Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
d6889ce36a82e7cd68295448d1404e9b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6889ce36a82e7cd68295448d1404e9b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6889ce36a82e7cd68295448d1404e9b_JaffaCakes118.html
-
Size
1004B
-
MD5
d6889ce36a82e7cd68295448d1404e9b
-
SHA1
90b061081141156a9a03de1e2de8b53504db099d
-
SHA256
681c272c319506b507c37464c378e4bbfcbf9c9c47e88bbec8ee40fa011e10c0
-
SHA512
22bd4ce50fc3343e1e49d8d50435833b54997f99185f233a9c7aa790828d5ed22ec5d993746c944e8a871ffa9febe6b7dbb8ffd10d07077df899eb0686aee338
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000501d1f73d33ad004dc0dd50b863ce2586a6d9ae0ecd454636d092e9b7ca6441c000000000e8000000002000020000000745977511fe50021cefcf28c036eb6082be9c2df884fbf42f4bbaca8e08e823c200000006cd3e58b929873de58a941d4c1cdee7c0832858107e670978da931a76766449040000000306eee29fd2b42bb1195b7a635517f6fd246fee47cf25bf3056dffa3fc976d03fb484cb1bc9a8e49365f7e6a7894b3da1963ebe9e56446c050f82edac5980ff4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432055065" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803a3523c702db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E8FFB71-6EBA-11EF-B9BB-7694D31B45CA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2076 2364 iexplore.exe 30 PID 2364 wrote to memory of 2076 2364 iexplore.exe 30 PID 2364 wrote to memory of 2076 2364 iexplore.exe 30 PID 2364 wrote to memory of 2076 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6889ce36a82e7cd68295448d1404e9b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eba9ab7aad0c6475f9455a47c315f59
SHA1c66e980cd6cfe421754b995d142fa54665b59ad4
SHA256308bb26087f147adda176a8d3c5cfc3e434751bb2ad97e82ed55010bd62c0760
SHA512f584e2c92d651ba6b880555d1415d15ab4b9264ad376432839fb5bf5ed4a85ab0b6e4536a5c21c34f980205e72a91c669e46de3c240a65e525ef8935a7bbe6cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6a391336d79f864371187fa03fae7ad
SHA1473f17bf31a88e1776c4ea5ad12032262a06c238
SHA25660cc7539421267e279b8e37f2006e050b939662fa22cb0549b92540d86a980e2
SHA512521c4f69e98bd6d8a4c0632d9059e4522790c7ad96bcb17dda5717a32ae7f84d330183bbedea3dadd9a48bce0e288232a207a687825d469b58523a4ea2ed6451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51941197d793dfb68e15ae4f575f907ba
SHA104241e141a04bb53628580f94956327c2e57a798
SHA256357a2c10c614be4a9f92552f1995a3a1984f0a100d96ec911e6a1369fee8394b
SHA512de60673b1618e8cd3a2dc268e856266fa6a0dbfe3df3214cf009fc6a35111b94f9c1a3f0769dbbddf7235a240484007e784a2d7427d616c2cd083aaddc37827b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542a3b1779b193c8c756b4a7a7fc03530
SHA1020dd3e886b52575d136fb037ba083ca48944c6d
SHA2566148c720dfab615c9cc25dbc35d8a4af1c1967a440d219ec7c74e903e4957640
SHA512ca4fe71aefbb866de9f508f95655adea826386199f01222890cd63415613f80b2bc74cfec8944fff9702470794360b54317593158a3bb07c13bc8722463e580d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8214e19be2da2b3d02cfd43f831809a
SHA1a2a0de413b07b8e497fe085781e1aae2c4bb9819
SHA256b6e34926e7cc98d31d140f48e69e61da0a13fb06bef34240cf3af0e729602fa0
SHA512f73aae7bc19a52bce29c6347594ffd45fd4d831eacea9eae9ffc2894d17e1722c8eb6460570c3977b18314dfd0cbb939468a80ded1f27efdc806a96e227daeaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e070566970d52a938404cd6e0c386f4
SHA1e28f54bc495273c38f7639e013949f6ea0b1d9c5
SHA2561b6d863a053e999889f44f9d4713c48dea2991a6994abf714e070deab351e08f
SHA51218c9017fa0e153b38173114222f55fc1c79b40b379b0488980decdbc4e7afbb7041b70e75b1970fa4147d82e969c5d204908dd473d9c70f06e2d940f620b6804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50814cde0f34c0a1a1f6a3ddb19ebff97
SHA113ea3b235c3d582b178f50eb905df377ad41e55e
SHA25666842a721cfc58b8794c2b60ad91b6b8ad98ef9b7bead51a7eb64290a84b8f40
SHA512c4db92ae8515b02355707e547c1caff5c2938e8a58148642e63c3c7e586c059a3d14ff9fc07c7ea72d1a88f29e55b4ddfda13eab30eff4d6d0ac8dd429d869d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a196e30b1b50c1a4e53c7cfa25670ef
SHA1d3bdc64172117c6cca740e7de3c25b1b7999c79b
SHA2566df8a85f63803afad80e74f993b286b2cf69424d626d58cd7753656f96bcf3d8
SHA512ed58952a8de30c97e2723d2f7e508dbe5c5c50b9afcca6df3fa37313a9f321442258bab241ba75dfe8de81b603e30668b950c394300b69e8981f168bcd3d46ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b233ae33cd19d7cc44171128a7dfd41e
SHA16b08d5591dacd49658db20693a5bda522a943a69
SHA2563d0021095c618d80ea114e40fd3fa85c29957ab5acddf979c0a8ecf861e0087e
SHA512c4c50f2329ef10f4d097fa62b27525e570f97efc3800b6469acb130bb3831355b00e4e3c798161226cdb1c2c95d3bacc5dc7659683e1900df32d6022ef3ce6c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526be519870bd617f70705495ef6a5a02
SHA147db8ce0f0114ab55ab55d9b9f58a9da19331517
SHA25693e3558790a897765c28ffd83ef21c6f669f210bf0a6025d15feb837622d9a2e
SHA51223f69924dd81db6804cf75f7d201bb4fba8fa5979c55ac930c416170a48190651f07f1b4aae99b6a330fb757a95efcc40343185cf9dd7aa617c2143876daa17c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586306c8cb5a744cc53e3efd8a43c1874
SHA128c2e0c7d5418a9845dc4d93a5bdcfb709270485
SHA25685435fdac144701817c2de3abb439480e276e28d21db1a553c5d3c67d0005fa7
SHA512bb1f600425a7191478780408bcd1511f646d46ca53296a17abe8d7318b9992870e372f8b5610be9e613728fecfc7ca5496eaa0a15c65b3c0c91d701bafd4b62e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550d82570a7cda4b82af8f45c1f0043ba
SHA186164db422e8e8f028674a4ec4e410f3ebbe98f6
SHA2565f7fe698abfa6e426d9bc68aadb51f8d36de89faef95a43c4fd5ad79b15a43a0
SHA51238d57a1b66c8f537cbc68f8d678624d6a3a98b04a6d9f5891d639b361413b36846b52a1fb4fed117b2947cacec691e6d1186b1a3448e88f863a0189ead84a695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542bb4b8d70bcf52aab2d022929271e3e
SHA1036ddeda5cdf853c25c87e1a5591f0e3b1db91d1
SHA256eae390773693d800f7a6aaad707dbda0c1b1c607576206911bd9c06934b5a877
SHA51275338d9ae291ced5c9fc589de2d98bbb71753d60d0680c1d26146f22990ce9d6b9f059ae21a6cfb33d53523afa8d6597c72125781c24575cf0e41b307317d32d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50332dd1e2163e90f8b08ea3d40633918
SHA1c96c13d50da9785b015591cb29f777ffdb0f9ad9
SHA2565eeeaa08f835d8f530e154bcb45eeb1ba630ef421254caa08a4ae258ee28b63c
SHA512c1d6ac1469b2cc9975dbe49b534415f83fb1f4ca525ee91f2581afbde5cd91b0a12c773db6377aff62e8ed4de03db5d1af6f9a2b21a1ba31d9b861137dcdded5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d49bc65417aced2f38a6b1ad756310b
SHA14616e915df7b0857097c795c033fdb38bf2e0822
SHA2565653f6ba0173a30ca9416f4160abe28b58280baeecd9ce3682ad99181aeea981
SHA512859fc1c413b1ed044ca518e73f09a3e3f7ed8cdaef048b6a5e55f9cc5a595b64241e5e09c407f116242effaac7b88080a43385d8813ec88551519e0c64d19e8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b12f2154ed5d6cb1d89c39ae6ebe1458
SHA1e05c88fcab61ce1edad29e655c4b841a0883c65b
SHA256db306e6656343527fc2ccb361fa8f910fb5cfe921fdf7d72f2eb2cd9a02e1f1e
SHA5128e585a2f82d3540db3884ae5ba4d11fc5e8038a84baafe3451316691652b40e904bc5a28809dffc22aa763d2dc80a2580aaf8b28ab5cab1a40d85e91e74e8307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ce8a385e565663f4406d202e28bbef
SHA173238719e5dd455f611876465a590adfb9312dc2
SHA2560d8641e490b142eb307cb7973c51313bc4ba4e4c86941cdd92fd32b7fa2615d6
SHA5126e82018f49bf964bf81a1d31f73fcc91145f14273118d028252e7e06f361b483f89269b48b5108c942a0e2fd15be2c8e4a9870bf9ec59b5f6b436d2e06a805b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf65d7aa3dbdf191b371340bccdd4b6f
SHA134b39bd4eb96e45fe0bde8da7c6048f47664f04d
SHA256b7dad112a0053b11f78c6c2c67d5ec2aff7cc402c14085b311f8cad535544c4b
SHA5121a00043ae3e079bf0c1031361b46c0c10a2059f8d7f87fecd21142661d3969463b50c8e220f14f586956489ad02e68e2c4ee9fa24f7e8ade542689411dfa70f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ad86e5654f7ebc8fa8127f125194e58
SHA129841bf68bae2d9286ad0e89b7c859b51348672c
SHA256b746998c113b66613a88e62ac40d301780490d6b3283235c4dc9e776d620eb0d
SHA51279d14a3faef96dfecb5d0cc7b13018ececf73104c2318a8d7a3fea0bc0237d144ab56bdd8fee5232c0bfa9750996483a2cf74cff482b3d4736527d4bf1c8ccd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f669ce18c05e247962764fb3291650db
SHA1245607ebce69cbc5152e50ccda50697d64f22019
SHA2568a833766233c0e3a4074660e7d73ba265dc623f1dcab6943146b803067fb85d9
SHA5126b8259de40edf58e9a8c56ba13aed17690071680419a94535841c782ab2d7bcf73fea56053acce2baab620fc204f56d1e2a736c5c6dd00f262c6552d6b180aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a57c561c18a9754993302b54a84d7434
SHA1b01139dad62ab2f30073aa8b7a931e25951edf25
SHA256f7d5f02e3a87f4798ac629ffb4fbae9a5833d6f162c765363820863cad23cab7
SHA51202e2d62a8424ddcb4fd2cc434cd125ef34e88ff48a66efebbff82d540eed2b927fbc783a0c83052b52e0ce438f1b3be3541fe02f282f74f2e087e43a937e6346
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b