Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 03:09
Static task
static1
Behavioral task
behavioral1
Sample
5a3be1edf545b572d9b22f6f02d7ec8c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5a3be1edf545b572d9b22f6f02d7ec8c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5a3be1edf545b572d9b22f6f02d7ec8c_JaffaCakes118.html
-
Size
53KB
-
MD5
5a3be1edf545b572d9b22f6f02d7ec8c
-
SHA1
11ae5dfdf61a6ae988e4c9dbaf9597f0a7e57274
-
SHA256
c3d6c1b0f0c2b336d191caba77724a80a893585f998f7fc57a230dc26741b2a4
-
SHA512
37cdd01d34fd1a857898b299cb9c65731158eb699f335ef2303e207553e0c9f85baa0e208b409b7cb796d0c39b706af1a109fb6d51b79ce717ae7da03b636883
-
SSDEEP
1536:CkgUiIakTqGivi+PyUPrunlYJ63Nj+q5VyvR0w2AzTICbb3o6/t9M/dNwIUTDmDZ:CkgUiIakTqGivi+PyUPrunlYJ63Nj+qZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000b975e04360e738c7b1add1143c539d80747d7643dfe6d441a2b6ca761e28c55f000000000e8000000002000020000000efe4568a8838b946432902471d137b2eda8f5a49d6c91dec2b216e3112d8bc1590000000ade0845c20dc03c0744d630381152da697775bd1dcd409e51187806d9fa241345a5ba90ce7567b9b6af4f3ca32a389d2c1c853668a2626deb9c24285f3c7b97204a8b7da480cc32a66555cce175537908a4485e19f3bd07ead555ff86ef187c00a5a5b53cbe183da47e973d2e716efbbd9493743c45260361996014ad5e34f9e0d6f231097af1138737267c5f344ca6240000000b4a25d2ea2cd6b02d07691b14b20a6fd28b397f9570851b4f2901e42fed08d997adf4ef4bceca6a52f858a5da36d27e2f6f83aef5384fe98ebd15a3f0c12cf7a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a9712a89d9da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000d5d5b9ddc8c8fbad637e531717513e7490f9de1f68255ad98e22c2ed0f11a588000000000e8000000002000020000000b0fce56ac90b44c816e5e302eb43f6c670f9419ea772c1c0817802295fa9421a2000000098e864ba59d0bf7a604a42686e4950cdf24951cbb4655d9d1e2150b059e23dfc400000007f0f3847756b137f7d4008e3ff271c538768889fa1c146fa04c3ddbcca67bc0defc2c8651b4ded6c01cc822fd5a667aee3a4e33dfdca1156961b799c44c2bdd5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427520443" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{52855DE1-457C-11EF-AEC5-4605CC5911A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2284 iexplore.exe 2284 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2284 wrote to memory of 3060 2284 iexplore.exe 31 PID 2284 wrote to memory of 3060 2284 iexplore.exe 31 PID 2284 wrote to memory of 3060 2284 iexplore.exe 31 PID 2284 wrote to memory of 3060 2284 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5a3be1edf545b572d9b22f6f02d7ec8c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d762357e6f1cb62067a1b7a340f1a7f
SHA1c454fb89f8b04ec2d26b7343919f892af57455e9
SHA256f49a031d4563d3308094f1f97620c3ffd1bc7234aca3986a0f47b0c645dfdd93
SHA512965c180908a3bf818fc740ac1d6c37d9edeb3c752cefd952edb723ca89270bbce4617bc308a3c6643e3a1ba7afad769b0c862596168bd6d2b211469d99c8eb27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fab58d81f770b419ae1c252c47534ba8
SHA16f96f9c68bce30023f3a4a63989d421b348d0adf
SHA2561575a72df8a0c6d8d246908c22237f0a372bb988f1164246956ec85293bb5cc1
SHA512f363e2c73d24fd99957db6971e23404f1dc4650d640bc20f2f194ca14507b91e5c82011a004e6eb14e33b6a77d1ddf06d338bbf8e9b7b4ab4878be2628de0884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbf68c398315e6736ea5b2a41a12db46
SHA1f5d42ce4dd1d97d04b04225053801ab739063ede
SHA256265f71204c6a7c4c8c79b7fd64e0185878abc8fc945356240c9847c7f594bbf3
SHA5128cdf527c272946ba8ba7d46ae01ffb00fbfcc3c00e9bbf96cbd555319eb3895d5a4e87f243eb7866c98edff4e28dad8d38cd768c072ed86bdd797e0493e97cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0604c1865fd288a0577132981c0355e
SHA1d94cc90d655eba46c46c4eba3c197c05ad75ee17
SHA256135455a4541301069c6c0e19e78050333e1f96ef84650d2e63d1962c9e44d2ab
SHA5121b121674e2de218fa623f8b27e4ea32430448705307e7a5f88722737ad94ca4cb57763cb5cc1abbf4dbcb695d3aef1fa6c17208c343ea8e9248ddf7cc66c2402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5362278a1bf395c5ae9ad10ba32d4c0cf
SHA18f03c2110fe074123963dace4f0f3130367735ea
SHA256140b655044ec2b9e268a10962c765d265be82bd4c5c3880bafcc031cdd8e021f
SHA51274fc82470f323a732e2b05133d4f43f558be011af3ba7a53df92b5f2a5e3d0e6d8be25f480384fa644531927754be161c1bfeba658e6ff5e28c139d414b05eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c3414d65852a27d00f217304e515b67
SHA1b0914f7bf5f399687035b43600aab78b48896956
SHA25632452e69170cadf8dcb1b933dd1fbb24243aeb48e51e81ea3772221c104da6bb
SHA51259183c9695908aa8fc76b13b29ef6df7398110f09dfa7c7e4ffedfc6654cbe9f28af9bedaf91159a128ad18bfbdd8ba80e2f51fd7165a685f2ec0c4be112ffda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b6d4372d4dec20452cc66c724dc9358
SHA1a45bef302051693515791a26bccd20f0c2db4544
SHA25670c8a433d3e37b36d1bd7de623e128dc52fb683f8a94004c0afb3f11b1ddb697
SHA512bfa4305e4d86a98fa697cb99d4f1f4fa111e786f58b90ee52e7de9f708f91cbc2047159427ba349aaef426702dacb1a10f957a021d022ebecc84a38f7d4a680d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5ac3c1407403a3c3678df792a8524df
SHA13c762f8af10b038a87ca61e77b0debe0b5a2e96b
SHA256346775e431bb671cb24529baa36adeb9770c1783659d16266793352b996cd6bb
SHA512bd7ed790ea75d0be3114376a4dc0167e5f54134c16d755f0e6324c47fe97a6f2aef8c583a9f78c1cee0ee45ef774b07e4b3fa1112af3c3017992ab9ba9132dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef7278091a89943b4210fc6b28da7963
SHA101e9d8e22bfe36ce740b2d8bcca369a75bb41059
SHA256ba172e2f2a2ecaaf1e1e9f7dac260944978449e4372eeeb06dd44fda08a0d440
SHA51210b9891dd309b133ea5d931ada5eba246de49839fb39218cceee97b4c9b97a6ed063f3ce76d6ff57e63df797bcfd8fc91f24f714949ac65c33a1ee9332518a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532d553ad8769bca37fa158d25b26811e
SHA138438c298a3981d181457761c3407f1dd7a3cca6
SHA256edb9cd0e8a64dc9f38cd1c5543d73540a5e78f83f002ae76cb26c690640aa105
SHA51254c47f60e04f6efc018b55bfd68ffb6030337bb13e89178258150d037462514c98c146ac4f3a86fc27ec8d048eb06a3bbdc97176a428a112554013a97e2a0e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5192199a86f7eee41ed774220f06d01
SHA1acfec2bd56dd38e338488edf87564101598ca0cf
SHA2563defea782c82970be7cf7c39c92390191a66e86df30c2aa66a16dee19b308afb
SHA512ac19f77582eb371189b42b1c0e61bb6a99cdce37041b18d8a030c68a4533366c7ac7401aabe8471f74bffb1f78e949aca3a930138b5e007a7170def2ba4dcb20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c58313192548f3863702b8c55d55ca32
SHA124816dbb5e28e364a35c07be9156b53587c95e37
SHA2567c8745515c75a068bfac7f49cf448a1118be920aca4be6fc1ccfd4c11479cf33
SHA512032f22b8ffcf620ee40dcca5e6ce3c0f6326aef8e44657474d569865e4afc9417415501fa3b8c4c9ed25536e2fd6bce2b58adacf413d1605877fc283552156ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531ef9c1bcf086417f1a1b99af3b072a0
SHA15a4f5270372baea65ce1ef506f087dd9144eb4ca
SHA256e5b62e0a136a93aed8df3c98a86aff576f5ea63c9c1b623ae10765eba490cae0
SHA512d3fbc98811ad82daa332452ff02a17a487d44bfcb3310cb50ea1021ea79997822efad64fc448b9deacd3d6031dabe730f8ba904e0be0600b73e2b95e8cd8f871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd1063609810836132762e85e13c700a
SHA1eaf6a56cb0884209b16ab7f957d7242aa13413c9
SHA25604e0cfb099220985b5c85ca83e28e212847717c453f3b5c19cb22cb5f5158ebf
SHA51230764e6c9a7acd781624ae7384881c0198bd37f6add967188afc535bee85996881f0b29db23c8d71c8d28e0d525715224f36910f0b2ba988a7e1d795549737d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a1af1683afddc95557f1e7b3094c33
SHA1660b4d9c8bc85f2ee0c83b6f92acb3ae49183b02
SHA256a077b96ca253b177db7567b11b69096c4625db930edd2d3d919570a84d3a69ae
SHA512acff7bb8d0865f351002026c6af415e636006ea74eb9d40797ba71a7875b73bb22d9f92db8e3f3ebe29da3d04c7f9fb6056646deada654e69288a16dadffd99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516606744bb692e9065353ca5edf927a2
SHA102817984c85fcb3748a0261cf385c385d03a70cc
SHA25663e5b8ca5a4ff36455f6c6b56b2156e71dd4eb433a224e7b586cd6c43eae61e8
SHA512088413b333264648110671a0c07ba274fa41e3a93d9d3c596a70799e61f8a4ac93b6d56e82a2b0d801b75b9ef9c8e489e68ed06d6bd96a56c4bf5d60aa632794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2c7f7aa9cd84588993c57a252110837
SHA18f2266ca5f9c97364619848c65d8a342d44ae74d
SHA2565a33b07d665671062b07b5a84fdf65f6e9fa022df3e7a5b6011ce6fbaae01d21
SHA5126b821120f3415065201238fa82893157d02621980167b8469820a0684cb56927c8595253512041dbfdbb7e769c037a88ee0c578236d4ee6f3aab8aa2b7280c6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594a6a27d3bca5d09dfe728423de39d2b
SHA1195c1cacf56a14e55da23f8d7574e68eba6d587e
SHA256121908a1cce9b5d6f8a8314c9bc23e11d1e38fea3159574ccd307d034507470e
SHA512b2e2fe0749f2e3e8ea200e8b7e2fa0d6916a2f53171ee74f4aac6813d17ab8a6e219baa85aeb47f965501f6b48c79cb4d2eb12f115acc38c73fae4e3d4bea233
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b