Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
eb28871a82ae211005ef76d57e552b35_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eb28871a82ae211005ef76d57e552b35_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb28871a82ae211005ef76d57e552b35_JaffaCakes118.html
-
Size
597B
-
MD5
eb28871a82ae211005ef76d57e552b35
-
SHA1
70fab0d5b55f0bc5170bd4dad624c589159c50aa
-
SHA256
203c9aefb8fe75524a96d7899f34b2ca90bfc9e838a91308a0009e0f48162d75
-
SHA512
d228325a69e1ae9f558185ad0d4712675ac990a8b395d34a1b900dfd7e15d01802906271b7e49f3e9f58a8254cc00cca27b3696b44005fbec495285d390be2bf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000fe131af4ba54a69e62ffa3e40b56370106d3d46c65788f624d91b77c844daa69000000000e8000000002000020000000c315d4c0ba4017f4a113f438f48c2ab9dce77a27a67e75638492c341b075d04720000000ca4d0347c0602d16aab8d1f605aff9d89edc8f1782164ed3a132479935f71c3e40000000f45cd7188bef495a9516102ca51a71811fc46fc8b5680a141b4d64d9f5d466b2e6ab3126232edfda24cdaf64f84cf040183fc101d57d539835b7795e8d32ac27 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01f022c800adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{577E6AD1-7673-11EF-A9B2-6AA32409C124} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000161e8cfe9476411758923d33b1cb6e4e7a99f96c45a61617d635720f42270d9f000000000e80000000020000200000007fb2da3088c83561b6e5a445844219c06976cdfc338c5eeed8656ed733c5a64190000000d5572b7b5f26a3ea7cec7a0c4c26e2be69056f913fedfc6eeb013a8987b48b40b8cec440012eb0b2ac7ce1517f6f3f13175e74bdc58eefcc05b4e510538ab0d199ff0521dd1113bbf7da197e0761c8de14ef5cb90117650a688a15c3ad58a51f35119a83ddbd23fd66f8e2fa91b87096adfac79e6b350d0b7dd9cc049540c29f06395601d8f957910410a80f1044d483400000002b1517b26db8508e4cd1c3b0d36d835bdfc83b309c0ea6a74e2826bc538190688fe22748b738133a41ed72a121b5117e3d07fd2f14e6fb2c5fcc703c7abd04d3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432904190" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2228 2316 iexplore.exe 30 PID 2316 wrote to memory of 2228 2316 iexplore.exe 30 PID 2316 wrote to memory of 2228 2316 iexplore.exe 30 PID 2316 wrote to memory of 2228 2316 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb28871a82ae211005ef76d57e552b35_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef7e55c874575c83fe93ca547e7423e6
SHA12f558cbef9480360099331c63cd877c0dcdef622
SHA2565c8784f1af46cd41eb318df2acfa2200330e9bcf9c96e6125b79db4cd4d7dff0
SHA5121afaaf08a26038727eaa31cce1d61bd6f3e446ebbad60643e74f40b1dc205d83f92f268d5ebd0eac3d59ddbb6640787533d485e1965b04382f4b1a0a6f68f0f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf99cbfdfe6aaf34bd94c464bcf402b9
SHA1647fdf1f5e621a6a7bc9166736612406cd2aed3b
SHA2568d815d0c5ffa1bb8380d3d6db00666085e6c7db7bdf8eeb9be765815ef1ffa05
SHA5129a204cb3629d5fd3a50e52da827d44b2f0d30579880afc5882f5a3fc57dc1ed7434a87730ba62eeb74c4c02bda03913c6fce00d24284db74f38dca1123427caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a696e55d4ef0a02d9d94d8d3709b0030
SHA19589b1ecd41f368bf3212306f575608b3085742b
SHA2562cb757ae649a9af6f80cbef42c4fc89cdaa4313c34dc26b0cda05f3982cf91f7
SHA5127ec2a4009dc24387eedc523adbac3ecd28cefe991dc4a06c89ce41b62db1d6b3a6c3b9d91c234a3680392769d9f5d5ec1ecbac64a1bc5c1f6a1fae27bdf3c3f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bd2ddc6d48b7474419aeb99bd230526
SHA102eebc28e9e50dd265431b8a809d128d7c2b890f
SHA256f388cceec0e94005f35ea3354149c1602ca9554bdd3b0737a429ffde72e29b35
SHA51274bdaa9fb856777323d412bb69eb416d83868b906a2d08a720ebe6a1e4d63008f8e5df5e8d093814d001a74b7bc2989e8c84f1684c4a3376815d6825b49b814a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e29b590d08fa3d7494ad452300432424
SHA1fca9341aa88c293c33880503132d12d3e1b4a1b8
SHA256f6d2eb2be99524e92d318a5e83748ef493345a52e18324a8bc6f234379a17587
SHA5122cc8047b08f0510951b0dedfef93d352329371dbf25c206a57c591ab39141022d449502cfd5d82935951df71069220b3e6a2fe0b328dc5c6c30c1914cbfefe46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd73334538da09bc1af380505c2b85cc
SHA14ac8193a17a8469cb254263e35f7f85772ffd62e
SHA25636fa616a01f14cb6748ef49ea304750f789736f40448c28fc3d659d759d8487f
SHA51235fb24ef596f076082d46fbd203ea6ea50c243d5d6619e97404ef557a0b3658bbe260067d7942f8323a09307a1bb7b9f49a5c5873cbc7dcdb1e138a86d315992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c856ae85b1519842a344afa4a351c90f
SHA12172f1dbe963ca09e2bfa8949ee6d94e6315803e
SHA2568fd544a1505c9cccd83c31bd2677673727f01888f73b50a59a3ff10f75d328ac
SHA5121fb24cb121f6bc797696969977cb768a31ce313bde6ecc5abaa8201a1ad7f07dfd15f74326ab7fb87f01e83f8a32fc004730f159b8865caba1952344c0ac101c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593740867e2a37a0da6a8aef80ff3ba96
SHA175c72bf5b2a31dd62f01626a5f7dbc441473cb08
SHA25628726bed8aaa582c7d14ed68930fd303c4892ff5eb9d24f6ba7290bc68f27ae7
SHA51257a1ce94777d2ccd7ab0b1fe5a1f932c560603fc306bec0c7a34bee46c8daeab4166d7b4c67593ad50a96f234d77346d8745be7699d605f34e7880f6b8fd7d66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3b9f681ade7169c5cb1bbe92ffd1ff6
SHA1d7ec60258a5b9d3f19ba372cda0551dbe719f391
SHA2563c4c1fc0ffec4ca7bdce9159c069e6136bd18219e5cc90553c7c0c500b5c4387
SHA512da8f27ec9a9b59151bf472f59bd9128e607ac27f07a9dfc0f8a98f00b08a8fff0839a1d217c0ca9a169d3cf8d0ebc14f60c9f991d0e3de43fbd2817108de82ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a53426caf01efb67a91e8708ebe2653
SHA16bde8c2c2b5d7c0a7ae518a0b682d357218ebc97
SHA256202fe0c64a90e4debd2b1e51701e0dad6aba2406a837c5c2fa921c6757e867a6
SHA5129d50a123fcf9b7221f75aff678f09e25ccb59fd695a1f96a0f0f2bdbaa3e27a3757d6c2ea73ab3158b0f1501a2be1790c7b3682bb8d8d9c96ea5fec711e27dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e43123666a6bfaa0e69ea998abd71161
SHA16252b659eba5e7e1ac0dd483320ce40bf4ee4c55
SHA25674b73501730624abc00fd2946cb7c8ea275a83e71b975810b5afe693d56360eb
SHA51226b82bde73571e36efee2987fb8ccdb9c45b503dd4e66dc62eb0a8f7c3059c768dbba7fcb829857a17fd5ecb4591d9109cfe0c4a41c9735dfbba8b5dc0bf10b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae0abe0f33fc886e7760bbf33cc755f5
SHA1e4f6ef632fbe7656c4182081b7af3838a0c75fdf
SHA256ec7b2dc0150040c48b6ddb251817be6b55d5efb4baf3a93a2bd59081719c4a3b
SHA51244bdee9447f61844c1745119ac9da6773120d5d69379e37dc64082ad8f48e8f9fb44561568a922e9712ce70aee3410d41453fecb17490dcfe4f53d88c43e9b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524dacf7b1be748ae9495f68c9f2be9c0
SHA113cdffd1d5b351d9579e4d266ec2bb6516475c7b
SHA256559f44e2cda69381cae2c748f3d4725490f18d242be82f4afa43c5a4b3d4bda1
SHA5128a4e747711da8731afc2070607d62bd32617bb27733f0cc535367b27a4141c3339ccd6019d2acf8da080427ee6fe92df99ac3388c00aaaa5e8089031ed49baef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5008b264ed4d7df8b187bd7b8cdd5429f
SHA1529006bad92cac648bd81ecd7cf2279eac825bb0
SHA256baeb2645c65555da223b7d22e7d35533827066099bf2139cd9b895229288e013
SHA51248a6fbe53592c014bc53a68322d57388ab6a0720d777f5e87d9c80a3913e6f9c5dba2f6036061c8118f22521ce7e7793e05a13524f255cf49120860b39bb74ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540eb7547f56bd2334537beda6b22cd53
SHA1f394c30b513c1e36a7fc9896aaefb38ed950c6e2
SHA256f9e737c4394ea1d652bf0fd4f467d8e4e39f388023d805037baf4bc769516105
SHA512693cdc4dac41bc32320fe2878c24efd4fb0f24a4ce95080d055dd911f527219a92ed2d1e8fbadc9b91bac92dbf0253836d4e7350886ec6a64d5c6bb6ab190c1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5835ff3432f73982a65b89510806a273f
SHA13742626234bb37da1554f3cfa2892918990df29d
SHA256314ee67e7fcd1f4bb470caa7a929c891767d5fd2c72dc68cd871552dd93535d4
SHA512cfe4702137aaf3b9f6a4b94a78851ffe0e8f355c329730c6c422be43631504e15b6161d4dc05b72cf44b57442199457c4cd2d4a0481a9a02e7533e18cba53cba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea975ba1b53f667c2a75eb2e5680ee72
SHA10eccf59b10d6fc592430e382acc7cfc71d363e61
SHA256a6c5baa50d04b81f25a2f0099dea59f13127d0f65ad64b16118831c0a23d6854
SHA5122dd518dc24431d8d1b5b89541b40b3018058c08344c751b4ab6a3076351e49f9f4079dac1928ac98b578c5b17f9eeee8b1b07a4bc29b4a3480eedc88fed44a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f8e6069d2c2873406d1d89499a20eb1
SHA10cd895aaaafab6d169e067dca39011058ed19acb
SHA2563cf6619f8cfabdcfa8938e8bd950d4d0d3cad31204fbe1403ded83f8626ce7e3
SHA512ab9884d624d54bb5752d917164c750fbe506d2e9a5eb858bc515a02e9460da0a19ef9b0ba1316eded378670b0e8fef3d14edd81359537589767bb0fa81ff3f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d416c9ff796af396bb31d755d74531f7
SHA17575904b3960b8cac809a1278fcf060aad7628e3
SHA2565b2c226c20731d1187390f11d83fc200fe7cfbd519d49e3bd851c0ab250b0a80
SHA512dd4b751d1ddc188155e59789407a0f3b9d01fded2a2795524533b8b46746cd3ca561aed07a8557e09e5369d0d0d4a192bb682ea343c7af57ce2a85ee2ed2c6fe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b