Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 11:14
Static task
static1
Behavioral task
behavioral1
Sample
302405ce5601f31d8c1657fd59b55791_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
302405ce5601f31d8c1657fd59b55791_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
302405ce5601f31d8c1657fd59b55791_JaffaCakes118.html
-
Size
39KB
-
MD5
302405ce5601f31d8c1657fd59b55791
-
SHA1
eaea90cc7a7d1de36f553f2af161461c5d0ff7ef
-
SHA256
d5d66b4b34907c0f970b234114eb30fcec77861993b048a48d6f815f315d19cb
-
SHA512
430062714c5cb13d7823879b7b81042b0e65446a444ed57df14c3c4cd5cc06c89401e41d7f2d561d88507d7188701d0662c093b713c94b035702eb558eae67ee
-
SSDEEP
768:Zcd9QZBC7mOdM4MpC5I9nC4DxRQoPONewBwowLLOCPd:gQZBCCOdA0IxCMxRQzewBwowvOCPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000dda9fe6cccf72bdf8ae3bcddf0a9b4dbe95644132ec2ba19191fa4e1a24484fb000000000e8000000002000020000000b7c0e83bdd08a2e21c428d03ac8e64055fe052e979c81005b982b163c9c6883c20000000dafc396d4e15f70b934cf332a8c647f890ff5494fb5a87ebaacfef999c530e62400000005db91a125dfcb54da17a627fbb7087a71993d36bf31d4505fcf55882eba02ac49507815eae55fcfa3ce90188843f004ba8b69be5ea9c89748654a8039531a323 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0382d5603d2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000003fe29cb71a9881eaeaa72e510d5fc13d1c532c4a00cc9f86337b8ab481a851c1000000000e8000000002000020000000ca125b7dd8e8fa6e2eb63d8d95fec18cf0cb861285c25fd07141a4be5f96f6cd900000008e80f4cf19202d6d3088f49ba95f0656cfdbb736359dfc0503fe9c546f2cb3f11a5b6925aaa18a7b3f8b9f41efbcf712f0a1bae82d5ebc38bf830c90818537ea701b0e323093ca347b1efb0a5787c7184d1a5417bda7ba3cae6ede8e3fc0c4dc4e4d4b6f6ca7dd2a26c296940d076474823de435b06da5d2aead8a8ae46de4123bb3398cd2a6a2471a39ca2ce62fb8d640000000845e163810085b4e6752cb49cf78548acf755886331d227451a5aeddacee7f0ce9178cd1c7b82fcbe5f2b84d6e23984e2b6ed4a6989cc8c1df566393e5d6f1dc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5A906B71-3DF6-11EF-AE10-CEBD2182E735} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426693244" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1940 3068 iexplore.exe 28 PID 3068 wrote to memory of 1940 3068 iexplore.exe 28 PID 3068 wrote to memory of 1940 3068 iexplore.exe 28 PID 3068 wrote to memory of 1940 3068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\302405ce5601f31d8c1657fd59b55791_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562f119a741b7b2f92b7c5034bc33e61f
SHA1a891fff4a3614ca44df2c9c982fce881578cc067
SHA25624d115bbccc62efd2d01779e6d1a4efe06929de856d7380b3ec90a4f7990a2aa
SHA512b93e3e07ada30d08afc7ff0396c7db629eba4ff6712dfa0cf4f848534cbfbb7ca4f5e8bddcfeeb280c83ec8ec9be3a2c7b833fe5dbac40f06670454abbab629a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acd2b8e8e85336239b1bc90474cf2413
SHA127872e0091d72f5e656608a4be81fae6fbc3440f
SHA256f99df19be42eec187b32de5ed5c511df316d07788cdd086179320b3b256aa64d
SHA512c86731b81f380a5a93fd346ba23928caeb0851019845049a444fe04ffcbd2fa4e62ac8af6ba3e3ef8260ebfb408903404915638cbe8fa912c13d4c5e7194c99e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac0cbf83f95d044e57ac1579a701258f
SHA19587b546cd1afe8ec08034bc8e6ebd92fbf2c49e
SHA25653eb9e5df80042e27cacff0033a477e3d080ce9fb2670531598b43a59a53e5ff
SHA512550b66f3105d3fae093d3993be03a98dadc886ffa85f1c683a682c68ca686a1d54a5d4af21110eeb47527db2e630a1d11786eb8073c8682b199a88ed98acc192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572f10ded40e5c39dcf71d94c1f4730fb
SHA11ce9344fc89c44c3c99462d4e0bd8e7ce7312628
SHA256df269d71c86ef9e6de301b7a8039b69bdeb6df9f46c906781b2dbd8923855bc6
SHA512b9eb66e26d97ae66c01fe0b13f5dd068a89f794376d6b2325dc9ff2925f212104a6b26ad9a77b4e2bffe2ab6540529310041829befacf8bcb323bd5adfe9e582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa21dc2f2969707886edda77ba327e5f
SHA14beeba1ae753794706c20ea2a1196cfe0a0a53f8
SHA25694c4062e1fe36f16307d5be1437e0b6cca879186e3f44df2afc157e38b47db39
SHA5124f96b8e08a6eb652c3d6db802dee04feb20d937ae1fb4a4fc0e66d38134f675e7cd0453dd57f761d9d232b6cf83515b8804049a09e76662aa908df734bc2c193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c6294760104363ff8a054487e80dc93
SHA17e9c335728418ccd2dfd2a70e5ce58854b9861a5
SHA256f7c6eeedf5c98ec4ee48c01af4c328f23943ddf1848b42892d5797bc4b58275b
SHA512c03eda89f0a77a15c8ad8b57aa7b8ea8365779fa61fd4e7953012ac7f9a79432a483b0bbd7471ea1d0cee920b49c4ee85e642ad99421cbf2cd5259a88cc43cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58617eebbe11ff151df9f6ce56cd9d954
SHA15c6d99de9d54d7a418cb78db0e556c73f43c5105
SHA25686e55789408339d2a210d98b9bfe4b26e5fb9e6309d20296e43dceb2314266b5
SHA51265911e77c6212291c7da8dfd0aa9f2e12643922c678d446f01374b289aab70c283eacd2706d63e866740da9cd22a66f18c06891510391decd5be0431de400e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a32b792a632d69a97e488646030c6165
SHA11ed19031788cd028f2d0285733203d30aec42d9f
SHA256b36f767c2c592282af44b8870d5ef0c9b4b13437171ac925739b3422f0e37a10
SHA512691cf665b12ba4dde7ea02fd2be37b19abf7ae00fe2d14f71079e7bf5918bcede99beab4f8e25b6056046e96770e3b87ac06f4d764d60cf35278cd7626af657f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a47050f62c4df5f4790d3470897e15cf
SHA1f7110a103e4bb24e63a60cda1d725a6af0172724
SHA2567cac951ac4e9eda02bdb34b0df034442dffdd3c83a0cb48863bf566b05192d80
SHA5125f5d082c887c3c812bf2126990958a1b256453395937629513ac7c28ab316159fec1eaff450c7120a7f80742576959af82b397aae629b96d1440941cc4784158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528192302dc4f0e1ab16d27a6842436ce
SHA125f7a5f633d219e86245cb2a5b25bc87cb3443d5
SHA256bbbee81c6ceff32c6b985a0f6a432b2467bbe126693f081852a0b1aca09ca71e
SHA5125900835fb63f9f659c189ab0998196ce639115df78e92ed5745cd08759b67cf9a70f0a466930c1511cde2b827aa6ccf9116e31bf8903fb32b48ebd268958c7d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1b5baba76026e18f8a619642b454cea
SHA1088c4f6dc01d105c13832e29f2133b772965f818
SHA256ed2c426717dbc00beea9b65c6e66b947a4f26fed983580b28c2e1ced0efd72e4
SHA5129963d17e97d3fc1757f7eb38da76c1dbb31378bc853fedb3c2ab8a973384c6eb2b65b5f6c18da29b36fa64f077fe29361d32f6b6de13ffa7c9494039b0c42a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cdb1ab052bb74dd52d5cc99450f8cf4
SHA1717d2c563c858fcd2a603e8a1e2698e2c6ba7093
SHA2562d72c48fd3c2be9877705e33e16ff8dae5266b9d4bea8c568c80a39efeadcbcb
SHA512e19861f17062ae8c6e12816d5764e01860298a9fbfb3d6dc812668151b776597529656f8904666b84a6f49a21667a6f003c3503e064dd97c546b7898138eb591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d004c02828d2c81a842675199097f1a
SHA16dcc1645bf3f3ab7607df6774b8c7604450223c0
SHA25691004a92dda47b31fe5a316527e47b12e9e4befdd663aae85b4a1f8e8001d69e
SHA5120c03eb7c361dc5d98ff63b0c48e6107ed439dcfdd342ee29d1601602bf3907c674a4957264c057d2df703cbe3dec4e79fbc6f5786afa0a1fe4b78ee1ba1eee53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9c9257c3b3bd9fb70da713064d0cacc
SHA15a4f68ef0d5fdb22dbc946d5d85648d102ff4d2c
SHA256cb98144da5feb1ee22ef83bb276b94a5b1880ad0053bc84fe2ae42e2b7699bbf
SHA512a4edaf17d8864f4e62190f04dad6e5db017ce7a37fef09de22e730d4b9645be1a4194e8628755015eea32e6a63e2e2aa5d1749823d0ddcf3ad0267e415f12417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b71982369b055a758f59e7eb5e56032f
SHA1658e2a47aca802174a093a09ead3b7ff69372e66
SHA2565725bed0fa0a6534041073ec73df662ba3207eb4925818103689bf3e15c3b114
SHA512724fe3047574ded70a35e6474f3eac5787bedb20d445fb7d4004dff8c0190be852523e65ffba71f3db1862569533a0d7538b959b3c68d93bcf9ee79369525490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524a48eb8ece2969922ff822b8866edeb
SHA1eddbb71eca2b3ef9e33e85ffc9761193c7c46ce2
SHA2560d9eeedd499940b8b1dd5e73e262d1c4a647fa163ff053bf15a7f9c02aac9481
SHA512d5d4f7dbf14109b49ac4c984bc902db145166c56fe63a4a78f87f8ecc19933154a198f1b46bade7bd7057156a4067de219f1a8f74a38f4360c85e00e6268c291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568986fbc779cded51b332b1a5adc69e6
SHA11f465431bbf1602826ac8c4ff95f759249985295
SHA256a67473d05515d9733f544efa06f975bb14bfb4986e12981a80f3c9b995c68aea
SHA512ccb94f275ec5d707dd29144f71b0c124e7de8b3775272e8bb0d51672bb60d992957b24c5d2b39766a90af511340c95cf48636a062ce467482e49a89c4fbb6b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54095f9198abd609d3efe6e5285cf1dca
SHA17a665d3e8a8595339033a623d05644b9b75feced
SHA25640820a72763dd2220977e302f813eb2f45f86eeb2c1d55c138d43a6eb0410fd3
SHA512469a5cca90a21a5f6c6ed077f15c7dd23b3e514a85a549b75908bb081bf14f478285cb750f45bd6517d9c73a29a78362acd6645485447165831bae7830766760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c43ce875b2c5d15fa145775abca3736d
SHA11432737f239eda99392c953f4111a241c159b8ad
SHA256b502953f2dca721f11085ca20fa213028796b50cbaf7818e6a352c9e9fa64982
SHA512a898b059b6a01ec084982f831447d53e11019d93e09f65532eec94e8f9d44456092356fea6a69777f4e9574caed3a5b7108bed9b72bcef282ea86c4b089b32c7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b