Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
cf2dad48cc8236ace00e6f8da56f7b01_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf2dad48cc8236ace00e6f8da56f7b01_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf2dad48cc8236ace00e6f8da56f7b01_JaffaCakes118.html
-
Size
53KB
-
MD5
cf2dad48cc8236ace00e6f8da56f7b01
-
SHA1
6be10f542b5551b544646a12e8ac9d6edbca0b9d
-
SHA256
ca5741c7494f7ef26c230031d85983e76a7b8039e0b4a3c4ca20bc541f5db97b
-
SHA512
d92376109122776da30e4c16fc93c9dd91dfd5aba54a58098315acbf373ed1655c31c90acba2e7dd4da8aa93ee58b5f672d2e7aeab2a39656323fc6b37a2b866
-
SSDEEP
1536:CkgUiIakTqGivi+PyUWrunlYV63Nj+q5VyvR0w2AzTICbbDoi/t9M/dNwIUTDmDy:CkgUiIakTqGivi+PyUWrunlYV63Nj+qi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000c286448c1910fe8e18917d8962ae29f5c216cc0c2c31583fc2ae16da27d9b692000000000e80000000020000200000009a3e6ff1d58f9586e8b07c72dd26e63605ad55dd23071e6fefbdd271aa2388d9200000009139e7e39cd6a5b81db2302142b953133e5fd79968c855ede590a3b5750c1a91400000008ff4b589557244ef1e5185130ba4198c72ca225fa85116c1b875aedc6da9db9f7b614712875b19201403f6bb653571fe21e355ff9fc7625119f09b8ce9242cf1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 804a57b13b00db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431775262" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9F237C1-6C2E-11EF-BC08-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1940 iexplore.exe 1940 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2520 1940 iexplore.exe 30 PID 1940 wrote to memory of 2520 1940 iexplore.exe 30 PID 1940 wrote to memory of 2520 1940 iexplore.exe 30 PID 1940 wrote to memory of 2520 1940 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf2dad48cc8236ace00e6f8da56f7b01_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5092902ff70d66cbbdd6360ed611194b1
SHA16ef8c157088d4bde88756d628dddc42b6a3bb1de
SHA256fe497ce744a098da2d1da49f760b55419d1336fddba1c65ac7981b918519d3f9
SHA512093ea674d4e2a72ca9f5ffb01e64f5043e8ff4832ad522534501bbf0df8879fdaf362e681d9c7682525c2c438144add2a4e99ab057090bf1facb27a546b0e4c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1381aadfc037c97ec84334f04136316
SHA1017ca42c1b6881f34d43ce5e91c45029cac1edba
SHA256bba1bbd418e19cb376b37e68bd344b69704c4ee7c3888eb4089ba2cf8d322528
SHA51282f182b6425c005f0c9799ef7f01199da685e8db4928081086fa4bd38eb964496f67acd4291cb31b0822126f743661afcfd2c1453e6f2760bfa2367680939667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506cacec278ded2b2dee1356201389303
SHA1ddaa14632990e800132e949749dd58e2d26beb8b
SHA256853f3fafdaf64767e5fda9f6366b4abcfd119db95c2972909656d08e68ce3291
SHA51244c86a590e1e93ac534350d34ab9fa0b265a55b23dcb576458b1c9cb790004854b8547ce22ea5879ef5cc5736c5f26ca08839d3eb4c0510c0f61439a2348322d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560efd6561113292a0466e07e540ae0e2
SHA1d1122fbc7d6780ba67a0b659bc327cea0718439b
SHA256888aab3dce4c992e4a7ee3adf4a4f3962d8fb0209615cc1991b9f4e8f3e5f6cc
SHA512d602e54eed647ff818a294a6735f057a302e9fae16b4976958751e0d9ec8a1f60dc455fdda47ebcf466de1881ae0b4ff7f9091ac325e2fe417896a6b7476b12d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e4a37cb9a8635ad8aaebb56957c9ebe
SHA1d623977953688b8f80d02cff96d46f7d10b4fbe3
SHA2563b36ed02818b90abdc1666e4b83036a3c126923ace1a158ba0d82cd6871e20f7
SHA5122fa5426cc8ee48cd5a4f04da036fbcdb559e368e1515a8af7ff5ac1184eea6ae54ee9ffc5f98cea6886f103f4d91f01564bc71969c02f2b32e24cf10efe006ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d084c22c1b3ec82ce56508c62f150bcf
SHA189e968dbf783aa72b28b3281840f8db5b6e8dcf3
SHA256228b7cb62d4fbe4de7e99a2a04318066cd9587af0c0e0aa0c3bc2a8d36d7067e
SHA512d77fa419980a69f1c9a46d49d615eece3f7f989e7941620991299aa2ef5a38ee3397e20768b8c86d9af858d3150f409c6afc7c752820a23ef8499ca17be2d889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa33b414a66c96bbe0c5b793006e9f30
SHA1ebbaf1257ba5cd19a2742baaad96c962d69f4e0b
SHA2563e1cdbe6afbc2b85e89e3f2b8ce1f17e676a8edfbe550ea2a284b0db526a2760
SHA5122d038d3f221bde0c74c4c0ebcbc01894ed1c82fb84bc063bdbce5cb05f1dc03f0f31acb149a76b0df6c35b0f3569d413a02df8acefb96ff5a9300827698c9130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f095d2ea53e5b47ace63c88813164e33
SHA1e4951e63be3ab6304ff91b99e59847e2f0772224
SHA2569f57e5232382318dc62d427b7d95c203dcc207ddd1b4677d8a9192f4669e2dc7
SHA51258e2c2e91ff47205b5f418fc5d18e81502a7f045256c48f8b35ce0a4b1a47a6f45f27efd4b34a30945a2f5271ffa77d7e489d2cfdac99d3afb1d4a4ae1a2fa86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5609c0704e950d958ba5d12c6b32e27e7
SHA1546ffae8a3c79eb3663f9561be4863d70940cd7c
SHA256a76d4ffe556cf00dd3a831ec5f6718b660d74ce89be6da6e4a00753ce2befc98
SHA512ee7c87a8bc1b4f29e95ea7527a560db660fa4856ba46107b7674042901c61c3045b3265d68bd2acf325f2bf6b2a8fc62e72f714c5e98d47260032d0ee7eda0b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598d4bd8a288480bf7328f8197ac2bb76
SHA15976b777b571ac0d644f2078fdd9c9bd86eb7c44
SHA2562e2348199886e7eb42cf85bcc1a2ba2ab843b8cfa66f09ec54a22afdca8c72bc
SHA512212d89e9402003a195436ac53c0f6feebebce62fedf0421f6efb14d95b175b41bd24e8801fe8e3b05322f7f2dad0361cd8024bd6a019810319c3996d14de6beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d9b5016fce62b75745279ae3aa0f67
SHA1214fa0b06c683782d9de87cbe4cf1feea94cfeab
SHA256d03aca8a9b136cbc4b72f01ebe7edda258881243ac9a1cf0553c28545e71723c
SHA512bed45aef77d3afccb208755cbd4c6eafe8efb4c04d934090af2d51ea97771dc2fac47e9b57e863db4473add61ea7126af76fb45489a1f6ed3906e63d2750aae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f8d16308aba6d776e72f44220957dac
SHA18d46ae0df50221dbda9fa74d6d103d61053987e4
SHA2565ce10a1a8aef637b5a388b5c85bb326602be05249384440a8e404ad9f9de0a47
SHA5123681317f875511a8633729614354842e5ecfb2570ece108190c51eb232bc2ddeb4b8c0bf443a6ce38b229c8b069f8783e8da95312860f29b36861142d49fab40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d485ffbd56dfd1dbbc1fa4291c046c73
SHA1d507c23e772faced2077566ee3751952582871a2
SHA256fd21aa076cabb761493cd47eded8fa401af2dc6e846a0a3724fa705feb8db19b
SHA512d63e96ad6a4d594829ca64f69f0edb1e3fc34680a34ae4a18b68cdb3038681a6be717bf3da93f9695d8039c91cd968b888d22566348f4543b66a907fa7344660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562f61c6167e79e8100881e84e615bdf1
SHA16671b44682272252fb252633e9a06b7ff2758cd8
SHA2563a4ae25e9e7a0c7576699e96f1d4a46170be59fccbec094ce7b949e3bb1ba13a
SHA5122826e493449ce75001bf66e333f9e8ac09d84aedb0f300f26b4fc87803d412d34149775406d3b5fbe02ba98d063d2b83f1ad993c6ce34e9862c275a2477f0143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589833c294e4a079e7c0869ea89e01a8d
SHA1c69ae40601defe9e042ac32a143547900d711d20
SHA25660e8fe0719f202946d8f3e423d9e4df76538ff96fff393f95f029479dc142626
SHA512885df23e556b2d86005d02318d89a4a630c24a2a7712caac7c444897e2bbb93dfb2341ad3492004ad183cfc9adb58f9a36c8fc8708396ebffe5641a6cdf6e9ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520df718013ca2841ff7b44f6303113af
SHA1bf54ca6dbb65efc24d7e81fade4b409cc4abd1ad
SHA256205060426ce78d1edb26968583056c9c1e19d47864955f192f8efd6bc3399b5e
SHA512945ee83acf9fd2dd76f1b1279a781cd304200753daa1ead4343138a9fb31488c69228c68bddf5344d75a07598bfef0ffe553691092710ad992737db8ed8465cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef4cb81b4a9a70b8ddaf8b0a22231f54
SHA11a7f43ef2e6b4417e2430a269d64b606bcd481ce
SHA256618e6987c3516f4812f7f2f33ceeeca82089956401f1926ee13475ee761a55b2
SHA51209ee2b7a400c86a31f4161cd9f5f24809dc5c09d95616f41339dd9613a206a1f2279d6964e49a669cf7516efc2c289c1f870fff3463404f82d053793ddcd5157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ed2fa01669410bd10b50d14f2fceea4
SHA1b7f75e14824e71e4bf654b44a10ff06ad092d9c2
SHA2564509600e9e6f46807f646c9995033af71f6dfa7bd1dd0c37c0cfbd85154964b6
SHA5120ab423ddb97f9bbccadf796934737f03fb7e81a57de03b662dc7907410f3cb0134a191a37d509ab4af5c30636411b7988ce4e33d4b0b80b3917a65fc6f6b9af2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591a62ac16d1a3e5667bb1be571b6f201
SHA19bf454d4088e06e2abca8fecb3f1704ae010c060
SHA256fe1c441ab957060bbae81241f041d3ea0cc7742d956c1e504b712e08307526c2
SHA5125796aef2bf42007beaae6b01a513d37dd11229a54c71ef7d87bfa5daaeb3a3e2f7da20fc4969dfef3476a3de5f7babddf1e0274cc06397766112785b99186ebc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b