Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 00:29
Static task
static1
Behavioral task
behavioral1
Sample
ff93d4b17c0424035e126dceb031b8eb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff93d4b17c0424035e126dceb031b8eb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff93d4b17c0424035e126dceb031b8eb_JaffaCakes118.html
-
Size
5KB
-
MD5
ff93d4b17c0424035e126dceb031b8eb
-
SHA1
e95f2a8094e6c446d7beaddf84408d7b16808185
-
SHA256
4ee42a1e56bc12dead511d1dd779bd4d52ff8d8c7925e8086d2ba90e99ec8817
-
SHA512
0cc0bcc2ca28ebe74815e28e7f431ba5f6e0487dfd0d0a4b2c2482763b8b48f20fef75945d1cc151a45b7b44da48d4d9d9b8f4ad9769bc4e6ea56e7b4809f661
-
SSDEEP
96:8iJYjaQtiEtmAR3CQue1wg95X+g7Gvf33TVewGVsuYQ2se+vqNCTI:8OYjaQ0EAAVz/5XP7G33he7PYxTgqNCM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433818059" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309f71f0cf12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B5AF111-7EC3-11EF-93F4-C28ADB222BBA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000e04cd040fc07a7e02f5038391d9d9ff0f5f2f862d7c2cd74b209404a186f7cf7000000000e800000000200002000000068803a742fa85b8844a1b67f6d49952046b15757ba552b3155467cbde4ce23ee20000000329ea579b4cf1e9e1af1d3c144ee8ef1797ad46160720df0c92ad99daa4f52eb40000000873f46d2b89d9fbb7bf9473a075281d94c7e522f513358b95bdc9bb60dceea3622f53b3efe9fec896608946c477a4754c7e17d8b902cb90561cc3b1a79740136 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1120 iexplore.exe 1120 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2584 1120 iexplore.exe 28 PID 1120 wrote to memory of 2584 1120 iexplore.exe 28 PID 1120 wrote to memory of 2584 1120 iexplore.exe 28 PID 1120 wrote to memory of 2584 1120 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff93d4b17c0424035e126dceb031b8eb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c407da851171d0309356c634fb31013d
SHA1e2544a8c8bbbd8e48f201b458e8e50f9c6cb1dc3
SHA2561652f28eeb9ea3432b0cc10f9d5d225ad6a43a0d3ec0650b6fffedc597436f70
SHA5125cc7dabc63e7caae39d5423fb2e307b614bcc6931a3f6d94cfa7102cd3941aa66173344e9fed284539f06121adc5d902bd8df6fdfb7bf977955540158ee370c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f601f1836dfefef0694d689b9974d2f7
SHA18bde2fd27fbcdc8d770256d4c98adab2d7426569
SHA256b5a46cb8f6dfb730b424650aa49c18ba97c7dbf9bc41ae508e61bae6d4352e48
SHA512cd5a9d74aa043c4e293f3e65d490f29bc2ae9e47254ab60c5b41a3babb6c8f9ac68fadbf8ea98aa99375b7fb0da48e6a3b5e7d0c373c565c4f9e58ac2511f7a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f6b4d99077584764d606d772e19ba5f
SHA14992a5a799bae8e609a8a68085b27e4f9ccc8ff3
SHA256f2da25839ad7a33f012c488352adae351b516713094b2a00d329a0f7f34423a5
SHA512068f758fdf878275bcfdbab2a1406601627db57bd3d917e266aeb1e1dafc627ac46f0d1bf29de68029d44f6742d8802912e38c9a5c98bbbf6a3170a1fea03c01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c38dce448c4886754ff62d88ce17a994
SHA1a8ecc62e57f2283aed0a26308f8eb806d41236d4
SHA256fd1b73f919bc6e290f21c8f5236ac63695145a3a2ce3a2225e5c1aeae46cbb99
SHA512bc5226a1505bcf4a927d1bb3dfce89378db44d4fc3390fc7c6e8e0685fb81891382bbc863178474304bb288a09821d40344193b4aa0e68bd13e66095193818c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ea2f8b2c2676db5657e7bbe756cc577
SHA18a17ccde5264a9913b22db86b3427c5e0e26d198
SHA256b65bbcc92f9474d4aab01fafc6f72e9badb4006a28e969f8c84fb01070c9a496
SHA512ebc90d4dc20f86bc092882c62df9f428b01c21cb1161f8677cbc587851d9985ebeba289a97e3a9a02e8ea54ce5495bf0ef255d3b4a75f886d8e6e9772ab8f2d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ad43f52d419f6ec719e26f8233ec91b
SHA1da6158426ad58ef43ca2f0bd8acbab42731af010
SHA2566578707a92d6be519eac7244cff966ce49262ca1cd021b6f724696fbc1fc7b2a
SHA512358ceed453cee356840f871bafa8fa719d7d94afa86fb2efe65054599d1ed6f544d66fb2bacd03d08bcc8bc77f2ec8bcd7b4d445444094773a6587a22ca3097d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5712bea0ec08d464c0feee5ce136aa43f
SHA1e5ad524d6cb607a98fa91898aa649addd641fa83
SHA2565603d9d3a4a130dd83d8983db3a3fd3986ffbf3264eccd3c9062fca446b0342d
SHA5129fa9a0697395ae8746aea2a514ed2141d6de3e5915058178e7eee07648483304916243ee75fe13587b3897b0662f37c14beeea34e6d10687647e678f221fd962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e87ddc00c75ed685ab56f3fb257cccf4
SHA1e989e118577c9977ef9365d61944fd15b28fe267
SHA25660ab918ae2ab082728ef4b873e11afb9397be9eea8391ee844acd5c4d7a3c93e
SHA5124415f9f08f7f260b12903663c2f6941ae18efd45952a54cdc708ee1a87454771e40bdbc997178f77e060eba74966a0f99c75dc53fb55a586df681b6b2480c6b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5011fa391b4bfdadc72039f25a3bf2f43
SHA126c558c0ff884c7f3bd095e10845e52f351c8d21
SHA256d8557fb812f9b2b208b1fab278b14b7e22a57213e7744f873c7b8dfed2341dbb
SHA5125779160b0673679302f8fa643fe2e96d41c79f2c3a93d11f9a58d6dd0e77d180162c32e2f3c4da348c8a52bed4d352c963bda28f3c3d209358618e078099abe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59308548a874147193bc991f30a3b7a6b
SHA15cc5d9710fa55ffc778e15047ed2ac662ba4b2ba
SHA256980f6f1991e7f8c81fbdd4fb050696531413cb6813c1799ae7478b043574fa6d
SHA512ef18332b5d952d18e61bc46b750adcc4287c5c0bdb36ecb2b0d7a74b2bc64e9cb3c01ded14561635aaf0ffaa564595cefd6116dcbca892b28bd799d770f9714b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f404acd7cbec30f58a7181e66e41d0
SHA13105033ce4e1a9f31498e38c7f3638592574818d
SHA25698cf3a8f34f00b53332b48113970ab1a6eb8651cdf8765dde884faf91ced6d52
SHA51230bdc9f6b9d984b36a417ebb831b4e36df5ceb972d159edbdf14edb3f248aaa434ca21f5e8c2626a4250d985ce013bf5deeda0c779e957689c4e1e4e55f0efc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519184daa3684fee816fd2bc56c87fefe
SHA120ebcb49d7d358e42b12a75d2b8295cc4e9667c9
SHA256ce36031256b45f3f0e9a84cdf25da79f59b0a472e82ac538f734396a1db5cc19
SHA51233696f74cb0f549645bd0e7bdc52a0316fc75dd887b2a55d05073932e292b62187c97b82d1e2454df92ed17889ea3a61f89d54dce2af06385f6ce8ac1e3a4627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cfdf4967b69642cdb09f6240caf73ca
SHA17797fbe1851d03e9d1ecbfc1171e57e6c8a7d26f
SHA2567696929a0e379bcb7ce3a4f8babc48cac8e9937a624aa90ecab4552646388341
SHA5129f80c469d941573823b21562d767cb4345317f405d08e1db82b231f0a43cb2ab6b426d441a79d07851eae4ba7c839330176ac2ff51fba1325e2856af6c434fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5467d5e7b33f60bfeeb4f5ef9b6b55a99
SHA17f29b21d3c3a5e549741eb877cd5a31df15defa5
SHA256cdc87487561713209ae4fc5b2db02e066d7a28c5440720042465d1fa169ccb1d
SHA5127b00454fab058414640ba6ebd990cb7dd0b8f1cb409f5519fc34faa94f5ee1e07c435eb7b1652cacd179ecd56c1f8e183f6cfca6fc75ab021e1d754b22c8f8ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5979c434a52c5a397cbbc28ad72c36529
SHA14900bed8e707e736c201e4052666e9f2361cfba4
SHA256e3ab34aab4616fa89b6fc4ba80bcc67ca1ec867945d9abf98351fe5549e41e28
SHA5120a6e0ea679dd5fec37bc8b913379b9427b92080968a176aa53e46516da5e3ce764fce6bb166cf1bc2b62dadccb793e878a84070253b0c60621d9845d58f2bf33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ff6c48663796e14b663985ed1296b21
SHA1b9b1458553e7b7e2102ed395a3d9aa70ceee5607
SHA256e386830fba57ecb7844a3a0ff32d50d386fdc958557e96664935abc55bdc48d5
SHA5129ba08904361fb1bf3688fbfa6d277ec793d3b9a0e2fc731e3ed4dbde0897c34545185a310852c5351b547f8d46747a83f82a6a07d07faeea9a4c571243126b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e2417a303478d6ae58c7201a01aedc6
SHA1c2fe4f5cef7c17957148b8ce3ade9f88348599ab
SHA256d0b63fb979ab3426316190765271ce96f00fcf682826dee4c7236f1a467ad884
SHA512dc44df0966d0293fc3e27629b07fce21dde4238499b6496ff938eea5ca95620c543f856b4794865509e9e6a1f86900e9727ce655b72907820ff459998a20cfc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584e8d6c4853b6be1d85058e97e410b92
SHA1b0f6f448d14640d8fa164db49467903f714cb2c2
SHA256cf8ae30b2164c5d419ae205b68d361aee3efba5b9b15590c186d125bce41a21f
SHA5120c8790f67bc63b24d56b62a5bcd49433a346aee3a2561374c7a4e43176391e769e7694360c7e513bd7ba6156e20e6a3539a078d9140f7477fc93a979e29ecf25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502294084cafe08911933159911c0ee7f
SHA15b2c26dbd122acca5e3c9ccc184d437ec77c6e59
SHA256ca0350d66a63281ddb974fa77779759534c42e06fa3080c2552c7b9fd6f9fd72
SHA512c170b0c48ca0e608ded40a4aa18de4904762fc03ecade02e9508da77fc7e77496921403ed7dc1eb01c76cffa86ebf227d262ab6a16c9549f6262801f2870576e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a81189cbff4013ab8009cb1435ddd781
SHA199fd5aedd77761a5efd625f5c6cbca34e3724537
SHA2562f008306f047ec1446a1945dce1d606220f8cc9efb8eec883d14298edfa97d96
SHA512b4c38ed8a3ddf384b81d615e242be38a6a5600a29e66d53d4ebc51c0588f4ce84b1606d36e4a44ac66fcc7d8cbb4aa53988c481254e938e7461ae970c0b3f1bb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b