Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 14:37
Behavioral task
behavioral1
Sample
c82f58d3b540f9c79e195901328732d6_JaffaCakes118.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
c82f58d3b540f9c79e195901328732d6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
c82f58d3b540f9c79e195901328732d6_JaffaCakes118.html
-
Size
53KB
-
MD5
c82f58d3b540f9c79e195901328732d6
-
SHA1
aced5eb3d1550541300aeab20e5197581d4df7a0
-
SHA256
6fba8a3d1b91519b6a8b97b3ef7e9542cd3b30ab20bc0e56c679a06ba3eb0ccc
-
SHA512
08c9e7ccf283b525d6fdc21d1530f57f31d252b9591da8ec561fad00aff0ebd919fcef895634cb4ea0f2c8e9b29d7ba7e1af61fb0f5ec703c000ae91cde60eed
-
SSDEEP
768:dRS+jdlKiZ5dYhXWE+upjWm0mKcNrxRQnhbQM4qkkUnUa2Tb0bQpBfbHuvBA2fw/:3bI9vZRQ0HnT8pBfKvBA+PA3wtxe3
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439571327" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{701ACE01-B316-11EF-BD4E-7E1302FB0A39} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf000000000200000000001066000000010000200000004e969398ef386f7db048bcdde7a1ac980220384a9982c5b1ffd3b85207f2c69b000000000e8000000002000020000000179ea9c0916b41b36eec2514760551b1b26fd0879764b07fff03d11f4f9e7576200000001e17308c970a75cfa4c66f39bf9812d12a715036294fd1ecb9640762d20593da400000004af04474292d851611486d985331abe46561b38312eee47084b6e5950bd7fad81363bb82fea25f65834fbd6d5a06785952bec200cb335a59366d7bb2c91b02fa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0b992462347db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 308 iexplore.exe 308 iexplore.exe 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 308 wrote to memory of 1424 308 iexplore.exe 30 PID 308 wrote to memory of 1424 308 iexplore.exe 30 PID 308 wrote to memory of 1424 308 iexplore.exe 30 PID 308 wrote to memory of 1424 308 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c82f58d3b540f9c79e195901328732d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:308 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD582cf23f190441e4916f994b028ca7340
SHA1009bb96d73039e164eb4792cd7f58a414c8bed44
SHA25693c20ef74f37272e112be49107ed2c82302561d3b6ce866c58b9d123a09e026a
SHA512a94c3b6c62554d13aedc9bfe71d314650d4e843b6b6df507b552cf2a2230e6dd1e50f07a06bf700b2bf1e43de0184d8afa46191099d6b63db47197376b40e134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5872a1d8e14dac64625e7e61099521a2a
SHA1fcb97e74294d34bcce55e4a41e80a91b292892ec
SHA2565cd34585e9fbe1fb440a08694c1b3217136e1a965ea383e1f3b293d6f5ff377b
SHA5125635550371e2dbbe9ff0d424430f7ea85c513a726d29494e9ea3c2f03c6adc52785d1071a13daefc3a422d7af58b14955b2fe49cae3779301827ecf5fb47e4c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572766cc0ceaac667eb4e9696c662c3ae
SHA1af36647516423c931d1a2d48c6cf4f5932a991ac
SHA256ee85a69641684867396fd0cb38da8cf57068835085399d94b8de4579c502b6e4
SHA512d0fe51c26674b0cd91872cef16bb62b6faf15d1a40f9033f4a416d4349679deb01d6ddddcf25e0d687815b4b7087b71aaf6e8c44ff7dec4c380d22b5b60ede3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff62fe02a5fdc3c84da5cd8cd765fa94
SHA1bf7b609984c45228ac66ef831b1220aa98584e72
SHA2568d9e1a6bee5417209550eef9f2712fef4d57c906389dc3396c3ea277e14614c0
SHA5126b2837d500cba6c7bb4d6c52aaf33f6e9d4f7cbd44e32ef8f37ea7d7b1947e566316db121d2e12d5e5cd3508887ce0e53b703546457dfbf44c6c3c5e159dd2ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c75e662667900b2c05d291d4f6e6e9d8
SHA19681a3b918e98da3607332f7d7ced26bc40fe5ad
SHA2561a46b435a94e3e55d60a9fa0fdf4dd930169d2c1533b7f2ab42b0466e1ba540b
SHA5126717013da441827a8baa6d628073f8a9442eec934fc05e5cda5dce2b1ce49ad1cea1742075e843ca1df22fe18bdbfb43acec91b84e501e42f23935390e3b46cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ef61a2051f480fcffa8dcc301c9d35f
SHA1daa4e40387fe34b31ecf1bc1139d71609e5146aa
SHA2561c97667e61aa13b177ca481f2aaf3c5a4942ece5e40dc626699a14ed4d5fef55
SHA5124f3dde5cb52367bbed65993002de9db0efcdb9c59b9fbc9ac993392ffe81e06864f7655a2e84e5ee9a10e5d52be208604a5ac9c9ccb48908cd445d8cd8fa8734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5969fbfdc0040c7ec8b394cfa2b3c4c97
SHA126fe16e67a34451773ebdd88fff3b0ad5255ba94
SHA256cee419ce53e2cef33571fa79e02ff63bba9cfc7ba7dba48ee62686e7d1e40ca9
SHA512600e6732ac9f5c9ef70e62452f9ebc0aee6e5af14f702c58c77f34df53e28ada0b02d1f759baf73153448f30a01290d2aa1fba0464fc9d2f1b101d738dbe0101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4bd90bc87621718bc9dccbc951dc413
SHA1c4573fc0fe0e0e8d99bd2e9001630aec6083e96f
SHA2565d61cbade62c7a960540afbfc241b291d1900854388c8c1f7ec24815a053df99
SHA51267cfcab42dc5a26641fa296957375abc481c13bff5b97d6ac9df95262a71f30f405efc7d4966b5a74a52f1b6c2ac0950536feeaf4a9276c982d6c9d5101ffdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe16292f54fe9da42970af64d9c2e9ff
SHA1180c7a8b6becf3acd75270bd9704a75a4482d1b2
SHA256ab08f256def48558cc3945c44780bf0962572bb0a366876f7d783ab4e11f191c
SHA512d424b133da4ff1fe4bdf69af720903b3c1e040589ec036d790925c47f7f9b78243e07d2b25d90d9b56699d29305d690d6d1f7ff43ddad941e973ec901ce36c6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561b6e9792877979e7fc40033f8e6e27d
SHA19b34ccecbf474aad99257efd3ce85b3a449f3fad
SHA2561124f14b720ef544b845242466fbadee720522677b29c820c03c981ee38b4079
SHA5126f8ab8368496c8e0a598592dff3d9708f4c6df89950e09d7ed5b8ee2148ff1c9aabf6a761ae6ce5e906b3fa284eb3973c7e5a63a7add1bd5a489a1b4d229017d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd2794e036eaf957d30980359cef1e0f
SHA12e71559d29528614c3faa18f6f5d700a5415362c
SHA2561d4356a7cff01f5aa32887311331bc978efd80c4f7cea2a082b1fe4486853bfa
SHA5121f70e8cc0924e6dddb65501dc50b7bb4a193e46e49571efd44f672672a8c5d9f4981068484d61d537a16cbadfb267a45177f59ea1f46d6281b9e9fd60563a087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5741dcbce9d57b7e680b23cfa5e12e712
SHA1eee650b3324ccc704f16ca5d26d6c7653b2f0e5e
SHA256298b60ee78921d536098c58e475355ef117db40dc7f3afc3ce6e0de28e167aa2
SHA5120f016aaa224e36c12a4fb065f33d5a554fef065241f7ba2dff6296d20d1d72a799ddf6313b61817440700353ff95fa82479a33eb9335b710eb97c33b5ee44e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e7f33da77604ac299a83e7e2284fd3
SHA197dd474cae5c200ca1b2ed9dd7a6e2118b07e98b
SHA2560de262138e45f4793ed130e79c49aecdd379db9e2be5a24c7ecdc475e6525651
SHA512f29149557d7ecb76ffebc4fafb01d9b0672447fba9c538393271c39aa1760ead98ced541389ccee975f7f921f2f4d2c8e6ed2bd7856ecc173b8056586b6aed3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5687f3561bbaa567a76c134db676f65c5
SHA14528b66ba5937bad740cb34b6bc527c79d953e0c
SHA25653acee6b6ffdfa7bf5ddcfa955617f250bfd47f26a639cfdb048fb1068e301b8
SHA512e7d77832ad594bb04236e9303bde129a761dd97aaa731891605c7d00e101073a82c198695c53d4a3afb35fdcacba1c756b281c92d4ad5cae13f2105571945e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b56494110fce32457df8cd8259f70586
SHA160d46a29487f30692564159ad94764ea12808bf1
SHA256bd3b3f0c62c640bf220fcdf1402313bee7f0de7b48099ada7e81f600ab3a5133
SHA5127b5191e1dc1971106c9d5318762a4fe245baf533d28aafe551207884457bf1b898904a06d2c4eefc92f7fef3613c4dd62899908a696f0a563622fe654bfd9216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c2434c8e64d73e7520977ee6aac63f6
SHA13d69243381940b6477c96866cd227752a443bcdf
SHA256900727f4535699fa98e9f2fbf78371185b3af230583ecb05582644729a2da51c
SHA51264f7a7f8d4b704d7f36d05ea5d954535fe1ee6e278f2f2573fa8a8de2ae1b761eec8aa2f5c881c147f22b61265caaee55ab57be9ec8b968f84eb2c648d1470f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5bd197e997d3391418257c40270cfcef5
SHA130119897e5c7d1628404c99aa37b89534fdaa907
SHA2568ab76dfe70f4e169fd69aacf215c58daeb0632873f2247e8c5e5ee6aa71c5e10
SHA5120ca79b429580f1ea20424a677de59c77fcd074bf78bf95edfa90463a1cd702e2b30f67581a065d18e288eaf8c2197a4c2c135f41b619795ea8620e7ba89b2e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53d128978570f26c0a209616619358a7f
SHA1bd36a4286c6f20b291d1ae97a8516881f34e7f25
SHA2562a722455bfdc9aef4911cd527a1d39cfd0d795d00412cdab3107460a189bb387
SHA5127e11e2d8eeeb837d646fc62a78112e7ed26af0eb0f8ec0de453f8dc71239c301bd344ba40033e87fff6415326056a705d48d74d24a91b7afc244b5c95c34c9d6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6G4X5UFP\sale_form[1].js
Filesize761B
MD564f809e06446647e192fce8d1ec34e09
SHA15b7ced07da42e205067afa88615317a277a4a82c
SHA256f52cbd664986ad7ed6e71c448e2d31d1a16463e4d9b7bca0c6be278649ccc4f3
SHA5125f61bbe241f6b8636a487e6601f08a48bffd62549291db83c1f05f90d26751841db43357d7fe500ffba1bc19a8ab63c6d4767ba901c7eded5d65a1b443b1dd78
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b