Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 10:46
Static task
static1
Behavioral task
behavioral1
Sample
2fbf02062052d3a387be3aade56195a9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2fbf02062052d3a387be3aade56195a9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2fbf02062052d3a387be3aade56195a9_JaffaCakes118.html
-
Size
33KB
-
MD5
2fbf02062052d3a387be3aade56195a9
-
SHA1
e9a4e3b040daa7ffe6f2850c8ad80b329d1a9002
-
SHA256
e83f360dd287054083be4c4e2083df3718e92708000645bf30c5adfd0c6dde41
-
SHA512
ff42c2837594dfab0c789b7c8389a4a17b96adfd487c71f9d4e4e0ff467a9b86625099d9db72ef6c3f05441348fbfd470bf9495e613f7a7681f6f25632e2aef7
-
SSDEEP
384:Svl6cPSJl6fYftFCfWgBte8NGm8CZS/jworPUxMP8hND+TTw5stoTZH6hmeE1M42:St4FtFE4hfGrXJjWsva
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000f199ddfa1943d78137573be469268b2e931376000c54dfc15332ba64fb0a5028000000000e80000000020000200000000b383a8ec28061c4abd52d14191e2808286b2ae0bbcfda421e3d841b0eb50764200000000e26d440fae7c6642f9253c7289d43a418f1e1894ea12128ef24e7f7bcbffe6140000000fbd94fbe529a93b711b1909037ee64c8f1866484559559d6c828c1622927f54cb1e18c0e38990bf792292b99a4aa8b4dda8a09c9e76bc799af389be3fef58d34 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434681118" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{928395E1-869C-11EF-8967-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c077a7a91adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2492 2516 iexplore.exe 30 PID 2516 wrote to memory of 2492 2516 iexplore.exe 30 PID 2516 wrote to memory of 2492 2516 iexplore.exe 30 PID 2516 wrote to memory of 2492 2516 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2fbf02062052d3a387be3aade56195a9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545d6657c4a9e9d91ed82a49306418c4f
SHA19e7fac16e84edbf7e8d689f40373718a4f34bc5c
SHA256dd067f93997d565491e0d83a9ef9ef680268a22d821dd763c729904ee39aa4bf
SHA512c9ca8b167663849cbcadca23cbc12afa3875b726aac507a07e0d7216c63c1e40cac0040a609773d6014b5815c48e34e70bb02877c29e7203b9cd89ff96bbc81c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a211caf97755798db2d4b75d9288b1fb
SHA1d06dded9a0c9929e8db10254cc93f9c6d26fc927
SHA2564ef17d446d069ab3d867a9c0012626fdd8e2f6a3759b2d469bf9825968f0c3c3
SHA5128842cd2eaba8320d95aebc544fdbbd1c713fb9237f96f209c01cb2ef0c7cf167f07adfa62b0c4007ec563eb555a3f76e83fdd59c2c4c5db1fb1c33aea9114193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec20a2fdb115827cd966cbbee0244d0
SHA1ea7963b212a74eff3f725d1c69310d026abe1ae1
SHA256ec444b7fd1761d66c1e5185e9cab0bbad7ed22d909c52f1b0ca0e189a73628ae
SHA512b7bb093a1247d45394b63dd73b0741161530a38362158623851f90d58637da152f1943d977f1e91e63cc41f96340cd508636a68e63288406128eb0cd88ae8672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c08a9c97ccf605ead55316ac43fe143a
SHA122a091fcfe752adcb661110597f6b604ef7af747
SHA256bd786839c314fe3b4fdf0a61b3f965dfd3994b7bb0c28b82e7a2a66bd3b56f7e
SHA5125d2c8d24570cb686a7ead9ac0be10ca74a99392eb8868f1aef1f52d09cdcf169e9f85229b97956412d790536c5c75c1307fdc3948d6c4de8fc7e9b35e0db6b91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dbe48e33504368e519ce7ccd8dfa3ec
SHA1f7dbd9719908f8a25fa450a66ab6ff65e08b508e
SHA256846525b5cec62cc96a8e7aae23bc0bb5ec5e26ee0c335b3602758db7907f59de
SHA5120fe277a680414659295f9f3812e90a6b674cd918f7bd19bb83fa2d9e4077a376b91182779031727d4d3adee80e009db3fed0adba734abc5a738aa93552d0c27e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff36d4df1af9d9725d4b1027eda460fd
SHA188f13f0deed0a3d97853287e1615a399ae1fdd4c
SHA256db1b4d54613d1693def5a331fb242926bc2bb6d95c2fdce2963dd4e5f34710d6
SHA51250563b5868de9cdfd70edf192c55899223dcdb613d4ebf41006018c701e1a82c9193195d141d78c22253862a35456556cf30186ca756d48892515afe99b34ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599eb8ab5f87f56d034f9c5915c8d81eb
SHA19bbf90943b6b34a8a0f2e9990c8afabe2f83bd4e
SHA2567853e8bdd86cc2f359ace77e7137e0f0a75c46399e78d3336c48e162618085b8
SHA512c4f79bc4a69550bba9ffab9b4bb69baefcf31dee0623e6fa695b560e2539a701552403eeb3ecc96b9eb155609bc9d117c804859529dcfb2131e963745de68f7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5714d5a9ce47fc27c22180171c0e1d007
SHA1c48ef96d82512abb4003695d4495b5ee12b66acb
SHA25620935381830341d954b00655a12aae357e05a1b448460b70e00f4cb18a9815bb
SHA5122a5139402905d937480cd84efa69c2e8e0f5c22a86433a10b8ea65dbe113a9c56d644c8ee304181b15917f4b37324b63adfd5b2de3c83592f3b65512620ea3da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dee05abe79e7c07b12198f6e8f4e6ae7
SHA1d51f9bd4ce0e46b7d7f127dfef205a40cdab91d5
SHA256e6a30b4c78e16697fe3c4bbe40869d0daaea786d754fe99ab23f049731b73645
SHA5129b8b30116fbae5380dae675b522d8a0e6e14132eda1f898b295dc05e83b996cf739d06cd3d439f7343899f959ac63c96bd4da4ebe3b372ac993719a9f5c28d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dacb7b4239b75f4d132e6d6462453b75
SHA19c884d99ad7650090b3d60bf0f25d34189974f0f
SHA256e90159f255ea1c8e37a5fad95c2510f41b32d56e45070e0622273cc091c8b31c
SHA512805d4428acfd7595e7a4b49af83a10512619260929089a44770f871c2ec5da427f14997fe3ee584b09e2d869b2b944be32b5086c7f58d8d7907b4902bcea6b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bed1508480bf59e0e64bc4fa4cbb0ee7
SHA12f1743d7680aa538e82b7cd39ae2da1ca8261c98
SHA2569c15f52fd951646a16474893101e0c37a432c1f7249cd656564103c575091550
SHA512760c1126329d611073ab596f3ef9c9bf3a18e471e05d14a7ed72c42b50923b3dd9411cb612d588617fadaf2076911476c8d9781ad6c3d12d3ed38026ce32978a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3d05014cff8cc737af9ed6c29c02865
SHA1636074dd3c7d79b594e0f715e377909049bdc759
SHA256de799061071e57f631bbf0b547cb16e6fe457a9a08e131545a8357c7303d15bf
SHA512ab39c3dcd31b5f41b1db1f4426f8b2bffe84090e17ce485ae4147dbfa881cb17cc218094ffe396122a573773745788f659fffa1caad912b50f84e91906806857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5901faac111bc797b514e65f5bb3bda53
SHA12bfcd8a6287cabcd5c844930397d550e88dcb3fd
SHA256c3fb66bf8928ba41ccfe91fbaf6d8132f8a2b5fd13584232495265dcaa8074a9
SHA5124eb8b79ce717fd861ba27513534928b9de9324cea74fbc7f82727f6e96dd502002a0554e6b0ea6e855de4066727b62fe0c416f9fe19d6f3e641deeb7eaa822cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b0111f01c1e8523f52738d7e244e3a6
SHA17859d6585e939557b0efe2e0846e45c94a2f4893
SHA256cbd4cfa79f6a0d539a1abb270402b223456a01945ba3a4a10ad15f19e96d9554
SHA5124ae8a28945e69764e2fa5307e57bd0c16f3fe0c9df24fc3f6c8a49de40c79f53719e17f0ec7666325a2894f7fbc98d29ec9901160cd296593170f2017907c5db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52964b866e9a9db4968992a5f10b813c6
SHA1d1054b3154b7fb0e7ab87d4e6beaf1137ada4261
SHA256046f4c7bc3cc92e85ec2ce3a171df34540033b8710aa8d577969f80c78eeb6ff
SHA5125cf6d788b6017fcffefeb8d9f8aa7ac1c31a3d994e6926f510d3b21de1718caa46ada480afa5365a3aa56259af7b828a6a898b42d16d9b350bda18f38c89b6b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ab5f101c82811fdc2fc655584036a7d
SHA11baacc924535d7f46ba61300c9a6b1a5adf1296f
SHA256f10ca8980f02e831fddaf6ff2ad1ed6c595f08973feb3338740d70d6ed2a72ee
SHA51225edcf6257782b1246f1c6d7e5ea5da2ebba323953a27d417d8f0c56917522fe485865819a0ede1a580efc16c83464e6827205963346c03b86ea376b041c13bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0409e63011152ece072d5977a38320f
SHA1d8e3a7f5767dea8450f4c993e5e2da45ccf75e9f
SHA25678322e37e96bc46c0dace3cd19a209af8806e5134e324056676985bdb4d0ecaf
SHA512c925242af912a99cfd4e61e004568af321161ed921cdabfd767cfe34a6ffcbb93414b30929a5fc0b237a2b9c51413fea6094ca9ff45393e641a23cf0f54c080d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a6b0b01b99f99081e753eec043494b3
SHA19845b709b184cfa94f7f4f76f825f0f014404565
SHA2560689b4ee194034a7adc5c031e261aea77400b3b873d3aa609631a1ca7b24f1d1
SHA51284a74352c335d23b43cb3f11fe9f9367be1c594f567f5aba9942582db6823e0341f295093fddd20a6f5954217833c16d07a41d40dfe958658999e6a090daf44a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53faf8870441dbc37e933bd93d0659d19
SHA139febafea55c90e94532e63ff2ec04645567af28
SHA2560556fbb591da479b5d4aef9b4a847642090eb8df776aaad961563a4b205c9f1d
SHA512548bfa3603292085e51af8f108fad673b10af37b252df775bececebc823a1e932796158280ba1c9a50c1d0df6ffd5d96a965e84d6f43344c622bf7851cdf2c24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5911a27f56263e01c6962c55c713163ad
SHA17359adf214dfcda6dd56b64d06f1354920d58d26
SHA25688a8ddd21f0e9518ef518f815cf370cd66434873a08a4fa40d908782f8ebd8c4
SHA51202e5811531ca7ef47258a67eaf31fbd510ab38644159e894d047f1ccef5c2f20a7efff0e20bf2ed603e65a88d3e85aab7ea7329f8284842cffaa71365488ff95
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\f[1].txt
Filesize40KB
MD59096c7f305f9b8a7c0c8608f5a6f9213
SHA10078cd0977dd776e9cc6c23b2dc70842fe9f1172
SHA25604475ae7f3a1239650d30df7314d6b9e3bb9ac1fce2aa69c1586be8b08477454
SHA512332543700aa35759c42fb557f7f84df0c568c0748efca51270cba91607977127d09abd0967e4a9686385706805d5b85876e971b4c89989592276aefcd38bafd2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b