Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 12:23
Static task
static1
Behavioral task
behavioral1
Sample
eb53503a2aa2d0f98a6f84cde8efef37_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb53503a2aa2d0f98a6f84cde8efef37_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb53503a2aa2d0f98a6f84cde8efef37_JaffaCakes118.html
-
Size
3KB
-
MD5
eb53503a2aa2d0f98a6f84cde8efef37
-
SHA1
411a9a41629a5c72243f02af97636049c840f1cb
-
SHA256
efdb4da0b8d70da5c21183ef4f250cd99f3dd739cd019306c900701034077e43
-
SHA512
1f4bfe38bfca5a9ca2588047cabd112dc66de50afe6b76680f20253cbf3a2202244493941c565386f1ee5fd608cbab4f0d9e3dd1cdc2a0a6e9902e1dc6a006db
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000535fb66109478b8f824cfbd5413f5a99e07a6d87dcd5f2ff3c2115f1af4221ab000000000e800000000200002000000004e5c2091d594dfb7e1dd7f5a510be2d4f2d23e286b2cbe201d8512e1931a19720000000b83eab6a3c24df318795e21dc95224dfeadb7d8bee9e3ff60e7e534a00385333400000009556f0155f039b360ae1347f7be8eadce7d79818450ea52d323d359f216af07eef4d516f48347caf3375591fadd865f6daafb2dafec292e72dcd154b55c9760f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432910478" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e210d18e0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FAD572B1-7681-11EF-9204-FE6EB537C9A6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000da14a876afe703be295f059dc8a0432592fd5d034b7d745b7504705b50aa914b000000000e80000000020000200000006bae5fc17b73d01327df4233622ab152fb4a3406fa1efc4b06f9866493c02f73900000006d940c18bc78282b07f2823811688dd0e3e059c29f88383b11b13fa66b4540789dee08dcfcbf1caac3464a3d78ef02841a0dc1309b230c8296f2311af0518f7651432ceece236d485f5ce694257b2dddad80f6eafe08fd2f9cd356d673954d708ba753919a177cb74696e3411eb0fda5bdd3a0d8e95ea0cbe8ada81a0fb0bec6732a46ed4cf315b227cfc6d1e13a33b040000000f6630f029a4bad1b932c3606fa947c97593d905fa90709cb691eac9392035bc822349c0cad1667605875a752adc6293ce0d1b9d3c6ac5308a404fad948452c08 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1928 iexplore.exe 1928 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 3056 1928 iexplore.exe 31 PID 1928 wrote to memory of 3056 1928 iexplore.exe 31 PID 1928 wrote to memory of 3056 1928 iexplore.exe 31 PID 1928 wrote to memory of 3056 1928 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb53503a2aa2d0f98a6f84cde8efef37_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af456504bb1b5f6c9307aaab0d69aec0
SHA16c23f8d6bccf55ad398feb624bd12b37b8655838
SHA256b607d39d6b462eb502b262d4c8a02aadd2a53345d871af0c02e48d27ad31d6e9
SHA51252870b2b3a5a8e62c72bad30607600e559188d96b04afd687c5b775b502a8136309d5034b8616754d77b879e06dcb51d32db7e31f24e9a697551087921d615e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56070238958f7776e70417f094fd399a9
SHA101938b040b08e2d0057f3d5d7208d42dc96fa48f
SHA256f4da1aa9b6d7db51fcdad1b02d9aa326ae3f3064a4fb49e1f767bbc970d5f9ab
SHA5123bdd26de8c8397c8606d6e9942d34c42636508cb54b70864b254bf0a7affc9eae53225b7b84145dc18a8e1aa794914d20e1eaae14aa13538f4164634cc900e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579688218a0c16dee603c03e25763abdc
SHA1fc0b72cc250b5a2a48ea6ca4cf6d812d8b624c42
SHA2564fbdfb8ea8edec1045e9ef733bdee61bce6aab2f2650c33a5a964dfc732880ce
SHA5129f03b67a76572f0a8adb548446dc51a4a3b5b99c1527c0322868ac306e2a10eea07fcf09e1a76fd53f5a4460b10174d0c9cd3d96fd627c0093053bb076878150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570f2bcdeffe301eae27673bd6427c8b0
SHA1a071d39516cb7268a95c0008c47022381266c07d
SHA25638705bdd2dcb32d8cf159979ea94c440a53d8a7e02b019722cefd109495260eb
SHA512025b3b9c1d9a3ffc544d1569b5817e94098617b6ea820d51cf4205b73e4de92cd4091ce66562cf9d7d1b5318a71e385f8ad8cea41e800ce31d4dc258958feedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561532f500cedbea34022067038e5eabb
SHA17c2992a9318c994066f6137b0e675979de3730f5
SHA25692ef022263201b65ea795acc696e05d48e3b6cb2cbdbab958dec17740709dfce
SHA512e52b1dd3c50e19eca639e8e169f1c742cdafe70e4525d132524815bc19cbe8d2d9da375cb7a47fbbd94bb96400b8d38e2349c05ba3e1df6f889ae2741d777651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b00c2a552e7b6b519109cb2ded49956
SHA159160499b19741cc8882bc3ef37044e1362d7f91
SHA2560ab4b909f55c3980cd619612b190cdfa4c0224f429623aabe654fd1ed963379c
SHA51224b74d6d6334d083a0e207dfb2068413c48b61305a347d668833028389e6d9bad64a8043bd452eb0c81d1397bb48af8480a76e0e33496e889709bfcaf646eda9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8f274e76ac08109bb1578c5388b2daf
SHA1bbf5a979992406a2f92ccc5926948077934dcfb8
SHA2566281df3bbb2f331a04c8dd4a564e395af87c681a3047d6bc74627ed6e15720a0
SHA512ce9e800163de7047e4a309407fa6440721749f3d8333f10f177ede60d34cbd11c81199f4e12a2b06bcf494a4b7687aa236268e451507838d8390875c30cd4a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ab781815f25146d84c418be262ed23
SHA1eb19b39b370681587348aa41bff3ffe5bff18d97
SHA256d0f68992b4a8b7f1f60d8bd40391fc52123528ed1178e5d4dad5fe188c853cbc
SHA512d8524b6ea95e1bd6ee4e0e725bb1abbafb3bc23cd8fc948be89697427b4bbf1cda65a20e993dc382d700f3c719c3b065d62ff36d74e343934b302500da39de54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de332aa981e666b4f0be917c56862f9c
SHA174b0b0c4ce5729d922d2952b84a9c635f9839fae
SHA256b94fcb0f95b001547ddf805344a36b8e2a6b49d3e8f68fbed433a00ff45fb541
SHA512c91c1d622b3f43ca60bbaa12e3940f1a8d297169a65d9030d822a0984bc7106203af73f870565a4f17a628305d8e0781fa25c8c6a0079262948c1adf58f90ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5536c3ab48ce1ce1b83c877384c5f307e
SHA180b2140a8ee29ea0e27c33c1dab1891eb78d4200
SHA25614b19055f2fab3e4a78e15eb79a01374a2195d2a9ab7d837d8456bb5e230fb86
SHA5124e2deabb0006c089f7911783c0c03542a11edb7ec79ab548f45d3f7276e62555901300253a274485e1fc3146933697032655b924b86e351dea339ce477ab143a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8ca0078990ae47c5f36690a2f91f642
SHA14bd7fb06c92f64ca70dc27e30e6d3b4cfdab0892
SHA256a8863a586069dbc9c565c93f17c4bd7c20c7eb95bc5c4c9dcda4f9129ea72462
SHA512735425ecbeb7fb327b35af672e3a698ef4e7bd8fa5baae0449281635845f0bda915e34d87107b2779039eee1b610436d9b78bca9bcb5319a663939bb319c0d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebdafbc3117f95f5579eca6ca7b720ef
SHA13103164eb21a3390f5a52b90fe097b64fa53e1d1
SHA2560a46afcf1f679706f76352f0b8a80dc849201c7eee71ec6dede0bdcc7196ce36
SHA512a70084d8f1be824a2ce758516a93302fdac289662957cd02043f45eda8edac0b642e7d1b826e4b61942125f60f2727e6f74c809b05e3e25387533ca763bb5f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a74485a5a9934345e101279bea4b70ef
SHA1c730e82a72fbdcb207da28832f38b772b80f6be5
SHA2563901dfd35b9cb62ea97d386c4d7c406e6dca986d57f93af2fac53227fa246157
SHA51201d904dcf2235734a63276e500dbe9bc2892ec521dbdcc43e117f753fb4363dc8e179cb2b0f5621d4cf1bdb951bc43d69084ffe632fe711caa6e848645201070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c382be6eeba0f2ce081d4651ea556772
SHA1ab3a2a9eaf51c9d8db89ce1b233fcd7581424444
SHA256afa4b28ba7a1f967c9d20f7680f69cc80cd2fe15163f68faada091e02922d29f
SHA51202ac2b56aa4bb7eb7b475d298cb45a9bac3091a61a1b600d6a7222c8a33dc7f1e53842c6346a9aec0362bab6f598c942e9e4086b8cd37b4f3bdafb65cb882165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544481ab8acd7c77cbcce88631456ff30
SHA1799e1396bbb53ac3fe91b07cdd277603da5a9f8e
SHA2563c911c9da007ebc1a72b2eb5310785957572eb86d5b1772d3b462206abc3e9e2
SHA512f0e172624328d89ffafef5b830450e1a88e3cf92c924bd03cc92cd5f3d8ba23ed4a941f06ee24d5b5837e3d319bdf934be4dc26242a54ec8da270e8c8ea7665d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5348f7f2c835fff169008a664b0a2ee9d
SHA195c7a1300e8866b7a9f27817fd69c278a4750c02
SHA256121a2550d172d20b72457cfc322460f99af666f41fbe9388a7a444506fcec017
SHA5122846da6329d0e895b227d79c3f35ca7eaaca00ea5b23102e5a95c9f5a7018bf666798dd43d4746dba5cd1363f9a59dd88ea43976da6a4ccbfaace331fd066667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d470aeed5590d310781a2a11e267fbf
SHA16983ff48b180c6a9ba3d60d513a19093f69dfd29
SHA25663418ec898eb8a8a38975db19ea50a394f7d76bab3e965adf7347c3e6d8f9457
SHA5128da72c8c08e9b1f04df58d30bf2f1cbfb243048b6d8bc282ec05a2f5916e6c67bb451c6692c9e563e02f23af145d32cec12f14c4d2783165e677d9f05fcdf722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568571c5a87ae264fb5d9e93596a41b90
SHA15434b0ff759e035c43c0b840fc64ce855617d5f0
SHA256bf251f1270740b9707728d1d2fa651dbbfcfd51d72a30747960f557a2bb6bade
SHA5127d8fa659b555c6feb2ec01c13a787c914b2a1e1d1fae511f74019f94011b7d935c9b2a762d8faca048e3ac7daf25765f8d14ce34a0caa4d56ccb67ccab4e1e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8c401d482ff3af085a0fa90ef4b8368
SHA13221ba76b7a05a080b92c18df53c651b1bf2227c
SHA2567add88da6eee79db3243355180703421fb9475489758ef264d54d08b0f743eec
SHA512ec8e27aebd60cc2c5d8e76714f6921ac6b775256d5cc8d9b3c48b35c00aed5677db12f3fd8598827e0c6885c35fcc036b126e535bf8f732c79f5800feab66428
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b