Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
fd84db9cfe11c64b154c8f964aa4718c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fd84db9cfe11c64b154c8f964aa4718c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd84db9cfe11c64b154c8f964aa4718c_JaffaCakes118.html
-
Size
127KB
-
MD5
fd84db9cfe11c64b154c8f964aa4718c
-
SHA1
d893c88ffd8358c756d0db148f1f7c916a009424
-
SHA256
62f447eeec891180a8274028519c706472604a19937684681cdbd65657c531ba
-
SHA512
a8265662163bc33001a853cd9946344b2ce67bb18a3bb2a54f556291e9ed2ecbb789bc5aeade3fe8b82fb01c6c0c173d2aab65749a7947aa00655087e2e3f45c
-
SSDEEP
1536:hr2IabjmsCCPtGyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:hSpn1oyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433734568" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6C86971-7E00-11EF-9257-F6C828CC4EA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000065146e02efe1c79395808fb3e0d50b3cd2be12427f126550e8b975577a69418b000000000e80000000020000200000003ac569fd8024eb825d20b988ecd1105c3b8e8d3ce8bf4da74d49e61d4df827752000000064bb690285393a674dc63cd3156ac2ec2bfad5dea947e93bfaa7265bfd12eb1c40000000e734797ab784294e4b07ed00d89984f9c3ea429ba5d9f869c581b8351ddb27b746573ebc2d368b5c1b568544e7b8b261bf3044520a585839691a28a3713815e3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2084c38c0d12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3004 iexplore.exe 3004 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2384 3004 iexplore.exe 30 PID 3004 wrote to memory of 2384 3004 iexplore.exe 30 PID 3004 wrote to memory of 2384 3004 iexplore.exe 30 PID 3004 wrote to memory of 2384 3004 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd84db9cfe11c64b154c8f964aa4718c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de65942d262560b9a16d60ce922950eb
SHA1999526eb36626e8ac47c53ab3e0e1232c33e1c81
SHA25651cb53eb18ff9971510166cbf17ed9763f803007c9e1d5d1be9370421eb3e3a2
SHA5123d9ad3131a45ebb86a55e10e44e0c49f8accff6c232dedccdf79fae09a4be2a49ce02fb0f033fa7f38ea156c123f3df5bc54d45913a1008d15f6b9bd4b687707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a223d570a396b630459b8c9eb7da411
SHA1335ea0790ea9e582b63170ca2c9ae80d815efc98
SHA25625153ebf15be0110c31da8364069582f634f8ab99fb658aba0013d8ebd39e54d
SHA512aa7fac730e35543ebb46409ee8b683e6ad3e9e13562fe7dbe67b2b0e07734ae4a450af8fd09b955cb1657edd6aedabccdaf82431c936962ef587a2a5fdaa3013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5320a7291bea38d11a180ae358256b0d9
SHA1133d3b1c69bffc23551425be13a6296102761633
SHA2567c70513d6449b0561a645824f5faa5097ad9ed4c375a72696ecbf997af007068
SHA512c359d9e43117b3f93c5a9c53e3851512c81b84053b69644d4213baee3b01deb5d2ba8488af935af0780ce9974d2ad935ee786dfc2a414096bf3736b578df96b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a49515e18022877ce20115bccfc0fe1
SHA13fdc20cd06ff7b9522f3c08e57c54cc18d705b6e
SHA256d0ca2e52e137542469609f3156a4f4f1870ed3aab3354686165ad738ef095339
SHA5126fabd27189a49935232567703d42429065c01f78be12f5b4739d0147c779f2a323fb6394b5b0cb65d77966759f26a36269363633b00c1dd814771e11942ec9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e19c43544829c60f4328c8c1303b56bd
SHA13ad994967a5f90ea6d611e6eca58b4d54e0d03b2
SHA256364ed25c24463eb5b18578e4334f741e3c9786c3ea8484930678b772a4b8bcb5
SHA512720ed640543914d4326b85f8ac33cee7cc5ef65048f58a0efd9a15d70f500cbc0fd41b8fa4566a5e0ae1479e73c8f5564d45b14a95eb14ad4a69e0425112c31e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1693a82313994a5b17dce94a9abb62e
SHA1559eb3fbaaaf93b420b2ec5c6c2892d0b05cbb00
SHA256ddcf9121e9d62b9793a26c334cc0faa8d6da8011d8159068e2d27171e480e1e0
SHA5120dce58168821643ca4d12601400418b8051f7c766c0df78a75c923edf0eef7d72d5fa09f9a3eee8e1deb1164e1f58ca9502ca8cea90d9593b11f5031dc483610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b447c4b7b610d461da736d38fd4edd0
SHA1c71fa1e98b20f3c47b34c3122b4eadb7bd8034a6
SHA256f245bd95d1a4ad0e67c75d7652a2df9d933380c9879e0cc4235b13ae431e6622
SHA5129474154281f552ac49f7d92353393ee798e88a8c6ceb481b8c173160e64a26e471b2a9d6cbeb3e0671a26ace18651e65d1546413f2cfe0f3761ad0077a091fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da3392b7fa8cc5faa4b22ef4d88c50a1
SHA1bce660dcdc14ef0eb727fe0f756834617724e27b
SHA256dce2368a1b0db244f178227bef521d6fde614369e2f4a4628fd94c47e13e8c43
SHA512c1ff68ee9aa856ddbfabbc32ff3e4666a635157d6f6740393f168d91a5bbb071f18cb76b5714bb5626222f30ac4fd532663a6cf3fb0f6fcb2ff5199cff01bd77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d020eb6bdc557142d0f6d89090008e07
SHA1201aa80ccbedc0911db5970a492e56dc90f445f9
SHA2568b3555cb1d5bcd86a7a07e1ddc0d0c5146f67390737f0c91f202bcd975adb9d6
SHA5128311e2329eb838c5346b6c5f71c3fe81199b5d2491c11b52615fe7da1264d786eb4ed5788ee5422f503debefa940db2e4600b294d10be8b85117ca7b25a5b3ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a6415ce63027b3e87d96999c802381
SHA1d6b4e2674d03c227d885444797df7341cfe3ac1a
SHA25648750f317490c3ac5eb13e772aace168a7cb263bdd1aee8ff82f9c894e319431
SHA512a69e15d0016aaf05a193673f2af07d70e2eb248c54df242bf975c5c58502618b83387878b9b61e4add47c4d73179cc3d8a7d95743d49295c4e34ee4339740534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53170d958b41026096171eb6e60200ef3
SHA11effbcd47cc3b8615b9414ad669842c096e567a4
SHA2563d00131dbc1879304a4a4acc5dedb3b0bf31c44dce7078acbb1d5849d7e3c2b2
SHA5124e9d05bc2326e2853f04086a5c8e6201e13f6c570b96854215ccfdb5311236cfcf5d813682783d2a6d1cae975508f0eb72f08298205203e833e029f7370c807b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b164adf533ea07e7762279dabeb60e
SHA1d94b6d8fc126faf36be65c6c854666eb59fe6bb4
SHA256d8bd964baae37fa90b32207f1573eb889cb0c6ed2edddde49d2b847328dc9781
SHA5122e51a622039872a6c2f1fa5a1c1f36205a72954a56c3920f1abba5b9af389ba86ddaa943d3c7d85fb0041b8021c28e8e9a2d4bfe2c7dc54fd7a1d0e83701e877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1d90d91c2cd28c83b0a31b03851ad10
SHA19e6a7a5dad6a22bfc891070380ed3d133feb0726
SHA2569df2042a5d3d0c4131fe863a0cefeedf36ec81a79a31e8623800da86e833bb28
SHA512d6a12a512d83a1fd44ae14128d823faa659a9f7c7e1a4a6a866dee5b3fbbe0ac8d580dd51f22efc22760685e298c4792916f3c3054fc86c8d74cd900a098dab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576461ddcd77d3aaf97716a45fb253a4d
SHA15425ffa7cffeb712bced6afe04cca963bcd731d8
SHA25602f2af1847dbbb398d7b48faebcd57871b6fc2088cfde826d9e7c19eac89cd96
SHA512ff8952f6234b58bf3232dc6221ea48a8503e0262b5db1f87acd69c68e2a8d996b736bed6dc3fe50a70e72f7ffe3c93631ee5bf1da149b561f281fab931a4334e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0989fc4d24659e8c3423bf8847ba9be
SHA1dd0ba4f9449d5fc901c2eaaf0dcbebf8c433ac8b
SHA256c2a641c686e10fb537040e6549c9188237a4c13fe30c762cd0a95f0cda2f15a5
SHA512bec113b27efcf1042093fbee1399a4e48e1488974d7609d4c427fe5c47c34ae42e21cc72d09240f7dacf77ec5a39bbb9527d09b4d2d2d6bbf43f9155989fa88b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52157551a882b2c1753cfcb72a03933ed
SHA12c2aec433bca419f55a33122e52365ff21a5928c
SHA2566c4c5b2f920681f80576654b010080bbe8c8833b917995e69987ba638365cc49
SHA512f042316120ada8b49a7ab2925a1cd7714c2864672102bd3c994f47b96359f2f2f73b2d0bd87b5b64fb237ab2e467869a51ba8ac35ed65be8f2c489eddafe7c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502f922e7cec7155e19f60300a2cf74ce
SHA138c7a6cef4ae0ded425e8f08a48ffcb4d42c3a90
SHA2563d1290b7f35deffa1a999623b2cf6bfcdfdbd77bea7cff22e63e8d3593c905d0
SHA512f06d344c0f2ad610888aab3866c7da24f6b4232444242a088eccf455b901036f4bc11a8cda80cc94497fe55001b6ca4cb95feed6a101f5ec44f863e022f868b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51275a883abcaab2848b9a05fb9b0d584
SHA16a9994028db89a4eb8a24fa4c1f9c2609e74eac2
SHA256523651a253ae50376a5ecb34ce95a106c2fefdda534331e9ae5d603aa888f407
SHA51241e3dd2e86f23df4affd01758f075231a9b4419482864536f36727b456fcb3aafccc024d78add6f8642b85c8706e45c67964cd370ec88148bca31efd9f66c512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd7bbcfcdbc136537ab9de0719e14ba0
SHA17f43a72f709ded67d57acc822da8905c336d22e4
SHA25613c784f59341e254530e4a6ca4974ecd96f5a49f6255eed6560673c6073dccac
SHA512420fb8df29521f0325fb9facd0d839ade19436880996d1db3114d8e43f86b6c3beb43da4affbc0829f3e32eaf2ee92d0cdf749c7fc66321828caa794f6eb2fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520659973f0b71fb053982cd7508fbfc3
SHA15b6da2da7c515909ec6e6a9a5e731fe89bbe17ce
SHA256a102a117ee1e8dfa33cf6b10e980a69cb8d5b0547196d01c620cea64d3dc68f1
SHA5124fd81ca941df0565155129877a2c6f457c00f9ddf993e13ff8121bceea1d60d656b21be1852500304179b791a6f4a31331bd289c3485667aa8c69f8fb40a2714
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b