Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 17:12
Static task
static1
Behavioral task
behavioral1
Sample
e0a517ba47fb81a33fe2ae687fceb34f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0a517ba47fb81a33fe2ae687fceb34f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e0a517ba47fb81a33fe2ae687fceb34f_JaffaCakes118.html
-
Size
13KB
-
MD5
e0a517ba47fb81a33fe2ae687fceb34f
-
SHA1
0f780f7d3f1a360fb823bffc1650d24b605fbd47
-
SHA256
096df229e3b8b5f5b1ce9630f5abd219a598ea3d0d88b3aafb2105bc5de452e7
-
SHA512
96d1e6b1f928a84e7df137a4db141d840b906e5a9076d33ac79ead19a75af5620c4570f20a8cc8504c59e0e54ced330b856838082921620c620dba835fc87577
-
SSDEEP
384:wBnOqdjYQi8bxBZw21pfwnWc6pucj+lTVpvKtdyjbj:gnYObfZGWcxcqZSdyH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432495794" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000afda549e01713d445180396655d2c317f5c2e75c02d71c03c2fdee2a864e020f000000000e8000000002000020000000c56bc9b7ed7639f901e45c6fa6f5780e178e0876d1fa1a6ce0031b56f64d8ca8900000004e7b2f701d0701efccdb9cd1740721def28df29e8972b765558a39d2bcf3fd367f917e16f1b87868c9d1ee1c9c0372228287b5303f34eef7256b226500cdb92fe27a79cbd950991350ba5b0662b9a018e654c725bd79b5196c7b7f13d61766043edbb195496faf8250cffb146d3a8599b0f5e7ffcce9b47ba1e421b713541db07ad714aec94ed887a760e351c2c5162840000000cefe8ffca8c1b6a8fc072e391a6e61b53ac64a3c4b7d473975dffa8e39d55d8e6caed4f4cf4ea1403621026fb457737bee215eeb19877a3c7d532df5d923f7ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000d0160aa24af5a970a31c7470cb3d3c59f2f79457aed8190580e5c800cc9c659b000000000e80000000020000200000000292d52ce1add0eb1250646ba11514ca19e15455650ac902021351c9766c8294200000008b98f570b7f7b161bc417a7c06ac6f2917d0087449ef8bf4afebba9ea8ccf4f440000000785784ba1cf309ce6e20434610c4ca59cecef30fd614d8977572b298110aa753f353e463704dfc4d5ccc4343678572844c96c9548de8b2cc93a0574663704756 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c021e06dc906db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7880D571-72BC-11EF-8E45-E699F793024F} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2716 2700 iexplore.exe 31 PID 2700 wrote to memory of 2716 2700 iexplore.exe 31 PID 2700 wrote to memory of 2716 2700 iexplore.exe 31 PID 2700 wrote to memory of 2716 2700 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0a517ba47fb81a33fe2ae687fceb34f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7fd2b9546b3dbd59e7b9a714e4ff460
SHA12132fca08017e65f7e336f0232614761fec07ee8
SHA2568351af023a345ad8402ed6c6ae83eb16778d27477f786db410d958cf782f98c5
SHA512bb033361212311ccb16d6e78c300b56ebabcc7175ddddbe9dc09499820ab46da0838d469c1265761d21220b5d2a0654538cd72ed84d38a08d91dda1f92fba039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d88b66206ab13fc8ad047f9fb14efcbf
SHA180ca743c0c04c7a2f69e986b917fce47c86e9b29
SHA256d583a2dc3648cee4ff99aafe194ad854d86dc4737b1a1e822eb61bd776598e2f
SHA512eb72b84d7247285cd00cc7e7864c26db4ceedcacca0bb019def1c4bcd3160e18aee22033fd79ff063858fd553189d726ef2aea91f60d148bb31b572ff6d6aff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5967f436b0f5a49ba8d120c14277b26dc
SHA10ab8262b3141d3239919f08be63c393d5e50586b
SHA256f1a1a4310b96f902f557d4a223d4932023d72a0f5f93d48b37ba3547ba8b5e51
SHA512a49192b31a8aabd37ea1abafd98bf1f8086fa4247f58e9c7e0e343b049b8b3ca705dfcbb4a3ff9a217a42eafca96f14b16973bfc1ac8c496e41f9728eb141d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f367f387d3fecc922ec60f3a61a572d0
SHA110da6efc51dc16f1b1fc513c9316752c091a127d
SHA256f2dc2209bfb470605eede9078fa53a36e65f4754c5649c88822e68f97660fdd8
SHA512a650b670fb7d5b24052b33fab346743f3fd0b6dffc3152a64521e54d0fa81abd5b03b95abe25eeef4c0006a0b0f01f752f5ba4efa086fd3ac749312fe939b29b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d143e013f14b8b1a125119b9b254477a
SHA1637b6bafdc3662dd59250099717ee1307ec4f827
SHA2564d19d9f94517963e77a7c2fb0456c30a6d5775ed57fde9403e489376c9e658cb
SHA512515c2ed600a55ad0c4ee6b436e322445d0e8bdeb8fa14bd8db8314e1ccf9dcc87b5e3d6e8da4505c2adf32deccd3cebbd6c6984e3b6be1d8c714a4b0e1ff4624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce35b7cd0092a7b3d2f77e9ea171325a
SHA11cbf491725e1c0a0b54ba1ae1a41779558638dca
SHA256d2e33a9c90cb323a836a57b98603111e1305c977345b8b6baea94db455af3b51
SHA5123d7ee1880a5c083e487a6ed1a3c3a4c509f86536ee12e39f83bda8ea058a31e2d60ec32964480ccdada38c9bc97ab624e2956dfe525ac56b2e829256f61b35f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554f2b7e4b17471018ba051242f20178b
SHA197c5a40a92ea264169500b1f67ef4fac4cf67263
SHA256a2dafd57f5c5dec7d9a386f1b584b5616cec42d4a863f5421238e8848a290696
SHA5128abba6b6ff70583ff90ffb6dd6afad92a79f74f64827649d1f137777833c0d2669a396ffd025c543311063b18b47c412891212e49f57495900ff1da108092d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a20cb11e319140db0fd349d0328e848
SHA1b4f5af0bdc2ab3b2feb3614666715d785c2aa089
SHA2565b02a838e22facb637418e552ce5ced6b8241d8befec4825cebfbfaf3c346d2f
SHA5125aff2a1b9e5d82bdfc32ea4f8ae421aeae83cb4cf9b03f11b0398ddbb6fa9e30c3bdb25f37a01ac6f637aea66d06c6c708bc7a5cf87ce9cdb70d567850783a94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56870630072d6aea107db0769103dd050
SHA174df07fcc07be3bda2e6c553ac6d7d15ca14a662
SHA25678ea61865eed2a8e8db6d4d718ff52413715df6482ad7c2580bbd7997773041c
SHA5121c68605fe641be887a76320ec8ab9812b69266fef9dfa5ba01de54e950558bff00c28fd19ecffecd0ce3624f7b99ec54cc5697f43965e7edb98eb1769bd1d492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523140cb32e2e7ca639dc289d57741ee3
SHA145f83b8857a90f805cb9f2312f2819c425cf806d
SHA256f126a43dad033b38a436999fa1c21e8cfe21072668d7eb2bdb21a1087b0b6b4d
SHA512a6138486f44f7830c87379a3eae5fdbb766c803c361fb03410f1255215a14698efae6b5a115b6551f9418ad22aa2178446aee49e965e6659dd89bee6f8d9724f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcdaef563dbd6a7c48762895228ee08f
SHA1934a2fc03bda4acfdfe992fef19c11e90b7dbb73
SHA25680a793e728e91fad9873409ca4696d4530f427f8372fe431ef4c305ae44dcca7
SHA5129aa538d0e161eca64f92dc657c9878b2677ec6978495894127328aeb7d9f8bfc8e63e9f6d6e9a3a2eb8cbdcf5dc8703d5f096862ee160a95af00221e3c329209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580e885551820990184cb41dfde93f437
SHA1790e709946bb19b00d174c86e73f789db9dd8631
SHA256f3c93fb1378de1837a8845886d09e51da2eecbd15f106afa121a3fc317719049
SHA5129e67b30b2dad48aefcf78bbd83505dac9bb52b5cc5f44b82f832da51f14ef6bd95ba42cebbbcebceb173bb6f1f625ad354f4c136266ff950f46433275cb91168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598cbd8cb55ba0b0f87b4eecfb94656a9
SHA1f67621a5bdebb93533cc59a1d5deedc563f24c79
SHA2566ee7a826557cf592c90568684971e22bc8aa12a9eab16a07322167d7d336f56b
SHA512305a39eaba05c9dfc08b7ea68ccd9269cedae9059b2fead137ef0deeafe24d3581ad7fd138c0600122753e54cbb507bfca68549b870b0f8be333a045a90652a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4ad6b65e88ef5d393b0cf69ff9245d6
SHA1ceef7eac26ba90a0bbce8531e32fe7152823a1aa
SHA256e49d8c0f6fe6abeb17e9c4452af6918a650d5192394d5540dc4d3b9ff59a5668
SHA5120624bfa97f1012a3451716c92217b6780ef68322b1d78d70494412885a96f71d4ec5b102cc8542418677666d7c460f16ff1c2c569968784f34a2b9128da856ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574145445468ac4f6d79165f599c4ee47
SHA18c32f9a10df4570c5dc3e9c0add115f9051a797c
SHA256cac4944c1604460afbb52b44012e2f9550cc304fcc37cc79a668cee4444329eb
SHA51295da8b6c52283f81fab8b17719bc0eb1aca061ae7f288da5f4113f734f5752a77de65ac1c68211fe5395a513adb7429f6dc1a09374562513b37a24a1f93a9625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5d63ad980b85a9219891f9de3ed9e17
SHA18819e919c37d78a512b13d040e80c80dd979a5c5
SHA256489b7ee8413f7da63bbfce2f46285ae008900abcc4bd11fdead7d48d61581682
SHA512555bce2dcde06ef87579b2d82082f09894360f62b105c223c9dad4dddf7d8ed9455faa1c2981308077bbce64ea46d33bf9813ab3fca6cda495d5eb8e94b07066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c9aae35f3f74e94759e8bf4dbf50727
SHA1c436c2044933400ce78c8e37c9ad71219965cb58
SHA2568dbbecb66afcdb03c0ca4ab5c31996a36cec5df35231c261b0b585306266b49e
SHA51212f381f9754ef2768ab43b48060f27f7c8c6e55e88bc32c952feb51c8d6c635a024d0265592d4a19c019ee6168d184a5468e25c43f5439824bb4335bd0af25d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567eea19506e4ac7ce25d37a052de8987
SHA18f08025c0afa1711460b7bd9195b1cb2d5dae789
SHA2562904356e101281c8f9e087aa1b2ca90e5eae5c49007f15ebd044b2e5141b0596
SHA51221845efb5a2fdfb2c72337478fa63ef0c6317029926cd29ee9f9babbf8c619af3a4aee6c76ea49af3702d72d1a2b82128c6f691602325a5d9c442d1c229ca536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e5c4c66124ea2ecd82894074f99a6ea
SHA11ca7d296b346559d665254f2900306846f68774b
SHA25649817ec16644fafcbce3bed42f73607982120f656b47f4ed51a777acf4b0aba4
SHA51206e2b523deb48cae71751b307fd6b3b683ac8a267f8b85f6d0433632781fda1249fe5abc5f69819bc0c1f4045452af75d4522b49bb43d43b6bb621fc41ccdd21
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b