Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
c190e139b9d1c104d9b1262b37e37836_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c190e139b9d1c104d9b1262b37e37836_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c190e139b9d1c104d9b1262b37e37836_JaffaCakes118.html
-
Size
24KB
-
MD5
c190e139b9d1c104d9b1262b37e37836
-
SHA1
5cb13a581c45931064fc8a7a334406ea17d79499
-
SHA256
f48ab5939f93bf6f12f7a7bacecbb6c815c88ad797375d3ca21a9be1fb65a708
-
SHA512
e61b4f5940cef163636416ca631b015726e3d8337c2fefb346cd6a8ec5d53b7d8a56a22b669198ec8e5d0133c99d9b1fdff2fe52043c0f647093e604bf203021
-
SSDEEP
192:bkXQC1FtECVM/bD+d8wDdfecVuuGyDCFtbXRXtTT9Tl9TojS+Es1l0ZLz8q8c3l:bkXQC1FtEgM/b6scVNCk5KLz/8c1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b099fb7d31f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000007e8aa4c098c80da65e8059ec54d016bad12d8c12d97743a007559ae829228516000000000e80000000020000200000004726a42da55ab29f7cf45f949cef3c9d080d780d640a3eea97f31c1911d871b620000000c8e16618297178841ff876f74308851351c6371a97916e3f6de0392814d8e46140000000bfae7aed88129174120c0332f36a8dd8f57cf90e92fe40622a19b6eb1e3a8eb31787b4c9b35c6a0b939be669d9dd7c5aec78e70515a78c0eb05e27a083dfa505 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{846E91D1-6324-11EF-9232-D6CBE06212A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430781264" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1764 2416 iexplore.exe 30 PID 2416 wrote to memory of 1764 2416 iexplore.exe 30 PID 2416 wrote to memory of 1764 2416 iexplore.exe 30 PID 2416 wrote to memory of 1764 2416 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c190e139b9d1c104d9b1262b37e37836_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ac59b27b71d5924d334f8a2b8969bef
SHA189d2b65acf9124c7ed642fc77268c7df8898974f
SHA25696397114110c2f2f0902c38a8fd56cc3e58a8ceee2233fd2c599f9fcfa238cd5
SHA5120ae21c4f65cbbfce1039c2b51995377d1f09a5807a0b699d5bd67782fa8805642f97105c8660852c62a45358d82953954b0ab71daea56417adeb48b9f1b347de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519558d46a556b59c398cba4792bad6e1
SHA16d8eaf09f64e2c2fe149765a7eb92e7394839d8c
SHA2569c2a4b17b026486b81bae8af57640eebf978d2d14f0379e765338687aa3b329e
SHA512ed6d5613f0351aad028fc5c7a1a004a66d924a9c4b65f3967a568044ac71f24ffb21cfa283a3623194b9c07cf08e2f38692fb71cd138f5c5f8885c7d85a57c7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c50bf9ec64bd7e4e3af34850ba694b33
SHA1f5410ae6c1f42036b8d415b025fd5bf3deba02f0
SHA25632c5d23aa84cd8955e501cefa87636a3a4651273763130b3d0b935f0773fd426
SHA512b9280b9878be1a73449c73203e94bc85d53ba61d0d2b367ef358748d63afb90b89739ac026d9ccb485de1ba53a92ecb45137ca9fc0af78588d7c74ae68d23800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a713c6ba2c4e789fa9ea94388d243b4c
SHA1d91ed95ae37c938cd9a5697fb9f02a3d6e4be31d
SHA25614f4f8c9144e6de7a47c702cc6aed6728007d6d6aad6a0dbb1cbf81c925c8ff0
SHA51206e20c307b9ac072e8e0fa36fd6d1a8692505aef9b0002ff5a6a8923b84c9f0ca01cc823488d7b50e13b8bcfe60e722c06242504fc14120dd66a9bf00be36390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558ccca58e1ce0159cb643fc14ae98d30
SHA112db6747a0d6c46c2cbf500d2bd17eb6deeb5f3b
SHA256e98b855bcc44c77732793fb6a119dce7983bc4b4790b4a6ead65b0f313326ce9
SHA512a0af178ac3547e4173a74fe604ba3bfa52320118c5c40b7766fcc562d82545554a57dc9d432f1c8355ae274d14e145cbd5b4140ab5ac152ef35b3689ffc158dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5549df186a2e8f9938f328507fdd7116d
SHA15bbbec4526576422d17607606d42ba25495984aa
SHA25609f320c1033219b20ec4fc4dfe07cdb04b24186cac2f1be44109d70076c486ab
SHA512d960a2d90f7c194377cf8f75c1632b487136c1683228c6d2ecb30b9a98401658dd4e7863c4f28ad878f50ac5a105bd7b0a1d658484dbccadae359b6a8bae3a90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56126c1ec9a8c97c4daf074a6eb9644e5
SHA1c5580bd9c4c2d1d6e142fba1a318a20d292ab57b
SHA25680bd725c7094fb857e3019110c9a20fa30dcca265888b921a7ba5651a83cf1fe
SHA51234fdb6417d733661e9a9b26e490f8d9e5727d285e837868aa3274ae772d01ec627289b02928c86f77765278512070d66f3d750e6ec4993fa76190b36857117a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5800e1b3688e20f063fe377a3a5af1b98
SHA175ffe9d4a1808b7716d7dcef49f2aa85a7ea4eff
SHA25670973e05447f81d92e645e26aeda740412f80b26f98f0e971799f60fcbed2186
SHA512af65c01ade6af7932a06ee406d3498482d897a4c0bf06fbc010908d93b6b7446a60fa3be03b4412b036b18f58118ba188366ccc3be3ed5d43db8b8771ed7662a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51111a48a49eae1d229ca0d85130dd1a7
SHA1a5e73aeadbb3fad44c88e4ce2bcc22740dec626b
SHA256a43388ff33d5a2175e921fa73e097570a7aa9ad5dc2cd53e8c3f021aebee8c48
SHA512e22693f47590101495be76e521325ae291543d36b7becd716969d9cba26af576758039b02f7358652c6771cffd42a29723303904c1b41f8aef60cb80e78a1941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513506869b86f3fa6b93a075c64a73166
SHA161983f25a24524637d68b388ca9ec3acf3c52a10
SHA25614032e158f77fd02cdff8fc1019582ea1b26828d13465a1c75814b49d2712560
SHA512201ca0a1fffb5d0fbe2c7d060de16bbbb2e6b763afd7c02c2df4e9e613837c2f58772e072bbbcd6156c3607e7c4d1b69b8c19707444f2dfcc4ba3363ca057947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8777bf1427d07d1daed04a38e71b344
SHA1f3863da56bdcc0f47eedf488f53dba17557c0aaa
SHA256fdf1c04404d36691cee4727ad67e86d12cbd581162a0f2a90b7a8098bf4d222a
SHA51288c975d359564dc3ec2b71958724c27566b8106477c4c22efc9df97eebeaf81ca2e60a0b8d80616bbe4776e331d095530ff201b4106d8a9690699d299645efa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592e729761996b32f26f1c84795570f3d
SHA114deceba733e028272132b4d4d1d88702c207031
SHA256cee010b9426b0fb4f5f640a211f0b2fa8f7873dfe865b458d5f06469c4fb2018
SHA51222e0d65626d69e15306e8566e1077f55277bad5bc29f97f2dc3d6306abddd1163ba8005fa59d875c219195fa686209c6d19836f01fe97b10a09c385609bf9612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581a362ab10d16fff24f71c49f40edd6f
SHA17a0880dfb414bbef33fbfa6a6114db698a40776e
SHA256db6730af06bfd549d8c038afde3cce1448b33bbd9c79e5697f325458c7813f51
SHA5128020ccc9d15656116676ea02617bf26f1264ffc191ee07e3def79077ad73861b10277f1da759cf1eb307ae722153edab2d87c9e4d9eba6d9455179cd5efeb001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562bc8320f669817510ccb7cdda26bed7
SHA1a9c701eefd9239643f6e266e43cf7e5502d01826
SHA25683261b9fbdc73455907ae785abc90edddf1f1a265450045ccfdf42d7f22bc2c9
SHA512e80ba65cd6d8b4ae623baf120a768741a64e4f2c78d05acc92a4daf1e31e240d196467965125168acb5b91d43b32db699b68d4555448a29c74e7d77addb14f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c3eb56cc149ea72a0f00c4e0f1e56b
SHA1888a6ea2b2c73f804cbfc28049909767eb7d9a68
SHA256aa179ffa598620001cc02c90c56180865185388a9a6a18a5793809800f187112
SHA512cb017602daa892a77e10e49957567adedd5f1d06bd1d9fc0c521bbcfc56b73fbde6a802e743f0fc85a6e774639fd77acefa0945751fb496fd3f7b9d7f1965293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfcc3e3aacf9f323641c49a9fe915d9a
SHA1c9d83a26aa764997ab5436af713ff5ceb74aa1cf
SHA256a9cdde80a8305ad50690d883aec2ee14b1e8e2b3d2d3bc5270a9a98118bf4f4b
SHA512b05bb2c24b6566658bac1446a7276b1a0279f15905db897554de1fc3cc7147222557254615d5ae6285f2b98c40b88ceab1971819d8773f6d88d03e00f1e474e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab3b8c96402e132c574dbe1a31b054e0
SHA1e55d174744a62f17c3f0d20c93dff8f4f6fc3ca8
SHA256193a4555937c1012fcf82ba39d030b737245dfc72396e306ac36271456a9a772
SHA512ca69dec37d5ec978be2642ebafdc0ed9b7f27d2bc1afb10c107857ae773d57aa959a3adab238fb14cc24212636eb0c5ce316726de627d302d964b238001d5813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5561e2a2cbda8b98688eab959a5406fe9
SHA18946e56a80fe419490c3b3510aa301226c5a7325
SHA256e0ee54f1251b016ca0eaac3db955fb6261c9deb52fa302f7c1957a30f505d990
SHA51261cacecdac989d759e0f0286d13dd785524940a69de4fc6a4a78bcc4f15c44f4c1e4dc4baa10a1a0dcb36afa8be57e19d477e73501266c340cf1a6fcccc16cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5082b134489fe420ce38759aadca13d78
SHA1b91db8b509481fcf963bd40072832c2f3f436194
SHA256a1e0c70e558a672a9d4d8c06d41363bcbb334adc549f3f62c42c8c7de499e8f2
SHA5129b7eb13a6db8b0b614e74ed7d43c5b484599526db01885391be767e4415de198237c5df656099c8ccc6c336c00b79d5496f83dd5e9428ddfd23d0d0788cc539a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e77b020b6d4c4ef77fcdbd55a1e4b05
SHA16426d09dea9eb1c0ceb60dec712bb02e0225e59e
SHA256921d945ce5d6f7e604221acd805e7954e8096c12862419a53ed451822975e6bb
SHA5124282f490109a8baf8a7fa22ad15bb4064f31392655faf9f5076e88c6cffcbc1c98f6a777152f25cb342cb15bb7729581d0995c9e93e3d1a97fe41ddc31c5d51f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b