Analysis
-
max time kernel
139s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
953c4cb83c20bb0dc0e61bdca010ec09_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
953c4cb83c20bb0dc0e61bdca010ec09_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
953c4cb83c20bb0dc0e61bdca010ec09_JaffaCakes118.html
-
Size
44KB
-
MD5
953c4cb83c20bb0dc0e61bdca010ec09
-
SHA1
17b6a8e349414ee7405edaf428c090151e78aa54
-
SHA256
c9889c3c9c0cae5037c8ca7d467d8a711befe488bbd2d2410aa90296efc08577
-
SHA512
42d36049a5a9acf6c18c5f5bfe71ec93662ed147b9054c5c2b1fa7eca9ecde0f8b5f24f233f083d9d331689616ea8c86687f2890642a9cf915f21e1ba0d31531
-
SSDEEP
768:Zcd9QZBC7mOdMQFpC5I9nC4/QfSjZ6QPd:gQZBCCOdh0IxCmQfNQPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429784049" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1BEE6A1-5A12-11EF-B137-6E739D7B0BBB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000000e68d7ad9ab283e358dc1ec5e11bcacddeae57fe25ba43a4d2737163b1137ac000000000e8000000002000020000000df8277e04b76b6a223e5df09758e31956418107c4d890c9d7bf02ea685e622ee20000000b1aabb40b6de421fdbe6ef5568ba330ecf2c1d3a7822b9845455c2324a9a817440000000f928bef7fc7a2ccd67487892c67750a9b7dce275fc86bfcce21a78cf77d69936bf793bb96c29276c59a6bc2d75bf29fac985cba9adc8fd0909dff77984568563 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60531b881feeda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2472 iexplore.exe 2472 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2324 2472 iexplore.exe 28 PID 2472 wrote to memory of 2324 2472 iexplore.exe 28 PID 2472 wrote to memory of 2324 2472 iexplore.exe 28 PID 2472 wrote to memory of 2324 2472 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\953c4cb83c20bb0dc0e61bdca010ec09_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fedd013385794edea7b43f30e6ec7468
SHA1b1e8f4864bba1e040d98d536ac151ae7ee8db66c
SHA25646ad48683d8e8d52fc9fbb44c75fabf9b8bf07cc77b72c2dfe21fc33ca994889
SHA51202fe6c1ff7549c8afb808286e611c05b654964cf392366c1c02a83b853b6329e2c89afc239ee84ef56eb713a3a05b5ac66142a647e0be083af0780870a13a584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d33cec3dc7a658fccb6a44590e0057a
SHA1604feb75889e01825ce2b20cd17392050d2bc403
SHA2563e7c24a3cb65f05dcbbe26353c19406ed413304f7adfc09f0d52a83c9c4d98f2
SHA5129b730fc0a8536b99b1b0c0b4933087f0792b7bc2474affff2597ef30215494a3e862f6aeee1969c1254a9536b8083763f236f5cce5319f5d1fa60d8ed910b961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570bdcac784f2c7ec81fa9bbe91ceb624
SHA12526a3bc618b28e76ddefdf7a2fcbd8fe3650310
SHA2565ffd11ab3237afd901bebaacf33d1faf830928e126a179937c78567dcdd20ec7
SHA5126acd1edd89e0fcc587209a8fa3926288005528a5c9862ba3dc99d56334be08906d78adf82ee277a146fdd91fc2a448e763c87f6da52307534074ea228f5726ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee9cf953e944226b92532a0b366ccbf6
SHA1edeb5e67ff0971df7598775ce4e9b38695f9fa37
SHA256ebc0790e38d0580beccbb36cabdb8d45a0200d7a405fd5ccfd755fa982c976b2
SHA512a1a6a4f6c19456125a3d4e19db8c0c40b0c53e6638e5eb8ea917808f39b78b6898630726745884d222b41f8d36d5b9c2bc03e03b995959c5ce1726d720bf2c47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7e58ee3f67a4777dc02082bb6a723fd
SHA16cd90325dab475f67fb3047a16d19c978505ecea
SHA256c57b960c5fc5372e4971a707ab84b0ea8652a222a37edd0d3ec45935d543a7c2
SHA512ef0759caf9a3b71f9077528d493a083214caa0fa4fec211da798ae8d2f9cdb8354ac8b490a433bea652fa883ccb899b5daea15a1b9e4288793c98f9f5d8429f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5144580e253e6cbc3d1e8e0bc709cda3f
SHA14e52c511eda351b4ccd937877d0b16301f2077e8
SHA256691a225569c68882470b88c00dacdd3d9de136e0eb2f14ec9f96507b84011f7c
SHA5126b24ce3814c90de9cc2b73a1c9264d8c593d86ed5bf0a50000661a91eb28439d4bec34493ea4814a99139f8c7ebc3c6fb3c008f5dae49253eb2909f1dd931cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfbe25077b1fed546b99bf82cc7f6c69
SHA12929008fde14ed98e6c2e71a9d45ccfef377cc77
SHA256dc3a2f618460ae1d517677b62b846115ab52a43a08e9b5eba344e73f177e7e4e
SHA5128e946aa08099d2caf70958178f6956f4412e0dd24de438b455650ff108219be47d54bf319ef91870bd1982b8a568c7358b1ee8d78bf432ac54a9f0d95d82a8a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bb96d37a92249db91b12b5501ddf5fc
SHA1a7fbec7a4c7ea765439d110533a188577b597b88
SHA25681b71d43a0cb528cbc855c6cd1c2549e49c8a53cd5c4c7b3df0b51f9a879a53a
SHA512dbabb8310b0ac446510e550a556d8de564ad2b4e7dd1a50ca69a87686038d647320f77fffd38a7b9ce19f0a2e615b00c505fb67a438a93940e6478c9b70e1f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed9afc4ae73b6b45e604e625d1e737d3
SHA1f7ea46e36d7360f59edac7b94dea8b2caf85252a
SHA2567022e5e2f28095beb4a05dd58e92e1203e45d4e2649df2c36c8a2abc486a353e
SHA5124715613640ab93a8381c667dcc65bf90324bca4d5a89c397c921206ae0a94223e96c666f4fe5e4f0517241869dcc29fed6bcd2509e5777e6cfa9b625b1b5a505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523272f46767bcf4ff8ce5bd7c9a7467d
SHA1a7691b643dd1cc30cae85ea67412816d491c0f93
SHA2560e14e91d0b534452225aca74f8017fd9303254508b74cef871b4e2b878fd684a
SHA512c1b6107d0386239875fb123bf91d374623f4c9463a7601d6f05cf4af80d8beb10f55dc30cccdc89eb09013254c46a73ff175d4b28a391f479b404eae6efdcd98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce88ab077957e7b569d9cc840e6f0f97
SHA1d2735f6f9fa6b62cbbd5fa316d5e0292165807ca
SHA25673d0d90555223fb318243eb5e3b524b032f3e113414aa66bd35a8ff659ee6eae
SHA512308a9bc04480b18ee1dea597df649cb5d7ad1df37109ca9b32558d75d3e8f0e4311f005695ecdf366bde205bb55c4090442939734c55e70942c542efaffd16bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a59a0b96a37e590e0c96f8d5910ca89e
SHA176e1d7c41a2a9c9875b1b51d0738fa80ba8a4f77
SHA2568d1e9d9e445041fb9e8962ba0e145a70ff7f60d24b001892aa1ea59b96c2a644
SHA51264094d2daa837fb3be6f03f670b4ff8b233c2a1aacd070768f6d44038930790e7555377c89d628895920d5ed390c011a6acbb2d26d13f84d24ac4eaa7922c249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df2fefbd7e9d3f85d19f8e59e1f4f9a1
SHA1dd2487147a7acbd2788d4f97db3762b86536a16c
SHA2567c6df690229e24bcbfa4ab4c9e763cc553cdef36b6f42537f2becf1a3aba00db
SHA5121bf9e731e84ffdc80918f394ab1be53082a2dffa5a66dbfe692067afa2817293f564291bc770b9ccbd7f865c8a101d01de7b16dd41407fde669e7263b26b876d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b98e8fffd37adf8816d98f629bcbe3b2
SHA13abbc91df09fdcbe870eab5758def1977713ce53
SHA256752447aab93ed826ba9034c247ab1727fd9381d4bacb8bedd194e870dec68620
SHA51265f95cab92d1b2efc5502ef74012577d3ca65ee384f124614182b320732d611112dc066c852eec3a0ba0cbce956c703d76dc95d52e9c8d55910dda2547b3354c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d35047fa767ac049fbe7171561810d94
SHA15e0f578eba0edd6c97ca4dbbe7f246bce5fe4986
SHA256f6fa7758e60693207b32502535e645046ef6ab7ff85d015e1e9b404d56e4bdea
SHA5129e5a0e7b5a017dc19f13a878bff4dbead23cef7377b83c5f96c548614b1133658128d120c6a46145c9c9a3dbfe3bc3a19986e81ab584f867f076b203a9a3371e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad9879346b42ebda37ecc6dab05297e1
SHA1f7e55c2d318b7ff0511b92fa06c8360cf56b1f1b
SHA2560a6ecc8a7b96ec11069dd87f702653ade7c5b58746771f6f85f6f132553360aa
SHA512799e34863202ec3dbf516c873e2bf0016d027837d9e1e060709e659ee7f51ec7f3559c9125a6aecbb9e89aa91154714d3178e95cb221f4f76b61c3849ea7e04d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569de09647b8d2c3b7836e13599cdf7b4
SHA18ad2ad5a36416e374075e5ac8b27d603f71e1de4
SHA2560a7e263b8b4acd89db2e75e3dca6e9aabe188fda45703e43d68298b20f680b1f
SHA512aa02c09cd093216810cbcdf20db27076bb7367b8c1af5af2d10a5183a0edd2ce147036219ceff7b14b782907877fddf66f00a26ef2527cbe8d94a15d5b584a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bae143de6e9f146855df070b7b12297
SHA1fa4aafaf5a7129fe46abefb5e850c64cf90f82b7
SHA25651c9a84af53778e76b0f2af34d2b6237c8d1f7d1801e4635b03d0ca866809b86
SHA512f9b8ba148509c933ec172801561d15cdc6b171ceb2b311f2f0f7af0c2bd2346880bef8378b836d7a57399b0e54d8c989d8fe6d57cdd47abc42dfb6dd28b064bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5131baf5d3d06dc9176f48798d2410066
SHA1db1b5be2d0e414c0b9e8c18387daca78cc4462e1
SHA256614897ae190cfec22cacd77e23d79c10979aef03eb87fe8d1ee432014ad6f1f5
SHA51293b6fa1b7d6da805ac1bb92deb8d59105f0e1128368e684e5d9789e1a8657f4623594287f39ff31c568625b222be1eaccd7d32126b5da21586af4d6c4ddf70b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd08cac330c962013ac19304e790bb3c
SHA14809f4acac4ea178d414048061aa4ae2363b1863
SHA25697282c9411fcf988fabcc832baaf950cc72c70ead3a9431909f5b577f055f8be
SHA512758b0c2345fe9d726131447971aef7261d74250ab92c21b44cfc3b90959c4ea438154cc02ed66d8be3fae1ac21611258f09d07c5788c25d4bea176e1db750340
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b