Resubmissions
06-11-2024 06:32
241106-hawghswepq 706-11-2024 06:24
241106-g6hpvswajf 1006-11-2024 04:29
241106-e4bsestnhx 10Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 06:32
Static task
static1
Behavioral task
behavioral1
Sample
script-mad-city-7.html
Resource
win7-20240903-en
General
-
Target
script-mad-city-7.html
-
Size
7KB
-
MD5
5d35c07aa73b879487f5f582f1eee2f7
-
SHA1
9a239070b40e8a8d6fee6276c9bb4d7baf3267ac
-
SHA256
fab320941a27be2dcce314470f9df44e72e3fa96432900a0bb5075453fda384b
-
SHA512
16852de31ca0c9f5a4618cdfa2b113e2866ebca07c23fa8faa3ce13013da9ecec138df63c4043188496585f774abba0e81766cc26c6ecb9cc5c72eaa77388f31
-
SSDEEP
192:PN2x2Bcu38+G1YCdjOGC4bdsgW8voy7m71TyPTN:AxHu38+GO+OGCkQ8Qy7mhWTN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 608499be1530db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "437036625" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000efec4f3bde142cf5e4e22efb83487dbae66a2c0639c5eeaaa3cf1e9eb89a1380000000000e80000000020000200000009bf695dc1ded71b16a48ff223c959730bdaf40420b90a9136408ac8e3f7f817d200000008eedc95a0af90ace85e6e6d4ef7fd9d6be31d8f958aec16269df775a330140d24000000049143ca8cf1258870c6a56134a3f4f6567404183493182cd6aa7700b816374a7d1af36efe5db5ad1229c0c12f09a875ad43d1e7670da9f9696b437d9aee1b3d6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA293FD1-9C08-11EF-ADF2-46BBF83CD43C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000e65b8979fe5c80a0fc789a4008adf1367f28d9c933b03f559a20c8bbe3b353c2000000000e80000000020000200000007be94132f835fc67c4160aa5107a3b7062000bbf3c7db5de14d5454f82ba719f900000009453c56896a0594bc37a44138813b28d050d7ee2adf4eb4d64a8ab47e9669058fc5925defe2a4f8c7a8d5f5afd25b03c9cfc09f40dc8ba598604b51a4405f104c16298a8b216a7abb8609c65f93ae93fe8492e400729d9688ffb9086c4a709f5d95a23b98d35ae999ded7b9fed8cc4be518bc8a4c4a2af4558ad017787efe5e4199149aabab90c1175777ffea2243ed3400000008f3d6650192849c424771c15ad75022d2ea360366e04f410cfdbeee4bde6960f45616342d1708635e6392022d4ac4e421ff0d6613c006400869cf4f85d9eac59 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 iexplore.exe 3036 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 3056 3036 iexplore.exe 30 PID 3036 wrote to memory of 3056 3036 iexplore.exe 30 PID 3036 wrote to memory of 3056 3036 iexplore.exe 30 PID 3036 wrote to memory of 3056 3036 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\script-mad-city-7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51475096c4172683d4c2e03f5ac287edf
SHA1690a92aca260e346c3703a999af6a1204160b0d6
SHA25676849e4934712a92b92ba1c813bd9fbef16a944079f602c98965e021ff4018bf
SHA512e030112985021d141debb876867e4da443a8c53c682d98937dedef5eb6609a0c13d178f65fe67bbc67f8b76245a03d0ebebb2193981bf322c33b4770b6fac764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e97cf7acc88ae400a60a6407975f765d
SHA12ff876ed1d867a278277a2c1a96e55a94c15608a
SHA256c4146644bf439ff8f8242a5a400648f0610219810bbcf611a157afc12fefd4d4
SHA512bb810cc0b8fa54c8cec6e122d92b8cf45680629b4729110c5eaa72e512ba6d59295062764e10aa2e3161a49e67c2d588fa0147ecffd38380ab0754b5f90c7c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578aa7658b1a767d8d068d19b09084377
SHA117c4571f21b1b5a830c8e1073e1d18889f51bb43
SHA25688df1a4e8e0463ebc8576d5c6ee2f590b03ba68e125ff3bbcb3c57e2d033fd1f
SHA512b094c858e7628ab7e92ecbeb4d5a8f156bd17e5d35e4f8d3b7c00d71c55781177735d79121ce8ee2adc2d4dddee0f5391c36b750b84affd7259f4cc37d487487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5025bc33f0cc0fd15301f0f08a7e84f4a
SHA105230b2dffa72aab97d235d7724e867a564230e7
SHA25602f8aaa894e67a35f7847305d6bcd3f1981b290bee0a4e4b315e891376382a93
SHA512d4ad898599618c1fef8e2468c3e859556b424379a99b064d38a665f793423f2842c8ba9963a787afa87e071aecf1cec4d78ebec605535448ab9b6ef1cd708265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5343a431a668ff3e33b98e9be5b5b179c
SHA1cc22acaaf7e2543dd5741a6d0421dfad932f1a34
SHA2562c1c8980053ff6559fc58805f3ab6aa5fc7725f068d95820aeee5dd741fc5adb
SHA5120471fa030c8b1ef957d15a52d23d10e9d1466792e7af3d07c993ec649c61664ca84e9e3546fc026862a948c14c5cc4ccf100b40f20618138641fa1e20a85a25f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b16254c38e7e26d748cea0ce6ae38f4b
SHA1e25919726f22a3c82dd86e6b8171caf50fe6d010
SHA256eb28f8dfc0cd49255fd8bda59c60f8380d75e0c20234ff40493a4285370e5b61
SHA51247eccc78f1195360632c248ba4e2423473fe15e215118dc1df675fc27e8466177d83eff96e250d64e0ab7b30ad3139eb3a7bda6b1cf46e456fbf34b622b531ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbd24863dcb12bd109e93849985566b7
SHA1ed72c2460e8f633935217308d8c4e184ad7d3770
SHA256d396553b8b73e442480b5ff8db5e14581b3ab9c5d5657e427c344dd5b5743c82
SHA5121ae2822818526f5fd077992643061c4b02da0e5e50c7ab2537afff4bf785f5d0631aa7cdb83a4c57d50ac1b516c5b19a4f3fd3234283bca7aaf746bca1fada69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554a1b0ade80b78204acd4379e2e1b8d6
SHA1ec88dbc1835fea47d45266f86134f099a777a1d8
SHA2569bf58d388f6eefcc4e0ad23973f2e9dbb580580d4ccf41436fe61f3487dfa0c4
SHA5122bf36ba972c2a7b73d766b10bb58a11f6b37e617d1d350756fdc6e0e229ea575390a1dad488ed46e0a8f8f9239322bef737da81922cd2f2d9a01f2b94b46d198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee17ecccd52fd5af128777ed54e36577
SHA190298bf29d5e178076f7c49fd5d118ad33f04a01
SHA256b58d252607948ef45c71711ce5ab5d8c5347bf61e1782f323d997e65b2f80e5b
SHA51225aaf4be4005ae2970d827784c4d8cdaae700fefd0cbbb4abe1bdc393a1d1d5c7866870ff5e0ba8ec5315b43e634949f0085a5460727a60e4c38247f037d1006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b558687e23cac2b52162e663d253c9
SHA10a410eb8b116464ca0ddae58f820c9fd2cb0d708
SHA25635545a056cec3dbe68cc90f8fc662a9f969adc210f562bf61302b2271bda6469
SHA512b354dd8ab452fc21127e6829b97cbb2586d5003554b45dfaf84b24731b687244ba1f8e851ca6c2de18435d41525f7ed8d4c3be5fb15bbc6e844cf39dbf486516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e026a3b2db6acdfd3d41c4a3e7d8f708
SHA13df572b3db3f16d5db3c8d7e94e1e9df5ee8c057
SHA2569ebb0c79f42ee08c2017400002bf2166adaca0520184f34eeb00ef4ffa09b6f9
SHA512f4f6eee5437e020479c1fd78b0b55014a6cfbde6a391acccb87e00790a09b8f2d6322f1d412b8129e041cbb7bde54f6f794c212e552807b8ad6a8bc0109ce098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf67d6354b4d97912271b8760d83bd15
SHA1f2827bbefe3d5624b864e9b9ec18066abe2f167c
SHA256d9abc4471accb145b8664841d7c581982f92814d81f460eba52c48ff31492585
SHA51237e176f0f565297d3a948ec6ead0b03c3aa520af5703b0fa55bcdff1d602ae6590f90749d69b2041bc1610de5c8e5b9764b9eede1a16d31fed3f5fb838639906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bac5ed0e9602b82f977d0cb31e34d93
SHA1b871ea34c47ad776a68a83684c5b66f5f7a5e718
SHA256f1484a769c66b5c1d91011c479bd25b43382defd2decc7d6f0dd19c9e083891b
SHA512044055b6c19566ede003c2014de86abd7e101917dc44e7a57e9cde3ed37fe184a29a9d05a560db487180450047488daed0685bbc15c164b6e41afa5652bada34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdba5feac7cf77e8563a264f12c335f5
SHA1717b280125db3ba25377301ab7408f50b281f704
SHA2563c81b31a1cb29ab1ecb48d9050b90e3392246fe609265e6e42b8bc9d24eee900
SHA5129b58aca260beb93a441f54f083ad11844ee08c90865597d7e02ccece50b6735d3d644901b006bc18b641be94811fb5d645b2b4719759c0f75b106fbe8129d945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f8aaba2dcfe1818f8c8d82c16566376
SHA16bfb4935e10f595fa8aa99ad87075f07b4d1c9df
SHA2565193fe6c8c4c324d04215d28cb0b3ef14230af0f3c98f1ddaa49b7fbb1c04a6c
SHA512785e69aa08c64dd1e58eb6f212037ea7b0fdaa54206dbc8c9cd8c6e717ed533e5fc235819b8a349a9b4d6f8fe20e7d258b4262e9ba978ef48881e689763b09c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5369331d4ade0ee8993aef8a0118b381e
SHA1f20b2a02f3dd53fd41f2c7c88ac9851b11a8db03
SHA2565bbfd6fa506dea9109db17384a8df104f2999a21c12e6540c5c7c8b9ea8288e9
SHA512f47634cfef523429195bf2f441040479ae1d62589826c80fae8b6e8db993f1ed4d46500dd43c348b355e4ebc61dd1795432176bac21da22a581e7731ded7697a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d729526081fb79d5aa41e1c3410b80d
SHA1de32a91bc68613cb05091e838cf7a430783445fc
SHA256ca962dad3b343e54915ea6d8fb385ef587d91169e50e95d398e06536ea722060
SHA512b7c9018320e43d6c3d221d72f3febbe19580662fe74a248ad0ff92ae815c0591acb70568f3c4ea8f49aed2f67ed54ec7f84fc648d0e6f1f639c476d7ae590b62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3bd0199209a088ce7252326a5f78207
SHA15869affa10f24bfa2dcf87466cbc9c7010b69ae9
SHA256e539300b19ec7f4e19cb05c55d2eae909ac84cff982b6209b11826f4d706ab2f
SHA5122d8cd0b53bd111594b00a117c870e1801b9de917d48abf269b5ed0fba439f4265738e3a896dd7199fbc0aa505b13cf3f6c6c47fbbfed5c81ab8ba389d7bd64ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5810cfeaa2c862f759462461a27fd0c32
SHA10b4bbfaeeceaee3d40545798337ee6a81c1d0003
SHA256d4b22059f6595c00ffdd607fbaab367b5fc2a926a493feaf13e17ca2a4a5a5cf
SHA5122c75551b6bb6520b16db1358185aca968a0fa67e20634a6845adb48ace7e62bd8e5f5f7fce8b4fabcf26df2742e66626f0ab68e28861f979c82942a81e215496
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b