Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 09:24
Behavioral task
behavioral1
Sample
2bcee8ec3553f8f30ab2001422bf3b8a_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
2bcee8ec3553f8f30ab2001422bf3b8a_JaffaCakes118.exe
-
Size
234KB
-
MD5
2bcee8ec3553f8f30ab2001422bf3b8a
-
SHA1
96326838e22a0fe6d6ef8d51fd7ef79f10e275b6
-
SHA256
6207227790b2ca1123211e9b0ac38c922e19fee23b065e79767716453715745e
-
SHA512
a4b6a8ba93cec2706bebe334f182f703542a63cb4502f705a4d8c88ce036745789294796a4fcd1eeeaa8f635e2365b2b8c8b0b3842839594a08d7c23173438bb
-
SSDEEP
6144:N6/HfGdFjZvU1MSGTRa4T3nw9hr4A9KW4uaSoSWOu:KH8FjZsCZYg3crzkX6oSWOu
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1904-0-0x0000000000400000-0x00000000005E1000-memory.dmp upx behavioral1/memory/1904-24-0x0000000000400000-0x00000000005E1000-memory.dmp upx behavioral1/memory/1904-26-0x0000000000400000-0x00000000005E1000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2bcee8ec3553f8f30ab2001422bf3b8a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10186c724bd1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{84AEBEB1-3D3E-11EF-8ED3-72D3501DAA0F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000003a2559fd8bf9f0c8d3cd22818a8400805042ecf4a712c8b85b9941d03a21b2e7000000000e80000000020000200000007c941699cdb882c9e2afbc9a2af6458188cfaaa7c0d143d096f4948366e68a422000000026f2542be2de5fd0879e6dcd81b10c93dc4b50253d95395f90d226f6f53990a3400000004111c448d4320dc239f25db95462465fa1c59e505490d1893ea787a59abfa31d15dcd9efd32c7fae0ffd71cb4546cb5b7ea0a0546140d0df414cd2f07dce169f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main 2bcee8ec3553f8f30ab2001422bf3b8a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426614288" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2564 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1904 2bcee8ec3553f8f30ab2001422bf3b8a_JaffaCakes118.exe 1904 2bcee8ec3553f8f30ab2001422bf3b8a_JaffaCakes118.exe 1904 2bcee8ec3553f8f30ab2001422bf3b8a_JaffaCakes118.exe 2564 iexplore.exe 2564 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2564 1904 2bcee8ec3553f8f30ab2001422bf3b8a_JaffaCakes118.exe 33 PID 1904 wrote to memory of 2564 1904 2bcee8ec3553f8f30ab2001422bf3b8a_JaffaCakes118.exe 33 PID 1904 wrote to memory of 2564 1904 2bcee8ec3553f8f30ab2001422bf3b8a_JaffaCakes118.exe 33 PID 1904 wrote to memory of 2564 1904 2bcee8ec3553f8f30ab2001422bf3b8a_JaffaCakes118.exe 33 PID 2564 wrote to memory of 2408 2564 iexplore.exe 34 PID 2564 wrote to memory of 2408 2564 iexplore.exe 34 PID 2564 wrote to memory of 2408 2564 iexplore.exe 34 PID 2564 wrote to memory of 2408 2564 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bcee8ec3553f8f30ab2001422bf3b8a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2bcee8ec3553f8f30ab2001422bf3b8a_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.gamecentersolution.com/downloadgame.aspx?CID=21157&AID=10192⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2564 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d7d71b34453650f771c16dc260eaaa8
SHA1524bff7ef084b2aac4abdd5451b60abfe14460f2
SHA2563b525cc30e0e1c4fae2628407da1d1ecc21079311c31df2263afed1e82bb83c4
SHA51252d000fd63d76a3e361ff7424a7d31fdbc31002cfbc39667c5bd5e59e1076b3822865c1df83830fbf937fbe169eb7ad415f155c13fff7b2c63c2bce548ca22c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f980cadc9fb67d6bf9bf64d06997b894
SHA17ab92ea210a0ebfdfb07d183ab6e6df7271471d5
SHA256bdf5a02926a38850059a7d127f106a5b401b0452573a88db49c351ab4450c751
SHA5129fa4b278210ab05b266c411bcb04f0ad813a8ea832b948b765fff80944f38100affa5b74f92fbd69457b5c46adcae84182a4c8d9759ee397ccbc190b10481498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bedab657d2f654eb2110c881d8d4e15
SHA16894717c450557ff54d27a0b6e5fbffe17d62f7c
SHA2564d2744777562bc52ffecc2f2acffb6ccb9acf1efde08915bc2821a65e06b0a3d
SHA512b54615d525e65dcf74607fd5474c5d2b3d27cdc0615d7f6fe0f9c2660f00c9171c9bb899491d756b1d5500f803d2d7d434f5db885307974f56e216998fb3b7f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53637221392a8c710ab8fad84ca40d4e5
SHA1073b7852f28b6e11675a1ec25dd84b4a6793f3e0
SHA256fc9497150a23b7cd09d659c93d612e4a482e6d8c2f2a6bdab7e4b690ec436e91
SHA512091d1f7ea59248e53107bf5fd682b288526cdab0f6ff3f6b315bf883cae4d934aface95842d2b3b47fd211291f61a917f535926b12fe169a7531ba8612705d81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527a9305a7727eea45fda2b3c55f19733
SHA10fc27122a64a8c0d5e98b9d7984f588515e722d5
SHA256e38f2c453c864b3d269884e67bf05a075bc2fd679f61c0b2768239d78f060ca0
SHA5127cf6fc215dc261d188827725cd934ccc2d0d2cfd03ad125945b8fbb6fda89682328e2fecd89922756de7adc290ad31fb84028db4fc72aebebb6863f01795f774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dcf27160542dcc2845b2de1fe9f9341
SHA162e4520e3aae2e77f5a5a47dfa5edf6bc77ee16d
SHA25639463669c560c0e8cd6f9b561b6236dcc433e95c9946c3f6f5c878e1da84bc30
SHA5121b574376373a23b225ce12b5f9ccc01e7fbf45c94e531354f4bfba60e03c33144d2aaf903b5a15d5d71f38ad9a4c344a038348847b4d5308964972d074b41fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba35e33f3656308f2d3096979851088e
SHA1581899241a0f26ad5ee4dc973ba724a7fb10f2ad
SHA256b8ff7e9a15d0b1d592d1a491072997389032719e67798a67679d2b6a239d7ea3
SHA512c9ca63af91400caae254b2863e5b8b93033d08b5657bceeb2b616071a200e23b77d4fc529d2dc4694a0cd1c6a356df92309a42aa1631339ed02abb5c175290ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58098dabe620b401ad146aef6c1c12f9e
SHA156d413d2661b417fa7f95041ce3dba71cd5f001f
SHA256470157dfd9804f3683c2ee8967401a1d8842e73b2e0c882fc060acb3b0940ce2
SHA512d1958923ea79b58ec6af32e223574895bb336828b9b2ead933c94bac3b5674dc54d09de990eba24cfe911e924f02dfdd6bec426ac5eb0321ac97f8077b2dd24d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a6541d7a4df28031f5885efabf16ae0
SHA167f25c74f2c4b9d8f51e45571b42809651c61e7c
SHA256f5a289c4e0501c2191916818c93b1fb28278771884574a209b5df47ee5c3b8ca
SHA5124662b87136487cbc802af3574aa174fb6b9a751ab6cc64f1a725aa547a27828311f0e380fa654b4eb07f47b35b1a5db682f5233fc09cbc08c22c1c78f2224edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dcd8138d04a642d457030320b7772cc
SHA18918e029fc00535acb2c3f3f9313863590987b98
SHA25675558095bc0885f8d822a9fc6a8bb5cc39820c0d7cb69f9a38f1ac89eab3c9e0
SHA512d3f70188b4b712fc45f74401423b5781297219ea1f37bfa383f43c211233bd08650856e6bf4bd5d82c3467a41017e26e39fc7480df2565b029b9342c6125f5dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56aebcc5d4452c1afa6f3b72d10010975
SHA1c0d9123f8abe67be19ae453ba9f5a5c1c1365076
SHA256bf2acf3ab8ef59669af2552f1a203c5f5a8e94e4cb24e4d7a1fa3b8a970f503f
SHA512e4316e42179007831a3aed102c72a3f233fffd66c28d8340507b5f1a738c0979e417f81ab7bc9ab9e7f737616d3711ff2224a3132b0da8058d3a81e37c93fb32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506578c530f53a40f74f3dcb777bdd793
SHA12066a6fbb67a47ef8df8981e7483dbdfbf066714
SHA2567e8188badea011c9c5e7d8f685f6c48507b8f275f3d3f050c5785e7c1df68596
SHA51232493df5e6650841011e325e72f0fa606022531283de2ab47239123e40221fe52210e72d2d8e0a409d31ad2a0e63ad2d540582d80af3102e8bb4da3c5cbdaa61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5665852f59c67ef148adbb4a1679d3d18
SHA1109ddbdb1cb8e8f0b22a20d43c226c309108c1f4
SHA2562dd9bac1ae2bd6dcaac45520bea62ec2fab6a6cb5111db7b5c18a06f1be57d99
SHA512aa51816ae1440467a0bd58ad1c6b5613a07014893519a43edb0ddeee5be37fff28c505606110dd49df9d19d2b7f9ca8d7ff1a5fc7057d5c4894b739024c359c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad12a114b1c918ea19f70af5502ce46c
SHA114d65e79e19ba4dafb9672f310ca914e1ecb6dbf
SHA2568e4290a893e3dd42ccba8aa266c726e988b2a1667eaf6b4b7bb3fd496bd20e5d
SHA512c856d33f4cbc90d26e439dd4d565abd3a8a8fd8cdc8e2372ffd4a8aa33b7f03b07751e34beb4cd25c7c96458ad01603debaaf577052c7b23894c3e226f2552ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5bfbb2c3ca4aa04c5f58ddaa7cfa3f
SHA1c52ce635e97cf9274eff3ed221af7626f920e0de
SHA256d1ec6c8f8293b8c342034f0000312f0cd1f8af36cfe999069546ff84fe68ce5f
SHA51212543d5bdaab52fb4c2e135693ff68f486667b384185581f5bf5e46d7f8a20d040b2bcf77dc748eaaa9aecbcd286a0bde8e7a97b824af71cb5735489717a4201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5405d8a85f9f115096ef75a54cfa5dc47
SHA10851f035733afda9c66972c04d0eff98b927502d
SHA2564b3464d61af39e1651f18b4d7fab31fdf87b9a6be851003e6e5e910a8b986041
SHA512f5307e4ec16de7b079040cb471fa272d88fd62477c96406c66d40b25653e050e9266aafea5eb9aa2c4126a242123767d588931ded0e3025f9a343b4061b5a3be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd921050622ffba5576b25c335b8e93f
SHA1cd4a7748318b60b9d7ad5919d7470133774e1a75
SHA2567dcfa345f59cab7c086c7f1e57b7ad9d53da7d4bd670cd9485078ac264c0080e
SHA5120eb676a9fc37fbfc0568e4aea465cbc1e1761bc0add50b03c726ca98bb69793cb06a6ec2d43048b0bb2aa46e3b75bfa8711da1e1d85a0dbbd6278f05957df0d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59780e82054ab28ff189fed3e9cf7dc0e
SHA180d0af14f44b9222892afc857f54aa3d76d9ecef
SHA2562ceecce1a005dbf6a4a8cbf143477d655e0a23611779c43070c02af9a7bfe4dd
SHA512242313d62b66adc545b3a4baadcdb671b7068bd835431452acfd1507da4c654fe2838cc42fa7258761f3015b28d688c49839c9c7d6dd69fe1de1cfb0ba95fb0f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b