Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 16:20
Static task
static1
Behavioral task
behavioral1
Sample
d6aeb34c5b159145000269e956b9277b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6aeb34c5b159145000269e956b9277b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6aeb34c5b159145000269e956b9277b_JaffaCakes118.html
-
Size
37KB
-
MD5
d6aeb34c5b159145000269e956b9277b
-
SHA1
2f285ee38f32ce08a0bb70fe266905fb2a05ea9b
-
SHA256
6578d0bdfcbf10058c7bb105024ebf65f839cb0b6d43477e7aa51d1318c5a5c2
-
SHA512
bb69f3ba347d5e81419307f6ecfa0477e2a4178d0148886d8b2de38aa2cf619f2fa929336fbc739104cbb681e0be5ba7a9e6b40f9b5aabb3161a91a7cd4fcad4
-
SSDEEP
768:XzbMzpGjIzdCkCVCvCvCPCPCCCCCyCyCpCpC1C1C1C1C1C1CWpLt4x8BkP:XzbMzpGjIRBEwwaaFFPPwwmmmmmmjpB2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f040705ad402db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432060729" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E96C4E1-6EC7-11EF-9204-FE6EB537C9A6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000e0915352ac022719179c2708e9b12d609aa2c5de3e763524dccf236b0b8bfc50000000000e800000000200002000000051ce553308fc7970483243164751e2ce144747936c48f4b43b7d20eae18d92b8200000006bf9867fbe3dac2a739a69db74c0699a1364a1c63ed03e72ecce8d9f21139eb9400000006819036a3b79ea56f8d5ec1fa3a5537200b889fe5e7d33c3a2fa552002d6ae5e2ece3fa711fa8b99dc1e5077c9d73522e9f3409e2ce35658e992338a7a274438 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2472 2340 iexplore.exe 31 PID 2340 wrote to memory of 2472 2340 iexplore.exe 31 PID 2340 wrote to memory of 2472 2340 iexplore.exe 31 PID 2340 wrote to memory of 2472 2340 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6aeb34c5b159145000269e956b9277b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad116ad79173d15880fb2039d420e47d
SHA1046f3742c41a71514757511653c22e3d93a002ec
SHA256feba87f233c96538427949ca4a5a8f5360b863b48c4ff6b3cb1c3961b3cfa4af
SHA512078305bcf70e77f0590f0f4472f6fdc1bd1dc9cd7e41bcc55e0db3b262bda59227b93f0d09afe1c96a09d528a088d950e0793a239911e39a4cb283ee16253a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b8e83f217ddae431bbf0886950fc6da
SHA1e5790d888c82b6675411682a936ffceb3fe25155
SHA2565283c4162581262219920b6abb8b778e18e589c98730216d776f9d2c775b2652
SHA5120adadb4928b8835f943612b067ee0018a3c9bf1b5c979bc826b7ef0fdd872998dbfb8f0524b68d9036ab43912aafba4dd87acdca2289cb0933e8deeb3d03db29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5159c83c029dd1f173663cca16948c616
SHA1970343b281d37578c77fa881a1b58506d44700a3
SHA2569fb7faf2e539b6829b30675e1c31ea3c3cf6017699f903fa0dd85bc9530f1a68
SHA512bbed0bcd013294d656d3f2d7a3c74f7a98a819f53e1b20b9b2018cabbb06ab9f30643293e19cc205373d52599045db312383d053a5b2b75ee993e296239b8c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590b176a9bbd7543f831a94028784192b
SHA1c0e1baa93c098c22d32c38a26666e3f7c7f3eecd
SHA256f5643cd55600fc555ae791a1b49003fec98d8a2da215b9a875cb74ed6364986a
SHA5126b81bcd7347f11ee99a879aaf3882f3253a76984a49d92b001ebcda265197cd64358c36b05e9f7644ea90f1663c3177d8990dd9baa49d3b5d525211bc0637b5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a0cbcb188b3ed2506653a5cf0f59278
SHA1d3d943f79a6029e4a3ebd2ee687042ca8dcf3f02
SHA256c5c21a10062882f64490e914b13cc28ce67f76a03dfe4f34c26e810032961e2e
SHA5125e048f6bc48e4e996f3e8e968491e45f28a57bf5ce7a8df4d41adeee529d6b942af6e0a81dad0c6dfc0265b13dec59bb59abb48b988f778cacbb114823104347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d3c8c6e3c300d89fa5ce14d1c91dda2
SHA18fef4cab517af461d8ae3ba7a6a214af9faf593c
SHA2562ee4d8ebbb571b96b4ff5d011f68f8697ed202f760e2c3e05f8b217aea02ef6f
SHA512a3c56687fc8be9ba076edfeca530cb9b305698c2767de38cdd2bfb18f1e3001e1a51d5bea20a54679a8da885ba92c950302d4a4e1a4a96fe29a0b3c300fe22b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d52fac8cce47ca94acba07502833faf
SHA1559daad4ebfec96e0e0857aeed0cfa4c5d039a94
SHA256b71ce76d66ddf1a9955fb9a773e5edca5492945eb4ebeb05325175d96dddfb4a
SHA512ed81f10b13cec46d56bad4469d4d27cdf791e0a29728699d198b7918ef28c753088486ea7ac498c2f5ec7a2e8c27374b2f0ce47966718d41e6728e4eb1bcf05c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c816ca4c13ca689be48fc8a3398cf3e7
SHA1b36f9347abe98ef36644ab52dc1b18c08c1ef44d
SHA2565c75dddb411f7774962e60c81b2c817faa331a9168de686713b79162855ef8c5
SHA5124c89a3ac15e768b9b95fc553191115468dea840e3049c7bc91801d6a017556a2cdc357d5815eebf50a1700ee53bc76bab843a65f039f3a2f39e45d90ae3b6049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53837e2ebb276eb019b71f3da0bde9537
SHA185e7c1a2e538191918adbeff87b7f829b48e1f3d
SHA256ff5fa1749581313942aa4e4b421a2a07009e721f1a2986fb98cf67c6e501839f
SHA512e606d4b18e01c9ca81dc206160d5157f84c7eb11e413e5173bfc343af7dcba3b51f6b94e4cceeaa7e61e5195f2a589021738c6daace33daa23a9d033597c514b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc6e34211ddad367a0ea5f2961842377
SHA17740c5b73562b32f3ba874d8daceaca7f3c65bb2
SHA256deee3d50464fb77dfe09ef6bd84fb7fb64ccc8fee7bcd9bdfb70fc3e78cb47e1
SHA512d0aa00ed5adb81dc51fa907db5d0e652a54145afb7772d145c27699c980df802d2a43229264c376dcf719e0c5e77c923ea6c3fbf1db142af471730d60eb1e6ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55813de572fd5ad20c31c75a38c20c8a1
SHA1473f97fd34ab2789757514fb24ae1ba005f633fb
SHA256563b3c2b6bb76833d48b01f69a73bee8f6b21de755e5b2da02262e349e0613b6
SHA512c394b29ab9605cb58aadeab1a585b973ffac2197b02e0bcf4596c658869eda079270edda30365f32341301a5ad5393294450d5c8bb2e7bb53f2a4acefec98557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5137ae3fad9c2f191ef561ae23696e0f8
SHA179ee25fbb3abc46c89b44dd77917f2b516adbc2a
SHA2565b2a49292b350d45248b02f1012b171e44197a5d983766b34d138a7562c7007e
SHA51252f216bf81464017802743d68a2fe7b1a50fe520d65fe0b7976e8e1d9fb2f396a943eb39589789a8a23ab73d8a8574b4ed489220971e73992cf0291e9f7f638d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5508526e95306cb3513183957be94df38
SHA1ec0ac30727c1c518e9f86310327363c296994630
SHA256d59ec17816f351d3893832f7ab920a8e470a236df505f206e36300bd28ebb5a8
SHA512abb9cc7c5809ed2ae8a111e95d3090a18594b9f67ff7e4f65069ff05dfc023ffd526596ac55480964bd1ad6f349a46b0d339563c957679d29b0060218e499ea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a40cdb04a39cefa05a298ce1a14a59f4
SHA13c6f249cbdb833d97bab6a5879712094623df9fd
SHA25611bf9dea71426be284d1e1ddbdd8d32ad3289551578f429ef81196bae7b6ac36
SHA512a8366f251c57f4b9873f597f4885a21498e71d554ea7bd6d5e56beaee198d1f1fdfe6c3af45e14a73bc7b7a52352e3634380d59530bb8823f7c9cfbfc085a456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516fe1ed1e28414edec832c64ab37ad45
SHA125f5a0977a5d111ef8d295415a0e4b8f360b6d98
SHA256148943fac84bee4680e92c0caf296b12387b9ac735f264dbb309296c3cf9993a
SHA51266d04b93b8a35ed0698945d1e8cb739ba1fe85bb022f7a6ea5794c824a39c2b27daa5e8c1135d572052ccf5f30ce22aa570e632686a61a1a0d2626b9d47bcaa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5703164476eea1e647ce7caf29e759508
SHA10063050ece122784c66898bf9f8fc0fabe25d9cc
SHA25659a7a88ac2e15dce7c43db4660dd1327d0a06c10fb3d334dfc9ca5d7254842a8
SHA512fa8ddca095cc1148a7a8a3cf78bb499019527651375a49fa39940859c07e7c984af8a7832e2a8d4573cf80822694113ca6ea4070e93da7620d4300eeab52245a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c000e3c1552469303e49ad649ecc7093
SHA12e079c57d8a7a5e3b01057b25ef7239b19ff3d26
SHA256bc94f9a9bf34b3805e40aa9481069229c0c1e190f6cf28339f4c863c0f4c2334
SHA512d1a5b768454c846656e128ce3697d71e4c9d9c4ebebf393c63daa4ade3b0e7446d8145cfac8f24da96e04f6862bc7964f9003a9af33a0032a837d2160b8dfac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae2d5278c8d1666a343701ab44cd6d0a
SHA1f1776251a93df8990036acd50098952e67c923d4
SHA256912f0d88fa55fd3be71dc5fc4eb43c3ba407e983e4e30355439e3f508de36168
SHA5128f9e7896bb8f5192ff4cce9a11f6ae330fa408327036725194e62aa6d46c4f262523c889eefcf02e688bbb4eb055505a8b12b469d623cde0bef5bb5ac93ec5ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba478f43c75a6820d75afc74721e05ad
SHA1d78c499034b80e1104579816013370f1c2f82d82
SHA256c2962966b601e493c770669fb2d3de85d408a4a14220b63e6613f49505262c16
SHA51210f0a69b3343ac4b0d11455ef3a0b1664287c29ee82f790f46223046b7393486084d4742fe20fc6adf5e774003efc6a6d1f37d5fba1ee51936a8b152780c8d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd41658b20f16c28497cf1578014598
SHA171445bb7e6a5ce688cc4f61073584be308bf1464
SHA256077817d2e3180107ddb5bc2d4ce82ee800e0b6bb9e86ab06fc8b492d91c2d809
SHA512342994ecc91957cedc0afe2f5572bcea09d76fe2b2394e3382d14a288d5d401c9521d92f4f852cbaaa825c5a0fea80a993aec8971b034b5b5cf1c02a473cc861
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b