Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:36
Static task
static1
Behavioral task
behavioral1
Sample
eaaea12b2f0256aeb7e2252183f7044a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaaea12b2f0256aeb7e2252183f7044a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaaea12b2f0256aeb7e2252183f7044a_JaffaCakes118.html
-
Size
4KB
-
MD5
eaaea12b2f0256aeb7e2252183f7044a
-
SHA1
ca2d114cae1723464763f3ce31d05bdde61a4915
-
SHA256
c0bc54a54a08e538ff84fb85b3e5515fa54845852e2f070dfcb202613ab5e4d0
-
SHA512
b91e5409defac16e8a310482047aabcc4845d0fc1a64e28fb02ce50eb1a04eb557f4dcc53f98f94830f0d510a6b960aa131c1c8a4de80789e517f742ac749e45
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o7QNd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886029" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20ea2ae3550adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000593e25ca9f2f76cf7d421cba6d28cccb2131e9be5fe0914a3e56879630a1ee95000000000e800000000200002000000091d0bad47794dbe78859de14625ea2bf98edb1d3717fbc40173ef0e36c424ef3200000005bd640807bf83885ef9456f6277ba3a1174003324ba03e7c845054fb4cc1186040000000a49db6bdfe5a90936e51c6cd3cfe19d0490cca69d1f8b837b2875a7b8583c1ef6a6a225ed68a50b1cf9c605f769cf7b7a18f76c5a3842ca694a5ff9cf7902c3e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0EAC0761-7649-11EF-B594-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2236 2288 iexplore.exe 28 PID 2288 wrote to memory of 2236 2288 iexplore.exe 28 PID 2288 wrote to memory of 2236 2288 iexplore.exe 28 PID 2288 wrote to memory of 2236 2288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaaea12b2f0256aeb7e2252183f7044a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509d7446ad6e24e67b9fcd62b62894ea7
SHA1818febe5006544f32095dea034a8d986985a040b
SHA256f75b42990b726d6957d440a0e64ee89655ac9a0ddadf02ed460a06e01497b75d
SHA51200a2802d1b0c25f6411e26a1f1fcfe94bb1b07d6d5c51900cac81a8ae2e7f8be46d7906f153b48e3f0fbfb75e393d904ee605e685a9b0811bad3b4fc3ddb25fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6b572862d5a07e425e7d2c6d466ce1a
SHA1be0d68fb3508eb53387dc82ee0ad84e2b3719413
SHA256b6f787241e8630c476d5422248e25f3eb6d3cface6bdb3c9daa92a1df9c3e59a
SHA5120d6e7a90a9df8a6dbaf314cf567f61aa4c59ac9ea129f750007b75ae3e02d7f69a93b22757b6c2d095ca21f4d34489749104896f31528e0e460cdb7570f20001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a63f08763604f2e3273deb5449319e1
SHA114c06145f08ea114084adf9b641250c8795d2f1a
SHA25630dca34d900226cedc5f75bf0b6f43f4cf12459688f4e35c1bf46e8ad89c1bcf
SHA51243c8b102e5c4aab6d7051471e5d1622da8436ee196cdd84cf5edbdf43e2552a3db2d5f0479dfd8af210d76896d3a8a043c28082bf4752c696fd17feb54ffdd72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f41fdfe43e22c55b503fd72ecf2ce505
SHA15070fab2851845f31a77a2c8a5b145b3f292f9e8
SHA256a6cd58bf3fae183c566953a98d4fe9a6fafcde0dcb98908389bb10f4d5aabe28
SHA512c3c9c281defcc4b221b3f0dfa5c213dd75612107b811461186a02a038b1e6013978bd918e7695ebcb84f12e08a3ff51a0568195ecd0ba16f5c38718156b1ae02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb696d6ab5536518545773416983e794
SHA10325294ed62225db5c4bbdc61edc960e055dd4b0
SHA2568215435b7e807b7f90d4061cab4aa79aa3aab5839da41a6dbeaee65418c90c64
SHA512bf9f1395b8494a53ba4e47951ffeb8868f95def96afa55975f2b4fc7051ef44d755ac517cee9f88ee2fc5fbe26d03101066fd1dd6d9fbbd7066f4942d25ba167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a7e3d8b0744b26b33775cbbc06d389
SHA114125e2c8448bae69894ffb654d8465272a4e24c
SHA256b66a8e78b343f4bcfabf884580b70299439ce9c4c8ac8adbf3a3073e080201dd
SHA5128d9e0a6c3895743fc3bc433dc1d9a6342fef79c7448cd2fb6b13dde6cef61c48e3a2ebc657077c50a49b3ee08d2b72d04fb7cecddbbf8ecb66ea5f71facfb950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1ae4b3fb42aff620bfe6ec50d685f3e
SHA1ff43f8359fe77e933b7cbf2862cda0a8ce3a5bbb
SHA25694a0c5ecaf1ebd26f523fc01790416ea15ffd0f14841cefd5bbc9e5dc1bc3adb
SHA5124e353e629c3bb5beef85a23e8f47551dda394573a53b0bd3816426471011bff4599ded287c70417ce4f442503b77badbc767a61a07a39f4a2bb17f22db8ae4b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eadab71ad4914c76df25151f039c5fc
SHA1e0d5bdf464fd7e9289c608ec55be51dd9a374b33
SHA2563970660a6f2d8d113b7483d73c02a715f9301f31954e5bb027e32add54fa863f
SHA512de4b9e4bfd128a51b3ab1904ec91cbdff3250fc487de785a1fd55bf8720fd30b58bdb0f847c0d4fbc8aeff16e44abc47089633c285b53174b650baeb1458adec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c933f35cf3d8ec52108bddb22cc2dee1
SHA19882db820976cb1d0bf8a183a231ebdc6066f46e
SHA256f2de524d39e698250525200ca4dd078aea691b04ca07382bca469776c0967d31
SHA51213d9937d134103d1b4c99c46e4e3bab0154604717c34a472c872e9dced26cf1972c5cf641b0ed8350afae7c1d79e7950ccf54aad10a1940a9380968ab7d5eb54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c0884e341f04602eae5ed8f103061cf
SHA19453b4eaa132a4a18f94179b4fa1df484562dfbb
SHA25647dbb3f91ea67f7d93eaf10282fe3a8ecd3036f362abf564faf983bf9e688a31
SHA512a6d5f08346b1d42bf8a99d22af00391a37189ce5cd6bdd5f97c3a6effa5012c3cb93babdc0b3de689d0328f292dea239c52c0d0562747aaa52d82036d8c3163f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0a005471f7e6edd94dd5983eee67547
SHA123c51f22d646dfca9919be2e74e50cf6bd2ee5b0
SHA256395dc84143503788cba0e65f92e648c5384e33ee46f0644345be1098d4619731
SHA51218b62d65580bc2ec6bf59ec2ea0387fd581a6445ede06fbb170be01efd7f33a665c929744c0880a43aae6e69b33d1f523e2215caac1ae4f38315305e3f21fb3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542b116e0ed4b720689f94533586a2561
SHA1b797303fc07e5b30f728b1d6a0f95722146517c1
SHA2560a030b9a20c9dfd1b15016b602d4212b1da84b8afe5aa33f19fdd7050f77f33e
SHA51239c813767dcec97b6d1f82ec35c4b52f905527a901469902c0e4b628ccc04f189a60b60de22e84391071dad10fb3b39ee4825601c493becf4b675abfef793acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f1092ec0362deba40240da36cf01c58
SHA190b7a1a1b70dc0de1b70dd5253beef085139ba35
SHA256e358f547831b8e6ac268ad610cd1bafe61f8be1c2579d3992b110fd60baa69b0
SHA512cd17bf1ca29e6a934186737bc0f885ab1e8dbd92fc496330d61f35f44bfdc4630f5bbad2bfb62b179654c1902bc52845256afc0bf3bb0faa3c8515120e72f3af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae1d070c0571e8782454959f81fdeef9
SHA1043c034c2b1e67f679da51b19e410a30b0d958d8
SHA256972f217247dd62ec88f93b2189319dd66d58328dbe72732c46c0b0b36f119065
SHA512d6d35180e2ec9002e965abba8f2e2be6441d5e67d5e754b80098275201417e91c5737e61ea324c4d5c9292d65428cf81bb1a833e30f616a68ed7ec8e66418143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3cd57c8c97e1b773bc626d0bea5037b
SHA156ce599cdf42392703cf0a42dc0338ca4222b722
SHA2562b782a608b1731bbe4e1e9606a394ddc427461dcc4a93cf2ec1e196f1521d655
SHA51296ab1291516222a09a21bbc97550d0729518e1629e37eb2f1f79585e06236c6bb2a000758f86dd1a840213accff774f931bcc4dc44d8a881c85c6dbdba3fb3f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b17d1be674a3e0333fa750ce5feda5ec
SHA1ece94301aadc0d2b91b19a059d1c1dd77650804f
SHA256e99987e6d15ff53a4140f964915671fd6e1a95f6cd321dc26b1fb3acc775386f
SHA512531ffff00e45994351cc851e594ab6e30a0fe8b8fd943efffae677acfbae422ffe6e77be2acca103883baa04b58fefe0cd7589cfcb2cdb69f912338d24e42979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5437dd744d292bbc701b868ae95288a31
SHA1009d42a1dfd43c2f360155f5dd2f1422c3f60171
SHA2566b453fb59b637962d262e52258da665d74fea8ded516fdbb6ab295b321fe8eaa
SHA512a86bdf07f7dad84ded3e9456057661d3b78b21f9e84a55329a0a5bda8f80a84f0fbaf086a2b458b26e5ebd27b455376a2b012e0d292439ff5c583e64dc164100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c195fe6cb8fa48325872eef71211809
SHA144916fc8b0950b0643f21d20260459dbcd4abfd3
SHA2568799805bdddd8dd4dab737f49b4856afcd7166777f4fe815e48bb38234b410e4
SHA5128839118f02973529a7d8256f6b1525724f4ab3a6033d5d59a341bc708555d5d2afdb4e04c2125dcd26557f9a5d9af9a74e98ba08d45d85066af8131f3a709fb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b4dd84b177b1554ed2603f48cd94860
SHA15fe19a1987105ba35d83bf4228d8783653bdda98
SHA2563b28a3c146604378a8bc782caf5fcce1cb6002bf96521b31d2805c84f421a92d
SHA512954278e37d6a75149ba88a748b974529edf6b19c2ba8a56b14a60714adc3a7d1c69ff167667633972e682e81ee810a3f1914fcc7bd724f9fb6c8b158c3e32270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a8e483a220433abe525bb941420b60
SHA14037b4954523ee2555e2f00f4a052aadfeeaf2b7
SHA2568f410f7610ac050cfb81f3c6a02ce34fbfb393e3e8e8540b04e55330f3b932c1
SHA5128d319457d31322c43f5bec5753a7b16392e38218d9c3b441f7eb7acaf3e95617ec1987eb0735efba31677c3ecec75eb58dd212e7fa161c1d57cdf90db8648190
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b