Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 18:11
Static task
static1
Behavioral task
behavioral1
Sample
b89d86129e53657ffa39849d8e1aaaa7_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b89d86129e53657ffa39849d8e1aaaa7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b89d86129e53657ffa39849d8e1aaaa7_JaffaCakes118.html
-
Size
53KB
-
MD5
b89d86129e53657ffa39849d8e1aaaa7
-
SHA1
8b3bd0926b2ac4125ee003c09412d642f2e303af
-
SHA256
90fb4e271de36372ab48c4e2e6b4afa4db61bde256c89e842c6be6de506c77e8
-
SHA512
4d8c9a40f4bfa52f7ac31d24931e45f3dfa7ada446a1d371c9b5a2e49792230ac7a74d0f5c384f5a1fb6c39c2446e7bdf83912b028a854adf519b3a3142ec593
-
SSDEEP
1536:CkgUiIakTqGivi+PyUtrunlYW63Nj+q5VyvR0w2AzTICbbPoH/t9M/dNwIUEDmDU:CkgUiIakTqGivi+PyUtrunlYW63Nj+qa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430512147" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000001ae5990cbcb43334237f08ff920b3b2c6baaa6c141c7831533581573a8571639000000000e80000000020000200000004a15c454bfbbf5c3495fd37407fb83f648029de9990db9a611dd2a9b4c5fb63320000000c8f5b6ac6893895fa21da9b4998e58e09916d3c6a58931ac9d1bc8ae4c312e2640000000f9d3af6f76142971f8fa6c62baa680d632786e08ea21b9dbfd7455cf8201d906d39e2360dbe828d5895d4134242855d3732604be1605b1e79922972512bd2953 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED8BC9F1-60B1-11EF-9403-6ED7993C8D5B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d03762d8bef4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 1096 IEXPLORE.EXE 1096 IEXPLORE.EXE 1096 IEXPLORE.EXE 1096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1096 2404 iexplore.exe 30 PID 2404 wrote to memory of 1096 2404 iexplore.exe 30 PID 2404 wrote to memory of 1096 2404 iexplore.exe 30 PID 2404 wrote to memory of 1096 2404 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b89d86129e53657ffa39849d8e1aaaa7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b9a314261715fed04b1e0f24b023574
SHA1c075b3c05d31a953542282756b575ff4d4ad65d2
SHA256a437a99e2769c89e33abaa7420b73cbf0da49351a0165c8de3aa4cfef2d52116
SHA512a9507bc1050e0d9e7c04e1297d69e252a4e51686c4db675035a7013e5660f2bc6f77ce077703ea7c30c72081abf0e59fb7a33fb27d8816d4e57ec591c0cf44e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a04519c8f005e02329c1c118a22365f
SHA1bd3b14bddd80ce33018ea1da1b6e5d8e9f35f43e
SHA256bb1b7922bed1ee5f499c0a7c5e7bf274f7cb44c0c0fdc65a5bb17dcba973a337
SHA512b03888087b948f4055b128bd137c13f1022497687572072e0da8e1a80da734182b8d72bf5068afb9d45300f83c30de96702b23b3af1e85da80c0bef41ccfc337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50da1dba6e967c2b38313db064e535c33
SHA1dca4cfcd0b5dd054512b5e3c2f37577fbdd2eb8a
SHA256428b4d12b7d2dd43edd14f9c180b7770679c5508136617a76ec4db2d1b8046c0
SHA5124c258ccb8cbbfe717718c5c6216a64f18bc40f2b5bfea94389f07c9fc5b5e48bd8262cd80856c9e32ea1ab0fe849c014896cfc52efbb6d2cc79f2009b5dccd40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5051b80ba8125b19fff88aeb13481acdc
SHA1414a217e261c520da4ed735da1dc9fa11cbe2623
SHA256c70742e2ff72a0f846318ca9673e766f8bcdf95f2eee4cd8c9123717ef63a81b
SHA512dca4e6b084fb43e527aae84b6ec83421efba698737e26c84f75bb25b625fed85bdf464d1ac98781f357622a0db6395cf6e51d288c81d4569d8130390a45137ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e113bd160463e52a9cd00038b5a4737
SHA12812d278b8923a6cfedd335051fea745a70638b9
SHA25669b30ced937d93a71327aa2a01155bdfd3ffcc774cae051cb3c438f19505ab46
SHA512a56d7ba4047ae234b359e7bca021ffc1ad62d498b5b809513d4a432a03a6df13da051a987ea3a2a0331694582e99592343e1225b133f6a9af0eb166162c05000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5394a78b4f6b8a3a5bd3196c3ed55f44e
SHA134db042145a5299a41bd262b641b51ac803ab671
SHA256bae4f23e3a58006471573b81e4a729fba2120442bcbfd2571fb560677bc43892
SHA512ba80be23d5087f8d9a04e59ba26470f0d70c37aece92a9700c42d30fc3a7401357e2f6bbfde46a5853b28a6910af8f88498054afab5c903398e05fc6eb168644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a478b78d4465716ede537ca2f8ee13bd
SHA17b0572cc1dd9d53921ff55b86770cb008842d28f
SHA256525a5172ad81f6793f03b760ac716f586de6a8773567c5c9b92f1eea193ede17
SHA5126068e57c64644c17732e698a76a50ea95ddbd2f273d8b3d92c8c77ec8c8ab4ac0a8b39653c4487806ee33d867ec0febfbb8b8d8e984f73123c33bd952dc325d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570f891db2bec9c2463b8f47fe0f52ae7
SHA13ce28ad78e5ace25fae75d27076fe3d8c94d6bf3
SHA256a750e92d8aaace395bf5c11dcbc488a4f01a143ea98af190534dc1f6e631cbbf
SHA5129a56a6326102d8a2f65c3614c6f622718a0a0f5fd5b570b4ba9fd1126c73b42cb576debe7ebc9b25e02599ffc8193b2bc20baf78e0f5e6c1af6dad6c5a78708d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5acd5a8be2a1466b098952595a1834b
SHA1e864c8189fe1449388a3907e8fa48ef6e5854f8c
SHA2568b42e49bdc5f440b59d5c72835d32ef3f380505e31957e60d5af93e62700650e
SHA51237f8ef279c534d8ce3c05eb3097c32b9f6ffd496cf17cf25e8612ae0e4e24767d73f2142ca4b81f3fcbf2ed3de2370c4605dae85d609a394e7c960e66f11268d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546e8739556c90030fe9ad3760c7871c8
SHA147879037799b9fdf07ffd6c17de82b55c9c28161
SHA2565ddec12509c63ed766a2baee90467dfb4bade0ad6cf4131ec8753eedb3bdb368
SHA51259aec20d36e227b4a9688905cbb7c057a5200b823e5a16f4e7394f139534731113df194542bc16cf7fb2a408ae4203b18786af14d13f47935ff765cbb35e4f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0b398ef961ead74d2d927fe2f17e0d4
SHA1257d752089ddff5469149a6c7747b74370529f3d
SHA25608110ec4593cc38f725d4b2f91eef53d903d9b5a733fca4c1f041635eb6e015f
SHA512d574275a4e2f38b8a5783557de39dd6a02a1921749b79691b1f3b3d87b69ebd36d8adb401763919046278ca383ec43c4a63518ae518b2a75a1c0990a83310b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7530c2a4fcf1af88fa39b5fae1341b3
SHA12ab01f12a63e387bfa921259c42f63066309f81c
SHA2566d08b3ba0ca8b32a487c90aa794e9368cb9daa7bd303b215edd807613e8b38f1
SHA51239a8b44dde126816dbc7619330bbe2e2359e61381a7f49dc8b51189db87d08cfaef460307b8cc58ffd42f66b7b962d3caa0d5f97ffdcf2507600e745395d7e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55708fad3fcb0d973ab19c268594dcadc
SHA1a4920b2b87a3e1c272ab57eb5ac93ab06337eedc
SHA2564cd6cbadadd2afe2297a3b6aea934e173dd1b4f509ee47423385bdd3f9405dee
SHA51275e55c0a35f46b2224a552fe28ed1afa3dec5ec41fa4830275c6db5e617a5a54aebc387677c3f2af1f49a16dbd240e2ea93ba16ef51f53ea99013b424d933025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f66bfa85129976ea08e982ea135814d
SHA14a4fd69f7e14ff1961dd3c6cf3405fc5445315be
SHA256205664333a7f61ec3e17293005ffec092bf443d75177e9bd2a0204bc0e9f494d
SHA5123a1eeb98bbb65f16eb3065e07a6a23021f5595e7b9fd52269435e30b6168c9258ec8199db80a995a450f47520f340ef3af2ddabb44b2c6a08588460744a8f7b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f9de57886aa71562d08a14785001a84
SHA1ec867955307e278d228f43fe727299fa6349d72f
SHA256fbeb8029a96bd644f9ab646076c29b9eebaa7d43eb608ce862a9212b86a24481
SHA512972dc690733ded7efdb1d0db763210eeeb588cf7157bcb7f1eeb7e8df3c77f5a07db534432efc39e21f19a6897f2c048662c4ee080556258e6c99666236de624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5620773e32b2c92c73f13cc0dd40c3d80
SHA1edf954f452fefa30d387b6110140daf018669e6a
SHA2562cdb232a0b45446a143bea4e4d411124f93472a5f7ac292205aab15a1edf3d21
SHA5123c2c29e870424d5d9a557528333fa72efc7b08f044825fd626681c6e45727ce97a088bf509e7f3c7c1626b9c3734b62448e908581e727c556bb7dd38890e7576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5181f90042d57801c0a13cc404d635db2
SHA1a4dbd2672a19e943adca46a3ef0f3e6cdb0c3a7a
SHA2565d2c8d2ad54a31ee2556cc642246b558f11c845ed871fd2a0a2ace23ab861f85
SHA512612e6bb7d3cd0fd4f92ffba16867c3661d3971aac944936a6774e4677960dac9606cc2915568147d2b8a73249874986b5b32a43f144392d8864fa281f1a12608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebd730e809e0f7efbe3974b0adf2f61e
SHA1aea11b1ff0c372fd64816fb3e5289a3543428c35
SHA2567a2dd03dd32f0bb73258d1e80527c22ff52f9aa0c6654784e471757254b05392
SHA512464e020e7cde702ab52a0c510f9ca6f73990eb133bed49288c929cbd8ba8274c7ec2711872329f57da5a4259fbd4dc82289e320351dcffff4acd1319d58d1cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501082379c69b614d3faf6264fa96afd6
SHA16e10bb39a826511a399ba735d29c0928d72cebe4
SHA256029067ad0618a4efd8aabe73d9c8194a3214258326b176259e47280aa25d4b2d
SHA5121a24943cf19a8252201532ddb370b93bdf751613fd66a80ab6c950333501af4bfe0c75ab0da1256d58f1f3c315375bc050bd359d9230685f03e1f90e5c018261
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M7GT0RRO\solved[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b