Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 02:29
Static task
static1
Behavioral task
behavioral1
Sample
380590c60ac940bc504f07b9cfdd17ff_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
380590c60ac940bc504f07b9cfdd17ff_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
380590c60ac940bc504f07b9cfdd17ff_JaffaCakes118.html
-
Size
53KB
-
MD5
380590c60ac940bc504f07b9cfdd17ff
-
SHA1
db442d647b3a74136e2603548d4019fb054e6ef0
-
SHA256
aa1fc3faf7c42fe2cc29e7efcad04ab5020c7a8df646e90e6e99999d2ea1ac50
-
SHA512
5ea0703789e2b934caa3c306d851d11381b0fc04f423e0ba0718d98c3b38b531528020eafeea8deca7a839fef770e405ae65b9b356a2cc346c51d8dc7b5e99e8
-
SSDEEP
1536:CkgUiIakTqGivi+PyUXrunlYm63Nj+q5Vy0R0w2AzTICbb6oL/t9M/dNwIUTDmDv:CkgUiIakTqGivi+PyUXrunlYm63Nj+qK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000065eba5f48d412ef065067e229ef7bda4a39be8017ee5fd6bfaf6b7dbf2771e97000000000e8000000002000020000000e37ee8fb476f474c55da48cfd11e3bc7c0f86885be9505605dce5d8e3475a8b8200000004b2441e6e5a0a8be452ec067bcf06d0fbed6779458a105959be74760be9488054000000068c66d5a780857fbb67621359d76999855c2c5ca1c76476d160a95f60b0bcb4452655085d2ca22825dd731d0472d90e22dd48e9ad5ee3683302e82f1084c894b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA7D45D1-8841-11EF-BF50-D686196AC2C0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60b4d4a14e1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434862030" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 3020 2212 iexplore.exe 30 PID 2212 wrote to memory of 3020 2212 iexplore.exe 30 PID 2212 wrote to memory of 3020 2212 iexplore.exe 30 PID 2212 wrote to memory of 3020 2212 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\380590c60ac940bc504f07b9cfdd17ff_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4a0f5201810b077a402116df413627f
SHA1b88f69c853faadca7dd6e85b4bb77310c40b723c
SHA256fcced3b99b08ad83b2df960210522e42382ee9b06501b9dd7112742246106755
SHA51244a1d6eeaacfe48408e909715a5a5fbb634c6ebfe37c6d16b3fe4858173848a773506eb454cb0cbfe0f0f81472f15d381a3d434858d31b2c6282dfc3eeee9954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c9e81fcc8c9a035818ae08e53b4a665
SHA1c867d89daac80d905f2d07e123849c42b2118e1c
SHA256b15590e9290664aa513d878432cb7a43d814b4013395451674283d43b2dea2f8
SHA512f688941cd6ce76d2f27169406498bc2d374041fa3afc640daeb44dfe47191b9e255db68295fb223b88cb33b8c44285de4b1463cbce834ec22894f2e3b674a424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4d8f9da00964184a64bb1df85880370
SHA19e8094d2ee8f719c12686459655f8eb4a1e97a71
SHA256bac7187c984e0101e1ae7c524a6a2a318c457af40ca44096f8468ddda2ddd844
SHA5126492db63f822555495c34223e15f4dc89a9c189b70fcd50724203e7edb5b21d5a28fd94e8aca1e1d22626ff12ee630bd53294d23864e4b75dcc39a08605912c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc3845a0260b6b735e786f98f012457
SHA1e58c015c1954aac6c862a696ff31a44861b5a56d
SHA25673e271d72d7d40ed777b7457625113a4f4dd485096f30a3e91fe0aa17df7d81e
SHA512547ae035006a0462a27e4aa1daa6a495b6c3ab9ec9207c75bad2a5001c35fee3b17d3ad212da617548accd0733661ef6e6c5d5343e0a9f8d57601f79905228b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515fa2ce52695932a1c3f2ec4622901b0
SHA1758e9ffd1d238b0bfafdcd9f85478d3e5f48d497
SHA25621b8b43f190f830f59ca4667b20ee0a168219811d84ff3683dcb9c1cea78d541
SHA5123c6b3620cec3fdad77c159ed1fcc7ff376556e9e55c10476a587ac59e5fe7b31be076aea22df6b24c9c74b941047bc4ec885cc75b37a052cd70afe8fa930bc5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1b58fb902fffc4184b8498c74f4a72e
SHA1cd1e0c40e9b9b6e1f6fb451667a6dee80e543c91
SHA2562229b1c800b005ab1e095058db2eb7acafb4eadd41f72db2788f48e854e16240
SHA51264656b7363926e6ac78146fa4e79e46e867bb7baed3733103d825f6ed475d995b4b4c89c421fd82237be6f993cee27b9c32c76a1dc8a5a2f6c309d3c806ba0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec5f6af41c8a7d2f395baa001893c02a
SHA1f6aec10e62b0788a926964f3772fb4080849b2c2
SHA2564ae6477adc39773991c40b1d399fbaefa5e403d2b5c6c08c12fc716322a28e9b
SHA512491f2a2071cae24752e6b6756c90915af0bad160fee653825f41a34b66679296787c44b8a252e2e8d745517f13be2e47d2381360467707169e98632c7c9bcdc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef908bd84cbb07cc231064efd5b32402
SHA1d6d08d75000bcc109981c1652fc188ca465182ed
SHA2567421bf9cfb1605a5e32618911dcd2eb47a099405c8d53e2356b4160e7211953b
SHA5127ba2540300af748b5caa599bb87fe6683aa7f092ff35a7d50cc5a64f48d72df7a17b54877e9a9974588932d3cab5f63ffab0ce14114dedc6efaf12d2a0c2596f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd76e7cb1659a0c6a75215e9388ed081
SHA1c6f86df598933048ec0a863e3ce4b0a43ecb411f
SHA256a9aeef60f25536158708b5fb41ebabc55d2e92cbdeacd2b70b47e373ec604285
SHA512ecc859ffd57e617961801e44a6b6b34ad0045408d5ed7fada38883a48a9e4c4080ce7dd66f1a34506aa6473e7b7f131ecb8ccde3e93341d643d4fdf71c086e93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca15918336bc17833ee93e6059511e03
SHA1ffb7e9211a1fe6219883b4ea8b9c182c467a136c
SHA2565b0e936246a06b1ef48dcb9ef1dab492fb60dd0ded99d7812ffd34cb133ff1a6
SHA512d485e91277629fc53318981e00b3e84aeda9fc4d0f789afd5d1e1e82966008437f2cb6741cb9f97ec9cc7ba929d2068e62e7bfb90184b9078dc7543c7b8cecdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50332067b251fc9b6fc7642cfd6826f32
SHA1af7003cdcef280482712e8ecbb37a758212035b7
SHA256a2e0281494b81026dbca544b5e9ba9de09ef8c43148ab67cf1303818bd4eb528
SHA5123cf65dcdd702433b408e62150f6b05204cebb366799a2470f91f9e47e6e1f68015d53596fa642b7c4841b28165520c1a2c55c1d36e799ca827e22af59376528c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a163c9e89594be11463c8aece2437fa1
SHA1240765d5870e90018fbf3f79455c7ac7880ebf9e
SHA25686f3c10a1f558044427f53b32dcf74b09c753619af60dc862d45a064da02c7f1
SHA512b8079f05995050bc01c6d83bc7f404281585aa55712627bda899ddbb0e79ca4c66e239ef83c46a4cbbb789fd2f77c66ee22820ff4c1e56cdd9ae495184c1995f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daf5ca9779c8aaf2284a93ac14d8930c
SHA1637d852bc0523dd0b937e5716a64f8665fbdbe4f
SHA2569061c0acbb7dee966e9ed39c1afd924fa2384458268753d5d93753753c23e2d4
SHA51240fcb7dd4d1bc49cae930b1dc4581016924a5d6f7bf82f1900ca258c2b548a0f76a16cba9c5a1b74ddc32cd7432e590094b290fdc351e51f6c3174b44b1b88e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe272f266a2b9638d1f54928d9ee1599
SHA18b95a60a00f4c03f98c8620489a797c35b2b8582
SHA256b8ebfcf19230eabee6632971a14ffd0c4e4c0a6b3b64de4dbf8bf7b86aee2d04
SHA512e2e971f4525b3cf99ebefc132da19edc0a77ca474027df072eb6ed0a97e6e34944f7cdcdd44be26475d4f3cb05a6a1df0083836d99788fff8c6f3115d95c550a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5609f4da9a5503f6e75485bb518ed9f03
SHA10be625576f070beb4e35414496ff14446dfa7d14
SHA256fd726b3d024010eb50e7d9e4f00bd60cd5aae041ce8e424b1bc2cc794cf6ea4b
SHA5129c98c2e9a0d64d7c05b560e0825d36a4fdafe468db5aaa5db8f377a3b0e5293424531962604f1fdd6d67dcb62e18cf6372405f417e752fcc09b245e121bc848c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1c5821e68a47c405611b127d781dd05
SHA16f7bb6d2bbce533334ccc283bf1cbdaff319be74
SHA2563a6fdf37ee567d975cf7a85e027be414fc5b954ef91f4d71fc552c4b337d123a
SHA5128dcacdd0aaee040c77a338b2a573fc504f42b075f0f3f504788b613349551e09e3e174212f67d62f7c63b11983308f6bf2f3004d18ac5ab0cc74a18e0ee137d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f62ac25786e6a57d577634ec78cad532
SHA1a40f1bc7b0afce96ff31b60df8a9f82ea160a3ab
SHA256aafc54756c0ef0fb58c9407d8df72ffb7d2e7728d7aa6215fe835c34a96abac5
SHA512de6f1fba7e937c8f2e36db4d42b5001a0386014e6b219e31c15dad91e37d5c7875e93735af701ea18169cdac6f7030d53795fe7166767b85756b809e593b9df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5ce8718662f736b55a4ce9dd6c443bb
SHA17a6ec195489dcca916c167f7fba4114a6bfb2ac1
SHA256a9f82e1e0b896d75414e4ca48991c57ff2d6fb0663adead7c49019d173075a2e
SHA5123102e780e2cc8cf820d6cea84140c28a0e87aceabd0567bc7966fa2d9b47eb2f9f5eb0ce6b24868946195b2ac326b3df0a6cff9a0653d29b0b0f4f192aaaed8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5921f8f11e4a09397364717f363d36639
SHA1ad83acbeb6fcff13df3a5ffe393f496c98856d37
SHA256d6964815e4f0521e3c353a71f4929339ee1c60ee469836201dd709a47e9cf824
SHA512dc2a6e20ee566a535e1d4a321da678872a53996f5dc7d4503af7de3534698d1e704b36f8df8c1f1f5b8f1126dbef77c0e2a8a239fdf833fe79ce9aaf684aa5ec
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\sha1[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b