Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
d6a2d9896d64e4b8eb05fc5dccbea9a7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d6a2d9896d64e4b8eb05fc5dccbea9a7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6a2d9896d64e4b8eb05fc5dccbea9a7_JaffaCakes118.html
-
Size
34KB
-
MD5
d6a2d9896d64e4b8eb05fc5dccbea9a7
-
SHA1
32eb1d905d340f7a78eac4922ea0072f140d9d2f
-
SHA256
8a35465411c9bd73e681b5145422118a2860ae3073eac7408f60d00c6fa06a37
-
SHA512
4a9bf03978648a95df707c0bccb6d2bb8718f295468f636ca716bbb7ba5317d143217eba486b2d6bf792c041dfa1a02a7ca14d9a202ab6e9024753930033ce63
-
SSDEEP
192:uw/Zb5nDmnQjxn5Q/6nQie5NnbnQOkEnt+0nQTbnZnQOgQcwqYRcwqY5cwqYQ5/l:/Q/AYxD55/Lynx6MwH7ms
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432058974" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000a6631362779dfb1cb7602eb9ad857c262ca2687963407b00cf61b5934a64bbfe000000000e8000000002000020000000ca704890e0577c44865d808232daf1d7b770b4b7d60237430e7fbd232cffaaea90000000756f403baf89cfa01c4f62ee1b7bd3ff5b5dba47bef9f459d3dad27d49191b83844fdf88797eb3b3b49320d2cb88aa54570d70a724622ebe770ecc2ece5003172e009a621466db5e1c5dd2d5c8c5c474f375b431b2942f693150be7eb76d04047e47a57db2274d552f6632d796eea9a11d26183d40cbc0e56be95a28a6b9bb96daec7813306985d6bf2b4fad896ef50040000000b5292070d5e4f8da9a1a0055ea703ae168673fb8a7769610f56f641fb7c74cc65ac5ed7a1119b24174135e37d605c7dbff259347c50a215a3255340d01af1d58 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6026EAC1-6EC3-11EF-AB29-72E825B5BD5B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000002577ed1a0cf22bbff24a7032485d237001fdf7e1f420b969197fea7462d35cbd000000000e8000000002000020000000875124a4ac2274f19cba15adfc209733030c822b198f025d89c066ee60eeb00720000000f9163313a3ad922ac9988f51fa453e1a7e63018fad87886745693ff338d16780400000006b2555c3581985011a99808be10520df6da340559a09bde041b6c5aa99c3ab15eedeb4ce64947ef052172f4f15901119b0f4d6d0e08c4e911dd5337b044c9d73 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60cb2d38d002db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 576 IEXPLORE.EXE 576 IEXPLORE.EXE 576 IEXPLORE.EXE 576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 576 1680 iexplore.exe 30 PID 1680 wrote to memory of 576 1680 iexplore.exe 30 PID 1680 wrote to memory of 576 1680 iexplore.exe 30 PID 1680 wrote to memory of 576 1680 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6a2d9896d64e4b8eb05fc5dccbea9a7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ecca9cc1ef4affdebbb935777c6b751
SHA11e9a7b693eb638fb09b63acd1cf3c6060f331294
SHA25666f922e7daeeaca7fd54786fbcb36446e02f926b952139f02ea4c97ca692d328
SHA51264e64b48af4ee48f1f69eaf6a093d408b55715480f0ef6a30c17e9e464637dc6dbf415a4fa1fef4557204954c859adcdd3652a2d3a4695627dba938070a3f7ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5358571b1f7e16574ace8067e41096f0c
SHA10c8ef543ef09de12ccfbcb6f5ceeb6417765202a
SHA256921582d44a19e8c7d7187d57bd7ebe7f0b2d94ed0ed5621af629c2811f767bcf
SHA5121f794ef43552226b5bab262a456936133de5154247d190e5cc71c718d4d1b30e92d036d45478c0cfcb85d429bd9a73f0a96d88815bfa6cabe0c121dee98a9f01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512285b539e0d2dacf9d33ee898f2e4ca
SHA1e6eb9e528df12cedd357959abfe85c858e7bc3b5
SHA2565efee8f1042c6e8e7838703efec9478fb7ccdb3547f250696f3b050935102a06
SHA51221497d1bdc37620b0f3e7d16633fd83f12e56e2a52385208ecfb591351f14e580ebd6fddc0c3373ccf15ca3974a68296e84bfa69e96f13f9f2bce3b92d7a8831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59af333f88b6f40586a1c81a296f2913d
SHA12a1bdde3366b70a77408445f1e9828e7ebf4a22e
SHA2567ba8086cc1a1e1dbb0f550e08832bf704c26a0603cbcd66ec9592b774aa07c98
SHA512fec39eeaba78c211b33183c5b75128328cf317fff2524472a9e3a2628a4d7a830158ed9a0c479ce6a3eff77f4122bb628a868f42ad156f249306e43b300427cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53773cec32a3bf3b4b21aa305baa2bc9b
SHA117875571acca0c3250e3d044b7cf246a1768e8b7
SHA2565a4e2bb7a9655869747d4320ceb625d8b7f217ba068a4de6cd61745ef837ec05
SHA512752f07961b5a11a12274f331571d5c34e623ea117a2b2318facca4520a66a8ef184cdd9ea74aa9e7c00af24f78b891561536955342ca38f19003a4127bcdb301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58429b26b589907076ba4d8448891cd8b
SHA1349f65abfe77a6188227205bede428dd2ed3155d
SHA256d85ab6af275c7b4485e644870eef3196c48e9443799d415f039f81780415d951
SHA51211b98dd75eae7318871d7a4b05a728942a0ad009da51c4529186f2b7438e70f5c91c9eb4eef31dd37e3bd9614b73e65190b60754be01d15d2c19546c63f37e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb800fc0a5b626f907f84fb1db97372e
SHA12723bd2bdfe6d272721e79d6ca800a864d56c81c
SHA25670cc94aadf20571007db4bcb34d5130116d16f47f51ca821cf39606b99570239
SHA512dd7792ac926110e7a41f457cae885b32caafefd9733ce56c2c411243c6c026d21e1776da40f6137afb8530c268257cbd30bcb2996e3cfd236bb205235ad18935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533a8a97082392685975a5cf131c7529d
SHA139fe9007a707412b55de45445cb4b50074aa3fa7
SHA2564b525160380a13da672c7b345e1ee68c29e6b75c5365d4687e76d3b9aeb07e7a
SHA512e9e11bc0412fec7f5065c508f573a78fb37ad661449d140137bd3992fcb42b9c11a6531956b88073b878a804274f6ad6af412deba6d1fd8ad05c566281b23b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4c38be97ce62edc9d1bacbf683f77c2
SHA1c7262a84851178890b4f607be329cb301dd62dfc
SHA256d5270536104dcce1bbbeb227f309495d88d8863e13bf117c8c2358cea7fcc23c
SHA5123e7213d887ba1423f55d13f98631e753285734b1694769d1ef50241363e5712d4501c065e1e116388cc6edf192fe66b3f0db2ea64fd1428513e8c3fb8f90b33d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551bd584701b80b548569e00ce2accbf9
SHA1c7b5329b2284201f4a747e9125794df8b365a80e
SHA256e857b2a4f1cd8cf875157763a25bf61222b764a76a40c90269529295219c84b1
SHA512a6110b6e9ccd13f2ccfa64c96c8b99bf8008404138003ce22ae10bd2b7980da0fd1d6dfa128cc968f6396573717408dcadaaffbda15d308f09fac91be56bd546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e917bb846097d7f9d397a073ef1635fc
SHA1fec40afe91f2bab8c44facc553cbd044a3d484d9
SHA256d87a15e4a54ce0c7c74d6ff29ef34facac88c2e675f4638a3cac3ef81d99ef47
SHA5121c8fe0dd995a05595e7b54070016b84df229adddece625458f8b58ce28439808bc8aab63a8f0b3bbfefa5c1a1c0d143e4c92d000a09e0d92ed8593831827bdcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaf7a0cf5a10d0fd74ede9b85353d740
SHA1b02501e9f0c3993397ade60439271e12159f34df
SHA256dc5f2222622c8faaf6a81cdcb03a893c09cd057325f0f0080a2c945482dc31b6
SHA512b6bbacfbb95670ae0f9783dd26148d358b294e7a59156ba6bb1906f13e9f3f499eabe502119bfcf53848019da53adc6043711a499ff3cf4c87e085c566356586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577d1a5ad600b9435053035f64aeaf3a1
SHA10f9131092a8037024a94b942039161c9609de991
SHA2563f4b2e62b1c17d32fcf9460a673abb3669de6059ccee0bd5fc110acd8069a012
SHA512b83ec637ad476a483f937e40033aa96d573abac7e70db5175d654a7ebcf245bb388805959897eed3e851fd95a77923c7e9302e65e8963e6adb251b8f66c63aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560d9da7739e4572043b67bf89f64dcf1
SHA1b9543ebe534f1d59165e9051052fcd134e46286d
SHA2561ffad7c1df5f140ce9add61b6be33b9ad49996a67d25d3706961c2d88957ecbd
SHA512a1bee6b6578558cb5d3767bb539282c5169510a34adf1fde8ea1a325e6b4b6db9a8e1ca6094ebfa3b3cee429010827d16fb727a1a3fa9e246aec2ba033227ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5b11c6a60372a79795fb57d15b2dda0
SHA18d29b415a0956d85cd82cb22d904fdc375accb75
SHA25693c52b2b7f6987089ca1da8fd6c4a6633da7187a85451d125f1f50cd8624fab8
SHA512c90c4522539155eeb1470094cb2653e3468b0a5bc3f972cc12ce2b510ee594d337bc5557d213a504da2ed7625392242f8060da3fbcb2a034b8f1974837cdc049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9d9153e2148fc066cb83cd568d126fe
SHA18e8f45fe0c40c85f36d03bd914ff719556c5bda9
SHA25601ba9321db18cbf6bac1a9e90da2f4e5567698323effdded3cfa40eb9e8326a2
SHA5127b8241daa53eb54cac1e6b782e7cd5606ade3ef28c09620506c39aa79cdce56e96aa5a8e4f390168f11a603826b5084ff41cfb87d227ca91fe032280cd7fd338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0468145b428a12400edc93ec2fd96ca
SHA12f79e8b282a3ca8d70e27299071aa2e4a3257ea6
SHA256ed904cc8f36a8eb388ee47c26e9fd5390468a5c6e47c5356c375ac5ef96d97c2
SHA512ae035d42921ad617e08b9999457a4332fa8187b918c7acf8bb80fc44124c8ddfd8da4f8a0167618f84598d75b9a1d1754998084eac324f83eca62f441f45041f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b