Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 03:39
Static task
static1
Behavioral task
behavioral1
Sample
82e7453977a132d830a5d6068242d813_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
82e7453977a132d830a5d6068242d813_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
82e7453977a132d830a5d6068242d813_JaffaCakes118.html
-
Size
53KB
-
MD5
82e7453977a132d830a5d6068242d813
-
SHA1
f68622d091f6afe16ccc53a697a576494fced0e1
-
SHA256
2d98bf24dd2feaac90d977a1fa5b27d2c3d1d9306bfe777ee905f96bf2ecdd2d
-
SHA512
431dc2ebe0fa38e23423cca374a48374e1b611e4e4a1aca0c122834d4c51c49130c87f9be374754e5f992e91dd11be35631ddafd369bc1befdd9412c1354e2d6
-
SSDEEP
1536:CkgUiIakTqGivi+PyUOrunlYx63Nj+q5VyvR0w2AzTICbbAoi/t9M/dNwIUEDmDj:CkgUiIakTqGivi+PyUOrunlYx63Nj+qz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 607cc5b98de4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E258A171-5080-11EF-AC2A-E6BAD4272658} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000ee390c1d272dc939e8cea2dcf1b88c47eeb8f0967285a76dfc608db13f927600000000000e8000000002000020000000e15f3ec69d0f7403c74d8a4feea858253d30fcc3cf02eeadd76846f281e7902c200000005961482e9b850e9951d318e8516dfc9f0d296be4c30b80381bfe11fb6314071740000000f5b2e499a28458ad0bf9a742db70a48e893b134f809b4876ce98f65a2f6196f48a6fb007d9f6e8943f91efad355fd7c10bb622942c86b706d4d03ddbf8b1df23 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428731863" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2532 2432 iexplore.exe 30 PID 2432 wrote to memory of 2532 2432 iexplore.exe 30 PID 2432 wrote to memory of 2532 2432 iexplore.exe 30 PID 2432 wrote to memory of 2532 2432 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\82e7453977a132d830a5d6068242d813_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599036793db9cb90a9e0d6923f6450aa2
SHA14755dc0dc028b49f638df95e5471f1982fcb7303
SHA25672b8f4432da8db5db7134268b3bf22a8d34ba5ae5a5241bb25bc4f0b24e1905c
SHA5126b6fd78f72176d7f0e620d2414d0fa43c86f2695ac51024201ffd2b2fa38fd3677f9ce775e4c1a4a559f3afa5d8dc95c74269597a9fd426aaf078dcab47a29ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a08f3bb5637344fb82e12199c2040d0
SHA1edf466c09ac16e11c1db8b823a04be2d3f15829a
SHA2565a38e54d5c4cd864f0b6dca57d74de9e9f065d6186aaca478553ba470643a748
SHA512bf6d423b5c32b047a8af9108bc4c273559882664fcc31eeba407de7af31397f4b07d257c0d48bdeeb6f917a614dbf8d47e83c2032478e2608a15cbbd5a514fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a462a1cce71a77ba6a321a6eebd44dd
SHA1664c6388427db30ce66ad18d7149e80ae48428e5
SHA256b258c32223554b5a2e346dca82e010b63083b9e7af79d5eb07ad90bff7978232
SHA512e8000015c6c5424f214fddd95ea1607d2824053f4bfe8f6613b296bdb7eea8b10329dab37a2ecd9d4938bcd5d9cdfcf3a258ab566f0f4f6de0f4122cb9e98991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547361407ddfc91bab2df66def9b1db9b
SHA18af5ddafc237ec3dc4e6937f37a44dcae2487fef
SHA2560878a498d172860676cef576fcbf478683c371eebac44190c29fe137de7e58db
SHA512581812395c5b6eefc9a269799c13e85e99aaf636bd8b94f47779e30a3445ec9eaf78e9c08e75e8832ea1a01fd64ec43066067cc516528b7bc0d58f66c92d4b33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bb12701bdd188acb3498a3058e26e80
SHA1f8697c47b023f40737afb991f157402b68d8d5f2
SHA256fee51bc3ae009301696616fc7060b7403a4377020371834fca799dcf9703acac
SHA51261a3435b6a4b4a1f7a0a63a660f60ab161bf0b299140904e8c677bf488a4ffeddc80fe96d0211879cb4ab727a09b2a4881a2062359ab2c9192cd4ec98a6f810e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57192cac695921604a57cc1366e933531
SHA12d930f4ae566692931d562030e02589eb2021e23
SHA256cb6f2a296cd4fe5f51d241903c933b929395b2db41cae75d652dc9b5c46e486c
SHA5126f14fd811edf0f045881a342a0873e030af3d89128a9e7e21c26dcc026ac839be8bed5a665605079265da34ffb87fd24a48c11710908c1c5f3022941e884712b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f235842776b3357d557abd0869e4d7f
SHA1ed3cb72e89369ab01a1632f2b3d8678722b27d6b
SHA2560d9b4d9f524cd5acbea1c5ccf4cfc21a0382aa7987f69b6d8445b990199c400b
SHA51205bebfd6b8790f3a62cb39eb6484e263d6938cd65de02b68f6ae7b91cfad6bd5f7b9585818048ee363d2988dafa0ba6cefc3ef1f7312d03bbbdfc2228fbcea4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f37574b2f1f0b6f7d99f3bb483dada9
SHA1868a00a63208ec771efbad79391cef04fca72385
SHA256b1bd0fb8eb1e1c18254c4c20c4a0c36138085f972919abbc8d980a9c4f011b5b
SHA51244837a9094cb31cf078473a4e548ae24e6ffb7c529d5708abdd8dabfb7881cd88f84306a7f9b41922e8443f51f3ba5ff208fdf5a9789267c0638c90f3e77782f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527c19af2cfbfc3058d6549728d75dd08
SHA1fe41192f2fd5c589716ed5f3133203823d23a0a7
SHA2568399172681ab2845c69f8f78da7d0ce6b1feb9cf91324a68e4a67f5239de9867
SHA512f57f8b5475024c0a8c2fc70f7921fa4bbcb8f4f9e037acdf0d5ed7e70ad080b3d323a8b6accc154779078a84d392dff80928b11ba0e33a042924c061da09456a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5634bb9a7ea3eec1dba66369f0c47fc78
SHA1e4ed25ec7bfbe2b24335b2e9f3ef6c614e68dd06
SHA2568446b2791177fc02abe24fc17499b0cd32b132ae9b5afb3f6e29a8332eeeff41
SHA512fbf9dedb5faaab050b2fadc1a91d18c17507797cc636500fd2c2001593857cf985fb5fbdbfe58f34cfea061d3ebef2f960563e4af30f3d4b4664a474957f2c17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5497b4bfac465cfeb687f818158716ad3
SHA19fd6232e808e101004c938943d96459b1d54a956
SHA2569a584eae0c5ec48734ee32dee3f7e508691e705dec9214900a15074bd9299a38
SHA5121cb5bfb4e20d64ff20b4e35d93872568c73a091c222540e64c09b3deefd95b30ddf2bea1f996b89e34226fec3d1fa05eb3059239ffdee6baaf92f0761834a7e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1db0ad1e93b2372fa84a1e48d3b6053
SHA1544a519746c99e0bd5774b753ace4186ea69fd04
SHA256a1a5622b331410e0341c65a74a5863e8c986c21b9f7f53dd1bc75f743a9ee055
SHA512dc73148c4c9265db16a1d77f948f9f7e38df59c4b088971db382a6f846068edd584c5fef3742febfcf263e06e32ee2c0513b1199f1f3b349ab5d37b9fe4bba7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce349ab947c7a195d49b4af82fbe5787
SHA1ca93c3d5efeb684ed7490f95ba4431308daddd64
SHA2562b541e75be95fb55fae37f061fad17c55f4398f5745331d085cc9fbb69bca9a1
SHA51217a81ace21aea2c7a06624c2bcc6fb4dfb564d814a39de197ac2d17de07ce2025c83e0feb8f94b2457f56998053eef9c422483ad5274765e7305ecbbcfe98637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5679e649e4f073754f3332629a51db278
SHA16039fedd276d66b1c268cfcbcee345007ea41595
SHA25622c0dde316b1fee00f10cb38b5d174d7a122b2c05be1c644d170cc695fafb1ab
SHA512882a22469a2cea7a03fbf1cb511848e89158f263ed755fb30b1ba413f32783ce7e2641554a2823ab9b05fc3c6bdc0d60972e17d5cd8af40d7b4db0382a49dc5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2e0b6e6b874e767be9e3c1f0a828cf8
SHA1087002fc807ec01bcbdd23fc5b2934b3e15f52a2
SHA256fb6f0ce5ad6adfde84c979731af0f5ba9a844e943c13a5ba1251bd7365727e47
SHA512961a5817d9835a2c184cc252348eca1af461f872d383b1a375aca7994b0b70bcbfd212c3fe1f1ca9354e55a70b077868dfe6115381c0547e3af037662c17b159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec6bc53678406ffb597e1662f34dbc4d
SHA1484d3db5756d5f4dd8bca2626d502ee3b13710b5
SHA2564faf76c8e6ef9ab9690b618c4fa6f42bd39581a46477e5c7a0fc29cfe0f5aa70
SHA51209a90e372e5f304afc184f06bc4704587fe978a2473e1d441a52a163c4e6b8f816a8cddf498388f2d0a9a128a56c839834b00eec08b3c2c9102aea0fb3de5062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b891f3196af30d51f0d5485bdc39b7a3
SHA1ed4eeebe848e9164493c610a9e3290b5cca6bebe
SHA256ce3c0b76298ad73f046461fa621cbae9b6b2e8801c090e07958a930612209c4f
SHA512a3ac48ba0007c63f2ffa992cc778e3de00e951ac1d98bc753aa1fca03c885167a89074c98ee093a27588940c9ee34791bc319eb9c1a7e45b2c08f6c19e9f2747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523f70217e330bad3a19dcf009733065d
SHA1676b0e4df497f664365f68895199bcd96d496f31
SHA256f1c4a6472e11edd70713159e4e4afdc72e593e78be186bdac2a20b5982a89b2c
SHA5121a633b41c855a7e7727d4f326e8986123233f396cc5aef962b5829c0ad618cfe1ecbeebcc534e31356b9247af87bbf9f08a7f8168d31649c3202b51dd7fb9d9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af16dda63b8e5ea32813d544edb46945
SHA133d6401a4c41cdac2fe612d6f809e871ac801132
SHA256456ff2e25257206b1a225d9c83f1a19fa93b1a100e090f0c036149037855d4ce
SHA512755d74507174cd1b8eac8d23f7dc34bb2867fb4d24e9a32f7add3be278ad445d90cd240b832712fe221f9b3c20c8323bbd12914d76dbb46bb2927f3a07ab3216
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LPQ313RR\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b