Analysis
-
max time kernel
120s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
ef88102743c3d9faad1fa8588dc9c36d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef88102743c3d9faad1fa8588dc9c36d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef88102743c3d9faad1fa8588dc9c36d_JaffaCakes118.html
-
Size
47KB
-
MD5
ef88102743c3d9faad1fa8588dc9c36d
-
SHA1
896c8b5774696b6c82e342701cd6da1fa1a41d97
-
SHA256
efabf7e2c571990ae350ea94565209e092e28bfe63486073ecaa85a35ce87584
-
SHA512
d378145efb22ed93b6ef57dd1dd1ccd53f07d6e683bb4b9b3b0555955fd281b84f61bbcdc1c96dcf380f3b6d2ef6433647420eb766ccb60f61388b69cfcd4459
-
SSDEEP
768:SEAWOC5CJQ9WYobmWWfmhvqBA8F6MDhkOdl1rcPHocxktzfvQU2IUW:SELOk5WYNPfmhveF6MdkKkHocxkFfoBW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{95EE2711-77FE-11EF-A207-6A2ECC9B5790} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000026656f1571ed199d692aa9d8105ef966cece038485ea4762c7dcf9995982ec96000000000e8000000002000020000000369a9df2f233c578c19ce9f717e11c0812b2f06f7b2171402c88b5b1964043fb20000000e49ce485760bba52fac1a8b975c62ed402c29f9cd09ec44bdb55e2555cf51ecc4000000075744b7967e601f521910f923077a0eaab196759bf8c010ad2703a6aec408a01c3e6303a3d2ad28e860c40c23665e25595c0cbd7fb9a22f532c550710bae1b3f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433073947" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0c6cb9e0b0cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2536 2384 iexplore.exe 30 PID 2384 wrote to memory of 2536 2384 iexplore.exe 30 PID 2384 wrote to memory of 2536 2384 iexplore.exe 30 PID 2384 wrote to memory of 2536 2384 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef88102743c3d9faad1fa8588dc9c36d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562ebb81ad4ce79603e15923c32a88934
SHA1ef904439c8fb7a0de8056179757bec6c3b1a105d
SHA25659d001cb8b3578d4438651431ff4d4b5bbdca1eac336c7b66ec374f616f9cdf9
SHA512434decf5e869d46c2ead9cba5a2acef4e6f795ca3664278bc189244ba8d0c6b0a77ce58f34c76023b6bb8060e2be1bfe7cd7e59ff31f7ddcd03c98af39459c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51869a6251ce36bfac54207f5051d6ae4
SHA1fd045a81934fae737c5250bd42a91756c0920475
SHA2564ef6cf48df41ddc2c65ec7f23bb39b23614dbc33da9455c0fe57f56af856e898
SHA512af30bc1c9d7e1863ac155ca37c14dda7ecb01330a442f6adfd11fb26e98672aee7c9da0a4ef197f4327787631a316f408c18146488b4e2d727455443ec426e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51980550cb4e4a85619043e63656f54b0
SHA13ca1cca9de7c802f24f1279490e191fd862ef054
SHA256efbed34890329b695a2b7572caf6dd908946013383a6e81095079a3d7ff873a9
SHA512cc919d653dde9c970ef42bfbcbcb71fc1fdcb5f789a376b6103e0804c2810f1391ebec7ff3c1fac24ea9eba67c651e4c60c9e8b5b2d4cbe7c3b6a8809dbe78e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2c114e8b3ef9fa4117bd1d0dbc6284b
SHA178553d560c0d2e6e4c84219a559cdd725e1e63b5
SHA2562e3faf5ba02e1cde649f14c41542bcfebf44c36936eb6c8b9490a047f97be8c9
SHA5121c1c5dd0fd3619fe8f433fd72e01b6b950d5e5aa05fcec40ddf44d274407691122b6d09b1000515607227a9800536d586f156aa63ab934915cf0f7e144654aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b370798e1aaf7fe5bd8683da48d2c1
SHA1c3a592048c44dad57224ddaa55bfcdaa8b58b65c
SHA256792b3fb635c65d49e4eb48e1342274f57c4cbfd497bd3e25338ed99c1bd1a539
SHA512c829b8af4ad15926fa172c7d951b2b028a94f236cf414a39174cadec4a1e59a999df68101b5ebafa36551e5f04024775dd5219347eb25357976bfa9be71f6d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578f0f6e4f5de6aabadc4643927e2d109
SHA1d96499cd4439dbd8682f565516e72d5d859b5985
SHA2569c2a0359fc19dbbb3f3294e9752df77589112abc23373ca0011b7f53bd651ff4
SHA512a0099f955567c45fb3863e9f171ed6ff4633a9a83d8f9cc8f85b590de322afd2078b9415d1d20c7eb7b06dde81c2baada7b65af8dc2c7c97d2f99af0517ddbf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501f4abf62735fce81ec2ba16a625c61d
SHA1e4317fc976edb7982134386d586d9911305e8e95
SHA2566d74b4354150f452404945f8f5d4a4ff02c49bb799e0b74757a1c4a99247803f
SHA51219300a8c6ae09691f6ee289232e0c20f2936027e62b32756bee8455b0b2c994828e5b21857e3013cdb945eaf914a138d4e57cd30e7a0ff5909132ed4adda34b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571a1ba013e4da78e646011d3bd787cca
SHA1432dca70a88e7ea6622b4a16268d8db18dd7cdbc
SHA256dd31bdaf7e3ca3383f1506be53c55c358e9d5991e0769fe297b2f63ccd09fc7a
SHA5121b4dac369f00a9523bc76edcf6fd7f5295dd767b437a32758bc5bb2a93bd6f5690314705c1f99ea4cacd0898c38f302d15006e4ab4ff07d1242df318fc551eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf4ca9dfb1c9b22ac43ae083acb35375
SHA1195e00950422eb01ab71ea98c5d0d9db4d5a9f71
SHA256c8123a30d7b0faeada30d7aa189ce7b81b6830cb1ef91910f02abef171ebd185
SHA512ae2308d9a67af54f4391ca5cf0744705a9bb2f3ebdef5e19aa48779927991a484b3912e6b1928902664dd30e870c969f79db087ee26d6fda21c64417cecd887d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5918e8a766df0029e78a3091b0d412322
SHA1cd746322e8b6713d7c12e33abb159e26d712aa6d
SHA2564e8d48fcc3a6fea43f9a8669e5de8cd113585138e48756a7390c3ce847c64a0d
SHA5127c6f802dbd3d17f722774fe3c0943e87666b0489659a6934ad4185b41df7b297b060117cf53c7f922069f924113d65acbaaea23d993d819e83b5bcad0fcf386b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d1f4333e3a073ce5b3a51f3451e1161
SHA153b4ac746ea7460f51ff13cb69d11efdb08617c6
SHA256ca48d2486db547520c90db0042972ebb54dc78c136af4563f1c4dd0258f8e15b
SHA512a99ce897ef8fac7194d07e1cd1266d64c8454d07a59dd57ef6fcf18f954040e5ed3a3fee69aa1222b6fe337a07d35f345919b43b498bff79925f469998c598c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520e4e07ce2fcb27e8bb471c89a9d3171
SHA15eeb2935e942c5b66ed8f7abd6993bc82118b467
SHA256110032e2079429438522c5639254cea3624f657c9fcea424efa3cc781deafccd
SHA512a1a8d7a10a16e8fc069eaee6238072a18a3eec1db677fb7996bf302840a795c3e356db1a334cd548fe668894588623efff01a4f20508846e6758b364376b9b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a895932d6817e6644ac5ab28996a1ac1
SHA134a6ada902c7346940f34f3b939d90f05e6ec631
SHA256b93d99e47d2d4af12bfba16118f1686ff3ec6d4a449a2faf481f06a524ed1416
SHA5127361bd0c71621260956218c4f396af4ee3fd9cf8a003327efab7097ddb40e8ee5f07bf0e852889bc2687096470fd88123dcc0ab39a5f4186815a57bcd3329099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f8f7e89ff9cc237e7d5bb058afcb71a
SHA1e2659031ab9df496e726a1987367c179887c6818
SHA2562b20ab642c962d546bcbcb91ca55decc3823f9e6069124f6e2488b7b8e188ece
SHA512796ba605c6523ed2d66a51381d4ac6bccc17578535bbad891e151700e7fa3a7cdb59fd43cf9b0cba87d8483d9f0973c08c4c6f1213392b68c064150f0a9a5d9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c310bea2f25a9b091b20362fa67f1ba9
SHA196261d1f510b233246a0d7082c73a97a722eab5b
SHA2565ca3616da96215404e2a5c627ccc3e7895244d0a5bfa969e71f97ef5a46defa9
SHA512d3398565b01a5938ce6caa8e5c889f7b98558a153d911b98926508e1b1649f849b0e2458227efe1bcc4f78c95c398a938aed16e4b6d52d8290f80ad7988ea21e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f8bc5a49db46e0583a8ac4cebf92f8c
SHA10c4b8f4ba3c4f8f4e09a5c2aef8c360a84827d2f
SHA25695ad388945e9c151fd16d1e10afe08b03f40b5c24889b8286685dab98ee155fc
SHA512ef89f12685d8ec914a168481c07fcfbe9797feb8d46188ca7903ea0480fea1eb3fd3188ee7b1ad91f20dd01ed62d2c6e9a029e49eda50ed737377ddffbf7d828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5199a72be8bcea86111aadaf03f065591
SHA1becd53d1c967e2323864da2464cf4fde595a6a48
SHA256c6440a45ee907a4456370ed42e3237ea58a7ca75802d6c0a139d038cdd1b0321
SHA512795ab1e4c6fff1aebe35da5faed82a37ee5c9efe1a57cdb22d72809299c986da653bf71ddc38c8377e941707bba6e6fd0e0bd09ff701ad30aed99499845084de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c753ec5458b566484420527c0a90b9fd
SHA1240c007724e406e5996ef10757696e2805b84123
SHA256ba73f30a0faa51a483f0a9dcc5cb5233ec38d19dad6159ae24675724945aeac6
SHA512b6b6a9b9bfccade4e3043e489276513377c392915ad227064455387400b353f4719e13ec266049ff6476369c0b06b4f4747a380b334b04380b23e3996795e8ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa71ee3964a3469fbbc55e84cf1e87c9
SHA1093de029acd3bdcf237e24fb8abed624c7f02c42
SHA256b38e05990b8c2e02b176b509957c7856c3a0a459bc787d3d34eda51a68195f17
SHA51251291ea1777808b09602e4aca9d995d45c7f2279d59931d44240c19e6c7888ea6139b909c2049e0bbb97556d60bbbf7167d35108fdb0ad192d5e28b8a9692280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f5fead3facdb0365f32a6bf07c9481
SHA1a3f9f4033f5a3ec42b831f81b66da46fe9e2e370
SHA2563778de61d3de1f0ebca878333766d18ed234f95361039fc0728dfec7843ad4d8
SHA512c648426d54c9fe01520e40f921d647a5300b0bc6caa58244ed7f6b71fdf28bd7d93e6f08a929b901857074307d05a58b9cdba387335aba95ef7fa4a70d7f3749
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b