Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:26
Static task
static1
Behavioral task
behavioral1
Sample
eac208e218e86c9362656b0d4945e12d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eac208e218e86c9362656b0d4945e12d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac208e218e86c9362656b0d4945e12d_JaffaCakes118.html
-
Size
1KB
-
MD5
eac208e218e86c9362656b0d4945e12d
-
SHA1
362436188d86c2168edce4710405cad2b482bb92
-
SHA256
c3584ebd111bc5e067a2561bdd167591c1c0a6f163b4e910c8392393888da6ed
-
SHA512
e3dd2d4ea0a3b48af5b787660217aab8029f1e41631f4fecc69a797c40459efa4f94d359912b2d369c1b69fc04f4ec20b16b9fb4e957d343b2952917d7c19120
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7069e0f75c0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{23401C01-7650-11EF-9FF1-E28DDE128E91} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000495f0094b855353c6a408cbe131bb13badcc47ab80d83dbcc2b0d373e0b62aad000000000e80000000020000200000008e244478ff524058743d23db81df4590197234538fd6911106e2c74f24dcde4820000000f927ff8ccdd781ca37db7bf5a7f774c532327810a2f1c840c4b89e52105fa4b040000000dbae0fd2798546755fbc508c7369f8fb33a85c0e962dd628b3a0342ef417422a53e07a22a7e4f5d93ea42b63ebf09ec562688e83de9ea3f0ac245e602b5b928f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889071" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000079c8663aa22b48ea9e972c0d4bfc8432009fc8e664039c4b8196dd5c4eb43773000000000e8000000002000020000000a5587db3d4db4fc0708d0efc358e9ac4e63b5040cfef2714ff1f807ca5f12fb4900000006ba6414d68f55dde94b140049afb2e625965707710d4118a1b653a303a101ffe71112e71c5568f5ccf1eb4c6ed90a403fcd694a5213ca08580e91306f83a5649074f7f8c0ba5052755db6b4f3f2a8a4155a54188fae518c0034c9aa897e538c9d9ae18c287855622fbdb6869a2c608d6acfd96cb7b38b6be37741567e1e51858c1298e0eeb1bee3ccf54e14e86bb5e89400000009350fd15a1e6ca6398dadef1941d45554529550835f6fdd86fbe9658559cc274cb8e0e18d0919601176eb1bd147ea1fa6a3655f1dbc97f42bf8dc71504cd0f59 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2036 iexplore.exe 2036 iexplore.exe 1640 IEXPLORE.EXE 1640 IEXPLORE.EXE 1640 IEXPLORE.EXE 1640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1640 2036 iexplore.exe 30 PID 2036 wrote to memory of 1640 2036 iexplore.exe 30 PID 2036 wrote to memory of 1640 2036 iexplore.exe 30 PID 2036 wrote to memory of 1640 2036 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac208e218e86c9362656b0d4945e12d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572f07e022c7850618317202f83ab3dba
SHA10a3041940d319f2f4d8726805157db300f285776
SHA256b9e27a70c2697ab878032dd35f2b4784bdf094c4c5791ae2155556e25ebed9de
SHA512dde5ac24643acfc6f09a71e5980dd7765c95034b472594bde12bcd3a46ed5056c7005b3f7604b4f78faf9b192900297f5c8979879682c4a31045bb95c31162f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eacbaaf7f04836b8d12126cdb2ebff7
SHA1b6636414ab9a6ee443b959f4060bb195d0f364cb
SHA256cdeb7198c4ba4382b74c0cad61b0b8c4137c6f8ae39f2f9a4710f52954b64fd1
SHA512ece445f35642f7ab97e3d29f2bf978935e29de42a93b149333e6b85b9b80772a163967302c7185b7c45baf98438e237c06239c09bb49419eba31fc7b758f9bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a976aea4f4972a1fed2a3ea0757ebc9
SHA19bad1d172f7b0189646e24f773a9cf5dbac7626f
SHA256360c0716bf50fd32dfbc4e9e6ecff01645353bc4060d2462da0d8672e63ec09d
SHA512947941e5299deb82cdfb6d8cba96c610393f9c13edb3fabd44d84c6e597a0d6e1c6dd44f1291004265119044176b10b1b87c67ad4795124e7baa158f953da140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5616aa50968f720836a8722113f8a4c70
SHA1b55e9075d693ec3679f9cc9b7efe42adc9234c06
SHA256a439b0b1dac6b23a3e0a4648e05e26a8bc417d7f9d6cacdc83a0968cd4d0c59d
SHA512a432fb5d7e48f0fdd5e8e44051945057fd98e799a01495edf782d87334a0debb7ffc099e84eb832437d1024a4d32d2ba40ada562fd7e339a3cff494599e52a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c359da4584e76f8c5ad29dd9e1ba721
SHA14589304574746bd149c245cb878013301f187131
SHA2567adc160ca122ffb3c448156a3f09361aad98c70b3d1c6f640192cbf6bc3186e8
SHA512e792f3dd2c720f8705830a1f7163a32804aa1a717092e5bfaf762c1e785315f232b80ace3dc7e09d1bcbc72d3a53ad21cc11b702e400138a98f9de8ce438be4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7568db249378d4d4848ffb01eff4b9b
SHA19641dd45ca2524695aa73af1ea7aa12dcc660478
SHA256bc2ea282739e9ca5efe4d7387b16ef0afcc2e3ba6c8f4318eedc4d3b13a73a68
SHA5120f4a067bfe0409ec8ae2ef0c1c89e7655fe5370d6f6e4b57284b61de2c519eedce47c4bb4f17b5576f9861d6db1396e534c71d0e4057a5b548912e12cc1dc005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538f254c93049ed450e40e3f2cd34a434
SHA14cfa12ddf4b279e7f49480a036fcefb6ade930ff
SHA256515ea79ac6891727a1a66fdd6256b3474317da040c88c14a299832af48af2f89
SHA5122b56ea25e59de369113b7b65cf5070db50fbc4dca16e5e1a8874c3bf3bde195c8a186e02be7d059e433d440ff0ff8639407e0f15d539ce87766f21fe358a1619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a738168dfac99b8238411e9aec32ba10
SHA1a99cc0478e3b889a373edc75000a6aa23b0652c1
SHA25692eb7876ef681d39015ad6c5620296607d18dba993d6c277a776f477e2e2f976
SHA5126f29d94b49f73ffbb6eaeab8dc00ebc9c7b4fd6836805d0953144b7ffec53bdaef05cabef38a0bc54ac33a803bda22cf07651766959322824641025dbcfa35ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5414ea1df669fe2b6035aaeaaf5d215ca
SHA1ada608898c0e39ba83057bd00409bb6242a61c6d
SHA256001f9cb479b6a9b7d871ebc5c356767b164016d90589fc04747258414d1da56b
SHA51258a1cab7a6a599e55c9506363509883039bce312db07ca855c09d33799ffa0d04645b4a32d6535765fa5e6562300e3c8a458f9b4f9c4f984212626d2b46628ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bffe853616bb05a6fe598542203556ad
SHA15bc02df986654a96265d552d3de67f48ee3f00ac
SHA256a8d742bba01e1ffc7e7e2cd6f2d3972e30d34f5ad2b91fceb1c4511013a5049c
SHA512d9edea1736480d171824f4c405c338bc48c2e79c46230dbfae6e247634999cc73e12bb2f738cacdd484524710bfe6bd10403b18d3b61511a4b29d288ee028fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1b947bab57202527d9b483b11832cff
SHA1f1a075516e5e8bccd9518a4aa33e52835b4b29bb
SHA25664147f358a98ebeb42fd544f61be3039281ef086106dd407445591838e69c52e
SHA5121eb78c03c577001ff0f067a00e0322d0b71830e194eb4abccc74c532ea0ebc3aa03ab1b0d6039d8f49f5833513068e8bbb694eb7c1deb8733794b49710056ad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553be90504afe4f9a93e9435730d9784b
SHA1060bf58d8948511bc6fd03bea104a4e9c5795c28
SHA2564eab0f85d8a7333eff5fe005176abe7133ef6cd4c60d1d4e0d8e3a8822900a01
SHA512227b910862a45d960901713deb8500b3dda74981947c353808293fafca2152a07d0cd127b4b8bcd04e382699d833a60882c7f71a20cdbde1a46df45d0cea62fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac146f416f6934b4321def4a0b7bbf52
SHA1e9089710b86dda4a88c9e33193ee9a5123d8d547
SHA256645be0aadf6e5ceec77ea85d06ca89f891df68b39ee786bbd024b57523a8ff09
SHA512d377dba5c5c2f9bbc6c8b9f0edd77f78e37d17b51139ceb9d3e459886708a575dffb646500106e36486cd78b3b08ed93601f24fc793546a5a204c8cd168eddd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9026b9c96afc8188fd17a527edb35da
SHA1bd32ee1fb476419ade0e9426d671fac756979998
SHA25662c6a0eaf6fcb8264197be16c57162ded1e85c4486edbbda0af9741f2f27e6b8
SHA51290aa20dd4338f0d701d736a101e228699dd6cd37a7c605f1d2134da89d64d8b5ec23340f244bf666d36f132d56a544042838929293fb77345039abc259af1d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596dfb20b8033d2dbe54b3be8434509ee
SHA1623de60b885a9570cf2015b8fc79cc45ec05a391
SHA25641ff28c81c29fad9d70c104f74819cd22c241428bdec3a810100a09674fb0ad9
SHA512c399e6aad4817f53b2dd82b1bb4881f17b84c754c6e2ff80ac646884b75a3cb41c46726af9aec088aa7d4a840c5ff5605e983e39b8602ce962d4e47363decbcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b1589b5092cde29cef6a4bbfe1c293
SHA1c6c01326799a591a932a7df2983c70e0e965b634
SHA256bccdfec135c3f96ae67f05095b044913061297baa400ac5f6923dae951895ad6
SHA51232f706989c2162fe37f52af1d19b19812286aa4e3ee414b87382f4039594c653b1fb5a024a0bb318495525abd2e4939c58dac3733b40671fba65d6c1892256bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4baab84271bc4f1ab667acb5d9d8f9a
SHA156df5141b427ed32eeea36c8cbe3b74ba0f8ca63
SHA256df5425875b2f14ce2c22c4d11bb0331d5b03ca262bddca991ee95d1f06f1c046
SHA5124b92d2219d2848ca36d4e9c608ba075db12f9af27453b6175d2062c10c15c5f1e2e27324ef8f96c3c21e3f7766056b4a0f339bfe018aef137a210e3f6798920f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ea5d8d334e8c2f758154f7df3611875
SHA1e81bbfe12395892bbbdad270417c8e736709b4b6
SHA2566490060fb6845a2c521f934b8a7910bb3b1b5502bdfedf73ba8a220b79765311
SHA512065ccbbb9a59b7290680fec427f3b66c18db054386934c08eb645e70f65adb3512610fbc3b329c661577808738bddd2f2666077cda2f638f88b8cf634a957e8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57370807c60097dd162973ec79ed2501a
SHA1a3dd3230419b53ef97f94b9fa1f231d8cb8ef9f4
SHA2563850116619bd20ea67020c297d89b441cfdd5ffbfe1df90606132a3a4cfdcbab
SHA512d37f55e0fc5f43365fe1ed167f5be88ce1cd16ac7da0ec4a91ddd2afe9d57b3781b81b6ebbc6ec484760d46ce077cc5bc5324029825e4eefc79b279407d6de07
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b