Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 05:35
Static task
static1
Behavioral task
behavioral1
Sample
6a6a93876597fa50d8e21e2e68dea5b5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6a6a93876597fa50d8e21e2e68dea5b5_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6a6a93876597fa50d8e21e2e68dea5b5_JaffaCakes118.html
-
Size
1KB
-
MD5
6a6a93876597fa50d8e21e2e68dea5b5
-
SHA1
62509842b4dc4b1bbc36a4a5bbbe22174fd67570
-
SHA256
3552c4b8526e83ab77d4ee98a48eda5cded947f7685784d83aadf3f4fa388f78
-
SHA512
1b31f7e01cb23ebbb452caef28cec8fa83ef816b0a2c6d185f7035bac789c9490da2524710e33fc12ef5d67fb232024fe5f3f845af16ed50437b031179333058
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{913F2421-497E-11EF-B903-D22B03723C32} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000796e0b8c715d463a912fbad1b4d67b0b3b871c7ed5a0fdb003dd5090c8b723a0000000000e8000000002000020000000af5b57568d72cd8d16188fa557124038bc838d725cfa4b5ff34c6802b02a308520000000a96531e67e664280cd5127dfacb690faaecfe438495d5e03c14076339cee102440000000aa51fc92796c8e8b19e255ce5f01e71a145350561c4652bca46eb08f2298fb701b1c4f0f879f3f019d59565e8063331f0d0e2346037133249c65554a8a310ac3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108348758bddda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000007417bdbd8da03959f6ba959e15d234b4c73d386e483ab8487e307a2c308a2ea5000000000e80000000020000200000001c4192c02ebb96f42a1dbfdeb0af5f937d19ab801240a4db942cbe415f69c25290000000626cdd670b44a1341445ff024158ac428d328381e61a0c79234d4f564ad123f02613f2f58a3fed20e033a631b48e54448304ea358a036c4af2323792c8614b3c7e872d2b3e878661fbd5d3f150fc48b2d0418ad7d0867c77ed4fd4b83d1e85c63a4b8ea08533d649983a6df12aa13d86df8ba1044cbee7ae7a355494ed7344d85d21c875ba55dd3ad46e83ee28b94e15400000004d6505184f765e5fa8e79a28a29d6cf3763fc4e907532485063c591f81a0f143cc7dfc7c858c8db7bba593073dfbcd27e68223906a16a07fa65d29f6db49d5e3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427961209" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2752 2372 iexplore.exe 31 PID 2372 wrote to memory of 2752 2372 iexplore.exe 31 PID 2372 wrote to memory of 2752 2372 iexplore.exe 31 PID 2372 wrote to memory of 2752 2372 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6a6a93876597fa50d8e21e2e68dea5b5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fd17b76a5da0351b1eb4257eed305cc
SHA1c5d020712b536803cc7b63241a7b2d4b42097487
SHA256e9ebb35985f8d79e82fd9fedcbf1bc5754a4846ae79051a0d18419290e2fda02
SHA512d50df1d0c5efe741edc388fd731dabb15cb64cddc738b97365e121d81a9079e386c4fcbd049518d6e1c26d2d85e2c4441abc78e50658360be01bd460d966d6c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b3e890798bcdc94eb7f677771db98ab
SHA198bec7f0c540a7052a4d7cf78b3baa5cff5dcbcf
SHA2569943af31a202fd146f9d8b3f04ec8337718e1da5f35b801999dfe21141bb3703
SHA512c7f798a3420b3a45008a2e75cb99c7e72fb0aa07e7c7ab9bb8e3598c6552ffd5a8c38b0379bd7c2105c9955cff65546e9171c7bb1f2bab7762369cfa9889cc13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ac3923ba9742ca44ccd9044b908a7ba
SHA1e9f2781c4dfc19cede42a4e1398ef07a832f419c
SHA256bd7f9f3e2685bbaa37a100aa45b593e294af98590c3da3c42e39ed751f5b765d
SHA5120625ea2e76b415f6b901727f1f25ceb112edac8caa2beb8ac1d7475d6036b55a9380f3e7b295f4425ec9458d7d8d7fd9dcfaf7115dd40c856b891a7d1be7e87b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5476fc55f739be9b852a5960fcb248388
SHA132cfab0bccd9ee1cfe6272ce502912217062b944
SHA256701b6bf35a7d157475e6ed65426f22c9fea28c3dd0425618c68c9b7641484851
SHA512a8de90b167d91207488fa148d8cc43d2336594d9a098d41d4c725f5b5cc95177c738f9e3f838880bce8cd49e8cdf68838126e0b58e593bb5579c98c00e263939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f7842084f0d878800b21efba0b62cf
SHA137542cb46fdab9f8b3dc12c5a6d1d09a20d5537a
SHA256fe04244c9dc447b4366dabc4daf76ba320d41ae618bb20488a0d4758d04facf1
SHA51274e5b0ea52b783bcf2d39a8f91d46b2e5fe32fc4062fb484bacaaaa13f228680acf1a1043dc8ac98d27cd58ac3395944326b876937b93e15c90b259631847bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c6dcbc355d19535a52453ae2d94d691
SHA1654a1d8c406da6fe1f85368f9cc92eb1cf67a505
SHA25633f94965ae4b5accc9b7fb7a7f976e2f564893f4f441c85a7bd9fc3222dd18b7
SHA5120c53e781b4a437aa5d3505d80919a90098cfef695191943570886172b90ade082c76da1036ef3b512c9b445d463be470b8f393ab695260d9ac8559b31d966770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57495309a3cb9fee98521535a484f84f3
SHA1c4f0780745d759161d8db0e40b0149283d62aa7b
SHA256779e40ef58289a8c3ffd6a9655b096e63e8f4991d5d8fc29d434698d46ea1d59
SHA512e9a3cf36fd024313936a5ee1a7ca5829045622e0f499ba6183c0f89c5702247e3b2ef5343b12babc6cee9eba6de58207a229f0ba9924f0dc3c2cf325a11fb926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520ef3a5adcf99cfefec87a90491bf341
SHA1d4337bb909461616aa30b13bdca180b9fda8d169
SHA256974ec5d95b038a68d07756a67036b8af301825858d88c29afc6e9e0b82874de1
SHA5120c9cecc817ed93b11d06b99ac60d382d4f1abbf3fba51669b826aabcfb6749b351ce064bd656ed47a04e2c57d37c1b9216d1cdc5269f283eaef52cc9adb8d03f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b763c9b490097efecd3c6bfbc2ec2d
SHA1a24116caf4d34d79dc127c817977d3004e080c43
SHA256771cc98ec9186ccb327933284b87185bb45f15abd79f8a5fc5ccf27346402c57
SHA512d5c71a442b535315c1f53444165f96857562b40eda06ce4ee776bf4d14f21b2c9051bcc50992f0090742cc5b82cca193e3abd19b1ddcb896a04eca825bf906a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5d461f5cdc8f71ff62fea851ca77d76
SHA1d3a4d6595a014a434cc8b72d7db96617d22584eb
SHA2568bd7256703eeadb2efdc943e2df09773ed34e112ebafae87f2247fa1d5e5ef18
SHA512ab67042afe4438594de2f148dbbb5645d6b0bfd2eb7e92644ba2fcaf0313c6b8e57f5bcb9900e670fd6b1739de4d05f72efba889c00792338bab8490505f6ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57891b9e163d85449c0141d8da25e1a4e
SHA1d8e33924d7b17b9e9d316850ce1d03fe7668890d
SHA2568c6b407901a24181e00e590d8e240ecf86201722d39b2925f0a0b66f690f49a0
SHA512682f395dec83e72e01df65ffd9442f69a3258519ae93bef2494d59410c5aee4e3a0c7862707743e4650176ef096e1b401d338251ae0b60a1eeba006ede2418ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5033fa658cc766c5e1f3a5eecb523d0e4
SHA1c7ce6e9b9516ec5ccca30a9f544bef1013ce3ded
SHA256e77f303a23999018953d21e8fd9d4e421c5abf658c6c7aa829a509534bcdc191
SHA512d849b2f697ad0270541081eedf4f18004e928930b45863d8444fbc71ac60e5f4b96899e03424a785cd84a0724f5c918172ca574a2f795ae8eceb68a9f3683007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533f63f976093a98893a97ea53ee90a64
SHA13e91cd95e5bc4734fcdc3b79e140622d93afd89b
SHA25681449c367b9c168387ba029953d263ca9ab12c920bb09b5066e6c78b72f7310e
SHA5125e70295e76744bb457ff2e64330db4904796514bc9ae36b6ca839835677a22ff1cbe0ec515207b8d5eb663102697a63cd629f90430ed6bcc3cd631bc47a472bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53834139c0248c675c653ca7684a94838
SHA159497400dde6c52249aa2e33307b162be5daac92
SHA256e1e2990ec9984b62e720a0c5d105b364d7f6b76ece844ea62b17aa01dc6055de
SHA512fa427be85940ea7911e823aeb61748869a9a4cd4886818dd61d5a75b2b6ff22bd4813151aeab6ae71bd9884090d9f92103d80fcce6dbe4e9c21ece68427d2a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e210a62cefa4d7f65821a4d3b98519ea
SHA1743ebe9843b24ffade06d0a189afbcdb9a9d7406
SHA2565bf87981303cdbe672974620eec560796b2cf54ed44fd2a22cd580f5a61f6824
SHA5126709f71f1ba0ba717f3042c8fb5d2ad6553f474cdc435cdcb3689d813f8d6a1a3a2c6a80b8e194156970966384a9728693b919ab6ba17d936ea43ae2b08cedb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526da7045e992a7e5e43777a36b87878f
SHA1e505b1fcde28ad1b46d74d2876f5b702fab8927d
SHA256f90ee622ed39e8d2302c20c12c5e007fa7b8b29e85f4e20c225063289f31ad72
SHA512295cea749f44314bd025fa016ea8da879a66b44b572bd28327525bb492d283106db594a728d4a8942fe2fbf561f4878768b70b624ed46d73225f743d6aaf24f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54642fc15c0f08045d63e0b7eb648b6ba
SHA16eb223858a8a754d9056c35bbd80587f9727a3c1
SHA256430d5d03d93bb8a5c5c87c74b53d98d125a7c870d6d9d4c9d51bc7036e9e8854
SHA5124ab3e04827d526ea496eb5bbc3ab7e6804ae11656b2496c387e3de2a5953cafbee99aa6fdcf4590896a657d53b51c4a6818ae838fb070d8be40e3f520b2ac2b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a38a9f4bd31d8087237447793df4e7c8
SHA1c045c382a73f55886e4daa1b7da42371c5ed25c7
SHA25679d6e7c89dcc660d22a73c38272239e6b6616c200892393c82cfbe01e9bb3583
SHA512eb166e1b6e50bed763968229aa3c3dbe380e1dccc69e71ec8e1b06b60604f7de9b9b3b8ffe4c2c3a19aa56c94da4c7a40eaacc72ca7fa3e78cf81936c2a382a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59618a1c2f7acfd94b3f97d12131e5477
SHA10bd357355cd32194c899e11b573c5f402153e6dd
SHA256a200e6f56b9def7f025c6304c2c6623c9aee1379a9eac9d244917f7d377c9e8e
SHA512090c5ba2764030c0cb999d2885348c05d94198047570b9f7dfee7df7353ddd01da681d0acea46ebde297650cde0e5ef5ae903764ea8e5b4318b93913c93dd8af
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b