Analysis
-
max time kernel
137s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
fd4bcea8df42552132a5503435332acc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd4bcea8df42552132a5503435332acc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd4bcea8df42552132a5503435332acc_JaffaCakes118.html
-
Size
351KB
-
MD5
fd4bcea8df42552132a5503435332acc
-
SHA1
55bfb01caaae6e3ffaf278c982eca7c0cd97f689
-
SHA256
3263d12543fdc26f2357eb2e3b771d1b3485c4dd214b8902675a626b4dad61e9
-
SHA512
cbf095ec33d1531a575a99e5a4f60f38c1f781e58c9d0027d5147fc3761b66df09b2b28dab425a48367c06fafc2b41f288eef70bc45aa4315fc276a972ca8dbb
-
SSDEEP
6144:S4sMYod+X3oI+YSE7sMYod+X3oI+YAsMYod+X3oI+YQ:35d+X3p5d+X3Y5d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c04a3bbef811db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AA6B73D1-7DEB-11EF-92B3-F2BBDB1F0DCB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000dc8954793141b9b0bb4b68acf68ac622a3cbfc23aff564143a43aab7a3ade1f6000000000e8000000002000020000000fa7dabd14b0d60d7ae47638df89fdaaa9e4b158b49f9d0ab11656b386ada70b59000000023248752e46cc72fad164c01d87baea9b161aafae574092c269ed58b145e4a0bb125aa87e20a1b90d2b8bb8323f6059f51d7722cba45f179fb38f7bfcb00f7e713581f127b784adcb5ecf1e697646d7cc1b946eddb2fb3beb6ea45a1dab021ee0fbc16800a6884b0be51a01f6f62e3ca96d177a32f308803d23be53d290f225f4dc3df778ef1c432e4b4f1d770ebf8794000000045849bc7794da881b699d19940d50974c1ab1d6caeefd02f180a7bdba22b12b21f7a2f9c14ba15f26f20d335394aa9421f4d73935d595e7b358baec36886f7a6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433725531" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000080cfb7b4c3d09ad28d3a3bc52aa0889c225f291f1286f595c1d28da2c24fc172000000000e80000000020000200000009d5f7a94d9749e7f1e06df139a0684be0e64f3e77e968d35b9994b5b4abca547200000001fcfc8c9372684eed14b124a7e05317d06e9250f3780f5f5385baead09f676aa400000008459fe5fec02fc4ce29eb432db2c59de19bb822ea43adbd152ef08be5221292b124357fc1a93989330f55ca6d1735887b6e748fb543ac4be5294fc17c154ca37 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1348 iexplore.exe 1348 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1348 wrote to memory of 2768 1348 iexplore.exe 30 PID 1348 wrote to memory of 2768 1348 iexplore.exe 30 PID 1348 wrote to memory of 2768 1348 iexplore.exe 30 PID 1348 wrote to memory of 2768 1348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd4bcea8df42552132a5503435332acc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558f3411b9e2e8100a47a69b5087678c2
SHA195cbbb225176a160721a41423cc9f9c1718f698f
SHA25699ba884b036eb11172b4799778cef3de151d70762bf716b349893003d892f4a0
SHA5128afda056a357a78c6759fc89ce10218498f45fb92e99e9c80f1fb4d49f5e5fd0b2c1511672c201cb3fc613011eacaa3e37a1041489c02be782c669a63633b002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aeabe824d0e833c7a40b73873bbfafe
SHA170b46ec0a833e98d0385725a74d59fbbbf8f0cae
SHA256b2ce9f4c917bab84eff155ae9e0d35741d19a9904a5beea2f023e45e4eff12f2
SHA512da26a54c3d4ec694c8f40414089d7742ffdac95d09a82c3d2b7f4f1fb80e1dd59cc7b41410fa95f845f5de2d83406784b817de2c718e2d426ab17cb7917b24d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515a2e507be70f1c148b3a9df267f33e2
SHA1172061df10d438771d70db78b4600c4b5a54d9a3
SHA25608865fd76931f01936a6585db1d314f49704bee7763c0172d55c2b7e1735c7af
SHA512609b086381abdb801dc2fbe0501f46d41708f8b919bddda0dfdd8ae573317890b0c1a5ef5acb718fa108685937cc1d8e5a30a74c35042c6690d4f4853e0955fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e19b3405d449194acc1abba6a02872f
SHA11a63d9e189e3028c70515d58e651671bd007f65d
SHA25605fb385be2e748261079fa7023cd5525a82a75c9151e09aa216cfa77c1fba7bb
SHA512f52f27b837b7a1a09024dfb954cbb58258839508cb4109872bd6e30bb1756efa069a77133a6359f256e4123be77c1856e457467510669700f7aaf9e7f96c056d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539569454a538bb6079ac4bbb9aca7e79
SHA10eea1feab20470aba7ac3a5bba70f98d20938613
SHA256fba3afbdf878fc70e70e23aa22713d10ab4db39d24519d79ebf5fb3959ee684f
SHA512452c419e85b7890a8f10d3c4be5645d182218fc5993cf2536c4e5d12b5d31c4d0858a7bf9af4c683e2fdbfa8251f157adfce4cf82661b4036abb9f3c78f60589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e78f439ec0e7f9adb195edf14496f7f5
SHA1cb929929013d05190b3bd3d167297751725ca124
SHA2568bc6562caaabf15be696921b151c61501d02472dfdd5424365d57f18160f098f
SHA51256552867d6c8f6a17da98204422729819f697e98a53be2d8c8400248c94cd6f1d1a8a7a4e1a5184754d5934ae925f685f33ad9dc16c47bd324ef9a762a6fced3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6fe7dc49d9200bbd2711b60cab5d6bc
SHA156b83baf2c66f9eb7eb0032bf38f98b05b2c2911
SHA256e21a0ef50f9af099ba960939572e41377e0a18beab2f7a8bde82a3c97ae5386a
SHA5122fe5ddd0f770589b5ff7e4ea5c400860b84ec6ab7ea5cfd2bc5161053d304817ae72105205a76414369cbb00bc4f75ef308c6e477232ba4f42b53ef07b887d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf95803d63478bdf169b53bb2babf26
SHA13b116862ae18105f8848538128c4fe3e5a690bde
SHA256566e4ab7370580080c6512601b571f2b3b6c12ad03c35b4d49a1f2239a113d43
SHA512335d661e5b339034ee7747a7d9d1ae2e50f48815110a266ccb5c99e291208accdacc42ec913018c894de73a8479c992a50f34ed3e37372175be26fc6655f661d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598a4e9527a94bc374f9862ca662f5e34
SHA1eed2eed5a27efc5610f0388f28a9792db58450fd
SHA256daeff8ca9d705582257f874be1b4aaa255e23a6676ae24713cc4d76a07972c79
SHA5122e4a8f671fff49a08c3a1f0ddb0f4bb4dfb2ed1340453a9238b8c0cd2b229d02db5b3b3e8130227afa3cc4ea9e2e262ae38ae80378f00ef67fc43bfe5251e163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a582b34613765a4f4d040ca063d25e
SHA126111124e47cc4d284302cc7393deb4142312b22
SHA256e6552be4300c1272d09ca6db6175dab0101d9976a12e536958e8c35807620f56
SHA512d68af650e1406d4e453dca4cb8481de0e39af3ce38034e6107ba0b4d38dacadd49ec6a57f7e88a53f3e3cfc5e071036d4a28fc00728624d26c01c71af071223e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c61ef6d2030bcc3a8094b17dca262199
SHA18ce0801502fb58f182f69ab694ae33215db076c7
SHA256086ffa48960ad7d9c4131514b78c164e0d5828c6fc518fecc424d9dafd1bc007
SHA512b519c3794e495087e113f1799dda51f118b60a7d5117fb14171300ef1d3991c43ffd759330518cfa39e9aa0ca67a59038ceed8f1becef2afe9d13559a63949d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559edaf4867fe4d9149f49afe57652ece
SHA1fbb05e8ba3c3bb13e6d6a29860a82398def153c4
SHA256fd74be7e969cca0fd03ed466fc508d721f387f1d8f09dc538ce1882c98419f59
SHA5123bbbf86a4f64148186102e3892a64a561fc11807e342d320e15cb663d3d3f96ac9974cfb30bb6f62a89219ef00f3fe8cec868b21ac0fc59751b905b2dcf55061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd273db03fdc3ae965af104e0d06d181
SHA1fcf39ae3a01d383f1034caa915e9f9a7e38d762f
SHA256419f35b3737f7bcf87d61f7873b814dcde00f0872406bc33d4a82916da9cce95
SHA5129b380f7dff475174ad9ca1a55b753f99c3399a41ca7ec61ec116717b229ec996fb0b26e89576ac00b0ca3306df65e6664e2b8bd8861d1bcd66300f0cb8864e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5532bd1e674373d4a10b208a5597b6902
SHA1628b72f5e3d6d298eb1c90ea0efa7aacda877f3b
SHA256ed48df07415c0136abda7700f31baf4cfcb5a82d63463cdd381db48b4e22dc21
SHA512819ba8c39f1500026cbd90777dd5667c8be9afc08e84c2ccdcb561490740721a1cc543997c986d9876ab4884a65662cc9270a4eecebc50d051743c41cae857c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6555ebcf636e2b88b9c6f774e8e79b8
SHA1f12c31f9fc297b56f82bc2fff4f045120fb68db3
SHA256012dc094f3db015224a18e4424c0400dfc4decf77ac1f5af3a33270d6ef14dd4
SHA51215c2c6f89590ad4cbc19c57fd4579b0bcfe030cde3acd607b0b32b0e9baf8899b4c7a859349d96079215fe1f58615429a923c92f7d7d3a8efe3b27d6216d4b50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a342ad92f9156596fb868286bbdf520
SHA1b835745e08a2218707d9547f2593330d238c4404
SHA256e6c365c6ceade17585361646fdaee99976be4f55923948189c49cfdb29e6bf8c
SHA5121a2189ca6d0921e75262eaf8ac795c235ca7d2fa2def19c6fe38e0c45a17eacda545bdcacce264a5190b261e30b472aa7dad48e1d8c9629ca8c3519fe9703436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559635536629c429eade50503421855ed
SHA192d73337f41e879e4d916819532fd852842692f6
SHA25653f5c432ca4e81622998723b60c157b9d86cf6fa8e3d218c24c06879f8e9094e
SHA512c4ad975e4ce1cb3e50a09bad7fdaa1259d7c0705ec50747d7fa3365977f9a59954ea632eb3d1ff80f31b96f67f721f5e04ef3e8033256a93ac67d7d6294b0f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8f7d21345d40aa30fdfd738bce2ce34
SHA1ad3f54011f7ef60ecdf5fed7d26425dcec16f565
SHA25610aa20b62f8356ea8e2042ceb1cecef228b9c69b5a0fe654aa4ecf3317c81520
SHA512dd0eede644785d78af99804407ab36a8a18897bd48c359d407b327e7137a3f6cd5c3a060d0b20051416180765e2c9ac4bbab62a4069c0691adda36d5b19a5639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5501fc1087691ecc1578d61e5bb9fc133
SHA141567fc865a220ced7b53fdf1c48c235b7fd93e9
SHA2564c74d1886209907a99c440958f852104de486a3c861b543204d8193e02a6bfed
SHA512418fe655ebd7dc8ac469d6a601e5c9fee7f4b7681e12bcdb2ee726d6a0d53f6fcdcb34a14754be3c35757bc5b8703632f41a1253b8c0b996bbd2fd898750b301
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b