Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 14:18
Static task
static1
Behavioral task
behavioral1
Sample
921607ee1d034817b7fd1dc8e08b9402_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
921607ee1d034817b7fd1dc8e08b9402_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
921607ee1d034817b7fd1dc8e08b9402_JaffaCakes118.html
-
Size
4KB
-
MD5
921607ee1d034817b7fd1dc8e08b9402
-
SHA1
e3ec9ed79f6f3f6f4486357df4b4af41bec0cad8
-
SHA256
4b582a726f2f71b45bb5da025e9b1e82bec2c43c57923a98df62fc0cdb8bd45a
-
SHA512
4639d9e25b7bbd71141a65f6afffb364f99ade9ca64f07ad234bbe4bbeca2353c478f10c7eb800ddbdbc334568500214a4ebaf4215d78c374f4203a30b125f95
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oC6Vd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDe
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0f7dc0ac1b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423586204" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000492cd16b36869849990416e5337f67da000000000200000000001066000000010000200000002ac0d708239f5921cd6ae4b8e179ec8d2a7cd387d533e5c13d240636ad441036000000000e800000000200002000000059d2f4a44f2d287f9f22da732ec0de3a7784f67b65a53b393ecec7b7fe35f30120000000fe5a9479f0c7e54506449df131f31ad50f5742436802fc1086c5db2a6b597ecb40000000d63d92a3124b5bb602e5d30abd60b98849a713ec0119c11e558257fc1e862fe376497189bd402e3043e4a029322e0bc2e73557537f845bb493a5bd0bcf2b463a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36730C11-21B4-11EF-8840-6600925E2846} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2892 2268 iexplore.exe 28 PID 2268 wrote to memory of 2892 2268 iexplore.exe 28 PID 2268 wrote to memory of 2892 2268 iexplore.exe 28 PID 2268 wrote to memory of 2892 2268 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\921607ee1d034817b7fd1dc8e08b9402_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fec2f78bc47a9174844737737be5e05
SHA1a835ace698ab18f9857be15f5c45b0650a65014c
SHA2566f878126ae0abcd9db67f3df547db85ad378c9a7f54bd4be30e4953044a65255
SHA5125111cfaafacaf2b899db460d2a2d3dc3a248b6fd462cd35acdc6578514c79fcc75d1a8e6f99a8b69cf6124dbc93ccc4a2fd16743f1bc56e3414b60677a8fee0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c2d85a9876b60ba273c33722b37599
SHA1456adfed209ea3706b054d80efdf4d770c47230a
SHA2563d56b3191d72cfc219b52234bde8d31ea80a667a291930bc2cc96c724a02579d
SHA5129fc869cafe25a1163f2237000b0dbba5891878ade4e7bcaa36f9f429e132416b15b2ca0f82e0e117c191d5869aed32061ba70f556cf778450f856e4ecdcb7647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f28b499ed45662ea51d82aa67cd71851
SHA18b457e8dc34e10028a48e02efd8b662127b8cec9
SHA256863a12c7952f75aa1fe4df550caf390c1aaf797a48fcd3691e4975a08dfcdd65
SHA512ac73e1c6b75de04b92d202a36674ea3f96d6b3c7065a25a7e099e0143276917de646c9fdbb696e96b5158e7e91c832108548086d6d51ca16b0cf15828faf0d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a17f6ccc8718d6a566d1fef7e8b897d
SHA1b946631c3c358f253e1753523759e824537d3500
SHA2561593401de4e308a96e73ec1def774fb8381e707164cea36f640737e9e3841c5a
SHA5126602e28e6eff834d40d181e2675d1bcb3f6e75d84e152f4e8c6812a9e81e13410320a0a9c76f96b1bcbb269ba421e1096667b9c37575b714e1303791b88197e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce2a39752401b9443535058720ee0f41
SHA10920c13b753687d092804a966a69e2f1007425d2
SHA256f20b176cac4832d4f1672a000a7266f25cf214a1e049fc5b8469a2b74d7001c4
SHA512f4fb98a153362bd1148b403919e21017af995dc870743035db9eca96cb6c8cd1f08aec0514231b5aabec6fa369b9f8c90bf134fadbe7e5adb43d5fff01866ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570b7d3969d9fd5e512cd92aad411cb87
SHA1f68ac02e8fd60309270799b3818378d4bcc48031
SHA256b95fbf5b2c08d0d1d021238211802183cdc7a090cce56c382ece13a4fbf33433
SHA512f0a98c674102738e622892ccb1061612613d3ede1a7b297738169b5daefc71cca5fca4b22f98d8099ed6ff06b0b637ea3ecf57fd5b45a0a9374fe79553ec3846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5470aff3f4dda0e84beb830e6265043b2
SHA15afcbfc6c15172e18695f947c7885e258cf9d51a
SHA25631e9bf9650b6fef6475f145fe18b85c3fbc97b12932d1f1e425899236918335c
SHA51274fd5d449528c79dfb8b26c055286ffa05035fc9e7420849b304dd653c007a0a2b51a30d508fb54631f0a03e82d5d51f226b25a67dd616d6592416e4be1d23ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa1a16e5e761e1199cbe6fa724eebd93
SHA1cb38936d2904a528b68d6bec734a5796abcc4317
SHA25631ec5b8b7e8e96c843232a97345d750a479a4b6ed691676a9b3462946c84fa04
SHA512853092ed4aa1f49104bd5062392979b7ad61bd7828f211a054de5719ea056e13e203e0ba412516197b0847800ff47a47cee4b0d03d261b3a8c970195647b8232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5293f30215f16f0ed67662852ab8981c5
SHA119165f0790ce36df8e0ab0f74655d74eb7795bc2
SHA2566d26e5f63fcfc8511638b664ce3a1935d4bd187a1d3decdc409ddaab035b23b6
SHA512e8d151ad8ba1186e79740612d99eab6c37fb6c9613a1104c7ffcd7de08e35b2d012bc3538836483a643de29e74ba46dbbe37682bfb093d28789c778ac056493e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f1ffb9bc4f818dc975cc56d03d2d5af
SHA1f21214d173298668023d284bba407319c6774393
SHA256c996284996a51207acba473aa90fba6ef06fddb7f13c50ed0428a5f2aa10b983
SHA5129524bc22e0e3267ec08665cb32103a38078cdc45d7cc0a314dae8aa300a9ea36623137f11a9a677f45dcb5d9cf508fd2935a807fb3acefbc51dc0d649eccd15b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f1e76cdb1400be4fed2b3c020dadb09
SHA1b323d337eb80a733b72a63ff17480562609de190
SHA25689bd749a1509800260773e6dc93507643a003ddb393f532fce41b29acb39199c
SHA5128f8a8cb0eee9c5d3be265c668517df5eb9588e1195ae71d9df78d67c89f56e0da32b6125cf495542bde65c40ec8b92989dbbca796731deb82a53dde928372493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de15d16c4747cc23da9a7549906dc187
SHA137b080a531fed9f8f4ffb6597dc5aa2455b5b22c
SHA256393bd8127d5234af1181147d3d456e8531c759bb9b70a0313fa2ac5590a862ad
SHA5122d3a37125829c841b282d514f82ecd64a9973bf338966bcb006df77a306f4858c799b49ec2c31885099d2d0a049890538cf829d5c367f33a29d721fe6688ff41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f961f5f4461f8b8a2db37e696905064c
SHA15779383db0da2d9f72aeefb5c3e1a539c7af8ede
SHA256b79ad934dc852592fba301fb873c35e2f5a61b7b9b0e4245ea50d66be6cc116d
SHA5127fabcb45eb2866cee4ecfb11540721ed6fb5ae4cef91f5a40f950248c41d488a3edaa873576a39ad1fc4449b6ac15bc3008bbced0cf01c47e253b1080af295d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538ba81563baf98fbbb6e9fb579e35b53
SHA1f4eff177730a2c97268a8aebbb3f16f72dbe5316
SHA2567479ee90d1297394501c36070450b5d488b023da6617267d2325cfbe2ee78d1d
SHA51293804d86498c92dda00fc5651efda2e2a021e56077c8f0742515fbb017a35e828119e0a4ccb2b6712e3852fff3018050099482e35ba4ce407299020396d1e4a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5204f7a661d89fcb04aa7579292c28f82
SHA13c4739c1059222ca0245075bad6b2c3e7bb0fd1f
SHA256a5a76750b46e2b8dcc6e20155c45cd01478f36928d1e15baad29f9258d90c47a
SHA512341cb4234cbbc2f2c9304145032bb63b8d5513438c3a3b1a5ba0793f2c45c00a534fb741ad841b5c1c13c3a98d06de776b71f07efe5de820100bbef20c490363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c14ac0b99a4d4b1ffda9f0ebcb1ebc1
SHA19f862ed13b9a85311d3985b485ad3bdb3dad33df
SHA256356823b2d729d189eb27bb9cd0ff98d2b8635f192732e9ddd1ce3d79f9e6a975
SHA512f3ebe24f78a14948e2a889ec9dffe0c2658fb2a35460dc2036ea6508d863bccfdb4918ded322af48b27963e237ca3cf2c2321cdf5a4947db5eb18a5391fda2cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59610dd39e21a45acad9f24096a950bec
SHA15bc3cffa3fbaaa0ca0bea07060da65a8b85ff96d
SHA25613db03ffede9798a48f7b53236b6273aa5620f0c721e2dc9984936fed6e10bac
SHA5124e8623bbeec77902806333f9d20d00ab5fafff8ebcbd264b593227840751766055429f64d32bcf4f3e91ce77f5ab9c2bd30eb2e21ec92322d8239129befa961b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5210e38563e71caf083a32d196c83a9d4
SHA1fa630f8043ff331b8cf04616fa276f118b5e7cf4
SHA2560a24e26365e85429713f755957170610b732eb04bc1282b2fbf6fe06a2b92d94
SHA512d8507455692c76835392b58c37afcee8696a3ed2e7662ea38341b3b60f72f8ed4d5f84eb533a3f6a5fab810f9bb53d6b54b6f90a99550df7bde10482a936b0f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52479e7af01c3e0ca2143cc43ffbaa833
SHA1c3d16b2a27b38354f0977478ff8676fc072ba0b3
SHA2569480b9ff077cb357c69b78e93c68e3e8df4153f1e346b31fc86343c8fc05b7be
SHA512687b74ebc8d96e7daf50b8d7ea2c0b64287aae918fbc5f2c8946b4d9dc04df7bd1eed5dfc7818863890f572e6b6f4fa4a2a38302b579772a02648ca5cc936bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e7089974169f8f1f6bd0abdec8ed10a
SHA1b9c61186b327c5caf5a28cf6ba16337954d81073
SHA256a3911d14fa92bf4932b9b67577495fea8cfd48f65332e8e3a5cb0a73035c9a1c
SHA512020decc74cc63978a5b8471bf2fa07c7f1a5244afc76311873b8659ff7963aac88e6ca7fb34d46d976da5fd175f30369598b2322a781c96b3f33a1892a29a527
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b