Analysis
-
max time kernel
67s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
bc6b992d2620f3a9b675bbf7aa314094_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bc6b992d2620f3a9b675bbf7aa314094_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bc6b992d2620f3a9b675bbf7aa314094_JaffaCakes118.html
-
Size
18KB
-
MD5
bc6b992d2620f3a9b675bbf7aa314094
-
SHA1
889c87a80e0cbe560ddc2bd56359730c859f09c2
-
SHA256
73593522a8ffa2e0c9d6db9ba760d8d101164642115e798b53c621ce0fb7e1db
-
SHA512
2288683d7ff73a97e89ffb84ee672fa62f999df50fae6326da8ec462e58a2f0b227e3e86de705e48cb2e0d270f5107e4c47d7f845826f92cceca7af45ea76b43
-
SSDEEP
384:W4lI5NHSwmmm7mmmWR1eHw71rn0L7jw1eHw1eHt1eHu1eH3zi1rn2t7j7mmmTKmB:WLNTmmm7mmmeeQRr0LSeaeDeIegr2tja
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000c9cceec8a62934459c0a67650e49e6b360a00f70025d60f41d60c2408f00000f000000000e8000000002000020000000caaa4c67585a8fad60fdd9f7e471a795d3d96eb1d00473eb84f2ed99b07e8d90200000002a1c4d2ce3a8b51600ade1e43e123c2528a641691563a0ebfc6e395581b4a7414000000019312882e52dcb21b6a52081d0cf33b6a76953b877ac0602bb9f503b32145c78fb73521403c12ce2fdc0269e26eee6eb772c7161bb22fe59364140de68872f31 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{82AC6FF1-6169-11EF-8E5A-6EB28AAB65BF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c071565776f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430590994" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2272 2876 iexplore.exe 29 PID 2876 wrote to memory of 2272 2876 iexplore.exe 29 PID 2876 wrote to memory of 2272 2876 iexplore.exe 29 PID 2876 wrote to memory of 2272 2876 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bc6b992d2620f3a9b675bbf7aa314094_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c71d078f566a329cef14618ef60cf4be
SHA1932c5a989e8bbe04a03b29d61e2dfa983dde2d40
SHA256a2b9f7ca31871ab2b27bf943bebc834e32b9601a22f0f0ee0ae2de2c158bcb8c
SHA5120338d19d036bcb3077424c6a60970d6d38b854ac7cc890c497879fbc0ac31ce2a0c768bdc2876c8f491cc1873f097913fb7acf9413322bdb183d333be8cec75d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540380faa25f2d950eff25e559702bb38
SHA1d2c6dd1a122895cd598376829fa8e687b0c8984a
SHA2567f66abd1aa2911845ae6eb928ae290c6eac8672961342f5ce1011c57116d261b
SHA5122fa336121a7857cd7ab40a83bc03080f98c6db3d59ed8c09333c14696e1befe54f3aabe98cfe921c058b03d53c54999769c11669dcd82ffb70d19fc90819c63d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3acc78f70b450b8837b50fe1cdea77b
SHA164c781f98e4c147195a22e56262a424cdbaf18c2
SHA25625a782706f8a76de94640d0997526b0237ec186decee8b96a7c910cde79ad304
SHA51221ccf0df072c26859ed1f6f6074782db4bb5d434c76907c847e3b28b85c25370a92319e58a181f9b94a3b1346be0fb4afa5b88b9c4c5a339e6abad2c51657b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb0b29da2da630bf274e54ed769267a3
SHA110b2c0eef0ce9a5052d7478396ca69b4c15e22a8
SHA2564f5797ae404be7ff29beade02d6481ccff196aea5659c4a785ef48e62660863c
SHA512f967ebcc76bb96ed9221408867b8c021efe8dc3664c463181090c07631445103d0a5b8e2c230d856818f37b0b32c235f934d9bcaa740a3eb4fa2f3fc0b572389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5764e668e2428747ba6969da9b50cf02d
SHA1ec1fa90e1a78792b6cf467c3e37981f77b22f3cc
SHA256c6d0abb6c3ba7d448d195702d844835bba851661c531123e8044dd1dfe657d6f
SHA5124d3061d38c5772bc578e0b6ea9bc1def181216c47c6f87803dac2804d763f736ae4a6939145d08f352ccdf51bf6b1014d1c676b1bb75776ef8f23c2a10722bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c00ad861d6c5d71e2496f88356fef110
SHA1b70facf0d3e82877d10b86f24f68ee37d37f2a91
SHA25688b408ead0b77821a1421a21e484edc7c3961234cf1eec1d7276aecab853fd2e
SHA512ceec12a632c03c851e51029788cc5973979372827bb6e33d84f584db616199a5af571e5bb4f71db6b6dd8bf520ec7d9223930e22425725a37d8d6788544cc9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55632b42ae906b504bd75a2bf1a9550b4
SHA10c61cdbf1c448a03186ab6edc8942a6bbefc0fd8
SHA256f6c9eb2bc735b93e34846e448cdb30e00d564987f5b0ee26dae21f05b5e27deb
SHA5121afe911091dc8f589e654bf5447e7d63ba21e2781556b54d3f90f1f385178ff042e78e2d2a0eaa31b0e4bcfa3be7c39efd6cfbaa18f36f8fad04338205c92c1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9065b07d2b4fd1a47770af1a37be033
SHA1c43243b41cdfc1570d29bc5927192baeffe41369
SHA256e75803dcec1a9e224bb0acbad1abd6e9bdce71b33fa5721063ae481e2d703205
SHA51225210fae3e4a160563c51806da63cdddbd42d8ede4d9920bb3adb0a7601b3df931e9908c6eddc609e6ac3181b69d62b2d9fd46a7ec99724fedb8f6b599093baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb4e606f13a0e56ae31800b795167f20
SHA1b365e45783b60a51dd37d5963045d6f957bb0d5b
SHA2560b7e52193bb3cc7fdf32a6e673e194c22c4dd636171a735ca110140f24b5df26
SHA51250e27eddbb94a7ec73c4d8b53d7c295d0c95618f398e057a111673e72b2ba73553dde8ebc159039fbc3a4c2e37abdd98650f8e9af6b3cd6a8b31e2fff303f156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c186513266c23930b959332198b1bc
SHA17c661b2dd72d9c835ad0f028f3b3dde30382fdeb
SHA25647bd249e55857fb65c39f97074ea20531acff137335b3c426912db82a54ac694
SHA512733cefc9227dda617b46b7b4e4cc0a282dc8e2f4d60a9f6005f6e0cbe286039379aa83d3a55ad8df77f161053e71fa597bb4f599ff37889a7e82dc2967febabc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b19cc51bf5683c9aaf4d831f8eb2f1e
SHA15d454ecb9140b3fe79c78f871418318c61ec9f66
SHA25608cdd891af84f522f89b006ca717b8f02be1795aa3940979c5af71807d8962dc
SHA512e327ec0ff7745d81ef2d5fb0335ad15e9b9f495ac07ce1fedb5a0a62993c98fa795aab20d878a10434875925d003ef9595de4d7bbdf52b8022d73971b8177126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bff21e54cb85ee4a0c8a1a4a43a867c
SHA17ef4506e4b816a121547fc383ee90c9b97bbe2cf
SHA256fd4ffbfdae0e9cc36fa232d5dd3c9c4dd223c30d5b09f16b65017f0958bd78f8
SHA512f2fd1f46992ce69ea64f166a6d1be0ddd6503d7f183b9e3c1bcc626b071c6d44a27db50f3e87b855e12c9beda81767e427cb3bdcd96297cbab68481e907a4c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd6c59cba53548aa4d0ebef4f0510291
SHA15f394a3b54740ec5eb6b54082600bc5d788d3877
SHA2560d64be769b98dfc4e1dcbbb042872417ea94da35ada868dc84b745a87fda14da
SHA512d2d4e2a12fb577d186b17231a684e0296234ba20185b2d444c29a91c2104d80e70fbd7ebe4256dae26b5ae41ae588011c46d05d49017df3e071d97cdfe768b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e4bd68219b6b621fa8051cd0ea40c66
SHA1223994a14ba4ab8c5b5ad543500ce002f361056f
SHA2561e2d83afd083874325732d37d3bfbec370a1020fcf52851ce4b2c32c3ce460cb
SHA512a5647b2731e4395529f64f5e6f6198532adc07be8f2b1f23d60a0da2ceced47afc35b454331bc664ee961d4555af042a64896fd0152cfedb3d63109ea0aa6961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cd6965b055a520a3402ff0b949a4dd4
SHA1dcfa94016183acf42643c914a560bb09a81dfb34
SHA256a3fd0e1582f2dcc9d604e754dde91bf51eb6f972592ce57abd1404bc8fb1ba1f
SHA512e5982cfb5f670c07dbaa818efbe9480ab307482be49e53bfd390ef8a0484c729305c9b705fdb8507e1ccabd698ab218558e0ade0403d327bccd2ef7863dc0316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb79878626f0e3fe7c08dcfa9212f95c
SHA1163065db3efd8e15f03568d15e7227d936b67198
SHA2562cf055cd0fb6e6e27a766c51d683062f2e75dec7b7b46e99a840ca75dcb44bb0
SHA512dd2b3edd7128f22548ee81ece19ae175937d3296f411cd8282ff85087346b285543387cb1f75f6602d909d610f02bee760c791083b29d02d932cb47d93da9d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525f27050ec61fcfff0baed573214929b
SHA1e25ddc164df88f09f3fd3525f833b8242614af40
SHA2566cc655ebf390a71e42545c60e054d5a16a62877cbe89729423ef6af74d7f72e6
SHA512d812cfe91b14c9f09ffed1657724b87ea62c31c2104f6d9682ec4deee1ef2e1ced131db753e44304cb60972292d942e2d2bb25d95265e2329dc4c76b940fd1c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ac48ae3daf87c75e593701d5fc9c801
SHA16ef99bdf907ae90d3f555e96f682178661f7a15a
SHA256605e68e54dc24e7f1d6221d99129280f2ba2aea42b40f324f1b98581e716c6af
SHA5128c5bd83d62dc925b44a480f6538cdff1fe0678c3ad1e4c31eab3c2874fb339013c1798c02686e969b739229b6694cc39b07068dc096c1ae9e04c39c7a6fc3a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545794b5332ea71f208ac36b54ebff63e
SHA1a3738a598f18f9edddacbb1579d0f2936de88846
SHA256d01be772e2eddbd858ce5b5b82fec179443e56466d26f2e55331e08845c83326
SHA51256a63efeffde8aae6b6ba0a28a9a62cd737b18c1787db6dd5f81a60024d28b35e8458c4f9ff88d4e84375a0b004dab1815ef66b26a1e640a841d9f2aa95d2eb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1be8467ed76fc9d6c04bd653c966c19
SHA1110a04c524f5ff2731a305a14c605b521fbddc96
SHA256963226388425a9de6053417516c143b01049a59b5c6603b5cd0af72f42324c9b
SHA512ce9124e717e9f1b9c9b62053267413a1ef4cb0b1da38abfa128b7ffe4a2d4e28e43ed00df1af3187ffeca261adb76d40d611487b69bc6bafa20a25253a0eb133
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b