Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
116a35913f000ee691a0b6af0b7dd64d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
116a35913f000ee691a0b6af0b7dd64d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
116a35913f000ee691a0b6af0b7dd64d_JaffaCakes118.exe
-
Size
461KB
-
MD5
116a35913f000ee691a0b6af0b7dd64d
-
SHA1
6b9578988041a163cd8e6c347afef0944b259232
-
SHA256
aca3075c77301ccf41e5a9c9bfd1928e349c2f9148a0426684abf6c34bbdd2d8
-
SHA512
b87ad0550a94265a711672ef78f8ccfd329d6d05a9d52e718afc4d3e747564bd6e59b521fde4c50fb4fc722c1b1540e32559a040bdef6291425c2467aea16f87
-
SSDEEP
12288:dLHULTl4x2z6DmGWT6U3ce/lR9YtDefzT:dTr2ODUhMJCf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 116a35913f000ee691a0b6af0b7dd64d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005f7c8828bcd37940b829aae5fba8aa3000000000020000000000106600000001000020000000f423dd8c5e894ae6de02158623e6127393938ec7b6f1735b9d69ec60c821ff64000000000e8000000002000020000000e4fff4fdce6db46d11d5fb5d597e39afab619e0a4c4e926cbd7973f25055a1be20000000a16b63944ee671732654df00e7a29a0018a4ffd359662ce8312e3c722777a9e940000000939e1c94cb7a8b279f73f7532dff99b910ba31b20096a338fc9b714cb28c35c956e98ba675c939c2184899c6a976b78ed012390df3557371e00996d4f637f90b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434169869" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A71A131-81F6-11EF-91F6-D6EBA8958965} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5030250f0316db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3032 wrote to memory of 3056 3032 116a35913f000ee691a0b6af0b7dd64d_JaffaCakes118.exe 30 PID 3032 wrote to memory of 3056 3032 116a35913f000ee691a0b6af0b7dd64d_JaffaCakes118.exe 30 PID 3032 wrote to memory of 3056 3032 116a35913f000ee691a0b6af0b7dd64d_JaffaCakes118.exe 30 PID 3032 wrote to memory of 3056 3032 116a35913f000ee691a0b6af0b7dd64d_JaffaCakes118.exe 30 PID 3056 wrote to memory of 2836 3056 iexplore.exe 31 PID 3056 wrote to memory of 2836 3056 iexplore.exe 31 PID 3056 wrote to memory of 2836 3056 iexplore.exe 31 PID 3056 wrote to memory of 2836 3056 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\116a35913f000ee691a0b6af0b7dd64d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\116a35913f000ee691a0b6af0b7dd64d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://cbl.toolbar4free.com/cgi-bin/s.exe?type=1&h_t=1&b_k=1&id=SU5GT1NIQVJFMl==2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da407211c47fd411936730711c55d98b
SHA1fe92392ff2fbcbd6d5026875b631af80c67c7579
SHA25667cc5f52ef22a95aadf9a62f5efdfaf0efe933441b95af6cd5aa9914dbd763df
SHA5125064852053dc83628533e7461ff723b73e0d5fb0b6ff4b983b6af8c20ff0e6e7ea239929b82ca79961ddb464f5977d1a742c81a77cc2f95ed21510f9bed7ba8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d78cfd31e4fd3836031974186f3fd3a1
SHA1fcefd7ccfc2cfbce1a8737c13a247a8ecf391d49
SHA256e479af4e6a1c0f0024bb5e6184e92dc446a0bb9afe57b901a09420dae0ff56f7
SHA512ae51a118978ac89448fb4f4129e767e3b66ca7e2a7de71146286092d69ba246be2a6b6153ccb907607d4f9cab141709884dbb350d712b949b0c3b41a1539b298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529136fdd76055edbdf7c7413cdb25c7c
SHA16b241d6c70e6545f9a166045f560094c60e8c157
SHA256fbda4cb9e74a58f70e68d2dec62cdf969360129e14d27f15d51bd600c87d9a7a
SHA5129af88ef3b1b67a325453c4a8d0ef9553c6b2cf39d34e60b43b519e27d8e84fc6584b4d341b09a8997aa76acf8135988a468ad56ea7b991c840d482361de81bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59807e7e6f6f2af128fee0940c6760252
SHA19e7f0e2b0a5ac61f411f67ec0e3685efb1e59655
SHA256411975df11628389fdd22a861bf62694517519de7b4721d32a62ec903ad285a8
SHA512877d6d8402a497cec41930b6eff6d6752e4bc3c494aa55fc40f0d0acb3367c64db4b5da59eea787f481864ac3c3ed830a3c4addd341b6d3b38a738ee7399f749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52630ad03e08040bbaf63d42c9275f317
SHA11eba5aa0f384c6f58864a0b30799bba335f16269
SHA256559a32be624e32aaf9c524142a57d7df834cd30854f0760e13bf59c167147868
SHA512625be3d230a782d0ccd954bdc3a8eefcadbe8ada67c607af3fa4a05172f9e76fd7b68f25ac672a882e610d87c2c70df988cba43c4ab3a29591e919f58a458475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eb9f07aa5c713b7804ba6be7b2ada0f
SHA1996e0cc9025a54f1e2861832716cc188b0cf5b73
SHA2566c51f6905c9fbcc5b6d58fa95fc015ef147328d9fe4f81aa49699ff86eba8c43
SHA51272c3e8377b894bb85323b5385a494884062a0154fbd0986315dd04d9b49bc84929fbd576e0cd43d7d870239ac39e69e08a867a9a04f1d42db3b200edfc60867f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f5c95ba6db172ed017a85b56aa01eed
SHA1fbde425fe30c104f63dfbc158b74cfd08a72f933
SHA256648fc9948519fea7d4709e8e4710fec6866fc9594c01655d2853c383d302fae6
SHA5129f30633cc9092f6c304bdb227bb13241d000c597a087f115b8c8a6489eff372439767d63a7d14f420dfcb9a14161a70c1e8d0b0e4007aca6718b07aceed3f0a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c18ac900595ddcd37c01df67e4f23e17
SHA1bad9b942a2afb3fb8e64aaad6def9fa4aafdc057
SHA256a26f05612ece1036082047e5a1f2d6d5a873eac184ca62ec4c782156149fa419
SHA512058e92d5a928ff3cd940809c3367d31e2aa90b5a5698ad8a44faf21647b6f8d1ea2faa5549f7e63e14e2d19cb6b72af4a5c7744757e2b2c01642629812c77037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534d5ed4de03214cfb143a522b3355d08
SHA11e15444b114c7bd704a8c985583d2f1d0734e0e5
SHA2560d0bfd090f7b937bb7641c70534c73a8bc7cc1fd2cc54f8e40cc0962ff4bb6ef
SHA5124a2f23b49d264aa7fe2430aa3243c9400fa284dca0db5d6f6e31d4a819eec6de45817dfef775cc5da1f3872e857924872d2b6ab2cd78eb9b97d145e1af3cd52e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5896a057ea3ebdcda4ce475dc3818903a
SHA14032a51f34f99c44d23104a34d65f27120f34f85
SHA256b363d7dfa18b95d1b6f3bf657dda3a0902dd4ca0f9ce932815a85c8896c12382
SHA51228d3b9032b63c34a899489c37b5522ca7f0ea4aa28f07dcaacb90a784a7aaffbb26a525ee733ff5795e172ddc4e19fd3030eaa69a1ec0dddeb70e58b40814ca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a966667bef44968325e21eed06e9bcb
SHA14bf60f261625fa16684786262fa71aed8f156675
SHA2569b77f6d43a1f3417a93a8dbe1ecbad85e9a632cf4334fa707bb623958143d90f
SHA512b96459492e1a239f6475cc01b560cf519cdc0975743bfb05a1a31f3f14536c699b1be17de4dccc44518c6b715c20d908713a69ab0973b3367348a1219a3428d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ba5c17f8e2530362ce8121518edfb63
SHA1fb307c58b1aaa8de63f9b75e015a27ab7243b9bc
SHA25698075776f66f13b1b9c6824cd782c50b8b0a13523a462002fa005c3bec2463df
SHA5121dde8ef1c2fd499d4fc3dff6b4ab05e38a911c18f1622ff22f08e52a262c81fe43583fb4fc8f5898c8a57474c8b6b9ac2abbb18d9c98011fc4c188a0edd34f27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a80dec7b03a4299d014e54175191be1
SHA19fa278f15357f9e4fdaa2b43d481c2a87dc071d0
SHA256fd42568c12506132697619712a7d33df2db6b04af665df545db2071e46506687
SHA512f992866f59ef67f3c1a3b779fa0400c602dabecd9dd386d1170b099f6af2dbcd42fd9c196fcfb052ecab916c799f58f232760be6f0701ab1eaa4a20241d49204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ff152a2782defb3afd774abc01d680c
SHA1579b58f68557d11cafc3049ddad7d6504c68c2b7
SHA256ab693089f75ddf184065c3bbfcaad5ec1b97794b4559dbe22deec8f58c0f4ede
SHA512e9874365646c4817e9b330bd204f056a56c41247b9ba29e681d9e508978ee74f72bc24c949f1bd3f242d094784b496a1237acc111e8674ba7693e86a55425d3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ebfe9204f0af091b12b4655e588177b
SHA13a09ac6055882696a1e0ed98c01223e47abbd2fc
SHA256d8b912642943fff059fd26e989c09db2992d001c8895d03ffb0c7bf94674c834
SHA51203355809883e9bc629f4a84ec937f909a52616cf5383722866171beb098f5d086d3011c602bb530f5b9fb76fe2ac3c9da551b8f6fb58b1331279f3453889d358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9c4c3a4cfb5dcf7991d40cf187853af
SHA1566911a1579baa9701ac2d55aa7b38e6c02310fe
SHA25658c4c287653da117954cca93fadfc48230e99b9876ecfb33ad873535d541d668
SHA512e7f275fdf5b6138008de7bed81ff648447f8bd3304e5b94708c48e16ecd657b95f3af2a2e69bfd6f671fb498b93d43e9b1635284f0ba457b8f1ff047ebfb580c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beb8f3c36ca1c0dcf67aeec254bb02ae
SHA1481747860d95b5f217fefa8e5a8168ba527a6a30
SHA256d0928b84ca2b47c62ee3f7cd3882598fe9d0ab9d770bd8bb6d43105bfbe52ba9
SHA512b15d6c6c92087dbba16ebe3949da22c9c771b4a43b9b795c77f4a50fcb3f8bf26d13f2bcd69eb34ddcd6442977231f7cdc386e757fec1d235a35ae159800572b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7236dfe6a366ca5dc446e0d981c99bd
SHA1c1e8e4f2776520ecc4b57d89559ffdba2a6381e7
SHA2569e00646bba0c4175fb5dbc23130ccbdd94f145a5fbbfa2786163a5498d0391b0
SHA51276996e42f2ed134738c04ad65e5222a61a3dd8e1f4f1b2d6d5cd706ae60c6eaed77bd4c3f55689805bbb73703df29af61f67fc05064f8d2a43c8213766453eb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9019d534192dc0c7a2e75eff004a98b
SHA1b8243d05ff769488f1163048d88c540a72df10e3
SHA256e86585203baadd8af3c61cdd1a730d854236c33d80f519c462751b787feb589d
SHA512c695a1b607d4dfb23b482a634e4a01446d2b5dae421554cfc2a45f4f2f0cafac4df2816c0b6953f93fdb3d23f336fcb21697c9bcf0cde289cef81fceb1ef9a84
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b