Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
ea8ab25b1635c7c4530192609afd356c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8ab25b1635c7c4530192609afd356c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8ab25b1635c7c4530192609afd356c_JaffaCakes118.html
-
Size
24KB
-
MD5
ea8ab25b1635c7c4530192609afd356c
-
SHA1
08a28f63b0fbbc4fcd0c1a535e0ff5545ad5fc48
-
SHA256
8cc00509015c3771d88da5e1bef94f9b7c25d1625ed7abeef69eeff47c73395f
-
SHA512
8b8a85d694861858d86160d7b77cc291b09533751dab4ffc33e2ef9520e966e677f82845986675f7238a74fc31d5b7f2430dffd2288af836fb62e4b3e4a2ca6f
-
SSDEEP
768:1hN8BUPrssCQKIIacV2+s0escEoq3WRhw9:1hN8BUPrXCQKIIacVbs0escEoq3Ww9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000198544fa158f95c842ee82f6be8d469cb5191b367fe6b93553b177ab897715f3000000000e8000000002000020000000f744bf25a652736533ac07284ab6deb3e1a7562630f457fe155acfa359e3542f2000000096e949f17f3e1f57765c465285cf23fa31661196137d8181a6dcab0b413151c34000000092c6b45051bb30948363b0cdd1c6db80b6376872e977889a8fedc18aa78d0bed38233f0c7e70e3d317625e0d4d509546b2418a587977a0e0bd502fc83e0a2057 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301a1b2f480adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3F8927E1-763B-11EF-BC08-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000ba130f7cda813d869acaf22f2351c097f154daae50568c7c69554df061599639000000000e80000000020000200000003334a6b94594e3c55a836f521e49d06cc3f795772b7ce62698941c94927cbd17900000005ad72e428f1f2ea95d6bd681dffb62efc62336036015668e88c46db50ded1295e520a946fe82abd2eb1bf8e4553953cb67725279e38aff223492277a1ae12937b98326de989a83104e7afe16811873fe71312ea4072eedca565b1e5dd233c674a833c90ad2d1ff88be764a93a2f42129ac59d3510447a72c988af66d07df4eb6509e958da8a9135b421e497afd411d57400000000d63155205a143ed31260b95d76dc1d6f886d13acf1b44c73e3a3080b27f4ff35053c121810a75bbf4ba1848436b86b34f9c97cc95ec9478db98e006b45cb050 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432880099" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 808 iexplore.exe 808 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 808 wrote to memory of 2508 808 iexplore.exe 30 PID 808 wrote to memory of 2508 808 iexplore.exe 30 PID 808 wrote to memory of 2508 808 iexplore.exe 30 PID 808 wrote to memory of 2508 808 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea8ab25b1635c7c4530192609afd356c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:808 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5850a46d26f20220e2e19a400a5f0ef15
SHA159cc6a7e3cc0b7f9ee2eb4f872fbf1d1d4583c1d
SHA256b6bb049b735dce72a821cfd75faf9a5e4afbfce5511df31f2faa519bbe5f0a9f
SHA51297399ccfc36b03d1f2c2acd63d45d8563b7ceebdb063dd4520d943d87a2ba4f947c0d57cd68c036c4834e6b68d94d8ec0f34cff6a2a5a1eec52a65ccac1b5d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de263f19b35b1ff999763025fe2dc083
SHA14733b98fd7dfcd9bf850dd3204a277ee29ea7365
SHA256df731d7e7d30cd02be46238b1ba561d670d38890c685dd82095ba4e766a84be1
SHA512e72f8939407ed532b69a9f757d5f0d6428316e25b8543d0ef81992fc16c6dcb1eabafa752514b3bda535490fb69c1dae6043ffd6008b6472c9ca0d214d62bea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e780b9d96a0957dbbd9d5954429558a
SHA170fba37ad3096f887c7425003c62cf99384fd389
SHA256484e288213bd498bf6721c57931aad5594260fae890531421294f5d27efcb4cb
SHA51286e784b753b1bb0dc500212ad2c689a7b7bddaaba9200c8e7b8c8cd96bb9d085cff4b53c0ff46dc950e456c77dedc4fafd1fb4be008ed04c3a03d9ea265acd0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515303e59620a30da331fd31807f7ef50
SHA118c28080da18aaff35778164a824196a64975124
SHA2561f6716969661a4d6a9268c204dca498d5e11f97d981df7f0273f12d2b121d0ce
SHA51227c176c6ae6c6cee83ee01bcf7e329b849f23e1ef32008ebfd91c2a63901c552c7404edab0a671b4edab735d101c80fc0b805a994585239892537fe30e35a06a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d70c5b47f067d44b798eda033de947f
SHA1c7321ab57a7b324333c47a1c2c6350c07446f65f
SHA256468bb855dd4716ae4ab22fd16b72361c6d33d85e537ae0b883412502441672e2
SHA512cd19a31205272a96869a3aacdfb74c592f21c33c6065b3d229e0dd504812ab752a531c0498ae1588725e3ae41f0adfda6c30ccebe855387275944255577d3b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ad3bc7cc3b812a4eabe091e91be9841
SHA1d0195cae9d154e56b7bd2adb65f85f48f8217449
SHA256c101646d796a97e37b5cf211eb3d6bda8c9570a98ae45633638a547d5e236190
SHA5124365342acaaf5ee5a356fdac65993a2316e85953f1783794fd37c7bc68a6d610240898dddcc0b6962d616b0612ac201a13a075cb45c9fb10fbd1044705c5f1a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd37b19818548a3d76d33dc7dfb5e620
SHA1557ecdca190c11ba93298741bea46cc80bf9e0bb
SHA256266f8a1d174955d238e2172c6ee230131b3f8349c7080eb99822636393ebdc50
SHA51266f405135bc7bb815bee658f59e4e94ede5633b584c548b3c03e8bfd2fd479fb6363d7ebf28ebf02a80e3a429086d6dcaa7f85f3eb07f56c4b06de7b22c3444d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b538775a54ce698085aaa5f58db050bf
SHA1c4a606b7e4b288a576bab5ad81628b8f6acca762
SHA256a70a775a8f80e4157e55cc4993ce3555be125a25f074fdc9227370ff6db88aee
SHA51277f0aa2eadb17df70e8ed173a076a0e0454fe4dd6848fadc83c76f3e828ca26152448645bc4d57e56aab92fa9606567b132bee50f2adab56e5c3a3bb73183802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54795e55906a5355ac4fe521d65960f4e
SHA15cebd5a0a9c15cf9b091895d402dba4e496e11d6
SHA25607ff5328655af6af5047c6c07715672e2d7e46fc91433fc2f103db283534312f
SHA512b73b67f86d570a5283d136cc59b1d81e9fb81cdc2ef52d98c4b32443ef0234d0cece63d4f231c9ab692f5c9eea7ca21b0d64ec8fa68409ab0443f71570dbf6d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529860eaa4deb9c1f0117d4046c47878d
SHA1f18f3ae0645e2db2e051d02f577b3c72ce1d9cb9
SHA256a9757aa5e3f3c41e4ccaed1fcb119f56f149671b7ff94afd7c147bd4ff1f0c09
SHA5127b9b4a97aec2239942827435fe9621022e46bb345a248b82e3738e650ac28475890417d5a12052c1ddf0845e18c6782c41080a76ccb61b31ed5c192662cbfc69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e3666a825f6e2d92ca6d3537c74bc3f
SHA15912a6d433013270cea887768c246b09bce63536
SHA256ae015cef4a5698bf92a10fa7ce70ae4ca4d1602a855716c5e7828e864a86e45e
SHA512e7fe69bf938c770005ad79f271502006052630419853d810f42a577c8386610f26923905ffacc43a518c010718b418ff0702cd68688a3bf1967c46d881cad9c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c7e23507eb97048dafb4d26fca23a72
SHA14e01030c0c6da6c1c9526314125acc80fdb79248
SHA2567d157a017cf2b81fc03fc362cc8bad97dd324ffe78ef122ca9d605acbb48e840
SHA512982d3da3aec5e2f98c53acbc662c6786d7132e18f9aec0d6ac110a24ff38f15ea1d1bf3dc090f23d02e5e1b7b2e0fc0de70b9e31569da284010b279d6cbeea0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2c029283a1c354d6e60ec9a6f9eca81
SHA12ee7fed7ed26e67006d5f65051d861ad5dc8ca58
SHA256bba0c59ecce9cd151b7722ff00434131f3f932fd0dcb0a44531c6da48724201f
SHA5127397cb848574d7391bcff255d81ea81b18082dcbfaf5dc241d7d21ee52b41056d4cb9063a53f26c7bdacf8cdcedd25dbd29b0a54ee56cb4c0ff9bd1d8906a131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576d4efb40550168d9c201fb3d3de5be3
SHA18776218d0e5e685ffbf9b9095aef1d4861baecfb
SHA2561648ecfe4799ab611af876985a27fae1ae57fe19a55806dedc1325be1c236905
SHA512482fd44c80d2de0b2c8a746b87e0cfe307aabe41386648d154b3c9cdcc62210fa2f8a002c304dff07b5e3d63982a3a6acd3ccdf8cd596b6038e84c88b9417cff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5764e01cc19610142ee8dfb5aad65ba2f
SHA15e250fca124919ce45e5fa66a011a5a7f3193059
SHA2569c8fc013bab07bdb13a60110d0b0f15e979322f2dfb8aa41792f667d32ee11e6
SHA5125920093c57310fd036feab5ec9f6b123ed90bbee690c36c46e0d9a98e6c15fe34aad5c7e250f281c284665a5420678d6ed0e5cbb755e7edec27b16e395e37d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed8c8a44a1ecaf219cc3cd7e1f24baff
SHA17f21eb9ffe75e8239ed30e46cadb40558842835e
SHA256269a18ce13b57cd85870ec78c5ecf6734fbfce7edd4a22ae2abe335b137a981c
SHA512ae53d3ed20846b201c2686a49c8b62d1fac1e0023a6f2c23c0dafd8eb3fee5f25d5aa9e67fc66d8eebb71b20efdc9893017e5efca21af5775a09edac5ca320a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb443021e33bc2a3a76e59312e6b9436
SHA1e4d84fea68259ad9bf8b796d60f11923f4c89a1e
SHA256c1f412d861338a1d0e9eb87d74db3abc4da6e5ca21b99fccb0a16ae24eb93be6
SHA5124937d2f940e09e258df9e0957f2d78cb395ee1f5f512fc06f65c0df5c0da781afac313806d30a83fefedd189c6d44ecb81f957f3fdea3f661211956b8c5bdaed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515aa0dc1c020480be211830545279e26
SHA1b63e78157280888c724c6413a89d0199d2750cc5
SHA256d53c3d781465ff6eac6cb02e7e541aaa2acadf9250f9b67807984a9c49800a21
SHA5127de241f3fbc6cc51e8f6e97297d84ffbb79a9ce04ff508ee420b7f39dd364f8ffaada3bf0edf8a281ff02589a34ced063bf0e41e8b99dd3b32faba2a4ed6ed3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d8b04faea2e0c64cea28171c785b1d5
SHA127a488e045f0332684eecba5f0a13b1b1ba7b61d
SHA256fd1a6fc084a633aa066efb3f51c2f34e5dce9d341a211a35f16ac531c6b7d8c4
SHA5129841440c82d1290cbc90d1f85a91ae592ef5d4bf56239809494357c9d6f301d420cf80ee316cfc60705564893f47aa416b22ab96c8174f7d51f11781ffa0b777
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b