Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
48dbbf432cdf278f99b37abcf3de3127_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
48dbbf432cdf278f99b37abcf3de3127_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
48dbbf432cdf278f99b37abcf3de3127_JaffaCakes118.html
-
Size
26KB
-
MD5
48dbbf432cdf278f99b37abcf3de3127
-
SHA1
a741cc165077754e5c84346e7652668945baa883
-
SHA256
e2121b45d21336eb871b1c77b40402ae6c428b772be7e13e8c516948908e12c5
-
SHA512
162d682664933323d85c7b497e50192b4821d822fdca68b1cc7571941acca25c9b6d2b0530c28caf1d96a06ec5c79b767e4c04c2a59d27d2e898f722119a5626
-
SSDEEP
384:qQ8N5kdPTGEuAssi+sPinXVb82h+sw+sY+sHGYeURqOssTcm+sZM:q6TGEIrglbmT
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5091c2368bd6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A5FF591-427E-11EF-AE10-CEBD2182E735} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427191432" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000066389572d8eb0ffaff5d068c56ca74f8a7eee9109616dc662730435219724cf000000000e80000000020000200000001f82a4fc0a893423e804adf8f313828f13ff4fc8bf29cc6b809a71d1c88dd9db20000000eb9e094766b926bab80e8a85493ff2505ce89277b0046f7800e1a57155a6068040000000b91b74db9e2fd3fa5de75e1037d237b1bcb0e90f7f2e09379def0d963e6e30d52413260f4ab9977ac4f229435ab6a5805d939aac5734e8d5a6016360cf873272 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2600 3064 iexplore.exe 28 PID 3064 wrote to memory of 2600 3064 iexplore.exe 28 PID 3064 wrote to memory of 2600 3064 iexplore.exe 28 PID 3064 wrote to memory of 2600 3064 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\48dbbf432cdf278f99b37abcf3de3127_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e69c14bad1b3d698feacc9640a706a4f
SHA128f52fa105416c21ec6d8478a9d551f576226272
SHA256ba994e2532b8c0fc900994edc19494521a634bcdcd946831c5cfbeec7ba41cb1
SHA512bc410137298755620d5a0b39ffc9377fc278bde83d28fe49e0d358b713cfc6f719260a5413ea08573e0a12806e929a3e7aea9fa66a08d94fa03d570aefd9f968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5596118241f2d32fca7fbb58b03929e6a
SHA162a7d1519b1b8faeed2531333c704912a17eec05
SHA256e0e29733ad3cb39a19809636889655fb8f2d03cc17d1870175c1aebebdc0c4b6
SHA5127ce730010334cfe16ffdffa21dbbec9ba77cbc99cebe247130f37017d756d81627f83751e467684d320f2f0277451b88e027a069f8e1e0562667570f31d49e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e6e5e2a0214b5b111b72867eab7e30
SHA18d3d3be6190afb200e6bf822936bccd301ecafb5
SHA256b22c6b2c379428109cc465d5e5c59db860e3e6d4234b067c7ec9ab3f5111a618
SHA51222843cf7445a50fb2bad0071c69c0072a08f49a1ca43f213d9260bb2c0272c01387fb1eb322175c106f108b2cfda97dec93e24b8a101e5d1c2e5ecc64dc9d170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567abc11e5ea134a8188f25de475280ce
SHA165ea7711be37b954ddf46d9a86cd6feff9734eb1
SHA2560c5093280ba046151efc317ca3877d554902b0f37f86b5307b400c3337f1f869
SHA512c0e373053b4e5b2b8942ae14f36c21cc0a3c820cab5f42a65b28d56ac41b7c2352bf24ee15bda5a8ea678fce901a43a9331ec31f0d51c349e16f9a1debed144a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556f28819b30b762f05fd52c9d261ca82
SHA14579a94cc423d6e1beb46161fde46f1b3a59810a
SHA2561bc86fdb3a2f268a75f381ef8fe74f4f6c23aa3d317d47c72abb78c04017e02d
SHA512737596a7e069ba8c8fb9c8177f012d025a0b8a0decb9220988bc430916975345c714cd48f22854dd3fc5f6684dc502c769e6f4b5bbdb292db7531d9a3045941b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53df65ef03fa01df644e2d9a6f41365f8
SHA13ab24331760207a1455a814f7ee784c234998794
SHA256d50da49e7d2e9c3198792d8c30e5ecf000f3c47ceb3f6fa5b5be0111cbf00770
SHA512b440b5d01c1070dce365c9f3744628bb3821372a9fae7b0cc659b3519e1b04c028f8b41ce860a3211ceabf3397f7646be3c87215a8602c293e67fbabc339e7e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edfc99528f1f274549a7fcdead8a314a
SHA182183877bf8a7baaca6ca71e63b1d56890835def
SHA256caca04ec7c7e215743182f557d551a710634bab01da6a7f6e6011e57e8d6ccfa
SHA51213fd3053ced59c60b530bf0d9d9e5bd39bc849a2c8306b6c9959916c15d3592c271a190fdf807c73a87a71d703149700de43d55315ca20b6efc874e9d9184e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a485bbcc00d03d6a0216c96f542f5a7
SHA1eeee79d65783e51b5ef2df02c7acdad3d0ba34ed
SHA256a8b71ff398666316419474e9d0951fca306577968aa325dcaca22d0ddad6ea0b
SHA51289522c2363e9571a3f47108c7df8618f242aa663600908eb55ab995a59fd1d2dd93b81074493091b961d390a46c8627f6f2a86c518c00fad228e22d35a3a976a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5047ecce45c08b8a36ae2741fd13b605d
SHA127ab8c8df3672b02c638e95918d2a97d2c0d1df7
SHA25663c40ab52ef1c6aa49d593b8c943eeb966e71291c7b5bb32a37060a5592a4bc7
SHA5124a9a753d98e640d6f574a905bb662346961bc4885f4b5c9044c74907f76c817bff4cce8b473f4261f23b22d4cea3632240ea78d471a80c41dbe3623a0dedd1b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5247ff46af168640018caa9f3e15a6011
SHA10c814b775c1520e5a0bb5cfa3248fe810fd2bb4c
SHA256ab78e257011c2a605694a9654034bd9a4615321421dba2cb1ab297acdc0177c3
SHA512f5df31b9d583812b9ec3dab905d46899d99bd43a02579b9719d26edcd316c59c17b3b59a0a53d75ae27509ddd4303ce6895c23447f711a2d4b6d0c51003709e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c852b59454d7962fb2ad5923f2e4bb3b
SHA11e2f407fb8b47b16c9cf1cdf90e555e71ad96ef6
SHA256d7919ecd34db80fc4a634c9d24e154f67737b713c600ea6cd7536ac422ace92b
SHA5122327f8bc2bd754502966eb48f47141354730e92d3dd3237b52f3c7f462c43845f925621ef4ca04a0233b993e04c145230fa7ca422918157aff374f7ae453fb29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dd0384179cbe12517a5d8bd2a5f755c
SHA1ffa4df9b94c65cd4d0bc827a48c77a58092f43e4
SHA25606caa61b686899ee00379aa98b39a81b91c0de6489a4937c4b80692fc76a7334
SHA512954cf867c1b6b49112f6bb3add352fe3b559fd3c45e703c27a7ab6dc51553bca0b282540c071d48d7ea655cf4352aff8766ce12dbf3d4c73a7606816f42b0840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5950a84397f6c13aab4818ac627468cf1
SHA1ea9ad56e804a801614037c851737279d91ffbbbe
SHA2563f67ad6f4f4f0c24ac6c85912671bd5e3661a74764dc4a3671046297813dec5a
SHA512b8e765f3ea8d4e934b27a263ce21172bccca669150259b95f15d3519ac28308f845ecf20616d89e104b195f5ddae3eb4b1c1e6b1bb7aba2abdee60ebd0ab4f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500085fd532187f7384907d7e7792b22a
SHA1167cb0b6f87b6ecd6872398cd9f264fee5f041a6
SHA256f0af31add924ec18d00b7380aa26307210efd171d9755061308fd07fecf2e6ff
SHA5120196f6c30be4f2c036d5ef8307e75f992067c01275b0b485d50664b5fa1f22a7cb64ee42b7aef07896fba0e3d4df45efebe136f0f0d1dca3d1bf2ac4d467f4dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc68cfe9c0c9831cd949164a6e7902fd
SHA1059d03d2209d202985b9ec69dfebfe846596bb9f
SHA25684e76066233f78259c414ac4c5e1825b9e8b8d995b98e33f3fd1caba56b1d1a1
SHA512da459bd0c89ee2a5146aa22c578e069b047b18a896d169b5185f2be8c099e1789da3f366279bbb8f64f111bb08fbbe67ee94f6c4aabd7848349c82c2c9cb9f10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544560c12aa36b193ff38136b964bdda6
SHA1ccb3e11f49c4db1213eed92b5656d08e07ce99cf
SHA2563169b61e7527c997d196a7a7a255d802cfb8208e41b3768f8c7bd737c3e3232d
SHA512420109fca0d32ed3d59d2365a4ec043d978857ffe97f88a3d9d83d7ccffc6c1ef6ec0cbb1440092c3c5a73c8c3c39b74acc6a776696222717b40a74d5b3d242c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50460774cc23cc993d637130ab6425761
SHA1c77b78a543a106b915e0b02abb37682e86e6ba93
SHA256851b6f4e2e854393d9de4f43f4e3b6417cb5759f80fe28cd75ae34803225ebb9
SHA5122e66bc060b405dbc9271d3c6c740e73d0476752f98990fadd3bc9230a188d44758493022f851105184eac3ce33c14fe02fe12b0ec899691062ea5279888d911c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556764b345ffba3b5e318020a5451d344
SHA186757d3ae94cf4fe8d9fb7416ad5e20df29a79c8
SHA256a6b9e3605ebb748836898e97941bc7fcdc1a6fc5e0a54dfd6dea537e0e4f010c
SHA512af7f535205f22bf80b2a1339b47035f97aec9309b432fca7c4fa099ac7fde0e0d375b38aad089686a22440378a5504dd22686db12307cd316c1a344c74ae9b19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524794fe0b59df84f519ba351bab929b9
SHA1f8875f57dcae9956ddf13f164a1b1923c7d3189d
SHA256310262db36796c50e351d570600125f36fb28e8978b7a1c741ad352476d74234
SHA51266205cb5414e9e5e6092d166c9156bd68089c8a9a85e8aef9d0b68819179df6185908f0e09e7c7f3baaf3b73c61cd0d954c9afc1594d8a62c31a6554c23b7ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc7703cbf57f094b119d4ee78d50cf9e
SHA1c12b4963e10784858dcea056aef4d40c665d167f
SHA256b7b54081a170b5925190136f4374440dac06dddc13a863e75f19e3b6d9e10ddc
SHA51222424ae0c8f9774fe76fcc1a8839cd6d5ec1ea63f77ff3f661da2714c666377cd341695053950a99c87767b37501bc3386a5f1c28098cd88ac2f5618914b1bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51029b6956e372545fc6513587498fd37
SHA11e84a0aaacbbbe59393729bceacd3242ec3fc872
SHA256dca4840c2e5e579ec98bac3c4ad48d88f01cbeff46e5d0427901c61c74f44969
SHA51285b93267b279787d90214ad06ddeff2f4750129ca280a9e49520143a528f4529453836111d6e6e3c32c7a5f113d7ffea053eeaf61b293d98442ab4eaa46acaf4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b