Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
c05093c591d883ce65e341c48d7b7d7c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c05093c591d883ce65e341c48d7b7d7c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c05093c591d883ce65e341c48d7b7d7c_JaffaCakes118.html
-
Size
94KB
-
MD5
c05093c591d883ce65e341c48d7b7d7c
-
SHA1
047dd12c0cd2b8688ce286e288d0e7b0d07098ad
-
SHA256
4d05968186c6fd8a8b3e6053d88a5ca32405fb8842652baa506acdbe9812744f
-
SHA512
c68f56288f2d13eec261336e386f8e38bf42fe810418c8d293e62701d8901851e2a81cb348e19cd4becf255cd1eaa2a26921bbc91caeaf6924825b8a60fc7b38
-
SSDEEP
1536:WMLiNcHEa8D3KSXFLaX4nr3g1Pf417LjdySe7Z9BdkrY8mgHC+qpEyW:WAi6oWBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0ec57cdc6f6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F1892ED1-62B9-11EF-A24E-4E15D54E5731} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000002d1561a72cb793b9e5c06703ea82a3d37d8f7b8f51a68773f145aea14aa2ef8f000000000e800000000200002000000093a9c39efe41bca90f2216e8f32b3446ed678c09c84548ebde26cf54cd5d26fc20000000147de2ee94c4bda0a73b2a7530b08a355637063bb0a6fd32c9ad4664a1ce5dfe400000000b45ebb260254218abeaf7ba8fa91167d9ec2a579fa41d50ae1c309e10ba1eb24017542d9b1b4b8cbb900ddaecf79172204587a1282ab60c5b4cedaa5aa06839 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430735491" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2028 iexplore.exe 2028 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2104 2028 iexplore.exe 28 PID 2028 wrote to memory of 2104 2028 iexplore.exe 28 PID 2028 wrote to memory of 2104 2028 iexplore.exe 28 PID 2028 wrote to memory of 2104 2028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c05093c591d883ce65e341c48d7b7d7c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58bcf46def66d027d60c128cec64c9bb4
SHA1bc11475294572dca587fe657296bb9d168bb012e
SHA2564890c39b87b19263730de3a29d2ef264186a554fd8771e5f508b4c99c8b49d51
SHA5129b44cd56f01c0523d9dbf02c02eb0b5849a3aa9d2d7f45e293e1d04046e2ecc7350a41e147497ce2335af1c939f5e50e4383046a02434382cc3a8532b5a7d40b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ef188870acb509795642fbf1d9fb1e84
SHA13e1d950e202bd58500815970a0f81d4bcf0565b0
SHA256f16eddc54dc9b8f428c5603671a3bbe93f77936a1293a556cc401b1540be6bde
SHA5121a10ced97947deb8241ff4c47e30c76f483c6d9553d92c06fea3d2d9476ab233935c9c1c7b92f6c93875c0e7c4853598a501647b6158b53539828bdd3b737216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55acc01d856054d882dd5cd1295b873d9
SHA1110d2bee8df4e51852693cc13a5e4a3f4629f3c7
SHA2562fc84027e80e1f524ee9d511e359b5b7ce969a8504becb34af662d18a9f53fca
SHA51295c0d661441bcb91dec8e2543591d41e90ff188bb0683b908ea2853c08c97a0ec26361616f1a2ac8ffe9f37a7ce59dc856abbe4595b64c4ce8dd453fd9e79e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56490b414e06be7f1fff7f5da2e834835
SHA1fbd40104ba3bed6452b348514f9294ae0e6ec13e
SHA2561fbd4410f47671e01ec5a13bf1e6f5a1dd7764c9ea0b62a59e2066f8089ef85f
SHA5129c4cd8d127080ad2378d206dd7d80d3c7e0bc082aa4d55afc09beb526b565b11232766a482d39cc77e2b85da926056953099b80b15aa0cd5ef4dd9deab3f80ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52e71b6ec337549d40eae25cbd3661c75
SHA1f53dfc2cde92eb67d3277d7f443659de62553865
SHA25646c871f1b4926aadbb2a657dea338ce9dc6537a432571b3162a4aaac13bab896
SHA512a4191f9149bb6cfeb37b3b16cf4758275fefeff03be056c5e625c39fef8d2ae64fb65cbb53632059c438008571c90016d1c21f91b63d16afe7df6dc8acf0da66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d9f994177ec7480ecf48308b9e57362
SHA1aac96e19a3ff0b2c3c9f863270e58285cd389434
SHA256ea2b629a73bac1286aeebeb88417ada3b12f9727db426df31cf72ea23e5494e1
SHA5127dda94f622f3b15d9e304c8116aa7b4ded8cd668f1b758dfa9c4d6c470136b332b0f84d6bdfd23c144987e05a0cd2b45ffda6addc8ca5f936e6c271adba85ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f3815ab1ca7a2364bb260a3e6bd97bac
SHA1d412efe270e9cf40c93a69e6d912808e70248605
SHA256e1dd47844fa717b64e4281c9d1856fbabf2ed82b989d48addcd23773c21c1791
SHA512bd76a13f4232fa811f8e914df91c6fce62df526712bd0013c4f9901a46a684a81a682c28981a952f1d8306bba2395bbdb4b9597e6012f97f816a91bc633df2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5706f2c332d8f84f475183946b6b45f37
SHA1f0624db89f989a039dea6c2a808723f3f26357fd
SHA25662062dda841d226ed29f15db85750a68889ca04a33d7840a73bb0b507575ad0d
SHA5128444928d9d92bb5ec0041108a1f044e4104c5f451bdf01ec1846bab3c6d3975e2414fad2d311a5a117e8439d326b1acc97527f3d5fb79a8e6aecaee69b4b7ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c5fe620136cd3715b398b60f2611b5c6
SHA1af486ffada4d0c78d4a204a8813fb65c86b30c46
SHA2569c990c230229524b966f21434a015628655917efff127cc8240db5ef69729595
SHA51290379fce8b1de0720e8ffe27869a8d4e44ab046a6da61a6af3eeb1ead8ab8c0358fb3d21cd296bba58f189bba8db1c18e6f587063f45365707095198558cbbb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55a02110abaf6a509d5c5f5eea3414aa4
SHA13ce730b134aecea362e47ca00bb4e63319b5db8d
SHA256d2d57c431b2505206a58b7ca5644b44f8638d24fee10c99274773594220423d7
SHA5123b7a0a37fb9026758e35595faadd39ddd7022018500b7c511abaf4c7daeaa911d68de3e512299313c98e1f0a3d59f4f647c08fc41af8d2b081137e50246cc1a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f3c5c33e34280aac06a8d88c406f453e
SHA1b51711f7e5860f42cd65ac3ecf715f2c5575d081
SHA25610179a4346f29c896e19c2611e10f3f8ea2832a6941aba56c0eee5a8fa67dfd6
SHA512f6ac125e5769a1a17d9d451c99d2c165a8071dd0777cd33cf4f2e006f66e06be5b85c18788598a3f86aee1f975aa3b5f9adf6ccb372ef0b68ef9f86ca8a1bfe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56dbc799f69035121ccb09927622394ed
SHA10e4d01bcb50596c02fa1fff3cbe4d0e6c4c8868d
SHA256a158f18ccd3228c1104ad7e4cef51c3bea6c77e35c4c4b99e193e42d794c3deb
SHA5129a053c0d06aa908f2a31fae782e108d1be63f0487143b97620a6e70557a77e36689fc4959e48abad7232ca340870cfba7138ba2d1b3e54d901c67b80557ebaf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51506f1306553f040f4d1076cdba749c2
SHA1462c3cb5ed34ba99c6dc2bf532975e6f00a99897
SHA25636dcf3457189dfc14210a7fe1ebab4aea9490aaf52a91ed307276927b38b5455
SHA5126da41509171cae2c254f4fe6c7903a3b25ad7a113c0e8887430f04cce1e6beac9f5152051343df98e508bc9d9b348f21a58e8764deadd115172188b42893c2f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD549cc46d26b1427abe9fe1982b85ec8ab
SHA1f5b0ea85b6b2dfc5dafa1d148d18750ebf6c1f8d
SHA2569e1c53bd9beea2efeccf65ee3fdb30cde43c18e209c92ec82cc5de5bcfa1aa9d
SHA512857b85f44c3034d82b5430745bb93493c3757504bcc03b6fa43ec115e0b558c53167b29aadfdd7440bc33f007b5d375ec8bcc5fc8b544d05a4a5cc26ad04a85f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5343b532f3aebe884d6a90da4d1ba2b8d
SHA199688adabd8a963959265441de34f25b05b1e551
SHA2564c8aa7a03c4fe3f1c879cc2f5e856d3c315eb5d01ae3d4170b535ff57f605f05
SHA5125f7a287b387f751552193ff45cd05edd82c301ab415153094f68e4627e906c05e321a703042f9e13320fad29360bcef8d28c71f882a816a9e3d42cc25948d01a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b54bbc21fb4cfcc7179fa1658b9eff65
SHA1da11cc49400fe51792f35351a50ad6d94eac7c18
SHA2560fbca83bfee51aafa99f043552378599bde77ea3c0eea6156aa112c5076c56b6
SHA5121e88ab7e0686c89b1d589c83926f12db0c63b8a98ca0f667794d39a5cae5d6fdf9c0dbe672d55e98dd5286156cf093d9caa7b7c719f9bf4f336483343fc07f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56aed3062ae80e5fd9fba424c011403a8
SHA1e0fc380ea4a25fe79b5b39d1200d65d6ce0db086
SHA256256660fd9a4ce810cc016a20eed99e1ca5fc5eb3795ce8db04a5896983a674d2
SHA512dfeafd0d8736b8bf06480de3bb385e01c97a0ed059d1115312e1c14bb153ae94aa9dd5e0f8ee2994e1fc70cc725c8e957140eceb59a7ad6cbd6b23772c1f89e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cf7662d808a8afa6cbbc1812a1438cc5
SHA13d938bd76727668cead33dbf5c9f390d56faeaa4
SHA2567bcd0883b4d50c242dd5ba37677a813bd02dd5937cd0de043193a04040793c6a
SHA512332685a521ea3785c9b1d274bbac9979e7806d8364c2af21709465f54b0c719a722ce04662a488ca6e2d4292733729e9a75fa021f72ee5667fd5bab263e5c04c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5af3aac4edb152c6e4184b101f0cc1987
SHA15e9d6b5011f5abcd5339080786ee0bd428ecd1ae
SHA2563852a7a340e3659ecb2d79c5ff17353b6053cf897e730cf1fc836c9d68f32d7a
SHA51240fdc292be457fb095f2d711df68a458640b51a375532caa0b319572d7384ee29eeb312e64f9f783884e38aee3523ed1cce2b46c062d849bf034f02f8d148033
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\69P6875H\style[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b