Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
8270f6ef4b57f8da6e50e0b072da6959_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8270f6ef4b57f8da6e50e0b072da6959_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
8270f6ef4b57f8da6e50e0b072da6959_JaffaCakes118.html
-
Size
53KB
-
MD5
8270f6ef4b57f8da6e50e0b072da6959
-
SHA1
a7793a0bcbc11088f5e5295d8872dcce1b77f851
-
SHA256
9f8ac9b076c3d506b306bd12e6fb40172db90d273d891724bc977cc05347b7d7
-
SHA512
061ba04e7c05fb007f2e2e12b4e0840116990860895da862b2fe54f510c869d9e229624e0eb7d97f418b5d73fd1f5e56d2cef00e158e6e2231f168e4e3f33b26
-
SSDEEP
1536:CkgUiIakTqGivi+PyU2runlY863Nj+q5VyvR0w2AzTICbbzoh/t9M/dNwIUTDmD9:CkgUiIakTqGivi+PyU2runlY863Nj+qg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000200d69b7b45478209a2ebfa3617dc9854e9d25cdaf4117a3f25866061ea313e5000000000e8000000002000020000000ac2fe5211280097d2c21bfc33c00b034cccd23ced68a839c885cc6137406d07d20000000912eef09ac98d492ac6261f5374bc3d1b8a83931f199813b43d1012d852194e240000000ff1dc19d3031bf6b022cf1cf09becf18930619692d38f36f73a71bf6b20f763485caff2dff1fd9f838af8b604d7988ee4b7dc93cf90786277fb42352ff03c705 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59A542F1-9763-11EF-BA5A-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436525712" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60df8e31702bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1636 iexplore.exe 1636 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2840 1636 iexplore.exe 28 PID 1636 wrote to memory of 2840 1636 iexplore.exe 28 PID 1636 wrote to memory of 2840 1636 iexplore.exe 28 PID 1636 wrote to memory of 2840 1636 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8270f6ef4b57f8da6e50e0b072da6959_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e20ec916ffcf182f013bee9eccd8ef96
SHA19c9643b21d60f4f9f0fc13186e0c6f1c24fc6243
SHA25672063770b79a7456d1f116c5799ce392807cc1f39e56f1055604e38c66b6dfa2
SHA51289d11dac38ef8ff8fd26be595a337dd4202e4c23646e1e888121b9a3a3c3538d0e1513d48c7fb5c32a5fa06cecceb7666ab93f7a657b21d07e6d96c9b863fcff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eae197019fc6c55d2a5b09dfbfb27cd
SHA1fdb4b58665ca003bdb29d9b9dc470f07a59ab16f
SHA2560aebd7662c580f374be1d1c54b5b8c14aeb497cf1075ba0b18f8812bb90b543e
SHA5123006cb42b6790a045129e481d43f7c5c896c24ccf417e6c9f40b4da107ef66fca183aeeace63480f5f5f5ce400b16705e603ea2b9f5de99927c8568cf8dff93e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc340e846c65bc402d9034a880a2d57b
SHA18e31888d0fce4ba6e438c8c722f743f402efddb2
SHA256345f6cd5250eb89f0c4c655805446f03303fde863350057bad5a654dee95d582
SHA512851c04173806f108703307d8e1d4c9cd12ead1bb1a4f5c0f308c51597deea8e7ef70634f57eebb6d2c7c8ed73deccc7ab7d3a14b38e83746d343491e870a2f1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f60e27da1797719858403eeca98789c
SHA12d8886f9e6370c65df1786ea29a4b2cf037f9c9d
SHA25674ec847bd508ed85b7909230a4b2c06c1d5820f437150b48a9b7220b57214ecc
SHA5129677efefb2d73cd08dd23423424a3aac8873dc18c36e76f362d2b4274e00b2a655144708f36d8326351a6077e178ceb83eecb8d1a0ea7fa56b030938c908090d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593bba675db98a9c6e2dc7ced590ead75
SHA19a65c188d6ef8ed741a05832b3c094ec36f74405
SHA256f3477f5e87d7196a75e1a41a1fe2599373b5c5d644cdc331d637da1de5368022
SHA5121efcff49c8383b28ad7fa390b3cb2b1a28e4063e55821ef4faf27345980ce9a3822beccfe96312a324975b55a82f29778c7233b0d831cbc5f3903410cb484c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e07fba5960032005f435dddad59d57af
SHA195ab868c065a7ceedc263aaad6f5dad1418f07d2
SHA256ef9f8fa8fd6fd8787c37351104fd72ee10fa0c0714639cd40b35b2bf87b1e60b
SHA5129ffe9070da0173fa30af60c7e648ec21d30a121d5027134347ac6c9b04a42f97bd28bae4da3a2fe85d256d5325baad3ce4c0e91bc332c4fd03d8b7a3c7e3189d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555a7fce8a2cd90847255503f373c7094
SHA1c8f06d7a5a4e38c9b3d8fabae8a39159281aec33
SHA256cd4f0c1077263b780b57eb831f52d6fcbd8e34728dc18848d2d742f972eb7a70
SHA51295fbd7179a1bf896d219da6130201a489434a3089fe719b5bb19e3a7f1d34bd3f3ba33485f33f46c122527e41c1019e7ff99671b223810d0651f3eca22e696b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54758cdc65df8be77ce4cad31d74e1fab
SHA17d452e0c5796c9ef3c6376acc35d38447e05007a
SHA2566273bce400d6a9fb03f84ccce40fbf139110e08c75d37c883e282233877efdff
SHA512583893addd5d555ff08b9cb1603f43e3cf9e9f8a9956d3f49bde14e9a572f2618e4d34dc52e897befdea17bc9db2f825d68e56ee92be4e4f942e305386645788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56022f9ea30d7954e2eee9fac193e6893
SHA1a3b7b4d837cbe85e70150d695db21cf6b0d1d41d
SHA25670b2e63931f2be23ffd78dfa9d30f5856567b5229eba5ce34136b938d5402f06
SHA512ae63e6298c64b899b7c7d931f9c1eec7015f115289c14652d3e3d30f358a177c96d80e418447b65e42e30d6c4bd6807fc09fc1ce5c6c817687672824935e75f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf263f2571230ffb29fb36cf728c7d1f
SHA121a7e8fa52552e80cf6798e9caa80833113b0ea0
SHA256a7e34061ac235896ce4705e08523f7ad3195f28738a9890a3ffc2fd23e622888
SHA512c5b2d54f7abb631be6966e11f51ce7a2bc4c41b62f9a6b80ddf2652dda91c7284cb53ea02a2694c0147d0d3fe81a9804148f893dcbb98bfcaab23340ddffebea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa11b5185f15a9d091fa8f50e18d8e0
SHA1df3ed1c20714f7b4a4efbc23e4ddd7deeca9be82
SHA2560d3965b79464609c79ee00159dde77373bf5ef5c30f18b386e811be1c1d99205
SHA512dea871a9f5aebc7a15cc2e8e8f062f5d2a7310757066a6fd38ddd11eb44d1781d130579480db078ca22feab41291d7e0f9b8c041e59cd05617c4e78b3225986c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cde6e5dd46e69a55c14b492866c4de85
SHA1736f351a6657ea92b3c33f27f69afaa063e80800
SHA2567c1c4eb9602544655e8ba3c2f5c1a3a3611b9ac1d18d116fe3163fc34fe465d9
SHA5129eb652492f23e8ee3b7afa804ed47a94444b26e0b35ed4b8b0c66f296c77b724bc81c9ffbfb43d7ee39518a0c883ee7671f6f1c2ec2ca72ada6e05350dce12e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bebba048d6e71e31274b26e55fa45eab
SHA150be222438bd82956bd95f60497c980da57504ef
SHA25633b6a6c5c6ca83aff633d2aaf889b7d07d4c86007b69855a03b48abbae9e9888
SHA512d1fcc8f6934742b3a88de312a57bbcf99de1c7da62cffacf47df6d04426d6b88bc4cdd83b2c9a290d50f2cf874c29e20480e78f1e102da553ce5083a11bcd698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd1119a0458a8cd455d81757940e95e0
SHA17d10f4afc6060dd931ea232ea2f87d8dd3a67f69
SHA25609fa8baa5b8699631a554d6767b201add571199b5efa21452a2dcddffc4cdc0f
SHA512dc25b8f981f57e25da69d0f64dfc6959cc9d4dcf056343cdf91eb21989106f474ed25b64b536607697ac278fc52b797b199aab140ec514fa0441561417d0e9bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5635b15a8e608baa95b1ed6ea26ee6579
SHA1d77aeb04e4eb5aaeb5d7915f35c0714e6abad24a
SHA256a07df3c8f4473825470df4c6971464fa6fa28e90e353795a7dd76563dd42781d
SHA5126c65681b61380cb2b40f1bf02ef9b86a79980aaf6eaf7d844f234a90d3f1a13f52a72ff0a5fd9fcd2428d4c1b1fa8500385c32619b2aa236e692efe6edbcdacc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5844f3be4384768b651a927442ebe4c1e
SHA1239889f4f008e9fe5a7397e98857fe5481cf73b5
SHA256aa2b1cd48d9fc3986c9fc9932de9682810b455856cddb0226778a28dcd54471a
SHA51231da39a8f63ee7164d5d036e8bc256a7165ce08fdcf893bab2d407d8f5db20b01e84f936fe99797dee6f1837914f09647507a365776a3d49b5c50e85e75630c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538b4ce4fdd214b73d9b41785574cd5e6
SHA106976ff147db5aa46f7975fe3ca5be2194e270bd
SHA256d282416b152129f18978f90dcc14da426df6f81563e48005df52090e61056326
SHA51299cd276363d5969a0f52d78dc5852353c2465eee4949fd64254c096c77ea90420cf5f9d9463a2259e7f1e394bfda751387b0f21a97070320d9a086a34f6efd2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585cb463a7f6e9536de53c0f0db6a3089
SHA1d5844f0041cbc652cffb08e6409775d71cc963f7
SHA25665863ee94f3a1b6b7d9c019249469bdf2139292cf129d410e9d1e21db7eb301a
SHA5127e11cbc79a137d57427be014bc706b1bda3bf9009e792b0e6e930c82e6d2d390f2ff927df7ed3d6fc3c2ec5ec6b021a37620e91fc6c4970aa660e53b17a0eba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512896cb17c6096f96f20908f05b50328
SHA13f7167696a79fe6e6efc1e97a85da785a5f46265
SHA256688604ddd6c79a8a6746e5c7fd93b74079913a6a9a5f72021a5b1d4a9ea8e4da
SHA5123a37c991264097288bd4e2d01f161b34d1b85bd5fbcab7553c0a0fb8320cbc3c7e58c1c9377c54f16e0430682f1ca8c7f445e8d961665eb759169996765bbbdb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b