Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 23:04
Static task
static1
Behavioral task
behavioral1
Sample
fd520826aac3402a02a96f3c53ce4caf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd520826aac3402a02a96f3c53ce4caf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd520826aac3402a02a96f3c53ce4caf_JaffaCakes118.html
-
Size
63KB
-
MD5
fd520826aac3402a02a96f3c53ce4caf
-
SHA1
e0b81a9dae7cb4cbe62e810b7da744752fc37319
-
SHA256
97cdb91248deb82d96b4f3571e8f13f4e456f2a9b364da5e969be07f7094874d
-
SHA512
2522f5aa9798f3a0c4123296003f5853e229f155573e43d665c898cc219f9b692fedaa2d6bdc0ec472e468c7008bae6335c735b142054f20229970cb109467b1
-
SSDEEP
768:Ji/gcMiz3sI2PDDZf0glJn6BWoTykyCZkoTnMdtbBnfBgN8/oi2c8QFVGys//IjC:JdUTTFec0tbrgaMc7NndC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000003f3ada3474cbfeab3a1a596df04ee758a59e6f41fad5b71b549ee91e8cfeea40000000000e800000000200002000000073d041ef09562bc7d66d52e22f3292e84aa6a676ec11869aabac28120e45558b20000000391344ad31409fcf65e7fa4cbf60cc655e540b7cc831d2b4703e589dc12e8e4740000000f7c8bf5555b1b2884b80ec470e06d539b79be0f18fe0fbeb8ead37c706a5a4a21b75f8a5fffcc63139c45e61ca032a9381e12c0d7e24bf0d53b17290ad298f4c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a06bd1cafa11db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433726513" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F632FAC1-7DED-11EF-96BC-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2800 2220 iexplore.exe 30 PID 2220 wrote to memory of 2800 2220 iexplore.exe 30 PID 2220 wrote to memory of 2800 2220 iexplore.exe 30 PID 2220 wrote to memory of 2800 2220 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd520826aac3402a02a96f3c53ce4caf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539ef40f1f7c43245f97a717c9d4f9961
SHA17cd33d7222e0c33a7188aa5a00cf35124573d97a
SHA2564b33b7c2af5ffaed615b68755b902e27b3ecb19420e810794ae67b47489996ef
SHA51250a478470e979b7c984c53d53ac1dd22d597e1053c1cce456a063e86752b5109b2dd14545130add545feb5cedb1205e277e67517b471dd9e444d08e1f7b40b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de9ba1db268b6e5e978a3d9f377a532d
SHA18194061a304cd1bb980a861462391c11b5e9d4f0
SHA2565a3bcf9e46cb0b1c720b2ddf94fb361bc8c2945c8c2394a051ffce54ed44ea5e
SHA512ebac14d1c6cf98ecbfcf602a2754938b45941ed5d5a5d105c6cfde061da19741bbd08020578a8639ac9549ca65fb58611679ab6dd1c39b526d80dc22e10888ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52408bc0e4ed74f6eb24f201197d68b46
SHA141148acbe191aaee0a9c20b7618b1e1fb474b54c
SHA25664ea0e1df04e601532c7542da839357b1e47874fa790ba3048a7fa8641c57dd0
SHA51248302cb04d390ef87cfdb4fbe8d94f84f9c3e51c386ca655cb60e9bfeda7b3a09466ffe76e5ed8d4e5e5d277addb8f4173611832ae06b2244b8c960551467e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f27265d4d4db73df8d4e07477f53252b
SHA1d24e13f7209152739b8111853252a47c7a5f704b
SHA2562aa270d06f7c62d8dc8d7bd32cf6b27fac9fb71bcef5bb2ad74e5dc1fc18eec8
SHA51218b150ad514aa2859b64c2cb50cd12e8a36cc94c8ab0c752dfc9f57521318b01109046a4024093088c94bd2f5974a8d4ae0cf6a2ff295275d6def376b359f0c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfa69bdeecce34bb6e428d5424b232b5
SHA10b5475f9d710008f6deb14ca70771f85adc4a416
SHA25669f4f1537e6c784577d1d79696502057ffd0fef09df0cd2bf44d8ffb4065863e
SHA512291904da6dd0892bbc4f25ca7d67e92d1a32c84c06e96ef06b592a91bfee0e566543cd644ec721a1e01869abb58b5be7d15c50affcc184a7f8f962f5936425fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f661127c5dccf3af9f66f75e157963f4
SHA14e97e955c67a736bfe2663432c589551354f4780
SHA256ab270ff0f08d8f65bb8f3df155153c799490b8cbe59230a58afe28f23bdb229f
SHA512756710c0a08537aebbae8b253857741e7be97972228abdb9280e95ba347f6166bfb44df058a7210305ca02a478f79417afb7e6e297ec72be48e4f258abdc99e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504055d2dd2df7ce4b3778dc1480166bf
SHA1e97d013da2bcc754f0ff8823d0ca164aef30437e
SHA2561c05224d0eb72c0b214e9f094660de8723f631bc6fcdc0c7565b0b24e764fde3
SHA5121efce0e05a6ccdc621dad79ac08e15d7fd2b66d2eff0c1d4015a85210e1044b5d693966a26abbaa47e0fb8ea11ce71706ad0c8cc6e0584e33b2ccdce7ec4af49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510eee757c7d66e7697f121f66459161a
SHA1c4ceb280f68a1fe3382495c7e5ad4e5f425f49ae
SHA256f7ecd9e88df6703fbe6e811a118426aa33144cb6e7ae9e0920b1d5c4da95f50d
SHA512a87e41dd522d9114ace463d873487b520d279e2020f75807e7b3d607d838ee5aa8551559b0648f6f90e1d093f8bee74f39d08921996b634a447ab789d366459d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537b4f4a79bfaf63db20dca7a80c493a1
SHA15edbb4d80da4c3439bf4383dc46e0ebad63ccadd
SHA25694295166a3603e79286eb28a58bd22a4df969de01384f39bbb4f9925f634da4b
SHA51206935040e314f1940926cea0ab2872b569789bcc4999bb3712dd0494e0d555b4303db0135b332db72960c3370e94e28f5d95ee4aee823cb5768739f598c7572c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ad03905a568591617940e88edbd1b8
SHA126c439cb3f9083b492abfb2b5ac514447607f0f5
SHA2561a74f037d73e2cb55c579258836988e1c58372fd263ac1765ea094c87e35025e
SHA512b4f390981091d3120a87ce133f8693e53e470cabcb8eca5c4ad52c16161b4c6d0178202940b6b4b05963ac2f2e9cc6d648f9486149c1e4820754f6a88da1eb80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd0bc7117e3f72c4a9ebefe4a1ae632f
SHA14276c35ffb84c5d212cf14a0f0729bce756c8efd
SHA2566973fbf52520762ab67a90f871b2209cc170e531f5f17e3a9677aa6b56980bdc
SHA5120f7e4ccdf2a485e10a4d089c0ed50cc847c7ad1067b0aec5bbdec32d22e1c607e185fc11f8bb5ed8716e726b77c5cd310847e8fef1a48fa4472f8bbd62a242d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cbc7bdbae31173d5296a8e50e1131a7
SHA144fcf84ebef7dca1563dfb79d5e6fbc759bc2664
SHA2564b3c07923a910d448bebbff08964b0294d631118f2cc8acb05b95434c26e334d
SHA51214aa64c8460e953bcf6f0c8d71c281fbcdbf4c93e637fbd5020a20e8458200659346e3f0e361455a962e527fc16e1800350ebfe4dcc8f370887f0e2cd74001fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aa28e380eb1af6ffe2de4ccc2fe485c
SHA13d8909b09854c30befbf4644886d57aef8ace850
SHA256df8e03bb37fe6e7049a20cb5d9e601c354752930c045e20c84cf6346ac81ed1f
SHA51230d70045288d0ad25b951ca3a6443f04d458702078b2b3cac490d9321d43d523d7940ce6e933b1f3bb5463908a5e14df434bb5523ef972e8cbc6ea0606f79464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3b628898b38914ee00e77d251fe3eab
SHA19fd71711d2fc1ea59798c4e5704e41da5a26cab8
SHA2562f0cf5732e27d8e351ed5763a374278ae4d57d19b0917549b0c1971d65c5f7ee
SHA512c660b6d0da9e8c261874ab3c35dd29c77c9485843b363b73f0ce438d19f793d860dd1891cfe47361ce9fb93e573808bcbd24ca468eaf8b479f46c2763fc7343e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a7086faa21b367cab6bc82abe119acc
SHA1e8f9004122932d24f2f1a5f9e1082ffa1d37fba4
SHA256ea8a6320fa205b5e4ca4bfed3fcf975d80963285bb107ee4511a91fad21b9b99
SHA51208eb2f0d32d9e2a176dffa73f735581a185b5a9b7e6a530afdc433e2446de0c827ed267890d79d6306416ca0a11665cd297be44dfb3f45ecd73b4580257109eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a191867e8a6ad4526781c3a000c42a1b
SHA131aa75e5d7eeb462e68720f3bfaf274da6b0f1b0
SHA2560c731861eab6b0189755f2b4579227ba15cdd7ebca63f8a395e58b1c69908360
SHA5129093c6d9a9caac0da98602529dae82f1b149bdd92e2b2ecaefa71118558228200e93c9dad1f052384ee98b5633cae78db079bae1983dc56ddd66571f158b2ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5813a6f57bc866d1c2a7fa31ceae33602
SHA1b72165917b3723d2a956537e5e2077a30bed4e88
SHA2568235e8f5cfbe43e672cb62dce5777faa76b21cdc18c2b8a57b46ba16d932adcc
SHA5129dd7fa3f714a6b8eafeca123d487debfcd09a20297eb8216be108f58308731c367a2bb43b83bf3946c9ea092178ee1e87ad3edd52a5a3ea7d8908d781c84cf7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fa0d1a3932929df50ba520c33242603
SHA17d76647b7b7f00a0afa364ccdaa2f5f4c3ddfacc
SHA25640ed935e5d0351dca4d22ba125ca433c9b2e9565343a2a9024cf524b95955f17
SHA5128ef0bd76011f8e34188f310e5167a871c5f4228eca1f277456bd08611690cbddcae6d5f2cc411739b5bb8ce79aa5a63e40963ecf474a9ae6a61f98a311a552d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e4d306d1c347544346d86b1fb40203d
SHA15d2c0f0f03ff8e15187e03e2dbe9d6621a09f1ab
SHA25637562ade2a3d0942069f7711db30abe41ca3e6588dfcff5218e23baf6b047f08
SHA512c215782c4a9de4c6be7b2fb0fea7429061b6036fb9ff5e4cc9c377d2f714e101228c0ac6793b6cf0a3d43cbbf985c762b90598bd10d5ba20286fde1e041012b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdad989afa37763c3c171e7c0db978a8
SHA1a48a1e2e871fc3c5d4bee7bf1be53316178256e9
SHA2560d35f2043fcee40db84c898194f857fa7a5d4879850a3870bcdddbd22e02b8db
SHA5127e879f0c2e247519d1d39457e16c48ece8f4f56d3e7066526b1aa681a6cc39a170837225503472b69bf8e12e8e7a6392428229d3c9fe3ad9327a2e2fbdae6469
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b