Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
a0f254cd06bcc6d5ab078836f2a8032b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a0f254cd06bcc6d5ab078836f2a8032b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a0f254cd06bcc6d5ab078836f2a8032b_JaffaCakes118.html
-
Size
53KB
-
MD5
a0f254cd06bcc6d5ab078836f2a8032b
-
SHA1
d38c62274202f1a490928832427e40bb6ff8383e
-
SHA256
49428b2016282a424151dc8f5f552cf9e66bc0bb992487af47d23715c10c6335
-
SHA512
f067c886912dfc3b6547750781dd8ff11402f296ecbe6fdd976de85f265e9a5100d72fba7efea0259e856067fda8f6cd73ac7709a8d82a009337b76c3ca2b631
-
SSDEEP
1536:CkgUiIakTqGivi+PyUirunlYm63Nj+q5Vy0R0w2AzTICbbJoj/t9M/dNwIUTDmDS:CkgUiIakTqGivi+PyUirunlYm63Nj+qq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000009394c565ae45b7f46b96bf82d445192a2b8dd4127c7120791f994779eae9f294000000000e80000000020000200000008262a170369e6e88b599e30d8d18bb179dbc680dab060076ba5a03764b7f44a320000000e9784a365f70c4e288f4e2fdb3bd9f527b9a2074acc7c63e6b9f4cf9e3574afb40000000cb2a89050c85933d82b3b0139576742e2fa1445846ac7f7788416eb7b82a7e39ed7e1eed0601dcbd089d074050144a5e32d413d701ddd44e320ed346606dd674 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42FB3E61-5C44-11EF-9A20-C2007F0630F3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e03ed21851f0da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430025240" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1496 iexplore.exe 1496 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1496 wrote to memory of 2768 1496 iexplore.exe 30 PID 1496 wrote to memory of 2768 1496 iexplore.exe 30 PID 1496 wrote to memory of 2768 1496 iexplore.exe 30 PID 1496 wrote to memory of 2768 1496 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a0f254cd06bcc6d5ab078836f2a8032b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1496 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586fc22cfb761ac8ec97780d164a180ff
SHA1bcf1ec42632887802d9bc3b64d3c18611ff8694b
SHA256b9aee7ba05e3c92b7eccc7f711f722f91f885e1f587372ceaa20cbc25a1e633d
SHA512545b8d7569365b4c531d95dc628e1cb2ba63130ea194038168f6f1787567b708a4b029172fd4b56c5855d7f19e7dbdb9994cfbd8872bc44c8e95b2363a0c8b6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544cad6c126f9dbbfb078bba07a944678
SHA18063e2f93a66e294ec0eec670e4135397fd78d67
SHA256912ea9b563627e034149d97bb989e941044466d09e4b1afd218066252e32640c
SHA51282b84b37e6c5e3e0cbe047e63f33aa3f1b5407494da2bf9bf3b0330f3c0608f12ea5b158382b43ddb2ca349eb0521b36ab655238023f378382f4f4c5fdb4d749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57094537f7abf0bc1f56996d25cde3565
SHA19531acdb4940c2897465eb67a1225eaabcdedaac
SHA2565a589be6c512d745f5b48eb72d280b4733ca7f4a3a5903087dc9913235839c12
SHA5125e4402d74e64cff755121f5d1db0cfffefd7e42d914e72bf6129f271ae0e7aac39bd586ef9beb9800ed3d6be395d6b0073b5760037ae4583f365586d1c329834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5743b1b9cf53993b2c148e1fc279642a8
SHA14051f0766070334433deb2fb75541639011e7096
SHA2569c2ea2ac42a692bae01ab7d1b12b9c5322b8d7c9353f34ee25a5593dd9166742
SHA51281b318238469f8870693b9984205d63f897396f5975d12d26824aac89e534734e9e07cfbad4922d64c687019b25416d5746d1faea51eacf76ed8ce2ca07d7968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f051d20d5cdbd28e71afa52b9dd06898
SHA13c8601d44c669ecb162c5767b56efe46884a324f
SHA2560bb248c75e7a5aa2599a9a6c17d51a7514a3f12bf77fe71ab1c40653f7ce4a43
SHA51241e3c15bc30c51cc84f905a4e9c9be92bdfd6e6cd96a9fede1c8f939b9642bef01d7503c4bd6a6dd98718bd44f74b8259f0338b52223c7264fff902d2af78265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a05b0c4739618ef3167ba657fff5600b
SHA1f1233382360f5ed29bbc6ec1e842a822bc05b2d4
SHA2561f4eb7df82cc1c850423230ed9947008323093553037734a559a07694b815e85
SHA5128d5fa8c533ac6850a4455f1a640f73bbd3b69bcdfb5e4003dfdf380adde9f88a87ed15c4fa79f17231650d7e38199e68756e601b50d5bc7b3f988a07635aa8af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d239bd47d6373848d934d4033df423
SHA160b4be6630ad7bb8aeb883d048e3fb576c1bbfae
SHA256a8a70c59cb5f50e6196072d843f7a912c5cf221f76d5c5f0abfbbfaba43659c4
SHA512beb5a7e467537d95611b37a8f86d6a6b32151758cb7ef9d0e845c8b793dc9d40f5f16701ec7e0ad20182609bfd9c24a8101c5f3694bdf2e80574a4136228af22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3adee620ca41a8051ff3879f3d97e1a
SHA134db670a7eb4bc8accb6040ef273b35edbf801bf
SHA256744a4baf5063dfcd23cbdb205958744abd6c9e5ff0b7cfa46176bd34a0545427
SHA512ab037cd507a2006e07aa58d34fed53cdbd20b20e2f590f382227cea0b36c6ed2e6907508acfdfe46e7f0ae6b5451f47fd16d83a63e32f9d41586bca1ee6d1dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5949e152de99505b33887da9e50c8bcd1
SHA15e2e2aa9bb63ceb3ed1dcb4dc63bc6b1fd9a0a10
SHA25622af8d33035f0580ee9d06e091743290f309ed26349a05876ca3509327e478b1
SHA512a515dfcd31773b26d22344275dd27f73137dfcf1d1f6613739fe9dfb24357a0b3bc1ef41237fede6a3e04eaceb3c23e28950bcb4aab5f4f4ceecae4c33c27a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1f0d9aa5b79dc56f4ae69a1b642cbf1
SHA1158d58b27eae3b3a58aca1e64a1a3382bc9b4c5b
SHA25678c687fce130992fdb7ffcc0c34b4c3e1f77385996db9f4a616cfe75212d7717
SHA512d5d04e92dd5360ff42a8d859c1265516771f77822f3fbf1da8c4abc1e53bbbd7fd923a1a5d21d96b8c3d06f9d4cbe239d004f5698826bf25bd993275681011fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a23734234fbcdc5b028f68d4f4e6c2b7
SHA14fdcba5ee32da51449e4ee46f521934f3c2bfe51
SHA2567e530add3e1adc66a1a46b334dc37d3a53b5b8af83c175288acd2f0e967dd965
SHA512160ffa203a27fa4f3b665ac5e600c03ee95a210ac44c36813c69b4879f29b8a65466292900e048af25f09cbfcec1a0601526c6b4b5af54642d5aa6d508324fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5056af52d47fbf0e05258d64a300e1223
SHA11a65f407cdd7fecc2519fd994964ac720c0ebaef
SHA2566417045f9f103b7ccb6855e5ae6c372ff6bcf71937793b2f151f240e343a4567
SHA5124096ec84d3418e2be1dc5a95dd9cb8d454fb98d3dea5ce69a08ce4199aeda42f3a8a9c181bdd064da04c8833e96a45c31cec8d0ad17a04283524f6ab841e559d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c335efa25ad1598bd94a63312d9c6017
SHA1df1538b7b205215d53a6b0e3688e8e781f1d1662
SHA256003bc67118af0ac54935179cfb2c5688820f11bad5eae679469668bc8aacf655
SHA5123890c82d94b0324e4376f94e3563723e324c9b57e3c8ffe12c7c9bc84c263dcb99198cede2310a6372d75ebf398b202e31bb1ad3b00f8f47f19148aaa8be3409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f71da9a516041258f521517109823c9c
SHA1ce964a897c10f7240fc322c40a5b1e3b58db3242
SHA256cee6c955bca8987e46c47243980f33c5d9dcfd85123be06b4bd67fe13b29fa8b
SHA512d151c22acb373cd6169c433ac99a92e6eafc33bf353eda29a97930f9608fa9e1cddb52195f3f7a994546a0b2e7c9a8ac86077de71f17e2328a6b25469233cf3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed46b02333971be9e09fa566bfb95c4b
SHA1f7290392b4b475e3a9b95c329560c5c01339539f
SHA2562397285a4ba1837716231eb26b3893ad4f485ddb9c6176bda113a05e90d8790b
SHA5120379be3351122f0f263713ed41ca94b9b93518a2e12c1284a868fdc60e57b2512479f84574b63bfbb88b3486131ba9c7f09022344de723a95d5e52506959bb24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cef7f4b3746f5a0f1b9a6218697b51f
SHA1b57a31a8df70ef32b3952074fbcb4e5c21013153
SHA256024bd3953b1b4c2120425ddc2e0e9df27ba6d15cc7388463e71f3e25164a053d
SHA512a3c3dbf0011333aee5a8703b845ed8fc020660c6e93f7ccb4cc4d4f1e5e62cb7c1c9d7f92d0c98c2fa716f5db67239f21ccc11a897be65d53d6e8da3d48efaaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb80cca92f61a65b36b23843341a6371
SHA1c3c15f892f8c7e4014c9d14088d793b76fc99481
SHA256fed9dcd8363276cf9fec3170832f69e7e38dd620edc6d5995ee240549edee776
SHA51205fce7d1590e58ee5d75e15da8b9082bb34c4aee33d9ddcbeebe65b3be0ce6be855be1e55d2cd1f83b73363f70b79fec487ba155dd9aeea16c90602026074c4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541bf3bf90c7582acd19a44a37d49ec26
SHA142cfb2f6ae89e64182197d764b460b13aa4889ae
SHA2564f7a3fe7d4ce1f49fc56ce4d4974a688225ededbcb0b1ba5071a7d08df2547ce
SHA512593ec78b294d9c6fd25aeb67402cd4ca1bf568010268c2a7bf68cc801729ec700bd205109a2a925cbda0d1309c229d9f54c3a8da44aba655f9bc4f6513db05e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d592f06f5486356419f2a21276e7abd
SHA1de098f5b7fd0f6755cb77464e6c49c09b371dcbb
SHA2566342def0566d89492a1e4b4bc3b7b0ed9043bd7af3ef90bf2df48f52ece980c7
SHA512f87b1e6645d3972fa29849011ca074704d14b72d4f6526519813494b1f821402f699cef26a9960a2cd5824b4df119e375a800241d7e1592d60e64dca92d7563f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5J67VDZD\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b