Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 07:12
Static task
static1
Behavioral task
behavioral1
Sample
a19ffac85079a6432c24396e3a169e31_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a19ffac85079a6432c24396e3a169e31_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a19ffac85079a6432c24396e3a169e31_JaffaCakes118.html
-
Size
243B
-
MD5
a19ffac85079a6432c24396e3a169e31
-
SHA1
b9ec58f2a37be97bd9036eea5c748ca3eb2793be
-
SHA256
73db91dbe4f543ff929a2c137252146fd34a94b0effba96d047a33404dddd51a
-
SHA512
bba5a956485c5438ab651e46413dae271f4f48fc22f35d59cad533f459db9c9784f80f44fa73a63ca851a0884044de5937c6a00a65dbabae426f093ecfce31f4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 405e43d774f0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000b9cd1c3ec953fe0a787f822259d55b046de69feead9f5bf0cbf619183615f844000000000e8000000002000020000000ffe7a2de3e8464e4302619126f013afc149b1944da07271c916e79ba472bb22f9000000085224e0645019647d16cc0d061c3b0873cc5aae40df2848b449f9273b00574b8b8eaf4ddcdf8c7975a36f07779ae07cc97302293193108610427938faf3f278f467ab6841acede3a7cd53def4b123af2a97427c0d588b2f88871b1b6b8e6d481c3e9e14aea9c2d346b213c4536dad6dfe46eb0575b2a5a4cdcaeb3b20afb005bede23d22887ec25243711c14b16202f1400000000197a306a21e109f6cc3e514dd36eca8d2025783b37ad510ff20ba7f5cf4abb375d4ed0180e351de9e4e5839aba70695c003e840887fc9314dc1abca27bbc001 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000bbd440f7c98e48ca2afb78b630d41733aa6303ea78d2fdf2256c92126ead1718000000000e8000000002000020000000fbc6d74ab1f88f8c8c5227d3ece56acc0a631f15ec1f8a3772afaab0d00b53b420000000afaee8fe1d6bc79a14b0709092eb3e96b0552e97938839515d4c717fef30202e40000000e82d81ec214e3a394f09f8d65981ee20422f6963f2f0b52a3f035e656a712464cc6f3be4dd05f038c00f4703bc3ec8e7c6183f7525e30f18584553dd80daa294 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{02B08DF1-5C68-11EF-838F-D692ACB8436A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430040594" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2736 iexplore.exe 2736 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 3028 2736 iexplore.exe 30 PID 2736 wrote to memory of 3028 2736 iexplore.exe 30 PID 2736 wrote to memory of 3028 2736 iexplore.exe 30 PID 2736 wrote to memory of 3028 2736 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a19ffac85079a6432c24396e3a169e31_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a37f71299f9238ada7b02db54adfe7e2
SHA1f06aa114a33037974208cd50897f12806523f5a0
SHA256a267203958fd1483726d00c792a17c79acad1758915e832186c01f49cd3a7888
SHA5122ece23e1079e32b2d2a3da12dc73177af4b5fd92051ed5cbf90a93260143e2caac6991807d178cb0245ad3a599419ae78a4a52bd67c4dddab69273d9ddf66c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e81f081e1bd6211476c6a5b9efaeb6a
SHA1d43bf829348b91edd1165c22818a57fdeaa57f81
SHA256b04e891747a3a8d8ef233ca57134f2a31e18e30ae6737806a36f1299c6e70279
SHA512dc1da02bca0e62aeb85cac166022722bdca3b08c46b93ba32fe37b6951b618f6302335a6f313b7f7fb18d630b0760691ebcc71a3a79afe814998892406fd07a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568d9fcfdd2277f09187491a403a2bee1
SHA1b601d6a2a5b9c3e534939c40b203877cef68136a
SHA2569cb4b9b95db92ecb2011fc9aacc12da5658b0d1de1f83fb171bb6a4303e95284
SHA5129058f5c4cd1e72a95700f0265a60e337ae7fb07280a893b9222324915c2fd8d562e68a7b648cfb7c773659730003330001c9627a6438c5000d0180b3bb097e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d54532324bb9c8be8ff19ffd30d82710
SHA13c66c14ac1c8a10b1841fcb99cf223c5edc2bdea
SHA256a88156d3225881849bdcca841f335302fe00775619f811e6bd527a25ae0776e5
SHA512a34265df825a6df0bed4eb6cc933f4b6a76aa6261dc004531cc5cb3ba292f7043a0912a5c82ce2a2e4635bf8de9572ec1289b853b49240d2ad2ba04f0fcb98b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd3371d98a5a33de5bc650cde6ae715a
SHA1deae665b4ce6aa52e4f4257fc813944fd7213b18
SHA256361ea27739bf7b023cb508bc4edbe5896fc30581c92bd466238167b441e47a01
SHA512eee86202315d9d44f0b8bcb5c57d17837d09b44e0fb505e6d23075e69832383e9d955d54303a109fca7ac1e14010f5bf081015b8c45bcba4f1c6459c5c30f600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b4ba21acdfdc3cb90a0083c33d949a
SHA1acf2e6d157bb6533b8cab1f5c9923889b13fa57a
SHA256ecc12939edf03c5c344218f57f63c224dbf1f82c412e9f26d6451c5e92c87df1
SHA512c6996fb47ce74191c1f4c37decadb5e5f23cda89d32cc1257abb854f5188160e10d4cedb21b06d1e18bf72b1c57a23eb247b03fa19d790fd6e57079249a241d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac7175947964f5b132b873a84366c908
SHA12f548c7303f86d93606d70207ac60dfc6111f21f
SHA25622ee1343aeafd9260711dd37434d757cd23fbc38d311a99f8291650ecf4b2b73
SHA5123820a6114914cc2a75ab8b1d57015d6bd6f8f8290a5108c4bd948d62126829e92bcbe814339f625af51bae34d11fd1c67e6c90c435881fc66f3dbbf7f8ff08c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51abe9e3494665a12ff2d5dd9b523b1a9
SHA1cf21b961a46de2cc7d721a61db0afc53e30aae80
SHA256fe38d4ee659ba7dd9bec651efa54c67a275077726bebbbf635da96fda7e44650
SHA5126e6e80a3ceea012276ec35eabcfb053d9c92c8199eecaf1745d0611221e38d4e4bbab95aa4110c04146aaf3b4ce42b992f186432b1e44d95a3f3fc93e8f414d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52624c7cb0d0e31a0af0dd88ff3d0bb90
SHA1c5fff283a95eb135877b3a76758bfc762903c85a
SHA2560f43efb04b4f6c767067333abb140895186002cd10721b498eb288efa718a046
SHA512d49870739df5b6a68f15c3701aa9f020f0cfe0df7b70f7f95c97f2be87746081a4946acb5da2f5c0bbcaef4584fb8c6b6a35bab6593b2590f774732bfc31bf92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560a00d8358c30b4e6a52db2f5fd45dbe
SHA1eaf32f193077c0f6f97218bf49e1666de494be2f
SHA256c245ee1bc11961df322472253d72d626838beb592c1154a326c79e47abc0f47e
SHA512928829f24ae14188de99f5755934c83a56c1cc110f1ad43f110ab21d02ab5ed9c4682410d5bdde06c27aa8cd84dd161ba6653da5ceb7c7d7ff218536c66b91c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed30a0c640038ed620587d3856eb817e
SHA1e9431c8b3bc2cebabf270ff7fbc521db497da37f
SHA2568698f21c5830cf2897fcb65e4923eceafb3bb2649fb5589fe0620b9f29dbab9e
SHA512a35a03597072fdc9b0bb160feb87a5a78808853123e0fb5e903ab0b8bb4ce1dd9e7d20a64d33934711f76b972c726ac544ab9ea9768e42376ff85b386eed1194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518efc32d0f2c0de906b81423a7b71656
SHA135ec9e89e825bf03399a9623d679691cda9bd82d
SHA25669fe309a8b19acd2a959defd97135e6b08f86a9e6b5cef381920f08b83c7ec86
SHA5125852e06bab844e46c97cf9fa0736ae00fcd47e265d6d7d7ec7acb6c7e78867d3846daccda435b9bac075be09839102d68bc582f61cd7446a9f517a3a3741767a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56165c828d68970520158235782788c6a
SHA1366ca00bfa9aee5166e58df1ab0b2aef3936657b
SHA2562db581ec532377e9b51362a6686d872e416fadb46e3be97f9572f5b2fb198309
SHA512555320abd0147f6a9ec388181aa7ef6676c61fba38489ceba5c7f3a937891a47c7165aa15a9c6bf70397f0aeb845464a0f0623a94ececdb298bde948bbc8b63f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5248ecdabd049e8bdc83248f3fa12b714
SHA1da39dfe7e3361b1e7044ed1d485a1b02aee82cdc
SHA256baa2995cb232d1f7d9d9c5698720d621256c2ff7c7e90576d0a472bd857ad030
SHA512091baf240754568710173ae9b2a4c265e3051e2d41fed5bdc728b4911cda6f9ab57d03b80f37560f5677d93cf93d3472797ebff97bf36a676d2ce0b384d96e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c0a8a897e977d990c6e2259d4ace84
SHA1319b51fc0f83abe5edbcb9f1810e2a4900b3bf12
SHA25652a8a819398adf64bbd56265d6e115d192a856665acff2ce1b0e7617f9ab6cbc
SHA51243018a90c8c6d4cdac67fced67972b790c715ae3126aa737a322c3a15d4715f3560c61b3332de47126b7cc169852c941165bf967dae08f5a89dd2443f9f327cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50225192e608b91dc8727553a3480ea78
SHA1c65510c832028cb2c624c2e9516f32bebc3009da
SHA2567bf054a39b0ea1e1b8341c30aad7f383048fbb35ab2980342521348ec52ae783
SHA5122628ce28fef946b699a8e5bc6e11e449afc1acf13a1c55c5898b0a2b8eab65f7bd041cfd8b06645a283aec752e4115c02f8f292f4ced1d5a76fc62040f35c6d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f274d2a5052be9829269e81ff511cc8
SHA16fab69988514276447b40fc8cf907a9a2e5749dc
SHA256f556bc76d93d66a3ff16af9d5e1ef7182f52196f0e4a9f559828f42bfb4dbd82
SHA5124616b988a801b7b2f6c6a2c6d276ed4e030d543781c43e3d7441712abdcc3d1e6f84120e2feb95cfb1b0f248d9b9786ce3dab2c2c12d8c4ebc4c581d3487ee32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c64d16e207083aca14d6387473053b3
SHA13f59f07c740eeb00b1d147533d7577251ca681a5
SHA2568d2ff49df57937876fb3dc1e6e694ad9a01820e40a904ad60816c0217d57b0a5
SHA512862446e46727eedab88cffb1ac31f48b724cbf321d694d30428bd95ec1ce086485ae0a96ca93f39fe70679b95196b099dc2a761a2a3ec748608b8fa634e3489c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd9fcf2c8f2c6d1f63c614e313bd943
SHA12e5f11d9018d9fd175cb4796e13e90245118452e
SHA256ba1524fa54eb7410b36fe8e4987f482daf1cdefeabdc139b2e64aca82d4c4cd3
SHA512eefedfd1a8b996053faabbed33c7824573419cea2960acb1d61937ef6e47a6269c8633e82caa9321cc5e60c993c2d43e9966f14ec5be319a49558f0d471265ca
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b