Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
297ff17b6ccd4ab564efbcdc27a6fb85_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
297ff17b6ccd4ab564efbcdc27a6fb85_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
297ff17b6ccd4ab564efbcdc27a6fb85_JaffaCakes118.html
-
Size
53KB
-
MD5
297ff17b6ccd4ab564efbcdc27a6fb85
-
SHA1
0a8853bbc5e108bed56b99c708ee24d1bfe5f7ba
-
SHA256
b0e56f218012e4a3efb843baf5ccd6d5b0d4b426a14a6fe1a3e1e80611fa5d27
-
SHA512
9362a0d433c7b7b4509ad97c74dc54288d0da3658826005e93f21d620467e2e0b60f8c7f6ead11f7e5ea43c63c231f13ac5d5d237e78a3e61fff9fd2092f2353
-
SSDEEP
1536:CkgUiIakTqGivi+PyUgrunlY863Nj+q5VyvR0w2AzTICbbooB/t9M/dNwIUEDmDv:CkgUiIakTqGivi+PyUgrunlY863Nj+qU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809e5ebb391adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3F34A31-862C-11EF-B729-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000001e1694e06f61df84d00330c5f0f4413c200bd8e77203708ba4764bd59b35e6b000000000e8000000002000020000000729fb5c9df47a996bcfe1e7c1db4987f3e066578fdc22c224ef471dce18b07a820000000fe328fd82d37331717a6255049493d7ce5180b834a880dfd159e27d2b01c9b95400000003cb5c0287ee234d46ceff18fa84ddd303c8129b46990de8cda6c63d5faaa8d39c339f5270bad3c3af5a5f5c10cf1e239d56543ce24f1bf3ae22e7c8a71c258c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434633150" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 1044 2672 iexplore.exe 30 PID 2672 wrote to memory of 1044 2672 iexplore.exe 30 PID 2672 wrote to memory of 1044 2672 iexplore.exe 30 PID 2672 wrote to memory of 1044 2672 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\297ff17b6ccd4ab564efbcdc27a6fb85_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577030d5faa65a1283456074445daafec
SHA160d848e2054321fa839f670b4b2d46675e4e463f
SHA256adac17a338209e5240da00efd26cc7a86b75e6cd427b33fc046aca5cea672f9e
SHA5122767bdbb8c1df2934cc29f5f63147bc28b7acf89452a443a7d39203fafa04a80b8bbb3a6fdf179e3f83869c315098642c1bd837a48c21400be54d097765bc57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0309d0e0c2c20728c1b7f0b014510fb
SHA145c84a17b075b6da2a82011d5bfc35704c298f24
SHA256ac1a018d6a09e827a944bf7f3f7306aa720161b47e8d63cdda612967ccc73c82
SHA512fb63c6e372d3d8a646ec38b8b481f652bb321d4b077e695d77ab5bf53dd7d6241eb8a986df89678140563b5034bd07142b85c53fbd68368e31d0ce0e0db67b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b331bb163b7af9a6fa3611012967e240
SHA1f1156d49e62c58518b175c7c5f9594a61dd5038e
SHA256340600224fbd14690dfed9463fea598609b21ffdf05dd1f5d876f7b669f43bc8
SHA512b3dfea3c324eb304e148694a1290c1db8d17ecc63aee5824b103b02133cd62cb961e2cec657d0f82cf4faea462e06a956ab90c2ff579f62146b24b5ad9b64151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c40a31209c431922acc409aa86c845b
SHA183ca4b84fa1b8d8f45242b35b845e99af006d97d
SHA25689bb7eb1cdfa8b8889786f10273ea0f183ddf9c0ecf13ee516179909f2e2c3e7
SHA51205951e62da17bd099c6bb807f77281b527589bdadadda1d81383e45c395b2d1835813600c2a10b0e93e742e0d3a5b7ea8cb0a808a2f41a8e12071d75aa12857e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549d30da355eaea7e675d876de1efcaa8
SHA15a2cae4d2955fb8764d2eb7a5f20fccf61e0a88d
SHA256cda0dbf643797c927c7368689dc64c1c58d4acc81e3f5d5b2af8c778b2fcac5b
SHA5128848c16b4b8e65c23bfaaecb7897a78116fbcd3694770e6bccd48a500c21403bde694a898039e58321440ae357c5c06919383fa91976d514b0158181cbd5f914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad3b8e3ffbf8302d3cceb7f0aa1db88
SHA1d6db958c0933301d6fb527c0efb989655be9fa5c
SHA25629a13674ed7165b381a226b931071075b3389d876e5020b19f08b4dc2ad0ce18
SHA5128a4d1ec627618cec3cef9963de405e00c043f5f8c9d0b4837fc81ff6ac36f7c7df99cf6305e84c42290c1ae1624621f853a1b8f5a807cb433249e233bbb10b1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d938b122bf34342c7d57b6d8d61b546
SHA1fd90d47e3f0f8e7c5e85c46dd7154d83f58dfa89
SHA25680137109f83fe9a0e325644d19210d8a1301a7269f503599061c778b4b27fd3a
SHA5120c32e32279710237726b3c3364e8f1af6b267d721809d2307b2b5fa23e5a0f74c08364408f9f5d673b8a54547104bf2761c8bfc9efc0a64f77d0460e766481a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535250e9111d4606bc68e121e4378c997
SHA16de648ff8bdfcbc9293237f2ba8ba0b73fcab533
SHA2562537e0f50e7ad3de3f5f74ab89c30ba60d5e0f5b5def42d2df484d4b23eb23d6
SHA512373156123886cc8e03abfb0eb84ca5fc1c9b870072bbace1890ceba898c426e6e91db3f6aed4eb84e14a13ee0d9a36e3aa66b702a3f3a3452a394013a81c3425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505fdc07d70426e40cb9ac06318caea3e
SHA1dadb268ab7ad67ffb417312de11165f49e492725
SHA2562e98f8dbde99f4fae4b4570f05a9db874a2727a4e7ec5e7f8bed7535e5480dff
SHA512196871fda35a4f52775bcceddb9679448404998ed262f7e928b7429d751fb5a56219b5119869d9919c7d52f899a9592a1ddc718141a33522df5bac67c93a7fc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a435dab91c3738b92bb248c7ce57b814
SHA14ed39f4ab4538748dd56b72822231743d582d22c
SHA256b284dd915556325014110b705d81366a52a3ce4322c4419b001e91706a7f2b37
SHA512ca4da56a1b8e6412ff8867219101cee3878b017add7da9657f58674709f8eded9ba742ac94c90bca35d5edda0e8ce57095a51fd96a1d46eca7892316c6549f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bfe3399f2d6bac77afbfc27f204ec9d
SHA1114b5107340607217a8ed0d05c4a507d7c33e93c
SHA256a6a7de3df484a2a6343040030a8dc1976eed7ecfc7cfca6e6619cbb598482349
SHA5124d1a92bab4d47f92d784c5b2f301243f6446a3adac401f26e4258667190b6708656dfd8ee31c7ac67979c98ec30cd5787b0be3d4f903c56ddd7a6fd08d43bb65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b19a750505c78f062b31530ad7f7d4c
SHA168ce7e74458cc5af9ee2555dba2d12a929d3693c
SHA256d31a6e21477fa0b06f39e51b5b71dbc23b8f2e383a2f31d7ce704db33a36e935
SHA512a0ec1919b43e759c765f84a37dccfee5b21658cbcf47e7aa92f1125aaffd7e679e61d848076ea4f761c32fee5ff54954fea4e5f024232350759860944a1c8315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abe2740d75159d197a62f5e4f9c10a49
SHA1e9dfc7db7c9d64641517820a9fcbf31fa2f8c3ef
SHA256ca9ca46922929b5d7fcd960e641a7ad2816e037d0aed2a20267bedcacf180938
SHA512b6d910f84ca3d5072d9e57f0fbd8f8c2866d7ae684eb6b0d7a161fdfd9a8825e6c25f00584960e96f3d7881e1df3d4696231efaf18ca1cd371dac797b04d1c11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abaf5a5d0ea42bdecebc877e03a0c73e
SHA1bd30a8aed26f6f627a8d29edf1b187879577dea2
SHA2562bf61ff6552d7302ed752821bccc945172271e9d93f6972e3c18f09b92503eed
SHA5125759ed8a96c9cc65d3f434753cefc39e0014ebb9c0643f47bdeecfce53dd0a03ad824a48cd48c1fc6a26cb1d940ead96e0872f670093afeeac28e420a367f23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b645f21640c810b7b9417c0f76a23aee
SHA1f25124d0f75b2e905c9b3410bc126deeec599983
SHA256663390b7f225228ffa43e6ab1fd6dbb109ecd41138a5ba1d2aa0aa576fcae292
SHA5124f4b606143b3ce4bc032b331493d4afc713e73f08cc58037e6f474522ee1ae900a9752905241f24529e762ed6e8f0cbf7706a94f7db3d3187607ec4819e74bf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc61fc26364c2bdcc88799e9bd086977
SHA137e542b3646e67c1d65ea26232d8ecf5352347a0
SHA256a289db54a61f7f85f85b2802e8d8e51dd114cc45a2e55c2e9b582656982a18c3
SHA51276505ed064484b8514c0d8f49a4deb1aa4ad2261e22b7b21af78c7ecd07298e56e9bf402473ff79cc4bf4fc52bfd5994862105909bea4d875f67df74b3e3f722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532089548e41e9cb39548f4458132dcf4
SHA10132e2c5f65a2b797aa2129997a02711b93a94a9
SHA256760be2e05ca02a4c5290aad28f018b279c06f27ae9cf58fd45ad34a2b636445a
SHA51214d81d6799ed93760ea43b3220f8a06c1e6ee35574981177e7883f1ca93b93242079fcefc52711ea9ef41899e02a1c7d3bee4c190eea1d3fbb05aab56f95d0b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5499d671451ec958242e26d429837a285
SHA1d714f0c785b1ca450f59d5d67bcf3b45ac82338c
SHA2567f1d1e939e3becf5d8902e421b07fea91a488adb747cbb3e7c419c8bec98f409
SHA5122765c9c4f71983d43182dda35c64426225efe2071e9dbb8bb4f67b948c8faad7128329b4e17fb8f4217e2a30da66c412414e24de8220f1d9cf4048ecd55f3d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580cac852d7e1c987d5f835779890d962
SHA124d2b2687d3a1d4c499344f137c8b65f1d7c1b30
SHA256bfbd8c42931fd77d8020075cec2b1917609a1f70c2b9b8cdc7e5eb23904f8ac2
SHA512e0549be7a5f0c41577dde2fe08811510b2d5deaccaac7ee11eeab4d4a3971b790cb4e7053aa247977a3b074e70e03b42f94709edae1fef6d9586a628918bcc3a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b