Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 16:28
Static task
static1
Behavioral task
behavioral1
Sample
2d061c449fb9719c68da3042e2c1413e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2d061c449fb9719c68da3042e2c1413e_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2d061c449fb9719c68da3042e2c1413e_JaffaCakes118.html
-
Size
35KB
-
MD5
2d061c449fb9719c68da3042e2c1413e
-
SHA1
673a3e8c3367a51f90743304e9bd838a4fea5630
-
SHA256
43fca8f13b5ea71988fb95467bf4464c206e1c161633376618e732b04508d0f7
-
SHA512
70411e0a571c0bbe5ce807a7df289d02d62d20a0d7d602952e254fff4de7b2026cf92f6cef0ecc87cae0134cda989535c382bd9510f5aefc1260f531b9bb024a
-
SSDEEP
768:Zcd9QZBC7mOdMQRpC5I9nC4pJaN738/Rp7W/QVtkIZXV155VLVbd5AwQwZwsh4EF:gQZBCCOdt0IxCcJaN738/Rp7W/Q7DZXT
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000eddbaa10ce7a63046ddc087a1f2cf0cfccdc1d77b6996c6f0ad6cc711e11daf9000000000e8000000002000020000000c7da935d9c77680f956e312eaacc382d9f6c77229eb5c37681be0dba4528334d90000000cd55cd40329a5a53262e8e18401d69d90637e2b9f470539e2c4d7578e7cdffad3634acda4cec1b531043fae78c8bf5c4a6415e797fe98b95683651d8d3c4a580915dc0334a7846ecdf9141233f241576b84622457dcded530fdf4d3f1759cf245390bdd13d6803ce63014471347f3cc32418bd881d51dc1b4510e0df24d284b1dfcef9abdd61f1e5503ce6561a9ae183400000001193f2329c6d8f450e8814c6c75242cc0242d395223df27d866a8666ed46cb918c513f0a482898ed79470b82e07ce96c8a5981d169ab4cf78a1a9740c71016a3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000007eb6efa4cb5f9c7394dbde73aa4505960dce5ca7449cdbbdef369172a5998acf000000000e8000000002000020000000a052f0ab942ba6fda724f866222439298f997aeeadc15fc174dd31bbb8651cb9200000001cef3e74d3ee514200b1b477079251dae82e4a2f1555b7cf866500885c6bf09e400000008326c97d7b6b95275f8a0904e426edc98eebda01a973d4e0c93790c93b30ae486acfa537cd64b68d3de79d8688249d894d13b273254b1a90d2ab8a7ab8891003 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a03b096396d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426646508" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{89FB04F1-3D89-11EF-82E4-7667FF076EE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2176 2356 iexplore.exe 28 PID 2356 wrote to memory of 2176 2356 iexplore.exe 28 PID 2356 wrote to memory of 2176 2356 iexplore.exe 28 PID 2356 wrote to memory of 2176 2356 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d061c449fb9719c68da3042e2c1413e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da37916534f77bc67d979493b513e0b1
SHA10a7ca1f5deca95b038bb435a4d15aafce46cdc99
SHA256aaa1d45f1343d17392a22d301d36ee5863481f0e66ca92e583a8475c513da835
SHA512c9866d493f13f3df092ea98256d0dfa0d4c824c15f57863281e0c8a663786495117359fb7aa7a718509e3249c04d47a110a35e710d70203d9ece90c6d292b3ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50423d0364d415fb0bdaa29fb681c76d2
SHA164d8448e48fc3171d6b62f3a27f392c6e9f2fdd9
SHA2564a994b6f8959067927fc700eaab93994959bc15b6c6987478cb6aec77fd7d3bb
SHA5128728434891fd791cb87987f97c410ec7e96d5b688878f4e0fe20a646f620fc1e147e274b8653d598f179daa8315d378fb7f6d812ee57a9a79bc1385d5ca13720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adec88651018e8deff1e58916a3b1abd
SHA1fe8087bd123b174f886a91d5abe3ba55f627285e
SHA256c42fb589a9cd6ece61c79f50dbf8c5c08e9355a5ae9c024b815b86db46d97489
SHA5124967717eab019895343803e89e3e705f9d5845b756d1c2814e18b769ec18603eee70b97c3e5e611d297e4a3c4c7701f60e14abb5fe34735ff2c3c6b801a5a6e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c61c2c5b7576a6ee300da1bdac5a47bb
SHA188e72fae74b3add142d50fff0bcc9d2f1051951b
SHA256e328e11aa0b56f892b029e930e226f78d3727dce157c7db81113fd9d0faee05c
SHA512e9b08d04054bcffb48dc8a3358190eb156692ce7b86aabf62734c02b04b746aad4649638e47fddb3bdd234554069b373f5d6b273f72007842085b808a133d880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae997ef30a8545cf391dec2ce68a8aea
SHA1ab7441da7aaa31d3fb80cab730976dfbd429a6d0
SHA256077bfd9a1b46b38f82a2fcae4a8b07dd16849146ca9a8e959e248431afe6ed82
SHA51240bf1c14a5af9822d0b656969d5e4b20e454f1dac3de3b131a3053bc659dceedd4db7f70358ab9b232cbefbf576f7e1d0e9a02a45bdd8a976d7f44f2de3b8a02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d21503bc98cf446dd4499c6653326114
SHA1da5f9055260535cd69a76e4458a34229a0c983ec
SHA2567108e9d2fb3e39e0707ba205cd813fcfcb24605e7495d34e579a8a0ac1b9f89a
SHA5121f569bad109f15eda78ed146eda26cfc672adfa280d2941d8853acd6e5521a6a3b745ea3b081147cfa3dc1cac04848deb9b67b1b8752301343da7bd776d5ee5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5133efe6a1d33af57993e7a1b7b892903
SHA105496169f13e29fd5d9b039a647662fbe6765714
SHA256552395912ae92c9fb0e1f58dc88a2c067b978a106d7f087421ede9f389d9d8b6
SHA5121a85641989e58fd66e3edee70939d0cead63a55b3e8509c69ab453f859b3583600b5a3aa28af12e8e58f42210250b3744ddb95bf56b13d30018866252c9118f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f203dd2d3ef06f92b6bf5696f7bb9f
SHA109f0a965d593a992bed1beb346af16f4ea637ea8
SHA25641002785b27659717ffc09b7da955dbd9cad10d0e9ea29fdb89a2ff260f82589
SHA512a446c2706efb6876a12280a8c0a1ebaa85e985bf2ba732e4efa76f44619d7d5c6b914c177e9f4f78d3bdb872742acf87a1f5ecbd200da45c8a666a02c01ff3d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beab166296f45c745f4bdba7ecbb4f23
SHA1d1f2a3047b7510d86e8f9e1f020a0750a5230cbb
SHA2568461711c2f21df49d6d1bc87382d8726e8d523b6a4fcce529cf1be39b3e1461b
SHA51220a8a4537099832386e646a5f47d34af43d1a7a3f8eb9971230945a9d932797b894cc4871994168b4cfd22add52bf82686087b0203491512f4e725a10d8e3a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52448d185d05836d6feecfdc50be321d5
SHA103a526577250b2db6b6d781270ed62514c551287
SHA256497658d985d22bb6ac9f7960a116439d9023a789d27ad3c6d1d497274675a634
SHA512f67d2ca8e46c42d91beff233adbc29fc5a2bc09f25954275d5058b9b25fcd60ae6b64e9a70202e0933705459db69cccd44c3e1bd5cc1c2cbf62db4283de41cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59741c6f6b59c7457c824e59b6f3d07fa
SHA120c3f7f1e502be9fae92c857e849721455512830
SHA256b7e76db3c9128438fb2ae6947e5f8ec9a3ac6d84fe803c46d3b25a82d82b164e
SHA512d9e6e4cf60f7b25363fd5a977ba9080cd0e4bc6c41754a3676221420b376a36ce2c1a51e846922e5c952be3b45a633663580b411d5f0222050e1896dade2a9af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51afafcaca48fa73c5c48f89ebe78ce34
SHA1b2006effa2dba231cc93fe3209798da5c331c8f6
SHA256a44970af35722345f8179e8d5f5bef98bd216a0c79aae322b3187098df0f068b
SHA5120797e5c976d37deb8e61f3524ff592d11d795c21784f072d26f431e4a0288c91947f7f01c05bb1ae8f499313fe0876da03a0c84c51ecab69869f2082a41a72af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58de58348eab47fbf7f7a3d62e07643fc
SHA1f0401b5f08a9d7743d7f834138c9bb1ca6005e64
SHA25605b2f40e8ff2af7be2a9c27f9030990e618f003d34d2cbec488fa520b0427077
SHA512e8c8ea272d0b4df19148608e4d0a46f3187694b3625e92be5c4741209296b796a0db1617aec246394e2796cc3ff963402669f7a0a6d4bc51fa824ef6ee5f1aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59560351e804ad82275aef8d8798d80ea
SHA10f94cc63aa5c0f39d5dd3538bbc6ac0fad5d282d
SHA2564dde032e69e8145b377b6a270e520efc7c9365f84eedd0f9debe6a5c93f956a3
SHA5123758ed2cad229fbe5d7a565078c03d2371228194d79a311f42360db5c06ea929d3d41a6e0f6b9b1bc8846f8d06157a2ae02f7fe97b33876693b9d826f761388a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd0685a1d4ccc1cab4c37a26dfe775f8
SHA1e9cbac2334d32877548a13a51421b46ac0734bec
SHA256bac1fe547bffaf58b92ea7e6b3a5e22c230c60b079e9bfd71073079c35a96c6b
SHA51228c301902bf3fa5b23481bf493b37b3ea8ac9995d36a33ad55345aa2c596cc2c845d116473db1b3aae052de5016bc3a1421d865f9bf43cfb1559a9488b38d495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c5c5c90e28017c8636ad5ece9060f3d
SHA1943b1cd626945d1cc9025263f9caf40d8c440200
SHA256ce64d25025ccee550834257c864d79d73063013db893c91569875a121988c7a7
SHA512ae1715208616bb21ca486cd4e5de7b6d3302f4c14318a16d5e49e9cbf06831d9d3366b368b8772959ad9fb1eb1a3c2eb9186ecf1369eee948e441d48eecfacc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e09163f93f5b0a548dd5a0b1eaf03b78
SHA149739b5b623e7ddeb6d5cd3be65015304b74fe5e
SHA2567cbe1210d4f8b6d86141f8542c605bb893e6ad7cdf639ab6c410b47aee26510a
SHA5125cdf6a4ff9ea300cb7238748bddd0a96db599e3e9a8ab20789b8ec162a03cf4fa81e8cb2b79a241bdd6d29f093a49afd4b05dda6e2bd33683b0be22a4802f539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53735b0eee1f1c7682d3cab08a16a41e4
SHA1c714fae2ab5806bd7b3d22521abc1f9b94716445
SHA256cbacbc66348847c129927e57f526b4d182a4dbec79b838f21ea2d5e6a666cd3a
SHA5129357a0ef3bbf6dbb63a4599a2655e29ab86bf3f5ec95290a7ce270e57e26e303e5cc4984864cfe9b37b24f5bed2935cd81bcaa10a6d7f3742fa5b6cebcb2fcbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c296b79c024723df50c8bddaf67fc5f
SHA11d3b82d093412097066df6d780f190127029ba5e
SHA2562036fb06a337ea35093cf5b3e3af07ab4c0479073af086bae82ca4ab6d0f3b14
SHA512650cffb677b6ab5912542822fd6b909f7374e04c46fd7d9895283d136825bd17742661a85e9ecf68b0e43ec0c087d3788b9ba3b326e8209fc318d3609667b2d9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b