Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
323e1fe9f661c5bd530b43f600750f47_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
323e1fe9f661c5bd530b43f600750f47_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
323e1fe9f661c5bd530b43f600750f47_JaffaCakes118.html
-
Size
6KB
-
MD5
323e1fe9f661c5bd530b43f600750f47
-
SHA1
a4b3a8f4e21d1a936b27722b6a4b8362c4aadaab
-
SHA256
16b7ee255c5896bffbb6632f665c3f08dea6228aa7c8175f8b66451ac2611cbf
-
SHA512
3290067648e3554d1719d5a58b80531a6aaa6ae560032f0c2a87d6d7de76f01599bcb71d03d16e972789f9d71e29f28d6d7b4974924b1d00c5d4576a04dceb65
-
SSDEEP
96:uzVs+ux7iFLLY1k9o84d12ef7CSTUsocEZ7ru7f:csz7iFAYS/ab76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f042e054d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426728327" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000040566132c00ade50df4aca3ef9db330c8d97ba56b3172bd43d2bb705ef2b973b000000000e8000000002000020000000b45838ef61126ae8da7e973c4a526e46b4be3357edf3f35866fbbe05afc1ea3290000000251a198ab7d6f0074bfa3fe9d5c5e62653964f7f2cceeb3ef6edb66e2c4c64a1d8d99abe8c2b71fa395fc42e75b093a621270fc7eb6517c651bb7e10962a8586354878b850bcc63da50c79179d8fcdc8412f3c5e41241364a3cde0ff2c705d573ee869835d8a6b4e1c64f8b0bf74d35253b1ef207083a7c742169bad73d6f7ed3cec501b7959fc8b5fa8b08ba98dd33c400000000582d03a373753923c62983dd363c2d664e756beb1d55716a879c3c6b847493fdc6d4cc504f1b3894dabd5d587973f48170c6f29224aaf52e5cf40f53001b554 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000006fe6753e67c378bc5d9e5cd76b903983cc63192d53c12735a8f252c150d40b7e000000000e800000000200002000000063b7d1ce378afcdc6b5a04184c40b206171eaa5e3e4b4b02152441bd01d5cbc92000000019e40cfef5ee22c6d0a2d7273f0a6758d4b10450ab70ecab9a3e982bd45b9dbc4000000095564b59d6743b4a9e847b7b1e252e2686efa346d69e84988eb6b7bff955ee78e96017986fd84b6bfc4d70895c75a52f047ea95d55dc8c6500f70e8067199885 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09B7AB31-3E48-11EF-8E00-526249468C57} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2564 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2564 iexplore.exe 2564 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2424 2564 iexplore.exe 30 PID 2564 wrote to memory of 2424 2564 iexplore.exe 30 PID 2564 wrote to memory of 2424 2564 iexplore.exe 30 PID 2564 wrote to memory of 2424 2564 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\323e1fe9f661c5bd530b43f600750f47_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2564 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b2fe2af409fff0595c67c0a96d88ebd0
SHA17f340134b6b690c1cdcac3772f7173ea77f0f35c
SHA2568af9fef715a8f60e4dfa2807820eaec2cfc69691a43707aa51a8518d41f6e9cf
SHA512594974ac9ddffa39df0fbcb3ac93230be28ef9a1a590ad177629744af78b551fba66fa124379026d7f46ed28abb00a9f5fa0b1472249024140721cdf4d66efde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bc30449191d9325e5a1f4b3d3aee02ea
SHA1c226edae01682307707a7e1a8d168fdd551e92d0
SHA2560e40f1178f767305d2701a651a50a4802326baf154ce9ccd968ff89fd58a7ec2
SHA512837390b1248a51e577432a6d902a478e85196f139095cf916ce90878d812bf0789614cd1dd37b058422a5eda26a9cdc286845b62f842fe93c858af3d8d1cacff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5595383c85402c3c0ca30742afe603493
SHA1041276fbe002675384b2567b654c6920ba804eab
SHA256b7d8fe0020d5d3b499d41c48aa568fc7b600fe99b53a1825ceb8b59fc04e2cf7
SHA512a0f5cecab34f827083c1a32628058fae04d197ee770293714f92e8a428cbde417e8d652b2dc8847035eb7f652f5e216e3907e7384052f0e507d6b840249a8008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5814e04c65454dd7a5dc14ed6a8b1628e
SHA1059fbf9936ebe38a421756ddd3f14da2c0e655e8
SHA2560d03cbe7ce8825695fa0c8958f2a3034c8ee5339a6f9f5c0923a3f75e2b4bb8f
SHA5120a6cc0f6dbf50ee1a5b09cc4336ab0a84d281c3e4778904a6e88af1b05e0d2a2e0d179402747a953351d76a31b85a3e364eece8303ab2853e5c359ace62b18bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f97981910c4e5fcfa8c6918658cc6c7c
SHA110ae90a9a1b8fd10af992c00cfe6ead2b8ab6c3b
SHA256d3f22babd62341640ccb2faa20b6157cbcd38378b0f6855cf2b1c0d65506c8f8
SHA512e447a5d55a58f9ee2da0beef561dda6eef0323c1b1d10f1bbb69bdb6c7a26f7078f8307a4ccce31b25b38684492f289f2025856f6205cd668d809673ccd947f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ebfdc9b50a6724db15b6971fd17ff9ae
SHA1d24c8b9e436b99facefd03babba4504de8213c63
SHA2568836e958610ffa1d596d746ef83398765194b3d0b400b15d20cd464d882608e0
SHA512b645294c82a9b292d92580d1bf284720f46f9d5121fded37e0a0f9532588159a404b84db4691db679eb5fe8d7f20bd68ed772799a2ee66c9eed975ba4666e94d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55e363fac54671cdf8df09b9569f7c138
SHA1b0f3b30f825a70e210af83c66cdfe03840b60a9e
SHA25643d3722aec1fe7b8e72979a0f46ba850c79fdb3ea22ca768d7a1e137e5fa81e1
SHA5123c835b8ce7f19ef168205ec50fedd5e7d6668d880a2d73e0738e863f0a47bbfdb6cc2874b32858de24f446e85bffffbcb455415052cb4cfdbf70c03ebfd9d7c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5af9b70b9491e43a45ea612be8f27f30b
SHA15d163aa66549615b9332a2cbdf87ffc279a9e987
SHA2564b289782b09a3c13460d6280ce3cc35bedb4f9ab5db3c68e588d24af39447a95
SHA512c20aec4e2d99ff46933c645717f3a13101e4b4e6364b53fc93b6b69a5e6cafaf7ceb3b44b062fa877bffbce00422402f83193e8a13b7c3cb55c92c1517721e53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51df7fda36f2a71d60a0ef05580f7f252
SHA1f571ecf7ac048e797b46ad3c36cd68f9e7ef2b36
SHA256a9cdeb00a4386ca8001ce4e1b2a7ec776087ed286ddb5d564aa3eaceb6d0ac7b
SHA51240b77834419ada2baafc846dd1456e6a6e2829fbae191777eb57e5e6fc68cce20954b2fe21cf4c17b84e178e64c407f0f304a4fabc503d13a03c1badb28f0bec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54b203e8e93bad205dfc08a3db87aa6ab
SHA1b23c75bea61a8ae6d13c78ad1fc9f0eef1271ffa
SHA2563058f8eb53dd267631fafeea3f007b78a25cbcf5c1e1351d20e37b85ca6f95ef
SHA512b6475a75965ed02c190ed7a2488fb88d18135f82d56a4cccb6a3648fa53b01756fdcefb0b16fa9acd428d2a588a21e49af0300fc238274a479dd1364166dcf4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50b139777c6c1571177e590390a1a2803
SHA10eb9fcb3c4f8c5b373498b81877f5b0aba61ff83
SHA256231330c9b09d5769d35a55fcd43f4826fdc2093539b8f1ec35ca6c33682b04ba
SHA51240cc5e7642a1ff088858776db3767bf3cd04ec15f1234f9964c93aef5b9562571f6b138b70b6459e92189429bf63f947773b8e845d7dbc91f8c4ce65a0fbd353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58f9a5f868b6b1efde44c4b516951443e
SHA1faae9dd9f4fc257c4d00f887712d996604f8a5cf
SHA256156a07d03f0712977ca8ff7073d439fd07d2845785e0f6b87ecbf7639d63ed3f
SHA5127980ae0923ce0cbad1c44aff26640504294d6aa99321fd6c045a94f53a745ff12d8aaa10744098a7fe5d4a367390c8f55f6a2b09988f4f87dd48f852abc972d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57fd00677ecd4e6393cb61db05fa7ef10
SHA128dea52c2acfbe262c67114af906c2f3a699386a
SHA25645e9dcb201a08c35ef324c3a206e98abbb3aaaa4eaab5878916b803c60dd6df3
SHA512dc9e8e3c68194da628ed80515f051b5214d08fe2f733d754dcdf61bfe3136e79a342253fba3630ab0b27cd9cb58fb3d3eb10719ce03807765deea189f7390a82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f41f03c46952243f8ffca779eff0bf95
SHA1dde1da7e09ab1bd54fd9708697f0b6813de3e59e
SHA25694b83f74849ecc80bfbdf8a58161620b8e2807f1e9c5b3c7e63a12f8e0de51b5
SHA512962c950a766207a1d4518ad9c8017be80db04ed92416615cc3f09e1a38823e55751db1ca18e693331150c98394eefa8a72334322485f9fa4506df041f4c46501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5295d19c5fad60dfcd8b21a7c51142a7b
SHA18e6133f279e18fb8311237e52f0eebe967584313
SHA2562bc96f85ccc9039c7c103346ed469134dcd8bee5ceb7020879a62be746393fbf
SHA51230ad6d5c9d5ea2bc897e1119f9a80605715e01477b91af9bf01aea151444ce56ea0b922c0e217e8e500365be385d11f32b7ba7a61c085037de29e67cbf00f06f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cbb64e32a8e921970729585846a0a638
SHA1774b7e3d7555fdf33c46af4aa1f8a8457e27c4fc
SHA2566e0817ace2621d2833bd38e7d4ab643c171e0b2de42084fc8d45779ac8e20ce5
SHA512f593c50cc76ea4ed92f0d0d1351f46141df8a96959ee6d8685a2c83c9f88bc18abf61fa4c7a8e13236b0ec76125ca4822cccc7741f485401f2293758ad8cb14e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e8aa38988dd698d3eaa8866db1452324
SHA107b2858ac5ea0720c2063de97d48072250b62810
SHA2565f81d4374c24136afb53f41a012480fd155e1051235fdbbe751e2ee54eb4fb04
SHA5126114906e026489d4041260153f6d38ae1b0da533dc0ca28e026675b33a67d6c3865c67469324dc28cf273cb359088fd878890b5ec3001a99763dac886a016d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51935b557a5133570f37acf0282890a84
SHA11cc842d9bf8c0892d6073d39cc60dfa2008d8df5
SHA2560a73dab978e55aaaa93f077465c9b97916700be39e11f96fe447315b89790b4a
SHA5126563728e55161d615c23f575253eeffd55cb0cd5b6e204160a296ad8c812046cd00087f0b58cafc4b5dd203ad37f6fe9a294c60eed15f0728210d30ba6b8a9f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52b006dcc06417bdb72cdd85a3153ff13
SHA1602b1cf046348214f13e74775bc6eec32640ac58
SHA25679cc6fff6cecaf55c7bfc5f9c640d08c507856eb4a3b46773d9e3acfc6e0991f
SHA512eef87886354f2e4f336667b05ce532162c0448e34b6bc4a1f14e9ac593aa80a4e20358aeb10569a6cdb478f62e689470c520014f9b0aa65acf66947b7559a52c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b