Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 07:02
Static task
static1
Behavioral task
behavioral1
Sample
ae4368dd3fd93a14b3b1bc99ea35a75a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ae4368dd3fd93a14b3b1bc99ea35a75a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ae4368dd3fd93a14b3b1bc99ea35a75a_JaffaCakes118.html
-
Size
14KB
-
MD5
ae4368dd3fd93a14b3b1bc99ea35a75a
-
SHA1
6f8c90da232c4bffd66a1bc2baf23810620d783f
-
SHA256
039ccb9fc58c94c1ea58db31124976e5f93bc4157130b4cb5685e8626b5408c7
-
SHA512
8d57fea44a928624fe79ca7dc1a20e4dd0369dadc0e7c530c9f193f9f7aac592815fa77dcd55ff3be8a6e34898cfc9b3a9aca6726626faf599353eae8e158050
-
SSDEEP
192:FjCfq9NaFGIotZQPZEJ3IgiDMK0q/09MmAqMyAiqQryPbOYhRIjBOc1GNIcorm5N:FtzCPy4lDlvIMJijptkN3nLSjnM8tC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{20789331-5EC2-11EF-B4E2-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000048ed1e7a892e41041ab8236c8bd50593d2d631e5159f2277983077ef6f82ee59000000000e80000000020000200000007dd524741f446eeeaee4b88c00772949d9cd5a76835ee30f3dfdff4a57c55937200000007c23be05373dca9033dfbaa46a953baed813bed9225a01022434038b40930a3940000000f4b5999152950e72e46bb8eaefa058ab17cae8ab3e90472152cc2176e6eae62f25e761c6e483c7798e62c7a83c7a081ff58adba3c28928644d9f3642b1a934d4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4071a8e4cef2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430299201" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2716 2172 iexplore.exe 31 PID 2172 wrote to memory of 2716 2172 iexplore.exe 31 PID 2172 wrote to memory of 2716 2172 iexplore.exe 31 PID 2172 wrote to memory of 2716 2172 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ae4368dd3fd93a14b3b1bc99ea35a75a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d50255e11e6a98627a8c4d60a3aa97
SHA1403be733931ff38db0941e35166ed008ff346ee8
SHA256d551d8bac552ca99490edcfc2719cb547c73584d1d252b403ed23c050e0427c6
SHA51243d6c7a963852ea6f00e4585e46f323a39f7ea65dd06125f5db8107e06e959a303f4d059354e672e6e89ae4024694c806292e0380017d371a6407e0a1ec7a786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512020a7387975a7dc0031623e21a77b2
SHA156d8ba3e9378e8972feccd5cbe783cc82be7919a
SHA25692637e5b43b8ecaf81ab74aab71abfd657a318d3bea9e4e84d89365ebf5a2ffc
SHA512774b59476fe1f46eebacccd8e883023c7f1f327c95e3a35955682dfab1e8ed517cdc33ad5efa85b85cd251d20e9ac07eea06b5d6dd7e10d267bdebaf1a9dae57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8557f766fabf7c1e2b033368639f717
SHA1430e29d13e686a39bceb172323fa1234ff510f44
SHA256fd13f95ce3cd6b310396f11beb964869f6850beb649d019b1bb9907d319ba77f
SHA51274a3ebcdebb53593436c123a35e78ec95c05559b8c2beb1c6cfb13ba33aaa7eee96f022fdfe75e93d8f4db93672126166a02ad190a2107b4022017df4e0f3897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e02a4ad04f003e35c78c0e5dbe81f22
SHA148cdf209864c7fc72869c5f7c3b965ef4021e3d9
SHA256a1d2b9fdd64cb2fbcf356f862e1e7b9d3daa7a1048b3fcc88b6c9aa8d062aa1d
SHA512d6bd6e7a5483a26215e3bb315800d4c74425ea5ed4fa55d56465e01840ded364dc431a8d2c7e6993bb60d2986ebe3652343108e0a8926f3e7a9746a09d5ec252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500a12b00284125494dcc6d7981dfd03e
SHA1c89328f97fe5db495a6f55c9fc5ead1f6405b8b0
SHA2564413f37fdb8d415737b08ecb438460d7d405e0f6b52d40262c9cb5437fc9559c
SHA512c55a83b63ab15d785186ff8a23026f62681492fef48db12529d915226510f424eabd15172825aea3e27e8b5115ece1d560d6fbb6dcce5d118705dda980f6f8ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dc711853de02c03c003ac608383b95a
SHA1000b7fb58eaa3db95f53791b185faf007e9a2613
SHA256fa0f629eb3d989285509ed74c6fee71fcb36738bf7907685f8fea63cda83d603
SHA5127a9e6f512f04ab0e7a9b1d60c3f190f6563a9f0aa34a3c777314c053fd1626459e4c09890e1b89455dce0e0b86f3ac034d7987309fca23bfb620ca69a01902ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb3c1e669a548e7ad0031b0316ad2fbf
SHA18cc41f0d61d89bf25bf4d5f971f0355c5253a0a0
SHA2565bded3981c4cd4c348f92146261f3880dee47e46bfa59c3d2faa32c6a730a47e
SHA51292ac3af7bb9253a23fed394e2f3d4da4be469d837a45be99989f1d7e6cb2713e1e9c206d34f88b555c1d673a0d2803305d5361d74cb0e991998c141b2bb585dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f578f7827344d7b79b79ab4db68fad2
SHA14b7e4d726f0efd6316bc574ccafda62709b5cec4
SHA25621940242a4f34f4b5767b0d2253b33deb9adfdf257e91b7ed6eb8c843c91d0ad
SHA5120e6520ae64ccde75e22b69e5ed5930e92856a1c0808da3c547dc59181cbba56d7c41b8a9c864e0259d6b2c4f0db046d89efca1d92b12803c88cb64595fc2f2f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f100a6fede5758dcc21e70a9de8dffdc
SHA1f192b0afd611fe6026f1e67cbf53ff1ec8e50116
SHA25626b3c9880e3766e81e1b096c91782fbbc3b8968b2968010d600e05411ca8477a
SHA512a1cd4894964bf8704af34ba916503573465d01b1271e64f314df8b66b6e5d38b02b7d1d1f31513cc117d03260b2aa56926be6caf5c88fa9de4fb79a8bc9e3df9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac1951443d4ffde711519bdd30de51fe
SHA15f7b05c697a48da468a765473428ffe80510b782
SHA256918d0ce1d0bb3fb0d4bc4df8f9fd961549050739c8c438c2c3f9b1649a173756
SHA512381d8baeb46d54e2b17a0f4899be770235752de2bd24966be3478bc3f235f712fdb8efc5aa8914774442e4092176bdcf164d77ad7014cfbe496a46520946402d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5708482e6f120e9c8e443041b0d5f147f
SHA1dbb265f189d8bef6aaae6027ea3df09821010e4d
SHA25603b8d53fb39348b206b3f66b2390ed10c35742a64add32b7368c15a08d2eab66
SHA5120fee289ce36475aef35e4574338e38f53dbe634c20f514dbb424f2e9496385dc43654ffed1f723f1060a40ed825f9db7a582b66ad7ac856553c20199414e411a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e62044a36732b2ec6ccf184aa08da2ec
SHA181180d907b7c2483faa3f6882c0e11c6966638b6
SHA2561700029d9ddd57f0d731e599cf90fd22112428cd6df66cc969b5f1988c493c66
SHA5122873a7e53c9f1baf03573000ec75471b587123a3d7d24aabc14c5a57fd09c8edc65af6b84ef254d8122aea7b8590b5bb3c4cc50817d4354b6e3315814850a8e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb9590e06c23496c687b0776323a8d51
SHA1e4f7f17fe1c5345ce9514d291f8867448b2678f2
SHA25660a6dd73f26e2a4bcf287151587c6ff6f28bcced3b2c959ee1f3342c7a06f495
SHA512c4b29d8eb93a96635cae329cd092dd2500760c2ab761a7741f7f67759865f53fd7412af2e15c04049fd79fb25bc7574c972284186b32d680c246d985dc295e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c834d9d4956257f92a55fd0c949a482b
SHA156898aca526e5db62dbdc98cb6acc5a687232be1
SHA2561b542c2867261e58511556bfe9687e38082a592d64e5ef2936eb6a8ec7906fe0
SHA512a05265b355015dddccc9a7914620b77f5469b0a0a791e48ca36d6d2d39e70635eef78c9434b063b2b8414b0226e53c893f01f0f78285ffe9cfaab21baa7c0573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b9c65767be2db923b327bead4b83526
SHA198ef791ac46e13c8c3f797aa4f67a0e7e69b73d5
SHA256c8e1a54164c1c57cd9a66f7c6a05ab552dae0dd97ffd6f8412e50949e0387bd9
SHA512aa1b6d7df0fc2c525841743875d249768bf184eb230184b27f29722fbe833bceaa81e486fcc966ca9c7166008fd003126914a8f73be9ced337b33f4203930395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e50f37768686eec974ec4e3179991d3d
SHA13f08dea6568a4554a35169a93b6f574cb9643352
SHA25626aca075dce43c86c9144003b0c173325b7b2a104cf942bc16b728555fe44f7a
SHA512ec10fe26efab5423d5d3163797cf0ab86ca3150c75f49f6474ce8366a58c4434f8d3b8e0a48c4c484384f857911a62e3ca9484f29bf14a0c36ec65bf33fbac7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5953ec4a5825c10716e94af5309811837
SHA1c7bd5b5d3324586e1cd2a2109f82863fbdb09147
SHA25610959099873acc1d0247b3049ebc30a7eb87faac478389711d2cefc19639b91f
SHA5122436365557e5375e51372e0c2e8a8a89f8e28514a181549a802dfff788358ad91af4bdaaab7a7810ab081fe941bcaf1f0ff4d0e57fd4f4299dca1cabd07e728d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5668b3fa1fc4034da5111bb35d9c0013b
SHA1210cfa78c66b35981595f20aefe9d2e18bb2a0df
SHA256641d5d50ee56cfcd7f1ec7a56bd8ee2f18ad1cfc65282244b44e9b983e15a501
SHA512face6a5cd9b83a94a8569d75eeeb4c7b52255ddb75aa0f642daa9909c45d407332d0986fa637efff83657166852d2314a043e5df1b1eb048b092828a78a538a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5960915502d45382d483899ca21178493
SHA195d285412cabed012922b02db91e8cae70f5b794
SHA256c7a7a207cc5dd71dcd9f2becffb3c7ad122f8b0fb6d26f74ea2d91eb6e4650a1
SHA5120ec15ac0d55f300478f0cfa3e0672674bde5ae0725c4e8392965f6f925d074eeb629b471d037f23176acaf24a72564ff2991de88048fcc939e05cebc97b6eb0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcdc961ab7d97695814970e8629eed43
SHA13608629ae60e9f3e602238f63ff62fb440a209bb
SHA2563cbb8537a378a559d57dfe374201c38d11d6ec86ce2865f5e554bc1f58c3f526
SHA512f8584d6dfd2200ac15bf0fb228ba2350efca23d05a6135dc56c6e3788781de030cdad5f148c8042f8326168083d4d50f3d3aaed6124f947342bdeda8bd0ef819
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b