Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 05:46
Static task
static1
Behavioral task
behavioral1
Sample
ddca5c276069d3d5180c3e9fe807f9ba_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddca5c276069d3d5180c3e9fe807f9ba_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ddca5c276069d3d5180c3e9fe807f9ba_JaffaCakes118.html
-
Size
6KB
-
MD5
ddca5c276069d3d5180c3e9fe807f9ba
-
SHA1
25efd96f778c5961c883f75de45e97458307630d
-
SHA256
964ab3d42a654332eb96a424891935735367de86c32a24f5d027638d32a552e3
-
SHA512
f8404537a6482a1f59afaa51f535713c790e0fca7395088f29a70243730f01c72b4402caf0adc2c706584fc4499651243b9d0575ba4d6c4e588187cd5b341a2a
-
SSDEEP
96:uzVs+ux7jKg0LLY1k9o84d12ef7CSTUsH/6/NcEZ7ru7f:csz7jKg0AYS/R4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000090ede59235ebc87f9b1f35f56be01609af687a59a7a967a726a14366c18e3599000000000e8000000002000020000000f12cde0b5512973894e6fbab0e28fd6d7d7be4479b02189636134ae96318073a200000002447c7a5e92f049264c8abec049b99aa7ec933fc795c958e92d34bd23721835340000000a755bcf4894410dcb027108ad5e7eb8d324c3706ebecfcb99034392fc25752abf8d76192998d31e036aadc3b006e18bb6a2f5c93420d55d798938b1ad3897196 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99A0CC31-7193-11EF-AAF2-E67A421F41DB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432368290" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 901ac288a005db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1352 iexplore.exe 1352 iexplore.exe 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1976 1352 iexplore.exe 30 PID 1352 wrote to memory of 1976 1352 iexplore.exe 30 PID 1352 wrote to memory of 1976 1352 iexplore.exe 30 PID 1352 wrote to memory of 1976 1352 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ddca5c276069d3d5180c3e9fe807f9ba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1352 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51638077e32af44aeff4592e11767394d
SHA112c21e6df8a31ff7ddd5ed593441bce153a0fbb3
SHA2562fc6482c87a51ebd9fd4aa1dd83ed338d15909eb5507a3ebf3dd5646f5bda3ca
SHA512b08a2e9894df4c1ae4f51527748507c9c60a257386927a31804da1920492374c3ba315113b73f870ceba3e5bfb47e5e1ab6b9a35a9cf8a613880d62fc90ce07f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54793316096d50def22571012c18bc922
SHA1f7f745a3a2e9087c9b3b284d57ba12999510238c
SHA2562f805eb8f2cd74fd7e17e93601564d9b18c3ee2bfb76d567890f9016a69afd50
SHA5127c81628f448022d01bcc90357258d8ffa3fbb925dc2359bb40e194e86a4cb885c6f2d8c190fd851801bc1ef30a9cca2779c57774dce060ce7860aa8e5acab24b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51af2d11c712808137453bc002083773d
SHA148e3fa593e13d11e0ea3e3bcd571758f4b269840
SHA25645c5684582878238d15b9c0c3e17e73822bfff7d10a7d7b3f8860826e2771be8
SHA51283e6184116b17c92905acca73b0a05cb4850c0cf115d9d23cdc6f206cd9473e7b4d9fc224a8b32e7bb9b574a0e9a9257732528dafdd28f52c4ad5207fd315792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cf16435ab540fd7f61f3772ca820e95
SHA1eee0c65e5d8ff9ed3cbf4c7d1118cbd12d83a366
SHA2569d2a7cd8f00e740025b520c572768229072ce44751a7f31291fa613dbcd717e3
SHA51236d2efdf4f7b6f91fe9a1c5bd932a7151729a296bc9c92e6d9a95489cb1f41d9b3dab80a6b23b124ef815fc0b7868a6842d1199c657f74fb537e601644a3b995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfc020f4620ce6f2e0e75f75fec268ac
SHA1006f0e932dc44627c120c4231dd1293b4bd23e96
SHA2564f041914f602395dd89876ec4f03f17cfa2690d49910d1b4f389671fdc73b272
SHA5129e2904a95651a8e1e163fb81a17279899c10963e5920a8a69593bbbee9c25c536d0a41141f3dda3c5a7d7d6a86a8403c3302bf6030dcc16f1d01a1a3e5c44373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ab53e442ec296ab266078f5bd4c3dad
SHA123fb696e573d885576b587e5c3fa08ae4e3a1444
SHA2568c2cc8e8fedddeaa3fe3cf5891de5c71b4dad56d806e42f503c42ab3de31b307
SHA512851dc0f3e0accee27327c3d584d35b5b9f5b4cd116861eb43381d27ddbf0bdb30f8cdaaaa202d50e5a123b72b37b85fc00a2cca2a03a8b971a72af3a9d460e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acfb954be62c6995da8b3b95f736db66
SHA12cb0bf993f41fad448f117c57539cce3d85b2790
SHA2568fb82c59c6e47b650d530c45a3d8d8949e6953ac89d6fd81903e5a31ca931d1b
SHA5123b37c30f41d1a81b70eef56b2c49cc0266015588f7466ed1a6c6f57cb1bf174fc8d800ca9a3b55b75c04964610d715c035853e2a749f95b35be5c84a78b6b38e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1e8131997476e7389fd7e46faad34df
SHA1d8034268e7139e263665cdf6c88e2fbe1b60b8e8
SHA2567a4ce6d2b3488601bbfbcc4a38425cf8af69046872708cbb4f4890ad953e3721
SHA51280d8a3d4aa9578bcaf641c97b8b9fc2a1d0d89ede3f508bc6d12346af3e44f84b164a10a6c1f5690048c6f9ef17559e5607e82202f0ceb9aa86a04e3c08faee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532adda58bd89ce5e3cd1b25a90bdfaee
SHA13cf10a9ba3fe5ca52d9ede4eaa00a096163df56b
SHA2560c23f9aa3ef75b4fe4c57c9f57590b1e8907c3a2e2c22a1d2a4f2c1e6db638ac
SHA512b1b3421fe5fced0c9c8311655765b9e0c7759ffcc87ba64dad0b6de8facd8ddf7e6cd70d8e3a71fe128752040ec949506bbdec494375d4b6bdc8d1b6b4dcd2e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f46b99afbf701dc4de1802c168b20dcf
SHA1fdba37ebecb5f3b8b9d6003632b6cbc9a86397ba
SHA256faa26eb18470b8e34576df3cb17d0d712ffa6c9e2fde9e0143996cb096dea222
SHA512da85625464032512329411dffd70c2ffe2238d40b5b984aef1889b508409d3d05a9b9931ca9d1c5e8be76c683f7a2372291d21fe774d6f6b984531d020399301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f7da7455aca45e9cbcbbebb180c7a72
SHA1f82c31bed9d98febd4a8071f5e900ce35725a274
SHA2566432a72ff4bacd5f2e6735dd9a0e833577770decf48f31ea64e41ef4a303bbe3
SHA51256513215c2617748381b2a9ec19341ecb62e461908f7f50303d1b41b4c37ab82d49841b6861d2ddd02c4a616657ae1af15877ada0231821a577083b5ecdd95dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f84b01354f45d8842c62ffa5edbecd69
SHA189aef4f6a07cc4132e1150485f9399bbd771c76d
SHA256b835e28d8e95383404e1461031c9aa43b38afc9ffdbe7d03e22c5f91dea0e54e
SHA512b3feb1cc04e07869e37389a2e447511dbe6bc7d14668c2a218ee5540005af69c08c52f2ce386b6fe62b1c45a358b68a2bf236ef6217f0b944786158d203b18fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c467251c1be5d1e2c95d6d4b7ba5170d
SHA1804c25b559a92617c640d02332821a2d4e11e569
SHA2563c7def83f2660d2a3c7e61f1be4164f4a50d8c8921daea822289e1a111f32906
SHA512b3fb45adc24de3311bc145449dec8d7780473e6a08e63b0f0d1bbeb2287d49e7be15ee74499661bea347596f4b4a771ff76c43ce128221ad6fc7a6512129cee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a2f11a128188b4729d04c5afa475255
SHA19b259a82f99721f2f9ef962b344a6ce4cb764ac4
SHA256912f5bc256de4e6850095f8b11e62c590f55679396398e7ea9c9db8dd475742b
SHA51257d3fb5c843a3936d4da0fc29ea77f7a945f92527111c4a67962afb80a3509840268087d4a6bff1f0279bab4cf775d744e94f38651b85ccc1cf0217f3ad9e28d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53175de414f77f2963196ab2e26e38fdf
SHA17efb992e6b588f09d4925acffcad4a5961e606bc
SHA25672b37bbe65a4757c6bd74b82e0b19bcb3a3fa50b81033b166e29d6dd2f53d486
SHA51240c59589baf618fba5ee1320693c962e4422711feeefda8ad2e696ece63e2a7b359ad6c085a6a7d5697df63b144f2b97b0247ca1b12495c851e216c295628baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5106e2f6f1a104565de533f3ebc78361d
SHA159b1a1e3633f86bcdf3855f37f144849e9087d0c
SHA256e5dddd59576b970ce0ff7a8066aeb849b51c80b0e0188b93a10c53f7f6e63e47
SHA5120fc871b32d101122ab52e8aa2a77ca26bf6fe1bb1cc51a214dc28aad26555ff3c0950166ab687483dc2d72758b4a4644bcae6a2670921d713e813df098496411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57118049605676ca38dab32c038d67fed
SHA1541b9c1a1d5e6edf85be8c2724de34800fb3c06a
SHA256271f27bab021ae67029b33a4caea3ced7839b5293089f341e2449bf55629849f
SHA512157e87f68c9643ab16acf706a86c58ccbdf171e9ea14dd051c1321802502d4ceb252fd89ec8ca6b44319496bd4a435984e07adfe54ec91314ebb21d0c4033de0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510a02ba068e90a3d7eda8fbc1f800f8f
SHA1ccb37b25e978bd731b10a203e34bec4958554a19
SHA256d554b22297ee30fe9d8b1937cd195492477ecab1141b3093eca7d3b8ff32fdf9
SHA5126d2cb34e65e98d489f3234278853ee02cf3fee9a1228b2aa974766185eca1bcc7940a0e2cb5401e55a469f077b5500a76ec8596f26d41784d107f191d9353c4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512c7cb6cfd556162f9eab1127d0534b4
SHA1c1409642909890b0df5822052ee4fc3e06e0f6c0
SHA256e43323abcd056ec10503b97fe8bd59ee0400e40effda1b5295e2dcbc02e5ea89
SHA512b586900aede0b303e63b3d7c7d373a23298683a7708cee9a5786d7a50f224c3cf84c1f512a3807ccb0d252f0cbf78544e0e7ba480e38afb5ed98c656d600dd9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c205b8e013d8761e1e6fe4c7d70b9ae
SHA1043e62ecfff363097e6a6bab2cf1ef8163466f71
SHA2561801cbd352fd0d554307c6c6c0475f937f9006cd1dfbb79bc52f793f5863ce52
SHA5129ef182f5b98ea0505132af66003807b987eb99937c279375105595e588805b7de8cd2457c55cde4c027efab517663c76c9068e37b24f1936421ab8f31b0027ea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b