Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 02:45
Static task
static1
Behavioral task
behavioral1
Sample
a394111b0c9f0de19f331b6b175a706b_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a394111b0c9f0de19f331b6b175a706b_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
a394111b0c9f0de19f331b6b175a706b_JaffaCakes118.html
-
Size
15KB
-
MD5
a394111b0c9f0de19f331b6b175a706b
-
SHA1
f0f063056e1c53627e1fe6b653f943e3d3728532
-
SHA256
8938ae8b22d3ad6e249b594a47062d9b0460dfa3107a5066201dc6fb4f0e052b
-
SHA512
3ba3516869f4672451c4a08d9d70a97daa05e131b5b65cbd426e7f8cbb938e01c071f355f25fb132fd75393d859db0b048f4ae392b7b2961c88a139de97237fe
-
SSDEEP
192:cYrR6ciZpqFvNRVccJMFrM4NWF6Tgxbq1no/M:cAR6uF1RVPMFrBEF6wuu/M
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00af3fd23bbdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000dc8fafd396f96dc7ee8d836f2ff70ef6a9358c97cc531d79880889e4c2ebc958000000000e80000000020000200000007943a9071da1cc00ffc81b32017fcba1092292a21a35d1b85499c37a946da939200000009f4547d380183ab44a0022d1c838209c919a161493b0496b231ad4da2352647640000000f6d959a1c5a4acd49327d633e77ca3b2ebe89aaaeb3393f9e02db9e6f3b81439ec1e5a512d05f32b9ad169cdaeb971b7753f4f7eeddf4b397232bfe8c96115fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424408595" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FCF90F71-292E-11EF-8144-CE80800B5EC6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 1420 IEXPLORE.EXE 1420 IEXPLORE.EXE 1420 IEXPLORE.EXE 1420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1420 2240 iexplore.exe 28 PID 2240 wrote to memory of 1420 2240 iexplore.exe 28 PID 2240 wrote to memory of 1420 2240 iexplore.exe 28 PID 2240 wrote to memory of 1420 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a394111b0c9f0de19f331b6b175a706b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f0892c237d3dd262a66982670b6af3
SHA18f3a2b27cd5f7343d8d0ee5b40a51de34d05a5e7
SHA256f234ca747300c46411302e0722ac25ceb3f5038a112bd700eb4526047bc60bd7
SHA5121fbba7610b99bc0e9c12ced1a4824d8bbfd5e28f6ceb18c678e09c3f1f3b576118866801653e772b36867e2f2d381cf30d51061b2372848903fa7e1eeaaddc00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0238727606372db19a53b316462809c
SHA1e3b7e568e7ec1a0f7183dfc2b4f33daf0c956247
SHA256798b7361540ec4f429a475650b570db0943929f5561e78b6d30c5dd9af3f0167
SHA512798a10ccfeb9adcd630ebac019c0a63c6f045e7f53d4e4dea4cce47a629b139f6d5bf34c537f0f5ba08d2d8f1c1e60490eef51f0d0220c463e6a5a5097b5efd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587da6e2a93994a8b59d4230835f3e58d
SHA1f4a37e2c98f805d3a3a4d3d42012e4e9fe4630bb
SHA256bb6024d58e49208716150720e2d8d60130f4654bc1cc569ef58e28e347107ad5
SHA512135679cefea0a2c326f43724dfc35237ac1ba812c326984184324e3bea8ed633ee94661ebfbc7c09eef48f493abfb821f08cadc91cf05351d6815627610c65c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541274bdf7803706b3ff19aa2f6bc4307
SHA15197004dc8e6b787e236a97cb9063ef77b81830b
SHA2568aad92838141fbb3cbda8dd51c02accede8e4c609a7cbb449a93ea8b09578fc4
SHA512523674df8ee02aa46d3e9a8838eb278f70970de2c918b2dbffe9e73652b5fd360b3115c75e2e5c84f6841fc8b38f4062ea5e40471e10a479c9d65fa3f1bb2ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d834b18ef17201554c106d3fa598fac0
SHA148c90d594444b91716847c8f79eaebafcc6398ae
SHA256374b2c562c0ef9afa050886edf813f9e5acb006f506bc740e1abf642900dc2bd
SHA5122a421abef94beb421792ef85871b5acbdece17227b7bdc9ff3284b0d289b96dc0873982eb7c5742bb89e9873a30ba74d774799f0de5c8ecdda86ebc1d716490f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a58e6dd68b2c19f9302d46b2e3e2f716
SHA17a2a2a8c2bedb57071d0a2bb5eacb5f30695bf98
SHA256a63e924bbe31acd2cde0ecdaf805c471c4a0fff0f54f8f48d95578c7f19baa9e
SHA51209e0aa5ae2637a0f3ce5b731f231880f53e97096d0dd6bd698193e1dbe5025359a7e095751db14ec65cbb14dbbfe4a10a1c2540681c9946d1a692b00015f0081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eec3f3bc119b4c7b515992efff483db2
SHA151d59ddf9a350a590a8b5f3efecbbd116db136ff
SHA256afb84a59e543ba015174c45f553f7a6d47c3aaeb03f7f1ef8dc618d7f759451a
SHA512873aa7092dd6f00ea7a15fa439999ec83bf6316515a79c127334d546e56dafae1866f983f8797a7ba9ca30b695e75631884f60d892d2d1ba69ebaacf26f3f2f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c3eb78a49d172c7782491fe2386a407
SHA118a40e1035bb2be576990dff3198b854f716b812
SHA256aec2296b410833c08c593f90a2e967019583ff28d6d728f2e7d2d821a82bbdb3
SHA5123161658e3486f99c8ca6a839241a2b2da7c77b8d1e7b0960618fc8ed0d2a3203c113fef799aa3319e310f2bf60d26a248f575d54f8f6f53481bc7b801de8b0b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5825041798efca35d1123ff92ea636c72
SHA161463b3ad1cdfbfa0c7cf39aa72c604e20a56155
SHA2567236d79a275b629224659e2e2a7c24d06204d122814253552aa5ddf2cb4be969
SHA51244c58bd40294b14e4439738d14dd78c20b37f1750430ad26b7fcccd61981260b887d28029a5a77058ea7adc8f5bb333809360aeec89079490d2d49a06ee6e0b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bed9b53824b0669548ca361efb4acbfb
SHA1aae61a11fc9573529f3eefb2327b44702c4eef08
SHA2564a51dcac7c026631007d161450df1f33afbd5f4527de494b294bd14a91a415a5
SHA5126e628991efe9caaa6ec24163f7f293d774fdd0ad81a30f9ae06860bae43c58677cb4651789da621fc02ec856aa9f7ec360437108fc9161ff637b648fa45741bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd64a71a2ab66c304cbde6fbabf4fadc
SHA1a1b2f4dd31fa38c81f1ab2c134f75a0657da6a3f
SHA25625063e9c8af427a7c30f9be0319231a196912d6394f840bf0af965c83b4932b1
SHA512d9a6ada8685a16e3f01b4561bafe454198db332adb0fd1a50c7d192238b656cefae1ae827248755db19177483d015563deca7e326321a79a4543bb7623c190ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dca33187b75a76df7650b4a9f08cbd7
SHA159a74905298fca22b6e89a40600f02fe0913317a
SHA2561b7e23f29de5e61750ba6532c38933ed06eb52a6af04a1f7ab81327b5c71ec2d
SHA512544ea0e8782cd322b1487163580df30e3b81688b7226b19c6fce1bfb4c2d62555485d5a4edf44a9d1de1da6230a298c17fca214e307bff2a0a459de21acef550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544e6da26783916e60ea7f98d1d353f7a
SHA19c33cd040e427c7316c866bd3acb036dda83c6b4
SHA256894d42f784b6a360a64a702db0161b5ffc97e92ff0ba3c4a71dd14ac0a509a18
SHA512b982c2516db8426e86e65035177bf7114fac5501295196ecbadd47afb11811dd4fad69cdb819781edb5bd8615709e0cfffdd22b2709647d263646befffb86323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f101585c2672fa1c17d6f0fe086a6db
SHA1692ac5ea34bf3ef88d14593c75aecd17e3986ce4
SHA256ad1e4452ec136f29063cf318da9109e40d9d65f8d4bb7976298ab21cee3f8517
SHA512dfd13eaaa962a776b5be8a791bd9103716a0b8a6becc9464e46503a78670cd74efa12c842fa8b670184bbbf7b73c8de1ab9aa828835de39e3a30e356a6ba1fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535d925ca3a68e0512ea69aa29b043d9c
SHA163f4b8158bef1c33399abcd3a60c88de6bcf3046
SHA256ca2441a213f319283804bb9e95157d93abd949dd799b6a2f222882b0c28f2485
SHA5121a08f51f2d5d55d4589676937fb04d682aa063feab837116eeaf29c9d7880424cb1414d2d347998a6304eb678ffe2a020da0357d846aa919ce58ed3313a8e029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5592a5138b9d79a00cd419a52398ba95d
SHA1cbad9b90cc03a8a46447d90fa0dac5bf8402748c
SHA2562e8f221e2427e22a58c32bdbbf21824fe4535b2de909e909835fde92967dac09
SHA51209f8264ea90046b508ad56ad5a65f252d501b0a676f052e46ea1adf078f5c30d748cf4174d43acf5d03fd9c481cc7b670e6d0f7c7af535263cfb55aa7008ccf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1ed8e5eafdb09a143d99962a2936725
SHA1be38a9c45d93fcf93c6bbb1c50f2d8f0647c4863
SHA2563b60b84b2b071e89af63b3c406d3f4515213aef9386b32e0e9b894ff57e5ff4c
SHA512f2a3ae85f4ed145ad8fa4573e9821f55893f203fe404ea8e958030ce483510c998e5185254e396b47c2d0b34dec0bb7e22ac0116336fa3dc62b8b491fc14150f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574ad0ec23e28c7cf384de942aa7f689c
SHA13770de8efda0bc408ec8dd4255e10c94e0579ff8
SHA2562b544d4cff700d1824346dc0940ea856ff597f5510b498fc35dbf93828097145
SHA512cb3f338495c17f7c08ed7513d62cbb0e9831ae18e60eb3925cdff594c027bd3a18ceae3a72b76fd0af0d0c412e46a6f6a15aec5788c3009ba1989d775f02ef7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ea3d3f81e68569f53fe7ba61ee4b862
SHA11fbf0affc750f409b3292f6ae55ea2076e9a60fa
SHA256049f3cccccf3c1401e463fbb9c3de8d6ac9bdd236906676e56d949e990dd923f
SHA512d08e4790eb1b6f5122e848a0a9748b4aa097023108a74fcd010f5c28311f4c8c01a50548cd60cc9ad636c0e737906ba2f4ae265c54a7b8bff6b524e483da1ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e12ec3736e6785f0bb10a60e29040b3
SHA1c95d0d18aac03f6481b5f2df41043b45312b9d6d
SHA256375743ead6e50cf0ee2c7864803b468716fb188fb724788dedb07e34991c93c5
SHA512586afb746a1dbc73b1bbd19b2dd437de5dfff628a6ec4d6fa5bbe6a771d4d006d50493adba1cb5fdc4f4e2892274524913a04b89df84328d4e10f3ddef4c2f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579167fccceb173317bb07477cdf58faf
SHA157906eb0d29af3abeecc597afededfd538a531c5
SHA256be420dab9b0bf06f8501967fdfdf149797b49566ecb345f199d1e27df915cf3a
SHA512c84ecae46e2e1026e9c3afea26f747d4339dafbf36129d4456d253ba0055014f4dae293af1e7ed93113e8784e2a56f0e5c452b0c42b6b6acbde4311822bae5b6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b