Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
28ffb97fa9e87f004f1f753b93f585dc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28ffb97fa9e87f004f1f753b93f585dc_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
28ffb97fa9e87f004f1f753b93f585dc_JaffaCakes118.html
-
Size
53KB
-
MD5
28ffb97fa9e87f004f1f753b93f585dc
-
SHA1
7b0513737ab14c596d2a569fa688a1ae2bbe7d81
-
SHA256
ac5bd7f7fefb343b08a3c59cc6fd3c61136c873fc1935c1f248f4c1e3cf8d3cc
-
SHA512
b6aed4dd125f57d7392673223dee61b857d8dc4b74f8214004cab200868a65bc1899fcbe7d73d7fe1836077d513330d22f0fc354ea653bb1a942092c92fcea8d
-
SSDEEP
1536:CkgUiIakTqGivi+PyUUrunlYkF63Nj+q5VyvR0w2AzTICbbJovf/t9M/dNwIUTD4:CkgUiIakTqGivi+PyUUrunlYi63Nj+qg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434629429" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000003eb3e680aa6f4f8f0d99feadd24fd734c3ba8e8d6249ad5d835a7773d5dc1cd4000000000e80000000020000200000009fe55ff6ecaa94e04ffaa891349718e41434bd8554a2ac516ce62907660b75f320000000063c2c73b9e5c9e2b7f83fb056b88e5da0a1b5cb8b06d775bebfcb95866ca43040000000221831aae40adba41f33a8c4cc7196eb260c82eaed76c7a381c546c784c22f9312c573a7cea85a3bb77ecf29c768bc87e45628024717e90ecdb9c1869753f4e3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c054770f311adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A17E5A1-8624-11EF-AD58-7ED3796B1EC0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2800 2408 iexplore.exe 31 PID 2408 wrote to memory of 2800 2408 iexplore.exe 31 PID 2408 wrote to memory of 2800 2408 iexplore.exe 31 PID 2408 wrote to memory of 2800 2408 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28ffb97fa9e87f004f1f753b93f585dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52840bbe9d5ebc42b44ace5f40a24b281
SHA1526be2539412ffaf8681d190fae8dca37a2d5170
SHA256e666f7efa2cb198d241aa61573e368928ef6299cdbd3cd3e272ab184d42a9dfa
SHA512dab6d260a948a1b594c46ca9408b10c218fbce68ba2a7e1a9568fcaba0f353a14d0c2c33db154238570a38e9191d816ba3c56eade733f89aaf462c703e3b6994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fa066149882e58275c650e8d6b8fb36
SHA1bc9a466b3ba9d65d35868761a4af5f9d01d6231c
SHA256eed81ad566107ced58ef7a3dd637f500b40784415f625b0f3480cb971cc90422
SHA512c3362f97d80e7bbf7e91fd8f3349b40090eaeda3b03a33872e5193081245444e235a61ef2f2cde403c2dfcf4a668668d6b3f998d36794970ec24decff974ad8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51699e026b1980a0d1aef2097f00613a3
SHA13eb0a988d00382b9e17541fe0133beb599b2e499
SHA256b391aa1566bde68bd722b3b01feb80ec4dab3178299b56b0de85bbcf90aeec27
SHA5127e84e996208ab5ebc4bdf25ef42cf1fe2729ca3ba56e68bb6d72f4e53af06b6a5f6a521acfe26e5526c52833027f1e9bf4dc5120873c89dc0c44b9d52f165c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a0073208c115306ad2f85189dfe5a0a
SHA1d089cb1751646c8fcb883b2acb2c10612954d62f
SHA256fbbea8a3c4268de802b0e6264f85610fc1e81bfa7c042b27761414e97accf691
SHA512f7402dcf9cd24b68fd5c56e9d1fb486f4e8726d1be6045937ea731eee702bce44abff111d2abb075519ba29f06684bec007f7827ea5c4b4fe0de9d7a2a6744af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5539c438a06d535691702e54f79d9deb3
SHA1b296ea810ab6227c51e27c1d5399ae75938ad032
SHA256ccc0171d76f4de876f89f7bdf763d00579ad56733c8dcff775fd384f02c9e8a5
SHA512f648bc17ddc10a2948221c441372929268522d5d69d349aac717c6ad5f4f7ba8996c96e2cd8dd469f9a4f62bb1d67f9496872c4ed38b17446da3a4ce5d69c774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed9596d6421883d56214273559e3c605
SHA174e7b7d3b188d797ec81166efc1864ce35a0697f
SHA2564268293f4b2aabea22110b868299f4f8567a49ed0ed0e8397734f53ee96f3b4b
SHA512535e1924d5e7896cca3d92e2bdaf5ed0da469790fce49ae7b4aff1dccb89e65c68d3cafc20d1d8ba5e4399c821c8ef23f829309d56579f3192a92a910bdf4b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7638ba34080ff7b3b1e11aed625de48
SHA145770f2bb9523bdadf46625e0c42bda1159bb327
SHA256df8c6dd92a9ceccc7f64d18a81d5cd121c06abfb3c9b415775513787d4b4233c
SHA512bc195103a8dabe39d26fa190da95e5ab437a2e65930ba213efc6ea3211a6f0558c099e6fb920b6351ce2cf0c39cd8dedbe4139e012e988549a0216dc1475265d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da564085157330be086aaa22f82dda42
SHA1ab9bb535fdce04c5fc986b422da2bd6f0fc0f2f8
SHA2569e52cc48ab57f6d461414786c2f8af5d7437cc5c485192e4e5a35c7d2705a56a
SHA51212680c22ec51227fa6558daf84797f25c3b92dec1edf44c0cee74859f1349a5b71ec77c5f7b8fe3eda5e42555a4a7a232eeb72df800f181cd6c4f0603f74e66c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f55c7459f7c11a4686682287ff2aa36
SHA1602eb9230856cbed4c650d7f204e53e3d3613650
SHA256b84cad34b5459bc7ea159ce8281b09b520b1de7948d57c39066df68fc82d173e
SHA512cb3569583f13237e6d21f77c74ee3c1ba9b2ab04eb0b63c11191aa08d57909e676016b60071c9d24fea4e79f90adbc5d6a4a6afc959c0f4cad7031b03c7129cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52586bdd34ff0efbcf01858263a82220f
SHA113d604b4550ee4aae01cc8d07b49be3622c00747
SHA2562c7c1e08c453388ac5a2b73c848347e680875e44573a2d988c1c5f2b2f51f2e4
SHA5126b1de0fb52aa176dc081e2ce559e2835ea364281673faf9d4d02f156d2112c1645d1c21577bfc2975a16eaf83403774a4c5d0bd605100ce6ee9312b1bd26edd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0269f169097e508279a77bdeeb19413
SHA1e93cf17ba1c895161d2aa58bd894159e911d3793
SHA2567b505b685a03d055f7ba0c1e21c35172ae7220f71300c8f723c32d888d494b0f
SHA512c481fdb6b687a6cd7cd193d65982791549a81150b977fd2b7d251c5b5b7f077b3110b1f06954317237e001ea7127171a52602e48d263986c53ee2e0a517a901f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ed8601f29ca75ebe92ecf147323a0a9
SHA11cb7cdd2784469943ee0bdc0b0bc95c167e03091
SHA25621193ade7684ac5ba80c131d485c3584dede1c66a9ca4140fc345b7f7d94f0c6
SHA5122432876ea08aaecf1d03c0e60b3322164e78184b526c89674a0a16a35b221257a8b8cfa3c1cc3ee2e67f944e487eae3c5e70c7e1e7be3004e050ddb07fcb1d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f4deb4f6e030e54e25bee94eef75ffe
SHA17333cb4c8225d366e41b54caa1a89b66dc51d776
SHA2568552a17eeaf2c19fceaa9a722e9717e2e003115fd3acfefde0ce1039928dec29
SHA5126e5b151c17b79471a36b8d2bdcf56742908ce3d1a6c500179724cce30ef18921a7b7d6b77954f77b45069d1516e983860a054bef40a2dcd61f19ea787495c289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9a16a66907982afb0505a2af751ddf7
SHA1d17d5f19b64f8212f7537046c7728409563b02ed
SHA25683d96650772729df93da3bb88d185dad35d6ad84ff3f9c66566b5783cd1a5ff4
SHA512d5bf1a50b5188870f239d34911d195c46fe4a8d3fbadc59ed665e6392a111763495b002bcaff8311f8e46c9b038a03b2046c1e20f5bac5afb6514f98d114f898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55994fc08bf7b7ed6307e884079bac905
SHA1ae644e77ce81d02e92f0fab3241a1f870f8cb932
SHA2563faee5152c091ef2fa4c2889c56335737c0b00b02eab002001993dcd392203c2
SHA5125a19b1fef61e3d444a1e869e9e73cb8f99504e01f2f218f6656432744f28aa453225410036a51d80115e33c69e2763e8edab06517fddb0f3947f068046f11ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f288ac3eb755a1eb460956515f199021
SHA1358c12970a9205757553b87adb3747cf022238f8
SHA2561b989292c23a5b5c17b9751c7fa3f1e0d5ecd6fb0c98c761c7791f2d05fd9e9d
SHA512243474eaae80fa1e80eed029a3fa9a510190b9f6ce64dc6bd6a44f2bb3a05b01363994b37a90b4e1e9a4862adb98558894afc41740b80236c75e75b71df345f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5692d17de801ce074b1a0d2d79cc7475f
SHA126ef0fcef9a0ae293cf139c8fa1d160d3966864a
SHA25638b081f28260ae61df47886669e00448dbea22c9ce36da6d0dd19b6dc10c1756
SHA512353094ad221e35d15089804f363805143cc80272db1af19d0599fbd6c0b0baaad5759b8052d8d6a6d2c34442f63b3d6cac8402bfd6cdda1b5c400be9d782c076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5398dedc9260a9d0c16b56745d8a70fac
SHA1e7b0511cf295327f73f015fdc8b321dc7107e00a
SHA2562a8cee2b6fd8844eb05c23be9f0568c9814cdbab6e08e60bad33e3eac8a34df8
SHA512994896cbdc38c713df900ad8ed5d3ccd41ca5779b4a81834c57c4c36b4fde8257a97fcd6f42bd1b75051e9ddc4be25f1bf6fdc3d85da6f4163933e51c361a19f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531102418277cdce8cc438987c2cc574d
SHA10f7be23ed5d759ab6b291d78199396dd13f80a3e
SHA2560321d586aad2296566f8bb13cf7ca2848a26192d05325ad705edbc6fb870068d
SHA512aa56e7093f9d503b32ff4f23a5c75184f9574763ee84a773db89f14722ae2f73b245951d8b3be5b8d141afc0b4e41a05fbdf6a018db5eca0cfd8c36aaa2047b2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b