Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 06:00
Static task
static1
Behavioral task
behavioral1
Sample
ba9ec379cc6c486d790fbb0c1b686ffc_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba9ec379cc6c486d790fbb0c1b686ffc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ba9ec379cc6c486d790fbb0c1b686ffc_JaffaCakes118.html
-
Size
53KB
-
MD5
ba9ec379cc6c486d790fbb0c1b686ffc
-
SHA1
3f69484e5bf921bf38799078be9940fffb5ae438
-
SHA256
41a2ec8f4b77a532caa1ee96afc7fcf50526ac27d69afbace514de25f7eff2e6
-
SHA512
342f440d46ea29e924dd6ff62240b343ed5d28f3f50cd0a7f3baa522a2c9bb98488f0144f8a57acfa5fbe415b07dd9d628553dffd5114d05ab5f0b03ec341c3f
-
SSDEEP
1536:CkgUiIakTqGivi+PyUgrunlYG63Nj+q5VyvR0w2AzTICbb4o7/t9M/dNwIUTDmDW:CkgUiIakTqGivi+PyUgrunlYG63Nj+qs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d08b44d021f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000057a23c5bd51b0e08d98c37cf019a55b5e25f8a805fc2c8acdc136c576ec9ef2a000000000e8000000002000020000000e877ac42d5bce1663ad48dd076651684477ee6d582fa499291c8ca459ab78a52200000000f2d69301d5dd6dbd1a5e8ce435195ec9cbd41091caa070ec4af92d6511c455d4000000025cba58d1db97964f544d9a6528a650cac0090c98faff722c59246eae76b1540dec9cff332656f35f36271a507ef54ca5a69b4aa43021d3c92633ff776428fe1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430554685" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F95CBF61-6114-11EF-BC8E-E6140BA5C80C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2304 2088 iexplore.exe 30 PID 2088 wrote to memory of 2304 2088 iexplore.exe 30 PID 2088 wrote to memory of 2304 2088 iexplore.exe 30 PID 2088 wrote to memory of 2304 2088 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ba9ec379cc6c486d790fbb0c1b686ffc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b334ccb23f07911a34fb7e0460615dc
SHA17fdd1093df82e1ae7cacc5f7998eb4ee8b1677fd
SHA2562eb64594cb5f403ba3baf55f685e47ab9d0daae9596e76b795d987fed7be8a9c
SHA5128f65cacdb34245d079b138801055c716a2e192e364e3f9f3be895bb38e1f3924fb8a34c0d2fc5d609c4646af4b75700f57a17e047f9ec02891a821a887300a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3429fd25d3bed27a1b424cbfea71223
SHA17015f628d3e94cea22f047aa4618d057eedb3e7c
SHA256e96531c21981366ceafc9082b9cb9f2f642f71457dff15551a7cf6f86e7155f8
SHA5129a2c7c8792f7ed77aae439d5af7e613fbaee8f4242677140d4ebb40b3376b96026700ed2d31ed7921988c8f9473cd9cd0344ec3689068e92e9e81130496d8efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eeb7e12eff48b3c79935bce32c003af
SHA1e10c8641d272ea1c81bffbd9a588cef0713bf968
SHA256af93b2c982e20285f72b0db660a54b384709e74c6935e89c0387f3fef28d7eec
SHA51274afd0ddd1c3eff9b92e339b2a44cff81a4214c0ebd27d777a178299bd0c6fda82f790b582e9908b8ed505f7f828875f9fb3a180adda97a8c3263d3aad6dadab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57473424948f5502f6b089843380b46ca
SHA109700f3099d9fa624d13b013674030e0f80c962d
SHA256971e79d8aaeed1d2f804b2de81c6c138e59cb8fa842c1809454f75e28a2f65e5
SHA5123b770dbc349a0e1611555a66e8f088c3217d696ce73429e3159340d0175a613d82db79457ac2f0e54afd5153fcbb14312e63cc54d5e070eda7be18ff158610ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517e2d84fc58c35f831a388544db8fdf8
SHA1f2084183fd8241cafb6a1be978ba4211516aeeac
SHA25610b574fae694d6cf4e390f0067308d727ea4597639cafe692b1efef03fcf2bbe
SHA5123a0ad3c2e83d920d8cde71b6437f7fa020fff7e1b58e1cc750eb9ec3058b12ee6ff1585c4ebac38526fc47c96eba095550940779b8c15d6395aab6e2331664c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d9b310fdc30071f9e88bcaf1d3c15f0
SHA1f25e40b18c4141c0338f46176ee99e358095aae6
SHA256b39ed40e121890ec27f490eb72381a9698adc61f93883d97e6eb2d67dc4c0203
SHA512379396a2358cd5d33618ff812acd2a4a5664880e87bfe96ad814d8c4e5b3642c5c4475704facefe93b309276253a3485bb3b99df961f1eca04586474f827c1c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541977e3cf5dd90d058e344fd7758a4af
SHA10f83fd2c6a835f314254c9102461130d338c6c2c
SHA25670f2b5851c9e8a701c6253e5d9909c9502caf4f5627a74a4f4495a6c6c5b8ac4
SHA512d8c6ea3ec7d179cdd1229ce75a208df513c7ff4c0b1e189931780c5a8d587940da1d7fb48a4f865339a29a5e587c70bf5b344b945f4839c9079b84684f9bffec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511ecee8a07f11035be876b24b11fe0ee
SHA17d4835334d6a5f55e58ea881e198ea62d0b25f66
SHA2566a971397768992e2920236d6fde598f53c8639c531782158eb05c2f955235a9d
SHA512578236b128b3905eb9bfd95612096361417a0a096ba30769c1e188e7100084bf75dafcd4b37bed822509586ccee72005e0afcfcbf0b426a8df9ba694ffc125ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572bbb8a07129544c1e8b1cc4d99067b8
SHA1624d1af36eda29819ae193807d68ba1754a95932
SHA256e4f22665227ef991e406493d238cd2329b49a0b3470d538060e5ebf4d0afed86
SHA5122235ea56dfb163329cea08d23eb2cf6275026beadd26d7d72c70e56a10a9adc670f3e9b3b1f5cef412ee1b1994dfc44bde9f28a8c46512e741a8f58a11b81454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546ddb58c28ecc5c028a7bd0dac8c92e5
SHA1a7afe352d4afd03b391afe873556f21f0810b55f
SHA256d1fcfd7191553de7e8264c6eece4e86369e4dc6725e362eae778b6d4ec6b41d9
SHA5125a23c0309071b56718bb8df8c7e4f5f89507bff401f4eafc2f05c37fa3d0958ca718e6e822b73f90f48db8c97ef66b56c7394c893ee8e146567380c944188f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d5f8db784d8a86ac657e8f56b3b479e
SHA1ad631f26b401ad9f4b025bfbadd419eba4031832
SHA2566ecb9ef826a04adf3452bd5f032d90ff2d06d54189592a0f049636f193b4ca50
SHA5128d0eac1710117e8f531d18d3e8b2daab976527ffe7b5d2204ad421907f4082aabdc723988c2f0b18481d2b4b69f21ef8246e1918381ba48b2499c6d66d3ba1ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532ca5f7cd0066dd319c49e9492782761
SHA175cfb0e1eba87e03becc2768a59437dca4630db2
SHA2561362d478bc4d93da9b77372f4da115204e869b9d1b729496208e0f790da56844
SHA512635897fba8ddad5837c991b368e9070544f2bbec649937688e2e7ca308ccf2d780349c64d3a290d566d0482c3b5e9165b751692243bf01388485b9e2f16429af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fc75ac5087452c5e6e5b8372beb2741
SHA18485be2bd5b77c363e5a336490758f6960e984ce
SHA2566d1767ad3d353b4459f903e95233bd13d9cddce7a08bd18fe39eaa97672084de
SHA51212abb31523781075aec6fe284054bdb3e401f457f27b505e6c85ea583591dc02994a68a9a471209859088facb461b1ecb2e8ac795c3801abf2908007ea0bb8b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4fcb29fa9c87516246631c874341fea
SHA13b44b4cd6c6a7cde3170b8fd7b56c432776016cf
SHA256c7d0be89925c839b91718d03e7ca4431d8b14779b45f9915c560831b51d993ed
SHA5125461b44ec040980e5737a28ea0fa96be7d1993778a7c93e5fa393cd81b3bf11152c3e1f576d3a1e2e8107d8a18e3d31b70fa34a294d14b90ce78381b0d3dc0c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ab5450626b110f6a19b9b4921ad481f
SHA11ed04226d0a1b08e5b480237b8e69f249c92ca20
SHA256048501a96f7cfbd3d12a028d85f4ae3f92207f6211d22cff1ed65adc4bacca11
SHA512881dd3650e9af5c692115a6cae39fe305e2b017e0198fcb39e65ca428e5252e4d5cee91447cfbdeffe5aaee01bcd70bc7f5bf9ad0dc79fbb4455ee4276a09453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b76d6b89ec82e6b9a802de0a32f519
SHA13e16771355678700e53a6f87ca22bbce31830132
SHA256c5f4e7417dcd8391de2466bf7c76aa3de81f0fbf1b814d62a21790b3cfdb5eb5
SHA512942aa636f88799cc7b5db0a3c6be6b2f1141dffa3378558fdec8e171988a0c108164e2b042ab10f3f83a6f9da137386406091d3f1043f614a15f4291d3abdd4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b61b7f8f6cff212dfd56487568444d
SHA1f6138ba6d48e8fdf70997d2a1e5dfeac9f6f392e
SHA256de4ebf0585592f8e8795e83bdb7b9636c2835b664a7e18edbd04c550c12d32a4
SHA51257642f8373f508c9eb399701a4be7ae03bc51ff2bf6e3765c6d60292f2f5e1c69d7c862c0d1c1f11050aaaee52f8e6f75e68ec359f9f54800ea30efa11643671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb37a874b84134ab9d2d6c4c13d3092b
SHA1a19082407fbec4d4896a63cab18ae473bed3a0b7
SHA256fbdcbef0abe2b06899bd6f1952373ac6d64a141532a197c0989674309c522a6f
SHA51207af6d808a753baf8aac35956baeb96d50ddb4768d11ad5f2a2df391fc4e9e3498a88fa41539bce52f00fc7a9701d7f39b7bf945adf402e157ef7bd3c2b8e55b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f16cf1c67b33660a6a44b8b174b1d89
SHA18f57979414d95575ba2e2ff8c6c37163b69de1f5
SHA2563fe41424f608a0ecfc855e7edf92aef1bdae78432cd70e27c21c9709dd29c2d5
SHA512e4fe07499e0faf59d57c8a3d9fa7ef2b1bdd2a1c21f45b2ea389ae2196d5237b811f800cdb75651274c0b631fc491eb35af0da853f47fd2c11788e7d5a9a2273
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b