Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:22
Behavioral task
behavioral1
Sample
b4f6bdd44cd013b699f799b34e7cc0b9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4f6bdd44cd013b699f799b34e7cc0b9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b4f6bdd44cd013b699f799b34e7cc0b9_JaffaCakes118.exe
-
Size
179KB
-
MD5
b4f6bdd44cd013b699f799b34e7cc0b9
-
SHA1
17a4a73113338e353105a5348ca53c68c3061c87
-
SHA256
e342f0e20571774b8f30fc44f477948d7bc293723536141a9acc60a9367b3069
-
SHA512
4476e11ebaa6b8a60d92a7950f1b5a3ea8aa61e0c613d8cc2dc49bc6cb67ee7842b1e7d03e6aa51dec7d704bad7d95362800e44ac202126354c291e1853c0520
-
SSDEEP
3072:ky5rphmCJmZRw91kjH6f+EDlSVfR6Waq1Y7epKOryJ48WG1OHfLiF3/V:RFmCJmI962f+wlgUWHY7OWJ48WG1O/La
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4f6bdd44cd013b699f799b34e7cc0b9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19127E81-AEDB-11EF-A58E-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000d6a76eb8086519dba21b3c881e0d67f3c8182ab11a93d72951603b9f6218dd1d000000000e8000000002000020000000ac0bbfddb2d1c056b9301934f97ffa33b7d73b8dbd2afae1b664193ed4381476200000001e06aacd72305b1b491e983be4d4796847b61793d6f3ff50391ad0f88633e3ae40000000c593858e8ec50f6b66a91017abe477ed6730f8f9a82c8866fa372b80a3f3318fea7de84ac210ab3fc46d4d6218619da4fe2f373bf603cf531635c824610fd528 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439106018" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60f58cdee742db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2400 2684 b4f6bdd44cd013b699f799b34e7cc0b9_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2400 2684 b4f6bdd44cd013b699f799b34e7cc0b9_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2400 2684 b4f6bdd44cd013b699f799b34e7cc0b9_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2400 2684 b4f6bdd44cd013b699f799b34e7cc0b9_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2312 2400 iexplore.exe 31 PID 2400 wrote to memory of 2312 2400 iexplore.exe 31 PID 2400 wrote to memory of 2312 2400 iexplore.exe 31 PID 2400 wrote to memory of 2312 2400 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4f6bdd44cd013b699f799b34e7cc0b9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4f6bdd44cd013b699f799b34e7cc0b9_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.bucleta.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eaea05219e11deb530874bc15b8b58f
SHA1cf52eac04efc779acafc9e2a83c593fce2ffc53d
SHA256a43b95aff126b3bc21ef03b27a22cff13e9011af2ff3ddf14485ff3e1da22066
SHA512e76683533a174a742d4aa4bd370a1f63d7f75ef33ec5d792ce3283cf06bd38eebe264791881d38836d96b03cf5367822c917e6f2fc8b7240ae68e04809957c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d8fc70d20ea0e12e17ebb9c709cb0be
SHA16888d60205557dd13f066db2671b80afb11d2ed1
SHA25645b526227a515e827d6e33afa73c2242455b11806f4c294434b64bce00187845
SHA5128287b4b82be5eeeb4b93b5f3c8cae1f23b18df6cba4dcb0010ce178a55f6e287c7fcc6b88439d19ed8f714e70b3d304bc94b881d1f83efa38f512ec081e95458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a8ffbd7693a924b761396d7c140c4bc
SHA10172b8ecac9b6e960e8d44d51c00eccaec44f87f
SHA256bcab027bfafe828bb87da21a1dfd024a937bb143649ba1890f1d90fd8b5f60a7
SHA5128d5c45ec29ba8839b6af5accc3946292f631c51069e5edbaebc58a3b6c1e24c928234b30f8ac02baf3ba4b6baa44e1164f18064998ef5cf51c692ccf9a65f84b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5274142e3074769cf9005ee0cc177146b
SHA127f75dd9ef0fee8200309685d4030b0c9bc57fe8
SHA2566227c53448045f6ea4f139d6516f66e16175633068892ceb3a052cf2094661af
SHA512cabd86cca3b6f419926625dc8a8b78ef800ca442943147f25db463a76483c8e195fa9c14285429da74181beb34208e5c88aaa778db1c3fcc3440fa646716bce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581d6ca359e62471a57421fa5701515be
SHA10b12b144762c1b363907cdab77c5f8564b8f060a
SHA2561227494deb1c6203425c062ea63a960fd8d8a86a973c1391d6428eae3984e749
SHA5125d635136e9f670434dd2310eb2d69aa88ddcc6b6ce3e5044f017755cedc99a177c18d1db2a91fa9170d4c4d53e4d7de7413177b6c096d90c0f7684a96a418d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b123a43faa0c05e319307a2cfc3c08d
SHA12de7903fca15b443b8f373517e463cc68dbdb806
SHA2563e83eba34c765843a019fde482d6ff5686d3edf9e123bac7dfb5b1c1eefc7dbd
SHA512bd57dd2a0d440497e78a4b57854909dff9d05695fd1fc7d5d35ee6cca4ed0e2f2f37743e618cfde7553ced87b3282ddf38391ad82cee3df0789275ad9ab39df4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879072b35651f03b82c043ed48d469fa
SHA1cbf0179cc46fe569d0fa37d85a5a27b7c1b2116c
SHA2567ad120402a6c538fd0d0eaecb8dfef9b2bfd97a2aad3d0399e5911c0a391f833
SHA51216bb9eab50408471d5b8ff1192ca70e43480a7f949d0a2e4d05d0e15c39455f6e9e7b89a69ff1c3f21fc5e576ede6f286e4b7f0a3de8225051f9e80feca526ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584f53503cf68f683e6856987dc711ad0
SHA1222e338167fba88da5277a9972a1eceeaf3a6343
SHA256273b6b50b3ba40b117066a2bdcc8d736c5c305752dba1f221114a804de123829
SHA512e00679dd3c43f55b871892f22974601a3d5b4584e9f72ae5ee4ab2a9fef7bb286a24ac922a6643118f6db2b9ec7cd8fd230fb38fa2eacb51b0402bac7e8ddc30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1be6ba8965964d6df7a139ee2fef70f
SHA1a98d8042fe0ba73a0fa510c75a4f3bdcb840aef9
SHA2560119e74caced01f60375736ec8bf63cc19b26c8bdfaa8cf1ddb5b02e252c5570
SHA5127362eb35f729402657ac0d1d72021073af41d5039b7e620f640120e62683169a59c026f5c8840c3a1438d3b25cd7aa10791c1d57410818fb198b923e06424408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f3578d5f7ae5900ae7ab1f72cc99b4c
SHA1bceabbf0cbf44f82044a2e1c2afc2b19f013a645
SHA256fcc5f42dc0219060fe2621c3dc18fd8883ab7fb7dd2df192311f20e92c2647a8
SHA512e3e68e5c7f9cb88348a606dc10f2c143432cda2afd6687b25fa80ef0f683699a3978f65f307b05016ef3ff5e42bda26c8cbf1ae6e856f7d1b581c2574cef2293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54723e743ae25087e3fc56bd5fb2dcbf9
SHA183e03f46a34d3e00fb9aee51c923cdd9b36b094d
SHA256618c2bc4607c27b945bf38f3495385997fd7bdcaee142af59e118edd8cc487fb
SHA512afcd1f0bd615b3aaa00df651ea6df7ca3dae2becfb1d7854aeac614a7437772efa5718c1df791db16ec75f943922aed8b09a8cef0cdb1dedce87898c4369ac72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1f7d4cf48e45dcdb1e5c940cf90378d
SHA1c4a736e6068ad95013b7f9d4599cf624270e28e4
SHA256b225b0f889e8eaa7de89c7782bd5fc87e7f55893a381d8b3cebaae570945ed73
SHA512ea03480d150ca04ce6787af379497fb3efe980b3602698653596a626fe131ba47eccfed9519702526acf5a3bbbfd2b47bb972556e195c1a5bc409bc8b98fd174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589702c4ef5a3dc9161e3c3ecce7c6880
SHA1e106aa23aa41e0aa77c8a1d0bbe9c1d40daf0561
SHA2562ffffad6d90e574f340797bbf437367b0d6c2e584998469267617447a884538f
SHA512bea942f7ca813c26e8a7e94ca9790028b25a7b0f7d20a5e172ec754200d5f652a2c00c3966b35511f8c689603305cb302f9fd7957ac5cc636ed76c4a12b7f3f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de255148fdb26043f96bb6a2e3c4a19d
SHA1c854fba55db9bae7c6677e907c6e3e2284dd6a3a
SHA2565febb0087904d6718d8caba434ad8b4469c213e5397ef3784f61fe4036afdaac
SHA512a49c24b10f3b7fe15228de55d93472b6531be01da0fd3d996cecea6c785403c153dda52beb10a2e5c747a1c0a6f1fd466bf9e696de486b87ff949d4a9046f933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd0ac4e80781455f107f27dc6da213aa
SHA10b374b4d10e5ade8fafaf4416fb123df55e779f0
SHA2567e274af3febf13dfd095859bcdecb0fd0422ac55e914ada57c29a7db25ec9aca
SHA512310a08a429047229121c0abb5854e2356d0f717b8de853fb220bae107f5dc35cc469a1a47ecb51b5d352024284c830dbcbd10d9dedd56f47ec9cd70343d61cb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e71be0c746fdfe83b4ca1e80d1d948c
SHA13052c658b4e7fc60c4f6b9d940943fdab2fa1718
SHA25680a60c6bc85ced5d0e6dc6b5e532b0531b9381adac4c4ae69ea79969b7145411
SHA512452dd08f3c68fa8ac55beb50058e931528ea277b720db0bab8a142d083acc5800752901a48faed6ef54fcf5102e24826128f3b68a5e02bc8c7ad3f6d6dd9245b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5914165e8a1598d6afeed41a5dce4023b
SHA128c6f70993da09b3b3e3d462997e783fb26b0afa
SHA256eee836016d520b20de8e4c215fd2ab97e981eadfbfd1f2462dc63a1c157ce600
SHA512e0c3b599e66aceadf87ee76146524e43f74c5de73f7d0feb5b9e1ce01acf36373d5fc56a541206af718367140ab5c6bee34f8ace8649a19c3b3169052e38c5bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56049dae7d87c19a3e96f469d0626e7aa
SHA1c015fbc839199d1a999c8b96f16e89a9156adfa4
SHA2561345fb327d1b021d573993bdf50cd7ae6fa80a6f5768e1881be7145f95f5ae70
SHA5121d7fa75d70349593b4a94cd3fb181736471e0b79ec7d8cf68f1967ca311cbca442a8b5db2d0e08c9bcd0977c540bb607a814bc21f43476ea8f5050b171b432cc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b