Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
914a041aad99ecf18e44b91c15973ca7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
914a041aad99ecf18e44b91c15973ca7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
914a041aad99ecf18e44b91c15973ca7_JaffaCakes118.html
-
Size
94KB
-
MD5
914a041aad99ecf18e44b91c15973ca7
-
SHA1
10f297120f96c9155df3cdbc9488ad49e8817433
-
SHA256
cae447b995e19cedbf05e63978e2b050f36cf5ce62c66bba3ad6982f580c8a91
-
SHA512
aee9b717d57fe9151776437a29202df2f392ab1b4ffe5a581a03bb77e13852b0b9eaa5fd891bd018960dff029b3841d25b4b4a6c1d97a061e608160987b441f3
-
SSDEEP
1536:WMLiNHp858FLPPE6iAn61r8fCvvr17LmByijEZtBdkrY8mgHC+qpEyW:WAixLeBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0286D6C1-218C-11EF-B1CF-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423568937" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00c8e3dd98b5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000057c5a483b7422a46870ceb3584c8078c00000000020000000000106600000001000020000000ca76fca964a86343dd1b192f192ccac1992032adcc925bb9098b6d4862ac0d70000000000e8000000002000020000000dfed55bf4b5683da030ec3e81ef418e4aa2e31b1496b584f1f03c08bddfc317e200000001d797717162b7b3f1f91b37704176ce7b117e3733d1aab122cb6db9da8021e47400000007520e370b75337544d3966dc864bde09986227965335ae24dff8517b5ce8f6b13b09ea509a939dc447077fda40dbc9be8b02ad74bd4d08b92c9fbc936e95edf5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1796 2168 iexplore.exe 28 PID 2168 wrote to memory of 1796 2168 iexplore.exe 28 PID 2168 wrote to memory of 1796 2168 iexplore.exe 28 PID 2168 wrote to memory of 1796 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\914a041aad99ecf18e44b91c15973ca7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beebe0eb6b3e97013b31a93bac008798
SHA13833885b20ee2dea453b66dc136abd6c52163976
SHA256bbce6ad15c24e45ea98d55a6ee7675f62572030288fbc00cc0089fd449d097ab
SHA51212a768fbc831331bb6c0b3dc2873c7fd29e940fb231d8a6e054dc7b6bcfc73edef03eb7075a4b478086b927b6b9253f2064a9dce85ecfc71048a2615ad2f1180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502f74267a3a23cea19a072c012432266
SHA134edfe6d107330e008a97ee2bcc1bf59cf746d2c
SHA2562b4d8e833e0a7f759d79edc9e1646402ab4da9edc784ecdb3c155b740dc6b882
SHA512b8a5e457f20026226427642e7022a30972be075a0ee9ed27501c1d94090418343a17b5e135023b6dbc2617e580c21bc37741e66ef90ffc19d8a8d4e1f4c2ddfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdffdb73cd47308a14119038c142b759
SHA1f2712c74fec2e06791ecc328fcea09475928c8da
SHA25664ccf19999f65a0ca8adc16b05c15585c54a4f26c5877c71f177ee083baf5a7c
SHA5123644fa84027b825a5bb819b2173dcc2f50d03021a59ece1773be68fcdf24bc39a9c130295a7d63d03fddc03c490a756161fabffc5c248f95cdc90918883ffb65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5860e4e3ee614edfb9e91a0b46b20d7
SHA13c1ff99558a5c48b425049bc343a39fffef30c33
SHA2567df6c73782ff63dcddc4eec5bcdb0d3e6c589acc0368986da131fca8a9f0c67f
SHA5126e9e8dc2dfe7e45395ef3be061398b5eca4b18b18304d7e3ce463df537d67e3ebd52429a2884bad0e8347107d090f5d28e5a97dab42cdb72148cd264579aefbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555105ab883f15357015c09dc28f4270e
SHA1e1e087246cd68b883558f370fcd0dcb420e8c023
SHA256911cd613b9988e967a559a709602137fb9a9a6e4c83afcca698197f37c6b21e4
SHA512e2ad2f015a4ad6b41d792d3d939fa105724bc813c266cf1ed498dcd021d0adf40997f6008aa84b6b3bb82f5e6d583674cef4edf860d8a690eecf1affe37bd25e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dd6109087154fad070341bd855aef5f
SHA16444c38cf191c68e12280eb4407b43de81032cd3
SHA25651fdfe3321c66dfc82dc2e9961f21e443d2914be4ccdcef96a2335791e3adcbe
SHA512d3aa174159a85d364b2e1645d4ad5dd40ab114e4607d8180ff4a2c08d1c66c45d898c1d2e0757e5dea72cf9fa8eae8cfd4ca4c9e8d0b7819f5fda45fa580b4f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea65acb2621875b982a42392b3109a17
SHA1f1335f782ca77d4c0013fa72fb2fc819bc3fa099
SHA2569e40e84aeb325b625bc98abc7a54647c76fc9b4bb9033809280145b87b0a68a9
SHA5127a693ca3e95b80bd49dff20cdd0ea8927381dd289996ede36e76292f36e1c032d471fb613ea8994497d93133ce49995341522c48babc62404cb5807b4587c47b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b5e495ceb5df15661df1d5f77d8f0a4
SHA1be0d00d8be89c8ed27ef38428b1f9f6915d5cf79
SHA2563513b20513b39058df54769b5e5674c883959e689c630fad0aefad9f9c8edb7a
SHA5122d338564e29efa67b7ed9ba7b699d825870a2e1280c350a55278adf017cc77e252fa4980c8e8fd67a57a4224bf1288f444a9d29df367ff742da74e50cb114068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53017eea67185148affac45fde1300760
SHA1de35b634f12f521aa1c50fa4fbf3926a049a0729
SHA256c18fb44f69703e599a1683941d0e43c7650a841cb1abf5cf790bfbc367ee383a
SHA51270db37234cc73009f9049a4e5252427ad26faf486af385132ee9ee7ad2ec342ed3983749ce361d49475996b7cc9aab38279c2da512525240de55d59da5cc1bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aea64dc23d634e9b8c1331906e73674
SHA1fe37d9b0663293ed6aab61f3534f7c625e213559
SHA256770058044bdb7c3860a05fed7b17339de736c3b5517420a4f96763383962bba5
SHA512834054ad005d8bafcc61180eb93548f78eaddc5cc8db9f717c2b396ea61ee546f38f10dc0dcfc4a628096189f9ad2da4993e290245645818a24d8810bf942ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a264c1e17847469bb4b673d2524b7ed2
SHA1cdf1f1ddd5417cec345cd5847cb6421a8df87e3f
SHA256b7bc4446359cab5979ab127adaa72d9e7d6c7fd29972186b292825741178cd9d
SHA5127ca640db106bad67ff643c7e343ef326827014616da7132cf4b6b7ddc9d143ad4a6f817a104d284547ebfaba14afd72e0d8a681dae7ddd6c42eebe620f48e4ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7035444a5ec321bec82322c1cb2cd10
SHA1ec6dcebf58182f847b2453388198ecc810281a9a
SHA2568808b9ad95eab63d9abcfe345e2de0ad859aa9f029022b4f79e0bfd2b09d2ac0
SHA512f4a2b13c6aa47c51493a4279689f40b695941cb223d3cba10bc60203076c60bf84833a617a99835567321eb36b51d22b6829724f9e2085f388bc42f51b7bceaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bdfacf231ecaa41d6a7b9a105db0c4b
SHA10f53273654df9836add83045a90d36aad4b50bdb
SHA2566121c1f4f8eaf18da0633407ed2d01a068edc3a717a088e3d6e74476eee6f89b
SHA5121879c87bf74c9413b4e27bfee3ecc6c68b65cfa4a477d867a8a55f67072d667076307457ac5757e762f19bf8dbfc3270774c665c78f39f98d1ae4841ef116a84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5569f2d7d462d17f5ee35bcf1eeab6f3f
SHA142d913535a5ae6781c975cace465cfc670681937
SHA2564f31038046f5d17edd20d71fb0e16d3814c93d4ff6d94f53089968dbe3ad487c
SHA51250356bd9883ef27bc40e8f87df65d07edde828c94eaa1e8207ee9198482b126dade94130def8f81a818a0fcc58da9e6da704d9cf6748794f278b23b5fb0d838c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5c4bbdd307370be29309ebb225e7ec0
SHA1dcd3f70388b9b984cf0312e2b7bd81af6bd1abc5
SHA2562f6f4d23278a7559f7066f2d72573f05feaa21c15a976c7fabf7090d9f68f422
SHA5126b05cff2553e4cd568096d93a9b1a17bd711c9f7fc3f2651e165a24c34b54aa22bbd17f7202b13bc768576795d8277587177426fa8c3920f7e5dfbbeaa1a396c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573444dcde9ecd4cedeaf9d18063033f0
SHA1ed561da569a779051a840c513cc861107f9b82ea
SHA2562c8e8884c96f1d3667afa4448bd560aa3a83113974edb92678ba89dc2ba9905d
SHA51204b789b5960e832e067f4ae8943b4d16fb768cc33290cc2c5f5bb09718fe07a771bf9997ad5e87b5b4724793bd877cc26e90accc6632e383a321acd6fc9d9186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a0d7d85ceccff522eec7adb348c0037
SHA1daf5f911b5d7b2a073988e1a29277c794ffab664
SHA256fdff943ee3ce2592bbfbd037a2e7ee0bd5c2fca81505b95e9690a3fd0f19db4a
SHA51230d889b05d0b786c0dadff6420594aaee9476d8a5cf1faa444e266946160aa9c1180b74c6b4434e7b52bc9b302ceaabd1b50b9983c49ebe2739da1b46396ba56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5843830ac6abfd572d0f2ddec3fd144d0
SHA1b00cadea370ada8955e52adbe4e9cbc82a8689ad
SHA256cfff34bc752ed0e23ae1ce5a6eab8e7cd386c79f00b96fae2b2ff7e22af24803
SHA51221bb04c0590b4d3954dbb3b9670276c080f04cb4a66e6433d40c8223760072d69e889e8945fccf1e5b699973808e03557fa90bd8559b5c84e2befb2c19fa1810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5156759fc826d71b97173d78fb974f312
SHA16645c2e0adbfef1e505cbba9d75378483561e4e7
SHA25617854d3f951d19580cf51def83c8dae9aa3198f8245ca3362fb37bfdec6ed101
SHA5121a4c3be673ca4bb2e7f5811a58efb2591558d6d710dab7aed9f233be9440c8586d796ef3749c526b9014922cc53f098f82d1109ca9396d80ab76a3d7f9763359
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\fonts[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b