Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 05:00
Static task
static1
Behavioral task
behavioral1
Sample
fb8db90dfea2c5807c178f1d06f31cb4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb8db90dfea2c5807c178f1d06f31cb4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb8db90dfea2c5807c178f1d06f31cb4_JaffaCakes118.html
-
Size
31KB
-
MD5
fb8db90dfea2c5807c178f1d06f31cb4
-
SHA1
271f06c05f66e957700189fd748aa8a5b0958771
-
SHA256
d51df8b18a84e394ee4fd9fde1013d2eee058dfd9be6c3810e2a14ddded6fe97
-
SHA512
70d3fbc4947486515e9c4405dd1f8a0cd1b88bc0735858f3ab1360f454faa9a7b83605509c7fe49669e72eb95b8dcffcb3003f21608029cafb0d8bf26dec8f3c
-
SSDEEP
384:Jda4V/HkloMTcRznnnNvNyLfNvNyGn9RNvNy1nnrNvNyYnnDNvNysnnlNvNyAnnp:JtVmcRznOn9gnVnRnTnV9Kihg50vn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433661484" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000fb34ce51077902d59cb9979b4430a45025008cac036ef386bec9c6ca4b6f835b000000000e800000000200002000000002d73cd8daea2ce7da82ca0357c8d870c4c3eb0df7ff5f0dbb7732643f1b00af200000001cd400dd9e733185b3afbe5fa2859b39eb018fdc8964c5ebba8e998db959316d400000003940eca516ba257c1ea76fe5002a6eec0dc7ec5df0221617be7a3daa5e4a95fa990a9eb25f5dc673260163cc3aeaeec2cee056fd17047857141f9bc792f71d6f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8DE46E01-7D56-11EF-848B-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70fb14656311db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2644 2300 iexplore.exe 30 PID 2300 wrote to memory of 2644 2300 iexplore.exe 30 PID 2300 wrote to memory of 2644 2300 iexplore.exe 30 PID 2300 wrote to memory of 2644 2300 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb8db90dfea2c5807c178f1d06f31cb4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e81265e0bc707352da7c0edfd5f7eff
SHA10a776edd8e67526caf1a1e4541d92a6e6dd5ff65
SHA2563abf551108cd88d6ff062b8dd69688ab271f809acc020ef01ce3d99cc02862c5
SHA512fc344358a53cb473cc73bbf4b2edd5bec3ae6823bf6286d61e473ea38ed971160ad7c4752f107be83e8b36ab51efad4109f02496fbb38629bfac097ad05a37cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53839b197c6f4715d63b140798eea2f94
SHA12ac70e1c7678485321e44c9ef7dda69601323560
SHA2566f11731f7d9d219397fb7ed90ddfacb3e55619d6a466e91c4e4885a29783eede
SHA5121119cff6de25c33b261d3fe27b1db67707e7ba7b7110a200df28e524c644aa0db11bd87b45bec80c694b43fd27e22b22fe1a0d00876c57447316b2c375a45e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc2f2cb7e66362646f8face92bcc09bb
SHA1981fdd5a1590c06ed4be15cffec5fe23354b5455
SHA256e49dc1899d81b386bf67fcdfdcfdeb7fb743c46b6c8e0076489bbbc078dcf03e
SHA5125160471960fae76e358c4924b377a2df004ef2062db9d76cffbd3b4703600a904886d04b53eefdb8b49baf8818db92abcf3f230ada3a4b0a5bd8d727d164da13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef29538296e30781aa0a334e4a10bea1
SHA1c90249969f6ca67953ba7d28f558f5028e2fbe90
SHA256d533ff588a35f5b7fb0fbef1024ed8b16026719876089a9430f2a152e2f9c571
SHA5121d18c3358977a4b41aa8a7735883d4e2159fe91379730ae7b151493cc52241c4c8e015d4a409cd6da3ad385f0c53922af5b4ab6d1574a15638ede25cf40f5fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aebd5fe9a714a9a80dfc51cbfca9a76a
SHA1a1605e41609fcb8218896bff777192f248bd78bd
SHA256af00b3a091c081c2d73d63664004410110956c642197ddee50cefacb17eefb6c
SHA5126e47c95cef3d80128608edc04e413a965484c92608d43709b4bbd5c4b14c2327b0c8e66e53e3a89012dd70fa5947e8f26d088bcb2ceeab6745793bcc2c2cf560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580a08e9eba7b1b61f3d8057cf388178b
SHA11c682143fe6e6555b48b7a723fb35d623e459078
SHA256e6f55d857bfaab16ae1d357398fc977a38918d7fbc02028c34d4bcfe9b50ae5b
SHA512da4c13e929a24db3e0f4544c784f0da5036b823272ceac8592a36e12155cb5125596202b5769ad044c3e21c16bc4886778d87d2baec451e78d1be6d21766a719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c27950f3a188e1881b20e60b492aedb
SHA174a9350f38fb7838d3aaa6fae5ff70cfe2c2e745
SHA256ceca41bc9d015b082a4aeb5b9eb01c62dbd7c14661539b204bccfb22be2233f0
SHA51237771af1253c30f6d752ddf9d1468285291ac01a9e9dd4ab18715fa52a604503ebc20a356dd41ad8cad68e3e1e525cdbc6140ca0f5677eb553b14d218f8ba56a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1dc74d2fa226274794504fa23d82c5e
SHA1a2d96114670d73741717b16c77f5365c5b42c00a
SHA256b02aa31c0af48325c9014e1502b28893df5565d1381151620601d135cba3b5fc
SHA512f4d4bba8110d3e97f4270e3123c4422e3906ec8453b6f2f4fedf64c930b679485e0d16e13687fae5f256fd51221dd64847b440f998b740054ce40d259b1fbe0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517b108187e0b8be71fd92581ffdd2e56
SHA1da710473ea7bcb893ec94f1698bfe306d6967e81
SHA2567c281b71ea0c88bdf89e7d5d2f5a2086e49a9a1af6d23fbe6add9aa1c2cbdf90
SHA51210521a505c8ed6c2dabcbe19f303613a215635a8ecf32d4eec670ced562e35b0db7c060a0f2dcd3f874761614f3ac34ed7e5f7c097f244b3564b5768a93fff93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb65d95e7db36e4c94bd4c856a0e1c44
SHA14fcd2bfe474bb16e8d2efaca39644052b9be5396
SHA25635ce8696f2c9d1f6e590197d8c65927600280e1a954caca418c40fa8c089ac4b
SHA5123a9931fa69172884e8945f16a2169e7f2177819cbc59709a4243ac599ac26eebfc385c33c5d7ad5dce832a4f738408289d245335732cf4e8dcf09695dfee44cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e865c49f900e5e62fba2a4f6ec2a7a8b
SHA1958cee0ee01bd8eb92fef7ed2ee89be10a580dc6
SHA256af7b15be77c673172a85ca6f567cc763c554e23eccb5b411ec92553ce5d1d14a
SHA5125cadba1fa36ef521048bd3014cf45026e8748954e1215e1631592fa948b9daecbb101fdca1e979f408e46b15526e454f0d6c296516d3eea0b2fa5226e666627a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b17136d660fb4453b7d68d0cf613201
SHA16a3bb5eb86d9b90d4027c5aa0931bb4ba0c1598d
SHA25675e9f08236dc4b79996e5991ac9c7cbea06edac5cd63a305d44d2ad189e869f8
SHA512e6c21d3b60c29eb9dd4bb17d7ecadcf3410326c8e8e4a61fff5f54631a2c33611683031bf6ad80a18b5a03670dd802145d0406e9d96d35338555bd326005f8a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554b754b8b03165c466abc2a28bc797f5
SHA1cddb691a7deaaf3b79778e09528b593ca1df9617
SHA256ae941c7678024b4b694f496aebfbde873d947490e59fe9c1c24f458f7ce56ae4
SHA5128db9e4da0900f6bd93084ec9d88f869bb2ceebe80258897b408b0eaa38180f827c69181c827bd791610f73654f844c3db318c196e2e4a184dc006ad2ea7152a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb7911615cecfd35998ac214469a668b
SHA11022e09e65d955ff3d6003aadd94a464c31498c1
SHA256fa598cac2a11ac6abd7748101960f5573be45a1cd1c92f6214221c7bdc1461fb
SHA512bb1131f9152e4d0573c5ea3849848b6fe6c22dd00d1487e23358d8ed35a2da19356051bb3ac18e254210206279f1bece124d84c7292d6b6e8393c0f43a9dcdee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abbcc0c4f721f892d9359257cbf1c779
SHA14b40dec501c7b3f81b5793940848a04370935307
SHA2566a6fb66c33194a238c5fce0d8fe4ed8c72f8c63fa5506303c0ceaf3db4c3487e
SHA5124ba75506ce0da3208fe5b21f7b82bfb2d5a9b22b41f0df0947bf3dc140c4791b0d480bd4b3c25cd85418562bcb89844a7acc6c0993d79c2009274544a978ecb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cc846c4b57c9b39f6b2e5476ca7ff12
SHA183d2a7b439ed63cc54b76e6020059ae970c18bc1
SHA2562cb380b048a0c6c4e6ddc05260ec83a930ca198b78df0ee58d5936c6847244a8
SHA512879b333fe8baa0af213ed4de29365c49d6931fa296066a80137071cf5b81b231683a36cb9062f902b2ee3aea7425516ecec841e589b88732b97a8a358b6dc607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6f97dd0382b0bee5a0ff35ca7ded999
SHA14965fff74f2f4b6b20856cc4a36c70e0da9f8456
SHA2563c56ff53c58901c426decf5012f006300ddc9868e36eb9bbb0b9a1eb4cbe2f6e
SHA512a2c2d45dc2913a1f2062329ae3f46fec6f81fc7c327a6a93df7cbcf0349b8cde1e9bbba508e230da3472ef429297c680e80bb9ee4a9983489c05516a5bdf350e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb3d8051a2713db9b2d4aaf446c71668
SHA1153797d1d72eade3e3a5f083cbb131f64a175616
SHA256d48c98e409fd346252c99b3a37aa14f7934a18826fbad425c88ef93c2b0a1e52
SHA5121f6c3c0d03141c6601bc82e9335040d13a2f0ab945f45e951c4449a263be2b59a3339595e63eae5ccde5e1f4b9476f09f223de5e2b3ccf806bbb01f79e5040d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad553c3f04c807bfffebfc2a9d5eeb98
SHA10e75340db2df5b6a3235103876877fbe90d6fc47
SHA25605d82ac113919d96d2a51095b117f34c47f02cbfa1b03c006633515018eb9eba
SHA512434e2319fb12c09083b595349e48dc5b566537ef5d8b6b140114be5ea3bc412fdd6d2d5d953134028ff71f66ae3190ac7777ac83afb9dfa625cbad90b853f9b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f65e6f998723bf4b53f2dff9de573fce
SHA15ec7ea73c58fcfe40a5062abd19240bea02ca4a4
SHA256bb698fec4c5515ae8e0d1d8ff37c249483068eba83e7392158202b264f831653
SHA512550b92973455f3aba1f15710c9274ff166bf931c1e8e847dfc5f7136d5601522fe16a6c8b7b741662b9de23275796e9bb65e26ea236669b8ee8674a24a8b8c39
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b