Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 00:35
Static task
static1
Behavioral task
behavioral1
Sample
2a5cd5560176100b74bf36c8791f81f0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a5cd5560176100b74bf36c8791f81f0_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2a5cd5560176100b74bf36c8791f81f0_JaffaCakes118.html
-
Size
90KB
-
MD5
2a5cd5560176100b74bf36c8791f81f0
-
SHA1
897bae16baaada0895971ba06403496c4ee8ad52
-
SHA256
c90bde63ca67acb576f9888b61a798605b08bfdd0635b21767bc16e11a40c89c
-
SHA512
f9d42834ced7a233db21b7d71354e3957bfa50be05e5e9c73fb95fa2c0725ade8bbc83ad43ae41f1c0414efe22bd7f0d653e31a0b6a9aacfa9c7a6cc13505338
-
SSDEEP
1536:gQZBCCOdW0IxC5zJLDrQGtdkBJHaOEV9iD0uqkKRFWxkfnl2cx8S4q7V/zfAWa5r:gk2s0IxnPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000006553f25d02a6220de299069dd0464fd27042cbe61eb143d299d158f5c3091ef2000000000e8000000002000020000000d4411146d968cd5b44a55bd326410d9d886758f598690f2a098bbcc92fdbc7d6200000004384ec3fd6419c2e5233a90259d60d162c8b7cc8f7627c22f32fb8ea78c4735f400000009d59856518cb16e95d86f9f7445a6fa16a855d1279aef8515bea4fd546a2c9b5c74e58033666e34f2e21b0e7ef008dd0caf8653391136588bcd27ef8e8c44488 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0ac587ef0d0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000001d41d9effbb171ca74468144a9711ec7e23529d97b56a9667d2b06e119c65a50000000000e8000000002000020000000098ae2cd9f7e5ea385eaf9b2d48849580ff4cb7d17a1e3eb7feb0543a2ad036890000000ba653b4693d98f4f58409d1830314de23a38bcb266b6af9d07a3230fd28d303ab52983d62ab124e27e233d921274d5f99f426edb9e3e5d3e3f2108228272d88a9189ea4de247e31a10e38ab6ddd5386d1182faa50bfeae49daf557688d564551dbc0d532121646ec497b0bc271f97d5d5d9ef5adc09153f9e7863012504f3adad97535bd3798260f57c8cf83aee32b8c40000000cd797c40a299134b7f7dae8ffa56446d50a641b5a92ad2e829e33088bd66a122cb28e306339ff9647db4defb3c1b926bc912cff338931012988fbffd385bd3f1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6E02971-3CE3-11EF-AF94-46A49AEEEEC8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426575260" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2064 iexplore.exe 2064 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2104 2064 iexplore.exe 31 PID 2064 wrote to memory of 2104 2064 iexplore.exe 31 PID 2064 wrote to memory of 2104 2064 iexplore.exe 31 PID 2064 wrote to memory of 2104 2064 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a5cd5560176100b74bf36c8791f81f0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563aab546f6202a30bb8f2e4e3ffe7fc1
SHA1fb5e74b62caa4dc06aea0014d4fb6e3184cdd3c4
SHA25653db2d39f5e0b490ab82a38fc3f1bcb5d58868024f48104a07dcd0dd79f168c1
SHA51248c1e5b83da3bd0124f98826e55dc4cca5782b305255025aea037a9ed3fea0898edcbdb82266233e3e224f20bdccd3adfdb1323d8fcbf7e2bb086f5692b6011a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56825690168b2940608047960cb98b362
SHA1f0bb92bbb8ff33e3e3dd2fb5f070c403bcf90db8
SHA256743800f580e93d30d12bc82f474f6fd80ba4f186dcf9de8568f6cd133ba74648
SHA5125ee14ac4e506814fd332083bc9301c1a53c2e19e53bb3d2903ca8d6d61cae8ba353dbecfa7500959e59af373b43cdbfe7be63fba88e60cd784b31ed2d2f26c24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7ad395db37316e80f695359ce318584
SHA130d609f7f7d84c95ec1ba311c5b895c49c5dee2d
SHA256876115e33f70386f9120523bb1bae9b625dcd66f176f8a30b9fd2b028fb6500b
SHA512dd0e18447111458596f03801e69c45b0815010f58aa3e29dcf88b968f743d9bcd0ffb8f02e2c9c5b72d83e8660a3766df6d78b491e9f1dfd233a06a6a51e50c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f92fe7e50c2cd62eb2ee1821c78f8c1
SHA147d29149e53306b996ce22f7bc1e3b2d9399e5f0
SHA256a5b2306d557624de555e5c5425cee3f995f581697965feba486b6db3e8a6f149
SHA51289ab578ac2ff0ad626582907cb0e9a2b0c1fd0c81a84dbd7d5874df452791b0a04ecc90e799dac4f73a2b1c8cce36b2e02e26259aa9fc194aed6196b666eff4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ec309b8c0af44228129ee66349bf88d
SHA1463cab5abeec53dd2a72f65f61004b0699d488d1
SHA256fc212c955ee4dc1d7efab2741911beef0a73ca69c8db393ad3c127c0a24f772a
SHA512e77f2124efa7730d07d5b56b0f852230e510b9b6377b819f156c81a13948f0f25964743d2289352641bfa02869e1527eadcf5c094ef05ea85dbed71f7585f879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a383f1bd5eb8c986a5df4aaef0f5a4cc
SHA1c10fcaee2cb6afd9c5d3eff2d95cdadb4a7ce4f1
SHA2561ab7a0ae6693884712f9868761c7cd523c37649643c0e7d4f175b806a7b34ff3
SHA5124a6cdb8c064468aa1c61990904342e070259df89c11013a38eb948ba64a8d1438cdf08de7a977b04d73d49804b4de73ee69aa2a82c1be67d369ae22ee68f45f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd77adddc517459c6c8b04b25c52ef30
SHA151d05058d08a1256ac6b64584e9503d85db3171e
SHA25698aec233cbf04d1f7b5fad0d8eff91a25c5bb29e726435344190c12406ee4019
SHA512df26c50c693157de6c8fbf0e3e5add9e6764f8c571ece355d930778d7dbd55135e5da2630ed09b940d7abeb79c8f4fecf50b3327e2da9918e3cf58dad6ca6e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea870c5a2e837a6c735c8097e86abb2
SHA19656ce19c6bd83d39cba418ca020a65d72397045
SHA2566b7b56152ad1a22b16c42191589a25671d662fe617547b0437466d8235b1c331
SHA51259f309db5e5b7c175dc95ccd3785805699c345d3ea88480abc006ef189d59b06e7212abea4a55bc16f0f4d79e293f36f31708aff075f0e25b07983018de71fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5109d668e7a60c74740e8b80d5e24f94f
SHA10510ea2a4fd7d9bd1291f2ece2a2dd75e56728bd
SHA256510295ff510a3d32ea2c8c6a7018c24044861c138fd647433679963ad367a5a1
SHA512243beaad7e5a1a8b807df51f2b52cc797cab746cabbdae54d2d905f3340c8db5d1b7284204b568ed79000873a5d0df6b776c4914307e59ced2a104c73702b9a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd803b7f0225ccd914389d39ec06299
SHA1ec77cf23bcd5c1591fb24a91a9027017404e8da5
SHA25696625b5705ebf93ffc1021ad8193d023e6c99d7e5fb4fb972142cbed164f03ef
SHA51219ed55bdeee676769b938f265297580d53ec4695bef2f18c5b931150ffbdb1bb9511c6288002b9636714a8c547efadfde346e1c2760112845bc6fda9d99eb189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56abb20b731f4bf66b8907ff78a7c6d55
SHA14e2c9e78ac8786163fdb3f09f3b197b9d75ca023
SHA25644ff29bea78dc83d9ee6b14bc243c1db3643687169a4d799241fe304f6bdc1a3
SHA512c0bda98a60089197eeb974100c7b8240ae39f40e4cab34fbce8705094d4fcf7c22a40ada9e1caf0e0fdbc76b1d8e829de1fd896f7689d360a9e2ba13ee9e4782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efd71ba4b9b688bc8cbc47d82a869fb6
SHA14a82f6e46654044870238fb1868cc5717a32dc9d
SHA2569c4b69a4640d515c553e5cb2d1e6b63f01ec49327d8ac027285890e0ebb52328
SHA512658e5e847b698dea4242004e91351332b289577ace83b7bdb54ca5fad9cafd4a7c0fa08959baa50a4b01fa344bc3324b4eb7c6c063bc2585d7921e63a7b23dc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5966f2366640a312f2de6eb6f1c36a49e
SHA122c0cf17732b5a69d3ae9a58cb23b26202910638
SHA256ec738b4130ba0cc72366ff6e02157f5bcf99be62aac1276d0b7fc7777f6a4652
SHA51269e03a078dd2d7b0ef0b857ecf8d3843ddc12721982a01bacc1c91340d5efe819cb7123a6e8135e23b3bf7b08c63bf7ea34487c7131e3a3fcb1793550f6f80d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d0320ff2d3ce7ec98fffc2c3b15736
SHA1188489af85f98633b55e1c3e21dad9f5feefabcc
SHA256606c3cba68446b62f50eb656726f4eac08c273c29179693d4c3f96eb42c252e5
SHA512edfa7bdeef61f39170014bfb6ccdec939261b986d1e197e76db51e19a78c1955ea50e33efaf75cd0fb93e65724bb899afa3a8d1703e4067b363ced6da91e9161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53edf601a899d4b80356f0300d2e6a35a
SHA18781e88c55a81b0eea27f16810b050429a60ed49
SHA2568b74d86f398a242ae296bd944d39eecce0a4130119f5d068c39eb78ca04b764e
SHA512fe9375a505d305f958b1ad9cfc3741ac4be55b5a7657ac01145e2512b4175587be20a31c83f464a4104f603c2b23ce00b5f0426d6fb358692051debf548e031b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7324a66f8b7f542e7480715786f9f97
SHA15374f3e59a39a65cb25dbbe0902f120933325ba6
SHA256d4680bf7f5553b8a4bde92acea4759b868472f9f9ca4da30648681c797abc94e
SHA5122b943c4137d1cd12e99a8c55e909aa4d499c8e668550b579060ee594275bde55b2d2ed7c95a4c7b57d2fae2676292c508caaf4f857bf3314442692cdfb73faf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1347a8945b91e73b4237ebfd11094b1
SHA1fbd3e0bd4d804ea825850ad046e974e80fe7108c
SHA256eed4d81af4ee154bf4188223cd8dde87eb7bfc2e50988fde3ec99e757631d262
SHA512fcea446d591f4179e1dd111ac3d5aa7c31c4255aa96540280cf3d1f76476a90a8735941c72338ae0157589157153cb5baeb3823dbc127e29f8f64c28f487341b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577b2866fb2dbdeec85b2f0873bf45688
SHA1a80c03c0161abb390f001502032f9a8f67c49a36
SHA25653fbc8421c05ac0560645f5a3ed21dc8c4afb52813c17b55cb5657631633b5b1
SHA512af0be2a8d7a56bc9a706cb22dfd1e26ac137ca4b2aa896a58dbebe95b5f78c3df85f84b59e252d473795b14167685009478b3019be30efa0e38cfeed2807e437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6717a82059be76af2b377336863bb04
SHA100e45e8290f49a99c3da6d2e852d9b8e24472868
SHA25694c50957e610fba3a181531466340b69603eb846942ce553571f6a254a886fcd
SHA512157e6185cca595120fa382fd9478cd7ff0d461876ff2d62782661fa72ee6d79b4a0b7015916afc9e0e6f5307d6b6f26f9683b7cdb716473f56c335c5304f66a2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b