Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 17:38
Static task
static1
Behavioral task
behavioral1
Sample
d4e6da7e99b9d1872a12567cd5a05ce0_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d4e6da7e99b9d1872a12567cd5a05ce0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4e6da7e99b9d1872a12567cd5a05ce0_JaffaCakes118.html
-
Size
94KB
-
MD5
d4e6da7e99b9d1872a12567cd5a05ce0
-
SHA1
9f9b49bdfa50797c181adf354b39e02dbb9138e0
-
SHA256
3ec003fa1fe621a2fd2a702abe470372615ec00f2514d01c69b100c187e44688
-
SHA512
b33c1b28e4a5a5b1db9a6f2e059e2005d171311aa7f8483f3e275458ec76976aca74e0e836a1be23c41498a8705bd18bd230e654005b8ea84aa1635b6b21ca35
-
SSDEEP
1536:WMLiN1f8QhkxKgfz4w4S47LAN1hFLRAICKBZ5ygBdkrY8mgHC+qpEyW:WAiM15BdkrY8mgHC+qpEyW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e6c6131602db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{392323E1-6E09-11EF-8CC8-424588269AE0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000063756c51f62c077f1b790df7a2a49406a76b24b251ebac4f301c62c0cfdf4d03000000000e8000000002000020000000b3d16a9df7fb2dc3fe94d26ea50358fad8ecccdff6d1b5c503d6fd462b1b3d44200000005f30b60e58bb4d388668658431641f50ed67d48f4c9929508129f9ef53ea120240000000ee5169225c84753d8bba5ba568f21ac021b99cd326665fd208d05deed6cd035e603a1ce2b54c04cbb77f0e48a7c97bcbf26e147917942401fd58dc600cb3c3ef iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431979009" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2840 3024 iexplore.exe 30 PID 3024 wrote to memory of 2840 3024 iexplore.exe 30 PID 3024 wrote to memory of 2840 3024 iexplore.exe 30 PID 3024 wrote to memory of 2840 3024 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d4e6da7e99b9d1872a12567cd5a05ce0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6ba6989adf99de11dde28dfa87f422
SHA17b521f608327efbdaf31d851a57a956c7b7ad7cb
SHA25682c451f62e1f6f0013cc5542a6ba52873f8146a4eb27738325d18c510f391cde
SHA51275fd9517d7367653feaf62d342ed51c3b39d9c726690bf220d580f9ce3b95ea78c56ec1bf83a946ee9f5f52029a0e4b1b2c590edc59ffd00c02a68e72733e36d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cceb3c019a215637ce5e824141f25e7
SHA13eea9c97489ec5aaaeec7763553175728ce16045
SHA256345dd6a63fe504ca1608329990bb8bc42e4ec42ec577a2a20000c85c6ead1171
SHA512bdfb7238ed64d781ee4de48a4fc1f58a0e2a28a50fffc38f4bf599c83b40c477fe0426debdca6d57064cb400cd948a28670ba62d4a6abad536f898967b562ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb801683c8c60660bbb612e2e711524c
SHA1e73e40fe7fc479148036a9ffac946cb6bbf429a3
SHA2564d1100df4b332b72ae32520298a85bd03dd0caec57601750d4b29d53ff680d82
SHA512aad81e6343646b8f3868c493c83b25c230692fd96144d9bc6a78b2a2e1afdedb2cd3572d7ec11b26f898c9c649000cc6838614a95cb29efaabcab5517daa1ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5340574cc386b50c27c5a56cdcbc6d89c
SHA13c2ffb5632e92ede50c12b8a185f9e21addb7d22
SHA2568e73960b9faebf20614d6348430dc1698dba52c9296dd6db0901357b8bdf5d19
SHA5124e79c5292ae094d61a2397f30444dc6d7381cca8dd7f59dd64f8e036ea1495281f5ad48039fff26b05541dad7e7a5323fd71c18a8576a0e23c0a8eac9732a437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb5e6f9d432098a3a50083944a11f0d4
SHA1ade8e8c4dda63289522b4e08eb2c72ecf0d429a7
SHA256098943cfd7247113daa6648f95de89a8c6128f7c1dbd6b6366d3937ab5398143
SHA51297a0e233376a83454a4aebb459676726b0670818beb5c838e59e4fad46fb065f8049b0f82524088e3573040120e60adf798b53a01888dccba18ee4e6c71a9cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5798209dddad37119ead9c50722741fda
SHA16246b74a469f9b57783b54e4fc4f99941d7cf1dd
SHA25600b20cd3739880b48bd5fd0c12cc5d8b2c571dd6e332bc304de180e97c12cb08
SHA512319d6b14f70afe238e905ba216a2c7a8fdf1292b6f5080058f9d8321418def1b286ae2d694d20e19624ce3d629c8d04f2d2de009f589c37325c72b751f22bed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d629951332f4c8b279f770b82d8893ce
SHA13ab8c3d8b94a8760980a98cf1194412e5da2f54c
SHA25668003ac41fd774b436fcbf09e4a5f498e8e1059e2a3b61dcdfd70148564353d8
SHA512117093ac7fe8a02675c315599c6fe1e965f613981a1208e21340de1cc0138315d3945b9134faa1bb4f897e4840ff6b90968d69cd1f2547b4422a6a702d45af3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2aa17d93fbad5dddc7521a9906314b6
SHA15f38b4203a40e58bf37498ada5a00affde81db36
SHA256934cba9aaa211058892e281493abeb2d408ba6aa5e91ac5e78cc8526c3f69806
SHA512e09954d327ca067fbdcbd763f95b35e27fc3683e6dd198b6308b5f76f35d582851f08b229b33fd35e37a0c561ddd6971d7afc2515e1f9b894c48146cbfa415f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522a11b95e2cce9c68550d7e9c97ea7bb
SHA17bb49b7a3e06ac5dcae31ca0005fcad6c96fcb24
SHA2567a267ec4886282a0128eba84967de93bea7b21028698f0251f4bfe641bb3ddb9
SHA51223f8d0828e583fc86b89dcfd7c12ee6fc57bc4b742360b19c2b50eba6f82baaf3501abea3655a46e6d6dadf339fae574ed7f08aa7cb6b08f855e1bf32ae3a6f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bf5d0d870c8664dc0bda2e83c4e0b39
SHA1bc0166ab17252ae205f36db9be72faab12f8044b
SHA2560129698a4b27a028d6523abd7ab6919cf3eed99b2892a7416ad6db8d6bb55079
SHA512ded48bee3d948bc3ec889ffe75116baf04fd7187b1c85271eaf35581cba9943245c5c00ae9048c52e894caf8bff8d0a0b4f652a6ca6d6a5cda877b8aba38d837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cdb3ba0c3bc37aaa9d152581bc94ebc
SHA101b9df68814bddbd1fe9c26abc4891955d87d8a1
SHA2563224725dd864f1ff3f5a2d6ece5a533993f76103144453299718f01ec7dc47c0
SHA512f7e8454766369dda60f99e84ad95e9cf8898df394f487d89507b4113f5cfb22e9fe67fb384f225f7012f109e41c9bb1f25595cbb34de34f852d88e684b1e488c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca58b8f568411d2dc3e7ade029fbf922
SHA1d942eefe320ab31ab192feca91a6224ba1d76353
SHA256eae63a22c25db41a7fbf35d113f2f436f68ebed9dd106685db63065081945788
SHA512a83bc22921e826cfc07e205d99d7b9a27bfe37da17cef6b20e0c57303bfddc848a85685bcbf7e6d6de25ede9b52a96a5e283a0dbd883dae64784aaf2220cf6d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f82da392e1c726d338aed1311d6e2ba4
SHA1a8a95fa3b731fde51a6078c33405880530edc041
SHA25609e23cdf89d8a2779b8ec181e66c0c32fa9bdc702bc0db5a1037f0a8951e7e8a
SHA512ba9d6b38cd80cbf97a1ac3c457a6f292e2169b8a57ec920d8148f05fe580e75c27cd855c6b4354b9d0b75e4ec574939ada291ec856d41919693240584b851b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9b9c40ac8c17c13a5608a9e612ad28e
SHA1ba6010d8804aec4c34d0dda801f5939b82964d0d
SHA256a468c0d8b9629424d622d893673eab0a01dac1d460c172b86025fa9b70639483
SHA5120791a62610fa6ce69f281c4c1bf6880558a892515fedd1b8154a36b9e7dcf9802618f15d9ddcb51b215bd4df3b35cca3cbbbef2738e957f76f2c8eed322822fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5935cea3a600c878165d8ccc40ed7427e
SHA1334fd02de2b2f20191aee4dd8fdf10c59271bc62
SHA256d73b449dae88f3762d01e9219c95855df345f189b8c74d34d98efd67f291ae6c
SHA51281e1674f8a9d413da6c92f1b3708890b84ad3f0ad67fa7ddfbf62b9ea54bccce27d24013c2af7448c37bfa992390326424d0f26dc6936aacaeb5128aed10eaee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f99efe67603e9f579716333c13298c
SHA17f5b2f9aaa1f7c5830a26db879f8163d46a01404
SHA256be744299076932190b55609fd34f78cf48d4de1fe4941bab3f1ebe908aeac9e1
SHA51238fd92a2628bf3a3d5dc4a209eea0ba9872cafa54232aa1c92f600306278bf246d15aa0cd1fa3f9670abf4b53b4dc94d580f0313277227bafd12f9153f7866ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2d8d4de048e28508130c8ed0e0de245
SHA11301444f7d3982e127acd89a639df8b9ad0cfceb
SHA256819045e47d3430b74600b295e76ff86ce96147b38e8e73b692efc7b95d65226c
SHA512d10724ed750142e100d3df21d6bda4145bba543303e34750593410637d3eb27f1a48e12b20c85c5aae8f3aaee037102e102c31c69b8521820993f41da743abc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1b55785ec185fa30e99cdcbfdd15f0d
SHA1696b88618d7e66824a93f775629c2d210403c241
SHA256a49026fabfceb791d5171fb456b6718e8721fe472ad03e78b38dd18ed7466a96
SHA512bbab3521695d6a48ded5b3bedfd744d06afbd4310bfc8340b3ecf10f7774df8c23dcdb3aa582aaf85aa7e1f5320a916c0405070a256c5801e77fa1b3802d992a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bef6df6b5d265135ad7c58b7d5ece684
SHA19d1a88393cb710840f10079485f591fe15d6b3c5
SHA2561a7fda91e472905fe98677a25344436e30c76fb362107d737fc3115edea9e51f
SHA5124baa38a891c5ce76d025cb9ab3cb937297d414087b68cbad0aa94cbee50754c18916aead77f74983276430f5b2946f02b2e99a3f0adf1db56337717b47f02d2d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YW15VCHK\jquery[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b