Analysis
-
max time kernel
134s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 16:16
Static task
static1
Behavioral task
behavioral1
Sample
afecb21e022ec127a47686cf3a036e91_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
afecb21e022ec127a47686cf3a036e91_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
afecb21e022ec127a47686cf3a036e91_JaffaCakes118.html
-
Size
44KB
-
MD5
afecb21e022ec127a47686cf3a036e91
-
SHA1
0a4c24e6dbcf8946d8edec5f4e75e2a0f3e11cf9
-
SHA256
cc48056a51c751b2ccc6c9946af45d13cfc3a30f44128969f15fa2ffaf22acfe
-
SHA512
55c22927c35e897ef5202cd8c507847bd48e96911c08c3f14d26460378c90b6d896881453d6b141b6303c4c1fb6f3c947a53c18df14d800aeeea38cbfdcc516c
-
SSDEEP
768:7GM3qAQU9WMGafTIiYuQ2fyKJ1qzRAdrklCV/F:SEQU9WxkTIiYU/qzUrkwN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BAEA751-5F0F-11EF-916E-DECC44E0FF92} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000ef10335277a6ae10ea1056a1cbbafd60f60595929963827f3254e0108838a650000000000e800000000200002000000058f16bfc5e57f6d6c4ea80037610c6cb7263bf0290f8a544be4c78b30867966820000000dded50cc0f846dcb19bd2b0af43930942adea8e4b1683fd9279fa0258b490f224000000073997f6ae9a0f5c56dc02eae2aca5874a6903e1ecbae93aa7ae2bec2b2180cbbd565ca9fd3a4a88e23c6beba61f0c87e1dbf64e168853ac597c78a63c90ccef4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0fe575e1cf3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430332452" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2640 iexplore.exe 2640 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2844 2640 iexplore.exe 30 PID 2640 wrote to memory of 2844 2640 iexplore.exe 30 PID 2640 wrote to memory of 2844 2640 iexplore.exe 30 PID 2640 wrote to memory of 2844 2640 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\afecb21e022ec127a47686cf3a036e91_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556c898acc927be9f8aa4bb650323abef
SHA17e23f58e30395cf06168c2af4f06805c4971294f
SHA256e21c1bf89033d52884b4b425939c04a78528bf8861c0b80c5506a0bd847f4e55
SHA5122c1ca7847808642c64882b2c17ebcbc858054c1b5e941e7b7a6a50759535e9cb82193c9a9668f06878ac387c6fbc50b212a609d24b14539821a48b18b1b899a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54233bde1c3744e05c213ad33fba9f594
SHA199436f03fc0c283bc6b5c08ebe7023b5497c7c89
SHA25647893e76b832f49b332ebbc849bb89c295931ed1684ee135e18331e407ab7178
SHA51260c879ece82ef36dd66acd3b5393abe8cb4cc87c1e1ae2531f3d4165f1b3c93add85b486051e471caf9783b66af3d8bf0aa9a1b0f7512501dbcc9b73d7c69f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ef81ea06a27c48202251225e0e83dad
SHA16d5318df799b180eece6d6ee4ef06fe60d69f98f
SHA256ac4420c4c849b9c0dc83574e8ad1ed851ba3b4f30f3ad0a1ad3f6d4c67413cf9
SHA512405ec2cb6ec7f9b69b9e34d5ff34a8d019b089c098d3b11a0dbae3ae8ba5f5b3e5bae4994bf4af5fbe0d7b9bfb9f43df8833c16ac3e452a1a097ae11b0e876e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc1f528e790ba372d7b10b732051f16b
SHA1ac56ea1297c6a7de818b40a699bf17d437a3bed8
SHA256511647d51ddffcbf197531c741a12bfccf6dc8b86279fad57c7314375314b579
SHA512a4bfa464b3b139a5fb377cf8d1dfa621c82b09d161b4f64d3a40a92f446380e06467074b6322bbd2d6d1c684be303db084d627454190d8a1be4408d425c43cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584c91b8d0786dda61b07847320b16fa3
SHA1545a1f3586ce0279fa7b6ceed0dc250476a6af41
SHA2567ab3c24a8fd7394abcd2ae04f3ffbc010930d0feeafbfaccb378afa1f2bbeb55
SHA5120159fbf31ce0bfbced9402b8d2879651ebff86e0ae72aa4af45204389bd5d7ca8029bdee5595fef9c00a6783dc57c6a16ee8566986d21769a95bdb77513f77f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2653155474adf1f5f0898a8f1be933c
SHA10ba898e84276456aa169c7684cfe8d346420a077
SHA25600a73dbf5f424576ac6dd3c645fe58bc33e43d41e818f5b007bc955f73489e85
SHA512aefc4deac323e919cd08879717184c52ec9053bf3de1f52f0c782af4109333c738ff238dc8b56be98d2b1d114064322b12e535374b9d6c18b2fb22960b426194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cf0f2bdf3ac53ee048a925a8f005559
SHA1b2557e0ff26cf402941a3a9ad29e5a50051c36c7
SHA2568e2f35bf8fa69e5563bf1b3a5c9d6dd8cde53a1abbb0c9b542f69d5f02328398
SHA5125321fede4e11cdcff429061b824d4a57d337748af1ffbf104a20e4a313d9e7f4aa90d65daa5e06ec022bfcf338f9d7d88694efed7a422f4f6ea1a3a6758ff425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56362be2d2ffc7852c06a396a6ff4346f
SHA19b7b86882c2782d91ddabda083265d6a664efa6d
SHA256b322428e36873af09267688f5d32cc6b774494bdf286ae8b4d2b4f1d9dcd99f7
SHA512db007d088d939c2d2eebc9c686979869255fcee04442bd93961f2c025fc2ad1071ebe15d538cc9c14fd04a6a4305a89f4131a7e773617f21880021c4fc9e7ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0d2b6230003a297b3c51ea4fa60b8a7
SHA1ada2ea2f47b53483f1febb843ef2816f4827163f
SHA2567142d4e82ec825491a56595f3463dd7cf1fde1679b105a28fd70a7f68ceb7c6f
SHA512d2fe941e97db8f4ee3f279d4db328c8fc56278f5ae6b52e417349fa7c37aa4486dbf1f4832ec1274dd2866de3a5551621bf0dbdb7d52a0350ed2d2cc4cd6d60a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0aa650e332a5d04389050df7bab5905
SHA1444bf019f44e00d2b75a5c990359e207b79f98d5
SHA2569c685b641204e04daf26bb409dfeca0a71c0dbc1b73482bd6f668646dbd89065
SHA512ffd83a393686f46e9c424e0dd183e5fce995ec79f26e724080544eeb65b4fe0b21d683faed6d61844dc59942afafbd936aa85027cb3e235de0bd5bc21e22a49b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c701451688c091443605c3ddd200a396
SHA1284f86aa285e4a90207ec9460eca6fecd335aaa1
SHA25630d3df7ea0419520db8b18590d0ed172fa93065fead06e5073efeb74e67c28d0
SHA512fdc5221afb47a5ed9d0af5cc5ce40a736c8bfe845bab888de1d89c4d3d1cf61e54ad1ab36bd2da3bdec23a3a6985a3336ad23e9a0b8339bef961e3dacf412ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a665708230635131255a4a87be558868
SHA1f10c0a668f5a3be2cd4ec73f50543336eed01403
SHA25621c92d51365f596283a32b77eb8295c5c024288ce75d8d699a28c182495411b7
SHA512f8897b75c6856323f36144387b211900cad967f020a71645df8d58b750ed7c3273d1385ae771a74fff2126c3e715f8216e7483165ad500d642ef2d7ee7c34fc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530aba3afab9c6d174325778b0011a63a
SHA1c3cfede5aa816b82136642d5bc308f2695be387c
SHA2560b09b48cede5d22309d7ebc242990bd01f51919733d01fb3a76d96a0aabc57fc
SHA512bbbaa6c4216a5a0654715492e33cfb605eb6e8a75d0c3e780a8812a8d9f871d9e91ba9b80adc876031214f4dcdc96c9a1b9ac540e1e6c9d70173ac58d6927790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1c03bd869e17bb1d2e7efe46829cfe8
SHA102ee1b65eda1a2ed8dea7c2454bc38cafb5cfe5e
SHA256e65e77995c631c42ed913fec21ba6f1f8de5a97d0d313113791f36653bdfc95b
SHA512f3ba75502bb6448084bb64b2aa64237af3c6dc4a0dee88972ba1344f102d3ad61eaffa72a47f4b52c0a3f403b993b1b52c394a2cd4e3dfb0fe475928a085e26b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3d6a9685be4e8bb69861ed0acbdf412
SHA1889335ee808d593a20c6abc5645cef3c4d2ba8ff
SHA256eef06fae20680495460e50f76e8da1711ebbe85f9df4209d2c00c71d5b98b92f
SHA51249e82719b621accf2021ed937e2d3b3138565207c6832ab743c192439f258751d250fa73bbdda15495021040b0d389e55a4cb8cc11adfe0371c19b8ee438ca9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b496a55c478d9c740e214b558badecd
SHA14c1da4aae8b8b1e681a958307d9218fe9127a933
SHA25675a55edc40ac09dc6eea1dc827fa7ad4cfd0d15de53d88416d8c408e7da79363
SHA5122bc753c9044375b4e5aaa0df502eaf401232714d974917cf1070916817bf776eb1c8ab4e7415b9ff272b1e0a72cd878f5600ea1a85d19d49a7f54163c6107c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a1071a6970b8703247f0a659ed282d6
SHA1714c0d25a3e238d816fbec2624279d5881d5b75a
SHA256e7ca011f4e32801b1c9cf925aba48b80172db1d770a7eaf1d011eed0a7fc4671
SHA51252c653074874a01f64805a7674d5a62b711b9c4ea037a2b1ce5f4ca83130e5fd6b13adcd8d745254a8c0f6f4199a4e29be4d6e232dc3a569d45e9b7deeab1361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50da1fa577897ea0ec2221d3ee88307e1
SHA157248adedc2b46597c2f15a6ae3bb11c2d19248e
SHA25611faf9a706e6bcfe6d4fed22fd1fd6fb767be27be38cad510f38b7834242018e
SHA51259f0c3f043ee9f4cb336ed4c2dbad9f623671e8456da9fc804193f7939c16c5d21582fd23767400c89fb692fa740f3b1333b9f0bd961aeb4d2deadfa2434dbce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54280d94fcfb190f0cb812b113b5b4112
SHA1bb9e0051acd294efeb6568f6d540278cb6888e45
SHA256b6fe1b6bd22e0fd607429f55c0eba7de39f2ed917cd405555340d0c0f556b138
SHA5128abd2679e4c51e715abebcd45fc06002017732eae7d3d189d3aba56dcc00e546ff9f7651159b11a13191391836e9c94da27825c96edea171e69efa2fc90fc6d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a09d6ad9d55355c563e8db18c09aac39
SHA11b93127185eab4069a106744b0758e66d6d9c945
SHA2569d4710cdc9428af8058ebff104cbb962d2ddca5a8381aadb0352428821f0c721
SHA512a509c223c8a6467f409b61ba82833506284bf1679b065edf9cd636a01faff59e7aa4647b5493fa16a571e0dfd07d77d1ac6b5f66aff3b117f1b88d060af2c7ee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b