Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 02:17
Static task
static1
Behavioral task
behavioral1
Sample
f985eb440fa6c0363c36927c52416e81_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f985eb440fa6c0363c36927c52416e81_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f985eb440fa6c0363c36927c52416e81_JaffaCakes118.html
-
Size
11KB
-
MD5
f985eb440fa6c0363c36927c52416e81
-
SHA1
3ab910513805d5a9c1fea6b0fb01535c4672b782
-
SHA256
d7d75df9b0b283926548a14ee69f2bb8ee1bd53244a86ba555d47fb2add71e47
-
SHA512
8eb192f866f74526c09423a7a538921e0c6349e31e3eebd02aa8fb1de12a95a6c85e19678c1206fe6e5be21d826aea49453fbb631a9a9adea12c12b9020159ba
-
SSDEEP
192:2VklIsr03RS8k/w1wvqyeB2NnEvO0HQ01BLOXuBuLbdU8d:sklIcuR6/gceB2NnEvO0HQ0BLOXguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE3B5D71-7C76-11EF-B525-D686196AC2C0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d07dc7c48310db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433565331" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000f29d5b94aef39cc7e7ecf8fb5ec7e00ceb6b626672ce0d4b10d52efd7ac54864000000000e80000000020000200000004ea25b100dbba53d8803ad17bb56970235bb9f85daac44494089ddd8ff7c13fa2000000087496f0c50ec9ad233b87bc8bb5ae15f579c60eafcbb8788bc4cf86fcef2058140000000fd92dd5f1c1103514076923cab07a0cbacb959c97f142d22a1acd000e21a20f686e296f6ba2fba984dd5bc62032136d1c53947ada12489e45cab93b074091d66 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2360 2552 iexplore.exe 30 PID 2552 wrote to memory of 2360 2552 iexplore.exe 30 PID 2552 wrote to memory of 2360 2552 iexplore.exe 30 PID 2552 wrote to memory of 2360 2552 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f985eb440fa6c0363c36927c52416e81_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5855585e224f03bc6442cf6636489d394
SHA189891599f83dd4512e99f8e365fe49e4cae47fd0
SHA2563fc30e4cf8c9908b34796f4deefe9f2abfe262790c921bfe552f85c887b62a4b
SHA5127873bac4eecfa6b1f01da86a10d33a3c4732d83be0f6e529f6f1a592049c1c86e828ebee8045d5d0d7c7227ba374c9381bec11e79e203263d3b6fbc214ce563f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dafa25434e8a36680db21c36ee53f4ac
SHA149c50a3db5ba90b09915ab0804d6fcc4172b8ef6
SHA256fe4fda7da3448dfaeb2c4bf8ca5e26dd22d7d0158feb0497aad1902ffbe3da88
SHA51286139a21fa1eca938ca98f3272a71e4fbed72c186719db90ad4e7f3bc4c8ee52caab1e3b2322fbcebb8914e91a9223b5fb0717e20dc0b4750cbf0bdb86b69130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e20b9d03fe0365a0c89cc994e00e820
SHA189431e0b5d22e85fa6ab54f5553d114f33207395
SHA2567f538e9743947a861bb84790f44b868d4d9b90f898a8fbc2ce6d7febea92c153
SHA512b13463e11c493fd2c1f1fd97da2a8c896b55714f336c867ac801831e014c79ac198b124fa898fbcaae80c76a60360f988d15f71a90f5c6ee0754141500d27545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8530044088f4bdb882cf93c4044c21a
SHA1f0a3fe9172bd3142d0e7981bbf7854c236208b22
SHA25602e9271ee21464d73029f85ba63cade7857ac3477dab096a6e16e8e894882fbb
SHA512c4f17e8d0efaed05404660b80a1da11393fa7752168c255fae58146adcf0da31b7ad6911c5e81f626de8789a6a437bb4f3cdd27b1ff1ac95b1164925b511460f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d527928574b288d54ceed9c4453e31cd
SHA1e0b71d9c3bc10701db0fadefc7d5221c63c64c6b
SHA256e2a6e747b605d8bcf238ebbc85693917bf2325b3415a350edef1ca77526bf333
SHA512f92f1d00ac83b30ead0f48d39cd33118b9c7a5018577e65e1601de58dda42404b66ff3c58720d3a63fd3c063326083f6033c4d3925e2b73a5c67f69c91cac2da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514fce07f11e7a3b8eca78fa2ce47317a
SHA14314dbc53de5448bf1d2f9a8b7f3a045026a5e74
SHA256b3f3fe3c7b033f1c92a0c0c90215bf9b91f037dd164f210dde2d91a414dc4663
SHA512120b140099c2e7bfa7086f9f556a0e381f0916102800a1bc393926205f95acec176d1d57bc45fc9a1e2ee9ce9e1bc040237203267382536ba470644df51aa684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fe83744dc7ffd8cc4a857cd3245ebdb
SHA1ca569ac7cc8eb3bed780d9631f93546eb1a585be
SHA256ae542fc814dd0affac9b2e443490bd1980e4a89ae0056761b07287d38cdab5fa
SHA512cb14affc8bc7dfe9f425402eae7c42ae675a24805400fb851528c54d463db609af4af16233a74436b963e6f4efc9b86ca5a5dcb81b966a649e621ec8f56dd1af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5445cf4bc258e8a0496016fdc4053a7fe
SHA1aea8f29b03c8cb16a966acb0829b7b9812bedf2a
SHA2560c72ddb6388f8f544c7bedc7041f60f6d95d29ab154bfc0ebfa91be47b99ef89
SHA512a29e4c951bf47001d90503c025848fc060050ffc33eaee858830cf19d4046f404327a71de3b0155c69a56500731493f73fe39845696176afda2e650c0774eaf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5745a1e773bf3cbc156166d5e28b00e07
SHA114ff886f9dd779feac8702e406ab844ca28bfbc9
SHA256dc7406809b775b55c85a0e8cc3002bf037751829d307b527199b6c1a7c5397d8
SHA512f9d412c5b3c11be33f269309a30e0495684ad2cda3179a0c347e4ffacda924ec87c3e789ac298d068fbf65e9911216bda684acc7145462442f03976af966635a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ac4ca012e46ca8c0ed0b0da46768382
SHA1cc474ba40958710618e8aa6a9fecd765dc326da8
SHA256beb682ee876460c67747942d7986eafeca2e8512de6227533c3ffc5aab0da86d
SHA512273c3b8b11a1ce0f1707e30f0a6aced7e2772cb635e38aec2017c81c9a8207af0790dfdefa9e7bf73e3a94cd343b480472e8734cdee36cb89a66472e9b4f6c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f79bb067734100352bfaf514530cad79
SHA18ee562c803c87f9d3850023025b37c90eaab9264
SHA25619a906f4ea4c4e3d576f246cbbfc8ffa75954b460e970f3176e67f266c0f079e
SHA512a1a349730c5fffbfca0380e9e888c3f3ace17c07d64aba124506385c5bbe1d438a463d807abb74d7ecc9e34345cbb8ada2bb565c1abaa7d8ff3204bac6b245f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525519433946f94e03f346f4789ab2ba9
SHA1222c81e433645345d6abc45bb4499201ecc7c75a
SHA25643061c437c31fda0652e0067de64eccbd6830ad5ce145437895a5c295e9b0fc3
SHA5124d1f23967800726b9ba86b237efbb72ff29e3c07448c21a2ed8e839c92ff6c0d382f35d1874a1f5d2d0de28dfc5fbb806c686c1e47a58c70ef006d7671162f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5014a846d3f0f0b352c1406d370492374
SHA12d35f25769108213290ee40d7c3def7716e4332a
SHA2565de38761366e2fa74816e979a6ebef8d2be87308601e97e1ee5b6cc24fd70b7e
SHA512d8e4b6487899f51441a9daa0a7ad1ad7a68730dbfa5190bee40eacb5439c8b6fa19ade36eeb76a5e2d0caae6e19113a83db98e6ce150e0b507249bfb6e2e82a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57542a5d402406429b3148955011dda28
SHA128c6502ac6da4cfd7949b39abec4a078d2c84275
SHA2560cd3db3f7f3fe9bc5db3e15bbe4bcdaef46cd05763e40dfcf37bff7cec2f8623
SHA51215c104fc673d4bdb3cc5e318e79fb2059ce85b95d87344db16623a77d56b2fd1b152cf032ac5ff5d9376412c2426ed9ca54c9b5497196f3f5fa1361fa02d90b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7159a3de31c1aacf59b62676a87235d
SHA1b3f10c8550e2219c019954eccfeb741af68f04e7
SHA256de5552f7b4a319d8cfc8833247d255c36ae7872f5bcfa46ff56aa1061ec2199d
SHA512e20a4a841c61c81af2e68e01bc0a2779b75ecb044d66d60b17c3815f8c12fc2490bf15785a6a8dcc4674ac8a25570278f84fc9ac44f9094a5ff567735f76ccac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596d7f1212ac09dfb511413c48bbc4b96
SHA1f02059207e2193f3ae50374b9c3cfb8d87a8ae1f
SHA256fe85fbc57ea2cbc26cb659c50bd7a0b4a2c582ad69268b3663bd88238724fbf8
SHA51283b46d5dc07c6eafbe0cba5d0dd51df10ac75bbd020ae51cb64805cbec613d9d84f53b97db806710bf644a36bd9a13460c9f550e9edc7655b06ba1c0a29a361d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f39e2b79b7896565a5927302e7c307b
SHA13100fe951a4b53e39ed149698f8d558af1289834
SHA256a173541a20f1cbfeaff0c572a053b6b6e95a4be615b3b0c3decadcc21c8eaffd
SHA512018193b25d5944346596cb565bba17ee7baa75e37205e6a9b9d103679a588355d4f2485c7ade64509cd3de54ffc9492eb3a55efd0c303f72e08b15f01c6fc73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a210212af8e1eb99bc41dd98ce24a7f4
SHA1b0944a87f69aec3ae9b0a1735dac188e838657e0
SHA256d5752b5f8a95e147755c739ee28b665bc8194227cba21cf3df1da7a1b6a86fcd
SHA51280fb36850de4ac5cd4eb5efa59e09ff73b76ad7186864b69afe57dd1d6e52a05b29742e0efd12219f1b8774bda7762235d29566cf0989735adb8cd401d7e535f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549e047946e4140702635894cd8c9e3d7
SHA170ea710bd93775affc51d4139b0ab8a47ec12f8e
SHA256e07d9af4cb2ae21e8984cb1486c3b6dabc3fcda8a4b1a1c5eaadcf54002a110c
SHA5124af8d09f3c85038a67bbc496a235bdd0c13e55442f4fafe3ca617b36c99474cec951d11c2038bb6c655979fb88d2e394deed7fc117a5abcaf92db2905e2cee68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e148f3e5aba7024815b54684ea88ac5
SHA1fb682bbb3d6a5a989430b1aa7dc7dc73b72cce59
SHA2566df515aa7c754e58262c8025e0dc38399b9f1e9eba7020e2d64ebbd98d232488
SHA512d569658f0b96467962dc7d97ea7a39b0a237c2befd06a1ee1f7d6a179c749a6b53fb970eba38476c075852bec1bbd38faee7a927fccd22e33b09fc70641a5ba6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b