Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 05:18
Static task
static1
Behavioral task
behavioral1
Sample
fb95b40034b9429cb705d36f778d9754_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb95b40034b9429cb705d36f778d9754_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb95b40034b9429cb705d36f778d9754_JaffaCakes118.html
-
Size
94KB
-
MD5
fb95b40034b9429cb705d36f778d9754
-
SHA1
7eea45881b8f4112e686fd0404e1ba70b0d88a98
-
SHA256
f94f243eae76449af6d1b11191e1130db6e837463ebb71a6df660f162658adec
-
SHA512
37bbdb634303fa373ac89c5a328122f088bd36fe0b766b845453423da682a30f31511b68f4f282a92b842b9cd25458abfedc89d6b6f86feaa1571efa5b5f3049
-
SSDEEP
1536:WMLiNoaAJheTH6XU7LcEHc8fy+QyFLrthjZj3yLBdkrY8mgHC+qpEyW:WAiThGBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1BC0BC41-7D59-11EF-9DC4-5A85C185DB3E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000c4b760b6cc4e23215dd7137c8d82670e0ec52ff7946441b8edfb71aff90ac34c000000000e80000000020000200000007f7892590aec8941ab749155487ed90ea39139522a891775d3e1e4df2f0d600e20000000dbd0c0297dce666bf04d0bbfd002094180412f34ebc8f58c37b8d01eefd447cc40000000dca198a32045580bb05d9026f98e5f1b9124b181e23c12ce916be413c4d43ef050820114d46aefd2d538fc7b8fb030f6987ad373e4f4ea07b916c0ac0e932ae2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433662581" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90a8e9f26511db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1836 iexplore.exe 1836 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1836 wrote to memory of 2500 1836 iexplore.exe 30 PID 1836 wrote to memory of 2500 1836 iexplore.exe 30 PID 1836 wrote to memory of 2500 1836 iexplore.exe 30 PID 1836 wrote to memory of 2500 1836 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb95b40034b9429cb705d36f778d9754_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1836 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eff9f78222903094bf92d1c889dfebaf
SHA121c79b05cb863e74d393d0b1a1eeb1cb3a0e3a74
SHA256ede59c6fffdc4781426b34aa9dc5f42b65747a44975474bfbb8f9bd2dc68ac1e
SHA512cff806b994273f2bdd0eaf325e10285229181bb8cf90d6a3545e81ef94c75cf393440cb72c13d55b86bda4047651a19892ac13d57717050edcc6b481c2295839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568d8d9e76e99b608d1b201c268b22682
SHA1fc2d4e52292d2bf5ee29b1afd51af9f99de4a983
SHA2561683db8cf3ed42fab21b282919f36402c97926d449e57e7f9d33cce2bad4a12e
SHA51233b3682d8b9a2156d295e89d2bfdb5ed670659ebeff50ed2acef9dcbd4a577d3f034e70f95eba5ddeb3d3fb90187016370b819e4a2233eefbc8f680b6856284d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fbd84bff422be47816606bead777e72
SHA1d062979327f4127fe742d1f0204f20d6dc5100ac
SHA256f8ea2d80d11b9d74305cb5323322d1aa6debbcaec4671c473fff9e13af8ecc6c
SHA512deebf9c4ce68a14afe007eba80a655d9338738d0f90e60a9381a2d5efa7d0a3a0d61346cb72fea8fab24ac2cafe1af5ef9ebfd40d35e4dacd30adc741507bd00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bb54f19c33b0e59f68e192364e77059
SHA14badfbed846c265559e6ca1cc0be59fa6a612411
SHA256c751af064a64389aaf5a21b10ed272f7b83560dc576bd7361c875ee86e99be58
SHA51290af1feae2eaee685cfa5891022ff0bceb186f2641ed02e74154be9a37ab5d15f6cfd149451c61b5df2bb205b18d981399d5552a602b3a3cb89a7e35a9f0a5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c56a46071e20d9852561a5ed8fb5ef3
SHA1256e52ece9c82bb06da24ebbc3f58e50550a6e6a
SHA256235b4f28be54a09b3431f49175c1a1d311dd2740fc2bfb908908abd41f047208
SHA512650913b3622b8f0b04024221f37a3e3ff1ec35f5f266cee7be62e53eabb0df52e0818f1460da00299abbb46636ef88b5e3394d505cc93ed5e6b9cc47c5273a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542e4fbf450fa3edc77554fe547d76875
SHA1d95530ea78222febcb0d43f3dc99e15afccace80
SHA25651c22a80dea14812623412f75c603f49cd0697fca51cd150d70687a0b2daeea1
SHA5129a571e497ca59402893e5cb8fdf1af85539c3a76f471ec12627d8d5e1823de651d147c5f2b993c72f00e1992a132c0af7cbcc95298883846b1bee22bdb1e11fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d702ae068af51cdc3f75ec6a6a7f159
SHA156b211fb46c088ef8262461c002bce53338ebef9
SHA2567467a9045f089bb0e50334243c7ede1ceceec4dae3097ec0fa0a10c433f34db4
SHA512c25db547f80874525ef5621757e75614382543c1b9a66636052b0acb447a7fcafc649506dae526f32dcc04aeafddf88437a4cf39517931c525631d1f6de18fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e3dadcdfbd7dbf7cbcc66a8f6f56db5
SHA1ff5323251f03ce350e273377c45aa5309ca28ab8
SHA256878423386cb89311800d40ddfceb7707802c27893e1861410d8278fedbc46dc6
SHA512d7fb1e3c1f4db656c9e025d1ed10a01d3d3c3ab29b39f5ec3c1581213feb4bc2a681b2e40dcd96b93a596b200a770fe57efe824e8a51af0dd7d3356e64008865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b99f8e0dbfe135df2f2c979a1d43099
SHA1fb3250e16966c53c47ee6bcc41392663764360ba
SHA256117accc608bf9185db8daf4a987aaed86237cf315c8a34fb6bc407fbf67e0527
SHA512a2bfec6f70f6d21759c7cd2771a371e57f7080843ffb057fa234050b8fe10deec4a4b80e3ff9489930102168244b0022464fe3b35e867f29579fe334a0020907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d436896774fc388bdb2795f87ef7b26
SHA11578de2612da19ffc84611efa4adfed809408d78
SHA2565c0dd015e2f65b61cddc5698a402f2ead2633b9ce74559b4e18930ed9769475b
SHA512e16c4afc9535240f1f9466069b5458f8812fceb1253e0782483163a6394c6dc7c99776355d2e99271662eece2a0df9deb7e04f70a08532ded86e0196b9bfbb68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebe6f18f202849648404ba73d8c639fe
SHA1ba3b1fa97fbbc8520cf466df323911be0ac192b4
SHA256fe6a76d2c9455e8df1e2732773f29bcaa68008ac3184847300174286838b8063
SHA5124938b392b026d74b0fdb9f18eda4e92dcd71f3fd63626685937725046ee0dd3448b3158f2a708c0ec0464cdbdd1dc45cf34a198f3c678c1b73028d0ad471eb0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fd39117da55a8cdd20654b3ccaeb8aa
SHA1790d4c3a9360b651ab69591eb5eeace7a0de0beb
SHA25654e41ca5317560419edbd3b54e5e85311ef8e014c0ef435201e05e84a2a39120
SHA5128a9e87d8fee2d8aaa9e2427db43297b3920b8adb0796c96fd9628e4c8f946f489a8e197b3df2d7d64b804fb8a87156ac31e80d8f10b193cfe3f32be582338ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578bea69538a68bffac6c424baf31b051
SHA1598c7e84832d61aa77f8e571bf38186467a8e6e7
SHA256feb4ad89a53cf655e1c520f30fc479fb3df0f886ef211933e5aa78aad833fb22
SHA5127ded8271aa89713eb2000f9ee976a31672f14ed2791caf5929994ff51fc80a866b1995ddb070660e702a691bfdeac5362f7236e46724e0ad39699b61b119c503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c4a5737fa0c2ecf06c458ebdab430e9
SHA16b8b73c595e0febf4f62fd4e29cea68b725394f1
SHA256e60679f4a56ce8e2bb46022619e1fda850aab2944eccaba51040ec228e792131
SHA51237f6f5b63ab0f80fd446197c936040be4baea05d3d43511b1e365dccd2927e1edad7dace17bbe162dc6074bba7c8d4b3734cb1fede14d87de8b2a38dcc8af047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e09e69f6a29673f24da0d13feda890f8
SHA1a35c3b0e7f9cd9065b78c6999cd6dcd188568fce
SHA256d5c1b0eec6c3bfd6ecaecb1a74b1ad68aa9701af1f17450c4b568d1a6d002cab
SHA51292460b20c0333931c1f492ff4a3ad2533b87fc415c9a1fd2a20e536e83bb4f9741d8923df2a816abeecb4fdc8ff521c9d3a2a06bcb5197e8fe430be17c9e6c9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524b8dfdc2c2e808ca977ea8baf191df8
SHA1290f90d3432460b5b442bc13a6feeba1db12f6ea
SHA25642507eadebaa1d6d409e448bbea53d95545700cc6f8d8787337f2bae5ae8765a
SHA512f64d4e5989f8d23ffc35f79cf649f261f450d0e1b087a4f9e2b01a83eacc890f21c8563e644ae78500e5aac443f5ba9e66501d4cc1036d40ea4fd9237b2cbc8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a13e2edf9d48176910500872e71169f7
SHA1abfd8d045de4c84915dae0381d19f25336255ba5
SHA256dac92ef90b90cbc9f97778f6a4a2a5d4f5fc157bf566995a3998f39157b1968e
SHA512b92f77a65badbcd888c6628d389c28475cf416fec5b8074577ca054e3cd55af2183f85cf16e7c9a9d4b32b3e4a8a5cf2a8df1b97dc49710a75d7111a24f2c274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519924f225bcd2795707ea11c2f3c116c
SHA17c5aef71e9d7480447c11961d2acf5e8b4801be8
SHA256e49b0dba702a32edbf071a5a9d055f49f87f55dc35da08445b8558c1a7ae96c4
SHA512a7eef92a0479d1b40659c5f553357effa3f2025cbc8649792c0854aa6a9357256cd6b3377c9d431af8035cb90dc7a0deb7488897d8b0c808f305a0c269438c24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7ba76f72d4cc7b36cad5f1a78002eea
SHA11f4f5949d5a821bffb6cc8144b867bc20d9a6803
SHA25659ee19c86be236fc5b6f8894d577aad49e310d5952f5a479ca43c063d16352d9
SHA512281a80787b1baa72726bb62e8308ceca0bbe18e09d0f9ec3a561244959a08d4a2e9d4cc28be60a15c5df15d654104aa6b5493818f018a44a88e0434db10efdf3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\font-awesome[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b