Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
aa90982a3ed1532e49267cb7a64999ef_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
aa90982a3ed1532e49267cb7a64999ef_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
aa90982a3ed1532e49267cb7a64999ef_JaffaCakes118.html
-
Size
55KB
-
MD5
aa90982a3ed1532e49267cb7a64999ef
-
SHA1
6a1ea7f30ec2e3e5d62139a3a965ae1b0fc0af26
-
SHA256
26bb182fac3452872c84ed477ecdf9d6b2e4a570392ac0c73151eaf89ba19725
-
SHA512
b80d48112e1cefd2be38f2f72907825639fc52858a85ea902c0398dfbf1312bc728ddd2aaf17b4891173eff9b138c3687289c5e01cf42c68bb81277910c0ce98
-
SSDEEP
1536:v8zIOVtyGukR6e/6tUECau/JGKv9rCX7CesI0sciV/PKZj5I:iVtyGBUm8Cau/sU9rCX7Ce2sciV/PKZa
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{276BEFF1-2A67-11EF-A140-5ABF6C2465D5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424542668" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 3004 2212 iexplore.exe 28 PID 2212 wrote to memory of 3004 2212 iexplore.exe 28 PID 2212 wrote to memory of 3004 2212 iexplore.exe 28 PID 2212 wrote to memory of 3004 2212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aa90982a3ed1532e49267cb7a64999ef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD50905580629d85fb977cf48d4681e5086
SHA13c7bf678bedbaf83ca720ab00fa9e84884ba8009
SHA25672fd834aa73e1523e40a415313d7766832dd6497ac0a5d4cec9d36e852b248cd
SHA512db9ae7da2801083074e54d499ef7741f7120b9a8abdd87c13e2ceb35520cd7290a4f06b6cc9c0c1060f01fe2cc0bd95b8d362029e0df90a68c17f197a50b02f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_DACC52A1882A05AED14688828CFAE295
Filesize472B
MD58054c742c6bfb4a5dd470e277888deb0
SHA1421de3310baaccca9b767e30b6d4488b17cda8c2
SHA256c52c8d5956f99cb31246e377b3119432387fea477f9d22bd4a7186d07d81c1bc
SHA5122e61124c5d6ed21b781077efcf76153371017ab973a6b42bb6aebf57aa9e384368cd929eb63aacaf72bcb8e6fe44dd0a291b0e8d88308187482a5aaef726eda5
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
889B
MD53e455215095192e1b75d379fb187298a
SHA1b1bc968bd4f49d622aa89a81f2150152a41d829c
SHA256ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c99
SHA51254ba004d5435e8b10531431c392ed99776120d363808137de7eb59030463f863cadd02bdf918f596b6d20964b31725c2363cd7601799caa9360a1c36fe819fbd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_DACC52A1882A05AED14688828CFAE295
Filesize402B
MD521030f3051d927917a7f2c09974ab64e
SHA1158b39a7b81cd77f5e0a4db1ebda0dc44a4eab59
SHA2569be588d249c2520491ddea8cc416ddee00d6630bf89f91e3fea8dc21bbbd3883
SHA5123e96bc405adf10ecba4f1bec450fa56b35d85c645e203b724168a937c5375b028770bea289dc965eb32199af30d416a4ab708fceac79017164e815437865280f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD55c01c5595bee2e0f9eab5e38fb968ed0
SHA1bc0624d6b8a58addcd0253e5159486045a15dc31
SHA256347e65cb7d4e51e8544faa66aeef216a166a053bd1cb73180e15608a774ddc4b
SHA512b3b42c3bebe7ddbd7c413b6afd244653e05f6e4f6353703f6cbdf269e40163a0e02174bcf55532b591bc14f30e59cd42aa834ce21dc7b10982f2e1aeed699a98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f3d057bf22ba2c8477febda74d8498b
SHA1678e0dc4413182afb9593fe6f97758c2e53238e5
SHA256822ef5c079ca05feff144b66a658fcc18e5537ea1fd4ff374d85e761126ad002
SHA512c757efdb9e4e983973232f725b937c0eadea3cbc6affc7d5fdae84f4b105270b136d94e2c71a44b80b0c8892eb3e084e7eb51b2c00f73af8f5d459626aac78cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52170962402a78e5eb6f498aa962e8526
SHA14b548d89a1545515e2e1b5fdf223a381ab64dbb8
SHA2569029552bee07e0332ebedd8f058867753840ed5e9229b4b9d32b3facc4a64998
SHA512633f7ff6886556daee176854b05f25add57c7e6a7a8efc54f9fd4136a75f665b1a24ac17b2b11e7015127e4f2682bd97f56154cd2c256800cfd2506b55cd8b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4ea1cb722eab478da075a1f682c1c00
SHA11e5dbbf557b8fcb815d90abfca5565949a320933
SHA2567ffe1572f034dc7572ae8c8f30bf6716a8369879f1b922a2b0169a6e77fec645
SHA512a44ba4a4ab497af536ac64946d0409a883cc007074c3bd62c5e0c07f9acf88d929be43236ec4615fda3a72f6f4cdceed174e216614641da792b8fffaad710f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d68d4e99062573f8f96ec10e6ce7309
SHA1788c3c590cbba8dfcf26882ba59f6d0936ce4aa1
SHA256b2b26c6ac0106556b724d2da0ebae8389247db2f4d7ad93a0197a605c4e6f3e5
SHA512ec92cf52854f5f96df02e65bd2f0229a6898465ab1a3a2037772094eee6a92d0533740dc433b87bd0b015088fe3f784c18477485c0ba2886ca98095eb342e1e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0e8e8b4c6d6e0a401d3d8e54b3ea85e
SHA1181eb88f2e40b35424ce66f33fd2145b06c3c5cb
SHA256c6bde1320548b3ff443b3b167d95a5292606ca4880c05b8a8b5126ad2ecaab0c
SHA51221b3909fe30f27f3f4d7254ee19578ea7c3ff8bf6dd4166ae33e71780f12fb60188ca2b298e9f01e13de3268d786d40ce3f06c2d27d35ed08e8c09f51ad587c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7ff650535e062f7c9b332352cd7155e
SHA132ff4033ec08dea087ab5f73f305c91834a73403
SHA256d1fc9f11d7dd8b0cce0a47ed72b581637bf5b60f791e055241d4bd8aa53b9a14
SHA5127c76befd34bd8281e5cd7051a5c0f27c8ff325aef8d2f33a782e60e9c7d50faa9e64a8ed4db96dcad70ad81dcc91503241eaa31dd51e82f1324c94546cd0ea31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c945b7a45682e5ce91b2fa0f0530d44e
SHA1d9997d5cd31dd71e30a49a934918f48b76026506
SHA256a3fce7bd9f8806b39f485590d02b4fc1225b9d6277256d5f9efe9d7f2a702144
SHA512c7afabe8cd5dd81d9bd0e20b1b1930b61ff7e39584e3b0c23906d5cc6d470e4958acabf8ded966a5fab60e973853ca1f48c093e0c007633f2e23d69a16daaee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfc8940039fe4f98da3934fb7e466210
SHA1611ec2e0c7442448dde8195c1b634843e39f3a7b
SHA256426dcc8617ece09eee58adb5b5e8bd59796f6a56abf4980b873f2b7aa987cb98
SHA5129d3a9900928ad62a5879c08eee4a80bb826d78b702f5d27708bb0b06a36f2e09297d11c13d119d41437abfedd1f9a3360c5b5a9c8aa418760fc1239605bcf61e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514625c023b3833a2660a675e756e4130
SHA19a7ffba77e078bc03922152d0d9ad39a089c1ab3
SHA25686cf8d5661dafdf021e0ff70b6060fc0f4421a26c179eae29872ef30b67b81ee
SHA5123249e3fa901456bc47834bc7cc23347095d2d3cd739b4a88b3174f883d91ecd7daf05c94e7e5bf29a9b769f73fab8a814db15de758b5e1d059d1ab4d6faea68d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539bdb4a7f710337805001af508f8c6a0
SHA150ecff8fccdeb23042822ba337638010bf5c9161
SHA2566a591e3beab883e7cd3ca13133333f04e453f41aaf5a8c259b4be03ff3417d45
SHA51284b7d8936a506b232a3fd029f27d1fdde715428e7e9578d0b949d4c1ea4f7d33937ba42fa9a17ce564b77e900bc5755c1b36d74acaf3ccb5f3d6b5516c7f7ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd9cfae0e08f9e7485360383d45f058a
SHA1a62c2c68cd1048c955ca2c010dd96b09b5331c7f
SHA256044a79fdb868986cd59644e144834ea47a358bf137c1e1349fcb75f661a43569
SHA512f69a51387257796377eaf1d586312a85c25b6ec4d116774648f207104f8429525b8445f955c269db0de002ddb2d8efda607b133f7c63469a745bc4e7ac713344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5785396d872a3c4c68b1c32b5ec866ab7
SHA1b53054e24518a6237e9468d4426d59f0e4c66625
SHA256f6aaf44c15aebd3e77fee7d80032d2a99a37468babb2b0f451ac4efc5acb0d9e
SHA512f843e6e8e17a7bf5825f0f06e80268b66d00ef82eed08206e4a0b5e623a71d640c2d55d8f4cd0ded41704677d20847803e931331153f956982ea5244abf910a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550092899226c0daa73bc8f460d4ef349
SHA1d50722fa44ab34ce81c68138538a66ac25d1c937
SHA256909d2ae99a519ff46229b45bdf084e53afda390c81c81a44393351dd7479fa4e
SHA512bf54c99e6ed7e960dea0034eb797b7c60ae78d0fa620f204c7b11b2103d30dab2c9ffa28db64b9df3bce12c628acb96d0749a7884ba63d34d8d9be6c917439d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566fb0e6d52ff32bf0c399e8240cd19b5
SHA14ae881a09be78ea6ec2722c8a0add97da89f5335
SHA256188e5f3302fdfd2df95fb20af9912fec1c738fd0e7b0a9277139b14682c6952d
SHA512258b731bc086280fcd3658cc2d5c56955df87533ef75d6e8a3a7029259149040902eeb7c45da4e32c2a88147e0a98dfa0de868ce332831c49353c2b7888b367e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD58b3463fa4a5851e5bfb83b53a556a9f4
SHA119f5288d21b0f45611f25069c349a0c4be0b6410
SHA2567d92c9b7ff4e580a080c064122c0b3caa49a07e65ac42d4d49839c92e603dcae
SHA512bd8093e52439a086be5efb4345152e7adb3ce6d1644bbc6e2e36ff6c2911181a3a823896167fc5c88bff36e4d5db74d35338f512c8c5ad99dee9bfb5da0400d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD581f33a46d6e88af461ff063c7bc777e9
SHA1c2059bc8aa0154e5b6f4b9e46c094371eb311d11
SHA256bcd792f2fe28f6328e328114704cbc822f4fcd9920d141d8fd7ff9087c7d0acd
SHA512082654df41ca5228e02376fdd88b60dbd61e869692ac05156225a6b7bd3180abd9840ba3e02aa6f288cec55aa2df724ba555d8b2e53ce0ae6912e41708a3c142
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OZLUP5E1\plusone[1].js
Filesize54KB
MD553e032294d7b74dc7c3e47b03a045d1a
SHA1f462da8a8f40b78d570a665668ba8d1a834960c2
SHA2568076b082eadf0cab4a8823dbd7628a0b44f174c17b3221221c0e31e7c60307a2
SHA512fe263fe86aea2ba1b86d86305650cdeee45cd1f7b4339f9d4fb81db776b78abedccd0ae77262f45d579751daa26f81385354b3d126fdb5577036e9dd1db33276
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b