Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 22:24
Static task
static1
Behavioral task
behavioral1
Sample
4ba9e92ebe58dd70c4ac80159385e263_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4ba9e92ebe58dd70c4ac80159385e263_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4ba9e92ebe58dd70c4ac80159385e263_JaffaCakes118.html
-
Size
11KB
-
MD5
4ba9e92ebe58dd70c4ac80159385e263
-
SHA1
09455be53b9ed52ae1bba06c07478bb633cc50fe
-
SHA256
058974580d9cba0b2c691de04542366250796d0d5d6047f5d81a753fd75c92a7
-
SHA512
3a08ada08a0f214477b59d602bf228b6b1197e360447e5571aba69f1b46b3e01c05dec503487a1e44d90f2db63485925f26fba1d68499a24e33039864f14d682
-
SSDEEP
192:oBS6D7yb1DeiiiixsQFCEPot/YTQRCe9RnRyAU51OSpN1V96YrohqMh9JqNmq1Hy:wyJDAeRwAU1nVVn0hSNP1Hy
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000063c3a542b85c8d29422aabff130c9587dd7d3a35ac9d8201b9ab4c907ee7cfb4000000000e8000000002000020000000e37af26f2a926e0a6575b41c2ed687ec9b9c5fe993ba0a981706de789be094fc200000002828c41c1257dfd8882b1128825008f75931386e1eee160c7512402d223cb70f40000000df720741218738bb3c3b18b1ac3d379525e8d11828bf3238ab7cf2aceb1ece931ae2edd8125cb6a597713f5671bbc8b977fd4d8530808944fbdedfa382d89119 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000e42ed51665ec01a78bfbbd2c953d51925784898913f96dd11776c3ff3fed6563000000000e8000000002000020000000c58a4cdff04101dda280fa802bd18283e2293c5a94d7aa874b1f409527c041d2900000008d05698ddc2a32c2f684406afde7725c5ef78ccb369ec2cc43670bd1e08d57d7df1697a9ecaddf71c5918e8608d66880526974558ad09e526fa8072dbd13143337e0ca749dc8407f1b760a30c9733563581660df7332dc9747b9d52e84448cbe5cc021bc1cef54b2e852bcee98d9f2c5cc86141a1a737d94e00e9afa3c9d685a191709dd5386cf2b98fa6bfa1386699540000000e8708b7088dde64cfbcf375b773cb1c4fbe5fb293508d296ac12a48e8430169b0f827496df3891af8d58ee5d16d690403ce0fa21057d78af08e288c09202e1ac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 401d8acd05d7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3E9E791-42F8-11EF-98DB-E29800E22076} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427244116" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 3020 2000 iexplore.exe 30 PID 2000 wrote to memory of 3020 2000 iexplore.exe 30 PID 2000 wrote to memory of 3020 2000 iexplore.exe 30 PID 2000 wrote to memory of 3020 2000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4ba9e92ebe58dd70c4ac80159385e263_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5ff2055404e7bfdf6dae873d6fbf34b
SHA180039599f9c4570ead9560e7708e6723e2f7d3cf
SHA256f99721ef41137f2b4674650b2bda20ab7e5758c485e30be0389124ac5216bd22
SHA5122bbd4d03c756ad93697c91f962b3fea8b4d99c4db5f8d5df75c71a97ffd47f00fea1e425eec2370055f5de1adc860d5f9432a9c229977eacdf0561ee49378d48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59939962398e932b94cfaf29b081ec4a7
SHA1e51048472520c68f6f77420f0fa310157081a00d
SHA256402999706b27561dc04d1676881ed553047e931ab447108b6670a9ed8aeeb950
SHA5128bc6b14766d5dd24717bea8acb9fa6faf58e117cc548a816bfa58ad5c5674faf0ca99f8a3ebfeaa60c4119b71992da4d629bc3204ddd77fd562c882eee299fc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7edad2db6c675fc563757fd2cdd4407
SHA1d0a7407222f56d2dac41817e2b3591772172227c
SHA256c2d973180469c225373434cb2b91a21036b143bcb40d089f20971871e1440dba
SHA5125877fd4b233661e2cb8c75aea4d2ac2b4d33a8c04ae2d528e6cf6e08f932aa2366e60b8e45ae0c1ff56d5c30f1eb95273b403b32078bdb8d0c0f1f8a16b5ebea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d89bd54bec958517eb81a6c6822e9d1f
SHA1d7a3f5efe0ed440b6fc5ff7e4942b88a92415ac8
SHA256e813020fe52d780a952f1932517738232044841bbe40d73dc7f8b3eaaa0893dc
SHA512944144af40decb992c1a7f2028c97a24149f0be0d18cb1e9426f3dc9bd71155bb6d9fc3604699bc699c99f6e3fcbe10095f486470df8de30f9bdc593abd52d48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fd0712e5cae368175244df19d5dac84
SHA12f92d7b8e731f61f4506a24401071e27a99219f4
SHA256f6862e1732ffd4331594b6c399214307d3fc231dcff2dcdbe9b08eeb62fe0f15
SHA5124e4234f8ded6e75a97425da5242c5a87501f998a4f54efb304db673a4d6d9b6cc6108ca88ed62261a6d7c6b3893c38276e54b597871f322c66e6413930fad4cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d572304d0dca718ecb9adcaa1856567d
SHA150ff706375f70c6093e97a78e452edcb20b25de6
SHA256092c571144b81a7be8edf69ba69d01acc442588ebffe8ef0cc8c5929bbfb3a43
SHA512c42aefffc1ab53f06fde85c3c72cf0cd43eba097e606fd273701a8717ea8dbceb4862a362e6c0227efbb5cdf550aa2869c8935eefc1f3e86c7f740f8429dc4d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d468fb058f1c473ad57049f91dd951e
SHA1b1e2cbcbf0cb60b2aafdc59f7aa30e25a972975a
SHA256c43bba0c8c84ae3d9318a7b9fc12c4541e363ecbb2c408b8bbd8c71aad88f53a
SHA512516b7ca79a74ff63f96df86c21e6b46b5e87ff5c0c22578ff706544e2a4b59a8f8052cd97ace9de4e3b2918df88ec5de53d40410210c836c705f2c16e226ca0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1e401a90d4b56a24fe175c78ca961c8
SHA181ba4dc9a793a4d29e682ba69c2c086c3c2d766c
SHA256d4ffd67b97a33f1ebe5c8435e1ec589cf1ed26ff85a130446f9094f2684b150f
SHA51213c3c378f1d062ff34f761a2764e1cf6075744dc275878f2ec0daa6d668829500529d6c203adf4b10880c6ad34ac7faca2dca7eb58f0cea1719318f69abccddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fa00198a93abcbcb7f78f1a8f711740
SHA1b87111040c8bc7a72bda64920a9fe5adce40e702
SHA2564913d361e967e07878c6af94c3271935df96dd5db4ee9ebc33038c7a80d49449
SHA512f689eee79e82f8a64e6bca3d6e9dbb3f743b05abcf6e5f56548aa76f8fe37f113fc7b57210abf329430ce7a7673c1c2cf8ca13ebbc838bf2da339c78174edc6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a100338000e82f8740a917fc7f2daa96
SHA162c9ec2952e21d5ca4290533426c533578607eb6
SHA256f4bce1b3aa146b42abe9d52f724993658a2a1e45ffb2a2d4d87acc8996a7a4a2
SHA5128c7c42165b666b014d5cba053d7d2be1c828d7e07c837c79ae2a70aa243e1575ae32a7b3b8e149cfa750d0b767faa219195060ff82b86603ce9cdff55da90a51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e39f5d1a4dfe0a1ce1779273a8538a0
SHA1d0080c504d951309b0dec6215ebb19959e8fa3b3
SHA256fd12da30c4fd46b5cb847c168071ea979ee31d72f0760998b26bf85d28bcf410
SHA512e0869844127de0d2692e0a9aaf7d5af3f5b07e8a68c19e26b907c166c88eb48cc020dd83f28b28bc77baae15301205982daeb94e3213ce32916073c100b55ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b1462e4539d56ad2304c0fab555137
SHA12d5feaf2705f6465ea94c79255376a931a69f9a7
SHA2569f253caab6c3651dd16c84641f102852618d1a468db3814bed380b5f8cbfe8d0
SHA51204f6148fe3a7f920c19297b366fca9843629ac144958613aaf692422dc412368b381c6ca52ab3908940c1b24b29b9a4cf92fdbb7cd9a0e9e1a74ff0e81a7f4ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544cef7d0571b6a38d11f2e5555f15365
SHA19d00b359bbbbe5b43b43509d97502f0beda06b40
SHA256158b2955b226ad05aea99834ac3c704d31efee01735de79273498e39353fa575
SHA512c73d43cdad337d44451190ce2059487d421f3917fe9ee85d875277739a2cfe48198eabc62373f3cb4bf2baa24033d727aaabc9805da1098c0f39754590fb21c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532d223db966de13a68440a91e26d1fc9
SHA11fe8c0fa8ac13c691d94b681af788ee82a4af6a6
SHA256e1ac75d117f15de750619fe4251bbe37b568f387ab79efd31f408c3e2c4b5aa0
SHA5128d0c475541dadccdb264908195fed9b8e994e50e2c022a40ef299a574f26879424e46411b84004501550a6384a5d78084bdcc1ae538c6a1341587b7871a80d78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52610daa2cadb2cdf37fc579d4ac16f9b
SHA15bb7f40f2b9c53d8d5ccbddacb2cbb643617b416
SHA2560deaa9f4dd6d568d4ec15884bee4da106c0e8cf04b9b24ad63c6bb59006569a2
SHA512d2f0a9a69c6ad20ff8ec80b63fd5b7794ee81702297e74642a219e9b19fe6c658df55d1d3f20aed40fda23673a1d337b54a5f9534b9cfd297932c4219d466bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5626e8a26345ac2d963185b0add49721e
SHA1a672f83a170b38818c77973a7347877c2fb6f7dc
SHA2561609b60e63ea0da0dc5f76bb37be27beb086457f38ecb95ef99422af88fb9a0e
SHA5128351c654a9fbc39a59f9bc04d6fd42524827ed5bc3b9c1c6df88ec201355d51c44257e449fb92e888881b5f5a87f6474a62a447e959c8505bc37970ea0954cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1f4a8ceac44766431eb379f40047656
SHA1bb88425deb77899a787fd7419b590ff86706f631
SHA25609733ed9965c0361d17b678c8a0f2a4d40e9749e36b051c234fc44e867e1274c
SHA51257cac43cf42da83324ecf8c73fb01e9d2f924c8e4844e1f5d000e2dee655b4be6ae0ae2fbc2d5da6724f4e9e48991a6b8ab95eef26fd872f712ceabb1e9c804d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f198447b5553eac83a6bcae838e81cc
SHA111f3b771cb5984288e8f714ba98ed6c3253afe6a
SHA256d6e0ca1ecb162fd94df238274f28f2a37d95fca29340ab1966a066aa81919f1d
SHA512ed635864374e9a1cdc6b3568bf3796d9fd95dd8106fb3396e08af2e5e8edbd97335ad40acd1453bc08a652a971fd09ddccc1a8091537afed6fd62082bf394e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5273a2f01fc0b7dbf94c43cbc9de3fad7
SHA12510003efb2790c887f064552de9f40403545552
SHA25641364bba19c7623eb895caf47f0ef2f23ed1c0d7b4be7467307a2c28fa13e3d5
SHA5129716659bf85c8314a2600f04d4fa5b4af0297cb50ac0a74f978531ee89ddff990868616dbeef77b27af7122b52acbb6086f41f0f965860f7afd178a645bc87c4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b