Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
2703931b77e0a788e9199b5bf5856f87_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2703931b77e0a788e9199b5bf5856f87_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2703931b77e0a788e9199b5bf5856f87_JaffaCakes118.html
-
Size
33KB
-
MD5
2703931b77e0a788e9199b5bf5856f87
-
SHA1
063200379d07e9ab738f1ee499d1981f1609dc1c
-
SHA256
853d08553e3edd66e8e13ab667ebd8f870a21eea352b6e09775c80f559483ecf
-
SHA512
3fc83af984e7c559f32a6b65ca5098d48834aa823089dc9bf5af32c4e656c080797a5a77c59066fd3ddc9436f89e676c61dfc9f1ca24ff992d393f1d5ad2e0db
-
SSDEEP
768:DF62MvDjIvcmC56NVYTRb9C0+iiWmopMI5veJ07nacNeK7y6oMnnDagc:DF62MvDjI0miRA0+iiWmopMI5veJ07n4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB8AF191-8604-11EF-BE3F-EA7747D117E6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0dbd1b4111adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434615956" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000c1d041159214ab2cd6c83ea7ff397fe9268e38213ba9573f74edcdc4bc8a66e2000000000e8000000002000020000000ce46102242c536e9ebf804ffb5a94f92178b5d9e856fa5e916896399d10f92a02000000045f2be410d04bcca49b9f053c762020ad7fe7c7de046945dce46afc78bce525540000000d1c541ca5b7f697185c9bb5b6e0f5f8cde52413bb2365e4a1f7b03e762b47a001c2fdf712648a81bb161b380768e0b26f7ce79a92b39177aff5d957b15a473d3 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2792 1728 iexplore.exe 30 PID 1728 wrote to memory of 2792 1728 iexplore.exe 30 PID 1728 wrote to memory of 2792 1728 iexplore.exe 30 PID 1728 wrote to memory of 2792 1728 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2703931b77e0a788e9199b5bf5856f87_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b7577048b6357f8029fb38301f12c09
SHA1818132661e78aa80f492fd6e995ab1075c60030d
SHA256acca9b4d48f9b88791c899559da2c8ba01a2949fc5c3baff22f7876d24dd27a7
SHA51291f89d3f0daf95237b776ef2ff3ee6a81c1b36097c2fdc7307b17a07fe43f6a1c334db35fb217a7a0e5f3c322fcd3076baf2aed38ea5d1e711e72ca5cde83653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2ab9646d773a24b55f28a205fa0c0b2
SHA15ef8ad1bc1bc1345b66f737ce2d613d98b366b8d
SHA25651a695a40a9c85fa673941b7d7b1d758cd8e13cdb3888b04164861996231ae1f
SHA512eb6748cb3d46f0ba20f19bc76984eeb3f2dea62386891680c77f5b1f2b641a5b5bd42be5b0da070ec8882f1289ebe519171fd3f792ca57ad95bc24441eeea0e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563dc6d58ee3ca0945a6a37297b2ca098
SHA1dc5864f0bfac13e447ab87d38b35ddbba4a58bc7
SHA256da3e72e54558335cf51d881dc7a354782baa72568855ca422d640de829520ce7
SHA512612b8064517e250114758afb63c2c12dfce5c096c8c6f67fa3f4799cab3c2cc20f5712cb47145d1344addf85c625bedcc8c1d63b8d7c4d5445af1ef96893a410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5df4f0be8456d1ca7d810535d72fdb3
SHA11f43f55a86cef9612fcfce587585dd6e743253d0
SHA256adea3fd69394254ac6dc5acac840d5007a315ec0e150b507494b747513020b29
SHA512056e16741c4e29b886cf0accb0eb86c64210ba71af77ca9ece6b1714b4c35c21daa9adb363752650f48d48d3070254aff4bbe9bd9d438f59238d88032511e576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55297f1e56ce6a53cd18238ba5c62273c
SHA1c5b9482318a623f2b8ccd1d0364008fb44c83b0b
SHA2565bbf4e3969ea2af0c8819dfe37c8d069c7b2506f618dd644b743a244ded2e9ab
SHA512b9585b9aa51550442c259fc8df0cd6c7104f7b977c6dc563fab9ba18f69a887ca53c42e17641266f7f8907b86e7fbeb976dc44da8f953f770fd9a26bede8aad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf46343cceba38dcdd09d55bc8446339
SHA10dead8ded984f60f57a34ff6f6ef5fea711b4465
SHA256b11654561dfce6408abe374e57978a031ba58497b81dbbe32e8ad183764330b6
SHA512c50cd6ed7f4c009dabf83cc0496daaf87c434c5e422b3c4cff65fdc5a800b0d2c3352daff408270c54a2ef8c3ed7d9968ea559317013ed9c65dd9bde15686cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5192fba92eb489d35cc036f3047229601
SHA1955f839ca21c7b6a35be879e9cd33e71a7d9f741
SHA25668e5ccd52eb1a80158a1ed414be6bd58c9f9f6ab11ea05eaeab37e2e55a6bd1c
SHA51210ceb50333cc4d24b297a3e1c4dfe322f92d69942e5d32c82dc52fed72f601977b05583a8e072d291944f6c5822ba2369974860d86f621801872591b44b7b481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd397c5fb77d78b3f49e1669b630e531
SHA126bf856f1898021db1bac75800cab2161fbb16a4
SHA2561d1d367c1dd4918d3d2f0e6398ea8090064a84cd6e7c2376b0e68b6fcad77be8
SHA512135320be1c8df9cefbd0cae00c2f7966872f4ad6471553ca45a650c20558a561664109808d1c7bbd438236ea7d0d0d4c5591f3340f14ef11c52d98559ccdb1a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589ddf18108b96bc4d77cd247251195f3
SHA1b33f1ebd70bfd42703e168052814cc9e6741ebb0
SHA256ee247b5bb931c6291a332808e76f830d8cf02f41345f863869aab53594bc913f
SHA51296216848e6508265172e080966750e55e5958e2cd849cad5a224257f4168890b594bb457676dbd24d9d695f5a0ac7db98e3fce7d91a914da17603105885779b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5e0f158beba864e13e18aba643dd27e
SHA1ef7c61b428c86ce70deb3dc25f331fa911bdf614
SHA256fb889f17238eb98ea1f3239ec6b2fff2defa481227bbfb5f8a89864bf565eec6
SHA5120dfa91c59269011fa7ff989fa1a8247c7d83798b28e6525c60034a40b5db80655e5b52a3de6c9e9da31771589c058ecc713dff9ba063d908a4c953d77884e976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca8fe1cf679e545c772153322cf0046a
SHA16ca5fec450ec9ce31d3580792081cb8148a8d321
SHA256dd2214a6165865bd1f072489d0f434d8ceb8e15ee6fee7b1984ea9cfc2f66972
SHA512e981d560d410aa5ff8a4ae78986cd58abfdb527c44103709390c98f369a171fd7906a91e966e773efa44f7d72f6b46180160a4d89ed6ece78c9a63163f36ed3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c01defe4523b77b7363fd493c8c5879
SHA122cced9fb269f1f5f26bf84b5c149377e35aa2b3
SHA256485b3d2d93650acc7c0ae3cfda4f20cf87afe6d5969a6c805da6f474bd805fb3
SHA512e947a971423e3f7d8be56315d2d736a1961e1054936a2761e17aae5f74a33046dbb4f72b5507a359c13dfd53d1850f2914fc3a7aa1350e7160c9af81365f2cce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aedc0baa7bf45bfc29ef58aae567dc67
SHA10da83620dbc39be9a2328adfa272b70ba3df7ca1
SHA256e061c0d724f90e054c983bf31a6754b0ad7ad9c1fd2ab512facddf53a5e52865
SHA512f5f30683ab7973bfd397447e4033951505d2582d3436a55a163b246cb2ef7ea8af1997fe6bd12a7bba2f07068a4d337c2f49660cb3c6addccebba15378d6ce30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb0bcc18772bd1cfd74100a78842c4b0
SHA1044a25faccecfa7175cfd8a9004839f6acdb39ac
SHA256acf00c91ebcd663c5f7d0e377acc481225dbdf30c84c02a88e46f3c95fdf7f93
SHA5121d49453a299c1eafea534087ec2a8471b948255af8e6da49cb66899a3760604b2be808dffc30013a0ca1121252ab815ac062af2eef6b96255f71f1f75998119f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df940a43ac370c104ca99c69ccdba553
SHA170917cf7c87101641611443f3af97699c0b8c2a8
SHA2565f13619cf3389c86bfa81a31368d364a91725e6bf4f58cc3019dbeecef928b83
SHA512e9d3964d3d67bb1f8cd8d0f3737a24d24defa1c8ab959162a8acccfacddafac2224bfd7aef1f709d7c84b734e920c910bc5a0c3d73226bd2b22b41bb85e86f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec1e7821f62a83111ee611e72cbd1b88
SHA109bba960e0dd2cd474012ea592982ada2f370b16
SHA2567eb12e13b8db83cce3f4d5db13cbfee5502e39b9c9ee4813eb24d87c0d18b0ab
SHA5129424bb28370f39f6d3ed14be94d5e8f91e610ea35739edea827039b1473435a04a47ef21d39f6f2989ced51c7e33ad86fed75735eea8e532b1acff9f1a7205b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceafe90754d48e123b94704aa5e2afdf
SHA1ca9370307a5eec5d669afe2063a82074d2a40fbe
SHA256ce4c6cd5f6bd6a27984b1bd588466d43eae84287d4380670552a7c2f4f8628e2
SHA512879745a8f9c28d578f00b3a39de88d43db3481714adc50411b074e872cc567c64ce8829cc1bf0dea57ca41e9f9e731c10bde4a51998207a73d3ce291650f06df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5760c61a75e0a473576e522e9cc245037
SHA114e1b27dada2443e86fc88e3b89363ad5f83cc8c
SHA2560503931eccc510c1dff33809a18533338a9486445de8eab7d596f9d54cd0d4c8
SHA5122a8285c8854fd39161db95d8b5179ac30ec50c99f911f35b0b2c7884482e7d2ef4487dd42a994e009cafb2df103a0ad7fc1435fb5c00a903c8ca48847c7c1a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eb60ad62ec521474c67591067438ba9
SHA1330e04064932f081b4926e35c0fdc1f8d974ca63
SHA2563c2fc9b81eea03b5eeb03c20214fa0b9078e8641a11dfefbb37a8197924d8f9c
SHA51236c79fe09df1b3f032130cc849056beb867a8a87e8bbe5b58a5b823108225a46408b95ee91df3fb59c18a9ce43cb9aa98930cbfd5162ad0a8faf43da1696d904
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8452S9S3\OQDVX47U.htm
Filesize119KB
MD5a5b5ded30ed28c01e3ce8573aee9e455
SHA16eeebe91f86aeb04e3d30ed9e3568307d601a39c
SHA256fe0e852c8ecc5700631569d7ba2b0edaa3dab499bc16a84763487d716d1ed15a
SHA512e93a776cb7167dae9524e7d0465d646337f9c32e8a1cc7d4618dfd432530bda7f9447703da0f995371699d37c3ebec257094eb384558f040549ec65cec0fbf30
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b