Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 09:26
Static task
static1
Behavioral task
behavioral1
Sample
a4d7f92c3ab943b9ae8f4282db2bd95e_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a4d7f92c3ab943b9ae8f4282db2bd95e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a4d7f92c3ab943b9ae8f4282db2bd95e_JaffaCakes118.html
-
Size
460KB
-
MD5
a4d7f92c3ab943b9ae8f4282db2bd95e
-
SHA1
313aed8183ec8574b24c3484c17eed692e6fc9d7
-
SHA256
192a5646a6bb9258df5ac570dd93d4476404af7bc391a95b7c4cc525d12616ab
-
SHA512
507ed72473609fad6e629b8747856e6bb3654874594ce04a053b5742aed51d8ce46caf8ff2daa8efee5825fdbd0bd3a5d0795fbd07e74541385c014eaebd091c
-
SSDEEP
6144:SDsMYod+X3oI+YcsMYod+X3oI+YFsMYod+X3oI+YLsMYod+X3oI+YQ:A5d+X3s5d+X3f5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424432678" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000fa67e01849f95685de19764a9e55e9acdbd5bc0a677ffbd4809661838e690485000000000e8000000002000020000000233f62169f4ea43e84fbbf58c5c2dbdd16ae7290baf5c9a8f0bcb97a94cb4d822000000080a4f5d8546d3c528bfe35db0ebdde35ac4b418994db141fd36b92ffd7851973400000002059202cba70e095938455bacfb02f759453c1a4af57e35c44dc407de71b24f8135898fcf60b3b537febbdd6eec41d3b4227b4ee26fa65abc36b4feb40f14077 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0690de973bdda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1034F0D1-2967-11EF-B848-DEDD52EED8E0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1200 iexplore.exe 1200 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1200 wrote to memory of 3032 1200 iexplore.exe 28 PID 1200 wrote to memory of 3032 1200 iexplore.exe 28 PID 1200 wrote to memory of 3032 1200 iexplore.exe 28 PID 1200 wrote to memory of 3032 1200 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4d7f92c3ab943b9ae8f4282db2bd95e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56087f714e30e35e1fd253cedebe8758f
SHA1115819f5e51acf3d3e66fd6a236c7ec5f1baac08
SHA25642b995c875f46225bd1ce1c486cdfecdf21134685b8a67d6e25b99ab73b246fb
SHA5122eb8d529df82bbed1497440be00f7814e9d482e488d1ff75ec648146553d49b51b35ffe42e7bb4b41686a960b37271a002d13ccaaf412695c10b0fb464a5431a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ee96fa5e2ca6011e1fe5d1455267a7
SHA1ce3b566f0a974dd2015b9ac63705f022a5c5f186
SHA25632ff07beb9141bb4702a385cbbdd9aafe005304a42dff96bedcf80581ea7a84a
SHA512081086fca8528f052309ee16fdaa1523971d593be827089646fa9ba424532b39fd2e286003c5d04ff699a92aea1bb6fe0fe209a5e0deedf086338c356110faf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51868d06b91688ae703f72edf6e97de34
SHA1618b8a38af1c1164756d106b784af82aef6bd49c
SHA25695af83a44efba5b975ed5e55fb2decc163d9f765c163b629aa09318f93188f03
SHA512f3a46bebabe688444de059edf06bd738f93d45f894cde04f0ada527ecc02be6733b6cea5141504fea98dd1bd5fb8120ba1443e39213d4e02ac78da8bc2b73f87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f9f0015ce1a4cf83699be4566dae95
SHA1d76fa560fed42db7413a8fafe0ea3fc91ecad82b
SHA2565a07208ff2c82c19b996b4b8d00c672c6b57de1116c7ebe0ecf456f34852346d
SHA512297633fd1640a43a7445472167d2eb5433696ebe4792ce35f1690e080a5adfd2af17fb36144a142f690a3cae7577b88a8ad1ab317704746c84b081a80bf213ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ff4475455c6b810d07b3f1a993dbab4
SHA19650d7bc3bb70403a51c619f7b5f854717749832
SHA256a11310b10aa7a52a94afbc900777978d6a671abb1ccea873d76ac0a88688de6f
SHA512127e983e67821f446964a6bb386041eba41065dd1362286fa5628483fe8432dccda624a47da3a52892e5b4acd8a125e66eab08b68ad4e6695503f7c200d85644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524c50cd2ed6da50f4319c6e19e23bfcc
SHA1d69771880a6291722c78325b3d8d74a7bf2cb6e5
SHA256c50639848a58b74e6b232c91834bd42b6041f0fbedf0cad118fc6c5affa32848
SHA512c264f23e7a4033296fd96c62c9f6d4578fdeed0c1aa30ca0d230c726a58042b43755e63c4a826bd025889e2289144bf2b18b9d88af329d19fe5b422f1cfc49f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d14661800b5b192226d08409ea970068
SHA1c57f7f47937e3ebddf7a639a8aec54e2fb182e16
SHA256bae24e172cbb842785c16f70771d53d289a559c726111827b15e10e79ea8d110
SHA512116168e897e10c88e7ada44bc0f749894c8eb0a26c04c4efe34f0476fc7c6e30d358339495e3ff732fe236dc75daba6671f80bdfe599a160319aac1b5707b0cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbe4f7fbdb6254cb58bda0d99dc48b21
SHA11eae3180d988388e028ec4315d866c1f7bc62fb9
SHA256adbb030df50752dc2b793a6eb6ce2b002fd80b85c72c040ec012f04a8a0b2cca
SHA512915d2c61643d47a053b649b64bd7cc6186dee9af9df1d4da4e397c0a5467329d9ecfccdfb9f9ab54248c3ff4d80b9957c2ebc7d3d669098d5ee442d6442b33ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54771ee12fab081d08d8dba7f3d69c634
SHA146656220cb46430f0f7f25d2ec4d61ed2e120557
SHA256d10d90d3259c1aa7470071880ea649d52b9b2907871b1f5bd7686601ce4b1ceb
SHA51248bb5fd616ec3fc376cbde7a66efda3f45f566eb69f8be7d033835f5de3a75b50127bea903497cd6c2cd8afdd9da69e2b8c0ef8f73f4babbac38b6ccd93b631c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574ad12d66b3879ec3cff8693f8ef849c
SHA143c81a9ef355e9bbef0d8ae4f52e6636e101ec11
SHA25647a125b5ca8a74b5b88c54207051d0d8f0a1d58b65b51ef8c24bc25aecea2ee1
SHA51250d453684a0e5904d33291574cc175dfc9688ae8dcb2dff2339432ae5e368a6b3145b1bd7e0581762edd1364454249716267904162bdc0665d6c1dabc7107041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5125de80cf59df04eeba51fd871cfcfc2
SHA1df4f3fe102fc6e5c55b0af14a38dc59f0def73cb
SHA256590244cd2d7f758a2a42ce3e9c1a15f22b9e62798351eebc79ca474216326a56
SHA512dc52a7139a5feaf2ed575bb4c16b459cc0a6d650907348d5076167cafd3ac7780d53b716dc3865d7203a541ca35bda58c3eaf4994eb3a7e05e53e841497c2279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56073489cace8ce19d9c5cacdb6e47cdb
SHA141ed62e3ef57f759e4ac5df6d6d4a61de9fa967b
SHA256a79b0937f10f91388d0a59b3bc0d30cce8f0363fb4a410037a27c23a6eaa435a
SHA512210d16f465bcddc87f927c46f51b8cdcc7837c22950935d596c085f4e348ffa78b690a8f2c71709f6e632407f09b67012ac82d192956e847fb305afee27596e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a3bb5f097f054513f535d7189f9318f
SHA16e082d3bbc5dd67b46cd5145b53c6d0aaa911afd
SHA256da2b7d9fc304ceb525b559909bcf9c0d8ac8214f250ed7b2a5716d410ab5c3c6
SHA5123a9cab61a852b6850cbc40724321eac92a24ffe91bebabc3f219b08ae336fce28b4ca93155a2dc8ccbd79e06c78bec922a6a1bd6cadf1f7360e5ea1b4577d900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a72c4eb607d27dc90bf4a81e10ae2007
SHA1720c4f55001d86697a28089a3c42ef79c93fa45c
SHA2564c92dd662e0d2671e4c867b4ea4ae477a48dcc4403abd1ef6c4986399bcdb3f0
SHA512919c5b0dbdd158e974e66c926aee7d9fea8dea330b767fd32feb1c40d555a1fca069d36ac0e46fcdda01a1d0cccc875cc344d08b53bfb329470bac4ce6140c5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f66a2e95794cf15b9fa5c1eaaa598ce8
SHA12ca057b6564194b5591f8cbc9d53202a07c7a63d
SHA2562f6e1fb5c68b795a70a6b9ae4b3ed198e39d8283f3eac62b434c9cef9c6f2269
SHA512ad54bd3ec2e1b4a933fd9f57212a76b511446097f0ca130d5913272c24a8b2c64325793c0ee2b621b71ed341a6e5d6227bcb9731e6fc733c9f81e3b1f77e5f85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be7b2ba32af3a9affb314c44d195cdea
SHA10a382751ec25fa2899011f3b7441aed014eb4a1c
SHA256798661fb4debaafda02260d4a0615492846669f388a00984bf4b2e439c41dfce
SHA512b70c23f3b8f33356abd2872568495bf19d6a03e679cb5a27e156ca9c94524290d0dff849315d7c89846ff5ff140685779121a13f4705f40b5260a26fe8446d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5283dacb67fc3e432e972b9c70f4f8cf3
SHA123ebf6dd878366d359e50817528e690af627bc40
SHA256e935a17837735e00f0205a9075427a1c5fc8daf05a0fb582f14189ef6cdc1aad
SHA51238c47f5e09b9455fb14e0622a969898a2261973029e18ebf2dd2a7e94e888d792cf5635fd6bc6bdf9edbf1ad211e8eeffddf3b4974636f249934cf6bc43fbc9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5918baa64251cafd324a52bccf697efdd
SHA11f5bb792044af113e0ed05de146488a3e0587a64
SHA2568881ff102540eedba62aeec8d0bfac6856d45f4df7edf8cc19f1559a43a63766
SHA512ea787126bc5dc6863dc443f4f4050add93e593e13de8f50028c77ed4b3e3229a53d3afd6f0636e2a8b43f4d1f2a3d9821db2842460db607384d7e94fbd2b077b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524409467de5c2ecdb52fff17a871a049
SHA131be54d5813bfee9cf07340f1a7e73ea3590f506
SHA256d93ad6d0a3734131fe84c5bb78fb1bd4f6567685b5af3b6eb317e680ba605046
SHA5121443e50ea20ec70ab0504fba8afabeee657e4fba20b4abd85117c372f11327759376eae5a46020b9806291ca9212bf1e3a2ce3825756989fd0e578145fa373af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c864c7469ec2c019b7bec21dd254794
SHA1186bf2ae5aa5f4d4cebe922a41c6038b6b86c579
SHA25657a8ffb60fc1cf722822780665ce32eb3b7a06d1fc4ff20dbffdd72279e05cc0
SHA512b133f5d0319f0dd4430c00b9ebe28502765233c13da79f7b11362eacc844115c6de5688e248ecca5d186c847135267c5510db277224595f9bf703eebad807a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5843554c518c601d8311404d86878e4e2
SHA186f66e0e99d65a519ab763cf5b3f6d54743794f5
SHA2567148d77da8b70b69be1514903e2daab1959380c00b34e90d2f42b5dc0bee4b7e
SHA5122a8aadb63aae01be057a5a83ae0c3ebacfbc08b6a5b95d89c0c0e53c62f1874b87bde45e05be9601ba30d549f911021342d92e267ddb29a482334cb79089e072
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b