Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 16:43
Static task
static1
Behavioral task
behavioral1
Sample
cffddf5209c8eae5f776e9cf7a957c0c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cffddf5209c8eae5f776e9cf7a957c0c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cffddf5209c8eae5f776e9cf7a957c0c_JaffaCakes118.html
-
Size
53KB
-
MD5
cffddf5209c8eae5f776e9cf7a957c0c
-
SHA1
557c8586acb99602b102eb79f0a0fb7f615d9ddb
-
SHA256
d076e5f6b6a0e4ac2ecae276298e9df11102769f55b1498e636cf00180e0eac6
-
SHA512
59c1e7e4f2600fa19d43f3b59ff83657934156a7124d7f225ae73b49b32946f9510a566d6ddd612a65e4d2a9e661039dfb21b9b480a2ea98c96a9b91eb5e5a30
-
SSDEEP
1536:CkgUiIakTqGivi+PyUnrunlYC63Nj+q5VyvR0w2AzTICbbBov/t9M/dNwIUTDmD7:CkgUiIakTqGivi+PyUnrunlYC63Nj+qW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c0c50d7c00db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431802905" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32515F51-6C6F-11EF-ACDF-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000a01069419fba4b4da197f5782abc167c979b75947dada4ddc95494e772270c10000000000e800000000200002000000072e062595159ae3dc7d4deae10a6e0ccc700e78d2283cf6b643d9340837b9a56200000009d3b5d253d4977d0c147434b2cb792e500f49fb475b7a395cdceadd4b801942940000000c18c6e5685b886823db416574cb2afac99f691182fe8d684522f85e0777b108f5ee87fdfb983722cd9be6721b38d18f1a6be2f2096d8eb89091219184508f998 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2636 iexplore.exe 2636 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2760 2636 iexplore.exe 30 PID 2636 wrote to memory of 2760 2636 iexplore.exe 30 PID 2636 wrote to memory of 2760 2636 iexplore.exe 30 PID 2636 wrote to memory of 2760 2636 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cffddf5209c8eae5f776e9cf7a957c0c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505d6b9b92ea941dbae619a1fe8136873
SHA105e9a5bf6c0fc46bf6d5946eecb234c170924c48
SHA25636077a4b3fcc6befd5b436df822efb00479d35dc0a8375f5dbc5c64e76b8f626
SHA512347eadf6a04b64780f7674542c6003aab3389e7eee063137229eb7e9312d32da36076f57da73fb19e9c89ff5d6a255aeb8cce713a26c116e137d416b078ef3e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502509ef8a89079f100b2d96e0dd24c1b
SHA107672f6cb1944f9df9ce84ed46d726aeeb1c4e29
SHA2563a23201ea5273bdb56d0dc5e41a46a284b0eb6dac575a3b7bb0c856588f37eb9
SHA512a1fd5e9d2fd6530ddc01510d595412f82f3e1dccf525b339d727df6b58da4aee5c2a74ee229a713937862d7af8081f12264cafd56b8fe47ecfb18eed7bdd2e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db71f50759adc2cb19d6ecc7cedf2932
SHA129746bf3de809a7e5b736fe68f2337510a1e2f80
SHA2569b2f2dea5dbe633f5aa72cc52db0aa0b36e391ed4cd4dba44a4c53bcf615bf90
SHA5126a636ddc9ab4ec7d25c2a4dddd5ea984c67a8e49ee7620046b4191e98467b983d4f304039c0eda3bff63f12d20f1cade06902539d5caf1e6cc825ae1b46e4f67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537358b73de042fc567e4bad346269bcb
SHA195c70cdd92f0f5221fcacc3bf62831a64744a811
SHA256622a69920b37bb9d88defc146333f9424a0d1c545463c7d8491230e4d1b8569c
SHA512650b2e4f1b64967dd8d9939ebbc73705f218f1a6b270aab42178681291795ae4fe6fb674ba6640d5fee4ca4e18c8c9d654a3299daf04dcd0348d1d6c7fed1e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ed032f863f03b8336d8366c2a44dedf
SHA10a6f5337bc4e458f7a7ff98e9d437db6f1602bee
SHA25698c3defcab57cc88865e7478f8f188c7f7e86aa75fa42ee8c4b8fbff6f0aead2
SHA512f2e852cdafeed660afbf2f6401130a590d5ef1a3164f7aa001ad059236421c60fc8d09a9751c7a352d75ba93508439e17d7335b0ff65c4b687ca55bdf1a24ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b40042c1b99ec802ca1baa1550d4da21
SHA17ba064a5084fff47e0ee95080180845bba78c82d
SHA2569b8a2edabee073674d980bc9e2a178416a4c48506a3702486e9da75e9b0888cf
SHA512121ab27b822523f977946b62813170836f12bd898dca56ac9c86cc78f0c41584c3faf5c28637daaddad995c4f4aff234fbd1e6978ff9631625a51f2c24f1658c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5659deebccd04f318c085bcf2bc7f574c
SHA1942a67554ab3547e2c86ce579e99da866277c177
SHA2567f0469ffe8878f127ef1de42e80ac70b9f929c71c9d1269348f1ec00fa061d92
SHA51247ec730a51e1d1e013244f74c0c91025f7fce25e7436b06e27d8b4e1fddffe4070c5db22994d65423486f8c0c7a958736d7a0fe86bdaf704c4d72a278b281d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59af6dc82f1d5fea7c8e1a784f69c2c00
SHA1f8f0725a7a7c3421bed4256e3734b2fbca36e49f
SHA2562ede818088683072b34a7654a3160cf1f4cf3a33f17694f809ce84736f5cb70d
SHA512d96fed7eabe064b4fdeb3e8c61747f8922231fe08e13a7027d6b701f814f59670f08fb5f0c5bc92c70a8d45df698c929880fac44c466fdd8422487d0fe24102a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5509672e344a7f9b5dc3c3874661e6f1e
SHA1509a409693e3d24a57596d17f263297887138399
SHA256c511776ffe7d510a3db2a2c6fba4f7a929e05663441de06feba382000b41031e
SHA512eda17cb44732dd5a28f93eba7aaa11cada176005211347e0b89e65aa9ba8d89bb4a68c525f59e6b1dad152b6ab4094fdd37c57881f74316b037c162a5afbab48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e0b04c629d1ecec16e2d5943cf82ad1
SHA1727ec48cd07f3e76c680658a03e0f5eb97aed52e
SHA2569145a04b9dec7ad37725efd9eb7511eb285c1f03586f96e345d7cb545281485e
SHA512d9c9745d9e0c96510086bc0990b901a33d5d455394e45cc7ea077512e9411fc99eb92b59bf7065e606af02d708c760c4da1466120e284fb85ec32194ed46c032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc62eab04850e4f48d6c26bca2ace977
SHA1d7a649447944c25b1c469f2a3728209df901d9a2
SHA256c8e779fc8b0ec5ae209f766e266c43948667154850872b073b61994437f47965
SHA512bae5406a6550ab1fa0dcc32d4967a3bbad51970692e680f84561a2d5b3f95c0b4b69de7099380ca783efe53512e2e4de148ee600b11303492224c76f5829ee16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582041811d25bb73429d829aa19625e84
SHA1e4e4cac817b0dd7dd1e80cb29d2bb7a3844286da
SHA2568e1bf9f79089daf28f20b28e38201870c0ad889a95250968f82256713ba34227
SHA512f56cfcf0293c4cf09e23b9c9a77d518ec8773c3a93ee7852d5985ebf1051aee0bcd5877738e97c31b0e794baa0650d60e1895e4fc3bf616043c55bd9c402075d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c1a9d7904686448393c73e8ff2d913e
SHA13d740cc8df565336b4618c5a9f0ba5349c38177a
SHA2560da083ef1b4f1f48da4c6414fb1f252ab1f323ebe63c496419ef6ffd6b324e7d
SHA5124cff4d9fcaba33c14a79aa88d78be9fa16fc8b99845ba2b10019b077e38db2b00c0b42875eff8c59b66b31fb234b9ff1fd8c3539fe3b9b718790290ec0a33643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d6b10acdc889169df1c7f85b8ff6f4f
SHA16d6958f2aae184dcfd53a4d3ae95ebdc4bfb975a
SHA25652a13553371026423223fb41c7e0cac1de9ad6c36a40dd51cbf82162bb4bca85
SHA512399ba5d26f2b476851d2efae56f0dfb80dcff91ed16317ae3063a421ef84fa2f69321d4b655cefa985175224da3bc15d015519b65033718d14c28f05d77a097a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d3822b729530790a1f29aac2f4e88a1
SHA1cb5c247ac55970774e9a4846e50ff537cf94f976
SHA256633f1879a44bd2947f663ccf27183651cc439aa5613f79f3f8c744143f50f967
SHA5124bf1c23bf6225f66b55f9ce06de738c82c721e7c4f92b15ab5f6c356a9350e533d866eca42d479e59b35e26ac4be155f498527ab98c187a95c37d883761e5c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cfa53a9a97385bb2dced689dfe72389
SHA17df131252e5dedbc303a5dc7fe3bbbcd75ab40f0
SHA25633e21726d02fedbd0ead2c1105652d2e227e6b19534a45c1e3c91baaafaae693
SHA512fa295dfdba9a55afbdec6304be1919f910a10b8e96b93ec563a86fb48bfb98fe87c26051f62becf11b5b63353b201df41ae2ceb4e3bcea2b8cee1c41d7ff421f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4786caf5a9262424e4b80ceacda8021
SHA1c8287f46454f89dd8e61862191843c8451e77200
SHA25639f9ed4ae81011d9723be3c466c4eec204aa3f8239c168a2f1262cbbd17000e8
SHA5128a3841f08d768bb5c1530e4ae553c58fbe1fe1b98ed4dc09073be9d823fc307d3fdc364cd0e27cff4748263361ef69f777cf42e9e3c1e186ce1db2ae33f00e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c4802c353bce0a22af74e24bdeb0dbc
SHA1093eee368623df7d2934ddd3e5eea8569157fcb3
SHA256c0d1ddfb019cc55f87da799a2385a12254b4d2edcd17be439f3250451bc1134b
SHA5127cf08d949b07edcdbfa61dd9ad81ef80557b0dc1a8bf31e79fe8c8d3041e9c6bf4682fd7aa1a93395ee5cd096089a823ce2774014b1c9606f56eac8c69732c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f519453b5818033a07daa6db3fe5e13
SHA15c2956b11ed6b1c601a49007d6fb2c9004401690
SHA2561bd984f3aad5ec182d878e58ff916c7a0ae3afd65044901eee5a1e77a0496192
SHA512d21718a2bef50e779ed5bd3120e6444f392325762d8dc376456a397f5f8826aa58f64ae6e01c06af5ef91326ed566a300bbef17ea0ecd40b560cfb450cc81f84
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b