Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 09:13
Static task
static1
Behavioral task
behavioral1
Sample
9448f6b7d405efbbbefc81e8893b9cea_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9448f6b7d405efbbbefc81e8893b9cea_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9448f6b7d405efbbbefc81e8893b9cea_JaffaCakes118.html
-
Size
460KB
-
MD5
9448f6b7d405efbbbefc81e8893b9cea
-
SHA1
9f549d37292538cf0b0997136c63d5def32025b2
-
SHA256
c82c58c2926e36842e5983cd2f6bcfc6cacdfcf928e2a6eb6f4d36297eda70c5
-
SHA512
7d387a0eca43035691914b4af4b9046c270b81241e180259b48736473a55600df07d062c1db21bd4129ff52585b54431255b894dad27f39a9ccd6c54e2f565da
-
SSDEEP
6144:S/sMYod+X3oI+YiosMYod+X3oI+Y6EsMYod+X3oI+YLsMYod+X3oI+YQ:K5d+X3n5d+X3t5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000061dc63ea717eb41ed28f7649b3263898d2f90061e78d9b9fe94b2610e88cb701000000000e800000000200002000000027d344441a534a3c2595121b5eafc1f2dd3274da9e9639c446db4474735537a820000000f793e64b7ad06109d8296b1d906056cab1231f167c4fec6ff9b090c7f1cea60140000000ca2d6a7171b1e956deb03098a6aae4984acff1a4748117df4e7e1ab7ec2b776f7fa3dc993b12db1dc45c61b6c957512dd3e058245084a1cd84a5b751ef232e3e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e1a79b5fb6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423654299" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C2D6CB31-2252-11EF-B21B-FA9381F5F0AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2980 2324 iexplore.exe 28 PID 2324 wrote to memory of 2980 2324 iexplore.exe 28 PID 2324 wrote to memory of 2980 2324 iexplore.exe 28 PID 2324 wrote to memory of 2980 2324 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9448f6b7d405efbbbefc81e8893b9cea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545ec601821b249605ac1e136eb98a7ea
SHA198944e61e18226b3c7f2870ecff5c46c443f145a
SHA256605606c31264919aea0747ad333f3f78e9fce389ff5f6e36b9f2e72727bfa927
SHA512e8f41c0fae85811c23f61c68871266a349090bcf064dcd7fb8e649753b348fd074d8331addbf15347b3d49b5434a3d9eac5a8528fc3f24cc49d448c316f83474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51280b1ce7f688c563b906a7b9c327938
SHA15ea738114dd97e48433459e04c1c1633400b96bf
SHA2560c8ee36f9817c2b3556d9067c0e831f439211474deb7c63c49da7b467a18fa24
SHA51279e1fe8a62aee105c4e1abbca0e6a938df732f8e670767d7995e9b81ed4dd4ad08183a20498a68370eb7de334b749ab4a31446fb62afc0c9380d205cd3579731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507212ac429df21b2235d343da82170ff
SHA15b074cdac9aad97344cbe7f37abd336cdf24f811
SHA25675f41f6c0b303ce1d9dda92bd50b93a41e61e1cff5a873dc6183606df26ef9c4
SHA512271619eaa958fc42444f515d981b5ced5f173418a81196ad9f2cb78fc07a27e4eb656ac82d395108d34016582415111c7ade3e3416ad36084bbea8d3f50e0aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe2c94a99d6515db48d792c12a24b839
SHA18cb7bc954fa6dcfacf4800e839abc941e5928df2
SHA256b860652a3e0364931a7c24e6af4b969bbf1ebc862e2c9e00bc31eb02d6e61943
SHA5121d85e62f23d246fb3e36e922023d1020384ca5d04159bc2efba1174c740efd1b293eb3d97a4a100feea2ff3cebb0392e512e8ba17b09c24f313fd8d620c3f2f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586e2a41fd3fba70582fa1e1791d1d402
SHA15d47d831bcc13b9cbdc81adb5f2d9d6403daa6db
SHA2565a061e29c6acfc9e129b80443d425737b4ee84fb3bcd9cf8b32f06b952896d46
SHA512d3f7596d4254f31bd9aec89b6ae641beab0b184582e1f2780bc5e0c527e77b0f4e905857e574c409c4dfbd9f13009a2bd0544865a983c5a1a57e7523bf22f741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5505e38455320e923cac3354c750572af
SHA10e0951d1dc5f291d532d01a8fb022e4da9d94b35
SHA2561eac8cdb192b96a675006002fe88bb27d2a844cac81e0b3bd794d0c22d35b1ce
SHA512197ab75aa570ed8f907916568233eac78e75ed2771596c9fb573cf1d1fc37cce8bea9bc54f2c8a11aa721f86eeb498b71cb44964fd13da35ec0d53318ce4096c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552d8efcab0e0660ac4cf429e3f6ac093
SHA1a224354560029b115c85be5ddc84dafc79daaa41
SHA256919acb6de3392da123c7eaf05615f1472f722c9fa63fba192bd83b23ff9f8a5b
SHA5124b24b92b45b0c9a767b83d5a9cb10c77171c2444bc3fb400255338f82a5327d5d1a8b6e92c5503a9a89e5099fecfaddc9092a60cd98debdc63c2e78448aa9109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c302e3c4d79af8208d1ff52d56cefc2
SHA130774cf119fea4a3911b7a4a87c891d1d25e6a15
SHA2565a2db52cf7845f7b45d7f0ee09b3af7f92e757083332b1145777bf512e748ce6
SHA512df2d69cab7592badf896604ab6bc2bae6cb62c90a7f83e50ab2bfffe0b2d327bc7954a3d22ea1be14ebc205a164a9b09b8d1e18f50d9b457ca68c23082de23e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f279ee7c644e3526ca2dc60d8fd2a299
SHA176124cd9830d5a44cc72c5a75bcbbeb1eaa3081f
SHA25656f179dab293ad80ae1842d097676460c36abe9ff34c3791d010feacb6ada20c
SHA5129eaeac5d3d453fa0a5b9ac423b6efd05ae8bd073690c58a596cefd473e76180316aeca72ade657201fe2db50327d1db0884348ec9d39b8c8b7af8226300ae19c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc95062926977d272ba21cd9e0dff7fd
SHA1af74cd69cd468abd7df0b32622db9937b73b6fd6
SHA25640d26c59d02d0e139d0d87d5075acdc8ddbd75340a4610621d066009c04665f2
SHA5128ca681fbcfd22fbb821bd7bdb54b6b49d8f4a614f352826b532e79c9168492d4df8bba353a806b772e9c883220605a0df3418d7a000d319fadfaf891ad3f6fbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d5fda5a586787a19352bc3c589e9c6a
SHA198ad35bae50be81677b819d6a3b7cf36a52e1660
SHA2563dbe62a7637d0bab8bd476ea1f1c9045e37e18bb8ded2de71fe251dd02aa5b7e
SHA51276efe4d6d43cd672fb1539e7f7e5c07f571cbce2781cda7d2d2b73cfa78fe2a126b812d1a2813eb22cec9a8ee76c433a1276be973f6ad7e3762d370286792b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5e500d94cc0195ee0f6470e9e5b6d8b
SHA1b576c8d45af90d584c56e9cde17272946756efbd
SHA25629e7ade9c390ef6eac471bd68001d3db27b6cf8a7cfac44c14e61e60bfe01514
SHA51208ff2353b6682f3a70a44bf375ee4df518c6cb0d25d43fc75e2dec47dacab24eb2cdb742b3d10ce2a6ebc6f82790f3d3276b4ad431cc02af2cbc51575d5fd5ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58531bc505dec0a6983a88905d96e4ce4
SHA1f28c1b299bc6cbb18610582039d9b79876f579ab
SHA256baa890b9debd4c148b14945562a7293965ab1f8b4ca1b1acce1c1c4db317a025
SHA512fe78b5f4580161b8025535266f9f1ccb65a2a8895dca1813fa6573192a03b2cd2a54a859ff76e6bb26b0b8190c56e71724c51399b910c079098f57058817bcdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cf727659289baf99e01ed14d11e518d
SHA19d6654171ba3dbcd5465b3f90c834c5c8c3d7526
SHA25628162a788e965765686f26a488db2ac3763ac8b65f56e532c301aa8566cb93fd
SHA512ff74ce8404ab2d3f37c898fa83002ad4f0771f359a55bcf7636b0681ff1414b4b82d0b15460fde0fa13aea1385fd25efd3e993416d193285563e071ebaef3674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ca0b2ee92dc790052e4f0da6a319ece
SHA13e82972225acbe19e264ab7a91564e49f3fa6cb5
SHA2568590dc7d49d4468e445ae24e737c7a2398a38bffd0a6dc69ee6f9250b10d7fc6
SHA5120533ef691fe15269920ee76aed192984287f26f2efe8f06c5ed2ea4efdcdcda13e68200e241642c5b78d7f4e775f87ef600777174889668ffc65d49a8d86038b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ec28cf2d0c89a4e5345e4d7291bbc74
SHA1b42d67898a2dc6ca690ae3f1a55e09bac53ab4ad
SHA2561c05483695ea9cf82e3651c41a990a10fa4fd1aa5f13f5dc49f7426e2ee32bc3
SHA512d6e3c7cc2f9314fa6105150a8e2dc02dcdb142ce8748b24630850d995d1fc6d57169a660827e57890369880418da4a09e6ef45efb8fcd643b2d25978bd33b544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd029bad8b80687e9e5a1ff4ddf1a37a
SHA152164de9eb4cd7766743cd36524fac2b73504930
SHA256ffc153a5a7d84c25a58096d2b61428b0006ab084f14c3388daa9777456caa9bb
SHA51266f5515e26fedaaba5629d4cb2ad26cf236f17cfc8b67ed1cb57fbc4f130b557911b26446fab982029318e13bc4e35831859a2f9b9d53840f650747e20f58321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590345c2366026d62a651a4a717e2fd42
SHA1e0cf58a82b36b1188a54902dafef05262667eea6
SHA25681d69c8d99cdef4a4a45305d50b616e30da0f9a1b32fd9ae062157b54975d441
SHA5124576e93be4b8ba54a9a8b34d74afdc7abc8b79dd45bdcdf890f7c9bc95e1c2c488a143d6a103b4eb29b09d6f9586a4272e3848e7f0d858eef2fb133dc2798669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eea10b92d4eaa716268441dad9429c81
SHA15b8a7f40178a33021034ea469dd7be18b16ceff7
SHA256320c700ddbd077c644cb6fbccc3424f48e405e6f4d8d5d1d23106ea4e0f555ab
SHA512272646931f6237d8589a4ce7b37b16e51c629ceb32b270a182ae3e2ce82ab6e3114eff7e5a1e8383a7daa22d939b73888f35688c5a2451ee5d54f026360c0f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d5ff8e4b65e03e202f8d5adf2198786
SHA12e63619737ebaed078b2a942772a45616fc7d9ca
SHA256e56cdc63cdb241a6f355162d230895c098a830a0264458d199ccc296279cefc1
SHA5127bee02b4bf8ebadaacac6b2cf85f77595f84a6765d81ce5de9f35700fb9f493576e34dd9b7b022f63aebbaa0411e6224bd2d22ff11f8a997ea2c5c4d3cc0b2ae
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b