Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
0e37b8a82266025bc0dde18b70764ec0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e37b8a82266025bc0dde18b70764ec0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0e37b8a82266025bc0dde18b70764ec0_JaffaCakes118.html
-
Size
48KB
-
MD5
0e37b8a82266025bc0dde18b70764ec0
-
SHA1
c63d3a223759f18c80dc43ed94742f53e7f5d3dc
-
SHA256
0aa2fe3898338bd217f1e84213b191fc5351be0c24e74c418b59d202b06496d2
-
SHA512
9f5ed5cb8b2ff7cf3601a89c6a0c7d8195e6798c1fa0b40eca68d46052286d633bd183684bbc8cf8a4422b0394a3e4ce08481fca17c0bc3b4e5cbee794ca5335
-
SSDEEP
768:I9nPBh3BjhPRTYjdr46PuT9JXRFfrh/nX:kaRFOHFvX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434096456" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 402a82235815db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D6C5BA1-814B-11EF-925C-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000ebc5e6f86c99a61b033d16841ef0f00e8aa19e933b579ea5f5a2ff776d8e5e13000000000e800000000200002000000020b6757091d549c99f5fcb82f53d69dce6981714614a36320ab034a137ab13d420000000c226b342955562ffb53483179b6560bc404976e1129f460cc703c11d50f220d840000000d54809f3f40b1114fe6b6cb7095d30dff95092bd8f71f807350db8134d449dfa63c97668d9781b0c1f48fc75a6b34a7f8b2e87fbda4f933fc487a786e15df5b5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1580 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1580 iexplore.exe 1580 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2524 1580 iexplore.exe 28 PID 1580 wrote to memory of 2524 1580 iexplore.exe 28 PID 1580 wrote to memory of 2524 1580 iexplore.exe 28 PID 1580 wrote to memory of 2524 1580 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e37b8a82266025bc0dde18b70764ec0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c6e8873054d10fb138363ce86cc7239
SHA14df4e4ea99553bbf90915a63cda96bba2242bcd7
SHA256ea2028acc3153c79ca16f5c6aba394c5e92c2c57cb3f8e4b3c7d5db30ea699bc
SHA512e4c49a9ac6c9506f502bc646ea824f1722f05215074648785e87bd5a6088f5a0ed677574b825327d0e78dcb6e08ed21f2666681099419ab01d290fb276bc103c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586135e5c58d504315dbd9a548d48a42e
SHA1af707a8b4b10da6b7a0a282fd39ade89ce5d88d5
SHA256dabf1a9e653fb5b15b251c87b920ebbbee1f805c04e8e1046e7636bf761ea946
SHA512ec075decde281db0b12a2be1989232979d9ff1fbbf253a8c121a35cdddcbe502343e1a77a5bb1572e3acb0fdfca199dea3a9d65d61dd66b36b4329f8b424ad23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dad8abfbf0e5d0f7d6f5048e92cc1d4
SHA10613f7b4c572327bb5a4f886a97c524335b968d4
SHA256c84695ca93f37182d3e6080cbded65c2de0b0869630908fbd0115bf5b08c318d
SHA51291facc4a2a0e17711a8880499ceb0c2d06605a42d7c646f50d43c7c938118d759a3864bfabcd79a21526fe3f47579b455ead8302b31e680480c155a9291d93aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b5b1ced1b5936736e581ea9d23341cf
SHA1f9f9398737b0f3afce98e46c5c000cf10dfd458c
SHA256b6383506acba67481a75c7b82ba8baebf46d13655b20a99ee28c19dc7536f84f
SHA5120a13cfb2d7998dfcac93bb5155776ca776a825eae8cc73682ca1c9cabe441cf4db3b4f7d2907d0ff63dbf75f9845f12efcfe7ec00bd84b7e334006991ffc679a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583bcf1a67439881707d4da96e493bf34
SHA1ad90ee32fad6ff40e93f33be85efbe28166e1e61
SHA256cb3830f44191fb87e424b223ebb71ddb55afe3b3172b5cdaf4ccc786814fe6b2
SHA5128b6b1766a84e7c47bcf2537fd66b33c02c9fffac0902c86e63897d7b1e4334e3c2faf3a741ece200c77472858d14126fd84dbc09d8831c22d0d7a9050a4cde5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56840bb26c682e07a2979483815b13fc6
SHA1cb147c9442730c6673f2e60a1481207ff146d7a2
SHA25622842a4e875d4af853ec09e190e262a49fcbbdf92956d2a7488f6f73ea0256cd
SHA5120cf47ec9ad654dc214d9fc2fec4cf8c54fca5f4698adf8b0a9917f4c4edfda0c5ab4a24e77c936d80cbdeb052a09bdf1d0d3b95f05d89d635b698505613cc9d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdf1d887ace83a1b5857d40cc54e97ff
SHA1795a08fa834b5a44a4e5bd754b87bbb55cb4fe42
SHA2568afbc22b56d5eb229bc350d4e552a73fa33a1edeb8dfae5747e4fa9e20a19437
SHA5126b8da3711a4fb1fe32bba920a6c7ae08f896e1eae759336f385087c01fda041e5fc2ca2d95049dd01fa69b6c3464fc2dd63a925b5965001c1b8850085db82cb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5963a7aa77891b2ef2eb416d4644407f0
SHA1e114c7a41dd228774f870f681d649cf3b0de44ae
SHA256d1b97007d704f6d57d0153b595319c07be48ad7b049b0fe58a12ac6767231dff
SHA51206c1070b0a594749614d723e02b84de108b579e108f077f2681beb4c328e2be42b780e888e5fe496c74eff492697ce98fdf98fc846eab9e3adcc892b589015aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c46c548aabdc27e31304fe44eb674774
SHA18e3b1a2a27a586c7eda69d2b749f886c1ea3f3d5
SHA256cb40d4ef01f79ace91d73a8a20ea2039dc03e6cf36491a68fe8fd7341a1450c0
SHA5126ddf3d43ecba70c2040558297a7fcfcc22bfc546acfc3f65ab72a4464f725280f1bad08a76b8face1c618e13635a7f58b9a59361ed1732784e6e2efc1d332f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5300982a56d3e66d18dc2c5c11be0bb3f
SHA12f78143d6fd202649ebf1af3aaca1945eb9c5db0
SHA256d785132698a3c4dca7771d9c7ebbe8a7de7a7f91a43e174b1df5e9151dabbf5f
SHA5121eae24e8699f868be29de19d31bb44f2036696d7528bb33c571621b2e4ca8021f7566591a0b890f849086d1c3419eeb3a680812177be950b0bbf9bf24227a735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9e7f9d4259a412b72bbd42f51ade4d5
SHA1d7ee5fd109b3f86785d78fc3d652ff662f07948e
SHA256bf6b32d28c5169b09c5686b0274369134e131c35c5f958af443153620178667b
SHA512b75c81f426c35a256b52b6193edd5bc0dbe2440e632360c37f8d4ee2dcb6511ff4e4ce4af8a2b2fb6f85e771581337feaed4371ef65149fe8c4a7ab76142f0e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5310f0295a685ec62d52ba24000bd0a2d
SHA16145fe36d281bc6c045d9aeac006d04cd7cc5aaa
SHA2562bc8bfb9f785e67c57cb95a856d6766ba1218d5dd618be4525c9805bec8e6348
SHA5126194d160a62c877c424d9da96e43299e0441d6bf198ba4bc13d09a0198d313466cdfe0dcb258e91e6077946ecd1647e4ebbe0f1679718a197e1c327519d50271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f40eacb71ec132ef61898026f248f735
SHA1c51aee8c2be9b02dec106c9fef2cf8fbb77b70ba
SHA25677881ac502c2e5abaca54f90c47185f284e30cbbfe1b5e581373da5cb3faa1dd
SHA512b5da3e70b11a271ea5d52638f6f318779add1b81300e7e0bc449e6dbb9361357468dbed4afa8fe47558dce63ba4e5c3a3e87e965b12c8d13fbe4483de9d19ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea1353722cc99fc79707a3ab9d32af2
SHA1082b56653216f0c4374ac8f37aa3b8e07f65091e
SHA25668b691148628c103c1b2d9317e4050f029a1518b439c79391375d8c8a50e6e6f
SHA512a237ef8d91e318615113c32987384d3839fbf0b090ea91b66a589e231f6d96ef39888a31a94e1a5f82bdc348c5393f96ba8e2555b459af54bd7733cfc5c543d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545dd30e184fe8d2f7bb13c476313680f
SHA118c769cc94f5e530a101bf28589bc7cdbfd0c2af
SHA256e46866239ddb979f80d1a9be9d51b55210163289191ec635046da8b094f7a1dc
SHA51218d6d58b1fffd445cbe593b6738d86257a42da0548a5039200c1580580929aa23e5914986ccd413ddeff809742d633ac2076d71358a53361ab4466233642b210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ce60fdb167f94c626cbbd4c7be35677
SHA1c1fc69e33c1dc2348521fb7b15d5fd128b2232b3
SHA256fab3a551ac5ae03ac799e0744ce8fc2e4123741e69a56a06759b367163314da2
SHA512f876c125f4a9a19d2fde1b525290a3552f30a3aa6075e05c1cccbb9c879cbad19fc1499d41072f390ec2f12121f5c3a8d515eae467a45f2e952ac46196661da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f869e99333ef05df15a0900d4fc212b8
SHA10315be7fabe21f3ee02063659c40effbc16c1483
SHA25610e89c6f167a816dbc89ed43960c0bb3b0787d3dcf2ea060f625e421c6ea67f2
SHA51264a914a0bded74e6035d765e1ca48c728a730d182b94fd22762a185fa2380d3e7fea5606bc05a4d54c964b829269e87aeb09afae9d494a61457a5da696a63652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b99e0e8c9f244a5cc0be67a020d4e960
SHA1097f5a70aca0aaf1baad7cf3e1b707e6a948add7
SHA256b08592a2d686f0b9ab895db072807f4e67e3540e4e126b67669f0b943db7c0ba
SHA5121fb0ee05c75f9f1a3c50339ca2c8cfe30bd3002d52d5ec0987422d33bdb5c3f229db9a8ea5e5b735a79c8a2c122a9b04eb52754fbeb2f7bed286b45b3244c918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bad3f4bc6ca0eba938bac9edb62b436
SHA147ce103fc0ac49e533138f123e57a90555cc63f9
SHA25692c6c7e1b46602968b84e37cced42beec78c383f2f8718302144894d8674017f
SHA512cca487c63a179d99a56d6e09884db066ff72fc0c842c4abf3e8930704a4f9e6e4863168622be9c07ddf3d83b094744874e1a90497e5eb7a9fc0735b6b2916d1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5268cf4e167a8447c5bfa2a2d035c8e24
SHA1ceb1b1034854ed6f53d06dd76ef7ba27c12be4ca
SHA2566e57bf5dfa09959a5d1abdc8c68c1ff816cf86451c2d4240d3816afaa04851ad
SHA512a18bc6ff4b049415039c9f87dc1a22bfbacb743c7b8708582cf7927866bcb531a1a4658b9ba187c4299fb6e0d07989b1a212f7754e4ef098d8133c21474deca0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b