Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 02:02
Static task
static1
Behavioral task
behavioral1
Sample
03fa8e9d6640cc82e4a4131ae2024a30_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03fa8e9d6640cc82e4a4131ae2024a30_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
03fa8e9d6640cc82e4a4131ae2024a30_JaffaCakes118.html
-
Size
53KB
-
MD5
03fa8e9d6640cc82e4a4131ae2024a30
-
SHA1
2167a63523a16c37ce27212ba30fbefc71d49b6e
-
SHA256
bc81a49a34f75f8b1ce5f682bdb00240dc9d847da033781878a17e5fa6b593dd
-
SHA512
029ee7e3be64979f965c3cb745884ffd5a91e35236a3ad6bce42c69acb8b77b86ac97be8ba4a75db33cf069d7a3bec042666e64bbf0f1d8d5230adfb86b827d1
-
SSDEEP
1536:CkgUiIakTqGivi+PyUjrunlYH63Nj+q5VyvR0w2AzTICbb5o4/t9M/dNwIUTDmDG:CkgUiIakTqGivi+PyUjrunlYH63Nj+q6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433909999" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A140E41-7F99-11EF-92B3-F2BBDB1F0DCB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000040543a2828c1b1064782424c8f6ce2a969a365386f0469ac2e01a466bee0085b000000000e800000000200002000000063fa381ac987829b0417c8c529e0dcdbe2804c8f3fb2385a6f8a26b1e67acd7d20000000ac268ca24344bff3cc2a4125aadf732cf9a6aa43c83e36505674e6e46a2aca0e400000000ed271119322d8109e081a3d24446ae95a17b6e4060c0608573c447a3fbaec4fd06e251d8ec49a08d6eaa794046be3e1339bbaac49c8a6e9da1c927b5a0eabff iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a01900a613db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2664 iexplore.exe 2664 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2852 2664 iexplore.exe 30 PID 2664 wrote to memory of 2852 2664 iexplore.exe 30 PID 2664 wrote to memory of 2852 2664 iexplore.exe 30 PID 2664 wrote to memory of 2852 2664 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03fa8e9d6640cc82e4a4131ae2024a30_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8777410f37a3641f2b30dac2cbb715d
SHA15a7a826b6662a34adb80fcc2eef42954bab21da8
SHA256e9eb87c17bead8a41d89ce6beecef2c76e29328fab389df1d5880ce5aebce021
SHA5127acb0741d97ba904d7e79398fb56527257afb969d9afd59c12eaa8d3a32c30e7657289ac97cdea6809e375d81105f075724948876f37050fb08ec244f80fe7e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d71e20b55303e1017bf78915275a902
SHA17fa680e456b09615178452392e1b81ac5b758dd0
SHA25621af9b7f5e37afe40858a61bd4c4efab58a1f9b680e2ad8915d1cd7680201ae2
SHA51238e127b203e2d66a488a639c3a7384682fc1eeb99760a26c7eb39d38b3e33faad02b23b892fa4dd90c185506cea016efb614ae3fc0fbcdeafb722b4e189c1fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e908b05859784ffd974421b45a9e8cb6
SHA1f576b71bb7bf0d2db14488038ff0cae55edb6759
SHA256e31f27415755e46587200e23ec28ad0905dda3daac1e7fd875350830b9e9ade0
SHA51299bd5ac0dfa90127ed543598b613c6c1a01c7dedd698696a46c496f9e3c0cdb0210ce3e7daf1a387c6ab2d38e39af0cc3df74d22678b4af4d7a8c66b55b14d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9b1561016ca5c72f4b10fd86941491e
SHA11a469e0c900776860ce68f5107519f82838cc977
SHA256f17780d28334a836e24c62ee84b5ea75c6650878474d16cfbf1f8dcd180308aa
SHA51271e550e67af8f68b1406a30aaeaeaa55a6b4a0351b51d4d406ea6b303e1b852296183a5be01d2817259c88358693a8174a5109258e389efaff2ebf5f91c9bea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575f1b1a994e3393f7d79769b00887346
SHA136258f07e52b4f4935273393c7c512bc1b90510b
SHA256538bf360cfaf999d224e7a12556e7d121c674807acca900775cb635cf34594ac
SHA512e6491f9d321aaee3c18131e46d80815202c6b5c7c1895ee8fa5c0b2832cafdc872fc3a6622a5069a3e4554f487da9eff942181840d305fdb1434877ffd3c1056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5470d3e81eaf7ba1ab6fc3ea76fc97a83
SHA1dcdefc40d9b44232bd332686882e8c48e010198e
SHA256a49da50f923ff81ba1f52ab1b081cc93a2886856968bf8548e6da105783dcc2f
SHA5128cbb5582b5148564fe89457f017a410e153338bdb06e3c0c53179534810dbc5056b5cd0ae7f1cf1baedbf35bea55b774e523ebc9d4ee8ac0cf1ac9e55b174879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535fe94cb49143acf6b1fb005b1ee64c9
SHA1e94a5f09a41fdc54f7fcdef290cc7d6c364a5eca
SHA2563ab43d66dbc4e70d5fc0508b66632e5a8f3f041e7c72192c489a10d120f9e81a
SHA51289527522f3a825cc0113bbd77fcdb48fcc226eb6f292fee5667d52081c761b03d1791af24e7deec93239fa85b51722ad27627d2aa224a2b072ee17f1ca80dde1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e6df178e63e1ff401370c9cc8a9a5a
SHA1607757bae4d112c910bd55cc5dd05c5cb71c15bc
SHA256556e3c806b135b4c31028b153eb4fa894bf02ca645da6107982dbd7ce6b3112a
SHA5126ea78ccc882e27c56662ffd351600d40f41081ef3f540dc162bad5e4e875db3dde6a0ad4997ccd37b94236c045ea55d387f7d3d22ead6f6434a4ece6b904a31a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515011ccd4cb8e3cc3785dfc93ab7afc9
SHA1b9153f96b535619e27fdfc98bba560d8505f3b77
SHA25612e2bb2f6a4fac4969f718fac99ebf9bae40ea4b4730da1feb9863d3adfa3b88
SHA5120771681c219f948b4378f249ed68c7cf66a0605ae3a6ea584d3d91b62e7714e40af4c57396f16eb06737c862a333fcf1f93f591f7ff7b6b79576b16e5080ecf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ab66981cd38885affdc4038b3d6cfaf
SHA10147efae0c0d3e5d9f1d9996240e1e9f83b82d54
SHA25623b7a317c00f2934c7a015f4cc8c3719f7024d5cc59e3965fad8f2abb89d1261
SHA512eb7878470af25965c71641f8c75bfe03c602523c0752c1bb7d218e058157b0b2de64911e3a3d43cd449dd9cfbc15b3f753cd565cba929d0a177c2015f31112b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564ffafc1f181ee2cbfccc5efb3b4c9b7
SHA11ec654f0cc334ae0639ccb0f6c45338127482ebc
SHA256b6b4901c1321857abbf7b8cb5530ac1d3c7d28f832a8df6b0816e8f1fe330676
SHA512a6a537e6dfd467a37a558a853af8e8bf2fc794945e403d7e4a87af1a829d92a42f66ffe1e1007c5cb9f726a2ed51728ad54d8fe0ad1b5862a2b514b3400e8558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fb200407958331986d06c2f6b5ec921
SHA1dea6a9d490080b75d131bcc246adc98eb25835c7
SHA256f85847fffcbfe29ce9fa8c2571acbd362184967366f223c01c66002841e80bff
SHA512fe852004bdf6c0288fc84937c49afd8bf41d721eea219983b633d50659d6d3e77627b8e868923861d4ef0be01f726ac4d4bd68bd5ec17f4f6884ea965397a51f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b25af7052f854d893127c09b12bab147
SHA1ab89cdd93820f6a492df3497d0568270b4171de1
SHA256fb80b1838628145e8a91c71d1fc0e9a73830265b3f84c67366c26dc5fa458e2a
SHA512a7c19559c7bf8a5f0fc362572ab56e629fccb956916b6471c3df328850b01fafae903c5b723a1ea9525f8d057c728f6d0d4a3fd0f5bf2ecf4170f981cb13d9c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e4150ea2363e1a5e66bf4ae90ef330
SHA1d6505519db8e5ba505ff5576c5a2b68f30c36080
SHA256e575432ca8956da6a08a0274c24d3ebe4a082840747534a2b9213fa8db19e249
SHA512ca876b300f77faec8e3654e7f3f328871809ce3a9a5efca84a7e630f3c0cb83fa54e499b984e4a8484d28682287383d12af8eef2fa0e2a80ba8f93429e4fc1e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5865d75589664638b57353ded1a02bed6
SHA1f7a9e70ba63ec9313324d84f39b22fdff04e761a
SHA2568541b42efc942619ff1db16edf240f8c44ccd7d3b020f528eacaac9957ffa6a8
SHA512fd108c96d397a18c6bd3d197bddb53147db7b124b1284c4efe190d1f81d4baa98e14cb2f4ad9a1b4db54102ef3c4483991ea68f6ff1ed0b432a368814e5359b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f356b0c96a0a9ccd87668d6bfb3a4b5a
SHA170d87fd7f2297fcc4843bb8e66260c9695992a05
SHA2561233f559ff1bf2407024f9b443950d7dad0ccb4133bd7b874eed9efb520bda65
SHA512985dbe819adb6b1cb5e9d0d9552613859b267d91c971c06d3fe7504e497c24eff1dbf4caf538d4aceef91d2500612d403ab0c2815d3807f31047dbd21e963a96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560e33652d6d31bceb5539353ff103340
SHA1e298d43d405b013f7d3944b77c882af7cf70698b
SHA2569d3335e6c1b09f8f73224ecf4ef1c2ed0a7f2841d0b6a3344fea1fe1ba0e11c3
SHA5127a05e258605429711a40dbc4ce33f0039d9e7721b42d55ac3eeb5a74c7c874864d05fe12dfe73b73fe3c90555700c3bbebe55b417310ef77ab4862a86cccae8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bccbc62e864e32219d28dbcd56a93763
SHA138732995a3da749645050cc6f046e63b9b2fc680
SHA256419f28b7c28ab9ece27c25f3a77dd81aa874e1325d05d068596721ad3fd7c7fa
SHA5126464a69d4bb73c4b1d3920f981e9c448896e6327e77ac3c89da85d1b282c0d3a61405ae42b49d8b8445d29e36a6e3d652ece4e48edb32ca919c46387fcd8957a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f040b3612e4f38ef852654ba86912ec
SHA1d6b0448d58838ac96f56bfccb25b364437b7354f
SHA256be366bfb7f41d6231c943e51ef37165538d3a624972411262d63919665c0f4db
SHA512610aed40b1399066e1b57667a8927d77dd99a1cb84dddb388917bebdfe6ec4f7fe96e021443bdf5844c6be86844e061dfd3b228424438f2a3ac29ae7b7500b8c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b