Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 21:56
Behavioral task
behavioral1
Sample
JaffaCakes118_194328acb5c37825aaf3172c4dbef2d9.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_194328acb5c37825aaf3172c4dbef2d9.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_194328acb5c37825aaf3172c4dbef2d9.html
-
Size
145KB
-
MD5
194328acb5c37825aaf3172c4dbef2d9
-
SHA1
0a79af6f4a41f859714f12476749f65152cedf32
-
SHA256
7118ee796bb9f82c43b0fbe843f6ba925fec77d6b88aa2712e3ba3fbac0ce614
-
SHA512
ca4d14e4f47fc8f403e75976c766c91a005cac2f679143c7467cdb793fa300ba334c1a6fdd27396195ffcd1870d1ef9fa99a8b379ebbcab70a15c5276fd7661c
-
SSDEEP
3072:0hUkSw1QRY6RB7aGDwTO7/K9odZh9PzodZh/odZhhxXg6Cn6qer6a:0hUrw1C48Iy
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442880860" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15A142A1-D130-11EF-A094-FE6EB537C9A6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2964 2688 iexplore.exe 31 PID 2688 wrote to memory of 2964 2688 iexplore.exe 31 PID 2688 wrote to memory of 2964 2688 iexplore.exe 31 PID 2688 wrote to memory of 2964 2688 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_194328acb5c37825aaf3172c4dbef2d9.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5f00a1af57bc361281524f4bc8fe5656b
SHA134e9f8b62620e819fa16146c135b689a53e6a1cd
SHA256a9d9928de862d23f0e179cdd449873e9e359326c7e369293ee088f28c0e989f7
SHA512a7cc0646a2e449f3109725557477eebe3224498a049ef643357250bdf12db537c2f626779376c6a19efb43b5feef63ec3126dd2da7fa58481914c4b594d08b1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD53f3e70d8a5e02afd3b32195e07561629
SHA1b594a44defc0dad9c10a70b05c688c248305e0b7
SHA25632b71d5eb3d61633e640cf7e66a067cbf00d48321657943d7485091f870559a8
SHA512f86080aeea569cfcb4dc20cf9c88d5359ca54d26e3b8d36b5f2bfbad3e289a9bb448c99877a1e61a73791a097d60f5f43008c05d2d9c71c74270fc9685fd2264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f063b00f327f0e843371fe7bf59f304c
SHA1641492c64094670c0799a4aa7ac8cf485417c407
SHA25659850050e1b501ea7d87c7353a25169cccb5d324eecd6c5544496998d324be34
SHA512cb115adb1b4f32e0a19cc2a9baed69212c28581a0d8c3d76853a24003e3b942e915bc6bfd4cfd61e492e7f130b00eaa9cf6632d188c31306059c7a0a5b9d8d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f0454c61e675f88abc278caf72486e
SHA12da2bcc521ad490265404c787698571bf1beaa8e
SHA256664c7c8542616cd745d25ea8d03c727d844933013b3b3e9bc029f07ab9630a2c
SHA51289b971b17a1fb45e5ae3e2bd7537cde179c622c6989a6236d676aeabc610fe35f3f134bf89adc2cbbf80348872d3143c895517675e51690f49e0d0836510876b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b9928d347750f667f40e5f15c7567a7
SHA14733bc2d690652fa6fe408533ccd7e289402a66d
SHA25611d78b4f732bd30bf28db0e4099d31b9be5bc88372166534cc13ae5154af539a
SHA5122789e177a485ad843a4415d4da4fc481b38537b9aaaab82d84ec01e318996c6deb83b15c2c1d71fcf11ade7dd9a64f62175b6e162a431f20a5497f616d15bcf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a934376962a43b1e6ffeb3930c4744a0
SHA10dcc1b69ed530feadb706032a9cf64cf65bef1f5
SHA25693250b05ce1d6091d0e018075f21990116804b3dfabce93adcb7bf640bf3f597
SHA512bf375205d93606eca3e8e45d0e4eb8c4499fbe4d1a11fd7bbf337a9cc25b488ec43dc984f7e74286874500b08833a59d499f67a40fecdeeb6952a3e6a1edb574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ea864fb029ba6e47cc9fc5cc519a074
SHA151aa71bfed8d75c15307a8b128d1e57a6fcd0b40
SHA256a89caace7135b95466f8d9b86b61cfac2fd8b14317ad5362617673e3bcd7f14e
SHA512a4786a757a906d7f8a7cb7a82c4229d59e017590fbb8bca6d1cfe11e3e1a32fd9324dada8ccbb4e7b0e55b79e151d2ef1cf78197effeffdca1b07b5486780a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5956662721cfefe5dfd72d47f84f3b7c2
SHA1258b939dee1b85510791d16fb469b2a7090783c2
SHA2562266cc8bc276f0806fe731ef4539e5427404c3c6e8b8642a3d4b529fc43f9ffa
SHA5129ff4cfc8c45175aa80a117f292d45a36a14a52af0b0cf2289209143d9c5f702f11851b75787cd9cdd05666526f759c40db76b48b540d0e2efd2bfb20b6027d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d185dc04a482c3786e715603854accb
SHA1a1b169512250d81c30486df890d295bd994dea1d
SHA256a076a4584103df33a7ca08e681c4e50539fdca9a3160af4a99522179fb9db69e
SHA512a47620d5ef6cfd5521db9ab2f5a397bb5e9d0b475e7f11e0e709b83b66c08735999afff71e4eab2b18e82b3feccffcd3389e8fc2c18ef34875d96327ef1b1f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506df6ada701025d3e9f393c274400f70
SHA18e31cc2a6b60cbbb585eaf31cf02c47b4bf2c885
SHA25658ff585982e7acb60a29d90cd15f65cbee954c34770463cbf0753e154852a137
SHA51206b923dd0a491cbf000848077af0cb84922aa44248c51e463528d3bb72e0136f32ca679a5a6620dbc8263489d60769d5871a6afe9939a709e6d59e03ba8b4cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52233e5f73b88a40fff975fc0b91cb7cf
SHA171d22c6b6b4b510a3afb1af51cd7c1215f668ad8
SHA256e85aeb40442914476b20fb192f009e4625dd8f82c45626cc2d4d9e0ef711eea4
SHA512c96d49c22db87be6ed4cbb77e09a9451d33d03ab50c9f9b4fd64129be1f9fbc8e31e1d3c8930a6413befd6dc3abf179a0212d7987bcb3c36d453e82a506448c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558e77ae7870c8358c90ba4f99d7e6e92
SHA175a0f2a523b999db0a79340736d2335c04d03c33
SHA2562126043c566d03b26a0e6c374c25d4f36c010e29f940cfec4d913572c8812dbe
SHA512c901d57d09f7d4ce1acad18c41cbd465b323b9c8bf6e2f3c2d63878255dc6c6dcf09736abbe433dab1846ade95f571ffdab62e71051921e2168fd9fad90bc124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddfaaa15c7208acf0c62ba9b37da875b
SHA1b7f858f6184309d957de88b8f0f9e8d4e1e4ceea
SHA25666525e231a045d0f3ad2b5e50ed154e61de2a4fb8795c7c34ae3902f3d468360
SHA512dcf05f96719200259f84b27c992d860a67a4ec2bb39f19735250bb53590201202ad16ecdf4a1c676727a6ea886dbfe194a9d25b95290de3194ae1c53de6fb3ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcbff67757b68c0f0bb942527f714b3f
SHA1c803ec1ff7349a1cae63d60491ee71f7faf1c6ba
SHA25679456f954a7786a29c9c0ab3fb0f7b8889561a93db6a2cb3c8f2bea679d1a724
SHA512423a1df3a8dc677a8fb1a081c487bedfc0ea17562cd3937e2e7b6df02f431d0b002ff5033e422e17604368ed69f875a6a6be8b12dcf6d96e7558d1f861bdd45b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f390ded9d5d9b803384742b0e05befbb
SHA1b243cc6db7286ae1be023bbc77648a9ca0f9ed20
SHA2561655d8b00691582dcdb7ab5dc14225a4586a164041f075c1e267c8f4a9bce7f4
SHA512994040f6de6d3f64cbebc5d0a406fc16e15d90c69ede0dd9d28e976c7bc2dfc77d9c2363e5e22d165e59447d77e3d319007a7b73142f0eb67470db96ec13448f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a814915296b9369ff9c363fe7cf5e45
SHA11cbcaa3a378c7cf2aaa1186c0d0bca7f1b986dd0
SHA256969b270bd9d2c17bd7efb4fd0b46ba8b4f21187f63773fd0f19b8497a8b4ac41
SHA512597ab2bbad36f0a9458f23467c4d01c73b07400befedbbd92c1ef7ef4b685a7e85b2f47da294ac1e7f61d0c7b849d8dfd2e9f2bfc8e1197bf543d2770304bea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b850256399f6a6a1a5876f5c4542a875
SHA150bca172120dc31554467c4c2995e09b6922bca0
SHA256e7413d71a00460329f8bb0ed6efc629ddb89f7c55cc02947811f990283a34997
SHA51257577fc67ab5c8c8a9bd7a6c1c5613af35e7b2475dadd14e0029a8d30701fe107bbedc771c0fb2809083280d1bac58f5e882d48bf779cefff58e5a399566f1b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56618f083d1d4fb11736b10e3935f2a2a
SHA16299676093690df427c5302fe5214186f9ce0795
SHA256b7e7494bfeb27b3d52ac94881a4dbd41d93c421aa31ee208dc0004b959f84903
SHA512aaabea0e9c128dc1ce42912bd80f383611cca63cdbf44188a3bdddc11d09cacff38a52a4bdc01b39ff5a513ae2ab4407d3aca3c4fecb1361f8096b83eaab75e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb48d6634e3bb3f5e867e119f841cdec
SHA1065f01f672cfe2f25d1099c351f1420319edbaac
SHA256d34a8b97fd445a57927ef29814d3f0143151a3e20a2e8ade0b14b55b439b125a
SHA512cedee3d24de37a6441afa5b3a4d512b73945adbb8dedeedd8763e8b1e190d2b5a596953ba35a8071a81f711284b3751290fc322628c0a3e306900aa2b9e0554a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537ea21f94247b0816892bfa27b9c6c67
SHA1e4c90e8d87cc01f42ee2beb92c5a57eb0109ac86
SHA256d85dccd31bef161998393ed6811956b4cb211decd3a0841b917aae5e404119cd
SHA5124a9c9ba3b749817b9d31987498c704c11e0d760ec088388f46678d9d72a8d8c6952e42f157499638974af40bdddaf04fb20bcc288e500f9c0df9ad523fee98fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5cceb3ee5c04684d9e28bd5ea66e9c2
SHA1ed995f5a5aa1e222591ad934ec8b9097fc058bad
SHA25617a861cd2e9481ce617fc3304ff34ba614d518b1b2856d5a458f1857a5175e0c
SHA5128b8efca434b0bc82d8ffc6f347878add6173ff8a259887e89f455a626d71d6c2b0ea66f49f0c22334d2f1c541e30c6da00ad3a11d12262070b4dcc5afa9e5955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5430ef86cae94b3adace7eb6b0b33e686
SHA1d575d791d65b5ee6331c9f857df6db39cb894c29
SHA256c15327346853e0f10330d2feac871bfb4816188b9c13126d9033fa2e70f0e873
SHA51225ea246810314b2573c92569a040204441607e091c6c13aefc1f43a8f79d760c940926b4829aa0bf149d3fd4b1d447096302f5519b9972e58a667f0cc8506efc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b