Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
8c2c11f0e30f9f3ed4bf687317a713df_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8c2c11f0e30f9f3ed4bf687317a713df_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8c2c11f0e30f9f3ed4bf687317a713df_JaffaCakes118.html
-
Size
68KB
-
MD5
8c2c11f0e30f9f3ed4bf687317a713df
-
SHA1
61c413facbee5dca9deaafec56997293c5383ed2
-
SHA256
191185fe15ec463c3963c9fd4f72195145433ff9af91fca93428b9d8bb530082
-
SHA512
05b7cec65d7a919b5a2aff252b6c0a17253d54576247549d5276017f4dbdf848bb623b48d7e0cace9942483af23f65b348a255efa953d6ef1776ed95c6dbbe2b
-
SSDEEP
768:Jiogc8nX9z+rbXT8IYYoTyCC8koTnMdzbBnfBgN8ZYyxoogQFAG/sy/Ijky/Ijkb:JSNNz3Tipc0zbrga5TNnGx
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423446635" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70509a157cb4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{40E5FE01-206F-11EF-8DE7-EEF45767FDFF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039c1e302f7d12e4198928fe2c5b3dd700000000002000000000010660000000100002000000042607eebadf9b06e5d5da8e6f5056ccd8f46b6c734d087b7ac2da56118b0164a000000000e8000000002000020000000533732f7f610b7dd93124228fa5005b24c7363637d6126fd1d98fbf2ae8b040120000000ea69e5fe5bc4e2a2dfd7b4499f177fe80cc7b3b8c826606b08e3cd15e5e5faa9400000001371e10444196771e4c36e899a96d2d890d0e45924c10053187473acc03f9fb37d3409f52ba10579bdb67c451b5307a8479e482e027afaf51b37cdc99e08bfc1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1968 iexplore.exe 1968 iexplore.exe 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2256 1968 iexplore.exe 28 PID 1968 wrote to memory of 2256 1968 iexplore.exe 28 PID 1968 wrote to memory of 2256 1968 iexplore.exe 28 PID 1968 wrote to memory of 2256 1968 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8c2c11f0e30f9f3ed4bf687317a713df_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef441d87ed03320a1cc0d45a74dea1db
SHA1c945eac854caa31085e98db7dcb43344cc5a5a47
SHA25699e9112da4398734d69bbadbdab87aa0d75b55c09f36c57f26ed30256247400d
SHA51212c4233573c886b7fec08a0cf3f61460d863cf2cf9ed91dd346a0d3f4440b3faf9181f614bc60d4714c08654a106d73bcefb3ea6eb140c1a589b90fac4893581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bdcb07e36bba561d0203404f29ff663
SHA1facd5012d9a3c1fdb396040a49ded3fc91b82cd9
SHA256d470933162e1455714bf7899fb2112564ed43a27b7bc5202e112fed911ce1d47
SHA5125767e17c53c06ea68ab9f85e1e3c50cfc2f57da6940578efe6053f8e443fdef1ec07f8fd8d2de6264c8337d557aaa04e9fde4707a0e6609c3eeb19705ac6b07f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558fc297dfd5a30f3fefafbf2374e05e7
SHA15c5d22263c991638d86d2ea7e8ba2816c07ab97d
SHA2561140fbb25a73511f4c19fcca56754d29f5641458ae4674184c25d67427d870c6
SHA5129166bdf75409b67bac6eba6c6f6889eca86b8d5619c327bad09039b3817a18de1078de72e8a88cc7e96480dec7f477cce934d3d27bc7dec3b7af5a56f3d0ca95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e804fb8bc3ccb7fe6a93fd733918d28
SHA14314aec7ad12ec199986c5a5311e4fc7c2b468fc
SHA2562423ca6320d8d5a9bd9ccc3438f1a27b546c971a128afece7ebe598440e92eca
SHA512569df130cce0f247afe339777812e8c372d9d26ad7ba3113ef3f2d12c8b9277cc508724f51dd2bf8663a12dfdccb3d2f8859da9c92b300395f78355fe7cc6406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6a2bbaaf3fa430ab2b4bfd853e11cab
SHA1b09b57e7f624df55ed36944bd1d65bbe084d7488
SHA2569f0b139628ab21315474587e0a4e1c3833f2e86477c010a9fd40c6496b9351bd
SHA512fef48454f0a68c672c5bbe3531e829dd0cb27b884c7adc454bd8ff00945282f33f748320de5b208a09a088897bbab2543e75f95d71cc4437a147684b88fd9e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590bfd916c6cef84dfab66a65713596ed
SHA199b3645b05a4376a067bef6cb19086f9d3af6edf
SHA256d5d6e6b7cc2078c2fe6e2ba6e14a412d6512bb17f7cefe92817f567a55593bc0
SHA512e2047f9817b32887c9e61e2f34c503995d7c30bc716eea14c7f52926eea9c79663eff287a76b74fded2994c784ba08c4739787a453eb8458d436c03abfdb96ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597d142630105765fdf6f081fdbc35747
SHA18670347f76ad4f867af9ec2e88473641b61004fd
SHA256760826a22aaadc982e1ec0ee6c6bb4506a46f3a260a03206f2dcc1d2dabcfeb7
SHA512e716fcd2562544adc45970f488359591c56cc57202d99fd7179812216eea0573a409f14eb2aea0e5b3d53274b9cc8c49a7de6d384da5b5d34f8672b793c2fc74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a3674300b58cb98c1b39e3c27b23118
SHA159c8a0ccfac0ad4e2388cee95827e55635fef705
SHA2562b80dcecfc771b18fc4ed21c3c9c0e4d81e1d8d02154706de89c94ef1043621b
SHA51278eff8ee5def61c4bb761a1903c4f5319d847d396377e994868a11dc61692487cd34295303babba65e118b9b550bc66c792cbf7a0aa9abf834705fd46c1b9515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d542731b8f0cdd0f2eadc37b299fb587
SHA1e83ad37fffc3bc835ad00ee6df6262c31c0487ca
SHA256ceb18db9f1bd78078352b236cd1c9b8cb1af318b4aeb0bb474a746e40f6d9bf4
SHA512352abea337d5ee3e42ee00ec3536cd5a33905d1a1d6ed47c061866bcbbe7c67a0e885d38af64e6b3039262e7954017920d4f73ad561df044ae9dfd6bd1d27dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e207906daed259e4b00f6498002baa0
SHA150567bce237ec8c59a16e6420bddd031955aa3ac
SHA25600bee5a2d2e1d75973a0434902179a0a4c6c8c5b513a2538eb71db0cf107270e
SHA512ff840b73b04353858c4c12e7db932454bd791f752209e31ef4a202b30754d182b1d8984e16302b0cc0c9c550c6a78192894c47807346b42a08bf3b2b76aa5146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5035547dbb3263dd6d3e115620c2179ba
SHA19b877c34b1db3306457fe4f8f077efd39ba552bd
SHA2565555f18cfe236611103503f3ea322409552043663ff628bec0b42a2c9cf77c31
SHA512f8ceea7b2086936fcaeca4de9513a8bfce0e47610cdb674c663ff73557d38436bb6ecd49c12d10f336a13b17617b9dfcc202d27ff9dcfe453141f83eeb2bbf2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f2b28b2a373ad5dc81a9c28a3cbcc06
SHA199e4b10965b09a10d785a30219f0e34f679e0b2a
SHA2568aa5f9b6322e016745a39952ea3f006ead038a4bfd94d2e828189519695d7dcb
SHA512e800e39aeffb164acf2b6e1df11f27137fa54215938111ec795118df0f54486dcc49e84aee767a338e658889d65ec33c5eaf7a91dc654f11ac82ea66957a10d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ed2311fc00d7eaf23d2aaa60e16434f
SHA152e2a703520deac07b640c45ce8c8c33574469f9
SHA256cacb81a741de1e05b9197dc9d913df60e5f85092e8abd4fcae1d767de24da3d1
SHA512ac41dfbe32157ee84ec070343ef8ad7c38b2fbec62e87547a7bcb671867ce16d6a751d5e994c9c7480be5ca79a98ad4ed076a6a928c1674004ed116fbbbc4a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f22b65de8e360a3a5a8b43ac6295a6f1
SHA1e0e1aecad00a6aff037b7767a398d607efcd1a98
SHA2563a7803fff5bce5745277b5e25721629594a6f496286679609dace50d6da86dfb
SHA5128254a165abb1817f3d3e11cc033e14bdfb0086505bd09f96309eb76a1cf633052af5a43a7969bb7d302c0a795eeabbdf489b9370e917ad9fdf1e1f4310ee8bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec09b719ab4c72e64b33f04df7536656
SHA1226942ba47f528f5d04c523692c4de67a526d666
SHA2565cc11406d735f2daddf9a7759f38676ba86058e08b75189574920665f4a042b3
SHA512a4764c4d7f74fec0d1aa67e147df1a888c7b9742b6fdd86ab81f8d425b733c448801a611ef5d01d8c40200e773aee091f552b1f5916c7c128346ad8803dd261d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecbb8045cc3c817a609a49015e980f4b
SHA1fd0de5dae7418a233162a7466f576286b8508770
SHA25658c721fe81e671066ebf9b73fa35957e2d6cfc0a0d1b82defd31dd9f115f30f3
SHA512da020820e74c1275db2f98366aabfbbb76b0f83850e30889b24094c619784560f6d20c08181e7add9e0ebe89892d7d8841430dea53038060e1c0a634c3577296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee0f5a51750550d8014a1b2b71c8900
SHA1ad1786fc3985b59559e6ac8ca7cef362e5648194
SHA256883cb746555d3f17cb85cd0886261e78bf8ec9c59928c1d8500d5f343a252edf
SHA5125444ce04d5ea05c11a3791d41898041a16c3606da3705321a016489e03aa0b67f81a4e05bc60340cea1b7523e539451f026f952f170c86268df8d73435864904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c95733da27047b23c67a692b9beab4a
SHA174ca346573d10bf070ebf657d49d16fcbab7b4a5
SHA2561fbf0c1ebe6e9163fe163de9de8db01e626fc0261a632be904ed99e52051ec82
SHA5127cb05cce72baee607e50d6bf990bd30b5878f9d94862da15e1a13e4076a1e210c024e45476e06a62e5183e3e0b3b24527cec7a0a93d59c3c506774a9e98d48f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da6651ef723621db7f1fe2dd0b0b149c
SHA1a079700400b8653a770fbc87775acc86154614a3
SHA256cf2a6cd438fc3e5c9692b7254be60ca4dc996adf7e7b66724b33a32f64227d7a
SHA5128a05c63f6bf8b30f72d0db67899aab262f7de7b4178477141fd07038d8b236ae68882d919983f9401ac412110319fd1305eb386ba4507cb9012e459646da2b79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a9f6d50ab0fbbed22de231aa18e89e8
SHA1d56e7d03087a7f54ff9fd803859fe04304624e7c
SHA25674872d6ef4d7d137d808c862ab2ffde0466facdf1b241344e0e601385563ecca
SHA512e6e38cca9b1e6e5550da5e20a7cf31992c330184b0ba2da4f1d96e484684f0e64eecdf09fe392b17a1e6e526d98c0109365c420995a7ee201853a0101f4edc74
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b