Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 07:39
Static task
static1
Behavioral task
behavioral1
Sample
219028be6b82bb950d9324fccc64d8dd_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
219028be6b82bb950d9324fccc64d8dd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
219028be6b82bb950d9324fccc64d8dd_JaffaCakes118.html
-
Size
10KB
-
MD5
219028be6b82bb950d9324fccc64d8dd
-
SHA1
3c5b0f6f80fb4a2e88721979ef5cf28613288a01
-
SHA256
18816e0e264de19ebd8eed309b35dab030f0a8b0ef2d849bf2b28ca79e3ce240
-
SHA512
193f0252d6eec10797fc74693fefb072b233d4a9cf9e94b01d6c830f5cd8861ee07451c467ce6c0b8c4da74fc6337da849068622c6e2cedfbe4bd3147ee0934b
-
SSDEEP
96:uzVs+ux7VcLLY1k9o84d12ef7CSTUAGT/k0xpFPDiQkg/DkyxZrLkKlVHcEZ7rur:csz7VcAYS/BOxSg4yr0KPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426154220" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{574418E1-390F-11EF-AAE3-46DB0C2B2B48} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7b80449a2696046a5a81915e196ab9d00000000020000000000106600000001000020000000ab03f2ced703094102155fe71c5be707f2c491d9553e70d49894c21aa186fbac000000000e80000000020000200000008639a5bf2843ac591ff9f8f9fa107ce3ba468ba1d691a66c25a8dddbb7916feb20000000792c48c5a400d793ec9b0def0bf5406b867c7e3b9f6ec649161824d0beff429140000000773b6b6a282f1625b846e9aaf82de259a30813f1ec5b045afd0789c53854c41800c7c9fad0bea46afd7ebe4ab40292606b65b422071a7bb10f70159ac88d336e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e097402c1ccdda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2852 iexplore.exe 2852 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2172 2852 iexplore.exe 28 PID 2852 wrote to memory of 2172 2852 iexplore.exe 28 PID 2852 wrote to memory of 2172 2852 iexplore.exe 28 PID 2852 wrote to memory of 2172 2852 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\219028be6b82bb950d9324fccc64d8dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f452a9f6cc51c615007bcbd109c4d93
SHA1895f9d01f91567087c0b9c7ec5238220be6af845
SHA2565239f9dff90390b4167b0b5d3a23abee5ae698459b13d0a89b5ccf17d43cce32
SHA51240d864bc668ccab70a918e96bf7f10f00f9f222a5e499872a678246ff695ed97e34a9dff6376c22a66be8e468343cbb6d830fa75b642dd388f9323c6dac7fcc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5504cd3e2bd352ecb7e11830a30648a22
SHA1cad1c24194916e2fb9921fe051d676a2dbca29c8
SHA256135776195e256cf9a693765686fe3c91d9f5d9e40946d86d1caf144c3bc62b58
SHA5124edf11a17ac64c12177f26b9de379d3561e2cfd41c6b1765df3557c7e8ec0338a733baf769dbd3a239ede1bf295e824199022a9d01633522dbab498496e2d1fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e8c8786f16e59a5f4bcf52da8d4a791
SHA19139f760208053c28c28023ff06783cfb469e2d2
SHA25600bced01ef49599bd48c0a6921ea3f5833bbf4e6c69ddb869b211d932271bb4b
SHA512c84972915b7464564ebd9d1076682bdd9dcdf27093b658bbe39c63816520c17853a5fcc9df264dbf515ff543cb6276d94cc245ef640774896e9e67a134360691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e0cb38d1022214a73a3e57ae162fb66
SHA16175f253a4be39cf632287d8b528befcd96f024a
SHA256455d0f666442dd61ed388cda35da1a248cdd30a54f4cfe1756e0d533a4ccecea
SHA5129bfa6564071cbdc034f8805b165aded5bc0f7cafa6fd1afba38ed21e61d3929dbb5f1ac9abaa1b438215453d6ddda5a5b60dad93eeab1e748ec519027ea26b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5386fbce535001313706859d9acdcefc1
SHA1075a3503069b30d7c1caf4aa547c57517a360df8
SHA2568f87fc508b994f0f1cbbe171d3c12f607015bb4218942b8d8a4a32b283c2ff67
SHA512532601ad10721db15f4622aaba7ab23caa6eecc5859a815e7857b508c679e69286b4f141e6d522a2e525b4c39826c0f3fda05a67c0477b2e7298ff42130dcf6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5439789ff38259ec2ca26863cfc08b080
SHA121e5404856cd736b19011f1ef3782a13ef3bf8dc
SHA2562700ed584cbf28f6f1d3d6d8fb1481eb4b070b81a9b0db90b8887aeb4f298f43
SHA512343e570eb0e9b8d390577fd8eea7b4d93e683e419204347c0b2ca38e8685d3e7e06ca65aba891fa6df027527bfd1224c5f43fa76845d1f9ec83855eed95b6db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56391cf5b0d866349aea0a7698e96002e
SHA18d78c7e1cfc87a12f7240e7759220009302928e5
SHA256557fdf049cbc8b012f6be4b96200b52310f6cff8196df1d217997476d1284877
SHA512cc4787673fee64e47c489944159bca5292f7fdaddcdd9b4edd02bfa175d587274400031dee3d38cbb338ed7f3eb8f6214047e55154f9232709bb30f470d98749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538c3c3593f4be2a0f717d7a71947133a
SHA1d1d43e804f7cc7c7cd50daca81ca6ae5f62477e3
SHA2567f2858ab4da453b80677214838f0ffce50c212049ffd169821ab949043fd67dd
SHA512dce8c2b0ddd8bb5204b4d60a07af90c7e0608db44cd01aadd8dbbd5e4f1e3035128e0c13de7454313a4b140b13d97f73ac93ca658ffd38ab521a93ef7cc2caa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bba059e156cdd69ab2037dded562d63d
SHA19c2053bce60d1f60c98b082d930b4100c5fa7760
SHA25635119711c8b782a74c22257b2528312f6f5b99f56535006c97c278b966df83d3
SHA51266dd23ee34335b9c3e4e4fa14b5956c6c0a7c1607d0119f52cf5dfbe5f7bb87f424e2383bf0f7188e77d8287853e14cb5919f9d1ee0a33eb2c4133dd3cec24e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513186d02944aad15da78eae68e86d829
SHA1808ac666611cf379668c7c2073012665a6b80a28
SHA25641b1e94f5ec4fb0f6892c4bfdbb28e53ade8da3d7fbbf185a9dd7bda9305c943
SHA51279590dad6c42ee2833a7356c643685b82919c355238479cda02a72e78dee67eb2f8321fe01923eb45bd14606572fff2459364feb70ecd7197dc99e49f1bc84b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53635d78ce0725f762223a79c704132e9
SHA18578072758a02b129ddc0dc62e07b304e31a4e4e
SHA2568f7ba9e6b45e82e9c39c94d96c0960679351490b9e584bf54df64fca89ae848e
SHA5128e66bb4b916a4044590f6c307a4e8483c83c88b7095abab886a6874722f096e05bffd3f93a13c1ef4bcddba7e0e741ff9b682f55dac4777964d053ee338477be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5809533c8dc592281cf132dcb94c99550
SHA1e5944533e070d750211318bb0bcbe951b7e99f97
SHA256c91842324066e16078f7492e7b4c30ea1d2bd531a880058f98e57f9f9e79369b
SHA512e88220e8206e8faf68c4524a1e08d504013365a9bfaa7c7b079c81709112914c7a94c4c64140a6832a59de4d87f5e793d1fd3c6159e4d1e4f3f6ad742c8b9ed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589193855972d79a97d0a863fd588819d
SHA10cb0e31cb8904397de7f1a01ff2ba33471b660cb
SHA25684e107c41db8e0880e08783206c5a4bed5862bae1414e9bb18b5d6e4c482557a
SHA51267bd82411f7cf0fd8e86a6d949162e35fc58479278dca5028485cadfc98c208cf35de572222ab3d65ffd021ec38ccdf6b6eb0a1523518957efaf11f44523c426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586a2eccd863d57cd9b23fbbb856c9dab
SHA1dbb204c2c34d976e982bd27722c10ae4e267b340
SHA2565d37b1f615db08fad5487b62d09a95717223a0f927ba629b26de200b385474c4
SHA512a9bbc532d219a01fd13a34b13e50e55befb0e54098cb56e13b03cb3583af7ee3001cf821bb17700c81084b4f5019a097a2a3c4dd144ea50305c275daf0a6a28b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbe1e2394ba52993794ea5364a251271
SHA1f3cdcd4ef121320d01697bb8444cccf4e8a59d72
SHA25661c40c8dcd0ef56b45335cb271c71f0a63b956b825fbc7ea7818848e6c7a306d
SHA51230f33a6881f97b93d2e2f49b187bc675bc44255299059d5274954729406da57d2ff6c7eb59fc68d08f81c299f514accf67f86d8822a871a094642b638652dbef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf134fab6710c17f2dd94cc109a9437e
SHA1bc1a65ad517d5a731241a0bb98f2bf1025bb598f
SHA25652b6bcd9eeeea1d3d3ffb201e3e1f9283dbe621955f71fa32260f731e62f9e18
SHA512550024f140b2eb3b05ff40d76bcf07e7126ca9f68c41e759b3edfcdde30a6dd5c5aec500c77cd63657a43ef43cbc2fb92996bdd2f20711a9f82a500b64a8dea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e63786d807a50eb73035dc156c9e1946
SHA15197ef50d6c279b700c297a97fc3eb845701b0bd
SHA256caa04eb72da6c6eb2d70b2baf177e346db737abd37ebd7fc6c4fcfd34a15b26b
SHA512bc46fe21b84527139dc2af651eaa24cf2427dd72afb358448f6ae2993ce2f4fe7bf1d8a232b0a8b2a335bb8bdbf5a8a45d9e8e29a3dda174a6402944536957aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5111838f58f1b2378e41b564cf622367f
SHA17215867a58b4f1c56972c5aab6b9b7aca875cc4b
SHA256275eb872dc19a24940c65a8f390e1e1b70492feb5992911885604ba1c01c5230
SHA51253dbaa44c49c294ea845f6a7f5543b60c0eb84516256b8a23d0b4e38bee82cda6d1d1eae3c4064396ea175592e815b26b803a07a05c78956de85426fdbd6b2ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f7f68d1c7f33281bd8156193cd418b7
SHA16ed3b362b4ba95e8f4d448ad968003fff657d39e
SHA25662910f3e699a92e56fcd15ed1287067e5d882ecfbd94bdef0bdc766f28c98df1
SHA512f5cc001b81d84aa6bf20fec2fb57f57e05b5ec2eaab8a047d88c641c555fccf9ae9d4eea94da9fe1767d36a472aa134ca2c63c3dbbc3a47d5c0b92d36f31d70c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556389f6b4fc21e59f4d3b3b284db936f
SHA116771183469c6703cb61337fc6e706109c619c6c
SHA25645af6eb0f2c08430a987aaf21ff51ff5943b95dce040c2603f61b46382c5c496
SHA512e8f2bb0d19252118c488528a10e96392150edceea8511618108729208fa95fb39d86a4b1fa35d27f2c3bb00e678f6f2bdda127acaeb313ad15bae163912a016f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b