Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 10:37
Static task
static1
Behavioral task
behavioral1
Sample
77e2f55cc4e48eb68667c044947ece67_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
77e2f55cc4e48eb68667c044947ece67_JaffaCakes118.html
Resource
win10v2004-20240729-en
General
-
Target
77e2f55cc4e48eb68667c044947ece67_JaffaCakes118.html
-
Size
91KB
-
MD5
77e2f55cc4e48eb68667c044947ece67
-
SHA1
4c8f640ee9fd2d47a32404ee1fcd7cd4ba59e808
-
SHA256
c85c9538502979d380fd9fab54a33db05224661b9dc51054a6443d4e52771417
-
SHA512
9eb73d31c844587d0033f75424deb2d6aec86ba238b8adee1d7bf39b53972c548f601c1d261cac76a2614db2a51877d1622ce45ee124daef0d8f3524b26628ad
-
SSDEEP
1536:gQZBCCOdZ0IxCu+9A1H0S1KiIYx9ZD5WpVWX8EeF2j3/nkNMqXR1UnE3lvYFPAQV:gk2r0IxlPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428490843" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d057ad8c5ce2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B71CD631-4E4F-11EF-861D-F64010A3169C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000063c09fc580ba31895c42f26230e620db976a9b7333a4fb38880e5338c8a7d3bb000000000e800000000200002000000086b2abdf13472f912d2fdf9b681a0a184dd8f6b7d834e0cb1d88900d302a0fc3200000002c212664ff7a8330f1c5fa0bc1bf77d63896838712ee0ecbda4406b9c8099a4b40000000bdbd50031d880409ed0e2cdf8d2793eadc6db459e8e7d55f55125960225fd5cb7dfa4a6b1bae2694561701034087d8287a35e724c9a791bb808f7cb3f0b227bb iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2724 iexplore.exe 2724 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2704 2724 iexplore.exe 30 PID 2724 wrote to memory of 2704 2724 iexplore.exe 30 PID 2724 wrote to memory of 2704 2724 iexplore.exe 30 PID 2724 wrote to memory of 2704 2724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77e2f55cc4e48eb68667c044947ece67_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524ac9ebfbe926452f3edf583319399b2
SHA1e169c3560355062211f3c93fa00d59139971ec5a
SHA256d59ad7606ebf8bcf0f9a07009b9a4b7dcdbfab4819f3f29a39e090916bb6833e
SHA512f9af5bb1599576ab59f7093c76f6c997093b72e7b676d4ae15e4c80fe801a529e7954abaacac9aaf612c7a32dd6a333a5f3994230e47142bd4343d651f68232f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aedebf35d9883489e6350a160c581a28
SHA10a0aab538261c59d0d40ec1dc1c809c1cffac5c8
SHA256a17cb562ac23f0982a2061056e7e2be552dcfb2a5856eff056a06ec3319b1440
SHA5125360da030e349ba55dc57e370f8b1c6f3ce6886e349e841e4bc3ef5c59091e09c32e4a40792fd6ec1b82e9f727df755a4e2eb0105de92d88c6df6136b42641a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a68e29e2517f05b1691a6f743bc1b0
SHA1020c418d4ad5815943ae40eadf18d18ff2d741f8
SHA25633e2f583cbd29c186633a2adfc69fb0f3912ef4d858ede06d40f0a931a9427e4
SHA512c24971711c5261479f180fc8bfde7cd923d1e8643488345c9b3b0e6a6298ac8af0c0aebbcb91c0c6e1faece46dd63d0b75ccff9a9c8895de166c2c0df34ffbf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583e3754adb87fba0806dd379b131931f
SHA1e54c36d38739e0813cb632a257be1842bba45fae
SHA2566e7df783b9ffe66e31810bf38c87df8eaba6cda375c138d0e63a5ee632de9154
SHA512c41ca98cc2530ccf0fa07349cb6b267b83c56310784cbf6b1921e4ae9263f861316056c4bbbe5a6695a758fb3b477625f9e5f6de837a241dbe3c11f36e78b024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56576ff01d0976be7fe2228f12ba7b447
SHA1b09179df18865a6eca011ae78e9f9303422dc235
SHA256011ad8f7cddd07db0a2253b163928de444ac161bb98927a58b75c117eae905b1
SHA512f659e1bc3fb8baa4912e4de067cc076a0f8b29e9ff9eb262ad35aac6be650fa0f5db643255011a06522ab236ddab574164faf6ad2561dad05ddb239d883cee7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c852a0239f5bb64abddba4d0ce9ccdb1
SHA134bab79d16a75cd3ac872d68ddb855b79e4e2b53
SHA25696a9c126fd06f1596c6e51218a1ea716efbde21c3ed98379b623c8018de5e282
SHA512efa2f970d9e5a76b7efd22025970a3a828510d96d63eb63bb82a8ac20849dbbea716d8b10fa42f7431f232f273be6a9aee0251be256d53a7975284044adb246c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d18656812022b731006ec684bf91d02
SHA10c6b14816dcdfcb85c70e329012d35d8b05a57ca
SHA2563ec9dd765542d246a180378b3caeb69d17980526784f58d879c6ad6397db7ba5
SHA5121d8a9e67d4a96a3e58a66a46821fa9b1a7939f5847893f8b58eb6fbd91ad33381d47716a3779c609d28af0bc435aff68ab7f7133ed967a40d62323f272c36afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee7548c1ea0c5c4b1d046ebc9bd98a1
SHA1f552127d6cd05d3c0e1768c86b66f2add5e4a088
SHA256e8700586a39960429a5f10522dd98ed97dd608c4c5886758998322fec6e315cf
SHA512a1ce7845dab85a82362ac9557e26a37f47fcbe10a62dbca19bc857eb1f6c0838642fbe7f440f0d82a4142cbc4a74b7f9e01a4628bf736fe48e02e11aeaae2eaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d25c15c9474bb86be830c2c74924978
SHA1da50f7a1d2affb58b88ed78293eb574433b5f05f
SHA2563491b7fa99142468bb28f10e5db7c3a7a53f7fd217195af1922a47cead50b14d
SHA512e214c7d4df950b03fbe03f597950742fb6b8ed772444083e2f93b35aca9904dcbe00fa9a5aa8cd7df969ab164395b9622f8375e0a5ad168ca228ad8fd9642f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5556856985209400752f45fce0b1ac8fa
SHA166d813325bd297f2e785a7dd9c00b8487f64e058
SHA256521ab17d342dee1482d00467775cdb3c086e391151ab6a9517b9ad6e03d54ba5
SHA51257f3f19ded3bb8f7491ac8e5953be62dc88a57d74655726967471ec4d519fd97d00f0ceab863bcd7764d73fe3ebaaaa6766a33294568645c61ef6a5e6f484cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55abc6a1df67865a018a2fef425dce8b1
SHA1721b9c8d9f7db433d3eee8754fcc06cb3cddce0f
SHA256eaab3afd61d93b3bae7639b1601506c05b4fde0e528adfb79d85b0a09211130c
SHA512fd191fe6de93deed5f46d93d4a69ff8ae2fb04a1962794b8a81dd37c9fd488520a463aa005a6258a31b2d60c9111dfa82259dbd2f2c9b0cdf46c7e9c810d58b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a55511ad28533b2e9df9fff9d47ffe6
SHA1d5a410d4c5743f23871f8003f47a6be82195261f
SHA2568e11476ff490cfa36858101fbe426d5e6470ad3dfe4cc5a5e734c683edc3d93a
SHA51260f51b8be1fbee34679d24d9f2c57f2c0c9e23a439de3bda48ab5378ba658e516eac5d99397f7e2a8334d10c90fb15a3f4ae93406dbe68945a53c2117d523272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5968b3b0f1342e578d15c8e9e4c2ad67a
SHA1972c7dbe025186e06ffaba2613f17e20d60f4b46
SHA256f39013ac2e91a171424dccc9ba4a5975cf419eb47b809671bfe55e0321a87aa8
SHA5122beee2a485761d1f0bcac14fd1bc74745f166f45071c0020a7eb340868a18e68b99bea5c5f0644329bac31f17079e9a4c739c41e6eb0aa5482e2da036c526c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5974a6458eecdb3585bee7359b0c1fa
SHA1e67431f77969d91f7c85fdb8877b3f4d33a22d18
SHA256e90082408038393d1d251ea46cc22aed55c837da322554b18f81d1da390ae679
SHA512ad9654e8ff8521d4647aed4a6bb389300b313ca6016981201289411c17b421a8fc1c843b914c040bc1a8ab8482e8b9498852c9f66940227a7b7aa7fd8e135ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c853f291e07bd79f7527f2179ba45b5
SHA1ad18bc3c51bc315995256264ddc2adf1da844b03
SHA2564142371688aff1f6d3e2ccf6e045e0fece60e4a992e3f0501b8fc5389d818258
SHA512f053769fdf5fef5df31421b22cbcbbb2b48413c864187878750cf864ac1f36ca109cdb99a851a3e883121d990ddd929ac24c4bc37d7ef7c7d5de255b05e15e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f764712654e1151ba0309c5909504d8c
SHA1a668ef48627587a4b7a827919a8d4517d96f9dde
SHA256efc764018b4259c7e66cde5a32e140157ef9c39ee576985ddd1da7170123bf8e
SHA5121daf7fa780ef8dc6046c13f980cb5144761c5129dd53ee96e90901aa5ac536f84ea649f872b5fff1aab4020d304e989352677978620d26de8ee6c94ffe56de0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ebe220d319ba0d5a353fefab5294f3e
SHA192759485ead797385307418592bf305d0e159d7b
SHA256eb71e6f897a61637c27057eb7dd9a6f932f18d30b1948e56282cec8d3c192e7c
SHA512ff05480a6aedea7b9cf46ef8c3a747abe6a2bf5760365ee0eb0aad1d03fefbb9b624ce18c9001edd5f135283820edef3248057ca560a18b711819f2f96a69f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a885a06326a6d7f6b282c8ab45a96f97
SHA1a1c3d07a41108c1b65a2e7141c90ed5a94c3da67
SHA2566dfcb2956435423d8b923976506b45b4b39f7a05448a6402617d1d12641ac257
SHA512c486b8f8d289d2630528ecfc6beb6b2e92f13b62eb89e698860ce2bfe847726e95da9a543b6f69044fe89dd8d2e1c45dbe5bd814097936411f1a51ef5e29044d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5634729694180a31b2c76dbf2170e6722
SHA167bb4d5f95a6fd660b6f29ac8167523cbdf0c141
SHA256b34cb06edd08126fa3a274e1f58060c816998cfccd76efccc3af6f85cb997b78
SHA5124c624cc996a948147dfc4c3cce740739f998b4472dc299e2a3c64d4b2d656e5e6437dace41c3afbea9af5f6497e06ae8dd4fbe4b977cebad13e3a19063b3ef04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c74b0501ca562e1d7ec269b1909a5314
SHA11c09387fd749c1ec3c5a312e9ec965d6af017913
SHA256b05a1f7d41951dd0d6922cd40f5cbfe48c04399825be57ec1451d09bca190f38
SHA5129e4a7a33174dbbed2c8171866f7bdbe4ca65fc663a91b2e72d67849bd7d5dec317685e24e5e31ca4f763daa041b7ee40c609502db88e74e4c9598db294a168ad
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b