Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
ff7d8de489a49aea5e8b5c1e51580bcf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff7d8de489a49aea5e8b5c1e51580bcf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff7d8de489a49aea5e8b5c1e51580bcf_JaffaCakes118.html
-
Size
26KB
-
MD5
ff7d8de489a49aea5e8b5c1e51580bcf
-
SHA1
4557ad0c39395999d21a9a423be7e0fd315e6ced
-
SHA256
25f37922d255cb54fac9476ded7443fa48f8a7ef28ffb59c62a46ae64292aa94
-
SHA512
04ec400753af2a168ad8c7836a40ebd5c69f5fc6106c16713dd9edcff4d158fc00b6d41f59ffdec1c9462c21849affe48f9ec565beed241860951087899dff2b
-
SSDEEP
384:cwSUaMHb8w7QoWJ7KGAijiJbb17O9nYDB3tRI9IqFcR7R4CSybfgd2Glfzy9UOB8:doGb8YxZGAijiJbb9ddtR1X4CoAGWB/E
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433814185" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1029b6ebc612db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000093a54f0b8e0fc64770360dba52d69dce749cdf0c935c2b474abb20ebed045fb000000000e8000000002000020000000239da708f69a2c448095db79c39af319269ee7dbc63a5ed9e4c7af43b594290a2000000071e433a3a2ed619ddbe133be1c305f87c3fe5c08e2c9efcd321785128d1a1f71400000000276a854ceb6e2b1fdd3a8767d38cf73c70dea673b6211c74ff6f0f20edb9512f5812097a2fed72063e60d78886cd927509b61a2df78dafe58232153f9cabd95 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16C05901-7EBA-11EF-A528-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2472 iexplore.exe 2472 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2824 2472 iexplore.exe 30 PID 2472 wrote to memory of 2824 2472 iexplore.exe 30 PID 2472 wrote to memory of 2824 2472 iexplore.exe 30 PID 2472 wrote to memory of 2824 2472 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff7d8de489a49aea5e8b5c1e51580bcf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5908e208b652ee7ca4247b13224fd2a51
SHA1975638c3ba7fa6f6e2b4b55d5cedbd1ff0b29dec
SHA2560727b0b68565a357dc5b482f39a4a466e3489a5c90e5aacdd45df31981d1e386
SHA512d4f0aff65d11e165551a518b05b3d859dbe3c38ff7b567e9526631d74732ea9d9a006432e63bbe22cfa9e44d7745dff78fa3b1ff43290a45094f9d372609f452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6e387533a357536db7c76c7d58c5133
SHA1a0fd6651e8d4d2008b2211c567348c692551e8d4
SHA2562dd8d2b6fabc4e02e7dafc3a6ef5a1d06921af4e243c5307503c53312813fec9
SHA51264bdaeee0938fa09322389286412cae73c4589ff2acbe8b4e8cc62b8c2ec0f82a5b732ef2e454cf0652eb52c28bf24e0dd3115b3b39652ab1cbdb5f91bbace57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5690782feb7e58441dd240d38a254398e
SHA170e34fa587b4fac30b3ec474d95310258f803e25
SHA2564eaec97ebe8549cf155c483cedf197ff88b026184bf1fdfc77a7ce3628dea9ef
SHA5122bfe9f1eaccc1873fab4c40ef45bca56468d88427c77245b721dba6794a61702c15b2f36f248ed6c0647d0e727e08c01a46c06e7c55c1a5e869bdd4e2aed04f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5738c929fbbe132867c63bebe36f6d177
SHA17d9dd995508d5e3debcc214f721d55ccdd20544a
SHA2566da9e7de19f789628154a001c7ab32713ecced855615e6368223fb5ff2c455a1
SHA512bc8ae0214163df87a201580a483272280ce27acc2c186e5d4f2bdb8a544d4e121f2833311f7a296212975f9cedfed63227f89949ed1525a2006a10a7f7a0ba9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e14b6a7b4ff51c54d7f2278aba91e2a8
SHA1cfefbabd65b8cdb9472a0b8f1049564c10a55f2d
SHA256343c71ddb52acc47b92772205e45057e04c77c16ffcb8feb099efcb7ea198cb9
SHA5125f1ac96961fbe3a16d8221583211bdfdffa34452b5cd22d084f1e74e8e691d10387275ed096516edc7ee924db757000afe9e6144f64337dae82b2c0ab680b2a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2bfc0ed715d125c648562860ed01b12
SHA108664250f7a9bb8c97fe741be875d90cb94c031f
SHA25670c95c6abd93073acddf0fb72181bd8c7e1f51f399eafe40ed115310d7ff8836
SHA512ed6ca3e74c10f9f1cbff1ff24a80f756fb04a950a20c7487783f7b31fbf7696df180175e9d8efd8059e765892e7361891c0811c8e7b92cc35881745f8d9b7f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558edd723e71ddaba8a22dadce8da1863
SHA157861facf12abed6d4a9689044cd895920237818
SHA256c7d47e559d91ff0585faecfb263c38ec0c4363aac409657c374cd1f57bb3efa3
SHA5124a6b059659f9c13e334436ae73649bd1607d9f0a2fd08d340b53521f958696d4584d31093981360fccd4e1f49fb5a5d9749801a3cb58d3f6afb9cf4e376e53b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f7b59be6537f5fe9b7e214545b6c67b
SHA1aa606dcfbfdd20673b3b515098f26bb562a791e9
SHA256080a89e2a5c24878c5856e87bca1c17476988d4a3ddce26508e4e0d126753d1b
SHA512018c64a459bfbad79196e89d15b2e59beea6f7fe5e369c718f4a315a028aa1d4d997e5c60157f1a5e0291c067bea07b839152d675a4da0267e1829f88255abd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533098e5d22f748269174319e5b64e4bf
SHA12075446ac241a73621281e1cbf2eb871672aca0b
SHA2567f90e15dfb8682186c0f7efbf754b71c180d4b6e4fa6e89ba8f2517a6e35954d
SHA512c12ade29a1a7af4a5b50542eedc0660f73d6457ed4390939f9b68c866c524a72e2733b5f5e63ae0c61f3b255bec58f272a3b56cbfdbc1a11214cdff71d4c6edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5951ec64af9229990a116e84c49c4bbb4
SHA1ce120011d2040085a156e5102482af9f0236717b
SHA256fb5303cc171e00a31ceb69a5e17d5fbbf275893ae92efed104ec31c65eeb659f
SHA5120132e0d05e5d5f4a8082864ac8a0869fa4ca6343cfd87136ab95c1b97c57ab8309b4028c5c98324155ca5d767ffc4cd54e32f76e19de5c580727e98640b8af5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596654eab1c39b225b2f138d2c471d16f
SHA18a14f8b7fcba9b1ba4d2d2540ce70af54045bcc2
SHA2560071db1f772e6a7737f14f277efb01d39133317f3aa14a227296d0a8db7c0cd3
SHA512d888edf2d7b7a087403a959e654c364cee91906fe7d88ff32753e93f2780fe9adc1c3157a24c92bd956801c8586b136fe19c9c22518abe89ba8f68565dc0c433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5032aa8b6ff152fa012db40037b52dedd
SHA10a2c7c97aa72e53a948b1f925898a5aa98e1218f
SHA256034c8cb0c1104cbe7d748e39907dade85cffa87bbed76c8f3a4114ee7ff153bf
SHA512dc1734d498125b04679d72ed1736dd5eb2dfb71726f22ed6486a421b606d4072d52cb1651677c0dd640487b0accb2be0cb35f1d4b9b5b5814c527f7912bd2cfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d23c9700b18479481373d735c2c1eb27
SHA16c860243692a96991a8684115a846e71141bf56f
SHA256215bb1397c165b2c51531c964f0ef842835cf9dc32718cad4977a7321a3ba0b5
SHA5127a7ca03e960fcd5650244015db22b65f92439cc8a32e3a9dd339090ee9c58cc70b9be2bb1d6b6f4ee669723f8c7d61c87796aefdbafbdd42bf5ca22c2406c186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551b076994704ebd3f94a8b9fc60648a7
SHA1613140ec52373f7859e076f324678ce24b9887b5
SHA256e31f81a6c88122d57bfd104615e61b2da04213c77998b5022b11375f335263d6
SHA51262b99dc3a75eaa94476bcd02ab0d52b6c2e47d79a81387b97f007a20c32536e36abe4e545f954c9c531be96b5f9cb69e3701e5f1781845f03867c6d9ee01c6a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531124b088c38793b75f3f7d9d67e3c39
SHA11a4999f11a3a8cf9ea16d4b3c9ece5687b2dcbe2
SHA256b0e675aa89194eedf41f8cb0c68db4fdcc76d2e903719dfb1aaf90f41b43b572
SHA512f3eb6b9ff7f13efeb04abe67b2a72e6f5e9a3508d451974358247ac3b1416ab86690fd4d0f9a1c871f20f8badf2a154948d8f5f42189a6d3cc7741269b7f7f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508d5fd88d768f842a4d3e35cc3364d65
SHA142790abe78c5cd6e7cf3e28b6d5709adaaf1ca64
SHA256897d7856623a5dc971e9c388a58b88d50407ef27b61d8f7664b6bed901b8ab91
SHA512b3c5429e5ee18ce780053bf67fca71286146d324da3eae2146ad5eafcc89b53b7f7621884eb6b13cc1b087d5d16f9fc660855ae5d68bbc5665bc0cd6380aa345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574edd33fdedf13a2676d76dcd913a172
SHA10ceae3bb64209946c2bf904dc28b037a1bd5f1e5
SHA256ab417317f67278ad56d4633e1b89e7e79809311ef8c83a6e36c2fc19f9ed64fd
SHA512787633a2fcb1d19be4274f75469ba2f4bea7b09a31714c8c6a601655ea25c7a056f78981a418078b0088b245c80a9f5074a4b9a98925ca6453a1a0d97d3a4f01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591c083d2758a1c4bedad183ed21ae8bd
SHA1a5cdec8e710f70dd315f265a3b618cb07e013e97
SHA2565703db35203bf3e7a10a63c7514418c30b8c0e4ac6ea00ef88092a6ea6290f08
SHA5120cdda5066e469bb4a95a573bccf14756d1672ace6be0a1ff8219ade86de947180bb87b0699a6c4a12adce3ab0058f8c7b4e925c82660b127b9cdec1bcf64da67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58638d643bb5974ae68d8c5f608aab9c6
SHA15c2ea0c3dc5c2b930bb05b3eb9df4adde5e07bbb
SHA256c1a464bed58d6e7aaa98a3f496dd6e61de02af8a8d4e5c139d0cbd3ac60e6b7b
SHA5125be0ecc67a26f08405fe18c8f240b6eb04a3b867a80925b0a12cb1cdba06de88c80768c135929ad1afaaf66e7169cdd8622154d5aabe4dd77bbccc43ecbc88b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5293f3c1735c928dc185dcea541ef089e
SHA114da7eab1a54a67f00f480d7bca95bd2b87ed57d
SHA2569720ba29eba90bc4592f8833b7f491162b1afcc03197610c4d41b50dd20e231c
SHA512153af55e394bdbaf6f4f43d2d7a954e7c84b34df63d6a925aaf98c4b5ede1ffa74140a30e5c21f442f3bf5347fec1fbd1489396fd613ea50591e18ea20c5fe99
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b