Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
44b3de96137493f316c2c2620d5833be_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
44b3de96137493f316c2c2620d5833be_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
44b3de96137493f316c2c2620d5833be_JaffaCakes118.html
-
Size
138KB
-
MD5
44b3de96137493f316c2c2620d5833be
-
SHA1
421b0a1448941d31c3c5d43d03714ca71f03ed67
-
SHA256
b8fcafe78553a058cb501860dbb244735dbd90ef758137cd53ad1d77dbd68d7c
-
SHA512
76ebbbb8a13ccb3ba54175381ec80ad063e7bd9d0df0c24728105f32389de058bdc918ba77d5cb5f452d05f103e2e9461a042737d8a1076eedb0fa6c6baa31b5
-
SSDEEP
1536:SmpA1ER8cdCwwDQMztlL4RMyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP06:SmkyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000009bcfef2c432092b9a9e983a60eb18b69343d91486fac46b5c5990d596c9db246000000000e8000000002000020000000c4b8a01d815c838e8a59fd38259ce3b8226e02905d15feef9cdff52241225666900000002a89633ed5a1f0216decaa6f173ea736c0c7e6d5a02b56cbeb88e8c34a8ebf7dcc8e618efe647f106fccd2928c7e4863ea3a8c5417caa29dc3f77aef0b5e24b4a92d23e78ea4c2eab70abd8e0e780d3ee20b662e561af309f5a33ca75e5dce8c0aedefee08f12103121a0127d30c8cdd7c6349e9ef857a31a85a130c4be1f519e1b51862341cc3c6f9014daa1a2fede64000000060ba0aa9d893b7293c6595cb77c3ba615bf0232723bde045322eab47b6f7f405d7d8503d7be5a32e5793f03305e5b986e70844a802aa8178ec81ee3ce3c0a5e1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000006d4ea5d19a11bc2591fd45a72ff0a19dd788b1f047e42a49b04aae13b22aa1e1000000000e8000000002000020000000dfda1e42b31632b99fb86a2cc59504c9e147ba268b515ca86cbf08294346f373200000007ba07705ab0dfcb27a7c13c339c65822b11be4bba59d07e34c2bd9adb36e067d400000006be21366b0d7b258caf1276fb0d473ee3cf9952d21e9a61c2cafcf71ae9d588452932d36de904575c163cceac281bbc75b8b4cf8082d13fd5b9e00104a42d27a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435110314" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF3CEEA1-8A83-11EF-ADF2-46BBF83CD43C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0f200f7901edb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 3040 2388 iexplore.exe 30 PID 2388 wrote to memory of 3040 2388 iexplore.exe 30 PID 2388 wrote to memory of 3040 2388 iexplore.exe 30 PID 2388 wrote to memory of 3040 2388 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\44b3de96137493f316c2c2620d5833be_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5010eb4c70f6e00d2ebb8f5accbaad41c
SHA174d2a4bb9c8cc60e8dc4b1777067d0922f0faf06
SHA256dacdde79b04fb80bc5a6c737f95b40449c6da35c46d3abb1527b051ceadf21ce
SHA51233b4bd405f9d9707fb3d695a4e7fc2ab143378bbd5890f479b5711ae0729411e7b93e50b04e8daecae007395f69c00aa0f7fa1c1c76b8ad2617966fc87bae3ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6dd56c6112ab4b76a40b94d057180ef
SHA1c4fa3530946ce8a83c7573433c15b48d0f04f559
SHA2561e4492eb5cc8a3a02e1296e0edca0e1199f1874caf6e2f252292a4ca9dfc3af0
SHA5120bb3a2c73253e91f5b163dd5905689d16ba6dd275dbe50f270e58076588b1e844375dba38a306713004960cc766ef79ff09b88cd2c4f8ef07c715f21878d6034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1dfe2816bb753608e1a70d4018014a7
SHA1ffeaa2715ae1c7df0007fca4d9a1152ab3e59a7f
SHA256dd7de47ff5323f5117aeff9fe4ec6bb66dcdcf050bc2b1bf443aafd85fa6e962
SHA51273a91ed7cfa5842938e5dbcce8aa79d7fd7fe9765820a16d492849a1397478ff03ffe8d3bbf5c650921f5c337fb73f3842fe14b3638e277c499e73b354084328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a74e9f852fb546ce0510cb104b68d06e
SHA16dd360be07784126a183652a4496c9b2442f88b9
SHA25622fde6275b79be897dd551eead46f9e3a25c3621891071e7a2b2ad099a159fc4
SHA512c845a5b19acdfb93ccd2bccdaca49da9ddaa1ae88350c27c0868b608d6825ba5801890b9db6874dfb6e0075bf9fcd93c76a3d443dfb612f69c1a46271711670c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5157da2e881c5b0576c0618f558d4686c
SHA13fee434623965bc3ef28ae20fb87d651380abe10
SHA2562647fe905ee90f6ce1d1d48ce69f3ca5ff9572425908406f5f90a6d7f50ada35
SHA512aeb25d454bd4e6fe4bb3f9762cfd71346d908c847e9f30e4db2e4729efebfe28b309f0c2a8d1470826403dc363d82942df8a2f683ea2247df2213f6c23c7fc90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b332e3a24541931879406d125b4ba36
SHA135b10456ad3ee18fb6ae93d01c842c3919acb349
SHA256c8f9ac165a19fe58f8f793208005b4d2a3140c5fe281496297d9cefd7641bcb4
SHA512a238feadf16ddb0e14b67634658d1b695369ca59edea7d7ce6eed6bf861a693ce81e2a09ee0b331896bad8de2af49dccbe60625e5d2c0f3995a5b1943f2fd5cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511fbe6dd63935480ee685c3876221352
SHA1550e7dd8607791b02ea3aa914d2576541e7ad716
SHA256b6b0a8998b1f62c8052d4deef901f3a9c5b0d25c98ca4735b0fd8fbed81c7364
SHA512a8866dabcdbd17b98bb55e2bb45734e0b4af57331baf9cb7ed1cbf9a41996f181e963642eb9c6a071d917547e7ce14de044bce9c17663f84d26ea5814ee60f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9a17f0a4078df45ca89d2f3f1b70a34
SHA1a51ee875165d9fa593624a1fc17d33f2425a1e0a
SHA256f89f8da78dc4e5db01205153795a431cd497e87799e224fdb8ee605cbad79fb7
SHA512e069137a38984ded01d5f7b8e59786a15cedd8a852189afc489282447145fb6f0d8d93d75433903aa461a00925d2d9e80f5ad5475e8fd009dacec2eaf8990244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578ebf5695003c6a892cff94bcb9b750d
SHA1f507f091b539ca652abd2eae1fcae204838c677f
SHA256b7b5bd7faf501abe00281af92479cdb6ce2043284c7a78a10adab71e7f5efe9f
SHA5124a50e1db7700b25c0d3ab0ff66c0ab77f2d3324e9987c8134e14ae2c41f2537616c63cf1158b10043e2cd08879289520bbdbf851fbc9ecc0283fa6087b84e1e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0e69231180848c1c132aae73d38f389
SHA15753edf7a27c0e633c95826ed52d899a31778d3d
SHA256d659194888ba6ae927c733e556b4c3cb05f844876eb282d60a209a68e37e73f1
SHA5128f467b2da1db6bc4f3809dae1e2bdc772ec951fb71e4342b919eaff5c99f0ffcd797119b6ca6d2acbb01253ce6ca8b4d03555559b9be46abfdfaa31f1a35b83e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df84c4dabe159bb3a03eff0990ab0f0f
SHA1e4b173d37c9ac545db046db8dbbdde25630044dc
SHA256424ce54a1f055f5f22948e22e4ae03d7ef2afde3683b156da315e0d4edf5e1be
SHA5126a37e4a785c3a319d4cee1522350df0ffabf8a51f0f832f3ad010be8069da47cefd9b0751367b2a2747b514c74549772ae712fdf90e5a2cefb773ca840a62cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d3c70831c4b9ea9e231817b83f3fe03
SHA1f0e64cecb884e429fbeb9fe834bb886a49b0987e
SHA2565b756d1f6083572c6fdd9dd865739fbdfa2ac281e9cf7a9202f155a22ff9dc30
SHA5128100fd0d3653d57751d89a22bd3d8d2bbde39b764cfa221c4abbdcd0945ee0af098ee903f0a03c62d9b3f3b30e3ae7d28534ab99f830b9f59273e38442a99420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f33e8a2a4b38242c4af14109db98bb
SHA1363aa77ba8ee5124528b9125e7928d44f1146f02
SHA256e87cb7a74c3cad7e4b6f54ddbc4c34e9b9f5155e89043e77af3591817c66d359
SHA512577535bf1fe3861010aa8be9d929cbb4e9396a63d234bcc39300e667ffab563f82749971ff7660a59456a6d0e1a5f5f33feea390172ae4334291f7282ab98feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581a348d5f86380b248f919a11a7fead1
SHA1db1251dd430cd7a8d6e24a44c1fd70aee71c9b44
SHA256ec642bd3cf36ff7d123312a971f79b22918ae15ba3c152816cbbfca50f1d0291
SHA512d92e225aed0c5588ebd433fdbf0478b7cddc58258dac6c72e4f29c4430c2404955e3d205a21f4c3ae34fc8de25c6ac3378b656b6bd1f59e348c6b96e10735167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564d4458733e43f40aac24148e5a88595
SHA128d9452af8c144d5638b3e4a3a372453e75b5282
SHA25637258d6efd8761716c3116b48eda3b5aa78ac207d77a4816c523af7de182c695
SHA51250d1e92594ad0f8c50f26c829561d64bb81ce4bb59761c7b1884669d9fafd55e94b757c9e5ab946716b3dc4b4e6dbb789b6dde921ff31632e80200f803196fa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4fae32f8b0da98c2a94956bac385f25
SHA1cdca48c77f4e1453fb4dee41cac07c1e27fde387
SHA256b3b4ecf99c7432e3f937d0979cb9d8f21a1151ef35cae6095065c24933029765
SHA5121431786b7d22dc659389481210bb0e194cd1ddc3e16ae7c13c808e62686c57c744cd25003d0aa3e74865c8e72e35460515c4e91b03b71c6a2a54f0866b9efefa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5286e26f364af463a12c6ff45820e4b20
SHA1203df0f0966792a58e493a7b263d5610e16feca8
SHA256d965c71897cf33a3338e5adb81ea7b3b5866692d8a4518581b57779d851b61b8
SHA5120816af3915c5e0586ae67dba8fb98529efa706ded535d40284df4234e52766e195ca7f9b88ce9998f3636517a35ddbb5b75eab74373536dce5761146fcc286ee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b