Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 18:30
Static task
static1
Behavioral task
behavioral1
Sample
slftek.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
slftek.html
Resource
win10v2004-20240802-en
General
-
Target
slftek.html
-
Size
4KB
-
MD5
fb518fb7c898261b1584b38dd09623c5
-
SHA1
d135484e209a4d84248156ffd4872c28e5b93f31
-
SHA256
38e7eb989c16d7a78edb0a785e1ec300f6063816d08376c251796b526c8c40a9
-
SHA512
c92c4578bf8074639a7241bc7c32bf9631b900b2cc7b61e4115b746f6c386486bb6e924d8cb849ba4bff68a10e6c5d2b0cc4514de85d64ac3a0a3de1c9fc5255
-
SSDEEP
96:1j9jwIjYjUDK/D5DMF+BOisKA2ZLimLrRe9PaQxJbGD:1j9jhjYjIK/Vo+tsOZOmLro9ieJGD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000ccdb163f200e9638addefa53dafba54e8b23fc23d9e54bfe3722bddf77657709000000000e80000000020000200000006a21759761e9b1422760acf0fcce730571283640b3ac2d2bdee2111eeb4e63c99000000029f2c4c1bc1e488365df7d07a3797174497cfa2390d8c9b8d31fa458f7f2df87c080992ce23d0182c36d4a67f30c5aa9e81eef293e680c68b6f0b34fba5d9ef52b31ace13fcce3a4a82c0bd1bb50d84176925e316b8602c9373a2e62da39584809e5a19c60a984c1a25ead2194cfae4f102e6da68dfa6d5ce0b53ad4db7a89474c945341b84d4254b23e5ea0fb9027ac4000000045b5a541bd8d213365b026d29f90fed7b948d2791d4e805d96317ab1ae415a93275ffaf95d8b8e09b28f409afa15e668364203d4e3ca8758a7690269d4251ab7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1070e3c1c1ffda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED6131F1-6BB4-11EF-8BEB-4E219E925542} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000e38d97573f1bece47d253ba76909b2eb44bcfda3a117c8ea5f4e74c1727d9b9a000000000e8000000002000020000000903f8ccd4e0978b36795ef5e8b8b8e1597cd2258eff2f79023fe75ac5be8308b2000000083be54e4a7bb7a5d9dd89dad7ca795ba551c7ebef75276d0be1c2ac50fce826640000000ec56543f3e46edbe12eada13616867cc393715e080d78fbed808cc4b73981334e2e2c30f64422f89b54385156fc36067f9837f89a66125257b2ead8a7b5ed263 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431722896" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2264 iexplore.exe 2264 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2200 2264 iexplore.exe 30 PID 2264 wrote to memory of 2200 2264 iexplore.exe 30 PID 2264 wrote to memory of 2200 2264 iexplore.exe 30 PID 2264 wrote to memory of 2200 2264 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\slftek.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edd3953124d692ab9265064b79074056
SHA1921727cdb927fcdae7e7f4e040c2b77057c2226a
SHA256c6f166b7b4884c39577a1024a0fa7bde6cf4fe57f1f396b1697d4a87e52a0dd2
SHA51270b73cadcea6f145badd8cdf3bc4c41d28e9347ef011a25eb1cc7e45808f48de3fd14d7dda1a6f17e43de7dfe3f1d5071157137484e57cd268a82c520a6980f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567b7a6d15d84a893f9ed1c99ccbc0641
SHA1bf52c7daf82d70cda203dfc7cf59a3c740efcf2f
SHA256015a199e8aac78dc4b2592f5d0e57d82aa243ee44faab6524e0df17b3f122835
SHA5123dc781f4e9230e13efb71624fa12d8e7d7b0cab394191df46236eeebdeb1f137f43904c0c1bafe9add8070d250a13819881bd8d8e49370d70d79d8d00d46d34b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e33ccea726171b8894770c61cd9031f0
SHA1588145bb77014701177aa49ccf0b873ab8bfc88b
SHA25638ef3cfc9fb8da21c8bb43ffe39d4921892069c562cc58a94b10c4580c2b8e81
SHA5129282a98b4b649eed0d6f0cd5f6f5c14663258ad93d355d9121c565c1914e09b89be70277374f2684d0b936420c2fc8bbec6cfd44f7d1f30d753cd21cda4c7202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0b1f77f088f9758aac6cc14c2f355b6
SHA19a2cd96ece50e441835895ac97f281eecd0faeb5
SHA2561c4ce6f99a046fec3e2ba52094975fa47778d08fa8e4fb5d345852f8698dc604
SHA512a5f12afa317bcec2b8645d042b3131073b9b4a4b4722f686baf3b1f38e9cb36fbd32d11d99a818426137c6e1a70832f2a6ca07c7a94a6528ba736ebd14b4cb43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b06889eac4c39639e7bcaaa77a199134
SHA1429834fc766c5ca9c84841fa3e6387033a3830e5
SHA256de38c2c6443cbad9356b1af5b919ab68ec121749223f5ba5fbf3860f67da7f60
SHA512371353ebeb11c24c73e37fefeb774d5c3ad36f5925c0d657ea31292f1e8d182034cf56b4b2c42a88e67fdc1360fd8de484affd009d374811c1dcab8967d8bbd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575b41925c2cd5dc41568b25e9def2d9b
SHA1e2e9ba30da25f90e0e3214f6c9215758460ffbdd
SHA256b9dee179123f427f3c2ae85fd43abe666cd2423618b93aba6ec8a4cc575af7fd
SHA512ad5f1d0cf60c4046d596e2cf6cf354cacc45ecf0306e2bbbb91264e6213ebeef472c6cfa7f162124ef80c9955302b96423cc80a5d6b7a1dfa93cd4a3519ee7f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e746c29fee2e53d98a554101bebcb04c
SHA17479ee2ec3f3876fc8446a859c44ebac9c3bdee1
SHA256c071024a31bf89365e8f2862227e98f14e36cb92f7ff6c056f791265831257e1
SHA5123b913ee3cbd7dacfd5278d17172a3ffe60e89dc87d49c6a200ac53f69172b35bf7f2307dfe7ac74d885e0b209585639fb19c75134a1a46ad31de300c08904567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9934b6bb05b046d914c3170d631679d
SHA1a70983af2b1ea296be632a93ec5addb80a439f22
SHA256ac147130be6c307491e18dad111c70aaa5760649b0e331f048180c9e0d4efb3e
SHA5126be6f73d6f962ae4143e857c31eb12d988b1eab8bafefc8368d8ce6c044f72d0e8506f8518eab1966eadda4589f13f6336443fec61a2f09ca88483084529cf92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad6db84197ea6570fdf7730857044789
SHA12edc96ae28f0d91eb3e228b8e44e970d280b3f6a
SHA2567de1215adc1ef248ef8201d6addf47010e9563ed92ae4ab5278f1edeb383a88b
SHA512d3299221ec53dbc6922369b75681ee52700089f8b5ff4c9a56e7e582596463c51054fbc28544f362e1c54b552983528418004e7eeb4fa7d32dcfe528b9d91571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad2d00aebc2af544b2ed203201f8fb4
SHA1aadb6e0bf196b1fd1a765677e3dbe9d4e6e7ee1f
SHA256a62f2a682eb5e2d2159b26977bed805cd7c68c787bd14916b2103657ae561334
SHA512a24391601ae842146581dc44f7676455ab29e23e2dd7c4cbc28b1788b1241b8e4174e49f0573ae9a5182896e1a04f6cdd6c0f9bc30765219380a8b7de92fc53f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed955ae45d2cd4b99d81a8665fad9b64
SHA177f64136726a964128e8f39b2b63fcb98e2eb2d1
SHA256e1b90e4f8029a6cfa86414eabcf1296dfb74dab783a5a2bca61b09fdbbcd207f
SHA512eeabe815b4ab246a0ca721dd947082870275757751955e067ae82771b45d27a3a2f6e2a5456a9ed0d74262f6acd03594e0988807de38c92cda817de59c5b9b06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb203f4a7a278e0873a1487bbd12728a
SHA1d11c66394aed1e6b6056d9067ff8a39a3d0a9dc9
SHA25686acd809f8b794145334f7b029475aebe7c41a438c7b56711d6db14af7450357
SHA5125c329353562ffaedefbcd9f55549eb20bb44452725b98d27224c6a62d3b4d41fe026ca41bdc45e658fa63ae10b5617801920a388554b3adfa7b8e553bc79a501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bbd1e1eb3c5486b36d9a0e53731056e
SHA136dfd081974ebc6c04c4f70d92268ce0c1f8f5e6
SHA25629a5fda093ea79858ba53ec4140ab857dafb1848d4270a4018e15ee992819d2a
SHA51219a7cf4080a5cf0c04bb404887c27e00e70bcd9e7d459202ee355f6ca71bfeb828617c9c245258ee3861affb5ff0db2a8b1bf12d49459227cc0471ba043f7f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590543d2166bfe92793f4c405a3fcf3fe
SHA1cc066bba4340b7012205885e2bcdf178259763c4
SHA2568235b4d36f75a75e898d423e4618d078fcff859e3b99a7e78f5068f3ca698890
SHA512ca9dcc79796e8aae5a427d35b695895a95693faa5b507e368b45d15de1d14d581b3516619e79126414c25c58235b25ac641d03ba8f4d29ebb70c955dbff2f4ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505c1617eb1ba3f8d2c3b44ca118fbd86
SHA12f79a7a9bd920b6e1f3707a66c9d574c5ded6751
SHA2567e87125d61be38e65f47dfa32bd4c24bea54dfe4d4b5897533816861f8e23a89
SHA5128e8c82405dc9906ca11e338fe28ee8c49bbb3ab2d287ecff6b097c9fa47f2780ced38667fd8c683da5003d572c350d3645aa503f1a3754b4e364a05e1255e0d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de649850338ff066da1e6e52ad08c047
SHA190670d721a57da68f1f987a8dabce6c106c273f3
SHA2564cc88c69de6f50ecc391ed04adff522685f2ecfac72b7b2c0f9a87872f80d3ed
SHA512f46c7c0e02099e8af04909415661751fae2e94a8c38199e685e3d40d5a5ca0a8c891c9e99f63e098815e64516aee3b7ea69cd6f09a77e14966d67dc0526609da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5299d5697371fa631776e7c119890204a
SHA1e6396dc291f4b621bcea0d694b8da15b2c74efd5
SHA256955d16176999a92835fbcd3c33a37902740509ceb3bcfcae8b1fc63562d62d6f
SHA51279c922a6255528265ed78832450c07388be9625361e79c06020c89a2ae9f32d259ad0aa49d8843bf1021c2250d594f98aa2954c77fc452e1f8a8e25f75127cb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7d514e02b7a1fe3659bc573da3c898f
SHA1044092b21da50368f8393729df418fb78cf12292
SHA2569a7036348a383382370358f069c526f77c03a7bf27b330701783555059bbdda7
SHA512911d97240e87be236b0327c8cde14009d88eb6f9ec9ac93555f2b35625d9cac9f97e9ea41100aaa15dc05c6bbd678f2a80e0e6f34cab12e2dd710bafa1c580c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd94a945d6ee212e519813824d4735ef
SHA113ee6ae16d9d407fd04ab7c59e27ae0108b7fe23
SHA2566601231a5bdb197f450a2752254a9a42ba6b1114f90c4dcbaf78cb96918e400f
SHA512a1ab77f3a120f036654d8e7da11595eed9dcbf5d85f020442e296b6c03d4052ced56efbee0a2432e344900a606fda7d4e4d1ea4a884a2b06f91a65559293111d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b