Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 15:39
Static task
static1
Behavioral task
behavioral1
Sample
2ce16c7bb2b16027748c86ce902943c6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2ce16c7bb2b16027748c86ce902943c6_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2ce16c7bb2b16027748c86ce902943c6_JaffaCakes118.html
-
Size
53KB
-
MD5
2ce16c7bb2b16027748c86ce902943c6
-
SHA1
52b899033fff5946eae30f1a91d6ff63e0d81479
-
SHA256
c86e489937381818b1de84f52ea79eb19c64a97f4e3c8fc6efc53a452582dfe6
-
SHA512
9352f1c4955fe2ad018e65ae256e691b91220cc7464ba14e84a5ccd416c86e55517ea07b5785a0702202fec8376432d6dd4003333d8d7256d3017135a3a86011
-
SSDEEP
1536:CkgUiIakTqGivi+PyUerunlYG63Nj+q5VyvR0w2AzTICbbWoz/t9M/dNwIUTDmD9:CkgUiIakTqGivi+PyUerunlYG63Nj+q5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30689e8f90d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000b6aa617199278e2a84bed6d9f9698d14f20c4286dd540997e8435f837dde1d47000000000e800000000200002000000054acac761af94be2a418321e4efafa313f84fbf606be54a917d83546b7ea452390000000822c0500da6fee286ff2e2a213bb8047bc2de39a4fab9472988a7b4bfd3018f206cc8e496db3587dceec45d7a1c76aa33cecdf57c46eaa67f713ff22bc8cf2235151513465521c54d212f56cdd41928dbb53ee25512538b61ef04180889009dd8c1457b327f3ad79cf91f192c5db19d110da142dee362390dd1f7601d802318885fbf6253570c5ea619c4eea974c40b4400000003b193b22a97e222b18740a3ecb1dc064cd587d0ab05102c6dfa06a17162e09c8883918c76ce0873ea8b6e83e82e1c56697b935aa46323e25bffc2f58249313aa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B8408931-3D83-11EF-AF9A-46D787DB8171} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000008f4b3516286c485aafa5ec02f59fd1b8fe7f1681aabbdee50b730884594d4101000000000e8000000002000020000000cadc6017adbe62d74785179dde119f67f92aba4303db5ad0a82f8b42603b4e8420000000c0c265c49d6e11e99c1fc0c98aab1edd9fa10307ab9c77a97bba18fe44187a47400000007b9640946e9964a16f2e1ccad08874886d19b87f7bbe5c244b052baff47219dbe8d4c62d843e8b4a3a083e244b8a8b838b120d961a1ab4435091f763527adde7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426644009" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1820 iexplore.exe 1820 iexplore.exe 1084 IEXPLORE.EXE 1084 IEXPLORE.EXE 1084 IEXPLORE.EXE 1084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1820 wrote to memory of 1084 1820 iexplore.exe 30 PID 1820 wrote to memory of 1084 1820 iexplore.exe 30 PID 1820 wrote to memory of 1084 1820 iexplore.exe 30 PID 1820 wrote to memory of 1084 1820 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ce16c7bb2b16027748c86ce902943c6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ab95c882b589a4300018136261f792
SHA1dcbfef04493f08268b93ba8ee0c5802187c2893f
SHA2569088aadcd6247affc3a380ff6cc1e458bb6e12a1dce822df7de0b0305ce76b2f
SHA512f34ed3dd44d975318e67285651f0233a0a7a75872ec00b8c7d11038e3d5c58fa37238a8bc8faa9247469701d751a41e1952477db8dd69719024f81c71cca80fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f22f7e33b1a4dd724047e404951fc1f
SHA113aac8f99cc9a3043ce62ae64b8d4bcfe004284e
SHA256e62319d41156a8b2f62e299ee7b550531359fb934254f28ef5365bc803f2eb28
SHA51257c6da82e65cbcbff05696c6fb35e74a7a1e7fb850c350964216d0c9443c088a969a4aff7c409431814b87eefe58948b83300f4666ecd68a12fcea8b63e772f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52752b4df5f313b203ec43315a7eadc76
SHA1b0d1a91f45c1c23c2b7673668ee84e00afc89fca
SHA256e657dda9499fc59fb9acc66b407082c61a2bbd68a479a50c6948ba3a15c218a1
SHA512284ecb69993447bf938492719ca0df50cfa5a419c8a238ea180c7656f87bd8a3300f1a40a23ba0d0f8205dfbe96edf6bbe478ef59c2712ab46053b71081d5f18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f904af4cad1671542f348e78944c7a1
SHA188f57dcde871cdc37864503e9eb37dbfb842aef3
SHA2566d53a0cbc1a6e39b87c7f615ba527438496066af6abaf52f0056832c52f4e135
SHA51211dc30946c429d2f2ca5f5389fdf13b0982d1ff4a84c15167fb5281f432a00fc88522e44e4ce023967005fe8e542560f9118ac98e4baaf063bda8ab97d6f039f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5429de1bf1da2d39135ad786531c41d50
SHA17d8fc1b37e1a0d1d2ec6e1b264d2345c81f4d2ca
SHA2563395f029d54ead2e79fbb910aa6970156cbea7936b379d4d835fdb48f38f694c
SHA5120268ee4d35cbe51f668a3c76f29bbb93f01c21d6d45e2c45e14cbd8f9900cc71b9a82e8036478692ad364b031ed07e87a948a11334bcc00788820a68f13cd814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5843f577a317975f269cda1202d810d43
SHA13fea38f96b723153dedf895029c003f975eea111
SHA2567bb1f988f008905768a584a579887176056a49eb2e40111f1a71bdbf8df8fd3a
SHA51222e8731c250423eefebb6cd74e7bc019717cf56e078913b7e1fc2624f62c8c9bced6d817e4cc9c6004d49059bb65aefd1775c29072dfc85af10625ffd93a2f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51700f36952061be9cf04e64570872151
SHA137bc68d7a9faeefc52ece7220bfcda3d3950a7c2
SHA2566c3e77af24307c9c44ad35e64071acfd70b10c0520e1d8d6ef83a4f009150912
SHA51267edfb8e09af8fffcae5183e4f3ae9ff3a54cb037423cb802b8d57a76ed4ab9a0061af2fd8db6b3913bc915eca4fac10b75a6d8b0b1e2fc508a77cadd3f75783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5569ae9becc6be9b0cb04c68186558e8a
SHA17d207b1ef8c839e144fc18abd046cb40135e9368
SHA256999f9c5675ff59b815694269ee72396d26354e14dca7b7295f4c5a19d4d14b5b
SHA51242cd0f6008a1112c431f85792ed28111d2826c9c6aca6fcb8e5268d423491983f1204de5f853c549a784dadcc2a5e917eaf0c5a22f19404a14f65d296579d4c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a58a94d4dd3e6bbebc65f6c42471f9
SHA1b4472f0dda1dbcbb1fc4eb5ff0573529a4192d00
SHA256c07784cb043b342508493aa61b4fff8e48c0683139d87f4f3d543894a88ae2b1
SHA512df0c5d4c6cd740e8e0de8e2740ddbb54e1586f9577b82820ed727b6a2267f7fff29c96d6456146c4f0e18dd224f7671a0ac0d48118760af5a5417e213d305bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9e4420722ee318db3db6e58ee11bd10
SHA181396441404e59083870834d4de816508e9ee693
SHA25645e71d386006303cbe049423325d824b708600ae41579358b3996f5d8d48491e
SHA5127ba7f481203bb6e8c25f8a47766b018878557b01fe89ad76f5b0dd0d0ee9abacd2541f8bcc5fe4fbd82e7376b38ee9bffc95373cd874b6340b94cfb56f736f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f81bfdf70b76983d605417b237474c7
SHA138a45a6b8b43b6bc0b53510f961088423d6b63c5
SHA2562a89317f99cc08639a5c8413365504e99b8d3dec4dc59f48003629a0984c7cf0
SHA512f6bb3cb45b7979ed77d42ca8e49169346c21ab55565cb95f12bdf382d7d8e3d0c6e5dca4b9a9ffbca9c5d882f4aba53d960918d9dfd9dc7b947bee3d92fe6ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfc1db716e1ee95a1a1db43f0512730e
SHA189dda248ea04fc0cdc55878dabbe959848132931
SHA256bde9ee05f4e6930f7c4f1ff04713756a524eb5c6af11ae72f7290e912637ca00
SHA5120de9df944f1b5a9bb41f41f9c05f0c7467d930ebccfde7557fe0d545e19660581817843076f98b99ef02e7a35acbe4b0b9066ba6a73c230133789152b3f3bd9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f88b710c6683f03ceefa393f9783ab8f
SHA1c521b3f32566fc1d8a454e1fac5c1fee370f8cf2
SHA2562594b1470d7835198e265a52aa206abf43e922eb5bbc40f23867fd35a260fc46
SHA512c94572bf51edf4860c6849d97236ffe7d4fc65f7d2aa5323d028277517df9c1df4e527b6108251a147bc64ad2e700f51f42af1a0e033dfe92dbaa3deec16f9e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559227b086380c4f336b2bb08f88acff1
SHA122ac2d03ed0af5319511f69519738e56fea04275
SHA256d6adc8bd4477e2b68b7e2ffdbea890a3a0ee5a55614ef5ba22ad7971307e0095
SHA512f6b265b78f6c8abc9b5e6fb46471d2f8e04c65e36ed07aca348e15a643febb811fedc965270937ad6e11ca2b7ae069127d468b8e001da0f4f4d389a09649f7cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b5521813c36a33bca3710740ddf94e7
SHA1f0cc211e20266a03b06a85c62a22c5aa68ab807c
SHA2560bdf7b3f3f4176fe308af053892e53f012dcaf8e443ce2f7a77d51f71b121e87
SHA5128d76ca31c29742dbd0312c10f65e710040c01e8b5cdbe00361315a1e86c7a4cbbbb75009eefbd839a0dafc691ed5c69f2d3b3dceaac11878570022ad80d37413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbb530be2b00229f6955e6fedceacd21
SHA13f40eff9fcff7bc2ae32318ccd35e379d2e02163
SHA25664f952f5ba2e68eaa48b67163f7af3a877678c95959e4e98d126b67004ef4bf9
SHA5128e1758f1a64d4a0cd4317b6f11480573080817717dd5deeebadd6da9fc0050b587e19948e821f44dab4f5294a8f9a7f7f71575f140a8cd3ae359de6d0e4b9bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59428150fc72649b409a215b859788e1f
SHA16c161e0a3a4a3680ef4fd40d79c4ddc3ce046d09
SHA256e62da1bb04231a140c6e268804c9a0a31c351a5dbf741a07bc04d211d577289b
SHA51262be3826ba73f0cf8185212107353364d4953c8d3ab36ad9f2e10b73b9c5b5cc9028196d4b533ef21c5bdb9404087956d1490c36b350558f6307ebf940da15c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f3d728540cedc1163870ba8b72cb7d2
SHA1bb1eacad1ba84889b0fe3a891509f904fddd8dd9
SHA256f6478e16b449d7e6e516e136716c9e5c1c315e637ac60167645e03d7a5ff51b7
SHA512f524f5a23d31a1bba8e244abdcaf7543f672f991e34ba5c04a6563c152594a51ac9af6788d63e965cd63d6cca63637abbf470b7fc859fe52f682c4d9c07808c6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\normal_post[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b