Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 06:30
Static task
static1
Behavioral task
behavioral1
Sample
6a93fc5cbf4780aec79a407187ac46f8_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6a93fc5cbf4780aec79a407187ac46f8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6a93fc5cbf4780aec79a407187ac46f8_JaffaCakes118.html
-
Size
26KB
-
MD5
6a93fc5cbf4780aec79a407187ac46f8
-
SHA1
bdbaafcc4d867a738f4a995424f16429b40f9aaa
-
SHA256
17c484674e113f3f2aa414f6e9d897c763573a633d3bb6ed564252981d788edc
-
SHA512
ea1835affda8eb13ee55abccc5bcff4d81ed50c12f888c4617b368c7fe8eabe7e53d5dc4cf90a146d9d3569b4fbaac11e376d84023b60e4c9403d27af648275f
-
SSDEEP
384:G906+lWGTvkAfs80S2o+T5cpUiKjIn3vxto:206+lWGTvkAfs80S2o+TapUi2ito
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{27C25821-4986-11EF-A1AE-46FE39DD2993} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108049fc92ddda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427964468" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000e5684e68211e7fccd7ce75095bbbe1881b9a65bd68bbc8802baa0b504abd1be7000000000e800000000200002000000085d2bba823fb934e2da03387b56686a8020f91aa8c127e70886f823794bfee9120000000ee28488622162525f0c5025daacf441d018f5a388d29f2fdf9358a7d31a6bd2f40000000e4712260efb2923129dbe32ef9c893f919be91f099cace67f42b6ed54cc854327e205b7915362bc9ea03fea0f1d918e3d508d81b5e01471dea674606b43e9496 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2892 iexplore.exe 2892 iexplore.exe 1604 IEXPLORE.EXE 1604 IEXPLORE.EXE 1604 IEXPLORE.EXE 1604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2892 wrote to memory of 1604 2892 iexplore.exe 28 PID 2892 wrote to memory of 1604 2892 iexplore.exe 28 PID 2892 wrote to memory of 1604 2892 iexplore.exe 28 PID 2892 wrote to memory of 1604 2892 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6a93fc5cbf4780aec79a407187ac46f8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a49a7e25bfe153a8d710e11131476282
SHA11c45971c26ff3f6da22dfc335a4339b9673480f3
SHA256c8896340c9520b5fd1dbf5d8e9d2a2b3fcb9b2edd1f923949597354f04e92331
SHA5128d0592345982f8f6aaf7e06737c9cfc6862c3ad4bc02d9eec8882fef99f4da94aba04919b8d1923d275c9d03e0b1498a8851006549779bf1a6c8613c4b14757f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fc5e8a7cee1c96766bf3e9851d8463b
SHA14abcb6333f1e37fc31f1b973c73c511b505cdbf4
SHA2563e935051e8344debf9d06e09ec3e8dcf7d893b169950ec955b464d8d939aa8c2
SHA512788adec0b79d74a392a1f7b7a5d5c7a2920d060eea3cfb75255723d60cb3bc1ed907ae464028a93296fc488ed77d9fe9ab9d4c62494b4e17c7da1f0d705ad521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb826608c4548b4f3c0bd69b498b7615
SHA1ade72523035eefe40ea3bdb8ca981f625d09b929
SHA2565d691d15475a404cc6a28d920c438ab53f72253154d0d8c86f94f2d3e1a6a194
SHA5122c69bdcc67d5d52b80804a2b5458322f1f9f0a7bbd5b876b81e8cfa42eb8a4a834229c8a751c0fd4511cc2504fccf53ffcc221c1fd3a15d3f859e28f1672fcc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e60235ffaa42268d661744a3d479080c
SHA1ce1cd5ec9e6f5c5036dd8625a1c43502aa41fdb8
SHA2563be4e129ce2d9d5a3346da79e6dc085d8818704d4bb6a2055eaf899e6aaced06
SHA51228ed09ce02db5f1d8f2ad527492b44bb682253562354088e09b5d566eb3dca0611f8bdd97f6477f913ad8665f8ab5f60114a9550b147f92f5efc0aae39b8fbd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52da49ff4d4922b42ccd684f13ee468eb
SHA13788ab61bc4d345820ea9658cd4e07fc06f298d7
SHA256862cc349b2f157abf431e4f693a18cd7b707c0250b1ceb477f5714f34987ddc1
SHA51231ad2e73cea5ba5b57daa98304fee0bd81d01d7a67ac66a2086124761a690e2db2c787d007cc40762aa788c912971de3b431e540a4674da06f59cee53a33f809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c799b4d8cfeb914d2a379923c23239f
SHA18bf0353e938a1dd439381d15c34e1d898e0afe2f
SHA256ae0d16c118c729592d140f14fd272a43287ac95a9f6c82d1854867c730be7ad7
SHA5120d9761f51c3c28c4a9316b8faf05a2f32885d686e92e7b7874e5eea5dbd1902f028815b84eddadb1c0816189b2f0e07e6c6cb3c9034ba52b78ce562539596f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59781dc152967d0c5e354a1e17a4556ab
SHA153a08e0904eadb907bd19fcbb0e9fb73ee1b0d5c
SHA2568804a7d8f141e0d83beeba0ba2b8e51b3248a51db6b97b720bc8fb3ada0f2bea
SHA51212009c2dc2d18e120d186000a035eb4c5d941aaa629bef79e6011406e5a7be00d6de6e93e6393db7186f201805bd32d2028ec55610fa5c4bcbee67a02d59e941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513fd67a67457e1c4448d6c4cbb606ed2
SHA1a9eb02a50be7431b0fb73e07f449967e2586e3f2
SHA256587f240951214f6f8f3a45ea425c4bcbf5bec9bfa3864de065340e70cfb65984
SHA5128ea8ebb1d64d8860506405c087e136fb3a1ee49f1f4ca11ce883d12dde611d74487473b1e3f8e8d456a517438a05555dd12b2784d9985e9d7e59aa36345eb83c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593f4cd53f11236605fa98e42a45d2f49
SHA1e5abc5cee1e34c16ef6dc03dc497214d1081fc65
SHA2561a5e7a333f806a2c5793de0954bcb389ae7f05395c7ff45cd63140db7658924f
SHA512d3b7418451414139e6031c3ef0400b79b330dfd79a3ea87420d9db5ed68a572e53276d466172551ef8c3d44073094a6d09ba0b43d56901984388939e87e37fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5722c7be051cf399a6f72667965fb5793
SHA17c49109cb5b5ab85cdd126870833c62a3afcc638
SHA25608a959d37aaaa25d2afd658c9794bdfef6a7b8aa0f80c17be7edbede9fa048d5
SHA51237490f4012f6e57497976867571325f6c0ec52c56404cccaec72ab4aa1b0be206d86a5ecbb5ae0715dcd882e9ad69d74fc8293ed0be5d72b8606c05ac4449a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b10daa2996dba3a6e0232ceb73eebf2
SHA1c9d2b3860a5280b939c1f36280111f0f5e7b8208
SHA256d5852829f5a8ccefe1ce25205c6432103a4cab081eb75bdf5930b7d7d4a77669
SHA512792f07bb4db1c4a3d62b41b4a3b69e309a8fffe0ecccf9b74744a5e7925d18df115daf8d3f4c9114708925d2662d3cfa78043411c2a6b68753f48bafeb9c836a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab5ab156a853f3be527b39973e300d68
SHA1414818eb737f257e539a878254d02e02a5ce0477
SHA2565e85abdec0f319def6b78cff8b68684f1b832df11a263262cd9d857082b97a73
SHA512b53c356ed5f94673eda4c7c96f74965d8a904432217485c10a05c3417b6764059ac75384c60515021828b8a53c8f198f3abec3278a0345d4689f649da572ec5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a81a2edceb548a54cd7e81395cb91086
SHA1ae128cdf327a5c3334274c16d5d0cf9fe3d3e4a0
SHA256341e949293a07117fce34d4576849a1d62cc056463fd3ed6bf1ed32a69b9348f
SHA512a76bfd7db715fceea47a6ef43c0cac837a6c5a10b5722be43f6b59af88d58a653fe9d5a9e125c56bf56ebebdd8c16ce7fb8ace6b923685bebeee553ea0826fd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bce08a8cd348e365738ef81e3e1273d
SHA1a69b1a24d9ac1680b90905077a42894e99c785d7
SHA256d21ec8b1e24cb9d039b03d1b16eb8c0c97f3c0ec6bbde9b0b426bd97a715b3f1
SHA512c391aad6ea8666f365b080a711f7e094b086ece2c015a4e12e9f413382a550643ba03c3e1a4aa26bff3fd315dc1ea4d498c5e6581052a531be028efea477e6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588d37f94fa4e5cc22709802d01fc5825
SHA1cdfc26c4a015d014d9f90f9143855565084e8631
SHA256fdfe205a2e3856560790c49c4a7eddb80dc207bc392a8cfa54ed5cc43a2297b5
SHA512e9e82377fa41d46b4cd47208a15a2a4c421821b06f0f99b2402f8881588950f7ef09afada659bacbe2cdea3d6bbd6eba2a830f3a90b36de74f914f192c0f1432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cb37e03d4cb29bebb4a29c8b71d006c
SHA1ec05100028e1c7e3e1e6406f0e97f53e667d7aa6
SHA2564218e276e321b245d502a06fac674a7ed8b3565ca83fefb4e06a7f8515035589
SHA512278f20e8cd4d3e571286e0f57b352ee6361a85323d5bb05db1450d1a23626b6e17f95975c737da1c89642e2c1acdb153dee724fe3e0dc8ad88559071c2e59770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0068b869cb20f14ab43f0fbd2fe3aa2
SHA1b2b45956ad7a8ed8ce8415e01421f081035334fd
SHA256007d51489b9be139f427dde85bcdccda3868b223be4616260fa33b7338cb642d
SHA512d46ea6b705e73a4e0c07b67eb9d264abe99371f0b079b5fc9241b25e72e8587f69c3ea6a210711849574ffff43709bba8367fddd49740fd1207ca8a6555bc9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5833fb922ea5dca2f657bfae33d170504
SHA1bf4c58ad499c77892e8946685e7860ce989d8fc3
SHA256d255159863f3b43a6d57be2904009ae3b97c63b058ea0127930c92ad63c8762f
SHA51296997f2049164be50885afd6a2e9b3cba28750e1354ed962955a62b38b2bcbb30f3831bc3a26545caa003e3d9c367a0be26b822bcba6e4bb2bd0977df882d1de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d722bf700a827250157c1c418cec9832
SHA11c174794c55424c594f8ba2858015609faf843a9
SHA25698a30a7bca7d2ebba8cf809a9965f1e56b5920f95366dcaa5ba404496e620fb9
SHA5129c29d6c987205cf54f909f10c7f8a7a3039b146dd57efffb9defc7ae374bdcd09e2cc9ff924577a7b84ae7c50a2187ed37ec7bf98eecd73238161cbbea3c2fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da1dfe8fdd442be24cc87c24ee29e035
SHA137676d3ee9abeb007b64c5096cdffc65508561bf
SHA256075034ed04380f351650033d6e5dbb0761a3e37f6464a57bc8f27355a3e3dd34
SHA51212223225765ebf551868ab1eb35a5e9c4fe8247f0989c0e482a00f5b3c8596f8dd7e65aa2959e57d2ee0b943d2e22502424fb4860028cb3cbf966b45a94f0da8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b