Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
187c686e7763ca51c4276ed4818c1360_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
187c686e7763ca51c4276ed4818c1360_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
187c686e7763ca51c4276ed4818c1360_JaffaCakes118.html
-
Size
537B
-
MD5
187c686e7763ca51c4276ed4818c1360
-
SHA1
f74fe21d8fb5fa026c606c37479859a76b3b291c
-
SHA256
88b713607005a7fbc147ecc43dc149fe4138e308df03bad1da85f07e322cb3d8
-
SHA512
4dd912d88691c57f343ccf6e25fb9dd379fccf87f81f4a4b1429a2b0f6e24ebe24f8cf5ec771e0fd6ba5dcd122383b723e31c8be43e3056835c99b5bb4b82427
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e1b5033733300345854c535f081edc5c00000000020000000000106600000001000020000000ada17296f3afea5abf65afef6bb74de4a6e4ee34bd04f1aca247dd3441f0438a000000000e80000000020000200000005afd0fc838d2c26e55c5a35f47108f7d6a3a259a91f04780198404c0b4e2ba51200000004040d279a3c22c3ea85afbddf43bc4c94f4622d50b3b7e274d92b8ea980322b240000000e2c57434fbc6e9afc2c1a96fb063bf4b9fc364e1cc6257af96e8c44a12273e8784cd4e00f508d6e4a265b66302ba23eefe628d2258b92bf64dae3ffb4070282e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71DC82D1-34F7-11EF-9DC0-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7076604604c9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425704152" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1888 iexplore.exe 1888 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2380 1888 iexplore.exe 28 PID 1888 wrote to memory of 2380 1888 iexplore.exe 28 PID 1888 wrote to memory of 2380 1888 iexplore.exe 28 PID 1888 wrote to memory of 2380 1888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\187c686e7763ca51c4276ed4818c1360_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59f0d0a38c85f8d5f87cc38f7d8ede946
SHA1d973df94abd3b83b4eebe75b7bba4b13d50a1ed4
SHA2567c02db5f9aa71776e7055e26b0911e11f488b56f5df89206c4e6eb74e8cde54c
SHA5127db95807fced22629da4f82efe209519d82b97bb87c42e8d6bf334d714ff2cc37e90f950f677e3749c2a68717f407b46c1d2b2bd71a4d507da6f1cbc97131f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD507914d720e272232c6ea91277eb1ca13
SHA195c59ca9d0c37b6a1a9f1f3ccc9e5f7e510e3c38
SHA25624b891958f9bdf7721c0c7b6034f6326adcfbae488bb42b80f1f043f31118c51
SHA51251f9318535f194ef68e2309e1f42ff1694751a5c29b6651e44c2da42841ba4640a52ea7d957091e8a35517def6e7830733efb5733f1656d530368d49fbf5fa21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d6bf04f2185cb662e783f8573739ad01
SHA118cc1f4b1a3c6e2dbf738c3765fd662bfb5ad8fa
SHA256d626b29c9ded3ee3485143a5556c1367203e3cd7b55ab0458bc5221e3cf2b5c1
SHA512e0dd0360fdbf468de7731749964da60d5cce3cd520e79ee2dd6ec74756bd81eb7fa7bd3ec9067518cab59a400f8dc44b956d7fd1c9d50dd75f73c660c07c7fdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ba4de3f6cc5c522040870cafa86f2221
SHA14efc662918c404d43d28379b2214297ce3e015ae
SHA2569aca58744a0b6e9de0ed5bbef2fb38b62e0220a404c6ece34b5101dca433bca6
SHA5128b4ec3713bfafeebf42e70d7a8bc3b598d2d0361e67b6a50c6df415b0a1f5eafa94ba707daf10671e71046b542e30711354e16bfc90d8be4e88c7df07ac98b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5df9a02fbf8156208e9920089a57b5aea
SHA11a0f39771f3c4bac024bf0bcf591c76aa360404b
SHA256ba922794fcae30402327d457ad71d93c60add1207ae9cbdd9fede689722cc9f6
SHA5124c0c5cb03afefb2120c2347b6aa9b7c10b81d1a4757bc9193ed1eee59201ec39875d2132df27780abebb5cb895aae171e9fd3ad1ca5a91f95c67654406b5946d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50fbd64ec4b330b530299dca16e2026f8
SHA138eed321e97403bf7a87568086e145cfc5ace202
SHA25601808cf1460515ec04f90976ad5206a8f1bbd528943492cdc3ce656e0cdaead6
SHA5124be79560e768441b3758639fcec26ff5d36ed00e4e55e87d15ada1049a8c832c509ba3e69ac33895bfed9ab364a59f4b48a89c3b980040efa32426003dd80cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD535d346d664b0eb093f61097c7355e662
SHA1f40de7e2d2fd5a8278c20da5f6574b7ee74fa175
SHA256de083ae121c663978881bb1b11fcc2fcd6a5cf81eb487b5ac765858dca2657c9
SHA512aae8eba23f38bf192009fce909e3acee8c2b3658a744faf1027b9dd83ce6738f22bc2840b29b0eb5154a3189d8ce869dc112e7844deaac7661527e740e4ec0c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5541642427644850985a9679e44aee14d
SHA1a3f2007889dfe1ff25300474921160e45717cf7f
SHA256a9675834ed041e0c4d8344033d94bcba9cffead36eb9d120c1a2a9200ab9c2d3
SHA51258a31a4850f982b5a3117fc90155656b38ce15c534b66f48a48b0dc63da43f11049006134090bf4cd6e426e5e00aaedad6d4a4925277d3ce0e21069b43a7068a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58369644a1b3dcac1e0f437ddaff860af
SHA1977bff2050e7ee36a86316e083c8aefd9511fe38
SHA25682857f17591c58d9342b690fd86e16e46d3c95543a71150b940e8927e96d4fb2
SHA512670d2774eeb2ac2d4bbe9e4a0320b431748ebd596ff70e13d30969c68ac0b6aff7adf9230dbd8c1a5853edff2983157c7be3c6f8f7fd37af5d4f9c647f0f6992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e6d64cc3dfee8c8b9c107b4d71e1e90b
SHA18125c21c041f836aa6a1e37f0b600bc5e495f468
SHA25620442a4674edebee72298474b99e4b8b372e83d0fc1126bf42e1abcfecf7934b
SHA512901ceb26d851cd6dc436918b467dfad0b9f32d7a90108732a37761668d0b6561c567334dfaa1d839cbf7c04cfb9b3557c22595b8169bc279349680f5b26e9cb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5995a35996a3c7670211fccf543d0a169
SHA110dde4887eda9288a3ba03f55a2e023d36d5449d
SHA256e4d0d76dd5e42e8fe5060a6bd6a60dfe2380a8ca67007fb07cca1724637aca0e
SHA51227368de0c04e2b8fd171c30515ee26ced6bde890a2205425282974a0aa173c16c45a3929332a742ff9602ce28e703ff567e69946041fb4f097d8c6ffcb72d9ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58627997c22a58a4b6aae526ef21f7afe
SHA144d4891e933beae822d48ea6ed71c32d9115f5da
SHA256e265f7156d91954948c3b9061802f48f9a860396c57c5c7072ba21c95d72c251
SHA512123dc15735fdee5cc1280bc8bb78ee93d203938a7677a6383f45491ad24f430f621ac5c02efdae7ffbe318c446c8004227760145df4a888b2e9108c5ff53bd9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f68ea8c75c688a7e24b3cbd28c68fde4
SHA1b5dfede22f35f1278660c6ed948d93cfdd057b13
SHA2566fe0d51b2c49fd0ff05fe325d33a20d97796ada7549eb9fbb1072e16d98e4026
SHA512fcb4766050c9cccff0c7f32a0486f70814b042bec7da54ee8feff6d10cbfc90e3d14ab801d67ec23ea16ee52af8a1ed51f49d4bd90c09d5bcf46ed0135d89bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c1f1db00e4e3d2577029dfb9b3064632
SHA16d7e433562b21c6f0bdf7fe5b166807e9b016c21
SHA25669f379b881517a6911579f982cb98432fa96ea5bea4b319d4df51dde808b6da7
SHA512178482a0d806ce28adb689ad3eb65553dbf76ff5fbec0563c803f923d2512056f2b8f212e5cdbc3d0cf42728dc07bb793da6eed8cf6d4d1fef1ed6f005b85351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59fef7b116e174614bf5b35965b494950
SHA1fec4575e2399a044f2f51f03db2d7ecbd0ee316c
SHA2561a240660da148b97bd2c3b8bf8c3bcac0d48c0be7572fc4dfd3b9ba619a75524
SHA5125f51fadc90883ec54b1c49abef9f4b7af40290e3f9e7f5b037fe461a0b2702c12b836c5efeacb4f452a6e7caf000f4054c6ded6d7fe3aea2a6d7495a17ea752c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD530894c26b5e0f532cd7c7ae324adbb3d
SHA106c1b02f9947298a941cf5b076af17a32ad284f1
SHA256bb754b346c963b8e36079abc486b200144759addd7774efe9c9d4c59b82808eb
SHA512ce8ad29572b49cf6ced0cc55e6ab8474518f82f82bbedd123c7472ba2e42086becc6e082292f3d9a5eb3b743ac97754acf7428af1df386530596b50d9f7fb78c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD582ba90e5da18b91b7e473440996b11d8
SHA1bfbdddd812bc1e22bcb612374b245ed3bb6dad68
SHA256ac529221b2e9bc727ae8609376de48fdd132a8f3f6648b4b5d0e1bea9e0d7a87
SHA512358bb16fd893bdeb05f672c55d3f6ea379c6b43900982539b8a569b2cb886f66814cf742b886ac22a5fddea2b38d8b08f6b7124f890d3cae1c038d9cb13d7018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD574d5c6445a8ec6ebc4b1cc15ed1ba393
SHA1a8cf326e075d0b63b9d8fdfe0445de46c3e4d396
SHA256eeab173910eace65c20f5ea7eae5efe99a2b5a953aed70d0ab63d19c83e0f4be
SHA5121a8ec073b23e84d05069aaf398f205cfaef05f88601d52aaf706eb52a537b03e0ef2eedf4c4d9200ed52d662f0d4955f7d9c83f824703292d1ce68f627210aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5afaecd39792e40982ee75df13f93ce6c
SHA103530390ea983186b710ca597b906201d983271f
SHA2563ef90380700ac932e95682a0977e8b959f462a7da86f992ac505176fc1f2ef43
SHA5121ca0bd330aab85ed871a38a9c18e997624fd2d40701efdae2e08107f62ce9af17394a2426dae183b1ff4fbff1cc0fd81c0aaf0e84eda038d928dd441862f7f1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5889ff1790bfb7f33c850192546f97d12
SHA1ea4d9926bbe931ddede57c8b4971810d07520603
SHA2566f99fd32990a6e46c922a8fa5b36113be8829a1bfb46fd90561ce3665b7241d1
SHA512ed2ba42093b0e597adef501cfab81a23e3f3819d1c0ec3f8b79ee6b29ff8774c95aecd26d3eca85a8465202d0b409870a56e120f2869a4fcb397a7ba87eb3bd8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b