Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 09:12
Static task
static1
Behavioral task
behavioral1
Sample
341a45bd3675fab0753c30c5783b57c0_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
341a45bd3675fab0753c30c5783b57c0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
341a45bd3675fab0753c30c5783b57c0_JaffaCakes118.html
-
Size
13KB
-
MD5
341a45bd3675fab0753c30c5783b57c0
-
SHA1
db32a5b0955f7b700083901b36d22db329a1373b
-
SHA256
d904fe35368fb0a5e953849de31b595a2a0f0b9e91fa59f6b9e413a31d8e5a9f
-
SHA512
40032a39d45f494132093059b8de5f2ce3b43efa2b56b3070669b2de1a8fe5a8f0f52a11b35ba66878e7d5671e34f44161e572866520f4b0a1e54ea3cc02a1cc
-
SSDEEP
192:1ugU0NoIoQEgygO/y73N/GE2dKE7QSQZh0LmRMReKVM5PSRkSIm+JyzaY32m:1u70NoIoQE6DVr2dKJAYuwwl99
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000ee5adca7f7f5138cd390ddabded9e231ec0c747af466281f7a5c6c8294ce96df000000000e800000000200002000000094730a07862a6bbb3ee2657df6344ed2fdf3e39ad26ce125b06c01fbbea24609200000005b9014d473db111d144f304ea29e30388745fb83502dec1289bf2cfcba6969e3400000001d87776f0b7da581d2b6c104eb316401f72761c40374847be7de777967cb4e9a3c5b145e566f3347d604faf49af28703bd41e2655eef8d1d8f660717cee58c5a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b0000000002000000000010660000000100002000000070511c872507e9581002366d2e115d0baf8e3083da7142e0ee6051d727ac1a5d000000000e8000000002000020000000041a3a89db3668e6f5adb0363279998ce9a3027a07540c64ed85004d580f5c2490000000a643583aea1c1c449a7e45a42a844d69ec482f5dc1486deb144acd0baa9eed0a4e3ee942171d2540a9879c99a602ff084592d05d3a74867071955766cea6a3abd845b8c2b6805ee36630310cd1d7b683fcb0acd504165ae8377fdbbb7f9b788b249aefd30a09c438483f4abb981ba1d2bbfc72fad884bceba4718da73a948db6f2f22ed907a25e00b8818353106c87084000000039b5a6da3bb6c77e7671c3e910a3b0479ee95e5357c138e227ed59548a3ac0cb755a6418418e9bdf41dbf0d722453ddd66811c21de70a3d7f064c9025d22fcc2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B1F9B81-3E9C-11EF-9297-6205450442D7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426764595" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ed4f6aa9d2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1816 1720 iexplore.exe 30 PID 1720 wrote to memory of 1816 1720 iexplore.exe 30 PID 1720 wrote to memory of 1816 1720 iexplore.exe 30 PID 1720 wrote to memory of 1816 1720 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\341a45bd3675fab0753c30c5783b57c0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564b141f87e350c8d18c2d76e7db7737f
SHA1cbd3d244ce5c7543064b004c2b8897a1a7b584b1
SHA256ac9b3fd8279152b30f4306b26aea1081e41e12112b7d4e1cc9cd48669310b7b2
SHA512baf3554930e489b15771341caeea0bdee003417b34b5a8d57df98e1e7d28a9e89d81b4a887e7d5f180a7983a2ca737ba0cdb89485aec7fb6afc9d093ffa7012b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55472366e007755e0674e99b22ab0cd1d
SHA14902cb1f0e851aa36e4acfd854c2be4259df7131
SHA2562d639a6433328943e38ee116df79d32839a01ea2faea8b287c9bea3a6fedfe82
SHA512343230e8f7bd9321b8bb10341b669e50947823034f2d3866aa4ea8c4bce1fad83143e0cc64a7c2a944079803426139f1c04679d9ae191f0397fa7635d0ffed79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d99ac8bc242cffd2f219fd4c2ec6b33a
SHA1cd4d362ae087b34aa644d685888aa09020d0f595
SHA256923bc62029abf275c4103fc6e8ebaca6dfb24a5ab0d7f85eba73c9a81004f233
SHA512587421d502c91df0f8e874928cf809a81031581584cbe825ac84ce16f2597339b90fc97764f6432faa822dcbc29262b898e2d2152582317eba54f19b57e0d6d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4f19da50d07c6a489c90e08110c8a0b
SHA1060dc75008f956b7b1d9ff71ca54643717165c8d
SHA25668cac9d58d2bd3079b7dfd9348ae9719e60debf3aeef280c8cd6f8669cbb7998
SHA5127f4ad2cf05babaf5b05438405644a15599f1173306f494f64b2aa07725fd9e90ad323e36fd2308221c5ff04b45e0a867a34e5c509dd7cb42a94cbf4e54e97218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c1ed9146575b87ab92937926a981822
SHA18ae09a9bb597be297469e72c2be476f33a007cf0
SHA25622ba55e59d7e5627b512385133c45e60cd660bdcec30671534188346416e7411
SHA512f728e7e5c2d6561c521c152b984b9399d529369b72708e7aaa32277fb08f4158d30604b05693fbc48506c7c9603239381c0da94c70f8b1715ccdf30f3f9a609d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555ea79cea10d1d98e957e3416b9bec8e
SHA156b9f6b762865b655241df52aeaabcbebe14ed97
SHA256524773e016a2bc3ea5500366a97150afbddd6fbbe6cfa4f1bafdb2bf87e2025f
SHA5129ba92bc974225e2f5a9ef6db607cee73d722a35be1621702b456a29e3622a2cbfd6a0cc2287704bb35afadec13f3bc016692bd7f1981c9601824f2357e23ea1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552b3641f8c1541ed6032e66ff67b15db
SHA15c2b84fdb0782763e35da7c0e930a1467f97b852
SHA25689daa8238cb973950ef2678a17d896fbc074a8308ea9f97e4cc57478bccb897c
SHA5127eb0f8bd49dbf462303adf75ab06fe1102f0b7fffd0d793b218f409554c8f1cd59e767865665ea088ed88b767039f8dfcb305c1de7a8e3ff7d74cd26ebde282a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc61f207a206ac885c6ed8b98c7a7983
SHA1f645dd52dadb37ff0b70e0f12542b7c590c8de8a
SHA25622ad291702add09c294aee22f2131ce2cb22dbe3052f73b36f4e75f959d9319b
SHA512e8df8b1da1e09f79758926b6fd7dd9a4772762a0355b6547d648470226f1c76d5eb5defa904a3c8021f2e1ccecc8e6ecacf23e424a381ecb1b3f23e72422ecc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544e57f3eb62d2619a46325dd095850f0
SHA19986aa2c55b243ccb3a5ef0b8af81435efdbc0a0
SHA256600c4edcaaccde31e556b1affa442e370f3bab750e7e99b2c4684aa3b5f40ec8
SHA512fd4a3c7cd01e0e5d7a0052c0ce9f10b897270eb5530b97e9006c519d9365f073fe2fc448a3e70ad036f6582cc57f4e39e62762db3785dfca75e677040444d06d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fbc2a586fbb28cdf05bced098eb60b6
SHA159c5eea6e87cfc8593453076b5eb9470f2c763b8
SHA2560e327a87a39629553718b09e9294fcfa6ee7c98979e3564ca9f9fc9592a1a998
SHA5124a603f9ee2fba4523559d4dcd021d15696bcf2143637e44ceb39d56932b2b1212052f26a2495cd095d3b401892354b03214cf23b13160aa524c9e4e790c1078d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58734fae4731a4c1f0788e679601f1365
SHA1a8a28679afc0548397719bd8c0e8a06a6984f9e2
SHA2560c1f048366a9c3de5826906b9769d1094b85b83f8ab5fe80e05886825215a3a4
SHA512b24f975ef92a4c4e820154c51aa9b58cf1e52617dc31532f3bc180f516dfc563fdc58752b270bf873686902d7ac4bf5ef605eb1e6fe1234dd92f2e6460ef8bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfda8287eaed834f2d87251db89f89ae
SHA14cc06a1e1a087016b21c8e228455314e88e61bb6
SHA256bb30f950beaa5ad7326abe3e68c1223231ff6ee9c95fa7d07e1639b569ad4d10
SHA5121d1399dbd3b71af38ea2dd9e7c98e7a43a8111038ac8fd397526af2aa41f72fccfd2ec7e771b3e6cc45a41df7fb1f2e1bbb8ce305bef93449c505ff069de2a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5838bc2a57f622bd73d320aa439f2f530
SHA18140684bb89e409d4110fd8fdf1886bc9c1338ed
SHA256e33d3095a67d61fef6921bfa1a9066cc733c29ef4ec2009c848fbd02f51d87f6
SHA512d63373b4d621103ee24b7e07b1b44566c196eb250e5a3f4a46dc09c45e08c469d2e3fc0874aeedb24693052dc75fcd6aa74b5741c0371032be6c381900b6dc24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51094c0665818c66ec81bfebaea157756
SHA15e7aa087d5fb5e4adaebe25098597e15c0ecd320
SHA2561d3d96f47c17f7f58d8ffd59a46f16aa9ae21032761a9f29a2b8eb22d89dad48
SHA512a350619e3ae4133063bdc10a090b4dd391c1d0ec9083c894071c952bfe7ce1f89d0f26b77adba8abefd214a1b6263e7677613c6a8e3b5a46c993bf5a0676b329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58555e89bd12673ae53f1dfe1bc17c424
SHA1e9a557195c4755c6ce226354bf3df6b379ef811f
SHA256e86b1c4c7c9828d7863a3c1965f9b545caebe68d0001b7db0967fe574428f0ce
SHA51251f387c6ee59acc118259d25deb5f33fce929de2f91a96e29dd5b6e5847cc4a8850c976aa319334ae5982073ae0e3d849c7bc88e75b6c54bec12851450196fa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51210fe8d2f7b8780062b893b4fcbe568
SHA18f6f33953bbd5558a309e7ff87ddbdf2d8fde7b5
SHA2562ef35b2f39b137b6c30e7e337235efa882b44bfdaa061ab40a8a32d80f55c912
SHA51256f9a2978acf28d3fdbf2fb033f8b1a52c4be91180ab4ebbfc65a492cd4e2579212d805948741145abe82a838544c68986e1dc0c594e5c81217a1e8b429965f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8151d1218ab4fac876c98186601f5da
SHA125016f6dbec4839420c81ad443eab961d10c24ca
SHA2562bdd3822618b1690bfb74ecac3f4889faec263dd0f10b6d5c2c05486502da7c1
SHA5121b41b458172ce1f137415be6a558dca5bedfbd607cb0388454b4ceaadf8bfd7fd6e01e8088b15c79c055cb0c4d5dba49aa862ef6cbd43fad4116d731d3985388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9c65581b78767ee5f7568a2caca6ec2
SHA10a60dc7a7879433d3dceaa67343945401e714178
SHA256089208a43b6900cddb172596de534d8a5c8d7479396775046c970d3caf3d54f5
SHA51245308e6efb328e2ed24714cf6ed5887e5372390a6aaff374d57c40fc890e443e62cbd231bfde7504b53326b71bdb9fa1f27ba918e0a3716f2bd8a33e48b2135d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5250b25cbe423e56a23d11fc8469d17f5
SHA10b0659079f0a5c655ba2fa294f2fcfb1639b7d4e
SHA2561be8a5950e68ed1c8a912cbb32c56525314d8b8c4582e91b270ded38a85858a6
SHA512edbec1f64d40184a41d7ed3e2b0e51c3cbdd523ef3754cb7bc0bfe621cafef8bf15bcdcdee670baae6122eca7874d58e4cb9ecbfb72e49018398dd9826081b40
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b