Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
69f35da0e767a9bb0b212d942d460a1a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
69f35da0e767a9bb0b212d942d460a1a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
69f35da0e767a9bb0b212d942d460a1a_JaffaCakes118.html
-
Size
94B
-
MD5
69f35da0e767a9bb0b212d942d460a1a
-
SHA1
6ae6fcb4e1bd93c4b35d5f4ac84fce084f3d33bf
-
SHA256
6460c800e7dd9dca697f55a478ef3e80f47c4682116df4ef53b953411682da76
-
SHA512
0e56eed700a7770bb2961d15174341195304b4437fad2f1033c4fad56d40c1323acd57cfe71b892d104626556cd0f2f5a33104063ce8904085938dd5293c10c9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E284FE91-4965-11EF-9BC7-EEF6AC92610E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a034edb672ddda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000001ef000868cd79dd156aedb3a6b3c7dddbaaa3c390255694a28f9362e1f89d609000000000e8000000002000020000000c2f2eecc1b60f14dfb5abbbabf99d27ea0aa04e45e893075d922edeef8b06f6c20000000daa790e71bba5fac484475a5b93d382691b963336b38235712f36070717c5f5c40000000f3b41deb75ff434a105e4e6109aa384e6968ead36e9f98ec337504b47c16f2b630c164bf38f4928b1958255ff850fcf51a84ba039ca1adf39e0090c263d2e519 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000005205b765ca60726c451ca97582c703104b73ba27a160221ef9314702634ff68c000000000e8000000002000020000000209fa3cfed9ffcfa0c29183936b01bce5cfc03cba5d79972da212de9174cd1c99000000017d526ccb34bc26ce3426785b7551b49c84a88b338a3baaf208c6c6f91b54a43b947306ab6d17e60a9319feae711feece86a2102b7f04f46ede81b885bcab4a03979d661db729f797fa6e5d93ff2414fbb0db05d062c0a0294b74724a63792ff6fc17f5c794e174b152c8442e69148e23e42dfe5dbaa3941af3403b1ac91dbe6e93a42b6e7dab94a70d240594868f2d8400000003f288264ef4a49c1574c2cd718a6855a9252ea030359da972c88d7f6ba33ad967b2f998fea4a37f34caec0d394840e16b3e6d5572384a1f8af168427d20a9c02 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427950609" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2064 iexplore.exe 2064 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2132 2064 iexplore.exe 30 PID 2064 wrote to memory of 2132 2064 iexplore.exe 30 PID 2064 wrote to memory of 2132 2064 iexplore.exe 30 PID 2064 wrote to memory of 2132 2064 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69f35da0e767a9bb0b212d942d460a1a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec17040cd6fc5fdfc528ad0ad046378b
SHA1cad8a78148cd283afcc8834d111e7a0bf94e4943
SHA256e5425bebb8fc7abdf5f345026047ae1cae71ec86c129ba2cfaa6c3204f2208eb
SHA5125320db39794383566d8b2c216e3d1eadbb9ed58e75110b6a277edc6f04b25035b64e2e066b17751097b0b6543bb52fba76da405806bcaea2a9918ea21faba36a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bed012f7d4490b4f1dabd77a887d0cc0
SHA1fea33b2f65455ca5ccc992114993f8fa47bb5109
SHA256b95615756d664230f7bbbb0e325eae22c66a875bb21a13b6594e9cdc97364d6d
SHA5129d6461250d926741af1d145e99560318b761f4df1ae7e666e7c64d27f19d1309dbd2e68d7141f89e7ef48e21c056cdf38ba877e8edfcb1ebbe08591569262e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b2e4873b2e7de9aadf2af4a24873dd4
SHA13aa3ad16b89703319c069282926eda6d2f178d5c
SHA256f41a3c4b5a770d755922c1a77f948b52e531347500f2605754ac82c40400e9c6
SHA51226a8847f932b6f4149c9d7fd555b1b8e32b344db3a4f7b06ff255d03c307aa7bb4fd4a52fea29daa5c951c4286f0251950be8084651a225495de55883ad50e94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555f619179fb513f8da9aac915f795bf7
SHA1666be8ac6aadb09200dcd91655bb7a17f4810dfd
SHA2562f5409805f996e93852ca80ce283ffec7c54e69595e40f534fe4ef564d4a6f26
SHA5127f40cbf87b6e63620079ae9507195df31d305192550cc2f8de3bd293e6718c4dc739ea80e7ff6c6b6e30e6af9fc7236735b5696b1109e578a4104df68a798aa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530424673e84ae8652435363e891c72fe
SHA1aae045a0a9384552b352a55b17021e8328ce1578
SHA25627201280046b3a5e222a059dec57b1c26081ee983b57012f9200d8a9ba27b864
SHA512858eaf3844da24b9de2769bc7bf9a3f7a6e3c971b46e72feaff5863537937ad4dcccfa168c7d7ed019769e5f5a8b5e986218915db9a7a0da638c35f8bd226fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a15ff5c19de8dff03cba03d44569b4
SHA137924b9519a9ffe1e9163b2fdcda7e533341eb90
SHA256db90fd7d5562f019b9b182629bc3a121496e6b79f0a03e3eb64060dfd87aaa61
SHA51208812bdeeaacfb553ab89b732885f3f5e09179e79845b24984806067ee06a39b306b495c23b723b4c19e059843cb79e9109c5658863f1ab1e79f41d099c6333c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519caed09b8157ea235f22c5f6545f99b
SHA1277ca54a01191aa1bdf5736eaa7c7a27dc80e3fc
SHA256fb4c04e63ecb51d43c76a1a48f1db3044ea6672b64bc2977f44b81ee862e0c42
SHA51207c614d118f6184ad8488b87471cdb1b1162eed0bfbe581adb00ff3a43037b5e3b125b5295ddf246776957a5a4ee042c96db65d60c65cdeef2e69ad878f3128e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55277447365b8bdc2a7c7bb88b2986cf2
SHA107191552ae260d404500c81131f946b2a86df800
SHA2567ca6539a212787bc2d53a942e67d91fddfc31d9a8bbd3863ad4b48d39301f690
SHA5129ecdbb1e24b3fc45e982edb6646fb6f19d2979cb56c809db58cec606d3d8015b8e7aec7a015b8a143b7c1a6e48344dc7c0a091257c5c0776988ffbdcddc6709e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aed95d9abd8f41c0a1a555c1491125bb
SHA1297d10b3e5bb83ab1de7ee332a1c1bfaa3044801
SHA2561519c1cb0073321a14e73a33187ab4196a255e8c14b8ce3060c082cd50f61c7f
SHA512df37f9f2ea1e4b4e18eb9104f65280f53c6e4524d3ede7650aa1cadeebe69022e7569b1deedc62f5d88b7c90d0d55bbcef0999cd0d77c9b333ea9476e175267c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5102652121e02d261033d35bbda054615
SHA11fbd06a6959adf564e4c6ea687dd62ad596190fa
SHA2561193104df73b12ff28045f87c56b98f46caf81a33fb270fefa043cb410a0e25e
SHA51293440a538f1082e6472159bed4fa2f147ddd6f22302efa9942a9f7b24f7f6aaeae2aefa87a087a56a9b0fcc29278109950b4df26cbc59273cb2f87cda88f8556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8cd06ffa71698311c34863bed7797b9
SHA1077e05617ed4534aa44b5ca5e4ee8e520def2889
SHA256e21dda60a9fd066bb4fdaccb53160bd037c57f2c261419f756782ac154727290
SHA51296ad644984b0e0715ed8349b65acd73b3a8f4e3f30f5cc0d94d64c248eead239176b2655662f82b99bcf988f9399a567bb0fe661415d70e49fa1e58c4ccbf8a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c14f47e61e82eb86f01b63240ef25a9f
SHA166cb9348d899f38a7b8350299f6e03553302ac88
SHA256bb900eee853e6fc7c4cb9581e2625361c7ecee15080521c1bedca91b384b2856
SHA51288d7a8210a14cbcc4687ab3c29c29ede1e554534d334f45c61141d01e51bad3feec61ae5b0c0f1afd72e2898dd83258d9b183730dae3e7cee2024139380afc03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57072d6cf4bf5b85b70f8b990adcc0776
SHA1b2ae4d2366c5d22160ce4c33abf7c42d7bbbcf94
SHA256426a3d5f117e675c34971888b9fbbbd0876707b0aff8a91863216a242b995a30
SHA5128eb3a6cefed74de9907c9188ec6a02fb09e0f6c30012d78d417175a441e755bcf1d01c91f0fdb71879615c6ddbfecd665871c55e00539d26f69067b65b38877d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547d5374f85766e0e84e5cb8b803d5e5c
SHA1bccdc2efbe20b6931d362472c60d9ca6a1d06dda
SHA256e0377f74e68e1088339199d701c873cf76b7eb156ef0ddf09df1e266cb96bfd7
SHA5122e4ff94c7aa33b877a5d4798a93ed0d70f5eb30f078560b3d1ffd8ad62f60313a7a834a2f079ea722d37fa0ab6c580848aa473d695f1efc209db5fcfb4eb7b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531ba4cf5603ba9a90b3a314994dc6803
SHA1502d39d85567fd1eba6a53c9fcb2491a45486a8e
SHA2561081885154e0efb9fc437048c57541efa56559f164c810254dd1669a9e0de83e
SHA51200f02fe4beb8cc83b0b9c93194d975e6f651d0408c864c41334fe317e51908cde34161493577768f277e125ae3dd908b23aec4a3b91afb285b266f3ca3071d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e03374f09bca6d579c21127174670f68
SHA12a829784455cb59552803a411e50b627af46dc81
SHA25609f4041ec039f8a5cfb6adeb931438a81ab150103447a2bb9237461689cd9f5e
SHA51279ef0b87e27456887260a1e21c46119bc4704173ef9dc4ffb7ca5ddbb1f184ad89409aae508aec4e299a3a5cdc61d33853f43a27b6dc66e9f96380219b2555ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ed5e9548815e5828e90631ca30849a7
SHA13c5224615cadd63e8d4068e6e5577e770bb6f647
SHA25610dfc19fefee679e6827cd838db88f4c36390b0ddfe44d73eca330cc45934497
SHA512b54dc94f440a509c73793e42a93d720cfbab43763fbe8b3018b21c15ffd3703b71189bae0994de22d547459458422b8ffc555c7d56b556f53e407e31676f9d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6790b7a84bcd0be6e96a7febd43e355
SHA1093b3cc280d0d7f21a9d1bd3716e15ba0036a58a
SHA256e6c801467deabc567bc25a5d3146bc4e0b009d00970de1906ae814a69cc04e1c
SHA512dcd5ae8eabdd0ec188f8046a8dcee7d0d1ef8252ac8b0d630fbe5e4283767edb17f3e92f6217206c5c24359e0842b9b87a460e3eaba509b90ae322993cf5da5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551f55128a53f24443103917eb0b46c61
SHA1d3de67dc3f7d7df094cde7f18da6393f96876276
SHA256c7aa98c17896ba8241364e8442df1cf98bf5940d51adc32cac3bf6b21febfc39
SHA51243d7cf10b2894aef1455cfde559913047c8a9415a75a8b929188a92812e34caa36e467777475194f980f0f9ee0a89448fb0468c7380aa63b8a5e0b66a6357906
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b