Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 06:53
Static task
static1
Behavioral task
behavioral1
Sample
be18da74b8b92b0a3f94bfc1fa32f8b5_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
be18da74b8b92b0a3f94bfc1fa32f8b5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be18da74b8b92b0a3f94bfc1fa32f8b5_JaffaCakes118.html
-
Size
2KB
-
MD5
be18da74b8b92b0a3f94bfc1fa32f8b5
-
SHA1
d43b634cafacfb6d92ded449938c3232d3547e72
-
SHA256
a854f1b1f42865f9ff4ffeb6162e380d64c3c1c7bccf0b58c50ff8a640498ba2
-
SHA512
dfc8e15948bdf8742a26eeda8b173c3db80c2c11f14fb2dc4dd70d506df9427d517d3f30303be330a8e4dbdddf507dce438178f74b9f7082bfbc6793d86d9fb3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000f7edf9a2aea9b1084094d2172198a99260d37f8dc5dce0a49283c715b31b6ab2000000000e80000000020000200000000713215a5c38c8993b6c5a4afc3f9e802b025edd37eb8eb183e124dd1cadf7cb200000000d83ed0d37617ee28ee88ffecbcbcf850b2c38da46767907218565e688e7e7ed4000000074e8d5340b59ed77b186376cb26447f876e8e2050e5b1c1a2f88084257a3dfed18b345ed88d204d0e943515567964dd1c4d9f2306dc0adab2f3139672bd8424e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90569f78f2f5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000016c0c73be91136fc2b88f9df1bcfa7ec691aebd117521097b52022e4e62a192000000000e80000000020000200000007d08f42ff26d7d5788c2d425919eb3d7632d8c8ddf10bb177ed55154566674019000000065bcc7fa8e8ecaf69097b2c21bb62b08330de2c2486fa338a41e85ceb3263578302fca3c361c3146292329856ba0bb0129d47db0adace637cb0f6e9ad7e5309ae612f53530bec6f76311e3afaca25b80a469af1ac65ed553301ed90c482eab8b2574f3257e364c174ffe3b97b4e937ed3a1c5b1eb3d10f8b893b6c005b13a7feac7c0a624229f86293ecffe39cbd9a38400000006621f7fc9d49066ed2aa22ec9e87df1f292f1a0b8c905917398ecf29ed01efe03ba4cb34d5d30178bfdf3bfebb1827492daf57756bba5dcaf047e030302f29d0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3ABB131-61E5-11EF-8328-EE88FE214989} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430644307" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2772 iexplore.exe 2772 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2844 2772 iexplore.exe 30 PID 2772 wrote to memory of 2844 2772 iexplore.exe 30 PID 2772 wrote to memory of 2844 2772 iexplore.exe 30 PID 2772 wrote to memory of 2844 2772 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be18da74b8b92b0a3f94bfc1fa32f8b5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9901a1cb6dfdc6989f5747a57634965
SHA10b203d7c52ef5eab44818f39d5f15239e7e9c6a5
SHA2569172a25e5e13468a4c1d5290166b3df4d0fd6c53eac24ad2dce9ae83e464dc5d
SHA512c746f7f526e297e608a4069bbcf88e30b9a34bf0326bc569c6b3fd84dffe614a5ca7d3863a016e4921f93c57626757fc116f408bfbc10e8ba98dfb94a00072e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcac446e5a1410ed5cdc4845c597cb2f
SHA132e7991d03db12af860b1130a965282ffaa1e82f
SHA256502d7aa22226baf08e422f5e543582f859a097b07532e367dda32c48f95a3699
SHA5128b6eb72f7b5334ddb13e083a344e14c51511e5181a4775933e40e5ca617c53cb4d1e66b937f98e95d4396ace4a70ebcbd6c048097a6af5070606ee6d55625b65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f15d7ba6eff15cc7afc7fb82d4cd1bea
SHA1488f2319ed130a81592f7109bfcdda7512764bfc
SHA256a57becf777431e213aaa04cb0bef746bd5db5073e933aa15b0157e2c387498a0
SHA512da4c8df706b57a0a5ac98518d4cd7c7f811d543bc1f45aac5b15426737beffe19753198ff9574692f1168f69157a04370d480b064f41b1509bb1a6137fbd7e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e7c20ab24a887ed2b77d4fc94dc76d4
SHA10c577c422bae8cbfba17efe4bbebb9a78460969c
SHA25610ccbe6715f49e1cbde4f33f983b33a0a760f3ab14b0928ee942026048f5c0e7
SHA512332d6f360753f709d3df936cab6fa5bbafb67f0037136ddcbd60e1f348046b7115cd813c410b872c78e989a2e8b79a0f82b3195c693be6e34f007f66f5953966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59092b4798584abd96ae69c435dcb6277
SHA172438abee4e5caa8f92e2c03bef8822a08a7b453
SHA256914923e5bec891f0e4008c679d37eef841d5d41e218f2ebf30549b4fd0243681
SHA51290fd38ba8a422df452ba793cf01ed5e2a954827aff54ea05a40a72b141824b5a4569ec40c529e8cfaf5605e51dd00e11ea8b580dc2a2295fc7ce43fc2bb175be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540fb27bae21bcd8b5a8ca7ef7a72f2e2
SHA100740c6f68080b9b6a7fde21da838ea0bd700ece
SHA2567c9f56722696c7c4397fa7ac1c65d99c3e7fb2982ead825ad01332840e73fc83
SHA512441f828a8c7c02855fe9ccdf7b38f64b1b77295189cc5a987682b850b8dd204cdc4cd623456dbc24654d6d7a642bfb29ce3f29bc4689b0f90e990ea15b96ca58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e09144888503dce039ce1fb611b4b2e
SHA1366228ba1a0a696a3c469ccb8700bdda39169f37
SHA256524156b19b7e7c3d4183beb7ded9fd38304a22a925628e54b1a034a587bc958a
SHA51211d4f10122687cf94f0be9b05d252525012267fa895287e6a5fbd9dc1d48fa60b57227d34f06b4ee2ad7b755f8bf1b863558194f65ebe0506ca2add4bb45aff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2db848bec02dbb5c3e84c43f49cf54b
SHA1214ad7e62e72d94681b7e4f665603edf33b3f32e
SHA2561893604f8acffc3fd777d378e0ee2108038b198b3da4fdecbc5f38403aa35e55
SHA512ab43b4fe8db37a5646283b2551fa8a1a13f3f60115cf6acaf5dbdcd3d60adf31a06b06cdceebb0b79d9e9e08d37d236c79f3e772322a21277f4e10742aaef454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dc1e5c7a2107c2032292c0d11fa068b
SHA123a710c9271d1baa75a0ab6be8ae226284a95117
SHA25696705beec33ae9c994eae1c8fdc866c8afabd6069df32107f3fc3a0ff4ee4d2c
SHA512a9aa3e480250b3945890ffa8ce3a7a438d1ff0842c7a4e6998fb3b4b62bb9ef7e29276e0539ab6c1980132d83320882d74e9cabdc7b47a36b43a92bd86e2a1a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aefb33a65eb1580676a035f73c5a4a86
SHA1fd802fc6a2384d38a65b4764188f71249df9b42b
SHA256fda87fc92fedcc619c18d11fa8227d4ebb3246478579c7da8b1f62e57dd332d4
SHA51276969119ae78b12b30da4e09a5a2897a807a6a2711300c8f7534b6eae6a6d92081b3f13dcfdf3c05fbc99dd0621f6d868411875aa79a54548310d20152df28da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd206a0513ce7db784d7eb20ada89df2
SHA1f3cf8876d10e54d3f2f6248d34a9ba9bd7bfd9da
SHA256346ee2c28e3d323333eab1f06033f968e8d18d36e4fdecf5f20fa15204e21efe
SHA512f6b4c19017213d1b0204cbdbb00ead0185fae451fc108e083b2a9616f00551b15ee05218ea0039d0dc6335d8750ca9bfd2f87dacfa22252849c0aeb47706254b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5be79685e55738386064325e19eb212
SHA16072e3ed742dbb49ec30afe361ffaa1e3b2bb1a3
SHA256aab90728f6eba4624d91c2b3ef55e1ddbd893f442b3f7657fb776f2e12eac885
SHA512d3a1362242cddb4672c8288cb3f5a9423e39da49e9506a4c0f2ef7d0f554301be6a941898fbe2cea4fd74a8d6f5a0ab73ff7923d4b028f21a57cb44eecf4a49f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd4f8d91410d2474b72119cf40b4092d
SHA1e778cc98c68cb0c670073bb537b8dfbc0a1b6607
SHA256447cc8fcdfb155c665e715da84a7ef760bca5e52ac1ecb908e6749fd51a5413e
SHA51238d04bc32ab07a85537d6a26a25e38bf1a343d97006a6265b5d7a225b4a8cfc5fe316ba9860832b527b5c925f7c0b7408598cf5da5e196c78b4b4d4225aa5f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541288b15730117d5fb5dd79076f3c432
SHA1fdca23370e489986350d1d5d48ca7bf66deb0a2e
SHA256bfd808a58239bef01ad8bc4d311c94c58807a3c4ed1015ed0c65a3f26efdfbe5
SHA512574e552ea837288dfe41e8611ec11f40432b4774a4a7e6705d6ad25a69f0c4bbd5335f4fce93240b2b2e432df7cca990367c1d93188679d30ce431e6fc04f47e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ff03da9bab85f9f3df2bc222401a5bb
SHA1fcca6277082942add241a7cff0ae0c9115732052
SHA256d4f4e5d852654285607fca60f89105df4855f825c1284ee9056ec216c0a912c7
SHA512461ed9c3d1c496d62547ab2d98020d9a560bfbdb4e6b81cdd852d1132b96a8be445af6f9c7ff6f98d5c9131001c6e15f31d2abb8b088609d9f34edd10e98824f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552c1b6ab991a48a81f0258107feb5809
SHA195d61d02418ca8de57fbdcaeb905d93a12db927f
SHA25662d4a7ed1b74e739f5374e8c556022caa5a62481a5d1f9538cbb38aa7494dc0a
SHA5120d229dd373d6aae3ec545bd0580a54456f246fc45f5961c6f4f3ff862147f608468652cb4488164218bce04bb0a7f5ef7be7cf185ce02451e9eafd4a5ef52743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0ec24c9ca9a8e2af9781b41d7be15b5
SHA1c3574e0d125aba0cc9f28569fe44032322809726
SHA25694c07d6f9e3a78afc53742a70fbc73a8cc944ef1e5e509a07e8fc37fff8ca4db
SHA5128b9b01dc066cc311140b0353cf76c1087c2a2b7649b15f5046e19fe4ab21f5001c5d4e9467c44ebb9bfccace4e56e58011e9c03187a678ddbaf6c175b471c0da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af7054b21414914fb9b394e60b85953
SHA181966746e0ab7d242a2c48b5e6679c22e069b041
SHA256350bdd21373f5632a6ab9f86c5578d27a3c0f2c126234990c2209ac226e7a0b5
SHA512ef9dec4180053b9877ca0c74ad82981c342a995d7461c82fd8a61374c0f703cd02248f29d9311f27183a3cded3afc27072a743878f4b05cce85ee7781da1d125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6697974c7d8c536b5b05ed519cdf2aa
SHA19926345a782ccd0d1389b2cf9b2a5d5b60335bdf
SHA256fd0e49b2f279c5cf86a5b2cb1855398beba8ba6c83a37a5269eb7e1f0e93b2c4
SHA512c38917f00204146c7f43798659a26bbd5f74452769786ebc179b3f6132d789f5a969d3aea5852cecb303fc8bbf68e064447c25c11ccb2b7f37c87845e0625d9e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b