Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
065b9bb0dd244b6440fdced4ec3901ed_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
065b9bb0dd244b6440fdced4ec3901ed_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
065b9bb0dd244b6440fdced4ec3901ed_JaffaCakes118.html
-
Size
213KB
-
MD5
065b9bb0dd244b6440fdced4ec3901ed
-
SHA1
8f90c7f9e074263851cb21ff3be4f62f12dc8cb2
-
SHA256
d9833ab27e3d25fcda572f9ae925b9c10e5067e99698b84a459956bb46062d6c
-
SHA512
744d0c165232e8e91009872b17dff778e778c9f362f68d4b14b30f5818775d5b57d376e907515c0577e9163f788ab2282f98b3ff8a7db4144384de863eb98aa9
-
SSDEEP
3072:0rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJz:Mz9VxLY7iAVLTBQJlz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60A7AAE1-800A-11EF-AA6F-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705b7d361714db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433958625" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000db99f5360ed44e29db5af398150617edc7ef40cb75d87ade43bcb31c5506e25e000000000e8000000002000020000000f8227df9d49cf389be4a74d175bd65377da6081a19ee3f026ad9086e1e47515f200000008e6da0c52ce2ce19e420fed3406959ef1541361b8abda1cd4dc2fb5e2366d854400000005f42fb7760889a9437c77761006da985005ce29e4d7717eb10c27f002c409d49a83ed6d032a5d313a6fe9e61c9598b78f3ff2eda7eb43812f123d0351c5b8450 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000007d3fda6f59d085a9b87c2e30c3d09b1c84ffd264c8e24a4e4bce5901a74858bc000000000e8000000002000020000000ce3fa7484a529b394244f31efcfcef6c45a76ef9f72871f9f04f4bcb22000d1390000000a18496083d491c823b74e7479cdff43531218829152540d8a0a7846e07d3c0d9c2bd95fc855d22bb0868c39762ec3b5dab8e9f13dc8b5a8e4a965eb879b8426b5eb094fc594c4edaa8e537a62dd2d986250a70e2dbe2e6aa2aa0353ce9a6d13ad7b8bf18419536f1d3bf2fd633c3494f3d4a414b27105d0c60c7ca70f658799e770e1776f7e6c643ef5535a6bcdc761040000000323935f56095cca0b5b56d9f61644b878563421882abdfab15716fa122ea22c086abbc8b234c17a8c3faf607b85f5d84582d87d8076796ed94db6cdc04d676fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2184 2528 iexplore.exe 31 PID 2528 wrote to memory of 2184 2528 iexplore.exe 31 PID 2528 wrote to memory of 2184 2528 iexplore.exe 31 PID 2528 wrote to memory of 2184 2528 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\065b9bb0dd244b6440fdced4ec3901ed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aae3ca6d337f8ebdef0d8f9788aa050
SHA1eae861a2dcf392bc128dcb8feef76ec9c46c144e
SHA256bf8e6a5b03f1416686dbfe6e22e538913690c1ed40b707a2e1ea986a5d736ffd
SHA512ba2f647fbb92e2b1c28a1f0b0b10a118407a103c90a3d56d5ab84ca490674ea834c6a522f4d68a70b1c3320f689c8aee919033d937336190ab40e20521ef502d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe5a7fbc3071f35b3284ac0c402a4099
SHA12c46271b5cc40aa65abf0502a5509d760ab9bd35
SHA2562dfaf38f15abbf91d2161f9da96254fe412674c8b8d19f1c46ee4602101399cb
SHA51289393265ec963af5108327227b87da782be1f67ba559f2e5b69d1796d5de0e64c266e1fc14a060fbdf353461112bba678035763d7d014380214feac9b5630999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5106c3a4e3fd83040f69059d71b73cb59
SHA1d22fabc8289f26722dc5e9a9ee02c623faf0517c
SHA256e7e0c2fd3565aec82003f95e0435375ba000f37484438349bb9680d80ed64333
SHA5126b0861694de027cfad03380a06a35bbfc8e0b5cdbf9af49c3312f5475ab6877aa9576b460fde5fd1423e72fa1124996d18e194fe1c91e5b83ef2a0f09dd3cc94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a168c6d3a10d4169837765be5e7aacb7
SHA145a4075d73145e339e728e0957819807fe969979
SHA25652b27ce5621d3f278a55fa9b444116a21518f8ede39505012705b6eda45677bc
SHA5122fd1659d170d19dc3084fd625e8bede2bda189ab14a1cee94c57bc742e937915cf4e721e6563dd81cf10667a2187046db3690f336a5c6e183327284c3e335185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bd7481ba47bb775356b8e027a36cf68
SHA1f6f7bccec71be803bd30b208f93af0a6b6deee95
SHA25620bcfa298d64f56a819bd824564f089adfd4d635627f6aa881f5d3607cf4eae8
SHA51275d8bc784cf71aea6857bf4b9a24d10ee537037678d23facd54b0916a1271cd4ad02306411112a81ae24e9266f79724f161256d5bead1d515c19e57a7796f207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b1483c52a0ce3dbd0ce3d5111811925
SHA151dbe30c6abbc6e655189e3f5a2cee3c9f96a062
SHA256d0282dbed129d824520b185e37f52cd3e8d5d27415a91db3dc3e8fcbeae9b8d4
SHA512fe898fe8ca6dd0613282878dce0283b58ae681b95862f714845e7c763092db5b99018e26573490caeaca1d68bd7cbd0341625b1b8ca8e36ee14ef09d8bc176e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5632ed2b614d6964581bf57de5b2056ce
SHA14ca144a3bb66017cd2b6ce70715d30415daf1b1a
SHA25667f8f3dc3acb07f2ce352587121a30914efb09677c83ff6c38c210a727920f83
SHA5128ca9071f5b3b3e0483ec38123a6a0563a658f63e20b54ea54f11cf2900c53662a7734c057ba24c720e44ac21e89f2bc2ebcbc1d870df7dc563cd239eca83c0fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573c499275ce8f6d0d85e52ce6acc1c9b
SHA17d6afa5413047b792af6fbc13085aab7ce58640a
SHA25645c6008dfe4c1839ac40833399ca87ceafaedde786a7293385178bbd118ccd4a
SHA5122c3fad16bf6b82f325f7cf31b9f4376a2a1fcdedd457e01843119e61b2a19560673be9b4efb9e280509b4f1c7b8e6c661de1bf0788aca98f0b835c51b80e3e0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c33eadb8f8bf6c41a1ac4afb28d0e918
SHA1af25287608ebb0a9768f978f92ac2f20582ecd21
SHA2568b57534b4f7b361407bca685133e72360f50c9a709e679c46e890bfa4b7b9450
SHA512c4d0c33bb9de95c1bc2697139c5ea576d317a5c8eafeeff8b0d9485c869e9f5793031fed1be4f7e34739d5bc09784d7ae0475b664141e4543e7d98c8dfac61a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d753fe9c09bcee7bb94bc741071c2793
SHA1e5edf3f3a8b1679b1e28d506b7db67db87b56dc2
SHA2560d44d9e715878f6559f9380d79af3e443a21ad1d45da7a899fbf88352ca80589
SHA51290e0c365d59d969f8b3a1207d3ed366775264391880dc518daa7ec0541ac271707a671f1345c8cfeeed4a17692aa41c88579225b4198fa8c3cbcd4a7716e3a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1900a569747a3b6e19f28bcf8255344
SHA1695618f1c586bf2b1144da3cd54da641a28abc3f
SHA25637c77917035ba3a58cd475b7d3f336ae7632d67601e0ed81f3ba4c38c89920ac
SHA512e4e405ebbafb57207340d7352611d84f59b07648b79b830dd760d1bb3b28751bf49a5578f315895f52246bcdbf33d1aa896401ef57b982968c240837c40edfb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1d0704606abf2158891faea40d19393
SHA14430390ba0e7d59fe8f405bb5b00d5dc00d10eef
SHA2566b9dcdae125ec5e8228e0b39f5863b408516236095c8dbbb0a123bd947036ace
SHA51222db865d185e20190b7ef694ff17f6ca8c9dcb6fc31afd2e03a782714c3d85cae98720f031af80888da73c8c2d406156558688178f704318e73e063470ee09ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e67911f79402c0cdd1e0b4339fb2340
SHA1353a9fa59210b43328999a5b1d954fecc82681e2
SHA2569d05d9b7ba349234168e5ed4a0aa62503c19e3f24e4eab7e4cdbb31791490315
SHA5124b19229f0c9bd98b5dc83a5b8f1a82b33dee8122da7a4bee50b27912bd1e3123db2f138b292e2f81d6039206614d322894a6b6e579bd41d5e772230899f8f2ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ada11ec1e022e2f7d9343332f141753
SHA176253ec3ebab31b159055d78caccfbbae2574d83
SHA256739648fe3c18811d0ef0fa01dae6ee674c5489efa2354db01af320c1b5a8dafe
SHA512dae06f52bb08f19e4ea282a883b67ea3dcd0bf8f794236a31185b9e1beb7e9e6ef3539bdc420a690dbb5cded5d02ce44f7419d2b6ee84b6c38dd13b64465ea28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591022734c7443f84a8be2bd2dfd6429d
SHA1cfde907cb8cbb86ae9e1db377d6f597f34edf01f
SHA256e53217bd4337755c95711fb7d5011b7f6e5a0140ccf22c7c6ae9cc9eaaff869b
SHA512bc74a9a92e4f77df8240eeee29bca6e0ad8af650ada4615b8aea7d56ba646e49c3bd3195d921285362dd3bf53592fdab822de389093cef100c51c8c9d3972793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515ad7294124521ce682f38c9ec98b0a6
SHA188bd0a05d66a0876273ea21bd7421a2fa2a7ce28
SHA2565eb5bbafae4b9e9533661ec755042811e2f85575605e29069bc7d0b793ad43b5
SHA512a2e7f24cbce5b727583d444073f2a2ab92e1f5a5b19e9e7b1ab633d93372a0324e734d934d74e885caf3c030b29b1d5440d742ea76cfb263814fa4acf6ac37f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f4dfd8a92ac2f4b317a5a0072d966f0
SHA19febff87c8bd2b053739db63918b0541dbe2cc8a
SHA256e784d8af394696f254533af6cab1ada0eecc9bba490256ceaa69b898c3124fd3
SHA51256bd1fd810f35c0d386c761827ff4b8eb09433a0aa7305b8eb7d48413771e0c9af6c1a1abba38f29ee42327c8ae86e3b00d923e50c6aedf3e50e0c7377036e4b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b