Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:27
Static task
static1
Behavioral task
behavioral1
Sample
eac22d35ff59c30dc050ea27ccb931cc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac22d35ff59c30dc050ea27ccb931cc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac22d35ff59c30dc050ea27ccb931cc_JaffaCakes118.html
-
Size
57KB
-
MD5
eac22d35ff59c30dc050ea27ccb931cc
-
SHA1
d57156cf9f6e8f63159e3ff9189fd3f8ab0f5fd6
-
SHA256
445273a46a628e3e41d2c6ba9c71d6824619a3b6d33b66c189a938f62688a9a2
-
SHA512
2098959284f7d466e628835c46f3dafd8aec62b19f1a639b841acc4ebcbbb794861e9d370ac9e1c0104dec8d5d2662691ca4322aa0fca195ef73bc578994d31b
-
SSDEEP
1536:gQZBCCOd10IxCXZXlfqfufxfSfSf5fBftfUfbf3ftfXfZfOfIf9fJfbfdf7fdfSl:gk2D0IxaSWZaKhJFMDvV/RWgFBz1D1ql
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c051dd085d0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000036b17dea6116adee23ee106ef2318545948c07e8746cdb9e11df1fecf7da9a1b000000000e8000000002000020000000e3a20c168c8a0773b9c6f0802bb7dc7457ae313068ba8d90fa117a44b8f08aa1200000004460c95cfd16a180f8e5788dd6e4a0fc3c422ab667cbfdf1465da93e5bfb49b740000000cbbca70ba57a1cd8d005386fa8618bf1ea23a18727b17329e7621dfa872f5a0600690a7bec304ec7fb45afbbb877592f56a42cdbe6a40d8c59917447e671e55a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889097" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{335747D1-7650-11EF-B8EC-E699F793024F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2652 2216 iexplore.exe 30 PID 2216 wrote to memory of 2652 2216 iexplore.exe 30 PID 2216 wrote to memory of 2652 2216 iexplore.exe 30 PID 2216 wrote to memory of 2652 2216 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac22d35ff59c30dc050ea27ccb931cc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58031eb52d80086f0981bf2cdee06daa6
SHA1fc19ba5e9945705f597a95f58407f9812c44f1a1
SHA256a036b1cc7ef3bd047913eb9cd2a0276b93084b8f41ff691366b52d662fd27c9e
SHA512ad69a1b007d150454fd5ad1a22e3ffce8363bcca0d11311c03aef34cd159ee9fb74292371f05350f6e3cd42cb81251d900982eaba97859b1fc49ecdaa05cf727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a57d91843cbe204f2bda7297366aa793
SHA1c2e72121e8dea985e914c4e4b8b3661ace5d9235
SHA25635dde82f74be0f133eb12cc4ae6f51694c305c6cace9759c32718571e1bbcaa4
SHA5124f700533d6ac3bd6daec830bf18ab3cd16be358f603b5c4769083558f10c5e7ac1c9cddf5c551699554894c415b9258244e5f738d8730d62aa2af678b3dcbd14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ef206e59719ba96faab3361703004bf
SHA1b8b1b3a99bad2a1b3adb31c0bde9150278f259f5
SHA256b1f40c70cc740e7dcf81cf8c9a9041ab0dd008fdb2d9b50cb36c7c00b70dd214
SHA512b6d0bb690202b9411beb13e3ad3bdca9c49f442971226482e764f82bc9ce24e2c3fc8283606d511ea5b8acf3bf50561a5e699b52d2663fb60d8c95e2aefce5b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9dd41ca0aab2c566a61cbed232e8d0f
SHA150f880915b1fda0f8d3394278a1604d59b2b55c1
SHA2565a83b432b4332dcf9f8ccccc78cda59ea67c2b992b1c9907144aabb029586ad6
SHA5120a6f9bdaef9ec11b0c2fc14864c1e155ee043ec81e30838ee690c71b5a11668942b7fef50dcaa922456fbb884fda1b9e096c7a4ec0acf9723018eb0c0ef06f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f63ec86fe539d6adb9b8fe2f773b6069
SHA10bec8da0dc0aabd44a4eebcdb175be9a81814339
SHA2560b2ccbc169cb8c78be63a77bbe3e7b8a107b190c226887ff3b255eb3f58305b9
SHA512e1e447c065e0dc088ebe30cde4dcdd3e500c570c7d8edab69f3bfe0ca1fe335c0b55e0034511eea0e5022687e31e96454a03998d1b03cca06482a061f17aede5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0edcf36197e0f5b5bf31305df4f66ff
SHA193d0362ba94b544321f237015bfd88ecc46a43f5
SHA256323971c84ae925ab30c4be34a1f41d3f26d613c3f5282930b91ce00d4f3fe916
SHA5124715eb0749f0d8d66545872d6b494a524f0bff97f72fde4158cf293d497412b7a7646b8ae91dcae22d89644f4afa5ab30c2fb5aa5ccec9046bf02c03395eb11a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51faffe143f0e59a91831f8e5c28d541d
SHA1e50d8376eb56a8640fd501430da479c91fed9483
SHA2563f21d5eca2e03b477ec7ccbdcda5c14f24ee816619eb0ff8374baa2d950b9fcb
SHA512896236d1682b12eaf85fcad42f7105eea111521c27c2953c37551d334fbde058cfdddaa5ac22f22d3fc6db315032d37f59bff71735bfdcbbe47ed7ec7620dd23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0fef4087ce201e48a82ae573636f503
SHA1aebb033504605317284eac6beab73131167a07b4
SHA2567b65a7c3598039437240b223225250cce22604b946d6f624916f1f95ec094ada
SHA512d0bd248ba6105f0c78d188345aea34586be13dce24ed080d196fe7e42d16a38b6646c11331f027be5b0173c8cdab4460198d7857215877f04f328abce4ce3401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d36d9ebad7e8443001baebf9f19222e8
SHA19499376f9a9de558fa42d7c2899c5bcf2c17265e
SHA2562d73b9192a8c39bf17165591a6220d06314a194d1006a8e9ac476024d586edbe
SHA5121970c909c773c70956aa06c5cfd69f4ee72b0b5ca53f1bd0cf39b850ed16fb3e3abd4cdad2ee352932a04f01bc20da0e8694ad8f92ed17cede967706774d9dd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec42692922397847b707936da2ee0b69
SHA1d52785529d329128112720371b2a3f429418b2eb
SHA256fca078f82ad27ce144e84163efd8da92b458cf5bc9f3a34ba24a6265a31aaa57
SHA512f92e27434f93fff15b3b97c58f2d60db36c3a1757e57b8a1c004a999626329a9f98a2639b213a804e593dbdc39140f565b73e0de2f1dc31b9503864ba7f476ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e5749ab7b1dc27cd34251272b0d60bd
SHA18ae0910b30d622da3a755ed64ca107e5a97db67f
SHA256f1791bd8e7488bede4dfadd31b912181ac4a3a2a32258a4bd7376c6a301fd306
SHA512ae320658b0bf87512d9ee5e705583eae647097ea34157ddcccf862350da53314fa3aab72e58b4dc4eacf8d40f9d08ebf6fdf1c4078a822e7de35ec83517ccbfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f8ce4abbe92ea1e87fefaaedff1ce4d
SHA13d3aa94883d477bc91b70c0fe69509bccdae4480
SHA256398cf13bf3b5dd9c16a3598ef8e347572d23f81ebcedb0dbf08b12a8a73c1708
SHA5122160f0d6a6db9225c0cae78a11cbb956ab0d3b5d3de093a11c1c8f6458ac4060d7c9126014f590c0ed49afbe58045a076bd655f0b0a1813b9d4853ddd74afe42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52de0c6d3fa24895b03ac77c509a82df4
SHA140f113d2c0a69236ff56e131cfc0787c98b43752
SHA2561bfe0be09857a59732f4502000345899200cf8b07a83afdae310cf6bb1f92140
SHA512eb0801f8043908fa98a30d247ca3f3e3023cbfc98a7109df236bd8f7e28f8338c5b858feedd13d00181214cb45a473160845f672dce5868e7280292d6468744d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c16adb9a5638a7f098eac6adfc35709
SHA176a5de24d944eec1452396d387bf4504df0c974b
SHA256c467431c388169bee1a2db2e31899a9f5e6cd5343571742de06af634fdc20739
SHA5123e0c13c0206f921b9da485ec5740aea5d439895e8ed355575454dfce8480ed550b92cc6683e0c56ae197c7e23ce05444eb33b2fd65a00dc23603a594d13d57d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54101159306e5320bcd9a1527cffe8ee8
SHA17a1671ffbf1919667e54c5135eaa187bc0cbac83
SHA256cdd91be4e9a83d734886ad0f3123c356bd622345a871d5f643e577d56dd7b999
SHA5126afeacfdccbdfdc11f982cda5811b89dc781935b61e8f914e83f2faf81b8f5818cf7c0558cb2974df64a550d8f3424ed423a19359281380a2cab92d155e9cff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a7ae81b1285df59a1622faff210ffc0
SHA1ac188e87488fccd60453f0e42fa6ae893b91421b
SHA256d0653123bf84e2e1e7806a346b7fb6f8a8799ea469a48935a7051d29cf4d99cc
SHA512f5699634b0944eb62e994466fa0e7b7ebb671e94c7787b4ceeb393760ebaf0e6c8acfdabfa87923887c6ce047afa63ea0c972a7050b59f02a805e0892af6dfdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eebe4e59a85d9c4b9e6939ca37085dfe
SHA1e277ba6bba753841229b2e28e2a82a17d38c3fe1
SHA256663fff12f59480715219e2f41fcf1769efccf924d466b1684149e5bf8df07239
SHA512b5cace4d4b97578dd4be69f608d123fe4774a5d4024d19388877033cf4e21b1182629e9e9a6e62695166705d9c5a13ac2c3475d3833d0ac3a747047ba53a5fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5182633309711afd9d7d87a111749b4bb
SHA1cd108d198736915cbe37b6ce8024ba10bff1592b
SHA2568743babfe4c836729210f44bca3d3747973f2112a3596fbbae41e8e144d30879
SHA5128d1d1f99dbc0ccc5fcece09af39e0f57b31fe01e59343e7ede7a69ea74ebd32504e8d39e784e3977e619a617335570cac481267221e5ec91d25de2760811e57c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4307dcc307f6ab9244e2cb3724a6c41
SHA1c22b2752c7158464d8e0079685144d44ae26f276
SHA2563bff4907277213f92fd47f449bdc7ad3a8a565a60c02f4bd25caa557bace1ad3
SHA512f1a16a43721cbd1c93cc7de44f607e1709841a4cd2f567e4ca04686d95b09d2573aff3db5e6c18554500bbea238cd397057147955adb764f1c0712bfbd44d9cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c8363e220ed38c512d0de598e81785
SHA190ed1716015af030d5b217da1aad0957e5af520b
SHA256e72c0c5cbdd57c3e41af0442134c384abd728cb7524d7ff1a8466de1010953b6
SHA5121f3f62ae0f946605fa4a4eacfccd84c0adba2ec3dddb52f87f573b8cdc5ad00420c6f3fb13df78acc922805fff5df8e27a1eda958b5c742fd43e0a3b327c5835
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b