Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
278b3d21b024cda57396922da71a888e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
278b3d21b024cda57396922da71a888e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
278b3d21b024cda57396922da71a888e_JaffaCakes118.html
-
Size
8KB
-
MD5
278b3d21b024cda57396922da71a888e
-
SHA1
768dcba2d3e7f1878205dac3a9b21a6f09173561
-
SHA256
40a8788045ca08f4a33545194b4e45d3872358dd44579eb2d9e7833cd85612f8
-
SHA512
8e3cd1c9c0a13d249bf07bcaa4c1bc457027e00f9ed142224df6b7689e4982d995e5a51bbbff3b56cb13e223d517067be27b1f6761fcc4ee48a056935d3a3b05
-
SSDEEP
96:4+UUP9YSOJDJyjXIRKDeWo/nym3rVV9o1MStjWtgKAwSdddd7ddddFWddddjdddF:yJJDJyjXIRKDvo/nymbkzpWpU5hzGiz+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434619530" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d35e1c1a1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2D3A2991-860D-11EF-81B8-46BBF83CD43C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000d1be697e744b1291d90e02619867716db81131419da481f8ffb449dc3423a75c000000000e8000000002000020000000934ca1baf7ba695abb1f0d54abe35b3453168bafa7590745ee194f1d7de09f9f200000008e9eacaf914c58714f3c4ad4fdd4249ac34fcb459cde1672194b017afb44cb9e400000002f9a5ed3f80b3d8c9be6e6f63d2c42be47793a9278cc2fd225fe620a94ac734a46cd9f28535de5163060fe4492bad45a1cf3bf1d8ffff645ce45db304f9c32d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 1568 2700 iexplore.exe 30 PID 2700 wrote to memory of 1568 2700 iexplore.exe 30 PID 2700 wrote to memory of 1568 2700 iexplore.exe 30 PID 2700 wrote to memory of 1568 2700 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\278b3d21b024cda57396922da71a888e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad3ce515bbedbb6d2a313b79490ed58
SHA123770c8d86600ba40a051482432a963a6ea475fb
SHA256e61f84cecffb96dd9e82788115fd9d61b15df9e25ade5e037905f35ebe70e1c8
SHA5123bb70310f8838b49cdd272bd0c1b95bd6859d5f2777ce493753bba75a178545e69218cbc88f69c451a74576a33cb6b0930c767c1c0cadab931970871b83f326d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7ee6286328437462de0cbf8bf829838
SHA19ad868ede5faa1f49b09a3147e76528926908499
SHA256ba8151b7509b7cb5ccacc461d63224857f330a8aa287d316dba7cad8d7e580e0
SHA512f801e2e4503ca9811c982813f544476275220dac1616185060b0225ccdacdf40c69be0c665d6a98256c5dfa247d490fffb528980cc965be9b63e25fb25ed3daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573f2eec2ce8baabf289ee298b497385b
SHA1e964f5b0dc9e67fe48ef089878172664d95285cf
SHA2560d71cb3bfacbf25db7ded24eaec121f6768a75f249aedbe23d1ae6807a262e36
SHA51298bf1d299a7eb594384b4fec7ae3ef2e5d6b1bfcdbe30dc50d4fbf0c2217262388627718d774405309c36b23ae9f07acc070d556aec36f6158b1a657235251ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5003550240be24f9ed0158e598c56c0c6
SHA1873e51ab064e1b561df2a3387eb7a759518534d3
SHA256c0957179110e7bec5b112b883b50e5e859eb523fbd69f9c11263ad11d0d69fa5
SHA512a2ea3c98c3b49553d276c256d87c793510c194515873308fe9cb36e4e878c0bd2d77ef9e0396fad01f597c9af714acad1d31ef62d24e3bce55f2b81f4f422690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af5ca019ae557ad8c5537911e2424be6
SHA141ca2f0731aebc0542b95590adb4dda30cbe9991
SHA256a1f4e77b1d66fb5c708a36932a3eb3c3859268b0eb255d3db4d776335cb146ae
SHA512663b355d1eeae9b3ecbe11d6ca1aa91034c9f5ec65794a29a43aa16bb1b004969479858aa72d87b9e494aefe2b32cf2b2389c6e796c8b67c2954993938af14ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538b8c6da941caa1437710e1092871dcc
SHA191a0454b16bdb23eccedf85e5b7ffa3559207a11
SHA256feee0b81691a6a20d1cc4081d1c1716ac99e9f83d6423dd649b2a71f23312c64
SHA51291317df9972dc57189be198d5fa9d117564159c726dc0d00cad56d76594fab5e67475eccacffa283eb90f8e1500224abef73a389b89edd0d5d62bdc4e5f97cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52883f709427d8dd3b25e0a1f5f0dc787
SHA1e527429abd8d17f08d9b79c425f852531cc9e08e
SHA256c951df123cdce2058b00ca7ead0c48aed9c6e6910dd786d05b6aff37f1d77e73
SHA512f610d635e6457e26cad429886ec1282ad098e2b9ac79510fc5e864183eb05f195564bbdb5d17053ecb00bd1fd339638252d4365eacbfc57742c120a2f29d554a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfb67776d1faf2afdf69e306a8917921
SHA1fa5e58c8c1b8a1370bbab1ac6d9ad9bf2fc2431b
SHA256d64cf6c0ed2d0f46acf97810b26a1b67e01dae53097e4939bbe336e9f3cb2c4a
SHA5124afd6c9428a26dab933061d2f39b7f8e839633550509e1429986a669e33bf27adb2d5fcbba305f15741fbb8f10b9727ef68a0f120427e1cea48cbf71f9eb4374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5102cd98dcc7838754efa8b034241eb28
SHA188ff80679d26a4d898847cfa9849146313783c3c
SHA25696debbe0d1676ef87987df5ef5321efdc330e1b12b952e822eb3ab3539d83a77
SHA512bbd9bfad2b11c15f18da1500f907b421f78095aa67c1502f5e0f10ec00d2a61ecfafbf96d0b7df5ababdc22ea26a19d5e940228cfa06036153944702d43fbb5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f9b0503def3cec629582f4ddf3952b8
SHA1a660cc6941dfd47a4b2e8e7931531fedc3b94304
SHA25629e861025c88982f814a7bb85e7332c5c815ffeda23416bca1499e1542a36260
SHA5120c8d325869ba55cf527db5225c22f2cb8ed2919a4b5652ddc459cf45d5ca1122ccd1e98c32085cf740631e02a6160e7a5ceb6aa4a7380683b245cd4bed202d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525f882d2064fee5b2d3473313b4593cb
SHA11ef416d09e3f9627b3cb90a22fe407b4b7c527e4
SHA2569778ebff3fba6b41b073ef344befb36e7d357ab0819cadbd3e5c6a890406ee76
SHA512ca1f1cf53bb90e3b084aced645abc6c945c44fb0f3975765b28e59a131b741c38a3c08b2dc06cbd8a04b12034d0192cd8d679a4dce89672219bae1695bc25ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550305f757e0883df48d7ae2790e86b5b
SHA1b8a3f82e5069f91fcc7aee4661d2c27d352f24ab
SHA2561441923d19a057d602dd02f9e7110691b8768edd7be7f056ee0cd423553fb142
SHA51231e52ce1f881081b04b9dbeddbb086cb1f7cda0d75c6e894b7558e374b1c037add7e248c91d2de3fdf03861ebe563009f063771d1d0ba1ae8feb25d170f1ebae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5133fe1ffa59de822104e057cef537cc6
SHA1538e8cebfbab6602ebf84d7f7a1c4c58b1bc91b8
SHA256c0f1dedaa974ff22e8fa7d134cda99f5873aca8b092a7460e511c8b4341c0608
SHA512c8397213c0f0e0a91ef88984362d5406d81bd9453c8a1dc06731bd031acd12f3186c4cf49b10b3f868e5fff3f3608ccb7fc283fc8fc10f9b5bf645a4259d7062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7220ab5d7795423d497d3e334242d8e
SHA1db8ab33c6b020a2299b2b9533ad7a53725dcc700
SHA2568a3ac6d05787a7e3d8a0fd033bf25f9f7d4ac5d34a2cfd6aae590344efda1d54
SHA5121b8136b4f6c21daa69927019efae8f781969c2e57cdc5ed1e3966d6e0864f20b29d5b1c461f533b62fcdffae3a0d83b79b93e2b4e133ee110a9eea23af50a803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552d3fe01548488ac85129cc38dfce827
SHA186163c33d4e44930d267d85ba25fe95cad3f8568
SHA2568fe1ee29bdf45bd42c39409c98a531899bbed6e784da6fd72bc009e365086782
SHA512324c0979a3131f902be0a9e9ea73f1265e1d2659bd3e686006a9d7f91aba9cb33978b4056177ed22dca0f4882b39160cd725331006c8cfb845950c3db3c2ea58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574d852180c345c3640097a9bdb4136c0
SHA1ef4db4947b1743217cd48a558fb7ddfcf2353d8e
SHA256b79f11aa8155f0ed2e17ef1ea792b654dd32f913edaa28e9af3b09a94272df3a
SHA5122d3865ab445be7aa4c9ac0987919cd835cb63af4711dbed1c2ff3e29d8287776173cd2ef7d3a84de9e47d1ce63c6ee4c444d85b35fb88e352fd0a1aca4cd24e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e021e45700c2ac74596096b5368cdd4
SHA14e6096663ad1db82db09607b152fcc7d3e396af7
SHA25638fab34c12354a19496189eb9a24f4a2eafd083dd9ad16d12e7f264611d571c2
SHA512052dbe6ace1e00d63ba1e62fdb320e2911d5bbc9e3f05673179f37a6d34eb15b1eaea26b7e3443ee2ab75275d4fd3b16e6bff73584bdde3598750aa9eab8ace1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50791b3f78b8e787cb82d66ee8f1d178f
SHA175e1883dd2e72bdd894ea79920f5fdc31134c723
SHA2568c4fa8a9f60babca666749045f5b24e3e4ea1787bf94e68698f8a20bfa4932e5
SHA512515a63b4e2eb19a5d800be9d5ad54990302feca05dc6aec327b80431775d18e57e60def4a1c55f17de9d33e8e8adb4399a15348e5ff907412e66d7dc37515c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a08e280d16fa27318c61b5ed382364b
SHA1422c0ce5bbb4bd9a42b3f1839323ddf10fbb6bdb
SHA256bfba95662c3fa0611b6cbc101bc96bb15559a80fb86bb082816de3bb73468cd7
SHA512dfe124ec13b5c8fe4e6f103ede5ab0700d68cf729c29d6eb970919bb17a701f23c44387e84ad032ee0c1fc6a00382c94751486e9a999b3a8b7f827e7809f8810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532326e28442db7777ae38b527334600c
SHA14d6ac22fefc8691758822c710655562020fd0053
SHA25606c9ed9fb8a981601a1cbf4a376673807e5f62ae70fe9d4e7b7add03e3032ede
SHA5128a2ff4ec90946102afb0a9035d5799a8ec9ba235d507a07729728dc682618a6f1d76398d98748c17ded0ac494cfda4a440515062c495ae764e6256c91a7a4bd7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b