Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
a93a40fbb9c488a804d5713985bfdf16_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a93a40fbb9c488a804d5713985bfdf16_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a93a40fbb9c488a804d5713985bfdf16_JaffaCakes118.html
-
Size
13KB
-
MD5
a93a40fbb9c488a804d5713985bfdf16
-
SHA1
1ba07687cb60343dbea2d9526bbf76e47d4b8103
-
SHA256
8aac22fa830f8fa28ab0acf0e023b386e29c1ce46e445b0e6b0ec79862b5acec
-
SHA512
337fee77dc92f606baa86a29bea047163d0ea1304c0d107718924749cbd250632e8545b6285b999786838197cd931d264578dd6059e081012a9b3fcd1ef43b2b
-
SSDEEP
192:bK5PliPyR41Wc+yVVka5kInwM83OIB/A2b3JHNFryAH:bE2W9MVka5XnwDLJHNFryAH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000075907d8ab0a945c90165558ba1cac5eac4ad9070bf42c3e2f0598e24fd75755b000000000e80000000020000200000006e1d7cc2a18af0bdc01838c9fd0b74b3d15f7455cbfc35ee4d082f2cf2ed620920000000cec464a3698701b451affd5c8c0bafc082e84bbf1f9da522e4c88d1c6eea2d9b40000000d2c6df2e063a1e01d8e31e95ced714493d9fbb6000bc3c307ec81054830ecb4d588fd7d80233b9b22ef57df13fbb4ec4d66312250df127780a91d3b0a5144419 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B85D121-5DD3-11EF-AB71-E6140BA5C80C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430196544" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c00cf8f0dff1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2968 2120 iexplore.exe 31 PID 2120 wrote to memory of 2968 2120 iexplore.exe 31 PID 2120 wrote to memory of 2968 2120 iexplore.exe 31 PID 2120 wrote to memory of 2968 2120 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a93a40fbb9c488a804d5713985bfdf16_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51958824e80c5a17394ab2d55dfa24417
SHA15287ee76eeb0992d1db22ecaf6686c25e2554815
SHA256092efa8da840f03f42079aec2465699332a6fab6794780e47c2c7712237709fa
SHA512c238ec74dc3d5e99c219ebb3badbd13157d48d85e915634850aefe6e1931ec0b44f91b5ce6abebf9b9d0b1b4fbdff156c956aa7c5b12a1a2b1cb285f9cd4f50e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af35f4e3501fe1abc9b8598fdf8b9ad8
SHA1696556eb5133ba771caca7dfba0f0ef3fe5dca2e
SHA25637bcc7fc6d427e2aca8b7160f4ae6361199761e4cf1b2565c1f9dcd2a2b19893
SHA5126f96f5843409cc7c41f171f46eda16af21ad8ae0e105f7d02d72e4ae3023dcf6e0dd72044e89859a996ee6fec47584c656a3686a4f9479aebfd1473136120be8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51339eb3f1e0a486ab90c4fb91a1ea8a8
SHA110c6e10df1fed50097dec51e793d85a5b2717771
SHA2562ffd1b12ef44f0f0fa871f7c4673c341414987641ab48953fec1ad47821c86e3
SHA512713e6b4d16dc8f1a20430837a90e4e93c5f362b0e4115cacaaa99180855590a6a58fe44977ce2dad925f9312802606b7c9411ff675bdfb9708981ab9be60601a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5404bb2e39c4f87e2a45a66bc77bc147e
SHA1cef199a7f80497cb082c505be0187c7db23e4537
SHA25611e46877fa8275704a52f77e91106436a991271b1aaf468f68cafc508042fefd
SHA5123661a2a9165d90a79c8a9aef7727a57061448bfb11ffbd68a2202efc3c78e1c01bb3df36ffbdaf73287a6f49c07940b4570942e610bb6c293d6014556551e380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506eee246b2227b33ffb1e76d3eda1fea
SHA1775829e9343a08f8ad12feddb271f2dfff14466e
SHA256b5903fe5aeacb7c219ef621bae7e15c72c8303dbd09dd470f0bdcd22330751be
SHA512cc19b249e08a70cd9ba23c54b816793f1486db4d606c55a583f991c3dc9dac810f8c28b5a068687910d17f8117aed56e7b5da6f7fff950ee7edde79fab977486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532d7ff80ad9cdb9002876918e6a84ffe
SHA1f3fc80330cda8ef50463bf32c3b040f3aaff61aa
SHA2560dea4b6e8dd79db695311fa44d5c47c0c5161edd274c27b22c4eced5dfe5866a
SHA512fc7cfdd6f29598274ccd8ce5a46d0970dfaa73dc7905f38da04f00f085fb0a46a94e3d9c7516291c0f2fcddb82861c972a71e7148eb7c71a3f856ea66d4e7c28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cfa15f5a948f59cb52b64a1d844c35f
SHA1c83cf0c8cabc3659a29b59065f0835185347883a
SHA256d29342e6ef55361158bf95f306d0237c20f0651e36e71db9c0bb1002481cba5e
SHA512447579aeff2010b5f76930e4eb076acc8c655ec3d5f21d330ce3ece578dbacb205bc68af70cedf53f1df57408e3c4cfc95e9cbe7cebdbe056026b1f9a49c0f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ac9fcfe789c343afca408efd5bf3bf
SHA116fa2c2b0f30aa2000937453250af90abd74fb8d
SHA256de7a53e147bf63e8102d6c79ba64034aaf5501953bb1a6016dd76c89d6038746
SHA5128f6695cf1c26633a3ac6cf845dd4b9120021ae60ea42ccc39d98797ea598575d07e6cdf849581176f68eb454f920f949294802e4fc835db26062fb62f44812e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0de2ed9be01f7c2dd639cd30678fab2
SHA141b4d2a0d2670cb44f25f8645dd99ed5a317ecde
SHA2568050c886e09b00b8133c4485688d54cc461c62b802ab8ac0a78d87f0f52f3c5f
SHA512fb181f7be1eec3400a69ac0b952f3dcfb84a9c96d06184096070e7840e97949f157e5f47325b8ae69798163153c760486917b4a45de2022671394d59fc1c80e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516c77d2361f85aee020a0b48f5c04072
SHA1069e35b0d87ef4c8fc68f6c9766cad9f8494fda9
SHA256d163c22be247ce213c90e6673fb35a3e5fc5766cf8cc7b6f82af8ef004ea2acb
SHA512f5b50c12f88231bccf37ee2ead48a58c1ed3f576da735b54edd8dedd89a336fe7e2a86c079031bcc9dfb8f639e2dfadaf95f11e4aa446b195c963db5f803d1ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d86ae94173c5344dd947058a0308e886
SHA12ccfff279f33ae34eb91bbce2937f6219ff6a51b
SHA256e3c97745f576bb169d78ebfceb38c4c2334deb694f42ea52ce9b3840a759874c
SHA51226b6d49f182c514b8530312a9db33ab808df600aff761da029e930ea57339aa3a7e0eba68e93c5a4b1ea90f93c2f3ef06ae322de4afeba3cf7b16c00ba6a20be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579c1d5c90d40b3febd4e24e8022a8d88
SHA17e0ba84260ebacb0d932d4c3f054d759b4af52e3
SHA256a337697b252c380c5e18a3e28c304a061138941a992d448bf14fb7a66549ca15
SHA51228cf6aa1c0652ead2612ffa6c60fafbc9d002caf9f3a5cca0002ded7985e71c27df647cb5ed9ab7aae06f8cd246ae5de19dd772f2b2e252862625cf623e9563b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ff826c090df92d197c870472e482294
SHA1696912de10d6cc708b24ef55d3ee86b29e96dbc0
SHA25648e59202e513ac0e1544a76554bffb42ccc6df88bf99519d84d82e0e435f3e4a
SHA512560962c43248644f8a1754ad7bbfacb989e7b9796fa929974871de56ea50e1c2e78082a649df9013722e420228d5878ce25e5a99b9bb30d5c97bace61090cb4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd1cf7a7df30e3197e35878d85d0c4ce
SHA1f20da61ad22515708629ba1bf0acf14577367ef0
SHA256dcd537f70edd95ab28adce0684258009ef781caf2e07e030103a7e268f202202
SHA512b4396d1cdc11110e32a3f42f106b448f75a1a586c0022c43823242268fbcc3857d0c44c58ab932a8cd06fb15a3bc71bd8ceb45b6650eb7ea5e5b5c66d8be97b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595a00ebdaf0a82a3ba747b8fcea53969
SHA1ff3f49ea2b8a5713650fec8df2761c4eed05e389
SHA256e887afb53319608558ebe96695cd83a39f1b3f15ca29eff3f4a7cafeec8c3032
SHA512ced91ea17b95a252a7a6ba8cb4887bee3fe9feef5ac58bc632f34a8adbdf5f088acf1da33e45a3ee31649088cb9aeab03b3644d5f262a018688f3ad9441df064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598c88d2c6adf5e9853b84651fe5e61a9
SHA116f0fdbcfad6676ee02344eecc736546549450a1
SHA256bd161938f42ffb614942d84e37f1789cfb8bb8f05f0c045b458317e462327bfc
SHA5123a65b291201dfb96e87b4ba527d98e91cfb3e8582e9b03aa7433c68872be4195145e93a59b4a263ae8cbe974ad6f039d58a3afb600a6e9a98b5da0ddf29d32fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5631f68ffc26e6f74d704b4bfede3da8c
SHA13a5acb5225d692b352b1574ee5596ec49b01e681
SHA25637ac5db43f6db72386ca6f5d10cdebb330c24bbf325ed9ad73c260e802d74dc1
SHA512c668d63538956e6b84b5500d61ee3905764ff087e53d3fc7a0d391765bb56a8169949a0c4221413f36df9bdf3c1b153aff9963bdde6cddef54d388aae307086d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576c8c17640352f40e7007ae2d58020b1
SHA186711ebe4b04066e8cb3048a2a7ca2244b86839e
SHA2567db580e1e977b58120f6cbc866d0ac42f967f2579f1c57adf237ead8bba3ef4d
SHA5126e790aa76cdf71a2d77ecb2433ad88742339746f127f8ee10fdfafa6df4cb335f59ceb0f7339490de93e3da7eb5b642ef18af164ec64acdec763df369f73c594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd608981fa18683787b9bf634d12af19
SHA1351fb5ea3381b79a98d0dbf17a2a583dfddb722a
SHA2563c04c799595b5720cceedde4d66002c9a48bbcab2205c6cb051136ceeaca3cd8
SHA5129cb7db530d9bf4c87a36e81e1582d387c61bfd24873c880d266b7fb6271a0d370e0d207ec0f4ba8bf1a6fbacf0000952eebd0ded8636a0aa81aa798782ee80c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c0b6e0d0dc1cce2e39f92ae43e61af4
SHA10755ffd4cef7167d8cc343f86b8a7e84c389559c
SHA256ba09e293f9cc065a1e54c7308122986b435f66b6cc678e8a7db6d64ce9d9fe95
SHA51280be4a7b77f21fe556a1e12f2648c0fc6c7ebed0f7bde640592524b36738d11bbd1a4193bc6baae7d797c9406146e447803aa817b54556b15ddc234101b54134
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b