Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
b5b5c2e857d5d48be02894c8f2d4ed26_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b5b5c2e857d5d48be02894c8f2d4ed26_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b5b5c2e857d5d48be02894c8f2d4ed26_JaffaCakes118.html
-
Size
462KB
-
MD5
b5b5c2e857d5d48be02894c8f2d4ed26
-
SHA1
c52be70c1f3f183538dbf8d9e2d9a8b8c4348cf6
-
SHA256
23726e0b4135c53e1065dc1ba448f6614a7b30c844195f6c1e9c05f56a15044e
-
SHA512
713775abafb80b40c86adc34c1f80a553bf252d7b9acefdcca2889937bae0f81431583a9a651bede191e10938ca2f4209593ed8288ed713b2f3a3666bf6a1814
-
SSDEEP
6144:PXsMYod+X3oI+YVQJsMYod+X3oI+YihsMYod+X3oI+YusMYod+X3oI+YQ:j5d+X3i5d+X3+5d+X3m5d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000d0c706eedf1ca59c6c1aa205f5288f4c58d36fd7b2355016c345bcb96b617130000000000e8000000002000020000000bd5bb8a2042647c7cfce48c0089fc84e24de0b270ea9ffff3742abc1b994f03820000000eff7ddaef5d529984d97820feb411352b8492553c12f332de3e89ccad61a0a3140000000cd2d8e61a91d7773504bbb32facd82dfb33e1e2c202447b81bf761027be143ced3e5e885865bbc7dc28d02ef18b10f68e70bb6c942f3e5a1314ff5243fc6b863 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000fa6775e56a8f5640fbad36cdeb53e3d175886c82e98d654a5260a379587d2357000000000e800000000200002000000006de60d004b4738ed210b3d25fc30db6be2bb4c19272f7c84943c2f848def0659000000053a8d06b99a53c7fad581b5b7cceadf8de757920183a23b902eecdbae1615c8fd19318ad1a88f224916e522ee3ccb5a62ec318f61eb6ab928eea8386c8fcf5aefd03b84bda2120905ac00120b117ce9ab974e4b7f1943b89f61e0d7e605acab9f8bc7013e47dd1da75995916bb7115256093cd7389ff079ea5d7d7b770b793dca0e9c7c47002811a69453452c98de9c8400000002539cbc18ccd27cd4f63aa55dd177b02d43174daad016fb9e887228ccae37833dab8aad099da3888e72d2435ab4fcac54824b87171977cad764ef631dec1b7a3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e297b643c0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E20D76A1-2C36-11EF-A13C-DEB4B2C1951C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424741838" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2988 2844 iexplore.exe 28 PID 2844 wrote to memory of 2988 2844 iexplore.exe 28 PID 2844 wrote to memory of 2988 2844 iexplore.exe 28 PID 2844 wrote to memory of 2988 2844 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b5b5c2e857d5d48be02894c8f2d4ed26_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5990b5c9b7ee30e9fb22679aa3b49bba9
SHA119d49485cd21510f12291633260a9682f5132fe4
SHA25639fbc4766e939e16f6b23d426c4436aa2de2613e6bbb45023a1b6cc58b775392
SHA51224c89a0f2ab55141f550e0a2f969d1a2d763862a6e92997d04a4336f1f35a0a76e4c2373c0c14f8ca36dd8c4e7531474143db3b9f2209f914e722d90b8217db6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596a2c1d358de88f7d9f5d6316f2ad860
SHA1f17b97fdf5557dc77fd6e57f9de74e7f9c1cc358
SHA25635e2dfd3976bf28ac6cf74042dcf986b6de590b1aa37dd8f63e1162c6fe68b1b
SHA5128a8d647d7a3e38ca1da4bfdd378fad515407a426a4928d773ca0a1e061b5cfbb78280f8bb6b642630ffee996e091ccb7444d388055e4157f624e7763fd13d00a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b20aadc700832865d59125dadaa5babe
SHA14a59b3a52b2b3e0cf63e81f5c5ce5bb5ace1a840
SHA2565e0a188368a390b543b0215d2e440e196143a20038c1abd064dcb4eb32e97259
SHA512231454484327d01780e1347bc8ab23cc8acde767697656b3fe9d6b3f1a0e658cc070815bd8cb997fd942bcb8162a76037d6e7307c7111753ef3cd57fba74ab07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576f3d82cabcf3857deafaee880f737db
SHA193d3c8eeb96ff0eabbce580a3c0282284bfab90d
SHA2560a088bea724a4969d72b32991a29f16cf03e881391952453d967a01e654b9a35
SHA5125542b23fdc1f1bb63bb24d4a9ed55bca304253628f60b0401456d3a0259c9dc23cc1d12f628abd20c5e79bb51119682dafcac048126cf86222265c6f9b789c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f6b0791fb5d33807cd625d77d5ed954
SHA18b46fef57d316a6134d7bba27e89168c91298e11
SHA256a616a33ce729840c8089053f8e93273b0a984c4969a90c05c1d59137ed60c8f9
SHA5122067a19cfd25bf828a3324b3b2d6da8b999a537067325d4917e2a178fa4ef943c84f175c7b5fa41dd167608f4d18232de946de39bdb72edb2eaad0ca04ecb599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5847722e33446590138aad1987f1f906b
SHA15544d5c792b39a801db1a090b0ac2b74a2f512c0
SHA256bfdd27718d83b21324e35c8655affafdd783c6caea2047fe5b5ee30a7df8787a
SHA512b9f09aaac345e9d0e8c80d5a87f20ca49a802eeb4cd604029247e5a4351e3708316812b5da538e348bc0c2a2130dbec0c8f7c74c7a572de719ffd9c25f2717a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f718bc77ba497ee59dd2ae1d3dfce95
SHA1090639111faf08a6721089b76858d3f0c609dab4
SHA25679dc4c61a013a2d71cb856eb5f88fe0ba8c3769262c8df9b1cedff3baaaad5ba
SHA512c495dfebec74594f4476134ac06a69f343e214cc08c9761385573cfe6317a065c023ff816e9a36c9e366ba580553f8b6a24d9c9949a6752afb02f68038961ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0dc39aa24cea56795bb34c6616bdaec
SHA1b607eaa8b3ea2b62bf228525faa0bc4e4b1f3b4d
SHA25626ac368a5e3873c7258d0e07a569ec8616308c65763bbc49e0df538e410321a7
SHA512f8bc5a90a627c5f2e23ec6e51bbbce4dfedd6e58c17716b501ee7b708386d30007e9e950e19b791d6f8e44a0cd4e630da21c050952429705bd4211b86d1a8777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53664379346ad531529b4bd99ad7b9ec6
SHA18ea4ad42c25e41378c2fd8b1e9ab0d99fe04e71f
SHA2563a42501268bceb3ecaa605a86b2c31bc0b58cbb1cc797fe1dab35768d5312878
SHA512c1ad5bc303fe46ce06d0787f68148b7d0cafaf70406ef95d72cd542170c0e6c5b6cab62b25a7017a38167b9143ad58aded31177f3486f19f0fa6f6f02e99ee34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a34b7b9b0746eeb91126c301f86b649
SHA1d0679f142ddb738b117f37d4d9754573ae2ff9c0
SHA2569b2954fcf9576233ad1585ba1c8541d15e82f9ca2a0550ba85326fff5e460faa
SHA512a644fac6b32238d6c4072d4729c9aca38c0b96f58471baaee93aec4c606f0db596daec8d204ec1fd5f4cacc6f76f910b71d246e2ce10f83000dd01ae99f845df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b17cfb1c25e07975da689b34a3bbeb1
SHA1a6eda696d602ff61475b23afa1aaaa03899af232
SHA2563b4922c1fcb278842befad74fa89892fefc1612f36b80ec7ffa28236fbbeb951
SHA5125538ca5bf3c015c7826bb84f7b1559983715e2b452aff6e042f3154fba2963b90c92498119d21730ab8e2aae4099169b67334b8b85d4e931221f41b86545cb44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a344a266e476b5a3b3d0548f56c79df
SHA1b1a5218919fb5dc4261d2b8ddc919cbe853a2bbc
SHA256b6577b47931d3b1e30e846f28a31e9ba200b7e3b293613d373365c9cd0dccc4c
SHA51246e67aada58f20099b2a417c832430286033370b336b39bf69fad2617820797f763f52c674941b19713fe9d8fef45494598a5ac0ea04612cdba0a731e9e97654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b4c99d5a70e402ae7f7f3d586039b4d
SHA1a41cd63fea9c98aeb6e6c2947ba92de3985604d7
SHA2567aaddd3e51f5b0d2d1c1aa694e26a7aa88cb00c1693bbc369e2bea334e15092c
SHA5126e4a689c9ae978df940baf483f09cda929aec060cee025ca13d76c2d0554abdabb5059b822056aee012cfe8fcabaecee5226db5a62b1ee31bc9cd937e870ddcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5663604657d02d13d31fb591996c5b3c8
SHA18eb5655d8f51b6757639028d961818e9a7215779
SHA256444ada329593a5cd7105d33184357c6025b9debaf16a41586df69934cec763a2
SHA512c2f09f240bc0dd5a38183db0e457d543bce2ed498b020b0b0986f870fcff796d50995968fd0ed565ee1ec4bed9c8d0690138f7713abe2b2d3ff9178ba8e4bde0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b72d673c551727aa9942f7b933ebfd1
SHA15de84b665239e272c92653cb6cdbbdd622bf2de3
SHA2565fef20936569744a2df1a68aa8a9d1641c420e2a86ff5452ae043abf654cf4f9
SHA5126b24da0cf9b0c6b1790f21b0e2106164bc91384f21e6527c765120f8fff094ae678cd7dcf9daf5ba9bb281242aace996fdb162300f3887777658fda32dd4064b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c9fae409e77099bbe8b69b394322ec
SHA14414a0eda448dfb4b6bfb0997433166680a6168e
SHA256eb96632ba454f6f906876fb222db66f90d0e82274a72537b595cb3cb745c12c4
SHA5124068c292b4996255d40d35e194bbf4b8f987c96890b8c3cdefd3ea17d6098c6b8d54e79478678900a8712ddf1d0b072e620d537f9ce02a8ecbe7987c74906e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570bbb4824826fbe978bd429076eed35a
SHA1cf4cddc7695309f4a16a4f94c3584e1c76c4cbca
SHA2563906069f7de97a0ca097f380831d44f4d34fa037cee7d9064296679f2d83278e
SHA5126752b7bd6b1b20495208427e99a6b97b9a9295a3bc86f7d11f2bc58b02e188eaea5739bf05df961dcbcc2726f326b0ab0e0dd8d6484ba31c51227c513cd377f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516116c3928cce090c2e986def0b6ae9b
SHA1a3aa8d9255427747d51c024f18f8a5d669494ca6
SHA256971bb30e2b571ab2063b20d7f3bb1df73c45fc565e0772a9cca2816aa980dc57
SHA51238acbb3a9697f5b6647578afae06497a8f572fd0b087b5bd69b358f1c6cf891c9f3ab994ead352fddfec2132dd944b2d4102739e3cba895d54a0e9131ff6a867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d7fe2ee7c6babab790f3195b22839cf
SHA18fada75afe17585b148ee0dcdbfc88d8a0d7d409
SHA2565ad25a1369b6d555fafff4f721696760f04d6fd9d2faf68109833ff0fa1fb093
SHA512b4c745932cd2b45dd02d04b323a0821783cf8ef7d989fd47f90e9c32c04ae63f96eade625806073b0146340e1dafd6836009163597468953b3a11ba8b695d05f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b