Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 03:36
Static task
static1
Behavioral task
behavioral1
Sample
08af8a70f0359e459aa19c5e5882665f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08af8a70f0359e459aa19c5e5882665f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
08af8a70f0359e459aa19c5e5882665f_JaffaCakes118.html
-
Size
9KB
-
MD5
08af8a70f0359e459aa19c5e5882665f
-
SHA1
279786635b52d90a36531359d26febb1434c2f0c
-
SHA256
ada9beeecf389863242790e2ed6e442c8003ab4a78850d05beeb882f99d06a7b
-
SHA512
3be4098c958644cac39f71d509c22297ef872808149ea0f7aa79f9acefe19ecc2626fecf49dab62ace1844468747432183ec07acc535e7c9988bb6d2c410c1dc
-
SSDEEP
96:uzVs+ux7hRLLY1k9o84d12ef7CSTU3GT/kPsZpUlVHcEZ7ru7f:csz7hRAYS/GSUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000001b130a48b581f56ae3926826065e02a24a8f2f1e2901464f104c76c3cd9f83fc000000000e8000000002000020000000e51584abc233aa1b3321838be96cc723803e3daa4b9976fab39b9d318cfc3c799000000046ad9995a09581a2a956876cd6a89ed8e4a58c802200c6c1797d05febffd2944bf88fc949d5ef25cd08cff811c6cfe8054db577f20601577cdf57014bedad8e678d2077f0f92dd34fcf1358671c7e5fb731ec6489f2f635f0514ded32898252f0e3a6338c3f6bc45c05de5f77190c6d7deb8d5fdf2c7606c3fc0a9e091cc2465393ac2f29f2658edaa4a9b9c3a620b7b40000000bb6173b8ebc295a9a7c63d0cda4ae8aab562934a2e44c42480e95d476aca3a6824d6e2a267c59b0ec746348448fa4732a8cbfa80fc1db809073c934586b566e1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000766d39ac57218b6702288ef3c2dad4dbf0923d4db0bc2f5861a60c5994d65f2f000000000e80000000020000200000002ddd5eb4fe7b4e25991136c712d8aff2c1dbf1f408a83943b3bf67f1af1108d720000000d3a43de4a332054158aff0a1fbbc4e56948ab9563c46f155f176e5802374fbf340000000a382803f1073dc8096b76e95273974d1de7750830d388d78be5e8c76e030453a2287cc68af102962bd4232dfb120cbbdfcc00c749bacbdc4d21ac0f8381112cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{85971921-806F-11EF-82CE-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434002061" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7054215c7c14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2948 iexplore.exe 2948 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2476 2948 iexplore.exe 30 PID 2948 wrote to memory of 2476 2948 iexplore.exe 30 PID 2948 wrote to memory of 2476 2948 iexplore.exe 30 PID 2948 wrote to memory of 2476 2948 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08af8a70f0359e459aa19c5e5882665f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578659782d67cc462013a2b053074c86a
SHA16c974e7f9391750e6e560bf3083d76ae37d62850
SHA256441d654e94e07d093c1e92928e126b2b8b691dee40afd1581f22b28dd12da4e5
SHA51248618dc99d04cc5847ed3ecad40bc92a38a0b9c01728dce9c9b09e8a6bc47a9a0c17cbe67bb5ae9ad9ed94111de6b8000a5a120a773b8679689ad92adf96fd26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c616df2db91e3400ccaef55b28f5abdc
SHA128554cc6b1272eece0ee9c386354183eb89f2f25
SHA256f44351da91360630eaa0fb1fc635c6ba8be27e3d6a21c2bb498243e5c82e0b1e
SHA5125b79d941be00a089748e8721996da1f7546260090e19371c2cb50c4ac721fa2092929bb353940280b78117510a93f13e89ab5d714b4748fd66e1faa1b78938f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e5232c9fa4981b321920bb7e0cf6466
SHA1e01d29e599c756c71499a30a22af4238781a095c
SHA2562c5389afd217950b59e77e96f9f9efc49c18ebee23429bf9f82233d1719833d5
SHA51215356a534c3dafcff383f6a0ec8966bfc84cd56205dc6bd9ac53ae15585594835c9999728f5998b7346a39f5d0ff5354e07e8f027c3c24f70b21d9c6e99efcff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b394149ecf55071887dc1e12d3989ac9
SHA17cf06c7564945e03159cbfe7505fcefd454f340c
SHA2563b30d02f772038c49c1490c5f59d5f18736aefd52b1140d163a73ad62a0be1de
SHA5120c6a5ad30de4ea419e45c5da05dd708b448f4c37c7e37d91895aa611b8f72a72db7fad28902e84147f72a585cbad57f62a260a676a2d97f035586bd580eb6674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7977dfb89f55f1098dccd3817bbb014
SHA1054e176b64aec0b6b010e2d4aa5fc955760650a0
SHA2560609fc34023f5b8bc2cfe6c63478ba39651acfcce8123d25f34458909fc3e9f5
SHA512a6cb2ecd992460734b5dc78fb86badb74f1d9d2b7111e25d19d3aadd9092c5d576c5a2d4f217831a4b0c4d6cbba141cad8a12136e06abda66f0f54c9db5d13d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586a832720c5b6edcf229e680cca4955d
SHA1d90baaae0205282282013fe9edd12dac47026a0c
SHA256ddbeb38b71ec72e55efc6132eb75ad4321aa1107fe8236e4d50f51878828a03d
SHA512255df4c17288229e4f7594ef753624a14306cd27a1453f6664cc381f734bdebe4a0dd1342114295b5bf6297860f161e34a30b01e6722a490d54fa163d5035b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae262410fe493e1757dc6e531aeb004a
SHA13e2cc9b95297ba79d5447686fc01cc7d69fc23ba
SHA2564d3cfd955a6ff4140980108720086b8d24a5788e4ef9781e9b51681bca8eb123
SHA5128632a94d39205b9afb3f401ef4b236968a0732c3d81153a91175504827dee1f0a1075bddcfe02c3548072e99ed0afb3b9d048f0b182defaa56a6d972840b5b8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b263f973d8fac75da20a98694346bfa6
SHA1b3341e770c1b9aaba10b4a79927e2316e6208e53
SHA25674bdc22a05c5755679bf1a30d1f20cd650160c96c7427eec1cc59e8f345cd81f
SHA51283a0e7fd1adb48c226837ece0a11260e062a0091d196b70f2c6fe4e1f7d37ed3a570711eb9317bf3472ff8f9dfd905fc583f259de787b17808c9592543d9b2e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5820e698884f60ec0cdf4affaad41d507
SHA13f9d7ce3b53759762f2b5a60664c03707bf859e5
SHA256f6a74e410cceb671f6e0b296ebd9c2084be97cfeef9fb88f9516e0dc786f6c07
SHA512ae506fa698231486a5d7ec01d7b325cc8622a4f43669e8fc909567ed2e7f33396f0505446b1ed192637e5350de780600717eb49f2e31b32edec1d4df5aa3dbbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e517ac7014538511ff9d85bad0b58a9d
SHA1c27420913cf62aa8aaf3368e1ca645307fd52e3d
SHA25691a6cc17a2c2b31cd1212910edfae3fc7d2efb1124f59cd197ebd1275a4aa268
SHA512d3668f0353a9f8ac9a2b59590749cae4f8a8a9fedb8159f595e7122b42a0d374e6a8f4260fbfe209f513174c53bc483f012fd771ddd0afcc29d11b2edaf18c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5e9ac51f893379ea7e5e1dbfbb7e4d5
SHA1120d0a9632b4c73007377af96479eecc4196c71b
SHA2565fcf8725015148bccc5d9905dd53b66285642c3d2b850b99e028c65e3564f762
SHA512949546bfca3925bcce5db630e51ccd9d2cf50452647946874e982f5cfd07e56e6f56f414af9d5a10858fa1a7ece2d2f6964ad1ca566a38200753ba911f2782d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5f9ce35ce12afdfcc8141dff3efa1ef
SHA1a68968e84087b7134401d749218d9beb705e79f6
SHA256157c84c538b7f6f115f2983b365f00b8fc262ecb9209c3c6cc1632f34a200bee
SHA5123cace5b21c93a17a60d4786bb849316626e2c0a97659852351805a087975b6454ab3df45f088cde42398cbca697794cc947275edc27526b073d56b72da74bd58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53679293d79472ea90368902ec831e6f7
SHA13da889cb04de99dc84ce0e71d8aca8c9bc68dff9
SHA256270b40429c7c8a66183d8f809c01dd74c3be21d78c3013cbd5291012690b4905
SHA512a7a52b1dc7465011b09bbaf3c3516a351599126127596a1f626e4bee43a30949eacfedf24ecfb28e84921728ef0015d26bcce8185b6b68f8d7bdb11b8db435ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5418a5534b06cb4e5101dd31a2330f17a
SHA1f70b501a59beb86956a40f474e913b76b74d6a9a
SHA25634d34df021e2792329dbc85f9a9b697fe4a9a73cd4cd3474d81f3d10ba596eb8
SHA512fa1f05dafb866d97bd6ec52ae0a08a102f06e6ad14487fb271b173053164d466ec780b8d59a8e381fcc8f562c7bd73219f90fda22736c5027329d5d80fd25284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1631339ae93af2c6f7fcb9de2a023d3
SHA18096a42a6084b1a23c73b497381fe5bc1be8eac8
SHA256dd15728c32788728516e64571cff3b430f8dd7f341a8d5a53b35e83872d2d029
SHA5128468102becee5c43d147bce5d22e375082d00dd290f9563c2015fcd6b15ab0ea5e3463489a25376f310d48eb12f658dd1b1cb4220859ad85f4b59938f6d67d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7f1c1d2076ce66d6cc441b0b1a89a7a
SHA11d2b939cd27929dfe26a3f9ff031fa9703e3340f
SHA2561ff4e4be1baae49151072475a4ec09368c62a1f5ba2076c5034a09ca45775367
SHA5120a34168870141def3a81b0ff506bdce2762230d4f91f31ee7762b1e58f5393fd628f43d6d29ebd3351b813e210011f37cda4fb054a6748c6995159133e0566bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5874d8fb41d9b69c37f74cf12e045fe64
SHA1fb887712bfbfb26a54e98e1607ab4236651e565d
SHA25690052878058bf84db5a460e7413c2715d773b9bdedeb5fda1bdea101e512c4ab
SHA51269985f0d8694b60471b06884e317f25583e932b538174c861e908bf0e81736921bbb94b51f5a84c544fbd9a52972f323c96cc1d171c2df64387840ce2dec01eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfb05ac2d548382ec233235e75967283
SHA162d4def850ff8cfb73a63577ac99de7fd920dfc5
SHA2560f9ff5aa51799da44291a7df4ff3f193f20c8c5d436fbd91edcc704b2f75671b
SHA512e986db42d0061eca237c26503154fc364640d824a27f1859606abdec7322616fa9c7c275a866762939fd2cfa05c0ee1205849609a6b0f4ccecbab7393ca9fa1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55198d4c3391c0d9896c263ea73ccddf7
SHA16d76132644501e7562aaa1ea248c46f9819b8678
SHA256b76492ec1618e993a964d058b6b209d0a08134443c0164ce8ddd80a884afe4eb
SHA512ff34951718a29dc6f71d60a85508c8f1ea56b7bf17c6ea7ebadc6ae58d2f2c415419bc19f92c050ff8f65231ae36f34956883f56138d7067e64122c45cde039b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b