Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 23:18
Static task
static1
Behavioral task
behavioral1
Sample
ff7a5c8b4d7d02bde144743316c0f044_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff7a5c8b4d7d02bde144743316c0f044_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff7a5c8b4d7d02bde144743316c0f044_JaffaCakes118.html
-
Size
69KB
-
MD5
ff7a5c8b4d7d02bde144743316c0f044
-
SHA1
e0cc93ec19c0fde14fc5ac7f597cc397f79925f2
-
SHA256
14979995aa8a5222d4a460235a9c53c8181af1f4b55e95bdb9eef63eb0afa682
-
SHA512
6ea3823939f6261b08b7272bda6dd727c03b86f5effa40ae107e92d87a50cebe7bc75e3f9162dc9168153fc31ca405c3e50b74fb3c0af1786495163dc27cbf7a
-
SSDEEP
768:Ji3gcMWR3sI2PDDnd0g6IdRToTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVG8sB:J/KTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433813757" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000085adfb658817738ff9fbb2b2b0d80b4176d2c121f77b95644de9fd7d402d5b50000000000e8000000002000020000000a685d3e126eb8b5e4a91f7732e139235c662c198a4b22165a1ec19adf80d6cfd20000000f8e3caf733862d1e233a05a19a74f8394e4bc58a2d44845498cdda48f56fb15c40000000e7dc7a6a232cb331e1c502145cd9a01a000b3a43faf78f6609149a09329c4cacf085929121d2d0cb431a892bded48ca0615d92be475a02ce89664e6ea9c50d09 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{170CF771-7EB9-11EF-9FA9-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d229edc512db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2256 iexplore.exe 2256 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2332 2256 iexplore.exe 31 PID 2256 wrote to memory of 2332 2256 iexplore.exe 31 PID 2256 wrote to memory of 2332 2256 iexplore.exe 31 PID 2256 wrote to memory of 2332 2256 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff7a5c8b4d7d02bde144743316c0f044_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5367d12896affefccd26ecd2514ef840f
SHA1d278ef4229324c2d2fdffca47c56daeae5386811
SHA25603ddace9fb6ded44e206ba66d5d16d23c32b83dd31d55cdb7c11e0f744588121
SHA5129758bba72ec4b7f062c88480432c2a37567230ee5c41f444aa78c5c7dc884064fd85c156ab5988819bcbea226d960ded5479b85e367309fe9bdbc5d3a23cfe07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ff64660e8f7d4a33e128cbd0e06f1a1
SHA13c0c2a25e4924b9fb4379a6f92b1b0464b5a07f2
SHA256fceb2d5dfc71720c30e7a6183e51184353ac3580738f5011de06c98b545a24fa
SHA512a6af3e0798dae8e9caf01596e568990ff6fafcf42a38b747bbc0987b1e51e0a91cd0110f73ff27e8a3c7efe11eb422f889063a4c87aa0925e75ddffb5a6f4143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8e6a74d49b8a2eb64a685fc659e30ac
SHA1ec8f59f30050d858ae693338e5e7ab3218de9f27
SHA25632f8eeda7612ea48095632485abd87506bb2621d185fb5aa4eb35f4c74194324
SHA5126bb1855a221b1587e5ec4299a574a92a4967d7ee1d6c62739e6032635e8c149d5e5616d6695d5ff1313a7c2c931b5cd4236bcf05f9b6352c8d45abe3515ce541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ac2386fa04b8da075674846b6fee3f4
SHA108942d4970165645c4d7f84f21a8d43124ce5493
SHA256e204fd95cde8d9d9e8d5acd285b1a8e664f8776a20677fc70819e54c9008d420
SHA5125f1e2e2fea98fc3e533be1da538cbe840cfb6a5c87b8113eaa9ddc6fed66f736b5a57621084589b08532fbba006cec3148b79cf52de7b314aceeb7d9727c8f17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f4b73cc10edc1f5d10ba569c573e8d3
SHA15728e93604f4998c6d4b710f48a34a0b7b978a52
SHA256aabd3f762c63a62e06768f0e315108a2683011e6fca1921549a384eeab5c11db
SHA5121f4859b9affd301268eb83c96cd2c15de2e40cc834ee6f128266c777d407296fc45ac7799069fdf870a7c5c137ce2e2716466b6a9338d55ba3ae97565b0885ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e679d5f155bd943cab20f28241867a7f
SHA10b79fe805033172cc065becba427a3bc728c9191
SHA256919dde756d14b376d9d6e78a6f99379a48c12c48ee9f0bbec9d6bf7ef2be3ac9
SHA512bd8cf12b52a6a80181b26387e71fce01530db05a46dab90d66727a30def94cb09c581c4b8f5594aa744ff1350ecc0f82a135aa2d51c96857b9e458926ab19dcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf1c7201aaafc3a8d793f44f43934c83
SHA15a31cf07a24df56149cfb98bdfffb4d6d61e7b01
SHA256cc9f95bb83544df091bfd6f5ec89566f635bd6186765c5d9afdddfa02c12f339
SHA51229aa3f1fb1217b6287e8d31d5b0c6eaaa094362e98d865d8aae27cc528230ceba3bc8bef9c379c011d5529c40e2ed3b5ce28291ae6d4338d97d2256346fbb886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae49ed103484905b42bad3dd3c7d964c
SHA172d7ac3a60f938e43f27f98a98660802609112f7
SHA2561814720d6ab06cb847214f670bb0f3fb087d37346128252080e6cd18a671e82f
SHA51273e77216dbd3835701c64f32fd51c03993b0df4ae995a65df3f9eecbc8b840bbd013cb73b85c1440d1136d976d1da160b87cd11ba17e287daf301bfa3bbddba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591645d7be9532c3b3c3f2abe69e061ce
SHA1479404097d5ac0e783b51ba01d9062a9e83bc16e
SHA25654aa86ab05df86e4b4e6ab60b89e263b70d014fc113433954dcb8b7be1c2dac3
SHA512bc70037dc62018e0432cd526dc06945c04d7e64f2a6375ce5b7331c0463dfb88c04c2c46b8629597038344b5bd17da7fcb604b69e746b6a6fdeaa9a5fdf652bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aa052f9b7163de5acea8c972fb973a6
SHA1e18839deba4ef010e50d9ca552e3a4dd195e4354
SHA2564cbd4df78d5a23cb65543de9e0c94dfb642a2a13ebc7bb22e05cf8f7fe0b5cd9
SHA51222de9a019160440e595d3462ea77bc66495d9762c65e78afa95c38d24ff8300e654c7dae433f14be917ed032d507d60d369c0a0b0cbe1e3ebe1f1be4348d3efe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd2713bab3a06355cf6ac3d5997beeb
SHA1db7c39fe57805c796719754d23f214fd3088767b
SHA256b2d7ee21b3a19187f29f7ed8d05fdf729a7450324cbb41939254bcff62bfeb8a
SHA51229e8ac8ee9e3477b65f70b0ebc506e4c6c46d682df96d5993ce434ebff321b1a8d818e58aee3da81a0e300488ffde7a23963a1c8976e8164bed288a43819a837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506bf30bfaaa4b879e0858cae960c61a4
SHA11ac018a86714c11beafc5097b10a756d118535b9
SHA25618c2a1acd7d5f0d4061e828a9aea83f713a8b8d57b69c91bd40c344bcf87fa70
SHA5120c0943a00cdcecbb111deca7ed71b9ccca367e8b6e45030a6bd8098763c795820e672dbdd12b3f01f23c1457c29640a44a6a461392246744bfc1816b59062fac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55539c928bcd8ba745fd3765a468fab01
SHA1d5daa1ec472a6d22ce6beef1b018d9b5c0c83c9b
SHA256ff05c677f7f3700f193559abbc6f0649e76cf1637e8f7a25779bb3a6033b1d5e
SHA5129d008ece31adf4fe85868336fbcae10727ed8b585b5ffc9f169f7b98104c6a3f947f8ae2e78a71555cd4313369de9b5d169687886044221c733dc0dae02c87f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5319794c63221ce8b16e2ea4eefe226
SHA1603c3a60b9187e516f71cb71737558f63dfa0dff
SHA256f6fcf2f27c7b887d2ad1e1a45474a31093146665bcb7b70a4f7ce5c97de0fb0b
SHA512bc78cee6399189325b004890e040d051a50ae1a225a777f806116ed83fb2ed0749db4dc14f09c805200db34648d5152a8b36f043e7db98f78b7a3ed6a835bc01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5264d9e08fa5e7e27e496e98722706072
SHA1de1c24e9d7e8747ad624e5b7c690796f0b52ca6e
SHA25635096fb8186a41c347496f27935e839b7f26a4417459b90a6a3287a76cb62709
SHA512d4e0082637ee0a5a9366a0a671440f3aee17c7d4b3dabafcd9934f5a7ec538022141bbe5bc53ec7a87835175445de28fa6ca6ffd3efe24691ad9390ebafc1b17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56188b27fe4f314197b623d6ca2351867
SHA12eb02859f616609b8dcb524dc7239adb2d19cdcc
SHA256023d7dee7c5c835f4084dcf6056291e3f8510cbb88822b5cebddbf44474ea0cd
SHA512c4712c661b57b74d3ae617b3dee71d0df62df4c5215850faeb4028b0c38cbb3c3db6f5360098498b53ad122c6fd81fe8df7cdb60fe58c8d4e74b09124714ad0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5989c88a6e2292acfb7cd12c75f8b3e5d
SHA14f6f20e96bb1cddd0742223fb4a8091c3ae06b53
SHA25670fbe8639d028cb0299ddc041f760813e9f27875ee353e0e1a0c9a054022f6bb
SHA512c0c695ce44a18504949979a2f576003811daa733c4e216c6d5a63357b5bf69ac75de41efbdf9fcb214977c5e3c7d2501e66d42acc922098efcee8a42d79d3a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569d7344a04867317cc1523ddc0c8c2f6
SHA1c2b023e3d83aff17d1f5e159e0e6245a4a81b047
SHA256ad899d08ab3a9b099beccf72a546c7625d768477357d6474e66f010953237801
SHA51238ba4f77a965efd4b9dbf3a6fec86f327ddd9b209c736e19f7ea355e057759b2ac9ac0e0df3c01929b47cd94519e9cdd1dde5b4697ba9e640eed8a9db838aff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523caef7e32e742f3ede2f016df1c1f9f
SHA1abf39864b303bc69333a32c9115975e8667591b5
SHA256eea6eb40e4f45f9669899283d9308582b29bbb9d860a35b62d9088303e83dbef
SHA5121459ade366c0946a256642355abe4f40fc9642a1896181a26af83261f8e0e1dafdb333dd8be2ab65e6af791082306f42bb84fb217775f56118d6ea6978c76f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5063827b7c75c774ffa2fcc96fd920669
SHA1bc6a68e73825163320ae515bd3e35b992bee705b
SHA2567eed0fa8a216675536998f1ac93b3babdf911b3c30c949dc5359811b48815fad
SHA512e82957b309ea8c1299d6de1d8816c8e38a7eda6b9e9643d94927ecde26c9d364eb5ff580a79a074e8eeb7ffe1d0826adc76fa4dc3e9c51a67c28cdf97f73316b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b