Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 12:18
Static task
static1
Behavioral task
behavioral1
Sample
af2f36e041853ce809e801b9fdbdbf27_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
af2f36e041853ce809e801b9fdbdbf27_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
af2f36e041853ce809e801b9fdbdbf27_JaffaCakes118.html
-
Size
24KB
-
MD5
af2f36e041853ce809e801b9fdbdbf27
-
SHA1
aac62302417ea87a8125cb87047a77722a5cfd32
-
SHA256
b9dcb60c6fa2e25c9609fe0c0a59ce4b8c6d89f486aa07496b6b9a69da37f8d2
-
SHA512
02228339764dc7158991b1a586c42506560040c2d8ee00dda1ed84b354eecca2897da3a2fba0a2de119fa7d6da43ddc3802adb122a8a88cbec8f450527b2a7e2
-
SSDEEP
384:9kisaVBRdK/c/vIWs97K4XndGZPLu97CKhEJe8fcZdznalCcBxPAWEAK2H91zkNL:uisaVBRdK0/vanI6hEJeZdzaK5O1z+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3075f92cfbf2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55933991-5EEE-11EF-BCF9-7EBFE1D0DDB4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000bebf1b485088b4ac771bf3c4f286fda1dbe3b52cea315ff718798706750bb586000000000e800000000200002000000047461dcd20e9a14077c65e3292309f0f7d0d12eefad15310b1bde94e7c310c9c20000000e5e0a6171b6e3d3e5e0c356c8a7c1d34065da906437ddf438c120cd53b14f5b0400000008079ce9496380c99a8d603e737a4437c12771b66a5f93d4e7adc7d3b84fafd20f1ed533bbae57265e362d856a5d6549c8cd9308aabdf03ac14ce06ca4f433d11 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430318189" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2680 2668 iexplore.exe 31 PID 2668 wrote to memory of 2680 2668 iexplore.exe 31 PID 2668 wrote to memory of 2680 2668 iexplore.exe 31 PID 2668 wrote to memory of 2680 2668 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\af2f36e041853ce809e801b9fdbdbf27_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e5a250c743fa646cfe748f5ae597552
SHA1e2533720ecd572a560c81d7c17812ce2a11f7175
SHA2560dd4bdee381046c198b4863a41b8c19e92aad322072245b10c9b9650a3a8e00f
SHA512b52d6513a26c387ee99d7eeb6e036290aa583d15c89f9ee868f662147b955c71710da7ca91e25fb4aa010d8cb043bb185956478e685d066b9b246b6961b321b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2e2ff56ddc40095ab1a5e4ff311b8b7
SHA1e74fea0c25ae0627c7c557b78199150c86c2ad35
SHA256f7e4c5716029ed4d4f7db30a9bc7134a51d56bad31ecf70d3e2a324b2861dacc
SHA51273f9fbeb0cf53e0d48adcae85a96f6effde848fddf9ce209bdf59d504ef77832235f92ca6301b38e7914d002ca93f08eff9d2a5a53019dd14f0ce7c6c67b7d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a6910ba353572809344e07a78005a2
SHA1aa7c86c8b3eea049be59b96491a3b562d4b0e38b
SHA2563cb99f5fc0be8db59a53d78fe3d6fc144d94c981180961b3de55155994e97321
SHA512849b138be24f191fbe8ca5212cf400749cff6106f103be1ff653075429e5b3e6557b92a7323bf4fb573728031b0a17a5f564bbf42edc04f83972bd02f3e53517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554111f9cdc6489ab7e6f897e6cd3c0a8
SHA160f08f5eafcad156f59b5876fe7615e47dc07acf
SHA256751a105144febc329cca7266083725d37495309d75dcc5eb6b63b600cb871415
SHA512e578b60a7057e26b4f6f1edb83b0178b8091ef0afcbb028c8b1943cdb66d960bbd1c55a008512e5eac64c41532af66cf57511e10903cc7a1944ffa445f058ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554393a18d663b0f6ed7a458d0e1b738b
SHA112792a356da791d200f2119aa708c59d94d504bc
SHA2566d497db191d3e6b94e31b7ef2f85a0bb7e7de7d2741512a32c9bdd21c1e679af
SHA512084b7f0ff7bd7e515954270b7b51fd437fdc1e1d471d8a6045a4b4efd7966554fc43e1132808d2217d3dc46e6f40029c66ec0c10e5f2cde64e6a31d7d8c2267a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de041c401b363a72eea86abdf547d632
SHA143baa94fe07d73892af7d6aa45ccec410fc34e40
SHA256d7209a34a6c0e9fd647b5afb348f97d2eb6dd0fa8ada0987feb8cfc15558bf2c
SHA51255fcdca590bf94a9cdc114bc03a2218734b7bd2e7c2bf540434cd247c4c38f2a670605a6902e44cb146acb8b2ef011d63f7bb5eac550392f097c3d7cd845d410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eb6a776761c22abcf4fb7fb74163982
SHA192dceea06c2e3c609e7e6b82c30ca992574b6b32
SHA256b5626c1323e3f85265e2d03386d2ab8395fbf9b09611274ff497bbd3cd58f5c2
SHA512b0ae01cd1a4d9b75c0c48935b70c5705ff1448ca0f22fdf93bda04822af1b1f2f730028a7a247d26cd833ce24f58ecdd2d11a65b816b8307b987fc9be5996cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528391be4dda2307bed3ade954697c0dc
SHA1c96374d2eee1f4438cb6933ad2dbc474ce9fd354
SHA256296acd2ebcaecc30536872ba8aa174895e3d456d7262bfc8bfe2047c3052267c
SHA512745dde8b379000980eff97ffbb6bf898d7a110fd039114052a988cc2ce30d8feea3955ed970facaa12966ca00c9b20bed9f82b4f276d01568e66b64df9f1165c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e63808332f3c04ba5ff2d5888f5bfb3d
SHA1e61b68751a345d9767f354430dfa33877ed2a37e
SHA256a591fe298583f51552d7fe466817e3997028df92b27021467ab8ebe702a9275d
SHA512bb84bf3487577a9dd1ff58facf775ecdfa4b53a4cb023c59dceec0bca38ac53bf83822cce82894fdf122106114af20545c85ca483950dffa9b114562429a50a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524a12e45313dd7f66e4076aa6ba2026a
SHA1ee0af5dfc4fb386d864eb8815b4a95f110166a5c
SHA2566c15c3d5275835692c27fadbfc792c63a3cb34fb67c5686a77e7a4a3050044a6
SHA5120457cd108b7bc76852f07c94ae41d15e49f90d32be8296571b10b950cca060f887955aa253e71d885e1eef8956cc06c03b28b00307d7f984ae75df2ef952b2a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f3748087ae9718a913f14f0bf39709f
SHA123ef566c830829133e8c20429cdb9b6b267dc202
SHA2567b0a963bc08faa60f9e8fb4d5b111e4abd03b96f36158dc42e07c155bac0f01e
SHA5122c01854c356f396cde999e99fdccbdd3ea1755c1435f537c4a9ed1d087d923891e557c8c187f0e3c059a68bb6e9138dc7e9c3ccab8f06a5f613a6af6ebc7b62a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a128a9d840c878ae2ffe3ab21f3938e
SHA173104705204b11b804c5843dee59b7f85313991a
SHA256e4c69ae0c9d7e6b23e71decdfc8cc2817171da31eb7b99ba5ca1f61fb7efabb4
SHA5124dd6422f1a9821c44f8ffbdc6706fd0c6f0be35edb3028274131cfbd969346a19ed3f285870b09a577df73e79c2b53bd54c7c269c740a1a524f15988650ea1c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7917453c3398e94068746118ddcb048
SHA194ce1c5d46c6f15d071e3ee0d8eda2aa8c9611f6
SHA25684d2649d3b59ee2967d6058ac80930a680666932e0f105e564d7b403577a2727
SHA5124c1dfb865cb75cefec893c112a12987eda2e27f3eaedf4236c538f6ca43757d874223703701cecfd3d76487e6d3fb51e90b3e7a9c2616069a1a376fc865652ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520807532889ae40c0d89003db3b1228f
SHA10d8481294effbf58b0ba061ec4cea422aa002d80
SHA256afefada597ed6dc9d7973ab863a8375c4f870052427588edbd78bec93c35a70e
SHA512a791923ecd8170e3c95f5019a7e8d5c3940a3ca6c538c35aa4c406773d4da7730be7a065a17dedf14ec89b9bcea7d25a446394e95da07ff8021b0fd0dc0e558d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ebcdf3da8b76fc2524f856e25dea9b6
SHA14c7ae5119fb2ba1d9c433f07e0b54f8c7cefc2f0
SHA256277c4982021c85b4203a585ebea2764924c6fe04987053d6f219cdf44b2462d5
SHA512eb1a5fd683f8792cbddbce6582264618dab0f39a98f133e7a3a5f3a565689e273ed569a255a44cd575507f0888dd84a64f4d7d2c1b12f15e5fe7837d651f5778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b061e608e8db699703d909752c25d55
SHA1ea8c6969151e3d8dea4162f7258a6a58f4e10fa1
SHA2560c378b97405ddd0618ba971da91f6b570e96861eefc2b6c3a9a05360d1c3176d
SHA512ce3c631144e52f93b9bb9b297e604b1517bef5925390215a5fc27ea92ab4a7aa9a9579c955f710c8ac79d5964d526bfb94349836ee7ac34f8c2951b2ca0f36c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1abcdb9e6c3a7d142baf89476667117
SHA10e5cf5946b6946eae2d169862cd2fc787207e682
SHA2560d9bec92b9e8b83d6ea57214c1f5bb81c46f2a53b55af2633768ca47db916e91
SHA5121ac4089d4fd441d41be02583aeadd01d6b2617213b1e19b3fda42e401511fa2cd9538cc4b47646aac5e34542b1b9d334d706ad2b5f933d3915076b5b3774b7f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e42db298bd307820978efbd881f5bc3d
SHA1ef83d96e44efb488b719ca5cba255961864629e6
SHA256c991da3ae79e469ad9988ffc34057ceac89b9d15ae470c9327c69733e4b6784d
SHA512f55721cf718675606abf8101da75bc6aec386784322176af79699b69f055be8dec20167fe8c27d2cccee1c025fdcdcf6eee12e1d4443e29a7a33ea36156125ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552993ede37fa8d253d78355f314c4875
SHA169ad353fa34ad53bbaa00bd6f9ae36c6e1018dc7
SHA2564fe60ed692d33c73ab22d1db3bc900c68ab6b9621d07a3092a275c414fc944ec
SHA5127c424396b0b84231cba8a0e2c11d7496a8045a2e807837380bc32213518e88639a6cef234b00352081bd4cafdba1ad440acdca16fd68a3b843d0a3cd53863c43
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b