Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 02:15
Static task
static1
Behavioral task
behavioral1
Sample
8c92c86ba4a3e2e672ef12fe2c2a61bf_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8c92c86ba4a3e2e672ef12fe2c2a61bf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8c92c86ba4a3e2e672ef12fe2c2a61bf_JaffaCakes118.html
-
Size
45KB
-
MD5
8c92c86ba4a3e2e672ef12fe2c2a61bf
-
SHA1
ba1ef499a93563fd4c0e87f1af417c61c3f94829
-
SHA256
43eb7901be9f8543e2c3c29f8fd30f37c2a1defbfdbbca04cbfe2dda5b3c204d
-
SHA512
563b233aae02bb73fde366b5fcd4b4ea79cba8f6d97a7285826b1f3e88195a6f335011500b75edbd0458d59d2806b79bda396349c859b7a9a3c08f5de537b0ce
-
SSDEEP
768:lCuXPIpBtgGw0ZAVVbCEdmx0FPG9oRpXOj2SCO:lZIpBti0ZAVVbCm1DXO1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a01253c292b4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC90C301-2085-11EF-89B4-66A5A0AB388F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000008d6932b9b14a8512fe9e14ba321c2e6902273f2b663be9d155f16541de81c52b000000000e8000000002000020000000e7c2b68f899326091daa2a3263e35ceb44b47524419909efbadc68201909243d20000000f0c5a29b8af4ba7417b84ca20557f0de29bd506bde38ac7279d0431c2877b8db40000000310f601b071ccd7e21bf68d1cbc4bf246bafc7de3c19e4ae064b4d74a00bdb94031a1fed64a0c8af45bf5bee52eaa27e969316b538f4ab100664331140d90584 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423456371" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2184 2972 iexplore.exe 28 PID 2972 wrote to memory of 2184 2972 iexplore.exe 28 PID 2972 wrote to memory of 2184 2972 iexplore.exe 28 PID 2972 wrote to memory of 2184 2972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8c92c86ba4a3e2e672ef12fe2c2a61bf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5e45e619e897e3e3fb040001c59f1492a
SHA1192c331e72c5e85908b2518c9fddc45bc0d79fac
SHA256159933a20be82cac22c71e112cce4a3e7394cbc1dce3d1d8461b9ac689173594
SHA512b30b8299082c4c78dc6652ddfe9026d26a1a0d7e1492011447a1a21259a8932e3ee6888700fb6e5ab92418dc11a4dc9dfc632bba55bb9edf3047681446d5aa84
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5957fe84cb6073b17a5ae859a851687b7
SHA1b2077638f4a175ce3ae8511626b8f2378741f933
SHA256c8bd9931a0968143155c95d1b4ca5d374aad08d5a29dc3301eae8394d6fff08c
SHA51255ee3d3b6c9527b1728461a22d0ba730b6341ac69e6c02eb97d2a3ffd3baa94c0ec19df9107c3bfe3abf1a083fdefee891b46667939e5c091f4057753130d29d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577d971cdf0a577425e48e1f154bb9027
SHA15b8ab019065cb3e3065e89a19925945afbe37dc4
SHA256ff3f47c922468bdf3ef4ce40c19b250c68b096c1757ef28918103f6175ca3a0e
SHA512c00f313814dcd047aca378288aedeba1bd1c131e032c159cf6f4995450ca239d7e9f99804bf32bb906ce61c4ede13a181277a27bace73817e15c5112ec5a850f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d2cb6a7d293c0e704a77367b51587e
SHA17568e544d0d9e3763b69074d928eb7cedd375f30
SHA2569f76de77e73a36a1aca616a85b86f37e75b4e92ab7226d3aa3f62679666c9f99
SHA5123991ef671dd580487f253a1ca21fb696a1148b9c64e0cf6fcc439a0e737ce68a7d95dafc3080b615e674520cafe2667fef4c74c01975aa96727577f2e6b09141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a824bb79431bb95c058ec3b0be1cbb
SHA19e0c852ffd46f6b07518ce53f9080536241d0509
SHA2565b8e22360b6eb6a750581a36ae61b9c3231c73f92965db3593b495c355a528d7
SHA512c3e0e14aeed613670747218113944d43797afe7efa1ee07450ab5f76324b8f0956d1effafeca76923f0ff7bdb62d57298c5dcab74119a6fa0f21648ff654ffa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2b30d1ca0d3337484eac0970e61c74d
SHA1470d7f43047c8eceec1dfbac8a7dbbf3a5af23bd
SHA2567d50cf5a02092f58e5daa84e4bcf09c930b2973af85842638f254f3ca0e9392e
SHA512f011911cac46de0751522dc6a961f7e81fb7b062ae489d068de48b82f0d93822c1588d30828ebe9b5cd064bd11b460edba69509bf5ca5ac74375d26c1218abee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b26b3b0fafe6b68bcad205d38d78797
SHA19d03c2be5e9e52e432145a5e23ddac784e05ea7d
SHA2568b1a3f11ec19ebed7c6fe3ca2da00f9dff5d25a1ffe8a0b48b47a9d2931f73ea
SHA512c6507b564c768129f14602b136c6af81b534942f077543d03ee690d25739e47eeeb08821755b2d71efd54c39ce9f850fdba61e11b0eed4b85e7b77615f9250df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ac79efd18efc3294fbee0884e5eb7c0
SHA191858e7868c0261e29e461a8a32a370abb56cdac
SHA25639a9010e9f533b550ff96e0491dc73c49a2cb656ad83fcaf9ca778771ed9bb9c
SHA51236f27cddc0a0833c892552b7bce8f8fc6a2e36c59fb0573d7eed463ff1f861fc377ddeaa16d719cf674e4dc4aaaad90cb2df75ccd92b5619fddf854cbfedf010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ce2394d5762edb7fc44f19278214ca1
SHA1db33b7cc716ca69612eec58e6ffa374072db8e01
SHA2569443a6e56cb9d038d1da36ba0330b7284d611f2492501285ea9f3d339a0250c3
SHA51200ef8839ba5f25c70d8559eee466b5f2a8ace82c63daaf8ead657d74f4fdca24a78e26c5b44a33ac185f068be64e2f4465c61bbb8897407d3f71b6f2239a63ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be3f6d75f64694bd2ba96f79d844f7a
SHA119d2429ccd30790d4c6e921ebd79825501e957c9
SHA256c56bfbd043d6cdcbfb81477b69fb87a92d63c7d7ccdfb94e10e722542eb33d2d
SHA512ed6fd02c1eaf4c897dc174279dcd8fd4b6281120343752f8a657dbf30c9b32fb51ad4e6ad08b8f0d624f97635b4429a6e256acb89c2e8a6cfda19ab7dbb72158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c42c7b66d5934fbfb5bbf221c366364
SHA132a7ca430c322aa1bd2f49d8c5d6a5d1b855befc
SHA2566f44d720d4e4a92498336efb43e6279dd94765ddda8e024360e35d525886307c
SHA512889eedca21db2a0f5b9a0bfd5a00f2ff9658950f49debe356e678fcfc6b52fb4e8925a84c15e89f23b6793316f63e593e0cdb6ab4c2abdd8c2fefc526fff6bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578641dc393c8e726229e5719d041b0b8
SHA1642b6cc4ba94328d7a7e959de2a436c2dad6f3e1
SHA25686a3ca793d9deeb73192ae57f32c970b7606891c3eb9eb18c949096d6580c4d0
SHA512e48c240e3d343ea5c5af566d248e198eef053d02c88b2210349dd3fc242b6dd5ec19acc942b0f97cf9832853a89fbe5f27a8ff2ade284ccf649a1cee003cde21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59301ee95a80048d343f21e1afda19ddc
SHA16faf16185c597d10c8cd96f92cd2178a1b4b6eaf
SHA256dda8358219706de27afde6c10e63b3074dfdd33f93b318304733890028f25032
SHA512a8b1d2f9fba9da284ecab719ea9173f6853df27144e46519bfcb761998e9736eeee57aeb45cec06af56b601dfbb20d3881280450926069b1cc760eea7dfdde12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599528a0d7d217d967ec0f244cede005f
SHA17cea073fd0aa4781d402df518b949e8d6a363427
SHA256b689adba27979e54efa6eddc93eee0cfab92b9c62e8e061b6e09ffc875f0bfe2
SHA512454d37182df9f683822d75f23f76e50c448c3f1315c4d638cc052bd3ffad0f8c032cd7aa1d805b91594ddc45e1bbae275d95070d46300c25e8555c6b093b4311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b56c98c453cec9b635b6dd8ed3107727
SHA1f13c00275b2d594bea39d39334e34f85df1947a1
SHA25621adcc7ca3c535a7f431a2ac244a33887385d220884317414f36197aac3136d8
SHA512bf71f15ef52c9b2ff2a138b36f7499082660a73bb2128fb7ba111567542f4f57bd67768eba5103f2b4f2b7111b7832f33f7516e6381f63e30441a6c31e7becc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD537f00f1eaaa333b5f94460145051540d
SHA1f3307eb2e55598cef334f974b7672d0924fb2a5a
SHA256190b21d3fe1363ececcad66e6481b257096e69da0d805d0bc4e1bf0e188f6f69
SHA512b1278c194bf595d337755c5013a04445d72f116daeac84ca619d46478e115c1b09dfc0c0fc8bc4b724d62178a628d3a2b50e3443a624a9d01170328f2fee3260
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2XHJXO3H\platform_gapi.iframes.style.common[1].js
Filesize54KB
MD5682c26af19b240f98d2cb951721fa54d
SHA118e58b652c7f82a55ab4b1910693686049e25d62
SHA25696428f0f585a874c185d560538ad83ebfad0365d760fcf9fcefe80add9e3c980
SHA512078aeef086271b7f9cf0f6e3a1e7908d7e38465a1a7a4de6f2a785147e9130551a2995e80600824da9341d58e5425d4505518e90eea9ffe1c64f4f41825a9660
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NVDR4C1U\cb=gapi[1].js
Filesize134KB
MD5f9255a0dec7524a9a3e867a9f878a68b
SHA1813943e6af4a8592f48aeb0d2ab88ead8d3b8c8b
SHA256d9acfd91940f52506ac7caeffea927d5d1ce0b483471fa771a3d4d78d59fda0d
SHA512d013be6bfc6bcf6da8e08ed6ff4963f6c60389baa3a33d15db97d081d3239635f48111db65e580937eb1ea9dc3b7fc6b4aecb012daeee3bf99cfebf84748177e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b