Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:43
Static task
static1
Behavioral task
behavioral1
Sample
eab1732d28dc9c15f21895be3ec6c61b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eab1732d28dc9c15f21895be3ec6c61b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab1732d28dc9c15f21895be3ec6c61b_JaffaCakes118.html
-
Size
4KB
-
MD5
eab1732d28dc9c15f21895be3ec6c61b
-
SHA1
1820a73c45d253c8e9244a721eb0d8db16b6dcc5
-
SHA256
a744e5edcd27ebbddf84226af97ee401625b2f0e1368e16b8a437f2f87971393
-
SHA512
270ee1808e6687ad41a261640346337398b00206004dc0d3be7387065201598e161718f3de35f280ad4afadf70ac25425d8710cc6405830a99de6eab3b420887
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8opnbrj2d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6007a7f9560adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000c6fdb9c09cbc319b6fc03165424b00295e2ed2f957562dfecd1571481e4990d6000000000e80000000020000200000003fb09d870a5bbc21b8ccb473175ce42ea2e00c550d83409eb8672d2ddf597066200000001d82567cca10ba83c247f1830b7fec98f8c9fae38bcb2947dac02a938c9bca6d40000000ac1148ad45f2418ae4d1cd41c93c5088193f6d92336465597c1dbef1c70988245799cd9a1bf058f64d908f79a3f586340b34090f453c6138002f43a22b531f6b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{250BCAD1-764A-11EF-B233-C2666C5B6023} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886497" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 iexplore.exe 1708 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2524 1708 iexplore.exe 30 PID 1708 wrote to memory of 2524 1708 iexplore.exe 30 PID 1708 wrote to memory of 2524 1708 iexplore.exe 30 PID 1708 wrote to memory of 2524 1708 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab1732d28dc9c15f21895be3ec6c61b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc78afe74e1882d04f004d3f9803c76
SHA173042c5a5f67eab726680228c12be5c408b0d1c3
SHA256d88c487d489e50ae48e04b2ada766956b088cae08fc2f8f307803cadc1907c4d
SHA5121a966f59f2856a04d691238656ffc68c3b20eece29ab8c2e9a29021044e323770501114c48398a0a01042a9e26a668b3c6c513a5d2b2f85c9e0e34106aab0536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb612601c48d1f33c19a68cc6f242a52
SHA1a3b6c8682fd4c4e2bb2fe151fb6c0c7336008339
SHA256665b0062b27a5dc44ee08d18c38329b79ae26e8436a2f01983ab78b7a220f55d
SHA512e72c2ce11dd6d116b0e9807a526b82b22c58e8d74ec531abafd82e0edb728f6a9e5902b2674dcdd8d3f38875ba1384f5f36b740dd4917a15d97eeebe43abad84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542dd91c1c8e3241dbdf2306d6ca6cb93
SHA108ab3cc76827a29cd1f047d3191b665df976ac62
SHA256954c17372f5f459f117b592168c311d49c8f82ef5035633f3f1dc08585148d04
SHA512816aaa83e2e3194823e16f64850b79f38f7f072c78372dcfcb7ac20d4ea65ec45ba8899231bb4beb89953662d7ceed9bf8e9315941cbe5d9cb6a167bdae5303a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a46f391ef4c1f9d5e94c5bc3dd884868
SHA17ed36c8d447f514b892f26af57d9023da82af2bf
SHA25695fa66abdb3d16b0a0df43869af7343d21135f599e84a557cd37646ca632bf5d
SHA51253ffca02bc0ba7091e17592427fd4910a1c7bd52d11cd65198422b87daa77d495898c028ef21bbe332d5b41cb6488ef7998bb2851e19ba587b124d5eb183ac87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ff1c63abe82340ef4a7027270ce62d4
SHA14c788beffb21c92bea3810be145aea4c4b4f4cda
SHA25668e744cdefacd11b5bef4af52a35262df82e829ae0d707f445785edfa408510a
SHA51231a8f0e8d3d4b20d98bd7471c94a9dbaf833e045b07d09e443236a46dbe6f7f772687dc969399dd8bbdcfef1000b868b91e9c1ce6efb10f9b8ccf495b2606d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532225c68bf4561ab4eb4cb49d907bc29
SHA1ef0a3324f20cfcf1412a72512c0a22b693ccb697
SHA2564b32b08195e7f7e40b7a12a7fe12ccbeff29838310c215b7630dbe201bd6a86c
SHA5123e7a754f9f1f324ba18f5964078cd3b7df670139e14b1ca43d3e160f8e64b440baa3b4bc40d072551edb28ad61b2e1a594642b4365e84f5ece41551eb1f3890b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56038384f9d08e13b2deb5a96b50ed879
SHA19c7003240ece5e0e63b0eb2ddac742c0aba06e6f
SHA25681c52ce525c00865a04ac1831481bd875338103ac41bda653093d90565cda460
SHA51257f0525d2406d1188b2d62127b528403fe15651c2a8fb93c9f91fe7d7429188bbba02a3e7b2b0e01cead68f16571ce4d51bab5d6f8793c8bf73ce1f9528f58c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcf70a03f4137e228e9aefdff21d44b4
SHA1fde659110b6874cb9d08ce8ea020881b3bfb674e
SHA2565c66d040ab7261e396adfd913252e586106def46e1c47adfaa0153f92d910e3c
SHA51295a9bcc4b6100e58ec068a2f04a90eea26dc37c7eaed07be8fa79214d3c7b5e2dbbdb2b9dd2990684287d7209e6ee2738917b5250208fc94a795adf9e09f6fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b22dfbabd561447298636e2963ba639e
SHA1b7a5ddb239a88aad64aaa646084ea12836111718
SHA256965cd63692097a5f5a03099fae58c947cb8dc3cc490103f2a09a650c9de13873
SHA512cc958a6329dd25e9a2f266120ebcf33f7b2b37e1b8d11fa26969a0c0cfa485cba3a4dbb03d793030fa72614b07bb555c958ab43db2fadb66fc73e203c493951e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c74b9a98bca760b301f9a45e544d99f
SHA1a573153e0e241ca2faeb70710167940a8b018533
SHA256b295d273ffe971e6618c45fd859d5840be2e7ef81b30f0c275e7a9b722818571
SHA51236aaaaec9406c8401f11faa2388812327f65b3ac4e5e301c60dbd6e72925ca55fdf336f58428aa148ec5fe17ee9402755f79f85b923740722315f0f43698322a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a069445bcac3856b9f357cb9373f8a9
SHA13ac0230a5812cd3b1f16b0fce04774a631983912
SHA256acefa521cb740bdd1d22d3eb25552136c622d6644a5d2cf37d1550d718667053
SHA5124ff5b4cae467b8b5d1641d02e337b489f2cf3b50a54d6a04087894fc2af8d49835023b92f6786e6d2652dfab863e1c62a46e917b1fc06f04372b81571df79127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565d64baa3ae667f78d55e17c3abe778e
SHA1f5fec5562408f3d31f5667bcd1ee228c00fec442
SHA256218d43a2f0a0371e65861b202ee7e17f17876e44687a05630755072fef171828
SHA5120a42caab4728aca15ee959bdfe541413a58ff2a9e42b609ddfb5bd67ea45f1478ca0e1f9804310cc153c8ba79efafe87d0861766d2483e8f530e46cdc5067d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3b9db26ab02c9e51de801aab5605e06
SHA1c796b15de67685c656ff80fc87a36e5ee91d9406
SHA256dff95aa86d92f21f90aa9b62ea7211dfef31908ad644ae586b0744e816da784a
SHA512cd367f66f26c8be2896813408179c9ea1ff672a574d7e94ab54030b9f61d94e62d3881d08c200e2ef2498e6f661f5a6dd284845de8d481bd8aaf58c59575bd27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5689bbeefcf0b1b9032ba00770a84f9c3
SHA129b7a8e81b6380d841e6d3258773620378528528
SHA256d4cca6c84f7844e00b3f801c54fd261f1fdbeb99df92cc7c9f6c99236aca43c4
SHA512c0f53cb5c4865191357c98ca4267255008034a8d15f19ea1ba6806b1b1be1656cc549ae012eb4192aac8ea7e2298e096eef364b689274d654ad5795f08b6ddca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da25d34c298b004c68df396cf5b11396
SHA1e77ef3b9efc0f76ddefb13414e6766b529cf6e18
SHA256d9d34cfa4ac5c1d8a32aa3fd402cb216fa41bd23653d95f2581e5736aa0b9b6e
SHA51262aad38e38a0dbcba7ed89821b2bf499aedc3b3738ac5bef6ef10e401fdc2e40aeb004b8c332d4c78bce9039157a2f8337f5b73db7b086dc66d74d56a8994549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f84497aba6c334b2dd24e33b6d0d2679
SHA178de328a1e7f486509074236cedb0114f5c4d151
SHA256fe56909b3b6b70a81ff955241dd4fde7b07d7a2d00795e6def25a412fd4b8c91
SHA512a537a16564e8cda88bf69d5a71ec0bacc3cba04c9d80ce77bdfe054ab1db10e13e92608d6503d7de734f7959967f916a93eb1ffba0b7ef79155a576fbd397332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c995ec8ddcbd280a793d49ad7f71f2e6
SHA169193fb71642593b263bfe16fcd372565341f519
SHA256d9b721c691114cd9265154ee9a4b32ccb5ef77955d42837be903fc1ffaa7daf4
SHA51263dabe4d6261d2e9ccf7d231af1b6c2bf91bbc641f884de8eadfeb80da8a5e411741b9c2e98d797dfee4b996d31e288a9159dd83b516d1fc1089e8c38ff6b4ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e67288e0a18c536c9085cf19c8bea32
SHA1a76c35e35f22ec80c62170a716189465cdaec140
SHA2567a178e95590417ed269e3c6af4ef82b8f3a74d80925444f4a15fb6791b689f1e
SHA512a513ac751f589af3ffcb465a1566e8f8d64c7c27a06a2d326dd1c97d02602c6740308b63ca12b2c095e3244dba27b61dd8c84597e69e5c0fd20de0970d15cb7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b0d1cc2b92cd407c9440894879c6664
SHA112d01362e6823e9e602bf57c58070499822a58fe
SHA2564c84d43104fd430c6d49f0926b66d02bd0cf25d5667eb9dfe96d04d2e57ae8bf
SHA512f2f6861ad73b0ec724449a892a9703cb9b49243f1c5d92dc75ed88be679b77a7b6f28c16d6fc72858d4becb38eb84a21d4db87f24fc62d636d384e72a51879e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584be2aebff7b3874e02a187631049ba7
SHA1b70a120edc99d49da76190b7fcc97581dce6acec
SHA2562311f3a016d7f3354a95041872d7387a74ed9ae65c5e0ce006d7490a9c90a59f
SHA5129e650dc0eb66dabfda4aa0e34bca884505c18ec3d3b9831a76263930381c2c8ba3554b86c29e40cc90ae195a3ea23df36c17f7f25d2d06497a7e1a1ddfa7715a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b