Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 07:20
Static task
static1
Behavioral task
behavioral1
Sample
9521a3607795539aec9e6cc8e67a06b0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9521a3607795539aec9e6cc8e67a06b0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
9521a3607795539aec9e6cc8e67a06b0_JaffaCakes118.html
-
Size
9KB
-
MD5
9521a3607795539aec9e6cc8e67a06b0
-
SHA1
d0e9551ea7098118b2965b21ac574539c7261b59
-
SHA256
ffa75f5f2d664f57cb24613b64e00cc0543a07d7fa0b4ce198592d82f60ddb73
-
SHA512
4df5b484368a1130de1f4a289289384effec01709aa91f4e3994e1cce0963e3313be8cd9aa5356d42534d1c50eb0736677cf480ddcffb953200402e0d78423b7
-
SSDEEP
192:o91Nu5Kv/Us4nG64Q2rVUb/vtRtyFWeOiljT8Uz8YQ7/of1tl1CgFPitaVl30B3h:y1Nu5Kvcs4nG6t2rVUb/vtvyFWRiljTi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000e118e798c5706773d71d0d6d49a4bad701f8865c7503481ebfd189edad843f8d000000000e80000000020000200000008f4142d1d504e2b3ebeb0084b485e6fc5ca837ff680471d37adb4e3b24d74c1a200000001ff02155d8ce3bc324ed500e726b41d25a36886249881dbe2e3d170ec4ebf57740000000259c03dac011ab0b78fa9eb997c90eabc461b0fac3ca971c75f87519191e94f662a63507f17e84210ceab62b23fbf18f0880c5314c1757ed5cbdafd3bf4707c6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BFC879A1-5A0D-11EF-9514-72D30ED4C808} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10d5a7971aeeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429781927" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2808 2268 iexplore.exe 30 PID 2268 wrote to memory of 2808 2268 iexplore.exe 30 PID 2268 wrote to memory of 2808 2268 iexplore.exe 30 PID 2268 wrote to memory of 2808 2268 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9521a3607795539aec9e6cc8e67a06b0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52363eda98d062568b57182abdff6b44b
SHA13aad52d72e6d081235d6bf4ae15e5361ed4ea507
SHA2565f7a58c466a9afdc759cd4ea68b061d79221f56761c145530efdbc6b2f3a4b1d
SHA512690b10e22ca3616bf47dd0f29e8c93bf554e134168bad1729a5bba2b487223339ad7b9df9037ce5eeb432b13833f8362aa2193ba1710710b6681749284e54ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0ec5f890e913d124b7610a14a7f0367
SHA108e512d321eb10d31a1916cd8f7178664e73c501
SHA2562ed81d8e8d50338b925ac1be804397384c7de7fd411d2d993cfab6e9f1b63424
SHA5123d378e4345319f90d71082f1bde6b5e52aa0b60de8993e2667c9e0234825bce289df3b262cb9a062ea294bf64cfb50ec9f4f426a50f8e5e647cb811f01aca598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539b9104bc05eb6ca8f433dd0e62121eb
SHA1236da45cbe5f3c33111d1d7210abad3210f62d75
SHA256d3e50928c45f6803fb58ff6d7fd0be41fd55fc21e99a8075654517f7b31f7860
SHA512a63ef1a9e62336c39677f4a27d266d8ecbe7b11b243f38f60d620899e882a4e319c3187248281da9267172aacde80cf9d60c2fa5f376ece303b71cdc45b0a51c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51011619d95ebe8fd92252c9ea14e02cf
SHA1a12d8b409de07da8a143c165f8d92c48eb4c5ff2
SHA2569dfe7236f0f6045489d1c97baf5cc12e4a1e98666141e35f01755df78d86b6cc
SHA512555238eaef1d9412843334f11337b5c9f7bfb0d077294be786b883f5438dc590b78b41c18c7ae1f559cfa5ffb8cb29bb30830c0edec291fae8630ac130a6c73b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544b3be9b9e228b3484b0a1f848eb1bc3
SHA145e12e975ad0d448268c84325983668186b95216
SHA2566e66a37724d55980d8edc50d1dea8b0a49384091a9a274173502619ba2d5e283
SHA512906f91c5a754f0064d903f644a22d11ec8939370f6d44fd921f56f6843f75dc2891c7d920ac0c5afe03dfb60d098dc5497efa25951e3bc44a19bc3c9350090a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be96a4d78cb233a3fd8c0070b05f0241
SHA1e6a3566e4acbd8f7ebf779bb9d7daa9b535e9e97
SHA2567322e184ea523ad72b6af9f0d037a03638ed48ce321dbb9981531df42918912a
SHA51283a371b24fde05a684f02983996a56d029f267adb3b6c7fc18876b631458d9b4b3103bd5c887963d82bdbfb6addde00b59a0f98d4d76374b0e3a59429efac156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52febfb1a9289138db3eff17ee9a6b681
SHA1ccbd8d6b9e005812b82ea500304e83357af81450
SHA256e343687201759d7cfdace25b62138aade9735bbb57dc2c67897c49d950b9ec46
SHA5126e6e59b714a060c604019d0deafba5a05cba973ece253b5cdaa5ea23fd33bc688b43c5bb28b8925de6aaded9c9b1ca7ba0a25cf0ae2cc3fef108be1abd4f2b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba482bb0340a2270de009a0625c17a9
SHA12eea360469c2fb2419525d09f0c4151d0a4ede3c
SHA2568772da7f9ba0608b7223a325605ff086d735df43daf23a0650297df1d26b8f6b
SHA5122c7cd6fc080a62dadedad124f242db3e792898d020018f83716a29782312a361573e1ad94d772942d8023bfa289fc2e217e1c9c46eb75578ce549b418c94fd30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c0d1a720a271206a90d7b6db97c2cb
SHA141bf17bac4640927690e54f7cec015fb0f063763
SHA256c2a5b6efe3eed5021438198820ec5094e307e03db23e742c9689ad754ee28089
SHA51263a71b9e0fa05c89cd85e6cc761546a898ff4138fb2c0b05eac430809d60384dad7d8a3528d34bc636376ea3a64efdf56ee8e4949539082d625d96a77cb61f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e52c031fb9de84e24b7d4bc9f840440
SHA19d55b0f712a0465688a2e7377c4c5e45e3cc1b2b
SHA2566e63924830061723f4810f33dfe63b6012d0baf9da0e538151f0b60134886cbd
SHA5123ab883174cdaec851df9b3cc4fb9660750c780e7176dfb751128f9b5d78745b06ad6a8160f1d746da5a3c03b1ced3ea62770d7e688292bd498a4950c96725fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5961dbf30d49c66b95e3dbcdd93a40eac
SHA19de7da9e70f18ea15383c27ccdad8de1687771d9
SHA256e837f326323f5f7a6bd2ded1907d962329f703f896f453d0ddf5471f090eba4f
SHA512aca536208240116d505c0393e4dc1724dc23a7ed62155c0567f804f0d04765777769f12f67ac65cf10c5aeeeeb2c18c73bbb402d3f5c1d8e95064c350add85ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c69693b31199710831ba86174df318c
SHA1439ff89016215097e918641b990b41c07d58b9f3
SHA256b430906316c9c565300eef2d24b1a690638e7c19aee2d93ceebefb2f0a7ab579
SHA512cf8cc859b507366c397dd9782b9778cc20a074d0c7adb4e4f2a62225f3e809e96ce3e365ca057febe01e966db3945846b3ef74dee216abadafb77a069c28d7b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcb548a6d12ad63423e32e5c5a31ce6f
SHA10733058f57fe4a9bfb97952189812b1c28487fba
SHA25691f917e3521607a74b9f5d8ccb5a1bc4f32088c190ad93499e39c2d37fe01ebd
SHA5128a940f6aaaa7ef5636a409bcfd8a535f4210d052693bdbdd85f4dc3404e88d95ab901a6efab1ff2c7191039284974db0225887ef18581a6e1a548f151548c258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5112f01d9de684c1fce9f4cb4986d54b7
SHA1577091b77ba1681fff505d1a7c706396c21dac2f
SHA256f93bf2ffe89c26c945d1b753206c34513b836850f6600ab3b926e63214c36371
SHA51237a26e86e4c1366b16ad8d448f370705bf0d4e000304faf92cbd4a4810d41a0692ffdb9cbd399171475801f74f80a911ad37cf969c0d0d319dc3adfde4afa3d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5797533f1935deadeb64b6530b2b13610
SHA146f027b4fcffa0531517f1ab93ff0d18e4616ef1
SHA2569e7ebe177b5940cec5b13cab0231545c433b2a9d5f24fd8952ab9030fa13941d
SHA51249716ef4245baa701cfb7f47b91faa541607a50703b36333b21734bbf359df48c38dbf2df476ef98e61211bd8c0f6656188360f0fdcade9afe8e7e673bab9399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511cd200eaedd822de2f6f821030f0820
SHA122f06c4bdcba819fc95983b9a75e6263007a09be
SHA256ec845a0350144452f7daac966ce6de9ffa3f3d8cbceed2238d47613f58b117b8
SHA512a1d17e7516664a8f10bd5b44d4ed6dc0255ef69e50fd08af8684668efc0c7e4779807ec9909a6db98b3c55bcd14168bad794b28a1f57754c9f1499467f945f4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e8a943ab80afd48ace1c19c47430151
SHA12558a5095ad27f79871f483c800cffcb62c2ad51
SHA256e94fb3e7144b4a3f07c45de0aea0679ac0c3d942c85377b66aed541bc975046e
SHA512a285e0a7191e222032241522f39e8ebf4f2ac27b7000f937bb4540bde01695a6f4947c483f6897578817c3a07e0c43026ae958038a053b9a5fb77bcf9e2bc1cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5354f8954dfdaf019f371eec3636d92cc
SHA1c014728f6489130b3d1ac5058d78caf6e2dc3807
SHA256baf467397ad7d9eae86827c90ee33fc64eb69f0779cc8cd8bd3f6a7c6f8dec0e
SHA512f18e4b3544690bed24a57a28e9750a75a720f3a93f61d8e0eb4e29adbb03884a8bdb4dc45a18aa123a18e2e0f439d420e757447072bf3fe2589a5e51be214f01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce0003840a2ed96a5bd5953bd26f9642
SHA18cf87b34dad24c345842f1c46df49bfbb53f439c
SHA2569e13f9b2b4940702c1ab61ee19d4ee79870b8c81bfdd84427cb552d40173fe11
SHA5120adb6bb81c80f9acefa075e5aea0ded15c96f4cdb36c5e84aa635242e0ae94f274aae286638e3210c6e2ec06604a369fe2ff77507739b11e8d7deeebdd20ee8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5408644bf1ac118f5556d620b1bdbb1e1
SHA1e52b5ccd3de3077b89fde24de46d7061841c9d5b
SHA25638b44c073de0419b3e6383bf3fd8525b5c55b8023d57b7321a2287da8ebedd06
SHA512a67371215c29f2f429aee760a39e2d1f32fe3b84799760a14851b755c4f5154acef5ada20aaf457f7f97857299a1a56f3f5537d5186bda7b023239d02c4f1e5c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b