Analysis
-
max time kernel
142s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 20:16
Static task
static1
Behavioral task
behavioral1
Sample
24d9c3d36525249c6bea7ac7baf0956f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
24d9c3d36525249c6bea7ac7baf0956f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
24d9c3d36525249c6bea7ac7baf0956f_JaffaCakes118.html
-
Size
53KB
-
MD5
24d9c3d36525249c6bea7ac7baf0956f
-
SHA1
2ad199edd31683b0066fc0aa55c68d208ee2fdf2
-
SHA256
b21847619ca2d598a087a01335341d4734cd6b82e2c926c72ead1e7fc8340711
-
SHA512
448536b849f27c79c74a6746309aa42f4652438249df1e67a07a8441831a387a46f1533b99612aa760ab51e53adf6045b00519523084f1c87639847c25f82f3c
-
SSDEEP
1536:CkgUiIakTqGivi+PyUprunlY863Nj+q5Vy0R0w2AzTICbbGo5/t9M/dNwIUTDmDm:CkgUiIakTqGivi+PyUprunlY863Nj+qd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000ed5c3381d58fd1af740a210b69865536013452b0f7c5c2e0c93af46bc00e96fc000000000e800000000200002000000089793c9b4662987da8d23fa683bf241301a2682ee7c495dd00b69fcf2725639220000000e213c1a75193b759cf74b654b7afdc10575767b33157d935cbf36287b6e6968f40000000ce26ffa717730d07e32829d6497dddb58becdd1ad5bdeb259fbf968fc0a4657289ed993a1f545baa68da762942fc363e718ae2ab9602f5122d258983973ed822 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8807C051-85DE-11EF-A2A1-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434599504" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f3e75eeb19db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2276 2104 iexplore.exe 30 PID 2104 wrote to memory of 2276 2104 iexplore.exe 30 PID 2104 wrote to memory of 2276 2104 iexplore.exe 30 PID 2104 wrote to memory of 2276 2104 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\24d9c3d36525249c6bea7ac7baf0956f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fce2c74233bede621c267ffae7db501
SHA1cd7aa17dffb21979d51849a6ca8b3f7ca5b5ad56
SHA2565c24f57305ac33cc89cb1bd348dc0effa5a9e0a95ce218f245926c658ce8c085
SHA512de5c9d2ce965aa2d56eb0794302d528fac9ef14d6747a8f140a09cccb0f49b50b8644ba0d48269431c65ed4020ed717813bebce3ef5dcf2749966775f36d7fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542fa2cb23fc364ceffbfe5afefd8aa82
SHA1513640b286be220a5343db23e7e00390fb3cf6ba
SHA256bdbda7b75cf46eddcccbc7ecd5e342b105a27ef1455a80802997e5006560122c
SHA512896c5e068725c48454f6f734fd8a9f6c725317826c7a18b70f65c5b2dca5ac82fb51d59df470c92b0f2d7ee5bdbd43c944f464e9e3f8102258f39ab42ea1fdd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e166f99919137e3503aa0328697b8db
SHA13783ae6adabcc2e9d3c4e3be2d3ec73862f23017
SHA256552055148f57cc9ffb966c2ac03b2c2ed8bee39d58a6c396e563a627c7a9d8a4
SHA512feff9e9c82107ff7119255fc708bc8de3ead20708635316d0acf9728a84be048dc8dc9764ab833ea1df777cc6976132fd37d25136b61d1a70d008ae73232e5fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acc8cd66cb4ab39106105cdd27ed7346
SHA1e6f663a4de93ff17477263998ff94e04ec3962d8
SHA256d1ae31273b85cf1f7b67c049a4ab498e7a4404811347f1b3f145d4430dbc7570
SHA5121564592ba308d1c49f83cce3ae403d0e08558f36c9f0d77822b834d9794f9a205739419fde32f0342d8a8697790149bb53c3e6e41dc5114cc7647ec1076bd1af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594f654b26f9bc4d12794262d8a6e8b59
SHA165b30f627362baf53a403c31946adb1847e0898c
SHA2562699727601f9cff5a7de6602ee9f9e4867c0c4423bd2b65f8c923fc9e1a67874
SHA5125ab479a1d9d9f6c6e39a38f3c2651fc7acd63191c6925e90201ce76df36f68dc7ab47e02eeb408f98c803dc3c873b61b1bbd5ca24dd6eaf04c380e773f2c2de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c466dcddab512e148d1bc8a127cb3f68
SHA1e20f54967a73e86c933a293c45aa451a82ff0507
SHA256515e54d56c30b452d813933fb35a6f196195910bf89d18de756945c13e3b723f
SHA5127d96e2f4d0abc4b412cacbd2302bbb78b1d004e75e5a203ce70b814535224661ffceb00340ae8ee17b00c1c42102621344c09bef56ad3926fdeafc35d9c6aa63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa5b619e178af9fcf09888739fa891c8
SHA105454474a101704a28b07bfaeb597640ddad4370
SHA2560c22a8221b53084bd6f5dabcd06c65390a0cd19d7b8641043ddd65fdbc3c0894
SHA51249f9795fe972f3a0055dd4602c9ee8c2d36327643e3be889c1c8cd4aa33e91e5d5490961f77893745ec4501534cb4ad87a37b08d9a052d6ee43575a139ecb81f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddf2fd42ad0ce1c3a335ab574e33e4bd
SHA1660a2afced60e7e83b995ad6b33e4e5b6d3879ae
SHA2562b7e698c99a9a34cf131e88ca946472b80d33ed31870dff352b1d816bc7d7f44
SHA51282d0fd4b4e5e3068988b4fc962f2e0b2d72fe912542979d3e907ca739cc7c8d46291214b2e1d8d93a6c8b9a3982d52d7b3b578726301966b8fe541e36371d485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a01f34a8fb634f8ceb9fe1e49fe7e89f
SHA19be0e2db23501c19708543845e12fcc9fba4dcb5
SHA256e92f6551c60ca99a59df1e5cc47b2145e1679af952c1f0a85775f36d4598e08a
SHA512da11d93c695ca8a8fbc0d30edc3c33e18b2af8735829970be09406c4a293c8d4381d2a92cb935565ba745acd1918ee8103313e4ccd0c518f8fbf644cc7554a17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5118425433be3c068373a6c112e64ae17
SHA14c9c875505354762e73fb1d920642fc905100bf7
SHA2564a72863242f517cca915f31cea7ff2b4a6b304e9bd0c8448d1cee3b3860a5cf8
SHA5129833ddcf5d2e0e66d49ffc7601b98d9f8a114f3d337649d214227c535224d0dd25e4ccaa718f1debb3e903e2723608f4815f904101e7a5b4b5e17c90f1ed3b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9ec93171c489ca59d085cc8b1e6ae5c
SHA1272d49a417a66259ca9dc0d871d1b2849bf9e895
SHA256e24cdf53c5d413119dbb5f8fcf664d34db4d355b7bc7ebe328e8e0552994e418
SHA512f4fa84e705a35712534f5ddd2ea464db55d438b36ba6121e06d11c7666531f76da3a3470e1eafcb173a49a658dd7ce7fce2abf2342400729ac510c69ab439a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7db8c0f1f96b540ccbca4d71ef823d3
SHA144895153d6713b8e3ea4937d7a628aa1aed6ab82
SHA256453379e3e8dd90ce013f4dbfa3abfe105ab2d7432b836f62042f7f8177e5e9de
SHA512bed00badfee4b05caba1274a1968ad3cd846456278982aa91393b89d1f7b4638fbb17a0648a631b835249f1dbc62077840fb5e3d024e5192ce421917a244a762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9958999634a9dfb19b5b42fb329785b
SHA137978fafd6a843b2230c3a945e9c2e860bc95fe9
SHA256115e6572e61102d780a58a02dfa90afc4ef384e9d05a680b03d05b47207cac69
SHA512ed9913c9e2a9a947c83be4cc5717dacc7e007776c1e92a07fc197b4551e2d9d9c1a8589432030538b93ad3e71f6b565226066bfb9ae4822132ef41cafff829c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de38c6daa60a55fa80329dffe8e6b028
SHA1d96544ca1f84d04d67245e98f2082ca57025a6ca
SHA2564639e42def3c600dbd5ade3bf220aecc84dd5780358f0a663902b59342ebc838
SHA51292b3d464e0683231f4797b628b6da48edf94283eb2ed275cd0b1d7c415f74d0a31fee3c1be51bc6d4f471c4d3975bc41c26db6fe3fc6324ad65e29486f62e358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588530f9d5ec796cefbc8b7ab540880d8
SHA158b617234fedafd77a28817c213590c018f34300
SHA25665743235ee5ecafd0642bc2f9a49cce058294ebcbda069a1c208098ccbe1782c
SHA512db4e949e8498618d5b29441f7de1b84ad5b0dc2f75ddd043ca0a303c0d4da8ff408eaef62ebbd117188f2ca9ed3a58ccab9daa050470812046c74f3bd2f04d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52459d175dd44e79291577b9e2b3bdb47
SHA18616f9252846f4371b64db4776ad8a664a243877
SHA2565acd2f851cc5450203db5214492f7604798262322980b1d85f4d56bacfde7dda
SHA512455ae1a6fc3020f1765d52b47234b3b6ff3368ad31509a3d33d3bb89b6313afd69e608c513732f961ff3f77adb154baaf65067aeecbdc443ae7167530f7713e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59edc848e743dbe4f08f3b2e42257d329
SHA182fe4eb84b223ecc5e14d04f9773ffd01becde5c
SHA256e60e0d975b38ee830cb739bbf34246b6e81a258b1959a4ba169218f3c2e7a873
SHA5128d450d57c2d25e9f1eb949b1600dd36b1e1c21d47bc7eb8fbd22ca42708d7ff795ed9359e3df35b092cf0b6722745bfbf1c421babb5212551420d48f23fb0632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5165f0bdea8adb9644d1ae4accc46ef26
SHA1d9e43ec15d132145544283b0bb36f2d720fb861f
SHA256b24a9bc082a78341db01be02113c6a117fccb88fb1d2ddff6b5a1b15e46948d3
SHA5122314367ed0478c9a769907ec0db83b479ee174f0698eb4490aafc3a0c2674bec596433ed15c3507ebb8296e73a6383013c3b77f77f73fbcd56ec23a4a12c114c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae752d17227f0709333bf3953e0210f6
SHA1ff19f3c14955905a0fb21507e50e2b9f96cce8ae
SHA256d3dc5f667f1847f42460224817b5c2c254e4163cc19ff76af5defb3236d678ef
SHA512110287e3eebf52110027cb258486deb4169b3473c75f7a7d1f143163be6e411f1a968bcc445d9c029a9dd2096fe2c27fe6df0ab811a9936ce68eaa8662e8ffa6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b