Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
a3813619e6f02c916d987826c4ac1bee_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a3813619e6f02c916d987826c4ac1bee_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a3813619e6f02c916d987826c4ac1bee_JaffaCakes118.html
-
Size
20KB
-
MD5
a3813619e6f02c916d987826c4ac1bee
-
SHA1
fc9f38db1d3638ca5e8bde3318e0fb717572a2d3
-
SHA256
e2432ccce00172059867f564a48295ebcd5db2cbc597556de87147b4c1fd77ab
-
SHA512
4bd320cf46e7c31005f18a60134d1eb031a171b2729bd4d244583a0114ebac63c365cd42444f0ed08788969c6ade36358f481ce401339359e71d1cf5883c34c8
-
SSDEEP
384:5id3na68Knu1+a8rEjMaNNahias1ua7yoas6P7aAyjzZaBkYQa5TNaraLeMJWLOC:ExLv4+aJMaNNahiaWua7yoas6P7aAyjf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424406659" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a80760000000002000000000010660000000100002000000025fa3fb322a96bdbdd2930fc68afc376e3fbca8d56cbe22888ddcdd0057f689b000000000e8000000002000020000000db05e7b6c3a23add45f2bf788eae66f4650695754221652bf789034cb7044ae420000000baa7ab9823eb4019bb6acfe7288fa69af76da40eaf4108643e5607d9b6b4f6f840000000aa26455e37b6eb9d0e43b646ed0a21309a2d5135f90e0b2eff0a9b538aa077dfa937a399d77ac3a5b38b545a4fb902cc0a6e9001f06f002025589ab95e08eaf8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B19E2D1-292A-11EF-A243-C63262D56B5F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d02df54f37bdda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1888 iexplore.exe 1888 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2640 1888 iexplore.exe 28 PID 1888 wrote to memory of 2640 1888 iexplore.exe 28 PID 1888 wrote to memory of 2640 1888 iexplore.exe 28 PID 1888 wrote to memory of 2640 1888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3813619e6f02c916d987826c4ac1bee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c257da95f316b475d9dc3ab972ba336a
SHA1febff8ec08174582cf0a2f12d7fb824245838cf0
SHA256116bc8945ca869cd4932345c1a0d20b7dd644e0a22564255742e46edb193046e
SHA512168f9fdaf2f9cf61cab9d6a19eecc27c5dc280dc5ceac351fa52125865a43a184aed010f58f756464f9e3f6e8e8054ff4246bf206da1e8b7c685eebebc1c96ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5763db0ee3c5f5a497ccbdcead8cc717e
SHA1f72c6d1b5c08b2138c41dd487661cd374b013541
SHA256118a161c97d5cb84718db4bdfb4e24b616592be252d5af16b1e11d1b232ae604
SHA512a4091ac17500c46ae2aa91061f72cc54321a5821f1c982df8d30056ec7d1ad7b5b4ce50cf663f60260dd97e485d56b5b5d31d0910a206edf2299c1542b73ff06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5285162297218415e920490485a234e11
SHA169d23acbdde5665d191792fdbc714cf76bdc06e6
SHA25615c9b48457821ad96693240cd57b3fc43516af30e52732e2152f814368006767
SHA5125b3a92193a1aedac960291086ec6ed0964c0d281da0df29f9ba54d389ec9baba4945faad7f1a790958655d534729afcb7149c96f49ddc54747db8e0097592731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bda74020fbab1a0cba5c50e663d7101c
SHA1a5ecf31bf33e39a77aa809200863bb6a009d017a
SHA2562d823ddce292e1216391ae4021ae5cc9e830149f0c53b8e03d93ff9556c24e1f
SHA512eb81d0eda65efe88e19d21a104fa303d3a509be394789b1fc973c00eb0cd473dd4e18f5d1c123613dc1aea3ffd21a442cb470638b77afb4b15a5124d41461d69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee30b753cf65b48249cdd40f53c9069e
SHA176d90c5562e5635dd41cb70e8414fc1255a9adbd
SHA25639bcfdae70247ac814a2b294f01f64ba512599812f76ebe01cf3bda347667c5f
SHA512aac98468f4e7d6bddf187d6805979114ba12eeb2ea9993c9cfdb7bd531c073373790e287febd4589da1d3d7e29bec7f43a135ba69b34856156df2214fc0df562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5935267ff8e7d50adf23fc6fd148a85
SHA1b02ca2ea85922b36cac04399d13b98bd002db9fb
SHA256f4a58505abf08d3e8362c82bbf79a33da362a059384a3ace2d411b05a0002b8d
SHA512ae1fcb96bf782ec4faff5c3e73fe53c0c694f118b5fec65d40b967d90e082dc38f0a35047f5ab73f136558f102120ac68ee9f3495aa0d032f664be1baf37f214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593741a31ff4c02289ad9908e52df8e1d
SHA113a3e93eddf5576cf669d8ea44c8a65c12351d3c
SHA256f4793a1f53e60b300f41c8c37401656b7d22d48abd6e8dfd3244e3bdb6afcc42
SHA51215859b9f4e789706b514cc4cb7ca5129a69cae3d06c65eebef78d90dece9c99ef916ae63909b2729e36302218e90b0b6dccb962222932c0ef97bc17c78fed3ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b7e3ab77387958fd4b215796a37ba78
SHA14992c2504e405f36071dead37e4aed7d175ad0a8
SHA256366f964b3fc192ee794c45ccf420c6783ff48738bfd35356375121f1c02e2e98
SHA5120c81518de3d163ecfabea62d16e31ff6c591d2fac1b86e6accaa7d0081cd182e4866ea58d3f77256bae0b93ee7c5bf2d00a2ea303954c54057d31a4f618947df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cb223b572dd205dbd79f4e09b0e3b8a
SHA170c2ff096de21d5261e7daaffe033511225a2f92
SHA256b06647c2b13da9f4fcceee74e9a1977535dd06cf49347ae26e1778d6f5d7acf0
SHA512b64d08674f2264c068372a1453b9baf21fcb604209d3e255ff95c0b3fddf0ae5ee376b20d8cf521436f850e8decdfc53102410bd0b9a2970de978312e23e19ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573044742c5d0c606b0b288a92a8eb970
SHA1686d36880327ebae6f9e1243324955f3228e32b7
SHA2560557cfea80e5f92406807ac51db6207d95198268a198b45934b01737b76617b6
SHA512f506aa93b81f846403faf5c1eaa46861342fd376881905a1b4ca6d034aab22168e6c3339e2be4c11761ea2f6f5e99e36fc4698a5eab45d23a458555d7b5ad42e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569c3463bcf9900250407039b004c7b61
SHA109b8bf2d1db3dc9304fa99a3325b662afe970203
SHA2564415619341d89e5a7619a8a22ee6731028ce9d5af15f901590664e54173f4fbc
SHA5129abbf91bb80c67821cd17cd4fc5d3a9ea4194bfc1e1ef6b6e6087772f2f6519c375d5547b0a8560c19c00f35b63ef3090a1c6f8bfa9596d5293a705b502484cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4d2529519c6b0e8b57f4a8ac0de9a00
SHA15befdb5188a82f6be2a95329daa70262eda2e4bb
SHA256cae03597b099e33911304db7922a0cc92eb201d24b9e8bf7e2804e91e416afc1
SHA512aa42d76f228a85637acdc5bda1a327d50e72a1eb86e37549fcea1000f99055466d756afc2447a97a7613c1a1f08dc394c11862a95537a4275ca8d97d278f3963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2dae0002ebfc7becd1cb717cd30b7b4
SHA13528562892d6853e6d0b9af74375a5fa8e685bd4
SHA256f329732df069ff83d5853743db93e6ecfd9dbcdecb8c24fa7d8f74a3d091b6e6
SHA512646d8b68d3fb846b166f1c55e7377a7260fe7bb73c645414c5e6e45765e059b04dfcd7e57a6da7053c5c9e6e9b2c03d9c626205a8a8ea274185221e988353e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f85a5c38dc18911f104473dff2e1b8c1
SHA1b62dadc16dc31cc7e7b458c865d30c7be0852a97
SHA256fcab1154276e8789b49eee96d2d7ffbae2ba4927683c41747767e8c219eed5a1
SHA512645b61a32c11ea72ef308d2216d42d7afa66cf02ce2cc994dc869847928bdb307129319b18781beff184e530f0194cce428f3c2f0dcffae40c5b6028c11a7fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581fb0e62e0eda7363067f4165d02a7e6
SHA17f9b9d165592f5888def4b55bac622386cc4feeb
SHA2560d93d5f57c8ef3a652f3d784ea2c63f80384e9eec2db2ed371adf5808ee174eb
SHA5126bb8ad59cf24975dff527c823cac0a7e766894b541fc3c39efaff1022a3027cf5c653f500dfc879cae5d7ec84803917703c2a4c48350b459b734b287b31c1f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea9433dcac665ab443c70135685664be
SHA1262043c86abfb265e74641456db9e1f5f2522fee
SHA25605f3d3e97db128d6121b1168a20258b0822752ae0030d9d2fa11d7b143bf9f17
SHA512e409a7dd81487649531243bc8a7bb6a133b483934b2152f5344f76c5bdce4e15c2c977139f103e056131e43e1ab618732998d307a7a1f313031be0932598e8d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520fce76d29fd6d185c70b6a6925168b3
SHA1dc993444784b505ce5ded3a79516465922d50798
SHA256af8c6c767a62f47607da012e488b27887ce68b804944f59cd2a077737eff7876
SHA5122ef42d4f745318d489cf61d9ba6b2dddb6b85f6687c3e85ade212c13b354b57f074530e55192c6dd9bf630d58b8fe8024ac9459592213bc620b163e0e31f87a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58405be84d8becd0a5565d63748ebca85
SHA19b2fa50d118fca68bde04d493e48c21b39cae6fa
SHA2569f04cd4371ebd754c81aad18650a5aae64c8122ba9743b73eb2707541e106672
SHA5126966b87627977a12eeec96fc9e5933d64ea5f95306a93562963e10176c54a918a3390b7b92c4cd907779905eccde21913b00aa2df8f808ded1f27ac5247ae1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9e32641afec7e38a2786b626f043897
SHA1657ca0b73ab15e882eb4ce8adf22b8227bc2e1ac
SHA25643213eff63bbf42567235072b94ef26938cb49e9546c4c787d380249bc2b3c4c
SHA512965ec4ce170d2353fcaf1cf942e35c359f7740eee30cadb6a0aff43585958b8264ff68ee117fa7536a77517a8526a63ad88492e4ebfafa151c657d5e475dac77
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R3JK00ZJ\install-talking-tom-cat-on-pc-270x100[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R3JK00ZJ\superfish.args.min[1].htm
Filesize124B
MD57834787d28abad561e20ab54c06aa707
SHA112375f52400e42a9ac3fb14506a2c7e7bdead4a0
SHA256d5cef4408126ab236cd079e0bd0b16e23944d342d56418471707a298680114d2
SHA51241a0782f0cb93a701fad5c0996aa84e523b06fca7a1d6c6685d23c916de28283dbec4249e785f364c48957a7fc8e488383bdbdc0066df7fddad23b1d6a89c0b3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b