Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 10:32
Static task
static1
Behavioral task
behavioral1
Sample
95b970d7266629e7715e5723883ca1bc_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
95b970d7266629e7715e5723883ca1bc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
95b970d7266629e7715e5723883ca1bc_JaffaCakes118.html
-
Size
97KB
-
MD5
95b970d7266629e7715e5723883ca1bc
-
SHA1
d097a296a3f4f133e4b523bc1328dba275c848ab
-
SHA256
ae6a68547a335e3807b0d81d986061e5664d1de7aea6c70af5b89cc60bdbdc5b
-
SHA512
f5ff4bcbf392c697d67a7d8440b42ade4fb19fe1e96a3efdf212e44e19bebd1a0861cb82a67c6c62374885ea068cabd87f942bea34a3970e7f01e9e9e7c7b9e8
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcBdSHASIdL08CZcZHWOkCp:s5jgL+i
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 302e6d7f35eeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000caeb97c7030e418ddfcf174537763aba73359ccdc3b48db4eeba2dfc0bbedcd3000000000e8000000002000020000000ea94dd79e45e26ef09e2eb565f88307e37a10f72a298f35eafa6918d4e7a5e3020000000a8a08313b0666742759d365357a6a0a6617847881d0f28e7975e50803d2627564000000041427cc653649a7596a90c2afdcd8aec91eeb17c0875a76e9343c33685aa5c5dde5e53a531fe9ba70fa694bc4d3ab2b6bfad94fe21f5b7460ab8baea622a212a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{91D33381-5A28-11EF-A17A-428A07572FD0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429793444" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2732 2916 iexplore.exe 30 PID 2916 wrote to memory of 2732 2916 iexplore.exe 30 PID 2916 wrote to memory of 2732 2916 iexplore.exe 30 PID 2916 wrote to memory of 2732 2916 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\95b970d7266629e7715e5723883ca1bc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1421f34f3078e3b46e225521441d1f9
SHA13618a1d2c88c2cdde4620312eef21aa0169c4402
SHA256929995ff2626190bbe65cefcabd7b83ca39e00b6d2a38967718db8634da13690
SHA512cd2a8918d8e65805181cf18a9060a7f07a42e8549e4ee59d9111cab24115b52bd73314a172c519eeba614e126860533dfc416df04fb3e5e0513fc0ee2830f646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50347993ef450dd351e1ddbaf77f8ef71
SHA103c7641cf1973290852046a5cf4a7f608341d55f
SHA256b86398ada30f9f2b1452fa87621ef4bed9c21eadd4c7bd26f992906ada56f70d
SHA51245b06ae75444d9392b8c88e7585ec76b592ee4398b9f4a21ab88747d15f0444fdd27b5391828041aaadf30c2e59187bb1ca23acf4a7e0cbba6acfca5c7166af6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5febd719bdc653d9e880de7eb839cbb
SHA13c5e2117ed0adb13d550e8b0bebf23e075c9bd1a
SHA256d98238ff891e77633283e041ec2506fdbd90aca1b21a4f61154c78d65b37c7f3
SHA5123555fd35c082af0dd6caa8e920dd8d5aa2b1ab529172d18f5f1ef3b6f58f2809673bc9f2dd1a480cfca8a9e41990109cf0ad11b42814fc22969a26fd09f1ab2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbbf5f1c2edd840c20575b3d416fb708
SHA1380d29d50d2d566fcfb3c5067d2dc151b457f56a
SHA2561b484b15f715c5e31d5935e59939822ccc631849769da969fecec3302856df60
SHA512be32984e8015c76a542509b975fc92069ad8903b2af61d08620bba971aa365af4f4bdb5215820d933ba620f8ee4c24d80c96deffd60f69115dac954cfdb63185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51775ef3454646d4b6f98a2435ea8cd7e
SHA14c933a373cee61df77b6817b1fc70c25a53abad4
SHA2561c8164e82b2e11875a808497a8487bf45c07b65872f4aef6dc0e4a9aeccda214
SHA512a0d3da7d65846a0a81840f0b14bde833495da0c70b5ddf099dc23fa612dd56d5de3813281104052036c690d19f0c5283bfdbed379cc74986aeaaf2a21f4e9d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db95466f0187e5e7a891da2ff27ef5e0
SHA1e000a1bbbbe084d86d9909d7fe1a0484c3c03919
SHA256693363b433b28976817e7be50e67c49a75836bf10ae728aa676beada365795d3
SHA512fc0f2d895330bdc0e1b4c16db4aa8373d1c8aa6f096be755d4b2fef8096f886b7f677199a9c7ba7f662ba48f5569e456c385f2ba1ea912f1550fa513857fa0c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5210224bc1f57359bcf3d038f0dbc64b8
SHA150d2247d95d06df7f98327944660bcc556c1a854
SHA256d78a4bd39a6f3e8e4768e58f4245a2d40b72e957015d1cacaa1cf75ca8505d7b
SHA5126a4b535408b40a9a99e30687f7e4744a990a3305efe1bb5c739655c26a10557ba51f79763973ac7500c07353e54c325343ea4a11dc675913b70e2f02fad3c74d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56731c9f8e46b762e47f75a4b54027634
SHA1f6dc97b84a1010259c68fe1f057a02bb3f59d94d
SHA256b421f5364fc1c606fe474578c5cece1628d215fb95644fd69de054b5e9374468
SHA51234b48c830c74db17b255741268652dd88c7040077db22a8e467357353a32a1dfc10759f3c687aff06463878d41d17dc33171a23ab815f8742afeca731aa3fd69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5076867ac2f466570f3475d437a88329a
SHA19fa1d14f6dbae7cc30e9670f1565195c3d4a345f
SHA25696a1f0ad17e70a1b46fba0f4452b4c8c3ae97e76f1516a618ca8ec9c28f6923e
SHA512204be9617dc00b89aa41cb591fd4ef464cb1a447fcc72ede6b7e883e28593bf9ed7a1325010af8abe4cd6f38c964d97f6c3b5ae5b24e30947af69ac694853575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cd8b36480dab858dcdc3e9dc1fe96e7
SHA1fb3f9e1f7015db27a21b38916072320965377bf5
SHA2569f82df2d8721bcf5450f46b37fa693e672f6e67ca26ed96b7a1a9e10cab4d349
SHA5129da0dbb4a5f759d3caf0d77a4c0959030f098b18f0ee02aebc9b1eb69e58ba30f10ace857961d7a286f6a36527362ecf08d96a697dca9573ce251c366b1c39f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531e0c2a726b7b235f34a445abedaba1a
SHA1db7218d2f0634d69e8f84626fc6d81f7b25e7dee
SHA2563dc02c015a639114d966d948c57f66e2325b2dd51a1809542cfccff1805f9089
SHA5121f953a35ff632879101cb90f0b99a98a9f927b5052178710574a217ee8b918743cb9486dc24cc35ca5651063bad75fdf86243129cbb3704a3db5248cd99d920b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5972e92c8b8c0fa703a15cfdf7abb2d34
SHA10cd65d9f2fe5c7bb5095cb00c4df5797223044bf
SHA256964c803ff524d71864a4a6351358620f8c2da1c3f83f4557833637177aaa6d6f
SHA512c93917bed08df458bf3e704d8ea492556e659f1805d860040c519aeec3196e9995a7ac1c4169d08df79c8041601a7330b2da5f265cdb5ed57f57e665ecd15f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b27b32a725b301138cd7c233a2b23f62
SHA1d2657e8c3b9d41b94b8c4687f01ed0ef06ba5199
SHA256dbde2148954547600802d667de2ddb1f00d575a464cbdad3f3b20b25a9f26968
SHA5123ddc74c92173fa825645735dd4a83895881c98bec526d57af83e2f9d734490661bec49f142100f4b61d44a0be24842d4a3f50199df9d2e1cae1b5d5c42b41123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbff4aa1c2c8959eb3d78a4587a75b33
SHA1aaf22ed83c6b0f6efa3d1ffd7e94a0dc89ff4da1
SHA2567cc57fbc5f077f6c0792eee8da2154ad1ab284518d39f5b17e616dda34639b57
SHA512b0faf33363e5cbc64150af5008458cf00d9723cb0b1d59eeb5677331aa601c80f5bef3362b63f8a76ce4820545437b026fa115a69fab3c971c422b32f402f92a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be5c5e3c7979e599eb75c3d5bfde59aa
SHA1cdcd945d133b1c3c2f11acb7b406a94220e75173
SHA256c92c84d910c1562a05b06bfd9421a8f59eab3656f809b694647e3a14a3e5ec2a
SHA512d401bd9f809f66a7b90ecf28179b8594f966e11470121a58c44066ffbe4229e7181543b9193c3b5cebebfb5f52b5bf2482e2383e1883d2322e9c92135a52b037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e830c5c82c98aa1fb4b74907c14d8a0c
SHA1537677e3bf36f79b53e530e2ee27165963200f3f
SHA256af06e17f45666e84e01538018054f89b2b40c9376aa4c94f479574b2faf9c30b
SHA512a46ccf299abc2af9a1ed2cf4d67de0a78885af8a2a6df77864007a78ea45e63bc83c7cb5c75929cd923a21a242d0d8e382fdd3a8d42967fac9a5b3f04115b974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f33e2d89fc4c5ef0c7790a3303e4355c
SHA168360e344fb658096d359d04f45334cc0b4ab2be
SHA25628e2a8aaccaafceeda676c5fed122d8d2cf03ff963327c35456e893d69e5afbc
SHA512e4a1087cd9b02bc15a58a1c6953c7091b935f7aff0b1c8de9bbced4a8c0352aeb5e20f91558bdd8823ac29ce6badfb5d4ccb76b18eceb8419f74c84681fe2729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513ae5dfd14c25a0d29de76ba663912e4
SHA1f6ff75e54e03a10d565116e590634d5d5bac422d
SHA256ea93b648efc0f5a8fc41af2332c84932f983bb244394834b6c09e72cfa4793e8
SHA512fc49cc63875b8608ae6140bde4f99ee4b89e46982af30e607625b1c323fc199221f6e4d5820c98ee646c5761445cc9dad35c5b12df02f6c6807f27f206d08353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cb0f12e3ee133dea979b839f7567ae8
SHA17dd9d120c658a49b3fcff8f77a0a41bbb36bef6b
SHA2567c1db1cd03574b1289957039db3d0f20757adaa6fd2543a65ef3ba81a9dbb477
SHA5120e9b32c8ba9a9e68304cee4e53e67b9ad1f4093ba2a4524b4c2908ad4ad81075ac8abbf6fbd4c9226f351119fff516a3b0d0887c878baa72de14532fcc49fda2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b6b763ad31576a4efec37d4fb5de2e6
SHA115135a5a066ef341aa3817a69bf4c8ec2e20daae
SHA2565fa79cfca4cb567be63384a26301cde05bc4712c7fe2eecccaf751b4621320c9
SHA51283937ad7ec9aa73543e9653d6828aa9274b0dd19ea9f354397379a505c58c274f0aba164f97d74b880084903600df164a8ec600c304a855ce8be4f2c576857fe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b