Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 10:03
Static task
static1
Behavioral task
behavioral1
Sample
8e4f74f26831dfc2994caa19507669ee_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8e4f74f26831dfc2994caa19507669ee_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8e4f74f26831dfc2994caa19507669ee_JaffaCakes118.html
-
Size
53KB
-
MD5
8e4f74f26831dfc2994caa19507669ee
-
SHA1
94fe595b8b729e3397fb1f2125c568adc1573bc6
-
SHA256
41c43257904cd91c1ff132634d4ba9a9494111f5045d22ccfab42f8dad0a54dd
-
SHA512
bec2c9ec6fa9970010d06dee9c1029af2de9f8828939ac59e5de5b7087f789f6c247542b27bf95b63e3dbff1ab28122ddfb54981e8b5f6383be1524af3e271f1
-
SSDEEP
1536:CkgUiIakTqGivi+PyU6runlYw63Nj+q5VyvR0w2AzTICbbOoN/t9M/dNwIUTDmDJ:CkgUiIakTqGivi+PyU6runlYw63Nj+q/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 900a38fc9eecda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2353B2A1-5892-11EF-BC8E-E6140BA5C80C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000069b16c08322cf63d0b11227fd6cf53f9cbe9198eec08d47748e0b1cad439f060000000000e8000000002000020000000450211567981a01710bac5987d09b4dc03da2896eb2865bee366d30bd07e08c120000000909f8da9fed68a665501aafaa51453cd06c72e0aedc6e6c6a32b38facdfd29cc40000000d81fa8e88a61ec3e43d4a1bd12e0aaf6568e7ffdef3c85b0b46ffc4e5e752ff1b8be955eeb1a7a196d142478b43f26003dfe6489fa972c50d0f8dbe7f4ce3ea2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429618882" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2356 2088 iexplore.exe 30 PID 2088 wrote to memory of 2356 2088 iexplore.exe 30 PID 2088 wrote to memory of 2356 2088 iexplore.exe 30 PID 2088 wrote to memory of 2356 2088 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8e4f74f26831dfc2994caa19507669ee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db697b71ba34427c3f253d8d34e6af90
SHA131d6b28bf97fc0f1366edd1b027174331115b928
SHA256779a776911382c898827369d1f2d7777af47c063a5247dd4dc151726a215b716
SHA512fd5eaab52335d8b0dc6faf0eae6878cb3e67ff8a3477b349fa3558e8a6b663f42a574d2551cab7b04915b6e0065d894eb8b0231ee528655eb16cc1e894ed2537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa0d1090b971b4ea774bf72401b5caca
SHA1d3124499a1a3f8f00bd800194b344040dedd145a
SHA256481861a3d56f1acd07fe621c556b0e200b3022caa8b77ab149f52f643c5ac398
SHA5121f65220b3fa99ddc167d87905c58bb0ed08c90399e52e7721b3b3a10f26c7d62853a3c7e5606237c0016c9db22c99086767d97498e46e1b582d9aee0c1bd3f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8fe74eee11ef989c6f7700a9e0ee606
SHA197c6d14f5b3da2be7a69a73b1c99d8cb11a6f52a
SHA256f42f4afee55f4e786fcf8a7b484a37f61f89f5fd1d6cc5ac87edf66aded55eb9
SHA512bc64646f66775c35dfdf7ec01686ce42ea675de28022bd96be25bec593841e72c2fb3daa1d20324f51ea61b6e059feb8ae9950a65628171b05372c43194f24f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf93ccf977db768de1cb7f87b3a79386
SHA11023f8f7c9addbe4d210bba93059689b6965b5a6
SHA256f092129aeec3940f02b8fe4c0ba4cd2b68d007b46b840ef79d1773006c3aa93b
SHA5121409a39924b6d5ab487cc3d59d00494d72b810c1215708d7ec9a59d0d3e6e6f163d8822bbeb695bdfe8a1a0c51a91771b07b71388e4c8ad30a91aed36324c239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aae13d18eee573d3554f7d89fe9241be
SHA1e854785178195108d078b9f8a0887428ee94e4e7
SHA2567e0893bb81e32e69a7856a034d3d44d5bbc2bafd9dcd826539d26931bce3912b
SHA5125114ded3a633a52d6a12c6af3fdda3fdd1855e08d34e285f013283ba6cc0a584993a2b0aa1b02b7a9bb2d776f3569a9f793b1637a9368ec2de4e7c661ff31024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527445dd1b5e48be7bf40e5571643cf86
SHA1fb502977cf4d6358ae3f2b0556aa396fbd855b86
SHA256385a7a4fac0789110d37627ed2520c55fa19457a47c4189848f79019238e785e
SHA512133a41f700c21bf11175ef23e6fc819d3911b1848f823a3311217e0d2f3a607f09e04e5902ffe979961d09483600df524f0de75fa239fa00bf921ebe90a383c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5655983a13e51df7319dda0a25a1b8c6f
SHA14b9ddc082f7a3fbb29507df169a7fa1598ed2637
SHA256ab9c9717282490bfa0f0ce4bf2ecc5269136bac48602547029ff20ce48719344
SHA512a81e73fdc6e2523df5f1c0f813e016ce770d21a8aa3c4caff7e4a641f58ff35788f0eda0c1f615bca9046cd39b05e22f1101b2e9cd7ed110076409aded41b89e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b053b6ec9cd0bd213a894983236020
SHA1c3e16417a60c1d109513e10e62a94bad5d77f356
SHA2565692d9bff43a6603c4d67a354590129b7d43be8cdc8567189571fca72fd0ccd5
SHA5120b06fdf923ffe18c04628855d4e404d41e5dddc7d3660ef84caa5b9f41fb56d3519bba3d9402ccfadc4a3a596e4412fa1fafcd1139b73466da40506dd5bcd98f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a2db2efaab827312f871f4541e727c6
SHA148148b10cf6d953418f4b4a513546b1c988338a0
SHA256eb50f5b449284d26773e164f339e9bb86018ac3d1def068b741d666b24bd51b6
SHA5124d92060ef94c987a84d587eb3d96216da8eb278e3886b2d7a8625d53469fdecb41fddd2673503873471b3617c9fdaa4da0f6ad375a7d5eafedf2f614e0580527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562305b21c7d68d2a0b555105de6704d1
SHA1dec2d7bc7f45fb85f9edc365921fbe142aeaa978
SHA256cf4d8ad70d3b6ce54d2b145c0694664e9a347b156ecddaad6081c16696b9e6e2
SHA5125730a41fb8020242efa06549819e5d6ccfdd07d6d4a12468b05b957c82e66ccb871298fb2ea6c16c48a5796f625d22fe34b33c393f665e8ca5a881f2ac2d2646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cdfda81b1d2d3b77c01f64ee5a09df4
SHA1cc979b0c2e286a5b96e3a0d59bafc5b709521b6a
SHA2569f7277925c367a18876ac81fed14c475b8aab38f38cc1f87f06ee674864e8b5c
SHA51204e18493c3fd8d689fd83011f6c8d896e42a2da267d671ff6b60d3e4c98a0208fbdc25d51d1b8ac06cddcd6ac1674633b2cf7b558abf5e13540b3dcb3791cd5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9477b1e128a44e3ddab3f12f72208d8
SHA1fbfd704dd1ba505c0e084269702e4cbd80c8e7d2
SHA256c3cb8b778297abf08d1021da2e49467fe38fb64380b738ce30fc6ab982f06da8
SHA512530d5a6ec5503db3ead1a839524cf04d74420af6f265d9089bac66ed06c9836469dcf5e9defb8d8681024210c3f78894beb9855fbb53e1920848e3f6ce046d7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fc2c29d02e6e28111a48c58bc70d007
SHA13179a106b02458a9fc864261d5a9dad2207d0085
SHA256c1280abbe6779c70a31138d8e8ed8331ca17d6de258d3280b4e74d0c26575d93
SHA51246a0c46c98e841948da2bf890e6b7a30520d46d04fdb3c5f47d06976aa5304ac0671dd5fe6f031a67e75d95509e3f20a7fda2a08816b5bbc859b839e70ff9848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50df4c883968528ed6637fa43360b2a3d
SHA154595a2938c2d36659d98491fbfd145d405244a3
SHA256abdee8483d5982e199323248f6e77cff6d581f527cdad5b6352e07c470248ac6
SHA51249a357ad9233604ac24d08a897e3d85c2f626c36ca5e21135e8fb30707330fc9503e1a25ae1b36450988a55acc4273709dfb3554b7cdde34df7b6f547b14f4fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7a66c1e945ca51ea394b5a6e356c9e3
SHA116a17bea784eb32946ca3ba98e01d3829cad1148
SHA2562a0556475082ea2e9356edea9f88d7519589df3a774a605025eb605c4316c783
SHA512ceecc7b10ef940edc020ae7ce6cf7861ed094270d27d8e2e0a5703b806b461d28a5543371cf33811e717b7d643943b995dae5aa47f79b0438b06dc98e45274bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516581f1e4bdb93fc293ef8f3ca11314c
SHA1b07c082a65627e23b2db629787cff40de96e0ffc
SHA25624876a5e79550222a00b7c7df96e523e44c81688194286654f81d1193c7aafba
SHA5128011fff9e6f4ed5bdec55f123c1c381368fff6b31c743427c7489c7036588e0a42178cb3c1ed7cb15f0c1c2f262614162f67950a2c4bff7dc8728d818c9b84e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5d2de294f5e7fa8fe4dd2847244acc7
SHA15639c8a09763e5ca44ecd0a6de4b0adf1d9064f7
SHA256a36ca4df0b498032d4b8e79336d9b25d61624cf9d5c8a7ecd6f04f031d0e7e25
SHA5129c3a5e366afc231a3557431efd03ba759dff7e6b50cd50003492c9e46d0042e01357f184de72069de17337aa5c72ac9bfa5bf4845486af7bc974585e9223c89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52073783766d4537525130df5465950b1
SHA1baf03f485becc6e51ed7e4613a45be63d7885f02
SHA2562794525d420ea56d42e25042e169fd981a0f9fb26b0c03185a7a3f05237ce527
SHA51278bd49817c3c37368af43ad29962e88476355f66ec83919b9c7564203166954f34d88b9afc477bc3714d6135984e5ffcae4d1019403d98b093bc418189edf36b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51341b3bc978702ce063a445ce60d0365
SHA13ff399391879d15f0ca8bc63a8729b4da4e88cfe
SHA256b1cb6d9db22831cb73836b9af840852caa20d1380a0884251113b90236536fb3
SHA512f86dc4d21cf60079931b6d0cace060492e759b8d224e173f48b3f2eb62b27dac606d15aff2e0c2d2155bc5bf09626c72a97f939a24d9c747d69a5254ce580f5d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b