Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06-07-2024 05:14
Static task
static1
Behavioral task
behavioral1
Sample
275de743aba44be94e479c191ebaddd3_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
275de743aba44be94e479c191ebaddd3_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
275de743aba44be94e479c191ebaddd3_JaffaCakes118.html
-
Size
99KB
-
MD5
275de743aba44be94e479c191ebaddd3
-
SHA1
c4745108c752d3412985d64c1d01dc970b793830
-
SHA256
90d839aa4fab37e30fee29c64f59a04c0de9ebc99956fc41687b1d9d7c177513
-
SHA512
a814b50d17de97decb0aeb5becf38452ab2dbcf0a2d35cf0dba57de32efe72e51d3a50c2a9e996f84bf7ad29d2c715dc4a73b163839333cbcf290c89e2b65b84
-
SSDEEP
3072:jTmyH4y6hLIx2crUg1GzeSFLoIN1KMPy92okCttkcDk:+IcLIxyHKMPyQf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426404712" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{902C66F1-3B56-11EF-B585-FA51B03C324C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000003643b2ede7a5b62b42ab935e3e3bd627df3375440e7fcd76213b7b686f2d74be000000000e8000000002000020000000a41dade64594890cbe28b385387c95151765d362f32cee52cd44257ef9df573a90000000ee823a26e314414ecaf3dad54b45920cc9441d3dbabaa5db3d55ac138bfa9933e87e55cec7c28ebe30af9d1c260547ce9f3907dd136ecda1ddbc84f8d34c4503b38bce7ecd71389e33ec2aaf089b2cff3c61b38e176f2148046048d7744e38c8c334800471bcc50a05bd26ab0273152c1ea655a03eec702243c1cc3fe9f47006052edc182f75155b61b9e6a77f1bbe5940000000f52532ba3abc69b8c9237ec41c6bcd68a8cbbc2c63e8addf5a428eb4d4e2327b61e5434bdfe76f80aa98c1ef43f3bef860b7e28015e5b6f45ea5f41849d2806e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60d9b16463cfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000006809e8f0c73b9cd13c0a7db1f005bc3b6472e38203bd0f8f3648f507f4731d81000000000e80000000020000200000001ec1e70b55623c2bdc23c3e2657c9477b4177fcb38c0eba0e7d20a1941c8f4b820000000c02427a802c95ef8309ca7e45327eb2ec5cc4987c8cc5fbe53ca654d5488b99f400000008428af63fa67d6f843e1f3a0adf3894b77a3c808b627660ae56e9b19a468a371a4a528707589ba94694e22f8afb32cd820bf1362011ddd4bec340c4b1cda9216 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1460 iexplore.exe 1460 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1460 wrote to memory of 2216 1460 iexplore.exe 30 PID 1460 wrote to memory of 2216 1460 iexplore.exe 30 PID 1460 wrote to memory of 2216 1460 iexplore.exe 30 PID 1460 wrote to memory of 2216 1460 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\275de743aba44be94e479c191ebaddd3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556a9824b5d807771e09754c8b3c7fdc4
SHA18a9a3978f0bfb2a9b1df77f9fd7fbd40018eacde
SHA256a060d4e305757e461954282f40536266ff26afafc73e083c104e5fbed2f3b0a9
SHA5129229b385debd72cac0495df378f07fb1ca8106a6cdc071b94fd862f356a62c52ea3d1ecf59d0f0bb435a2aac71e8c6ee35ec3a6bdc7312a0edd844e66bcd62b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff55f9193f93fdaae3068655ed97a809
SHA19644456cea74a37014903edf4ab0b9fa8c838fa3
SHA25616a09634850aad7fcdf715b706c7fa7a73cb007e12c8920094786e69961eebee
SHA512c342c96c03a415a2942812b627eda9a132abb4be505a00b2dda5085653baa885feb606b2ea3c811576f0d0b813a6b33577e8d5a58d4802c10fbb246117b96660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540eadbdc77f349681af1c408ed0a7ed6
SHA11f2c5299ff7c5df143cc79f89ba2fd1e7310dc89
SHA256d65eb972ab80fff764f5b36594afca574ed1d757762bb2bb16b19cc6436c139e
SHA51282b87e961644dc61bcdf74afaa3439173c8f8f9cf0a3143566c42c540e21510152b21ca26e5a9148a5f8cf2383dec15e7287a04d8c27f2fbb0b842869cd69a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd377b9f13864641d0750a71a865356f
SHA19ca7f190a64c2f7b7eeca39c64111114d47ab4a3
SHA256e21580f018bb73bacc4b756ee4552f3a8b70fffc638f51b0623dac89d9fca798
SHA512d65705f7154816e264c2c5ba03e4a451455598b16208f26a480dbe3083941107be791447129682f1dbca102a4a3032fc0ef33abc70e763123364e4092cab647b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f43bb9820033935b1d7815a3eb21d7e0
SHA1a4efa695a9b3f25f400059fd338075dbe2f1d7db
SHA256f959ada092a703dbb015c6deeb61acb20ae2c386e43abb6d0412e3f01954fb56
SHA512ace40c5c118e5d268889736e8366cb68036f2dbef4ff985668d6f85a72676c75cd50a2fb127c8bfbe1c69b21d6d5aab4ed45ba329fa867f5dccc1b713484e062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5095af8883e5948fa912e40005a8ca6fd
SHA14bbf9ed22aa509f4eb51d3aaa1b26dcbd2f898d8
SHA256b398b32c336011a9938544276cb852cf9c04d5b7fc6cfdf6a25f706c846dcd2e
SHA5122ce01b8413251ff34c3f6417b88f4efed4b2ab98aeb384a39e39497bae0b6158f229389b0b1d85de94f1a991ab63ac795d429d2e1c77126cbfe98e71bdd5042c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeb7f10f451d13815b59e34f4c356989
SHA11e8234b57b1cc99080dbe020b396af128f9f6ee7
SHA25672c8ffa8848a2b32d003cb0daff3305fc2b2ba1a94c100d017ca86eaa99ecf2d
SHA5120ee7d2c92088f8a8b4068e8cc6a77dc6f395db9cd72907e65cba70bd02ae74f748f924fc5545b42c22a2eac6267c0def89c417f5c1aaf77f3ac19df57bd1e0cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbe164bfa170693fda3cb3c6d696139d
SHA127784cc15ef1ef4a81d14f8d0d16551db4878b9e
SHA256f1b1cd21ac0b611bf606c09734712a8aff2dca49c8c7a8ffaf2201e1bda06982
SHA512e94e5e969ccebaa03a04575fd22f6c03ca4983b42c03c322cc23c8182f75c0ad14d9fc6e8bb5325a634616c2c637ac898d17dd9d24cd40f298fe21f8838e5248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5778bb93d7e34f7cf8c63d453990fc8bc
SHA118991d5dcdc6a7e8e91b84025a9b248c532a44b4
SHA256cf385d9b636866fa54d29566f719cbe0199ade92eba9f8dc14864dc7cd79163c
SHA512fdfe06053f03c074080fd30432269dce09bd177a674a8de7872982e03ec94cb5b4c15c2456b385da4a43dc09aa6554d6ab4e0fb5621abc41b0cdd3adaff6eb3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576c6acc5b1dd5b7835c2c6fc5a7501af
SHA151ed65900e5e9486095651d43cb299a8d639357d
SHA2564e0ec01ebd9272d4551f3162600aebcc75610dcb42ccc047b890a06f96d73538
SHA51204c1594fd5ca531f5ab7592f4215c5671a82b465e0677fb22b9f68c1cceae210583f3fee83fc85a2e8c3cf785aec24125f005191291feb1df7ad14d778d75917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2ee384875b1ea628d634c66ea7b935e
SHA1feb4edd2526245bf11d94d5480a6a2c67d925f35
SHA256fb2dc2780951f1ec76501f79c04d4909e66f7d4a0bf434f74d89ccbbdf61e9a9
SHA512fedf15d297f7f531d6d89af6b288ae52fa525b38b3ece0928c1f308c4c7b32ac97cbca63f66fdbe133fc497ce7e5210502f2bc20006d6a3b7eebcfd81c2eb266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53009f161be70094e9a631610f44fd48a
SHA1020024ec15cab0a018d29bbd3a68bd228effbf48
SHA2562022fe37fc78697c3fc486a072c277499038a857579ac36a4e9a931ecfeb1857
SHA5121dd4d5423694449250ae2c243de5094e0cca41d976006961afca36a50ce27755aeea74148f842e5c2ff85c33057996adecd4d71837ecab15aec0f06f4b2dbd30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5479653bf5c980792a2b61cd1a9971a30
SHA1398e28d52fc4d6a028351163458c6e6390fb67aa
SHA256005dce72821233efe10ab3407a0635c91109e20751d2bea049889b70752b68d1
SHA512edeac486ce366fb5f2be85c18142868e16f4f155dfe657c4331139663c03bbebb8fd3e095400fce65686d920cd8cf9314b712ae9f88cc6bd2c6c617acf4d7e64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de79b8301d2eabacd1463e4ec5887174
SHA17445aa438c6da76f8ce8bfe554ab2ba87fd07f3e
SHA256a85526c7873ad7ba5a14f61cba7d6f910bfa040549cadcce935c512b625778ad
SHA51290e146366f6cad4429421fa24bd44c8ada5bf44b297f9dd16bbbddddb9159d92d2ad5283ec9ef1b334e6333ebfb1a23d0aa4ae7c4a1d5e3f70e93044e5c1f859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545e1d1083c398e17e94d6503cfd37ff1
SHA11eef414a7743567617d75dc563f8107b54513e64
SHA256062e45c382e0aefe741f82c5f5302947cbe62b38db568176467d31e0a2cf2fbc
SHA51211365ce0987a6a9007198c92284f5d13edd3d0347e8eedee6ca8b719bc19e37b6cfc643ae3eafe67c3e9d375ae3c2c7a27d58c47aec2ea1417ba3c737d484bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1fd082f3ba5c7a4fb19130c2720dfb6
SHA12aead410f058f9683ee97f1cd8a84902e8745181
SHA25634f5cb7958a892e32263bf18aa4e5b4c2e15da48ad96ce3983c426a031e505c4
SHA5125d8d0dba9e3f226a8f338c2c7541cdff71ea09c21ee23cfbd11a2fc8ead63946c35da3123244f7704a2b15304521ae60a75d5114964713396c63ae238a51ee86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c10a88d5a1968ff4997e6339a1ee7d4
SHA1cbf7d8a73b7433bd7a1e2850f03539d0850f06ec
SHA256db5dc31d2fc6e423c1d3f49e585e47408d4248878e2cdb8024e1da540cadf15f
SHA5123e34837c5d8d82d7ecabcdedb13e3ba1a815564309b6f684315bf738ca1dd81720208f251f0458cdc6ba0eb4d619d20299a2d85679cbd2cbbfd6dc47b5b70bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee759f2749dc726aa4279fa6538d35b7
SHA160614e4f15e0bc73f362ea937abff9cc4fe721e7
SHA2564a3fe28b7a77a5983d7b06db37351e4590618eb7e4799e68328609dba8904cf0
SHA512452ca76dd2ffd570ef22d98cfc560145ae670f3ea6b1e4a1637b97142e6b6f5b99911aaeaf77487e57693298a0728f392f1c8c2774b141976503deb87216d08f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a326c771167ea2229c7d1aedb521307
SHA11544640083a9cfce56d84c1edce4c8a4eb51c420
SHA256ae6db6760282dfa074ceb504944b4b0832e8a1f8a2886a6b40cd10a8cd457702
SHA5121779d301db21b4c472886432b5eedf11650dabba239951084e6c489401a1cc0235a51a234197e3400617c7e8dd8a232360541ecc1422fb88929931ffe625f2a4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b