Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
39e1a9f32f805e6e56b7a8135ad53550_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39e1a9f32f805e6e56b7a8135ad53550_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
39e1a9f32f805e6e56b7a8135ad53550_JaffaCakes118.html
-
Size
53KB
-
MD5
39e1a9f32f805e6e56b7a8135ad53550
-
SHA1
d8c8da8713d709686252e531b72a66de7c4e2643
-
SHA256
b6345557798bb3f324d915149bd92546d2fc9cdbfdf8ed217b81a664436cd653
-
SHA512
31605d9504298c7527f09c3c83f440a7b323cd4ca617e19e6336ba902cf7c7006d80cc709d72b3082704a3c1b7b43a667e08777aa73758c6020f812302a96080
-
SSDEEP
1536:9kgUiIakTqGivi+PyUIrunlYK63Nj+q5VyvR0w2AzTICbbMov/t9M/dNwIUTDmD7:9kgUiIakTqGivi+PyUIrunlYK63Nj+qd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80bcc6e29d1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434896069" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000006a692c15c44050d317405740cd773ae3b85f99d3dcd350a5a654fb7ab2fc8491000000000e80000000020000200000001a0afad8447422d75bfbada0e9d098a80913d23008d63c2b2b4eb082fda0966a2000000096ef190ae383b167c90f9d14c6e380bbf51b1571e00eaa12904e95ef8d013afa4000000043257fd78b03a5370a926ae92fbe7496b97c57372e291d2f4f9af0fea6c7afbab655c71f2526dc4a481b9e8c68d1aa3d1cfc24a55508495c5e7071a4f84be534 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0BE3C271-8891-11EF-A7E8-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2368 2068 iexplore.exe 30 PID 2068 wrote to memory of 2368 2068 iexplore.exe 30 PID 2068 wrote to memory of 2368 2068 iexplore.exe 30 PID 2068 wrote to memory of 2368 2068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39e1a9f32f805e6e56b7a8135ad53550_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c7a5b1de8180d1c785067b81a0d519e
SHA13d0471143963dd7d86b502e98d82eac68f009fcd
SHA256fcc93c22f50fb26c8d313c25935b99091f411a963b9f9a2180d577bb4b9eb893
SHA5123c696db8234b70eca5688813055525067f57f329c6673035a358bed8a9b362a3ee659433b754fff46b78b61ab5ea56cb962e133d3ab69452ee439b1437702058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535ff8b7e0abcd20678eee33bc9ddaf39
SHA1fce00f4650fa1eca7539b61aeab5dad5c317ba14
SHA256fc632da964780e9e638d06931b453b4701a65fb5b6e9db4e03291ed445c9216d
SHA512a34e582d28bf5c4423b43061c6ab9c58d3f44bf1ec4c2bc6beb6d71804de282126353b9885ab19c480333ec9780dd7b3fa3ea5a806b364c7f9bfdc8258572970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5552faab2924d6751bc54d05b67acc712
SHA1d358017dfaf909fc8b3038b7600efa0706656e44
SHA256c8d3ee07a2b61c4b0dded5832f4da0429c1aeabd8ca3cd32fd0d98c6151e99e4
SHA51270e858769ea2720733c94661b45de871d4cc29e810aee8e70db67d5a35a2d0e71e87a51f96ab361c66a3147bbbdc24cb5fcb13491c05a33c14c57b9235294e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571bf26ac53bde8477af37c0600fb8f97
SHA1ca4a0b41ce5e20f4b0d2e0edb9b95b5dd747beb8
SHA2565454bd11d5dc2265120197e5a3825835fd5164cd080934afe8cff5fad126ac63
SHA512d074b95b2abe696a8ec6a706db409e536deba66cf749a1de0b9f7e430586a361f0b2001839dd45d75516bec51480e9c668f9e745bb1dd299b95b824e4cf4727b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5705c112e8600ea4d705642e603be39f3
SHA13e5298c3b3a94127531143e70e2d3de222537ea6
SHA25620019184e78b9404425675a595b82ae2c0c9a940adceaec2a8399d97ac69999a
SHA5128fdff6d066deb57346e97f2a07690492427dc970c5d61004ce3fd2d086218e6019086c222b4417b800a5c43b9923fb8772373f3c758f6848afe834348510dfff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dac703ed41f2fc9533eed8d1c234a1fa
SHA18d3e01bf44cb9b7ea1bd2aa45a2e3713d0a4d9fc
SHA256092360eb93066b8295f1f2d06a7cfb15dcc4c4693e21e05bcb57319201cbec6f
SHA512f95b43cc89fd5869a093b2a0d810807bc66e3f66d41318f110d06611dcdda53b7d2285b9f417d5e78971604171605c8e347d385332e3e5e99f5888b11f7eddea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e4ee3b5a720a7cf765cc81ee901ce68
SHA129673171e3b8402c3615724d353a34361bc0d83f
SHA256574083f0b02b0c73897a1eddec918d572c7efb3224b8522329525e00a2ed88ff
SHA5121ee4500ed002709f0e419460e5d029d904efffbdcaa704d6244775bfdc9a16785057cdeaf38f2c34aca0dc9b969ed73ad304b617bb7520f50b2c79534f18fad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7ed234e046c9ca0352a3e675027c681
SHA1cf845501ff96f708dcdf5f0682d75baae1f2a931
SHA25628a67b90b82eaea109ab4571e2b23f1be727950d14212d0c9de7c95124c11ed6
SHA512933c61ea467732d6df41c1a09bdb156101df1bff97d946768d3b88f4f16bb6b5fac1868c2968c4df61043d22141189fce4e904d7540b5fd6335d755e61841b63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d4274ad9b4a0f8fe6b6d3d924133915
SHA11b3df29534e26a0152aefeb29e21abc00bb2ad4c
SHA256e58110a7e088839301e233c837d294539dbf50527fe783561766d4e7902f3834
SHA512f8534d84872a4c2041e2dd492166dde5b76e246db3dd2b9b3e86ed416a9e9201f1d5b42db2420cf74341db84d4baa7f942dc1460e148abee389fd4148c54935a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a134fdd7c315adc2dfc771a027e4722
SHA1a14da4f59d6f201b3d653fe708f9c9e0a9ce1793
SHA256f12fd6654d020c5c1c7809f74f3d106b7eec92cf63e145a0ea20eacaa952b91c
SHA512f5e28437a250ece4951c051e55d132d86076579c0f46b3df6b1663e24baf274ffb2d8d71f5ed6b79ce326d917ba409785525cfd05d7dc967b3ce32e31228dd25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3f730cbbba2fc8bf4b5e7414ce241ae
SHA18dbe1232f3825f424d2c605b548c79d8846bdbdc
SHA2564a0b7f1b32a40eb7f7316b59e6e1a8452add3c40ef80c6726a72305db933a734
SHA512d21e90028868b9a4279d87a67416ed93fcd7526852919bc7e64aeb129b7400c39d4c16ff74835d775d032c522a9abb3e8932c9c7d6ed236034bd4c42a0b9ab24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5170a2d35b5db17b885aad0445f64b493
SHA12e2cc9c821ff337f595ce63206d00445e1c35f5d
SHA256c2e016fddc94a731752534983b2ac513e5557f8b3ecf5df2efb1d5eba5a587c4
SHA512983b2283b91c01b7e7ccf6f36d770fde10de3173c5ff90fbc6a1aea19141f59d2ef9cb00dd9b8074b4acd9d53a6d25392f45696b3f22ff6da6f1f8be420640bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c2200130f113447439c880e3cf75c56
SHA16f7fa6f4e990c5048b84f95b7a40189a92917ca0
SHA25675f249680345476c2b8878b49f1902a716e60e933664b9865cf3bac99fb4c31e
SHA51235dced62784c64ff2ff57f2dca67ad2c962713351ea6ffc08a3aa2b45f4ab666abf27dac0b45e5a1e4d615b4bc799ae4933109493fbd608a5bea667caed3a2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba0998e6e819609891945afd889d445d
SHA16262a2867fa4d66a9bb59f598f440094f6d4a7e9
SHA25631827eb25699ef4f0fea44d84fa15031973059d1015c0ee630611d8dccb269f2
SHA51215436a3efa01851d7146baba061d46755ae6d52abe82969b20653ea71faeb3faccffee12cf017e8888a4220a22ec3eb218c88907f210b80c68032209c9ddd9ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5608c5009eda8685bc9afe14904c3cd68
SHA124f303a666bfd5c9e50283ce835409f1a7ba22ce
SHA256428de1d6f1e16313d7e6ff305fe1ed00ba56c0654e042d0b7f1b8ab30a65ede4
SHA512d16dd60ebf80b241224bf19a0d45c904036657432474f7686d34f296066a60c7a6e12dc1e115042a23b191e0fca557724226b35b523890b2466e0cee6ba864f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eebe6f894b18c69f72d2b0faa6eae640
SHA1531ebc9062a266abf4e7acb1b15aa4e19b18f77f
SHA256b9ce05580fe06b6936d9a12f7f6448ad53b4673c437f065cff555e06b87b2c98
SHA5124edc89e245e7deca8470fa116d68a2851dc0c6b089c5a0f78b5503fb3cd35b84e138a08b3bc1c009c4fabcacf5c1f2b3aa8b99d1ab320af93e0087e989c80326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e57e9c525f6096d5a2efc5fbdcb741e
SHA14db438fe6f9447443c287d03db1c6853d52bc8a4
SHA2569f40edc8661e0320d997ae905a39f2c02b22119c853a71a4df4c9128d3b19d84
SHA5122a0f0724aa620ce48f0cb3ed1c01e717a3dbdbb01e59836dd6a1d1923485b2e05022bb717657babafe400125906dfc70340e4ef3459c00417de22e8e7c67c8c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f32f99fc74d77c08fd006e76d983b637
SHA133662d8e6458e2adbf98a0e191359bec0bd1c1ba
SHA256ea7c8f4f8a8c3642a0de8fb29ec4d1bff00bba20cb914ccaa25e4985867c2227
SHA5121a883025bf3106be6a2373068ca58d9845c510c95570aed7588ba6266d41e27ea0a619cf043e6b858cb3963151912d386bfa8d21e7d943e6413e85f5260e329f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fff59673c0bd642560955bd1f4fd801
SHA15afe3f8e2bb7b11a4fe8e0d3dea4e9a6187e4d1b
SHA256085c17257f58b6ef60a8e50c22d407dbdf7dd22964a631eff37c2c82bb95c62a
SHA5125c43cc914190b29639cad5cbd1e64f0398a5adcf60dc12e90dec22ed8636a2e53881f034d61fcc7b8cb9b5605d940dcd7091433d1745798490abb94872a99125
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\useroff[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b