Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 05:43 UTC
Static task
static1
Behavioral task
behavioral1
Sample
cecd6d77854626b840465d579e12d1d9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cecd6d77854626b840465d579e12d1d9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cecd6d77854626b840465d579e12d1d9_JaffaCakes118.html
-
Size
2KB
-
MD5
cecd6d77854626b840465d579e12d1d9
-
SHA1
4e951f7c761f1b7dc76fa26c07df3ad4db9a3d9b
-
SHA256
55d494dc9365e154ad7fc56585641e53a15005b371a86e819dfdd34c3aa5d581
-
SHA512
5063ef66f17c49f7ce2dd0072327dab638cbf1490e5f644bb21ffb2e49a917acfe0c77a737ed6abdbeadc4bf0ee7e64cf5e4209df279ddc323bc6eec0da37c16
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000044e3e35e5d5635475b311e41086ed7dd7eb21f65ac7c66e5f5a09d658a98e82000000000e8000000002000020000000e03daf05b64b4269b1602785030d5cef038ef5ea514b995cfe610f6ef9e3c43820000000eb35135fc0b14f5fffa3d04870c765bfa696c90a4f058ba449b4ebe2d33987d8400000002ea3d7b93569735bc7c0c7178a846a4aa8b538b39159c871868004192ea4f4a6c4af366d5ba57dede5e3bcdcb9eb374f906f3537b2f85ab761ff1462d2737f12 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000043251614072316ca008a2fd24575758cce8050c261053b73ecc1b785671816d0000000000e800000000200002000000025783b5ae83cf057bc7eeaaf06c343497df73808b08b244c027d1e5ada3e3b5d90000000ee3df182a036d11ce1d463fb0e97483e10724820aeb13ae1f77004491b42f9716ab4d2a3fa106e83fe13389e932b0d8c21424718ec4935810e443ba2eb30f31ff24439e7799a171753b30e153e356003c33b82c87172444ebb392cc1867568167155a4e39ef6e2b6408ed9616be4cef36e8bd00e965a7aa94fd290d1d6e909bc0e610f8cec13a94428d729a1230d089f40000000091ef3c85d90973749ee12a7b1a77d1ba27e1edbf2ee38995db924f7248658734eb06865eeb97622a050fbad10c2abac1d224165506938dfc82f025762f5c8e1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431763279" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 902e78c71f00db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2F60FB1-6C12-11EF-B30A-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2616 2792 iexplore.exe 28 PID 2792 wrote to memory of 2616 2792 iexplore.exe 28 PID 2792 wrote to memory of 2616 2792 iexplore.exe 28 PID 2792 wrote to memory of 2616 2792 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cecd6d77854626b840465d579e12d1d9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5382dec5fa0393639cf4fae36aae6b449
SHA1a32bcdda8f0f88264e0531955930ab73db1ea0d7
SHA256e26a67916fc5fddb0dd8353dce2c20aa419f258a31d942079bb37c9a3440c54a
SHA512305698df5ea6f500b6f12b4fd0962feb7a044a0543d21b7e9543e5d0357a3ce095a19a8ce34240fe9f8010bf4cafa987f1566e51de253ce5399e5d15c9ece25b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e285706175213d63b4def650f8266502
SHA115e9daca712864fddbcf08ac0fe64962d9ea71a8
SHA2562bfefde4830dd8f3645a91c3289caf76492528dafa7b8793be7de954bdd35562
SHA512d9ea6fbf538a4dfbcc2a5cf455722dcdbcfdc40690cf87ad2a3ce516df382287154f4a9e3019b88a811a1f399496c16a094780700316ee7c570e5b764a9d020b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d94cb4667854b3fa57ebc4562cb4bd80
SHA168f125716dc4a4757271c2715a07b2b909613ba5
SHA25633dbe1f288a07b36696528efc8fb2f8193f92b74a5588dc5bb8833bf2dfed4e7
SHA512972907e49565bb81dafb6d9cd719cb566ebd4ac8c66424c2355bcf27983054fd68bbcbb4c5a5fd1ec886a595d746e2978265391cb9504d1278bb3cb94bf4ee1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e59d9cf56ebc07fb9622605cf3b0104
SHA114d0620ae2298da05124968245e807b6c26041b4
SHA256602d3ceaab79e0aa79fe9a4d1bf9591563a43be02773d69e532478b7fd193411
SHA512f2df5e3a89e58d70b4f6246eb2c5e80cbccf6a44b09c6abe72822b732470c0336c74c4ac5fcbb74f0131c1db42cce26f2ba93b9b929e2cf94bbefc29bc08d480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2d13c0eb2855aafd0737cf9fca762ea
SHA1bc5624de2841dd566f0525b366c12e69bd218272
SHA2562ea3bfdb9a3358384e811fb23e325b298dda700709cde2358a7dcfcc5f0471fe
SHA5126bd2d9ac61609abcbb52c17f168af99138d0567044a83c52334883078c553f18f89cd9ee0f02bdc0d2ae02a35cdcb2ac78c52c12216c7628d3e79d58625b176d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552c363dea16646259c8be3d3fc10c2e5
SHA18c47c662987bbefd6e9654cf5ca7a3b11ed55bf9
SHA2566254aaadd8f555b700a04fd8c40d33bef0c5d279850232713758faf6fd00d777
SHA512f6765614be69b6e2c1df4de46407ae4899bfc82d73b80016a36604377df6dfbd2adfaa3ff9e8cd2165d2fdf1efb277a896b66b6666ef4704ead015be92e7d054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591fb46358d0589ed645aa4fa647ca0eb
SHA147bc2900ea293250444f317b6599744692de4387
SHA25606592bc83b602a21e66c48e5bfd4e85ad60cce3f82509f750fb5e77feff1587a
SHA512f75ba1eaf6caf0b8737ea43bc24bf73b9d79db2a77ef71751b818e98f7754ef2b45915a72aae5ea8b2618032331cf0dce3522cac1dee36a759dba7c5410d6dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5ce7835e6cd5bc4e951bdf03181cc38
SHA15559e1b4a1a0bc2135d5df3deb5982010379b7bd
SHA256efbd3aefedde1231fbb9b2cd3907f8a95735d483f0c26c64f5de29d353a9b505
SHA5129dd27de8ecf25098c6cb628052351fe8f246cda8fb896831800335a87b4a80f4cc504a836491cf1d874d31fd656bb1d6ad50fc034f632701556ad2d0e3072d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbfe37e566c46dd65d6abc47e3e055f7
SHA135ddb59cf3d4692793b52a273c730bb9ce5d9449
SHA2566d0824d2e75a9915b18f212e7a8d65a0daeeefc5ad624c540b00574e42b78d70
SHA51274cfe0c9d90b52d0d2a90802f14d741e2b1aeaf378ebfab310872a52aa38b2fe57a8d70baeaba90b10263120ce43d7f7881be10b16942068f458fae2963baed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576c075abe8b4b79dcfdbab61a28e8bf9
SHA1a8f0c50d1e00b141430b068361ac03e1e568dd02
SHA256389ea1dbf3cecca1cde00e17cb0fc1bb73935953cc7790289cd5a5d1da275e38
SHA5129791abcd4fd4adfe2aba697fd23c35988966bdc04f8b579d91c1295ec0348b3f009c7ca3429bd1896f2d4727712d104dbf1170a206757b1a336063a3d7a10e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e482da53e09ba3cc6d221e48a7dfdc4
SHA13d58723768457ba1904ddff14d8ea1b40ce5f902
SHA2564703a9e4c420030ea2559e66d22b875b24bc81e27d5ce19b7fc1825aa7ef67fa
SHA512870d185048a046bbc3bbfdd7600b5d180756b2ffe72b9b08c23ac56a3844c34d11e43705501e5c5464f022a0f0f5a4c3b07ca26c61ea37e9593698118ef6559d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d369f48a425abae6f6574a50ed276373
SHA1834d0c1f5585dbe768e1414a7285f8fcbd110b00
SHA2563f60f8b754b39a8db7db72534b1503c2125404f8c506b65feddf3e34a3462aa9
SHA512ac57d8decf58ce4d92591e671cf32b0e4d0bdb269968627f32ee343cc7c0a86e77b131e6b3e96973f23b3b865bb2f40034a4a376616785b34643aefac00a0f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5638d5c63c1f583ecacc027029dcde209
SHA1c0279f3aa3c7a092a53f3f6e1fd39e9dab54a284
SHA256a8035deda11647053f6a81649a955944878f48df5725e2c888a6aadadd5b3cba
SHA5122d413e18030b16a4a35b30033446ff1fca58370c0a8fc2d14e03ad07617a31c8cc6b6a8db7c50d078d23553c5377257fb5f3afdcde55f31e4881352b490b095b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53626795e86612b1019c60d039fd03662
SHA1dbe3b69a92c8c47d577b5e65e00aad67f0a54f0c
SHA2568ee358ecc5eeeadba0c5c741d004939424499b91a358e11109bbe59b0c7c50ed
SHA5126dddfae20a8bfc1b74e37ba57c9f59640db95359817405642af4a4d4d3518082b764fd25173eab8457bbb5096db20a5e046bd6a4487930e255588e31083a2f4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2281574622af6534aa9b4e229443a90
SHA1c26b90ec7f596fafbbf19befc654eae6b333b42b
SHA256e069ef2ff29a70128507b2dbe23fd086b90b433b6d227394302caf7519a0a96b
SHA512f139e6dc205846b94df3b700a444a5d07630b672e001f9996481c59e0894bf7373e60ba0e23f3d69f257ec5a3549d085704592706507a379059f2ef9ce693e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5125246247bd31e294a37b9d8d145b97c
SHA15a8bb4749228a7cce1535294f7fd2a33b2e1c605
SHA2565ce39229a9bc186cbef422119b427c4fc07d848450934f3ae1bcc98d3bebf076
SHA5121780be5f6857c7cb3d129663b10cd1ba511f82c429e6f7b87aea8d0324ff3a98e4b27db623e8ca6bdd9f12e6946a6645f7b523223d28bced8e49c8de986b803c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fab320874e8db2777000c11cf8390a41
SHA100e3142e71c03a57650f16d0b1942b121b21bf41
SHA25605a42b44b622726492fc9f9c1d6c392f01b87ac4eb746cb88aae0aa430f255f4
SHA512174023c83261d8708de6647f5ba333afee3dd001aceb9a953c78bc9b4d2204c8e8b74283601c50e6b9c6519c086da16d0269ebcfd907fd7804ee4bea6eb5b2c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5707ba9edb5431f2e67530b2bce3e0034
SHA12187fdf6ce0cb6e2afeaa3df0a61ac99081c94cb
SHA25601676af5b841d6278905e3e284c4e19bb367998bd9d2d248ad35d475db49ae93
SHA5129aaf07eba0a8b670ce66a2fbebca0029814b59572d64c59188ecb0d4ba3a4874f560fd96c05df36f11d560dd7bb562a38d0ecc280f4a25f8890a01c3c568a9c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3f4081ad142eb09f13f97f0575c1c9c
SHA17e3f12e134e315caa6b7b3feabc727ab6301f451
SHA2563fe479722265a50a4290aeb94a00ba502530edc3f09b817da1caeae8e6189d15
SHA512a378f8b785ea84f26b2ec72014bc7f397cdaf71f6a9b36c33a57854ffcc6209792d9e6d05f4f72a4ca0797869f877474edd42484b4680fc8cb2508a3ec3b15f6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b