Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 09:41
Static task
static1
Behavioral task
behavioral1
Sample
15870d166d84aefd668ccd6918c3b829_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15870d166d84aefd668ccd6918c3b829_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
15870d166d84aefd668ccd6918c3b829_JaffaCakes118.html
-
Size
53KB
-
MD5
15870d166d84aefd668ccd6918c3b829
-
SHA1
7c868cd11a99dd9229ca8407d8705ec51d986895
-
SHA256
1851a2582652801719e83bb58d0cc80991db708bad6f2ce2160bc8e93574b12f
-
SHA512
26b9dc9061f22b6a4136aea76900b0c5a4d196d53ec72d4417662ea2042f6a35e3193f1db96bf9b926e61db0b890caa90d3cbbfc358ac72ef891556b288c8fa4
-
SSDEEP
1536:CkgUiIakTqGivi+PyUIrunlYB63Nj+q5VyvR0w2AzTICbbOoq/t9M/dNwIUEDmDc:CkgUiIakTqGivi+PyUIrunlYB63Nj+qC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0bb614576c8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425643157" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6E0330C1-3469-11EF-825B-FA5112F1BCBF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000684a20a2e63fa49a59796cb20a7057300000000020000000000106600000001000020000000c94ce563f4876a702740f35d1569ad63087f525c3a882c4a406a1097fb768e2c000000000e80000000020000200000004646fa937657b983d4273ac3045cdc9192baaa7a91d2bf5aa8f30e67c447d24f20000000803df13e89e5b88d9a020d11348e834f80676a4d0cebe9c5ab9b1bda0284412640000000df781062fc22da3ede8da38e1bcb47e7f3971c0ca0c5077ae549f59c7d2c66e87628ec14ad417ae76f97b6d2d6beb6a76ba59c067e70e6bcab838726d8971db2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 3040 2192 iexplore.exe 28 PID 2192 wrote to memory of 3040 2192 iexplore.exe 28 PID 2192 wrote to memory of 3040 2192 iexplore.exe 28 PID 2192 wrote to memory of 3040 2192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\15870d166d84aefd668ccd6918c3b829_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b83b489d5512c7f81189f78b357e8f
SHA198cf6c7186daf835b7f5c3aef930b9ec1eaadff1
SHA256486573459b99c0afd8eaf0a62f90bd74b43f1c1c379b0c8e2a95967a0f65e66d
SHA5127779ab718c50df2524c2ec788147d8f299811fe92a9e0afc132a47fc5579b9ffd8c51602e0c1f4e61d3bb7674e973b6f2bbfb3b5ea1d996758e3d5ea661bb2b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee670c2ff248a34f7545beefa52d658
SHA10b1b93829ff10f62ff1b3dcf8379d37b31084f54
SHA2564123b4e475338700823c31e370a34f448cc5cdba886b7c77853c93be204202d7
SHA512a3b26ba1f5083f2fd6af37b2fe5630d62b48eb46c5b9ac3e2cf459421db27a685a68531f85e3f2d8bc46492b1d08a455903c033a7644d9d4d9351891c65fa006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f092dac589e1b4db41ac4e64add083d9
SHA198de1d610367ab4bc21c1a626b126add09d2e2e6
SHA256de0b2ea1c5aa042f316b7b8cd75e72944ec689a6c4862bb8c4855ac24d450343
SHA5129656f2710a37401864e47c7ef3de7422a540928c4ae6900d66beec9c1ef07fee055625191eabe09fbdadd25b0bfd5df2f41c6e83c3d5622104505fbf8aa3d0b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53813c9a59a45e8a78f0ff12b7b5c41b6
SHA19907c82860b669b5dd669de0d4516a4e6828a974
SHA2568c9d300b3bbb9a17e69bfc3b580d9a793d87a89c145f7d8b71cd32fba6888753
SHA5125fa6bf652e5a7a9cb020b8d9cf3763c938ec86e7198e2140d95ec2f12f10c591aadda0f3859e7ea65d4b09131de569951f1babb3612efa473c65975f12c61cef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575b48c14b075b72b49294c132af9e4aa
SHA1d69062aaac3b06e71515357edb1f5a5ec9cb60f8
SHA256a1c0e3f4a52e7a810afd1c2a7d1e6c3a0e46a183c783fc4e257f3cbcfb2f3728
SHA51246b129a83dfcbd423b5de2527514d005805bfc30abee8e4c7048ec88fe61dee6aa97a698c2fc49ce129f15c93940338653aa594a9a058de6714324a8a881d15a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c76882f38cffd26140c09166918e78ab
SHA159e36826e6358302239e139202ab09ad639c75a9
SHA256a4f6ceb8896047222727701c1b92f2cce3ecdb7d72296763747fb43da01d4d30
SHA512992ff21dd7dc2ad4ac0856cbbf22e4a4006d6f9fda8d95b1b6f7d650c8b9fb20785d2b630bae7152f2e89c0a092dbaf2dd09802d202a188916cbc49e3622b359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57db9f5b1d923c290595b07178c975ed0
SHA1e1c88e0efe1a186bdb6c7b5571de7eed273529ea
SHA256d561ea3cf71272b72103c31519e5aac9e519a74b5cf2c13bc4cd1eca88fb754c
SHA512e84422001a245841e339a55d8fb9b75402f09e0a138d6141643b838826c556c08cde45c05f125e12f0b60180e88a019f931dec6d90b01fa6117b70ac55d43cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5900e4c618dc5a2d44e0c1b56c13748c0
SHA1c53bbe2cbc06e1b7de73bf2071101a43d1018bb1
SHA256201a1cac9234719758826365612b8e365f626412e1f4623bd6027c8993210106
SHA512532a7427e9f1e4a1b4e28fa7601b8c44006d69486118ef6a715b0346b37ce8520cb9862e95db78395c713be32a7bd79c67b13541fa89c12d70aa9d946641533a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b73646e49a4fdce24d29b797232bfd5
SHA1312ba3d4ccaef7251db0d5a8ac5b916ca9363696
SHA256ec4b2cae033ebc225c653ae84bd7e2326f2e4020312ac4a59a4995e58b0e1ce0
SHA51293c4c0159b7465db0974b08dd5ec9e6a7959095e33d7aba908acf899a768286eb205df5e4b49c2c9c49cf186bfeb28398a6447932f566f616e9ad32dc41d1114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50548d5df93e6dd301b91a08005386c67
SHA1faecfa9539d0ea40e7b5ec616b636ea01dc31dbf
SHA2562cdd9da15f35427feef68536b4d1fe0720c001b59baa0955d8e3b2f87b3e0401
SHA512eedf4ab4aeeef062c0c9b3dbd94c686fb5c7d3e0cc34916a5a553ae44ccc22e54d04b68c620ce02059f6e570cb1090c1ac1180fa7a290b617cd3f1cba129da77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5821b64dc784ec1eccd053468b50e0f10
SHA11073e8dabaad0325957ceb215e5090ced94407b1
SHA2565e27a076b8ce27c56f04106c246939b8efc28406fdbece3f493eb1258192823c
SHA512f7317e237c8c77fcacc9dff9350b73a7fc3babed98a7d70a4c4b1febd7b620d9da7bfd7e102cbd881cc3351c7dd548f64c37cb923fd3d7b9d74f339589e81a17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5110419d9973a1930acc1bbc0ad8d69fe
SHA11f6b58450a456c56c781069ab5ea107516389aa1
SHA256d5a8cbf5efb9b52e3092f08866213f1e275e9f24f65732479310ac855551ee1a
SHA512791410ece380ea7f37124a6ce8a98fa593a469f3a8dcf62368a2b9002d2b6486437fca00b9217a15ff1bc66c7a8ca9d6746f303424842e2bc22d2834ff88e761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0da98014572a52ef40e08509a58d9e8
SHA1bd99dd15467967b0bc4f2d253b5f748377df8122
SHA256487257b49db68afb477b051f966c289ab1ca76c2751e2aab3b2f0a79b92e8521
SHA51247273c1f29087e66e4de232a17e491bb88dad55aac141bd0f78c1bf36bbe28c70405bafd22b8cf51a11dcb5d3a610e61ad6f27933ef811bc94e9458f7349b090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d6c918a351388d2efe1cbac4b5cbe70
SHA133937b784af91d99aeeae8733d20cbf85c217cc0
SHA25679c601532db3b51645ded550ac28268e8777d0bc4e110a9717d77b34e5509086
SHA5128c66a7539f7f50ae23254daf750b4d4a70f2ba72a356211fe1c5985b1ac80c279a63103b3e52292803185d4ad6bd8a7205f5e990322f8ee58d1aee11640e0d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9c33e2286c2f3d0f24dc2521199a6f7
SHA14fe441f80b151510263a549f738ca88697d59797
SHA256af98e29b6a327144b97b5199e5699da926909200fd0883466e1552da69d4ed15
SHA51287ff80f6792eecbc5de493f6cd06d70885af6a92e37175dff097d7ab0a649b46a994ab215990f46001761db13119339c9631882e06e3587ed5b6bcf73cefe221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebda913821fa2f47f1a4108cf51be3b6
SHA138dbd90ebb84db7dc76ef7cee492fc9d854b86e0
SHA256d12b192feb61027b668333e92b1dcc435649d6631b75ca714537f120ebbde795
SHA51223835e05b3735587e9414e93a1a396baba81c192804f22e3b2fbb14dfdcbe9a1f557eb0ff113028922eb0ca81bbbd935574a0fe1329d1b58b4f57b219a13c30d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed93eb7a421c58f133615c498f6f3095
SHA1bacfee599d8357e094be0136749c50097d2723d8
SHA256c5b2ca01bd71ad11cad9d746e005bb48fb70360f9a3220761a0d8b3fb5c15e7e
SHA512af00541a9f47ae026e43af3d2efb550c02ad9955075f44d5af041df434e86b349233fff000f07ad09d54fa3524979a152d235807f338c90d493aa80f78b9a2d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c1b06ac4d0325fa5c6bec068f361aa
SHA17cf40a4ef8487a40966072493cef88ad8c8f438e
SHA256207ad058fef8757142947b280cb40a7302314c2c1aec7d987dde92fc684503ea
SHA51263c1ae44c265afc0bcf87703c65529c42138f84e0010cbe3dbefe2006fc18e23b66fbfc5a26c443dac69231860850ca368af7693513dcf43e858a4961b0fb788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e62e4fe237cbeb2e2208c0fb2d68865b
SHA148ce517c782be7e4c2251b07118b82594e10e6ff
SHA256fe7459c047271b44c26d682e04bcb8fc2a4d897d9dd7170de3db59854feebd02
SHA5123c23b00f3f0e0332e5fa81a51d163becb7913d94847f0bfd28cc90437f81f690dd61eb0b8517ab6d885bc3cd8d7e4514f7b86103fa28f7311e10db491dae49f9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b