Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 05:11
Static task
static1
Behavioral task
behavioral1
Sample
6a5a6981aca2bf9b67f36e68d82bb703_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6a5a6981aca2bf9b67f36e68d82bb703_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6a5a6981aca2bf9b67f36e68d82bb703_JaffaCakes118.html
-
Size
58KB
-
MD5
6a5a6981aca2bf9b67f36e68d82bb703
-
SHA1
0df300545444e5ea2619d042a6c5606267e222e1
-
SHA256
48a97fd7563401a82a6f037dfd182d90a0e136f40d42cbfcafe28ec54067b381
-
SHA512
180d2dc20fd1325e4e42bea5cccb1f32bee141be64b313b45ff663b082eb25ae6e329e81ecff4b1b0f3265e663c322c4b183bd37cb62ad5b462bcfda5efc31b5
-
SSDEEP
1536:gQZBCCOdG0IxCex6XfrfffCf/fZfoftfgf6fXfffTfGfvfFfGZf7f2fRfbftfffF:gk2I0IxOTXqnRg1Yyf3LeX9iDupzlXo8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000b6d4430df0b1eec810e629a4b5e41e7d97302b7bf030a3e76cc863abc92e321f000000000e8000000002000020000000c3341b6d16f529aff665386e61e0f4f3d69a110280f2c03367567ad4dc4cfcdc200000005ac02b6614b42112ca17d6c68b4214f2dea7596da673c5183880f5a25a1b536140000000821c3b6e2e6f44daefd7a98f20072da570e3395688ee60e0f548ed142a42a7d77591bfebfdbe4c5270476dc4c262c5b74777270bab0dd429238cb60acb3be332 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809b0f1088ddda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427959776" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A7A4781-497B-11EF-946E-F64010A3169C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 3000 2024 iexplore.exe 30 PID 2024 wrote to memory of 3000 2024 iexplore.exe 30 PID 2024 wrote to memory of 3000 2024 iexplore.exe 30 PID 2024 wrote to memory of 3000 2024 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6a5a6981aca2bf9b67f36e68d82bb703_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bfa9cf102dcd13fd0063b3b39927db8
SHA1d4efe87fd8de85ff363ed409b9972aca33372306
SHA25620b9860264a5331fe2e7689a7aa36d213bc5164324da09d1c4cb376e43546eed
SHA51205d46fc095b69c33432fad37f3f8fc6e9ab62145dfb3feb8c4ab9c8dc1ceecc9bfbad4093541f2a2cae4d9a197b9ceeefe7e22a7250e144d9edd64b52d841153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6e251b57a60bbd162a32c6e8cfe69d1
SHA1bf75dd05315fba9eda944f95a9a687efa1a8b4d3
SHA25664b38554cc176f584323bead4e6a968b79624639cd86cf9660c282be01ff601d
SHA512e748df2bcf84d59f5323e04e25c774ee678eb7fa00b5811962a587cc227c1cf0cde32b6305dccc0db1d2fd313ca4bd89aa0407deaa59fcfc8510753649efb40f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519270be68fb44ae5da374eab6b245e9a
SHA13c1cbcea2a3c06dc08705dfaae1ad9827d2f1e56
SHA256403afbec224cef5452cab81b548b0828258420599389021802990d3063b05c7a
SHA5127b0ff067a8af25c02308d471ac3b358ae4000ddb7fd6a01e3392b3956fa88670abbe6b9525dab0e14811b575f144e3ec94fbebf06f95eaca18301efe10ed47a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f51a4dc725914cebdf81cc01e09e6c34
SHA1c7483edb8acf21127ce8400a07a6c0402aaea627
SHA25686f5acec24e56e6e3003bf6a641be92b33ad2a51d0866adc7597ec81cf12239c
SHA512d01c1546b812c6ce0420f5d78c9f6c0ab53f47014da26bbf326c3426151f878dbccff5b10cd5d34c91acef7f71c31eea4b8b683d3b8c200b5bc66cde0b5a31d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5368b83a5de878efd83b32f10b5d570fb
SHA14ffb5b5d8571a01c537092381a96f0e360d7e496
SHA256edc8e250bb5f333d75b650502a5f40b598417046ea05afef588d40254fcceca1
SHA51218957ddbcc1b8218c7baf7a955d804a3f825db42d7b455af051a8afa6d14622963a29ee540e46422b54500fba1ac413c84d9725b1108a66d2fcc891268265f7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc6520efce9466ceae0a7f3e693b08f4
SHA1590fa8caa0322b50adbb017dc3003f767098afec
SHA256bfd02ca05b578bd9b681c3396a36c70afc7ab46b8d4ab27c2578dd71a8cd774b
SHA5126e30917568a9d9bee4ef334d10d8572792f7168cecd7dd1693e44bbef84ec3645f132c8964f554f2919af5bc385688cfabe5ce4929c6c5d02df7d545920a0a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b86e6f288d7036e44f26231c9c715864
SHA1d585cf2b6404dfe5d9c1963414859729a10d2c5d
SHA256bb439c3456d84f17141cad130178783e6320f9dba3481045bbbfa447592168f5
SHA512fb84230b7bf3cb7144cc82189b0689f0744de003034c43b3c38cec769c7eedcdb725738fe0af0ed92a4e76bc92ebe9ead48f5e82ce9a1f79e066b253a668ef63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6f67046980b1845cd6b7528eabda20f
SHA112e05d2809914dca8a4ace106c4648609d20513a
SHA2567d62cac7dfb478e319fe8800b873d31240829b81b6944c71d872cc7cf0337c7c
SHA512baa1d7d5272887861e890c1e1ef6fadf651905a341cda6942674376d327c640b3db46ba21d04ecb4b4a52b02da00ae6a5519eac2b60046e208128ef2c7aa0124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fc9a7deda78f4f7ac6f8a3b5bb9e63a
SHA1171042aacdf66d6c766c11c5df72cac63ef44b5b
SHA256d9c670788fdf7030c91e36c5b40cbf5af6f0a1b223b760fb56305fb5b6a06eac
SHA51248587d41e74f0366fa0ca5c67ac5d9cf09e7adbba1d42a7e3dbc0ad6127b97cb84ab2e46959b24be40c6143551c318f701d2911b5f1593090d8360a44209bd80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b137833ef5b3dcf284cc365cc2cf934
SHA16ef1079418399f7b68489414c4fcb4be05ca909f
SHA2563677e1834f71e29afd044709309073e283fc334de10408b924108182e1c285b1
SHA51241f9f84e75ba9bbfd42b40708519d28bae4fc0d1394bdedb521de79aea1a767d119abc5a3fee7a7042b888cf7589246432a5d3ecefc26802a359c20d10cde56c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec75a0ede18f1337fecfcbd976b5e3a4
SHA1452c2a3e9c876c281ae370a0c2c451b60192a2d3
SHA256f72992014562e08e656115ff370012686c6961d8a906950ddc200a7b03ae9cf2
SHA51280c9c5cb86c240f20954c10ee5cb96b3aa802cea8d8a7fc91852f15cafb9ea3822c0c33f811469d1e921763c03991476728f40ae2be78bcb7fbb205e0df51b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500a0699bf56a42960c660c4b1e43aef0
SHA18716c19015b364a53ddabf267a4b21423f0bfafa
SHA25642ccfa2bf4b253e56b73d12e643aab4cd65430ce49e9b33dbe8e031307703551
SHA5127607caef94f96f137b76df6bbcf739ba3414b9df6b270e6ed856c535a492f07e42ac9aafc742031fe774ffa475341454d98dd56b130dd255c8c6f6800652100e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfd605b702807899f317d1fa5af35700
SHA1142214df8bf1203317c85331cf37b7d781ca38a6
SHA256a0583222d88d6708fae996fc40f90e0e29961eeff9ff8f121d2a722dc92880ef
SHA512a7984012cf50675fdfd56bb242171a26003f8fedfa40cd7a3dc5346f0d348695b605efb20781d177b4e9065071f1c69ee78648c904b0ee92d3b9f5c930786cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5397be56eeb0af0c8a2be84903aa50b29
SHA1ff737d55022d51d487d0db974a229877a6d991f9
SHA25687bd4fde00b9d18b92de3f419992e88bf3c28fd2617a7d1648858ad72743451e
SHA5125ba54d6a587acf962566ee2ca714e05d2f78e87fc1a16fcff96edc114e7d143ceed31ec4f0f71dab15090620544ecf88865c74893143c26444a62ef81b8dc1a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5255a55dc6a4eb6b8639b336d596a3e5f
SHA113e7ed1c64b102f7cd8ee39e47478fc14126eae1
SHA256bc98753aea65ea5d48059ae84fabbed6d4847dd67e738d2b1599df3c5ab98503
SHA5127b690f4726f94394d05072e443965575f1bdaa8f884d7d4ea14d396387e1ae5c6ecc920154c362421bfcfa5573e3c8b7932fc6348f6484dbc5181bc19fc7ed50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5254ea81a222888f68824b663bb268396
SHA12334e02f933019643b9276fd046f526ab8488f69
SHA256b60da1cc0f6e60f979519970d610c6e142d1e0ba2ad19ae6c0fb050182b49713
SHA5125887aa498947aa4452173bcd2e0de4bb4dc98489f84b9cfa520d9c8de80cf0ffe4d29976e86f9251cf6aa8457826ab2d49b8e816a7c0aa1bf89a27adc16feea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5496ec10b0513812fce99f5fa27e49d6c
SHA1b125b0db8e4398b8273d5198dbdea3afeca8af96
SHA256237b9047f1eada25b43d22efdafea6627919aa45cc9b4fb4b5a1a561e41b5e16
SHA5121d130c2ec56f74afe8b40fafdfe87ce3ad1f499d2242d733e85796339b04eef6a6ed28ca050a34d6f009fd21352b503000b1e8ef1b87966dfe951b09afad0179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50510c32af59b3d082ac067e1a3bcd69a
SHA1b594342d09f3391441a9a53371c70f0b1fe52a20
SHA256ee38c90e00fc6523de72c3f5370fb587b14ee36d0bb7900b85cccc2f9b685a04
SHA51279f31ea00f3b4bd12df42d78b6c0d525db75333297128aa163dae8582f4512df0618c748c76c36b24a4a392b750ae08f1ff82eb92b96039aed8a977ba1c0c3e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58480f7856a186b1dcb1cd8d568408caf
SHA1e9fda4e1bbc891fab067ba8ae62d2884703c0cb6
SHA256b53c5db1b58b0968e32cee934952d05eb83a8711f5294dcfd1add81555bb4b6c
SHA512a4bec79b9746c53534ad4d066f5c91866241b6b517f886354091229fe43ec772ce6ee936597fb811ffd005f61ff0286eafe4ef700f41d7dd29d86f031663f820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c935100a215974ff62581a5fdfbf1d
SHA11a0021537004fc5772a1c6dcdf77b8996da05f47
SHA256f8f4ce549ebacfc30cc5c5cc4a7d0686df85cf1fde9f643d1e016e13a97d1734
SHA512f228e994e4b06cda20259a47f25b1b38420b711fadd552c91805ad7297311b04dc34cae3d77e89adcf55e69ce684e1721ad0656ebf2c1aece4fc57fd1a5b9f03
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b