Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 21:26
Static task
static1
Behavioral task
behavioral1
Sample
42289221e587dbb49ab9d984e6f5fc1e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42289221e587dbb49ab9d984e6f5fc1e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
42289221e587dbb49ab9d984e6f5fc1e_JaffaCakes118.html
-
Size
53KB
-
MD5
42289221e587dbb49ab9d984e6f5fc1e
-
SHA1
4c1449636e4903a0c53d3bb31dbd834095dda88f
-
SHA256
b3df42646f29e84ebf5645279ff192471fa461599fde06c758c41aad4c38e96c
-
SHA512
5ca1121a973a5ea214e3a47fcab1a177c7c51405a66e0755643c597b58440af3c48b6b143eed2ed161032639d357a22d2a512e4a5a50d036484b3e8f401f258d
-
SSDEEP
1536:CkgUiIakTqGivi+PyUmrunlY163Nj+q5Vy0R0w2AzTICbb1oq/t9M/dNwIUTDmDY:CkgUiIakTqGivi+PyUmrunlY163Nj+qv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f06bf4bcb61ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB41CE41-89A9-11EF-8CD4-527E38F5B48B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000004f5ba5b63ab33a60eb3b657395d3d1e8b5212dcd9a9188ae2bb92b31b22d77b2000000000e8000000002000020000000e468cdc212c8e1ae2d81300c9d8bdec98633de5ff097775bbd58c7a830c00d9c20000000fe09163be1d34f0a8b7f3c9cc72de233d140e562dcf24188a81096265e8e79f840000000d0bb0891cc5f3c33cb99547c21cf954f0a544bf9b32f75791431926f536d0f97c566379a6ce2be09572bfd183eea1b09b19edac6456c6d31dd7521f3c398ad54 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435016677" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2724 2076 iexplore.exe 30 PID 2076 wrote to memory of 2724 2076 iexplore.exe 30 PID 2076 wrote to memory of 2724 2076 iexplore.exe 30 PID 2076 wrote to memory of 2724 2076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42289221e587dbb49ab9d984e6f5fc1e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516aa711213533e8ef2dbf0df5174f89b
SHA19e2d8199d32e1be8082fba01aca46cdcf32e8197
SHA25649010e865b7a4d91e544374f8f3ad61eb0468b4d0bd71af37c39f1669753cea5
SHA5124f9dc391e9247c8c41866f72eb1eeb2239661fab245c935d1ce33bda23c9cfe75d207907b2ada0bacae9c0d446e930d0084fa0e2137106c7db7a328f90d3d211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548feb1772cc7b4c71b596cf88a2c1438
SHA1a1e9df0cf40dcb157e9a7b1e60183a27cf2e0fa9
SHA2564f332b92300ed9062bba24f22b0d42dea3542e2467ecbc4f84a848550d25b5a7
SHA51238999331f38df60e5a8f1b36cbaaa048975681220ec99bcb6587a047909c1d271a8baac17c6af54cec9c66ab157dc35c979ead9b43ec4a79380ba492ee98b85b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502114da89e3abf7000dc1d7c4e5941e8
SHA1c02171dd2710507049d06a39d5348e8a1fbf344e
SHA256b9d97af5f58e4d7749c0dda4447e2699d7065bcefd9960522c8bb8aca5e2a25e
SHA512e22d10b9c5a051ab6f0961b680e208a316e0de2c6b6bee550285c1b05d29bf0fc3ebf7f263eb7fae19b019aae4401a12fdf9b0823589536a565a0153795579be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ccbd8ab8a95b8eafa06a649d4845d7c
SHA144a873562def42a229f909d99cde25f167721a18
SHA25632cdaaad44780cd7b9b99fdfec56de5b984188033872085cd94e93d155a9ca6c
SHA51270a3c96d1002bdc3c4e3a06bcc04bd76324eff7acb027583140d6975a5ca4ccbefa6ae70e83c1692d4d3662c76d4fda811a03808881c3266575f703b80ae57d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5647a483444368c0b34f3fec3cbd5c976
SHA1ffcc110d176f7baebaa11f01453572cc8ab0cec0
SHA256e0c3189a57233fd242089d211db9c5b47cdd25cd8375923ed172a26dc83a97a8
SHA512705a8a4f510d97ea604bb25a57372a855dec000dd8abe22ef503b5ed245fa129d9d003657c87479579c94ee334de8a540fd5ab10d0052fcfff2bd3d33e0d81bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d12fe80fe54a1ec1149fcf5c093d2dd1
SHA136f54c445599111fca3eba7033a04c3e5825ae12
SHA2567ee2b494a5792d5ce2eb82946f84c45135539c5a2cf82076f5db89b997955b29
SHA512d041d95900b533128d26f8cdbd0a9dd1bd4d87134f1fa139721092d1fbd5265ef4e78028389dc4486d0a4b968866e412ae88baac535b871645f9e23892c2eb49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51865d3e6e0d81e4d3bf28f1e28700068
SHA1b34c090f47cc23d6aac555ee38cd3f7b0672be7d
SHA2566f811891b2ef759368173e08d2101c0da376360ac1e3ce70c171c0bc7e2664c1
SHA512813b56b40d229a5802bd5fb73367f128deba4a8e10ebc48413b67f35f184c140d48cc795249da86f982a85e52c4cce2f4e0db6cf2752fd6637dc665a2eba5c3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528f5135edf805f3241c0a4fcadd7a6cf
SHA178d9e8aa09131342271840d2b5757bcb06efb67d
SHA256994396f7ad6a632a761771dffee43a0b5d6dadfa01809f16da68f792a3961c4c
SHA5120c610522b59e76ca6d6a182b5408d51cf8b7b4df2725e58d3ee438652366fb14c80c1ccd752d2084847eec466f96f9548c4cc9a9c9ec906d08403bb7dbff585d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1211855f519b0a8a609cec30beed5a7
SHA12875948d28aa54c61be0c300922152ceab4f6642
SHA256bbf6fe80ccd0910d778873efd2509045d5dd96e2261d4a67126a87fe5c287823
SHA51256bf272872c4d8628b5cdada4a00420dac2b8362630d6f69f57eb7e3e52d3edf604f1d13ed7d1656ef4e859a79cde3875c6d0e7abee4c0d6a29981ae23390877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a252631a36f85bb676427008f9811b7d
SHA1e5fbc418a2444d5a339aafadf2b9e17b30d742bc
SHA256073ec01899ec16767eebf6a7f0ae91772395d3b724a75908aa3194bf89340aa4
SHA5128a791ddc87d98393cdc217e852823ce56d3af3aed688d9d9a8e824d6299a5bf3c3ade5f9f33f58131660a72fc259985da0fa1cd92aaaea1e6ea50e3e9a12b7a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556d59720b7160f5c4a5cbb740c34a502
SHA1c764ba6d86a61c96cad73a14b1eb8886c37eccd3
SHA25648870b47bbbb625c81545172ac67b949c4765b0694e3089ba3dd54a76088128a
SHA5129982f6f39af1b41668efd4677b7824b4301e89fb0e1dd6d00c8eeccedca9c7a556f65f9157dec18661b9e4d57783c500218baf49353867b0a0fb5735c4babf43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b141d5612480d1925a87fa69a83402c5
SHA11ba0210b9d3b0738d785f4cdc79c036b2f3021be
SHA2568597b7780c8cea8db33b00eda2a8dd59c0057fda7beb2efeeeee5c31a009e0d6
SHA5129f670c0236550087de164f4114458c2ad948f87a7d936f1ca038265488b1e2c2e386cd052de29fbaaea02919e44b651d46cfd5d2db01325b1c09444c15862f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567c65194ce322b4d5595714020d0a428
SHA10cec017365fc8e90256355d18ff75035ba635962
SHA25652646247512edde579964eca84d303939cfd93c01e4d21c02ae14f98ddefce4e
SHA5127cb7720755cb189fa19d8c3a9819a976bb760a7c923dbe7921419d65bf19baec7f1f688ceceaf91147a34654f5f79f2323bc4a5d45e73f578b58b041742a3b85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583b4905f90c65dac0b0018f45805777b
SHA145d87680c4195a83b6f1118865239e88497a81a8
SHA256aeda44b8ac1a2a4bd3ce351913015d2d08aa0a66869c1c6ae9441d1227297a88
SHA512530da3a2409f58edeb6d0241c4ffdf2eba9d22d9ca4d3e38db83dbe86ccd543c4b28f884d61c1ed38d5c71391afd477b3297a50dedd72c2731639d65c389df27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5834fbbe2b59aa78657e6a3b0690e5b79
SHA1b23051064a812ada8489c7c8acfd77e2233838e0
SHA2569e94f2b3157b573c3e05d2aa57918d3a62c1a93749bc7f80751d12d1cb65a147
SHA512ab5841a5419ce4c5597c728550f6215dbf7cec9dafd478c39f00dbab3f725fe091a5158db1c3fcfb560866cf44f894552c74b6b7ddb64fd76e9f0f8f7e9679a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8268a6c710133b254cc7601b127e407
SHA16a23d59f11096e56d4e33d11b71ccb21c94cfa8f
SHA2565635e1c230464db28ba34a44a43566621946c5a174209840381e659f206758b3
SHA51270c5344a391ee21100e657aaf17ecb4e6de869e964b9587f87eb15a36fdfe4ffb9cc0c2371062253fcb4e2ff08b991299917bb1cfcd36fd26587db81e8540f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bafb8db0a0c84d394799ff7dce6ec62
SHA139b6843f7061d13819b309a26bb178994335285d
SHA2566e4bdb3f4b3695237f1ae268c775432cd2d4bf2e7729ff83c4b0ac45a041ffaf
SHA512df69ee8dc9637d4283a52e4480affe511224758d94e55e5180b3e101b90d044568b306d250c04f83b4414c7527b48b22cd3d075a9d84257a471ca255078963d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbddb3b5d051dd1dc1d25081f05a6be1
SHA18bea5e2e00f916397060f26a04aba650f3eaa9ab
SHA25676b2f226bcf92af3913f7a3064e898b2203eb2c5e6f071cb4863207680f0c363
SHA51252329f0a874bbebd6083ab667d99736e42331a181726275a0274bc2160d8893ff06792d8a9e3f19fc888b88b633dd45f4e8153fa2f0c7effa7af319254c6cfb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557c62c4ce6401393a0d4156185efcf3c
SHA173de08212d63f4da7724f7b14bb78c0e4778b355
SHA256b5b5c80580212ac850536810bbb25c012e70ad4cd172e2f6287edafe09a11751
SHA512ad64b25001975341837aedff2f2117c02b42362cb6d6b67ffeb4ad5ea3879ef266a8e94c93b39c230d09db8f748f2a2e241f2babc187c8aeb5aa5c9ee65fb74f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1LNUKNV0\star[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b