Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 06:12
Static task
static1
Behavioral task
behavioral1
Sample
38c5558baf82a8ece3d934cded836803_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
38c5558baf82a8ece3d934cded836803_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
38c5558baf82a8ece3d934cded836803_JaffaCakes118.html
-
Size
83KB
-
MD5
38c5558baf82a8ece3d934cded836803
-
SHA1
0bd918a9628081cb8e2029d5b494e15d61033a12
-
SHA256
752ed4c751655a82a4dc0ad424dbaefa09f4771d2841b6df812ec065f8eebbce
-
SHA512
5bcb40aa5678f58e35d34d3c88cd881dab06f91dfc3303b55c4f3c7bae7c2e2ae0a3a07460a4b7fc1234bfe115308ec1e2319089089f43fa925a89cebec3db5e
-
SSDEEP
768:4jcYZ9Uw8LCWns4MhxVR8V3P4l2/nP4y2jQrG+dcaZwuMQiQ6ZglZQBDlg/Y68s5:7YZ9ss4M7UionPX2jQr92CwHQMs+8t
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0A054E1-8860-11EF-A276-7E6174361434} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434875411" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000e080fab102dd06c31de62577b0dd92ea45a33c1324db00feab08f74f798a91f4000000000e8000000002000020000000ca66f8aaf167e075195c47a897e2ee908204b91817b32d3cfa09b12ab0c55c2c20000000e82570e7ebff90cd5cf1567a7648ba5f30a0b9e10f83b1e20d65d293cd3c4a8d400000008df60e2c93c18df2e1f57945598e471cbc8b78641d1561fbaa49bb2b0a3edb56c6c29d05d5b814e4415973b3bec5b1c62c0280928daf79544d99066e1891054e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0b92ec86d1cdb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2908 2132 iexplore.exe 30 PID 2132 wrote to memory of 2908 2132 iexplore.exe 30 PID 2132 wrote to memory of 2908 2132 iexplore.exe 30 PID 2132 wrote to memory of 2908 2132 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38c5558baf82a8ece3d934cded836803_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d879cb1aaa92b8223e52f93daf325b61
SHA1e3376d2acff7904d8d25da06761409e3e5f64e48
SHA256f3b9d2d5efd0b89fc6092cc14e6faef4368cd498545f7cde7a99a417a1eca512
SHA512868f4e87a77e82c2247ab1a00dd51d1a19eff8cd2cb51e94924bd4f0d21b32168badead0f7275734fa4d10883d5c375ba08ace5baf71a38751b5712a36147b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5036d8c1fc8f5d7dda65483e3cf550636
SHA1edaf3dbbf86dab2b64607100d5666e417157d74d
SHA25658d8e99394ad0e48a1afb3ade164bb19b646e3c9b2c6e3f15fa71fe8c522f71d
SHA5127e8bb5097904d6847bb68b0544a44474508a1c4b9e18d8c58423f4c05463d2970ebeef0a3eec08a369f90a95794f8bc8c4a84613a53f1f7c46af89f80d0e7bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea1a75fb250a5c0ae8eee7870fbeb5ce
SHA1ba3e1aee75b32863da3a3b79371848e891ecc581
SHA256f365e4707671ed301bf40e66701681c8418ee38740748603b503d68fd9e301cf
SHA51233f10022800c9e11042cbf84181dcebadc624d82ade22308eef2af2d230c5f4f5a213891ef72b574c58779167298322aa04bff169e68c9ed0fe67206d20d5fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dad88fb24d40cd4fa1ff50152393479
SHA1e81f2e6b9b1cd1d58053d630516ddc6826d78900
SHA256c3964696688bbaaa7479e6921513a98c6643bd163c230a7eddc0f30ce85ff3d6
SHA5122dcba32de8012bd71cfd9e3c647b638d766c9af2589bc8832a40bb8c962def96eba4169950afee10d6381289c4c2d31213b853a10ec645cb440a8f4a0ccd63c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52908fad3193327faf600ef49e63f6cc3
SHA1ce00a969ee9c43f6009d85d85e55462e64514221
SHA25600a6751c4aa32547b36cec71698afc7c42735c5017c8604bf6a1e8ab68b676b2
SHA512816c08fbcd411c1c5a9e15c4e90024dd1737cf721e3ed72aa247c175fba497e0510ea749d2f324baa23ccbed45f6b08548b8156fcd12ed55673cd3eac7719edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581d4497195acfbe567b7b4535eda3f8f
SHA1b678dc405345321a6ae79facf82cc070f3a48a56
SHA256b18727ad1d9637e2780bf79e2a3c6bc7a2d6a0d5916f81aa13b9192fa22ab926
SHA5128a8d7b6b8d6997ee576c26a2b2faaad47759679719b49bacc5d083e4365808f0fe1f548b9f7ac9f1d4574c4fe198b2fbbe3ebed8074ff76c1747cc6d175a60ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd1afe3a46e6680b2b94b2e5b83da047
SHA1fa681f81e2bb0bec3725979969288bdcafb878c8
SHA256b74664a345447c57e8fd891bd30e24e7ec0b113ffaf4ede4f4def792e4b1a0c8
SHA512c16cb224849daf92125d83984857b29016f3de444818e0d2d8e7a59f273041af834ff83924eaaab5aeec431220f635584eb8f9a7e206388765ff01b247b744f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b6614606bac45a63a5971a1de0f0583
SHA15f0a2ca18269452ae0fea863ebcb0f6904846b46
SHA256686a0e1053bf17924daab782a9ced099922b7652b88b4f57761a5679a1c91736
SHA5129654c96160d2b1f07ada298fd83bd0906a7e23f1841e3d88f6ecdad3ab2a866cdd9df62654997b9eb4d26da28a430a6f56e564c70ad47916bedd778af80d7b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d480d7095631756b217a885850b3a6
SHA134b4047128c5644c2c1e9b493c23b1a1f3ffaa7b
SHA256d293a349ee6896840d4d9621b4032d3a64d94982918e1dacce7fb10ffdd9840c
SHA5124be32fb67fd50ab66d2d4af93e2ae42504ee38a6dc5ec4ce3e83475f64724d549ec55ba15d398404a458db0116409124eba2df2d887255842cf4fd418bc3d579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d89b12aac65f0388c30582d5ac4b793
SHA11bc7dcbdacd069e576a157791458cbd96f8dbff0
SHA2563335d9eb9de520dbd2b77364bd454cd2bc48086017005939b42c1041336c42c7
SHA512e921f346a291397736512116a1651af3b18a13acfb7ea5657fa881112874b415b537ff100c347937a194ea8bbad825d0109616d5c28647f2286cc05b2764d8fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1fe9c73dc3bbefe08221ee05971f462
SHA1e143f374af2b57787001e20ab4389da3bde9f961
SHA256d0cfd069a46c062a0500412a3490588bae721d56420374c3ba1565ecc3ee7a17
SHA512ac67ad2885b0a4c4d1ce1b0a4b630bdc9948488bf9e95ca3c2824208f4f720579024ad6c3dbe1833c64b80d556c140e703adf13a21ec4fdcedbc254902d15826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba0931187924f577428631dc0848eca7
SHA1f02f436be6f63ac7fbeb892b6bc32b0421e5593d
SHA256af20f2e39b2cc21d540ec77bb2243cfd8322ad55073dc7026e4f4f53ccd45062
SHA512a57884171ed04b54d725046a7b2b15a295e118ba1a67a23f6966e6286249889d83c80d1c149d5e6c4cf7bebadb0ce613a8bd2e51720c01e06858421db7cfe57b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a88ec8fa1e8a80a9f3e0a6bc229144a7
SHA1107edcdb09b575613f674dbf2c942f9721050884
SHA2569acf4b561ad67fefe7820afcb8e3b6e6a09105451b14585a1cf5648c1da3c57f
SHA5121dddf261ed0cb742074a9333bef07ecbad16790055257d1ecb83f0521c3c2d1784974c34d402fe1bb1c7255f434f15bb1c2d2d187f52757230880e94ad0865da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56812bfdb0edf099b15f838d3e827d9e6
SHA13fcee9f05f637f03069bf9b0483917036aa21935
SHA2565eb264784b59118969f82adfb5a696a735839c6401efdba5573fef2a3bcfc0a5
SHA512b30d0617cff39f41dec74cde6ddb9bdb7a74d6ca4f95ceb9330182dcb380ccfb4128c36b4286e8328d716b31d992169027f72d2de13ad6ad31f8a48bc794a9c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5380136dddba653c47cfd36384e0b3a
SHA1683b3e7eab0acf104cadcaa06b54a68a15004827
SHA25605c9a03976250ccf4173a93be699f97a78d0ed0dff7fe8c1104be08a9610c6d2
SHA5120d2875f491637517413b0b1ede9ad640dd1e6e2f97b5bdeedd79a0bfb6ebdbab5fc3c3fa0a9f736b12b36083f7cb79bbe0a817e92b74ff5bf38b7e11dfab3c8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2ae0182dde67ded7a665d0e0ec308d6
SHA19470a3c0ae2378316fff7d516c5e0d82de809a4a
SHA256852a3e906b78bd01c25c3e72c14a8561ec1d83b90550efdec1a4e16ce051c44f
SHA512cf063f036c764ec8d0b21c2dc87d4bfbbff0d56f679c4d751118a021eb6c832cbee53c494245934e8c029d5ad268cde2cef86177d891c926041c79245dd28b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad2b40abee628bf640ea60501ca85451
SHA11e8b5f31b0e1e4f8bf8a76e6d15c2e39101f4630
SHA256e81decfa733c97e98688a260366468c53ad54ac5769b8b4b88fde0109c6f7969
SHA512e3018aafc02e1d318c041b8d9fa0c2d40c882bab571ec711dcbe62dd5efedcf8740834897edad9088a79a41e0cd9dff42359234ca80d6badf084e1060c714ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518a9871fb4c9a4a40173bee665842f40
SHA18228b4ece3a413bb92f839900765b286da6b93e0
SHA256e6e8493c4460bf59dd0fb5265cca650d89fb0351627f9a89e0e973524dc72cff
SHA512e7a339ab28cccd3108f0cd81ba714572a923816ed05b1fc0ac2aa6b399a74a847562dbb6c07fc3c068f929da85f3de5ad40f111791a43267f4dcbe9ad86a17c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bd656d00c2c18bb183d4e849e84e655
SHA1b5acee60cb2bac824f5b848e6783da899fb503fb
SHA256470085736c2399c66bdc5732bd1686822976cc10c560c466543d27c4053944d0
SHA512c317dee7753a4cbb3e4b59fe376f18ab4535aaa7e60121369cd44d96c93f9dee94206a8c3649be3aedab5e484b40ee6265c3c0030e2e93cf1d6e7159ddd383a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57783980370d977973ed3c712460328a2
SHA1e619083dc51102ecdd3f8e38c3d584a7f38fcd4a
SHA25685c2e3f2bc8140fe5e6aec0dc2cd9308f8d891d7f1207972ab6b6412d29d32dd
SHA5122f83648b2e6bb17eb5d8702a8f9028bdcfafece74d5cb88f8c3ac180383572a74cebb940b4ba6785aae16bde671653317e6535f6e19665303088b60ae25bed31
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b