Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
c06466c897157cac7e2a38334923280c_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c06466c897157cac7e2a38334923280c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c06466c897157cac7e2a38334923280c_JaffaCakes118.html
-
Size
8KB
-
MD5
c06466c897157cac7e2a38334923280c
-
SHA1
a8c87c5c1e9fbf32c9410b08d8d64a0184fd5c84
-
SHA256
b0eb8c5e3b001dcf077aaff145ca50a11dd6a0fbca24b3e6375db440cca2e13c
-
SHA512
058c7adca9f2223c74046d20da80bf297a18ce62574715dc0b6a9398212e9b18a629ca630717540b966db9f1d9b24e747cef5abdc71cf72157b223ee46357d39
-
SSDEEP
192:yPrO0p4hVCIC2YncF8N5qoes3PQjcjDu+hVVHf:yPrOjhVCr2YncFFoFPNy+hVVHf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000d733bdbea4b68e2b58b2525f65c3f093073587733a12dd412b3b6508b6e029f0000000000e8000000002000020000000347663bb4105c6590186984c961190b42a7cd9cf43bf67566e403a2559a55d0c20000000f14953b66ae85e7dd043299ec1ce58a2ec7c20e48f5ff9004a8c1164c34f4a7d40000000645793c9f54aeb72616e7c5b9f04c8eb64c9a054e17266911f6554632cc43cb1ac121827f5771644ec64dfa0f727149657c69d8cfe73af86a21be7c432b69e68 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d075c585cdf6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE8855A1-62C0-11EF-98A3-428A07572FD0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000014b25f513e87fcf99856b058caee60ad617a9dba75dc774ad60965edb7ed22a000000000e800000000200002000000071d54694417fa994dc903cc1fba8dd227f1a837d6e96b0778b5088cbf83cfa48900000007e689d2c67f04882ee1a826b5778d86d6226011e035670e1503377abfbf280fc7787516a49a9492b6fa7b49f03ff884205ee2c3ab1aad782763182e5711abaaa6dabe082500a0ef981f998855a6cf51f685d67aace3f1aaa45384517508908cf5765564cdaf189255381b9b6cfc95f46a8657dd745bedc2f67ce0a8cc573d0b7c25b07dfdb6ad20c11c4c1a45ac4175640000000b4a2f17c0d2357edbd2df9f8ce1bcdd97567a3eff29134879dc9ac33fc6f060f92bb4c5a130afea99c4376f39509649e1d029a8f46fa5543eecca77eef2c772d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430738384" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 812 IEXPLORE.EXE 812 IEXPLORE.EXE 812 IEXPLORE.EXE 812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 812 2204 iexplore.exe 29 PID 2204 wrote to memory of 812 2204 iexplore.exe 29 PID 2204 wrote to memory of 812 2204 iexplore.exe 29 PID 2204 wrote to memory of 812 2204 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c06466c897157cac7e2a38334923280c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f788eb264e2db2f771412680bc4acd2d
SHA151ea36189cd72841f284314e8ea7d0ebc4bbcf74
SHA256e0c40a2cf151c0afd212ae687f855b8ad50f7fa690ec4fac9bffe3140d078405
SHA5127e9332c51131efceb4079aa57e25b6bb82c8a560a9c86461d572875b53708eedf237628fb4f6d9b1b65fc2d5ade7150fb15a83ec0ece3059d83954b9f5cfe6a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b07f764cc5a0fbe357b63c5463232b
SHA1d305fc4a6de0cd42da6ba0e200bbf7555c156b46
SHA2569a0cc9c71b127f805c198867979a0918c99e717b93954f03d0f5737726bb7bac
SHA5129c8718b84eee11d8fe8d893000af2092a27984894e12fcca5075245c075878bc1bcfc5006f28a4275a705a0f28b00a4211e937f5736255b082185b534001a133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea9141461d0bfd5f8c12166cd85dc6f1
SHA17c64f043fc99ff03d6e4bc72eee685e08096402b
SHA256d92707a514fdf8773ea69a0df13bbd2bce16cf6db2e98eb7a0f80a1f8f3efcf4
SHA512677697f787a9b134ec4a10220c22372fa8b7d3192b13f4fe0c3231353c317a228faeb76b243ae284994f55de32d06497f6429632ef08a81edddb7ba22c46884a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c16742fed4256c7392d21673a8d9a4c
SHA1d2495cbe8162cdf1d314f0455d6b3bc1971735dd
SHA25607986a81f307ec60232b3749a94aac22e53bdc0227c34117d7497722af20467a
SHA512bedb303ce2e74a06036a5e3157a6cf31b3da258efa5713f11b98886c260ef93da12f2082b99a424ba32f9d5d4c7c5dc29b9a52a1e750c237a0d3c4230cc5cf4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b5c5cfd9f4a10a16bd41da3dc38812
SHA16aac01e09a94de459e0ceb1e2a1932d98e0766d9
SHA2569263dc2f9b268f18bb86ac662032bb9f2f259d5e218a95533ce09ca8d8fd51e2
SHA5120356aa1ee8dbf607b1bd497b6b8393b6e49c8db84e11c5a89b8ac16655592b5e4db7469884ebdd54ff450df11ff84697b02eeedc4c68e95f3f45ebca1fdd17dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f415f5a079a9fcc4fa8636e8234b1c9f
SHA1a7c6937e1208be3ef8b31fe21f2fb5c925594755
SHA256df4689565937db0c75fc59d59aa1484ee36500877005cda3f8272273a425e29b
SHA512b48ff901e772a71364a2b24bf16f51c4dc676523a6acb4f25ca7eecccc8616ffb5a3e6feebb18db60695ae7f72b9c764600262cb30b0c723bfcbc038aa639b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e18c64bab3e5a21539fedf987edd0eca
SHA1bc03d21c95714942fe559b4a95bb230a3f8ddd63
SHA256d22bcb3a02169abc1e2df3e39e07dbe6994759c74a5dd06f0bb3f27d28d5a606
SHA512b07c705d714c793f046c2ef2bc087404a55fcb34bbd1476519f6b953503212ab5985d069b01c6e547bc7376d5556501f89d32155ea1e2686536a6eb2b7b52980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535901d292b1772b93143ff4c923646c0
SHA1a85391d2023a549d9e9356b07f79f2da91ade0bc
SHA25656180528550f4c5c54d7a41d5dfe6d3686f1877cb830eb43ae84c76723cbdb65
SHA512c95653a32197fc08e53134d5c17f889cac04efbedbc42bf95284f7c4861dd16a891968ac76014c26cd3b91b2ddf00d47c75f91e8983c74a85c4e7d4d355aebe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5788a6a2505b90a7a14342d3b12fbc4be
SHA19f499dd8b5b867c579870bbb6462ed30d33f24b2
SHA256de72b97ff365713daa1318c39dcc168ca0eaea93b115e467d9daed6fb62fdeae
SHA512e326c85460bdbb7b43e1b468ef93275daac27b605e9a5dfa0abc1c702a64ec3fbc3862d40eafd075e5851384990e4bcf7712a07152f41685c80e8439d59ade69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac5dd3f481943843df675f52f48ffd40
SHA1938b7150497d8ab26d6ae349fccb2526b570bc05
SHA256914283ba6aaab867a036b2543db550b79e5adf9a430d8b85df9552e8c9936401
SHA512c178f246b780b45938c84236abbf94e8ea1b62118a93aad331e3a5bf1dcd404399f9de23ee6a7b7bede45eb7f5b52aee573e553656c70f4722b4d03839c007c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab22dd2064a18423d338ea7a49fd1c8d
SHA1e4cc26ac0c82a671ed146ab753ee4b5b5dc2ddfc
SHA25665eec55146810b4d847b16c4af12c5fe577ad2c532228a2d764cb10bbc2ec818
SHA512561f4fd00689ab1c8ec08144bd9e5db543f47fabed5b7c1e496bb9844258d75de11f351d4374ea4f40e260a8e7fc4d6a6972ba3250ead73d19dd279e27b538f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c854a7edda415bd71e2c6177012a43a1
SHA166bcdea33d201f1e6611abb3a179386673be7495
SHA2560a5a485402c8904ae6a43fac7a55bef670f679330046485bb21ceaf8c0ebdc98
SHA512afefa7b144bcdcd86d3daa40b5889650a66ed63185610a836ff5370d13bef0ccd215e1c578c5598ef989be2f6ece764e850f17626e50ef87d18b1f8c72dfad5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f61381cc1102a6c6cbc6c25f0372b6e8
SHA1e3e4b61d572543312291d1ad93977e74605bdb34
SHA2562c125500b77f9bdf00a0c0f3009e0d01faf79a87316220d399145a2deb907f44
SHA5127d3df78a41e2684d43bead55f775226837b6e01985929924b2dd82f4d4d7fb7562c157183a735fa892a67fcc3ac5251abd02125b0346a16c68febd8bfd8e6425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e10b6990b2fca9561023f6b4275448a
SHA133c731a311086f149b00d3cdf8734717ce2d7381
SHA256f27c32062b5c9f3c0ce3b3562ed0c41e99732d4f6238c86862ae56057d3007a7
SHA51215edf56f7b599c15976142795c54fefcc23ac038b5932c4b766e77ed008d62fa8699028fb0443f9771a18732c78fcaf61588c523ff3077185f3c301bf11cf9f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b019b7a2adee5800bd7765cdb4375da4
SHA1ff04bdbc801838ea07c5e9a3694417bfbde8e1ca
SHA2569741969066143a15987caed2ea959758145f93b86319af8c28010f5f716f9d9c
SHA512f9c9d17a39932984e162a013206bfa373cc5599cacb0ab07f45dfd9dfb355889989f14e868df1744f7103b6d9083cf9853dd2672de9ea903254ca228f5857da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e3ac98be6448eabfc1853ba087e4da
SHA17bc57d506b43eea6045ed91cbbe7cf18aaf5465b
SHA256967a3baa5d11e37f792b80cbe6f9594570db5071faf25f92bab5d3fdb1ea4add
SHA51265fc0871dd65fa94d1399c8a3498dbf65c75418cab45f7d8805641b16ae3c3c4fdecd7cd901e5adb3b96a0cde379c37e0ca371f8532547f1f06c5c7926ab5282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d03bf5be3dc15f950fcf4c2427398c4
SHA1412a68ce80305397a79f0f59f93ade63c818b116
SHA2566f8a6bd3622464c5c2c721aade3b33e6886822ab25778f94a54f5aa5e8f92674
SHA512ecb61a700abf8f07a0a1073e4b108ea7969b5fa2514a0ad6dc233377f85f44a6939883a84cffffe9c1b5f7e8871df5ab986af4b66aaddb54b00e0aeac9194082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5326cb631619c2d4e8d845ea59b358bd4
SHA17e85c644a01578d3a2aa7716a37f71a706c639e0
SHA25664689763a981895a3f6cbd83293e10cc8ca1d3b28874ccea279483c083a3e225
SHA5127dac924e9d4853503615c2f0fbe61f85f0fd2abd4ac60c432470747350facc0df50e6d5bb6e3cda6749d5563fe583e3f1fb7925bf7045ee2a452a0c05e9306dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4fc3e3c2b1161526084be37d60ac741
SHA13f143fd951c72a2cc4646d50c32c08e1b2e8d82c
SHA256161435f93db5a096f5a7ba5f7a5c003938744b69ae8f44d121548a3d4570d322
SHA512d0ceda45204999dee91c506be6ceffeb650a52f3da890c02ec801269dc4b348db9d407e1acc4067c969e00e6e47503694dc4e33cea53c70eb4b215b7495d24a8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b