Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 15:42
Static task
static1
Behavioral task
behavioral1
Sample
d4b2f0406bb1e61b69735092c83581d7_JaffaCakes118.html
Resource
win7-20240903-en
General
-
Target
d4b2f0406bb1e61b69735092c83581d7_JaffaCakes118.html
-
Size
39KB
-
MD5
d4b2f0406bb1e61b69735092c83581d7
-
SHA1
4c5f56eb7cc2e88c951e41f7ae6ae8a4b1a85285
-
SHA256
1da411eb627bf49e18067cc0b5e936c62f9c64b550f27bc21c67728a84e66ea5
-
SHA512
38770f50f8bfdbb7b5720786fe6cbeeb84f67299229b6f4f65e86d37bc0d0c90011405a917e51076b1c3dacb79c544f410bc82dac4faef82bbdc00f106fba943
-
SSDEEP
768:S9xVnYeI/lCp+w3FmM9lm/ORdn+kBeUArbTty6eFtI1SRcqB2ISua+3Jv22kbdUy:S9znYeI9g+w3FmM9lm/ORdn+kBeUAnTJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431971995" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01f19d40502db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000081c1d1b16eb91e8d77e854a30a9f0d3da6c33dcfbfdb4eb4830eb9b2f64e7486000000000e8000000002000020000000be5662ede9fc7878f67bc9b0e7479fee981adf83d6f735cf231f6030f044b06420000000a2aea72f351dbd90432e055cbbbd48aaf71fcbf0b9bfdbd80e460dc3b4cf66ac40000000ae03cf7886d31266d8e6e5276d4e88c7ac7cf369cc45572dcab224deaf959535751a59689e5e051d868764feed42baf05f410e29695ff9cfe73364001c771b18 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E45EB641-6DF8-11EF-A444-523A95B0E536} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2388 2100 iexplore.exe 30 PID 2100 wrote to memory of 2388 2100 iexplore.exe 30 PID 2100 wrote to memory of 2388 2100 iexplore.exe 30 PID 2100 wrote to memory of 2388 2100 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d4b2f0406bb1e61b69735092c83581d7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525cd30e23d33abf66d91bad42b83a462
SHA15a320f1f791ba5085a8660965cc2a04b6f6edb45
SHA25687e8fea63d1b6a0820a35e0badb96f51faa3a5998a8594d9362894c28870c628
SHA512aca6b9dc58c9ac3dd00afeac5202c6691d7c3a300f6272c3cf96227e5b99d3a9a5e4c975a0a53f8efd5d29fdd46d29bbd61380d4bf91859c8cec4e0e1dfac5bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f77f09f9db79b2a1b7987756af416fc2
SHA194e1ea505fdf8bde5a19ae6e1c4064d268f32124
SHA2567204a061f8ffce7dab3e795e69acca92ea77aa6e70dfc0953633e2e9fee0e0a5
SHA512b59fdc4f3acb253898c935c9318ccb73edde20f6856e79af2c497d4f97340ad6d9f0b24b66972e48691a7b8be8470ccb3971f30eaf88a498a8a6a169a3ede6e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b6efe82f4789037d0058f0e3d2ffeef
SHA12f4f41d9d8d6e4c60a80f9413b3a53398996bf12
SHA256d11241507596698153054d62b10ba1fee762503f3288caf8f3ec76a2e64eb415
SHA5125d7245755dafca150ee2df2b2b5d1eb2fa4cb93aea1a2d25c451d5ddfdca9903140e14639b84b48ad01c2a0457d8d0d96730bb5d133df903e2355944050e461c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592b8ca949ef309d4464f8952368dada4
SHA1ea3105729a8b87e7260afc8b511b798f1b27c2ad
SHA256c90dbcdd9fcecdeb9157a477c28e78551a0f72133e6252b63c0654275e1a7695
SHA512c334ff15ac28f8d3ae0de78efb71d8948d96afed2162a1aa88dbde586b6e4ea483e215b2aa1eb9a221da013eea69c62dff7b388cbb2a856712c87ba61c17317a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57580b57b20f2137fdc0c369d5c715b27
SHA1d108d2f1deced1056cd434047dc6d982220224d4
SHA2566707409a0c0965038519873ed6dbfd7e9e0e80b9c325133b4528716bbe33c610
SHA512fa1591b52d39c9b7148d74db0d602bea56bcdad300c8c049e3fd157384ce32c787d6e04f575b89a9c69cd3c67f9d7ded27a7192f3aecbfc6af7ce457181f69d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fc822caaee3c060b862ce6d0a2ee597
SHA13bdc2f83e2d62999149be36c1570b9fd95787446
SHA25668e5537021e13df2997c9e7723978e48022b8f3a45d24488a7ca1cce424e4b38
SHA512f8cf8503b933c1dc2cb74ce080c0b0c57a0a2a19709b7d62c09245985ca2502df292292201f1bd04f38ddb6344089cde1281db21afcad7ff91d46f6d2d289015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b2afd6ceb94d5bed6470d6783879fe
SHA1b104ca0c4d73db0225ade6689df622c42b50de8e
SHA25604ad98917d85362979fcddb5bba69135132858238dc33856f33be83b2f29ffce
SHA51271ab909cf50779c0679a25f09014c73200dd98743774f0e1ef85e92948f918892d4bbc1c1741b57c3ecf9fc79daecbb3f5b1ce2e891140174a903de7da5b9b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bda1af01fce7992a85cb6de95abe5f3a
SHA1e6a3bdf7cb1c6e42bcd26d95845bade453c2a366
SHA256ef86b618d21ff17b8dfbeb38d30f608ae3986ef097b3d6bc269fc99a5dc80303
SHA512c9306475b0dcf6e14ec17a39eaa97ae3c3f170429f6075ad1eb31dfa524c8159622dc80dfcd853eb9b11620043e0cce2f6b626e7aa8d04bdaca56e6dfa781289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53040898e51eefbbfd586a0ee2d2ab9ce
SHA1dc4945e14131bc12e7979bb84d839adcb3f0acb9
SHA256cf808533929ef33f60bc642fdb8d3f74f2187e79d57e1d938e00a435c62a1a2e
SHA512dd604cfef3188c2911ec41c4b4ca1e24427f324fe3f71f6996b6fabb3e52b7c14c85349c8da48f5352dcfd7ffd437f1f5a31e934dbbc9ae72edee9ae88651c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e31c1ca7eab523ddd25537234be51602
SHA191d95e48b18676ad7f9f5d842bb2997c6acb59b0
SHA256971035ea4d1c9e5636c8fe9887649f382d15bacbc098c560b02160c6c36a26b6
SHA5120fcf3f97956afa9d6693f74ca8f954c363f823cda4be1cb0346572bcf183ff1fb1145e85c3acc536999e3198188785d653350e1ed5971ad615337e8bc22cfcb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b5a6a4a9d5e3433b6d6449e103c4083
SHA1caa7330d7061b67a5af320e343ef60d2ae5bbea2
SHA256edf3cedb1baf9df8349ce27bc4db26fca2d947f51ab4a100ef317aad45b7f2e5
SHA512d762af10c692cc6a67dfb26259174665dd0bea3b75980ee596dfc1f6b9a77399599598793315c53a593c47d034341f38b44f89fcba4922f7743293e8db4b3abc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52757f73339ae150f767f3dc323ce4bf7
SHA15763901fd54fb981b7427b73c4340894605cdd4c
SHA256622a4eb191a5d6a6f05900f7ae4eaeb5332b8773a005cfd6164a6825d8217a15
SHA512ee385c6ef78984cd708e885890897cb095f8c3218c22fc49758a5412456b64df42cb14722be478d78e97a50b0408b015123acc016e137841d69e7c5867f7bb31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58adf376f9576f1116cda60ca065dd56f
SHA1255cfd11ed25e1c29d7b13376aac2e8a07a21b4a
SHA256d2cbe019f1e32e152f2760a238bbd1798f14a7703e91c51b4cdb0ace118047a0
SHA5120a06be9bf6e9cafc10279b67a7147a0cb4c145747006e56cd7adf679bba24b2ac94854833ff683e2eebf82590d4df6d9a13f40b0723fb30e5bd97da5debf92db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58af14727a6aa15e63696330bb9bd2e8d
SHA12d6c352c6ca7aa116233e7ff8f9553a5a9a4d5dc
SHA256ae70ea24a7081d24cce82da70a38f2bb82b338d8ebd02feaba7841a4a27d4c1d
SHA512f0b6a89c571005e037f5b7df3b8987f53b71e01dddfb15d4247ee40ee273e0a7a84bd02778cc171bd43e9ad7392804c594c31c1fbe0e128080833bf971af6be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f3c290bfadea2c23f3f01c92658e0bb
SHA1c1896c85078f591aa4af2b1d193508c500c434fb
SHA256a130a154be27074648c5cf08f2780e2d850ce6a477bcbd67fe8e9be036ebde9a
SHA5122145f6abef34eed0331477ee0c79192fb533ec3cd119a16bfff241af7ef1445c4a106e3afe4653f7a66f181b7a1f9b5dc0d8a1832654c217a78cb4b0e0765029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5e96744016365927ad58cadf247e02c
SHA1e5ffc00865ef466889f0bf794ba4df93291d3f44
SHA256fce6e8ffdbaad4f66231df673c077e03ea6fabcecbb1924da9f696e7f9ef4b09
SHA512159438606842caa7d771b34bc67e2b58e6f267e7c3fb1871ec1598116bda46af1eb8c1a7abca5fa123fb43723c1702d2a21bc82f08708e1377151f85d28fce83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f0017df9671fdb5123e84d0ee4bbec5
SHA1c997445868294887983dceaacc726c26d27444bc
SHA25664322fac4bf674bb8ae34fbb4b41446e5130b0ddcbf9387bc24c7f0c1d4d2803
SHA512d1f2ebd7596060aee84f12b0381e55dd94b42971ef64f7d0626fec979c3708d8f39e2c4bcc1cece324f9623b35da571a8aea4b0cb7a7008896a1a3522ab9ac0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535a8c1418b36f149e3f118222e2235b5
SHA1d746d6456c317df7f82c7649241d6d1001acaf22
SHA25675e2fc27e5e0334bd718ad031426cfbb89c0db03dcb995c1e3391c414145d537
SHA51262eac587a99994518ffb00bc69e87f6e1d36df52dee897b3b2585ffe7a966385194211563ba0732a9c7aaa0299b8bcac5888c77e295d9a7b3dbd4ffb4e396007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53347de0679bd614a8dc11dda20cfbb8e
SHA1a30a2b0888c61178c1ea7cf3daa7ced336317539
SHA256edcbdae2acdc93979b9511e88f3ac9d7b4175fdc601a9831ca3ddf092cfdcc2b
SHA5125246063f1a52f6aca1be6cc98f2200447335d053c0438a2e133d4361b92707f88dae4043e4e7fa5cdb9bb7fb69f142c6d26b53f1d955ee427b54888b80a3209b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EOYL2MRI\jquery.cycle.all.min[1].htm
Filesize795B
MD55d8d79c3cb9af023240b1be6f5057aaa
SHA1df22980677b134e83d878893f7c7984e0d78a240
SHA256e8b101a7c7f64aad528cc734513cbeb02243c0af37930dc0f3239749cff184b6
SHA51266f432b622cee0bcc06cbc0f833de1471ea36c295b4cd93eb848d97e69c2252acd2fc8972db51ea35475a424f4d6cb5001325525fb04f71b8704eb24de1c4008
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b