Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
00eb33b20e41def0bc315da5f5d6361b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00eb33b20e41def0bc315da5f5d6361b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
00eb33b20e41def0bc315da5f5d6361b_JaffaCakes118.html
-
Size
147KB
-
MD5
00eb33b20e41def0bc315da5f5d6361b
-
SHA1
841295e1292e4f0a6439f8d54e739dddbf03b91c
-
SHA256
fd30421192782da9d984c0d582528db71ac6b53e3dc72d4b13e97ed4f33e2212
-
SHA512
c557f49f5db28c8eaaab2f9be8664dd93eadfcd6447be6027b2c8e7b04d1337b188b5a03991652c719ff537f1d022fce199138632c3bdd639dce2c265230412a
-
SSDEEP
3072:RZzfEyew9qImlIoybTQyiSUjMDRSzwNoHsykCrII9Wbn8L2SRguH4jqxcNI25T4/:ffEyew9qI+IoynQyiSUjMDRSzwNoHsy3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{216D7C21-7F19-11EF-A742-6E295C7D81A3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000754856ebdf1a61f83a3498ff66bd88daf3a58afe7b99e19c418631417b17af0e000000000e8000000002000020000000fc98aacbd5662fab81671d36858a7c3fc89199245f5e0c433ce67b7afe73ce7b20000000d0971f64480950e9e79055d0ea9a1a6a6d6cbecfd34abb68a94f2aca6e54594540000000e630fafe3d477798d93e2b459bb6c764015e20d35c533c4489fca2658c8e30634b3cadfcbe538950d1c9c282a03ca3dbb5ef6e360d60e80d999afa3ab6611669 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104912f72513db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433855005" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2812 2112 iexplore.exe 30 PID 2112 wrote to memory of 2812 2112 iexplore.exe 30 PID 2112 wrote to memory of 2812 2112 iexplore.exe 30 PID 2112 wrote to memory of 2812 2112 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00eb33b20e41def0bc315da5f5d6361b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c936cbc22dfd18a4170d8cc4fcd99046
SHA1915c8cedd969af5da4ed432bfec2ce9b9ee96ce8
SHA2567897cf0bf662451ff113d63b24db856fd01eaf1ba730c3d7b2d701712f010968
SHA51297509dbc8dff1c8b7304da07bc1d0a97ccc833ddbd2fcfe7aeeb598851be3bf4bba4ab84f7c7aed18bb6f114fad3fcffdbd631893fcfa3daf695ff00641e300a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d0d751d71db77f9ceb6691ff0bac89a
SHA1cc2467c49264c54003469f4c7456e060a1da5fd2
SHA256d30aec8f55b71f9922b41e50ebe7f74b0ba24e77e82178662788fa0aa2496ff9
SHA5121a424e83768e4cd0aa017def29f5fe8b2830675ea492851640a64dce0e4a3490288249b340614fcce9ed3efdddd744e02ccf3eb5cb0d04c9b26bbcd417fec756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f9bee8fa494994ca005985fd0cef991
SHA145b8b1a504ae3fbbe6bca63b38fb81ad8b67a9ab
SHA256008053ffdf0fe5b687fda77b6c5e963e2feb22ca81e6f041bd1a93343d13ed0b
SHA512945b88aacf5b0f82969324085cc1cf6bbc6327c0ffde3a7df5ee8055bcadd77eabdcbd5360171538c1ed6b1679cdb99deb39d992786cae9645b4801d0d628675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1359e438525830cfdd82dfd890aa2de
SHA1aa0bb05917ca00229041846251de1d7ea96d1256
SHA256ef300b6acef524478c91c6be67111358646be84e563dc4de5977f5b8ecab9897
SHA512fe8ee43de2df0720ef196f2beead1828e3fd48da0ed6559d8d0962ebe6a20f27db841137a12702bb86d5ff58a14964c6cd4bdd35f4831428f370140431fb96c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ed1ccccf31455bb00187a02fc351653
SHA1c161969d30d0dd6a922bf0f7662714048a78a3ca
SHA2568e229f1c1a0b0aa412f920caaf9fe27880968d9e1a7e6a799e9be3ed24648e84
SHA5125062928dc5211392a8a726d52536b6e389745aa2f515e46e3b9413aec74af7b0dea8a770b5cdb5b4c24df4abe40b70db69542f5b6e0b7f6629beab78c4f760b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb5b524db3f382ebbc6a1cf27a1354c7
SHA10191419df1cc15e88b28a9a530af1b1394cf364b
SHA256b07f1c932cb9779445d73da634ff944b0b36a325822ea3749a3cbb79231779df
SHA5124fda053c2f075827390fdcd3f6189e60cb9ea73eaffaa1688a5dc87913ccd241176639e1d0eab527516246c203c054c1edfd1d61d3af0031970de8ee26826e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f786efc52fb9fd0b2d8a62d7b337c30
SHA1fe4695ed3d925c7e191faf17a374c185811e02da
SHA256a7f289f967ae0200422e1291ef22f479955de69edba866fce46c1b4d18dc1ce1
SHA512046f97c5b4b893724c5c155f66cd094347eb7397ca5c636e2e76dd587a244df42f97e09a9699dd05a0ae8b15c17a9e7a22594e793e710fa397d6bf8448a3bda6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556fecd40d4ba32a5a75413c2fb6f892b
SHA1305f4a53847ffc0ebe6f576648eb8c5fee2e3170
SHA256745fdecee41d595952d8b1e0b0c7c6341071099df6ea252e8f7c3efda366c5e4
SHA5124761f8f7250d5a87956dc240b2ed1a10b0469928d848c16cde8fa0b2539922e3819d3075f9e15f91db156239bb72eeb6c26f1040282104127d04ee7c8e7a593d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5396a81bee675a5161e191a6288926e4a
SHA14729393b1f74b4b1b87c8748c68616d5780e4fcc
SHA256d635b17dc056fee5a9a7ecb7f12383de708f54eb866f65d62233408bc213c80b
SHA5127b79d75fddf3aebc9b02825444de174aad0c9452994b76366e95f8a3e653cd64efd07602671504b0d1ad645a17316ed254661e2a152f5c57ff0058d13b84bf65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e0fe96441ee49e2f4ab8c27cdf1cf31
SHA13226b94ada393e1b70923e8c2945b88fd3a2c749
SHA256d02f280984d29189bfa7dd7cb03c17984aa7b4f5b5cdc07af8d8a7aed52342a7
SHA512b6932660af216365bc44913407bd09cd7d8ddbbf5991e68e8dbb8ea9dfbcf85511cc36887b3badeed2ec71b0e80d28b94faf91f182c2195f344765a583b1acad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bcac546daf4fd6a6af35ef61ddd1a8c
SHA1fccc896cebe708e42d9c63a26edace0929064466
SHA256612f0856abff94d80e88a652071998761d747aa8a2088fbf4b42d3f347e908ba
SHA512754a533bf84a037f5f3247bb06eea96b08640eab3f43861e882e85fc3461523819703840a44fff9afadb6831368d72cfb510d1d3849530b71e89d25cfadf51bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59164b4bcee852964b7050d5282c435ea
SHA1b9e9c4df3ad63ecfa38185483bb5492521649f13
SHA25601b87b685eb3db79441c7ac8364b916c9fde5e72257043df9b270b9a4f76e6e4
SHA512bb3c543b74f46c92ae42628c9f46a7eb3cc0d8ab260999a1141d8ef6dc1db94629a34f609239c02bade9254055ff34c0353b70d93316f5e61f15057c6fcf6cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f91b4e6628a9ae43d7c1fbff0589a8d5
SHA1ce8f3a5097c777dec47a5fc17dd1839ed751f653
SHA256013045553f115d388b04011b63aea7432522d5e827197cbf89fa495167e15649
SHA51232a502ea46a39792c4cbc74e3b12e0f1ae3bf8727927803cf231e66000780e53e5c73c7a74b7253b5176c4be747ac653cfa79511ef09010e0c26687975e863b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b52baa5c2d3ad67a828aa78935ca3864
SHA1e9ed8ea1d319d99d732d351c87ae1cca29d31dab
SHA256ff03d4ea30ebf230c223cd6144bfeb2fbc486cee35b148cbc5826eb0aaf8197a
SHA512edb136e146665dc5c50eb8e6391a045f94e2078750533e8ef8e1a4ecab2ea43de1e22c0f42ecd3016ae064c0b78a113172c2e6914b5d8c17479c0332ea528cd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a31d536b1997c262565fecc6c828c5
SHA1c9afbdcd34d96202b197f5ea30846679ef64919e
SHA2565523f395bfa1a9c5248367f77735feaf8a19823dfefe9bb22b325fa21ac8cfab
SHA51205156bf58277355043cc4342a5b6ec78df2fb8504196d2c24e30f230b0f62c872e21be78131d1f15c0af6fc5f899e3a03c67d4db00ada41a113c71344d6f8ff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c68fa34c02c55de03bdebeef0b8b122
SHA104503d11347991d6c7e4122dc59fbc8ed85652a1
SHA2565a84498c7d968d14c541e4b54b810136143f4c9e9879995b61fec0acd52e63be
SHA51274e82d9570a344708e1df295bb7769bac7d0c20b014f7b902f44b9d63c0b3f048bfda9f380933189c1484ad1732b6f2cce8caf1d625543f556cd871868f0bc4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dd21ead9ef6dd35fd054fdd754858e3
SHA165147fe30c013883ec8a19d4e0231e36853fdaa8
SHA2565394528a3abe9f33761a460e0bad80d216714232ae379241e58c615ff8994fa2
SHA512abd557b950d546d4db6f6252fd28713011f258bfb0841f39e5f555e0649e0590cddc82bdf9c6b15cf1c5cadae1f6f750cee865b1bd6879b0fecabcc9dec0df11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e2a256e1c5a0a7b52b4ae9cc1afbc8e
SHA174079d246d1b066c8b54c5cbd14e75628ae7fe80
SHA256e66249ea0d608468e69c1f6a685dafcd91380d79e56fc1e5154547cb7eb0bea7
SHA5128a3e947693378264acbbea5bf65de7eeeee3521e8b4fd2fdde8b497b5500277e8b11b51c5950eeab324ff1a017a4084b35dfddf5157e3125f2287f8420913cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5299ae1d61f98512c3482cd2609309649
SHA1425416679887587e5f6b10a992e9d3f39ce48986
SHA256862f6da1f2dfcb02c1c316367f97d7852c21169889ce29349b8d82ac2c208f5f
SHA512db94354743ae35b656ba6038ee0b18985ca31ad492130b73ce8624709a0b7a25bcd67c085dd29822c29ee214e03b7e2ef01df5478be75059091126cc6251b8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504ec20907d9e83a8f083c1d07c961345
SHA12a904a95f13450050da1661e0aab79267f8a4a7d
SHA256e236a1af0cbfab474744944bcb7ec0599a63523626d98730c135635d8c5eb635
SHA5125db3300ec2e7bfa827bb7c907a9e3ba1aca3942d8f1c5f841a973271c00e3108f59b7dbe0ae45b358f3670d3f50dc353e33cea19b4dbebe5d9453b67afbdebeb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b