Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 17:36
Static task
static1
Behavioral task
behavioral1
Sample
dae088af8f513606a7ee7a1ec0cdd976_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dae088af8f513606a7ee7a1ec0cdd976_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dae088af8f513606a7ee7a1ec0cdd976_JaffaCakes118.html
-
Size
82KB
-
MD5
dae088af8f513606a7ee7a1ec0cdd976
-
SHA1
3af38da791b633d6df2507f568ceedebd8183a51
-
SHA256
5cdb5fbfb8efb44a922edf5b64b903ae73be2edebcb669ddabbb86e477a8b967
-
SHA512
baea7683aa1acbcc3c87dd10085e59ffb9de8785a288c7e2076543737850beb4ee42e5d6a14e0dd420a66cf1f1b204c5b7988008f84721dd2f83d88beb9955e2
-
SSDEEP
1536:NBHiRSJaXDYMKXuRYMWdwePwLtk3sMpCeHVkqNOZceXc+D87:NBHiRSJaEMKuhWIrXtD87
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432238059" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61E031D1-7064-11EF-B557-C20DC8CB8E9E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000000c22a525ca6c442ca288eec0cbbc9e484da127da01dc2e00bfa68f44b672202000000000e80000000020000200000008c81826e8fb904766835124f40a03d911f6995ce84ef7266bb82c09380a780d22000000070e44ac4bbbcba372c116a84d6083aa43a567682c125810abb5683cfc1ffb2d440000000b129dd222f18639ad079afe216ab952d9006af823f963887271e788d11e2827b75a0238ac7019894d44d2da727562824b1be1d142dd2238fd1753f0dbfc3bf90 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00e804397104db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2804 2196 iexplore.exe 30 PID 2196 wrote to memory of 2804 2196 iexplore.exe 30 PID 2196 wrote to memory of 2804 2196 iexplore.exe 30 PID 2196 wrote to memory of 2804 2196 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dae088af8f513606a7ee7a1ec0cdd976_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca77916a693994baecdbd8d539ed0ac7
SHA15c18ea6867e2eae5a1cdf700dc8952eef2dddff5
SHA2568271d41600fcd7f4ea0ce78835d8c8879198ceef5423f29f002e804d3740fc4f
SHA5127547a91be27978f70bdd874167fa566bb651332c0ae5b65ce7dc0279e615c19ecdc944c5ab7a99575fad87b1fe10e39653d8e41b8dd07f63b8c54c60643c88e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502e6397094ccd0e5c55de2ff1a2eb0ae
SHA112c37c5065f8de0235387deb5d04e321cfaaf7d7
SHA2569dec727c4beb18a51bdc05099a304e0174d3a560f3fca425339b650163f9f377
SHA512e1f3b47b241ecad79cf240cd91bf1e9f44ce79900d4f79c5b2d4d6eb566ed94e992789ae0ef8f728e24cbd3f22678c0d3b5a4c71282b3fbf304084eb54337edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac32278cb805cb38c747ffdfe4dd19c2
SHA125ef16473ba6958684f68bf28aa57b90b43da779
SHA25640c19d2337ef5a4bf2fd816be4ed45d2ef6765e527c2fd587af8abb01272108a
SHA512064360d656121c40ba534ac61f85b4ab33bcac7747f6a2adda9b32b6e5d9b8a92efa2730c0ec69dcebb7b607ed10d58990c4bacfbbb1052c29b090eeaa7b2aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56493f92a433f10b0a2ee6c7193adacc3
SHA1f530107c05fe25732c20c227aef26c0670cb23e9
SHA2562c4b848ffc36d46c498053e3566970eb9f9d31fbc3cf23e68d049de0d164dee4
SHA5122f9efc27a8b510c41b67ce142d892ae4c87686f45a72cf6bb21c6cae4de2d63d70ef15ac6c9f74aa67b5e5eb28430cb44c2f335ab6f1180e08557b6eda2c3d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54abe649783f065d7bf79dcf411864499
SHA185292b015849c8a3cac413d71cc0d4c2086491a5
SHA256a1d305afd271701eefc433e1b929509ad988a2476069535ef67b67b168f3d9a5
SHA512875542dee51b50891feeea9ae4748b76e36c5d983f1f347637917a0b8c43c02083f9f9bc5e16f33165e0011bff2b76ce4d587b49055abb3ee0801f0594ae6847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db7b80526b7e93d4f7f9af173a8e7be1
SHA1c6e655b2eb0a72c0ac675eaf7570e47cf5c83494
SHA2568423713d19dd0c931e1fde51713d03964ec5143d25f937f859eb44ecdd6f397d
SHA512c79299ea3960e529d50e52c8fa5bda102b516f4b9bcf3f7cb18c5d5e0c4394d539ee0795474f0297834029df49d19caad4eb104c03492da741d6590e0810c295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b874092fabd66b112d8e8e56746108a
SHA1dfbbc188619596945bea0c0a9be61067e053fc15
SHA256cf2a400d82a6482c9b16b267ae0d9c406aa5435035d43c7f014e5157d3880dc1
SHA512ffac650a144b8387825619faaed8817dd7e7972959513197674797b640dc150358adffa139ea517a7e9391c724055b9b0b2b828f6952022a7bcec97dd6773fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebc0bbb4d5fa08234cdf39c17d19fb58
SHA17a15ec389cb11448d3e4848cd22e4ab0c39ab7d5
SHA2562ab5d2c5fd1c9de6e3f89c6ffd3767871c5436a0e8c6e8de136f98e4b212fbd6
SHA51247912f88b6cb6d6e9f6085e012d93d2eb1bbd3832df8337a3216c662431fac7e7301a4a2070ba9f5b1c90650de8e99546756a6ec50cce59002b26af9555ead45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4715981eb7faa736c68c8eec10371bc
SHA19f8355d8d18a4b16112f0ac037f34acda65642b8
SHA2565637bef260d23390f74eb5f79d698fea8db058c02e97a53c182b4f4aae26a70a
SHA512a72091233a5b17cd1eed4f508dfffd19ad0053619f9add6cdfd1a4a01d3ae4ad0db0a6e06ae78bf2ac9af431765aedb86514bace8eeaafd81d9408fc84b2d473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565e40d8a4701a07b9041363e4415ca54
SHA181598b180b8d43dad27436cb4dd8cea7b83a6d24
SHA2561bc476195f781c859a8bc2ca15928f2a53b23b1aba49ecf0df4404a2fde1a9a5
SHA5123456459c92ae29ac8c4d3e8af83d7debef8edd7e6115d3d23d4531c661d4d3a8d0b40d1f693cb0fa5dfbfd4ff7e108ba2d00538756adc2e7c598169e5324fe43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bfa5f96fab5c1c859076ef8cd445a6b
SHA17c965f3280321e0ce67774bc423e8b4f4ca0441f
SHA256267cec69eef33118a434c384d85b5502360530cb5d76a220d4e166c8a99b2060
SHA51274f6bb40863eea9f0c1cb7ea9beade752774e0fb279129ce682b5b05e045fc43ed58e6561099f247bee47410879419f06dadbc17189e4442980c62500d096107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5386632b9d0e0d25eafabc3f79d671e20
SHA189f4ea881943ad5f1f70d23baea26088ce01ea78
SHA256ef40966ede38276add9e94616bd900dc5b6524d26eb7c1c72a22cd412e7eb934
SHA51245d33cadb35d3e0fcec9afde3d5fe05f5c2cc9d495fdc9b083a2fd7e106e19ecf307d2bf1771dd00ba6493dd49c9d5b5534aa79c6afdf91e3e6ee8e08ec77547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5812ea52bdb11d84085cae98bbd2cdc9b
SHA1bea0cbedc3ee1c2d0999e5c691041d70ff28470c
SHA2564e3da6b5c0f753b4e4cd95a14e47e9112cb92599029a3e6dd6a3562ae68792e7
SHA512c13595a63acdc9d990ff2e38983f955bd84ba1ddfd7f4d42833f6c1dfe34a4f820afdfb8eb0ce053c80e23b9e0461ab01e445b9b338c9bc7cbcaddf2f1d8a227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5ed1a1c16de926eb15de09535ef9ab2
SHA1a3911a62a786a54d6723143d212939cb6e515962
SHA256c22819c6b58a879e760cbd998c23246431e6d0be184fbd6b04e90327609f17c3
SHA51250097f5746341d440aaceb09660bb83a1f247589bbd7c7f50095f8cf83e8202d10126b8b767c36d63521b6af0457d901411cec4c05c50b20594681fe62b9b74f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac6c890471dc909da76157a134c968a8
SHA16a56149ac6f2559ec809a60a55f01a186445e77c
SHA256ada2800b215f80eba23dc37e9d2ce3c6120b00a61a1a3d5ca90833f4511ad9df
SHA5126123118db5dbc076a9e30287ec882a8edc0426dcb05e138ba41454e534107af2cf319105d3a348ad9d5292b99f6b6e9792dbf59cde1a8d0a57afd45f1d87e753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5927ea2c067b9d1b34c0a36e5f0dce4c4
SHA1b06b561ba96725566fe2940163c1b1648e3a952c
SHA256bf4eea323b36847818c0a68fe673bb188a761fd2460d7936706dc768a83f2913
SHA512f903638cedf5c8bd68ed4b9e8e64f44e6a083407f1e16c9ac4f3135af6e78692c72e337d1875fd05d54514049af20fbde776cb3e153cde0a6bc4da5f5b0439ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2efed955a789766ad8f5afa87325c4
SHA136320113ee57ba9206df3afa23472af1f41566ab
SHA25634b52f352cd9caf62543942006b6f75f54c9f3660fa22ac23499e14f3f90e05d
SHA512cb3694db944e83550c3eafaffc43539c21c4494f853e6d24e6644004434c4ed683d379e05554d1ebc57894b5b6890317a9ba8eb592dd04f6fea5468a6a0d701d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdb29ef85da5f0d224e09de7010134ce
SHA1c01a2aa6490c004a2c83c5d813b34abb2dedbedd
SHA256e4d1b0ba5304b636442ec0dd1777f3bb1fad669a753da7f556bee66e7efd4146
SHA512e83a8b97a94d525673f8eda0c21a4aa932142a5a3024aba46f6b662922b08eec60a58375623a955ef50fc9a30d2fc66f1901ff9c2aae69060c853cafe36b6205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549546994836d85cf888d3bfa1cc737d7
SHA191f71381fe23e79abcff74aaee4629276029a489
SHA256f2eae08a1d1877f7b55510968eedbf999cadf88abbf51c4a69b40e5a7a6b17c9
SHA512b80c6c20813688a8431182418a9be4bd5a0d1ba12ae88d05b491d25c77889ae3556fefa8b5c037fd5ccef6deb5b7d029e07be2ea051941ce479bfddca2b3e09a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522ad3eefd288266c3412ab737af0f1bd
SHA1e11315231d3b7b10a0ba83099ae9f6ca4ac6d80a
SHA25611a9d58ec6f43181aa0e00539e6dcba46716054353ce8d2a5a225623729a7d30
SHA5127da098371301558559f53e8c146e2364ad9b7babe85cd7c5ab2b03137d63b7b12dde030f2ba839dff839032ef387eb5d46440d480873414dff9d7799927bc132
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b