Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 18:05
Static task
static1
Behavioral task
behavioral1
Sample
f05aa14f290fc1a60ec1022104c5c40c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f05aa14f290fc1a60ec1022104c5c40c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f05aa14f290fc1a60ec1022104c5c40c_JaffaCakes118.html
-
Size
359KB
-
MD5
f05aa14f290fc1a60ec1022104c5c40c
-
SHA1
11f0d88f7749dc4104849f169977d590b2de605a
-
SHA256
a767e0bfbfa7f35e0892cda4f32a36ec5e7923a82af77c009d8b6b53d024c820
-
SHA512
17d2332dff867c5743a2d623e5ad994d50b7130962d4ee4e3aaa98b8238833fe8bc7590b5189c2a6a632cad1fc738b4421b04751ef39c6cefcb6850d28fb81e5
-
SSDEEP
1536:f+ib2o55NNSSUUrr77zzLL99HH99SSWWooXXHHOOOOddiiWWzz66xxyyiiMM99iJ:fFL/quZPNyicojgnrp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433103811" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000788ec702b3c12760fd32454cf5203af2d6f81b14e73fb45020107d11e1331be2000000000e8000000002000020000000ad840d57865347018388cbfcf9243df8e6c45b7e6a7bc617d5adbf377bd5c5d520000000f492d748c997ae4c175b713b3130d05e6fca6dadae40859af833684b9a27fccd40000000b737c0e03ea0e4f311b391d0058accea4b5a2bd816f30c095c46ae05b2366b9621357375ab57babc0d3f5ab56b3f41d081fc8a1c6e0370ebac0253b9038c3b32 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1EDF1B71-7844-11EF-9AA4-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 901ec1f6500cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2464 2308 iexplore.exe 31 PID 2308 wrote to memory of 2464 2308 iexplore.exe 31 PID 2308 wrote to memory of 2464 2308 iexplore.exe 31 PID 2308 wrote to memory of 2464 2308 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f05aa14f290fc1a60ec1022104c5c40c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5193bb81bce57c6a8978479f1183dbf58
SHA13e9f8da3a1521ae3da61d3b22a876f0f7be016d4
SHA25610b0603e95d78b64d1ed1622f1a83b00d8e31625f23b782566f5f56a4a96abc1
SHA512ef767444b7b0792354bd93f81b8caf5f8dd7fcc4e3f1a64d76faaeb5dd1a4a55a5fb477889e7eaba2a1e1ebaad28a98745fa93c27e4ce11591058fc4efd208f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2b0196a2f130d814279019df6721d61
SHA14980ed7f8206ecc0300b198b60cd9a75c6892039
SHA2561e2279b58b70fca707977d096c26f9f5579de80a6879847b4912bbaa57b21cf0
SHA51265c0f1c127edb0689971980877b522e8e7f00161c14e140d254d6522c1ee07e10b50fe16bf9ecf0a2fc614257ff72701e6a9b4b173a7f29d9c23a1384099da0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599ff12df6ffc6456b09b884d23f8a9cc
SHA128d5972538e232a16672866c2d2f377e0ee8e66f
SHA256d9a073158d1252b09ee1a3caa9e1bd0a30970368618879a375d49defc5e06ac8
SHA51296d7ccc0317f91038625700f001e25f0bef28457adac01b6cf0b50fd3027cd3b5d5d32b95386c568cd4c1c0e82b0d9084d07c3cde1a793916184fe42d6cc859b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5416c1ac79f5a818e9b0d1840e5c826ba
SHA10ba7c7cd2c6d439f297cbd90227597606d005863
SHA256180734a7b8ceade07ab762645aca5873fa594d24887326ac43b06edd9e28bcfe
SHA51222384f0038e1da2e7dbb8e02c2996a599034b28dbe7df3ea0ef2348937b1e7f2c4695b3528041edd58df9bd223061b254f0ce235316fda4670c9036e72f5a4d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5a525096901adf5ff203d6836902c63
SHA17922f3f0f256c6d34394b65b5c4df46fb5f88ed6
SHA2563412bcf6bf54e45022892b0bb48307b738b40a74ae2f3d56f7eb9e8308987a92
SHA512c5c3e6ef0b21835c707b2cdf83c629f3f8dbaa4dc2a910789550cb622f768b310e125bacacef608d2e8e6b8e94606cf75f044df892a11acafd951797b8b0548c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d50c0ed4db6f33df4615961265b6fa1
SHA18952656e539b92e19b9cf704da11fe180760cf74
SHA256c14f103d8a620ddf14cf2b17fc5b4ce41aaa618e6f5eed3e2bf145cfa5c73c5b
SHA51296ca3c8996e79a34e8f673ff64e119f820d54e859c50d498acee297b900d1065fb4174dda6cdea219ff557eed2ea6105ff42ba3875a74c379983a7201f080472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a42a61a34d5c21a9648b736c35b2203
SHA167de8a1d014332fdaacf7fdaaff2246fb4d0ee26
SHA25608570715286b9d834d12054133179d98a724a62726a1669d8c458b10f50e42de
SHA512cdbbca3e7d607a1fcc05a1743092aa1e3d4eeb7dcb393605aad9ad2fbd92bca95912061fd92b4eb58961c316ea214519d7f199f02bf99949e91b9a6b6ef554ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52527fa875186e023f3004dff0ed33a5b
SHA17d3b530a297f88ae1a6cb00d883f9f8cf899c48c
SHA25691051fe723be25c73c593f535c24bfc301a9988ab11cdc908f716a40a0a12714
SHA512745faf9700a3ad826ecf596d555df853557591d75766ea8ed31ac8b212d1f1a677ba0897b76ebd2bbe8a9f910978be6f27c349cb6be06762868095259476a5fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56411604af1fa04881884bbaa10d404f2
SHA11a2b09309d7c4150761f102d123ccaad12e709b2
SHA2563c125ae73fcf2c23dcef48286e938e0d9e73e1bb5dfdc4cb29eb9e143e4eea42
SHA51257f62cf7ffd879dd498fbb9e3e92ea4f372d49397cb4476ab4582bd662a9f59377b55f162325cd57c6e62accc743b3184c0f3ff1dce9f2774cd0d763764ccc51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a0c3584ad1d88206fb4baaf6ca60f70
SHA1eacf7dc242668e5125e9eb30b79bb5ac631261a9
SHA2568b2bdd2839e358dd257f493a9f95a93a535249f8a2b93f7f80ed6b6d3204c3e2
SHA51201a1fb87d79eadf79129043d4e99dbba33621514df0fd70288cbd33cef4e8ab95e38ed1e806e13f0112416a9181536a5841d029bf40b0b20743772939a6a0ce5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50875e667de589d8ce39ff1145861f803
SHA18198f2e82d4e3622696c957361d498e585f3fd30
SHA2569c00a1f3b1bd2f4046c06976095605c4b396d5506645f574e8b777f0f30be655
SHA5120957417d13f3a3e98e87bc556ae8c3ff94d6237980542594d748ef6b60caae23e030b2e33ad1df6d1f6d559c5d98f263878584245eda724daecb78938af5ae89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a39a651166d2d896e6eb2827313b973
SHA19a5c313f2a2bc7dc99511aedd9eda94705e8a248
SHA2564c2c569344c7998a6a8ecdb8b4868f52565798ef7202ab54024257490b33c5fd
SHA51266ae95afc3b9b834768d85b6259530b66a7d2037a0e3fa0fc2e4d87c8a1bd678c10cce71e9ff8ff8c80aa70e27eda5a2f4a04e33e9ca5c44fe647ac9b56cc82c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b60594c100682bac350c48d47205410
SHA182b043ae84187c568c134ea0798a1a7fc407b394
SHA256cdadcc0f4037bbc9f87cf91a76d0411978bd71d2cce0846dd606022fd7e386d2
SHA512c492c41f3a51a66aaf446695b3bf23a657c7f23d76c337c503e49bc5aedd7d3d8c74d273ce0d5b89779971f6110329da781cd21d47b07e78c071541d2a94e2bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52137f3e12bbf11af6456ae91bfd431b1
SHA112412d4da9b18f1dcd353fe2ee15ef7b9ac76d62
SHA256190a3b3a96d8eaa6ec7fa20c8f49546dd7284c513f155173f9a8ef90adcfabf1
SHA512e4c16105cc1475c5c5959ecaa2eeb5abd3cb24c7bc10ed83d1a0b4ba297cce3216f77bd990772eb504800a5e0d9113e76ed052b9ab556bee3396f3cb51e54d88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad8ad92037eb19bb22ae69316e9e456b
SHA11da9ad5e46e6f9b1ecbdd01f90a774a468074ef7
SHA25608ac414e6695dea341216b0862a62d2ca58e947adc8049688ad17f3e851a8fe1
SHA512cb3ea3ab78d3c60ca89bc964956006416042d556c275cf3be7ea5e5800f29f9cfb2b9732d81b00c7430909e8939906deb5e9cb5714d2a31ec47713f5dcb97aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a33209ad363625298af2a1cf64e186f2
SHA19e26801d39231049e9c22867677060e116db63cb
SHA256808ade54a8b1f9dc76bc9b914261358e5d11ba66b88fdc8060c09944173aed3c
SHA5127715c170336a33bc1989c66115fdca5e87488cf62a7a9fb66da317cee0cb5c5afddd8396f29162e5340b6c8af1e2989aa5afc6c7258959924992551cbbc00b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554a5fdb18e1420d1e03d637f9940f1cf
SHA160ab86f105ee4f710c50e872867d4ec35b538ca3
SHA25661538b477785c70193c8ec38071bbc2fb2e3de8ade4412033cb02e655892ffc6
SHA5122e22732ec4909ff46f02e73517cc0849b42ca55215574354424b14035883340460cd3d1897c5007ce79f5e5bd28b4831bce72094896a34002ed136c2db9c475a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f70057abed4f38270d7469e18bdf8f3
SHA1e7166b9581e93e74d25d16424b4c3c6e60ddf58b
SHA256aa02fb664e668e54a190391b027597d30f84f5470a417a7428109cd0124ab699
SHA512ba4f76dd21fcf4db881f2fe910999b1f1e1819b1271774549b8eb14d2695535896942ea01de1d595f89196b5830482e6d7d2be6f946659c967f06bef521b5653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508e29ef80968ba62355a3735fa2c51f6
SHA148c3dc7701501a273c2ecda839fb67e1007dbbbf
SHA256cdd6775afb44752d6fe92792199e573b418b959aa65051fcce15936e7535a0af
SHA5120ed9a8c474c9aec26a946d2b0fa1c794c0975866e299a4bdb174c2a55f515e12881f4a2326d2c842c29d45543bfa90b0313ecf9e3b8f3589c3763c57c2aada80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d80296293f7d0946e4de61dc47eafab0
SHA1e7ae89dc4ae0b07ce5ff04e3f3826d0346c751d3
SHA25611c892c5bbd29b3d0fba489cd4f84006e7a79fc3c20adb8ad96762e5c3dbd29c
SHA5120321641b7c0c378472353f7ac0df94249fa8b9a1cb4ee98083b75b9e63b3310fad8e89f557f9bcb5036711b97bd941f2bd17c9f86187d1932500b26188b147ce
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b