Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 01:53
Static task
static1
Behavioral task
behavioral1
Sample
769ee7c70c7aaa1d4043b89fceefdc86_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
769ee7c70c7aaa1d4043b89fceefdc86_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
769ee7c70c7aaa1d4043b89fceefdc86_JaffaCakes118.html
-
Size
53KB
-
MD5
769ee7c70c7aaa1d4043b89fceefdc86
-
SHA1
1d4e467871aadb4cec032544628deb16e07016d2
-
SHA256
d86a93cda9a93ddeb964ef38660837518f362692ceca6a5c94fad25cde811bae
-
SHA512
80b53b4cb0702ddeec620b1057e80e8db81dff21f283e7e5765ca8ff6a5aa68248fbbe82f794ed6849416667b76fbd4092c6079f4c5b75bf94af81e52faff646
-
SSDEEP
1536:CkgUiIakTqGivi+PyUurunlYj63Nj+q5VyvR0w2AzTICbbroI/t9M/dNwIUTDmDz:CkgUiIakTqGivi+PyUurunlYj63Nj+qR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428477863" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E6F6B91-4E31-11EF-B0EB-7699BFC84B14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b1de583ee2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000eec0902087a9f126e07b1aab7f81cc9dfbdbb6f4abe14b3cf2faa29577a5e3d8000000000e8000000002000020000000a3b7e1cbb926906cffb319cbfb594530ba4b0819e86472b598c258f3b2bb845e2000000086876c7e63853afb1ea2365f113375577a9fcad554452283d2d5149a39c5aafa400000004dafaab8004909b909ce2043e5ee6befc464e8ee8eb08f6d22e759bbfa12dae606787e79a675c079e22a047b5a5c59aec9d9ad4553231c469c6815a1acad2af0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1936 2240 iexplore.exe 28 PID 2240 wrote to memory of 1936 2240 iexplore.exe 28 PID 2240 wrote to memory of 1936 2240 iexplore.exe 28 PID 2240 wrote to memory of 1936 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\769ee7c70c7aaa1d4043b89fceefdc86_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503b6f2aaf7e4edc18812cc77379a4f94
SHA1ea850cb5a2c5003e89fc2e627c4fc8b58209ae08
SHA256a0b6c922039adfa248dce173ba4dd3c16a4980721e6c90d747711f8f0124a703
SHA512daa409f47305fd0b6dba3b7cba83b7cd4f2487116edaee2a20cd85824970e351dad21b3e64aa92118f08d42fcc2794469b778a25410662e7c3b0ed99b3f0cfa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eec2aa54230fa54f47ab3f72953fd073
SHA1c9878f94085186fa09bd980c5add610baeddc664
SHA25624a93738b7013e99f305df1871832f7cdf46000b3bfeb5dd0e82ab40a9a373e1
SHA5122ce2579969d5eba358dcd662a749fcb6dc945f9415f910f1b40a2a91f1d0b2860d65a8234e491928cfeb776500ab940c06f76741f689ebd497b84893666db129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc00c28dd27cf943d0f496eaf2c307e3
SHA1458a5f062d696e7eebdd22f09cca71f973464c00
SHA25660f05568681083141a463228ee32224c12baa5876e8816b4ab1f9831761b3381
SHA5121f730560cc45adc0fb6f8ff95ea73d03c13141ee35833b7a630d33b4c48267e7db706942873494379130425e8a98194fe25822d1e90934bdaa5b8a455a61d0a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f560c15086789a8506ab6967b347da8
SHA17b562a8ca819681d2ca9d88df6aad9feb133cd11
SHA256d5f594848f9e29a2d20701962149c6818c16cd85290cee3dff855093ca54a481
SHA512815b89dd6dafc08d12d10a90b3b77d1674f168c08253cd3f3a3b7029a85cc564b250e5bb9a920032c70dabd1b58ce964e4193e14dd35a1f3d0530e1c58242dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561fc304649e888062115333ab9a9167d
SHA18473f3b73b8ed4b22eb26b31298235466d691f3f
SHA256a6b31333f14492ec141c64129781eecf2e77dd8c88754810edc56750a9a36b3d
SHA512f69d607acf24d1a28f6a812f3219e70b303cc91ed559a1ef63720339553856204da042a0f3da1de27cdade2f5bae1b51cfe6b2b9b689ad769e8f7991dafd1e5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da0d0081495591847a5733b922874b23
SHA15797d26bd9dcba035cd560ecccf769e3b2679fd9
SHA2567e479bac479cac45643ffa96efad76b2295b7947ef84605a512beb7217dfe70e
SHA512694b6cc10243131cd24ad7aecae14271855f6a4eeb2135fc82fc689a08f2efe488d71d9c62ef7a9ff959fb149ff099bfdb301a64fe4f6346b0ce154ed3ae3f4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a7aa6de7a3172a123e92416702f0cfe
SHA162a0915ee379894bf602d408c7481e6b1876f38c
SHA25640a686d6a0f82a66aeb592e3ab32d8f0f3940286fae5831eb8da5fcd464fbfaa
SHA5126ce30e1370ec541f1548f70ce8fbc42351c4bc83223946343f38ea8be17472abfcb5f2dc60c8c023fe9b21014d68a3572dcd08c8d11587cc02d7f1ca1ce37189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f68e14d5de637453851690382b5de33
SHA18a8b1db77cdba1e3f82d63e259b65f220f2237c2
SHA256f26120decf3d0ab7d3f6ffa89a9da0b3af3cc064f0277a6d8d49a1ac86c1ea88
SHA512967872439458236f3f710f8d7e768a77f44ccf2e5cb4ffd392c583f2bbf65378d7be0a07d5a6484b657554cae40cdcb195956c8680ff6cde9d2f2c2042495d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55291c2177ea2df69508e752a2933e0c1
SHA17b628d0e69b554e9bb8e9548a89f11f4351192c8
SHA2561e7bc817fc0b77bcdd2eb59b789ec69b32725afee21fcf4545546fab50f4997f
SHA512a5a6ba1cebbfd534e79201f543afe870b36ab5598a48fc0fede800ed0a6a058a66a49ab32ce245f02d4cbbf80d031e5b1e96e5649f637aec73f1ed1667022b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56836d2c53b39fb53f7b9bc42097ae141
SHA1a3f75c8fdec6d28c1626787aab58c8820a849b94
SHA256ef41a9c5cab2ce1c64359692fea7ed21fc3933b1e96361fc2c5b59307e2569ae
SHA5120cbaf342f1dcb652a8148c982673142bc93ba92fc90a70d95122a402af7237595b14c359c3fa00a65a2b4e9845b727583694c22cc6628a0c421cd9a3b714ffc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55035984513d1a6a692aa93d7bfad4713
SHA18b97a802be215a21fc37ff74705bb981cd1e9956
SHA256d212fc4f34a442c3e8fb21d0600826f470eb00a2866649852d0e113a7d803ecb
SHA5127a41690f1983f59a34311ecb613eb7b39658c86c4546e5fa99df340434aa9b95323e2ecfc75fd6b3f35db3505b25566ff01f97d068ce88ca75a1d5a73cb655bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515cdf4f07775ce283410b3339e2c5983
SHA14bb67d9fa0e0d3f873a0b0073841953336bfff81
SHA256f4f0d1094f13fee123926e4111330e3aa5cd30d055a377ed5a6ad97dbc120ccf
SHA5123ce438f2183663c3e30276a15cb5e88f3906c6ca3420658383f4e40d06845e9d251029a17297a66eb8217047fe02a9110c443fa47beb7b1d2c4be80408c83f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5965f3197ceda705879fb001298137ccc
SHA107af7bafa8f387c2d135ae4aef04121ae298ae5b
SHA256657f6d09729b6e49f305b3ea2d80751bebc529a71479d8a7a330d0ed76f751ce
SHA512d44293f7b3d73635ef35a468cb19579a37591fe3cffd357ac7949a298fb4bb9b2fe027f1a53998e3078c0406998f0ba23f4995118fc6958c4f7b89b8c4f951cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56007faea3f4f9f6283e2b2c4bd4b4fdc
SHA1e03816dacda4338694003efcda15b000db1d6a56
SHA256d9aa49487e1e9c8068d61975cd179a81bab1f4c1a6ec76b9c1a97677de2d7af1
SHA512f9f0a21d3811b59b8f4400df0fc94a9044d4f7015d1b8db065b1eba6743a95b3923c8c2a225002552c0cd46791ca71d27bef112e52086c6870dd51a1ba156710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596a36d6b14987db9c70d88354740a259
SHA11806df4b5fcd44de509525b4d192516b9a123121
SHA256d66a992a60cd6c4159cb6c9dbb4f70eab9a86e1a72807c80e889501dcd0a6085
SHA512d14497ed0c986321504aff0be6196276e3b0eec868b3aa23fc0cb1e91f546605a1a8c60f8a3a11f3e081c8eb977df2d519e7919ccc76309b24346fea708b81ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574ba2dbdada2ac258be6cff16883ec60
SHA10fda30a45eeda142d63852569324b21691bde693
SHA256943c54c72d303dcff208d5065434618cc3604ea5bccd1bee62e0fb35b9fe2f39
SHA512ba42cc20b46a939ef7ced74823dd4de2eec50d98eaef49cc82fea266b1952245727ab09c076708f95f17d540451b86966e98bbe02b6d487eeef5749ea2c524b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b01896dd30fbed659a5fdb225d34e583
SHA170fd60b90c0e8d78bfd28f76551b2bab39b856c8
SHA2565d4fb2b9336314b1a771e267b8acd49ba0f48be1d9e8011a38faec2b61c8d1a6
SHA512aadb40de2f8294fb61e0b1f7365e33f2e3db16b19c125b8c8968b90f5ca8333915533ce2b34254cb67aa28cbe475fa276e7cb34259ab484e52e632c94af31323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f807e02aae6def7dd330b99e63ae557
SHA18d1c7ce1ece8df97cd722823557ec166d3fd6fdf
SHA256de053cc2c3515f0688d79453913b5d24bababd8fb6a5d3aad8e52b47fa4b893e
SHA512c999ebdff1a75cc8ba3c2e359ec2492aad0313e4f8f41070086f71afa4059eb4cb9314a11b425454100cd74768c3a2f182fb3090185bf0c30a6f47b56cd59d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574e462d770696cd131a011bfc8627b98
SHA16f4eb7193ba3268da2662c2495ed2ce054e3440f
SHA256f38e9df438375c7eaaf8b1f87a0cade60b53bf4ddd2f64d78e74af85acc40e27
SHA512c678156f743d6b26e55c5947a09cc1f7b26c421d0678708f7b8129f1e3fbb11328ed8dbe9f9fc2aeee3dc6360a95905342a774b19a1c82447e8d9d3a54f7e3ca
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b