA5129e0d9c4464e87a9c27ea53a73225b05d6587110421eddb83380f51a41ab8948bb264769d8f0d161b1398d3f6ff54e9d4b24839a12970de46ccd601387b7b125a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfcd37a062e14fcf95f1918b3fc46237
SHA1139ab64af44cc96eeaff79954e8d6b16a28c0a2b
SHA256f5911b251539f67a88ad1f135329282982e490f324df53b542fb4cefb3f3947b
SHA512b182e7cb4b45074fc15ae340f813d6b0db29bb5fefe30ab88802713ef779750c10db2265960997f0c97f6993d3ce08883900d85461b7ad8866b5eafcf1a65d46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518097c408feb073b0b8b051c1c9d7064
SHA1d9dc4f1fbbb73d35fd10142dbc14bee7e077be28
SHA25677d8481caee44161ca858a444652eab58a77776f8c9b41031259b5e0d3ac789c
SHA51277f072f1f99c3e624b15f9d50b08054a7d61c9615f6b4af3b1a01f77a52250a09084a1f0981fb9b542cace63f05f91986284c82ab20478c055aabc68db34445a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ba96f1709600d2599ca0d1e267e05f
SHA176dbd2177ba5699762e40d4103f54d49c41ebcb4
SHA25652d6e54036a1d8080a831bb041f17c64d6c2d427ed5c714194c63cb0f64f61fb
SHA512709d07a0a327bcb67852263cce34973492e1d9efe7658891ab0e0207f9faac90d420cae561ac7fa09bc86c1a1e1497cade7318e9584d23019a23736e44b0e942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50230285206008eda6921b581dfac125d
SHA1da03a5c0e39cea17b114116819a1b26380a7f6fd
SHA2563137ef55c2939ccc85f5bbe0d81898b0b84433d576f120aca0affa9b6ac0dc0b
SHA512de0d3c8937bc795f74f01f346880707741cb758ce298c23b0e81f2c3c289ab040e316221c237a8d49b35c23fa6f7a698dcd7d39d6a2dfc230768ce6ef70e1595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5512efc7a267f77450d667fb679b4ef4f
SHA1c62cef4c5bcbf43fe8432aba99e78bbc36cca8db
SHA256bc157dda3875862a564fa5d894e50cea3a69fcee462b1505ec70eaaa5dbea1df
SHA5125220dd8671fbafaef39f401b016213277daba179e9345c09f6c097dab1771cd00f52fa6cf636bf62418465c3dc5d7128ed376e8d7621c72843e4260c4886c243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bfae7f699a1a972a8e57915d4d23086
SHA140c4f6f51594d02ed8ba80319544bd1782685eb7
SHA2567f93e4fb00172a7cf668b92ff51b73081ed5d22dfe349d42db5dfeeaebc1cf2f
SHA5123c8dcc2b4b6ff2592c450dfa833c55b4cdfef928880bdc68183c2b8e00ef31278c7d5a4823ec679e0ccc3ccf6c7e81a162174bc7af9a4a938d2a63e794b8a298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd97c2f9a284ce936bf2fea6905b53f1
SHA14ab145be12e4578463e07759462645a0efc07eb0
SHA256959d9b50322393d3682e68193d083eed4361ff0cf4e1c4d4dbcc4d4a8b0836af
SHA512fba51a2d96c6692ba67eb5bae083e02885d3dfc9e758af218c4bd4da993c738b308a5d1f233bb6b3812d23ca6e5b40714975596ec29345a1fe9183ce3f78a631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4f9be2f360109802343dd31dae39662
SHA10c01925fd896e9a515b2bb5f60d4a47c5f70fdad
SHA256e4ff4cd555e932bce41d2ea9017ddbd615f12e78070a297a93d42d300bb5ae6b
SHA512ab1d1ead8ecf4bb8c2a0fb2eae065943ba4e7a5b2c5a326b4498823a838abcdd25f5cf8784d0edd449e8e1e36803f5d54d005d1b31c3b8a8b66f47df7f624ff7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b