Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
96b16dea4849c6bd047c214f59b5f5e3_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
96b16dea4849c6bd047c214f59b5f5e3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
96b16dea4849c6bd047c214f59b5f5e3_JaffaCakes118.html
-
Size
4KB
-
MD5
96b16dea4849c6bd047c214f59b5f5e3
-
SHA1
cc8278f5e173b984af2abb37215add874f434332
-
SHA256
d7dff1307cb66f258d90eea3abfdc76c4102d18b28dbef36eab54945a3f87db4
-
SHA512
ab0959a6ec1c8878ef239a36eb16e7ef4ae44dfb4e15d6c11db2df1640669af81865b0d7a0193f4fd28b234d216973fd432732c29a30e86a83d94933721c9451
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o7tBsd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423707371" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54349411-22CE-11EF-9A67-52FD63057C4C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000472a6c4e20fdbe2e524010b39985f79f290494b7309e7aed2974516b98fad975000000000e8000000002000020000000c9cec486a4b207703dc00cc5a646ff1248ba26236e8530e95150cfb9281eff6d2000000081aacabb58dfa70ae3bb06fc7d2a06bb12bd54d65cd078f62e748c042146b65c40000000545c249ea09eef0e6c9e80dec452ba3f249b489c6eaabf947c84e76817b4cf1e85357356eff3bfccf2842c9aec74c83e8348058a774015e226141fe37221410a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0098c128dbb6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2912 2424 iexplore.exe 28 PID 2424 wrote to memory of 2912 2424 iexplore.exe 28 PID 2424 wrote to memory of 2912 2424 iexplore.exe 28 PID 2424 wrote to memory of 2912 2424 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\96b16dea4849c6bd047c214f59b5f5e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51492fa6657806e1e99bec2a8b12c9349
SHA18872a18e544855e7d4f851f0e747f175d9f54835
SHA2567259746ee8ca0cd134c5a06419388f2f6f23a2ad34edbea73e9dda23379b9bbc
SHA512ea1dcefb2eb6e55bf84b9b6b16bdb8347f13639232cc6874be129d28fc3be8e702ead718fb0247f8a1fde754ba0acc91f0124ae9d29a6a931468300ebb18b915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54418be63ba228a010918b3cddfe0fc0f
SHA1719b85e77bfd08f304ab2f5803a5de423ef0d129
SHA256d473fb37714498063dc0b0425f8a8f3860db45675168d8fb1e2d14373a7b1130
SHA5121c31456923fc48d33e2bbe6fbbab14111094628ae9caae37d791204090dfb85fba8eaa781ada12ddcc2f25df608643da65430dc54381fed245d9c3abb41d594b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5681ceb09a2cb917007b27887401f0bcf
SHA155fe8c461ce7be78721e30874ebd3dfce96a4585
SHA2561b0355f50cc17b626735388e8cc7333b458ddcfbec58bfc49d7e58c95a89a7d6
SHA512c8c246eefe62247c0e8d610d5712811e790c762df82bfed2e89fbea71d40e8a69f0babdb4b6090004975679d1ba91ce8d899e43b749e7d3388ba682aec6f2a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bc01a444d39a7549fef759ca8d8b64e
SHA1c911c4d68e5196d56a34fb5f39f6c48df78ba6ea
SHA256539a46c322f0676b2693710b80ea59a1ddc8d64e3da4df91b8baf4aefe777286
SHA51282cb719e76e00edf823da73e8422e5203abd63720b6e6f5ec5e7de8ffc2c8a8af35d095cd873efb5ed2b62519620e7ab64b323890f0f49b76b1fd52a798b3cff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb31a6dfc2eeb8c2ec2523a75ea1b8bd
SHA11eaa5bf293398674c421f07b14dd6a183b1d7bc9
SHA25678665cc8fb980b2d11ee653677c9749dcf511bfe89643d5b2893a062223c374f
SHA5127ca834be74a77cc26daf6a74b34b1160633d4e169cabcb3375464e0d1964de95e6203ea6e648fd344252d1c7a0abbbc579df58e038bf8681c9c849dc1c3d0208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594f0eec20c69833b427e245550bf9bfa
SHA10096208079206590103062d6c90195c7d71afa33
SHA256bb80a11603857e45f2db7c09a772113919ad544af6fe22a07a36be5595bb7b44
SHA512b86ddbc4a66c4b47331412d17e3025480797e7e1d548c11e166a1e5123afa907e5c820ace3a859f48e36c1a3bb0bfd23a47839288a53ea4e0bfa4c35a1f402f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57beb2dcc54a1791b876bc302b438441d
SHA1e262aafa9476a8e201cc241ee9209b3c8ee964aa
SHA2564468b7cb28d22b9497d40bf641dcb6251c2900b36f4cae28883cbeb0e11a4a9d
SHA5126a4113a6f2f6b0d3cec28b6df93aee2a84d22bad8f21cfa2e1def3e0a128f0b25e6299d41b8e323aef2e22a728b29c510747eedc10c551287769709754f448fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0d1199f65b78654b37ff562069ca2a3
SHA1ba3c9278b561b0cce970eb21387c498306564415
SHA256deb743d403e481134687ae2d931bc82629994b4b693c4293ab92a585b01a2066
SHA5125726691564347b80383499a90e5ed97c40b045480e05a10e9d144d8647baa6dbd1442cce198a01888197342a943058d29104caf29ae84dd501ffc5c5c3f5faf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5510cac97c1f02b963dad6424a8375ca4
SHA10ca4f63a3ca26f3e71592037abf5d6e35dd69637
SHA256405b4b7fd1b00bb8bc65afd84f2e1bed25218a9fa3f6b18c66395710afcb2988
SHA5126abfe9566192c1aa09e84a30d7a880b0e93aeea03d1a95f67a4bcb5588f65d0973c7c16c2395ca06be9f330fb6ef942b24e97c112cd71e23ef56b9d55d130ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591a9dd5fc604f5fb880edf81cfd699c7
SHA119a8b30ccc24f53e645d91137452c776cb3f4e5c
SHA2562b614bc4ec0b4866018bf17ef14e844916f98d760e7bd857b13d5f5103ba3389
SHA5123c809b5e7505457c251168be7912fc2d13063b3254081470e8f3e4a75da3f6291e5b2c25ee5d0c385c55c90737d6754372a3a4611ab5bb5c24b6db06e07bd96e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556b1d55e6f8653ec7d7cafa43d8664b7
SHA138de4c330727bea102f57924bfbceacc81c73d07
SHA2565c281bd72aebc72ea62a4dfa5af00b03d1f9ae001a1456e276f849094f3e0248
SHA5126902786d72783040e7ce42261845a131250015a595b8422e5649e0041815e3b54d4816485dc204b0b355a0b09d9ff1cd3161b89422daaded7eef2b3736bf8d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5141bdd97f05b70ad5ecb775e75965045
SHA129e507437a32db9d9715d089958d0df898ab97cb
SHA2568b18876d8012cc0dcf4e88c91f2b9984bb68363c5c0944c3ea0263072044607b
SHA51240318c423badd11f7ebcd3bf3120f963470d80c48293c5cecc67a2113619f168756623a58ed50230bc5ef38977188eeb18de443852c9f8e0cf59799fc67b7210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a155f4732a362612199c978dcd5c5d74
SHA104e9f95b803501b83e4fdf7e7806d43e5b3f8a34
SHA25698933f8546bbd528d88263cc06b50ae916733c980c885fd5c1f3aa35c9e373ac
SHA51297d4849c64399ee433e6f35640d3d6dfa8753b22970ab95d42cb71833ba97dc995b3082b0935f9a7a72f5b44176e171d799de4412fcd3cac0d313b3f8c8cecf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c02119b335feea118073883a1f9630c9
SHA14b8c49fea40eb3bebe418e10350983b187cecb6e
SHA256368f581b72f6555be7f986ad28fd6aa388bcdc30e9a5d7b2a546bfcf02816138
SHA512405f8d57e30376bf0b0cc5d0a1604cd2b40567cb6bd6b9232dc5d53a070273049c94f2fa2d41cb87ddc9f2fac520d8e758ff7fdabd381b81abc82af85ff54aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c78797b941c28c9ade6c8c69ed502a45
SHA1de28c6b6e164016fd41d35cce2bfc454a5472946
SHA256a20d1317bc89857858c7aa949aa59a382fd4e4f8a81491358ccd22564e2a674e
SHA5122c316db4d938ae24040f952684bc2162f1002c10d84ccf7aae67ac131fd739fe6d457fc68e6127c6a7f1b9af07afb0d471e135650c322afcb2ad85e5a570adc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53569d0e5778fa03411e05973d977ded0
SHA1bca4457263ba9b1fedb7bd2a2e0dd1b26678dacd
SHA256de9258891f82343eade36478e6d00ceab5667bcb66994a36c6552725a656a5cb
SHA5124a16ffc68d9288730974fed29a1392b1085fec4d7b5d0e3aadf20f403232f9e742dbd5c343a8826568c2b66878a8997beddf4a191641b3d1d2a1ee12d9be7c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c640008af83545b33d568380d3d7699
SHA1bafd3f86fd21ba2af7effdcbacc684ec969fcf5c
SHA2563bf9252c4c90e9be9e44806660974c4aa4ab8631346bccae4c85a2677290f2fb
SHA512e6c8acc0659e7e461abdb96c353e4b045a658b7397e4b3b562f958c10cddf62c5935fd353217150c3909ed1661441df5591d0ad8fa0db01201464304d4c03dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7e69f9ac647373299c86f7dfc3d7a97
SHA1f4b4bcdc6b483be52320b231f69d7d67055f1a58
SHA2569e5618f037f7ad9cc0f4d44d8e92d28cea758c639c698ce35a60e1266d53da06
SHA512bcde920659b34c71b15ca98582fa46959f9417dd8611b8d1268b545827f2dd2d73c515d0fe49f09b0f96f7d4782ba1089f9fff2893c9a59fc74b0c221ef305f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc9660e7f5520fda6458ff5ecce8df1b
SHA1cf978d510f24c1e50d9e5c82c785204e2d818502
SHA256958249ad49d72cb846af4bf94ca38bf392ffcc50cae809cca9a955d9bbb4999a
SHA5124b0a5bcc7e127ee1d1a6e30bd7a6520c81d4690afffde601d0d927e18a69d0a8fa7ab440cd11bc806d3d386dca6d4b9660ca392215787437bae7582cd7849877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d47136a77185d4f7b97c90117c3a3c2
SHA1483e7270c8a296e5a041e0368934f40b1567d726
SHA256d6b08c47693b9767c4808b87cc345fc3ec377f90b5836e81196402e4464c2b84
SHA512f4060fb43212c7bf52b50da948e3d15d5a492765f7b757807739e41c10b935da5392cac3798efe3e0301fdda4a4d753fd5b789917148b689d517b09d29deb38d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b