Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
dcade8b0c0e0f10ad2cbd900915231a1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcade8b0c0e0f10ad2cbd900915231a1_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
dcade8b0c0e0f10ad2cbd900915231a1_JaffaCakes118.html
-
Size
110KB
-
MD5
dcade8b0c0e0f10ad2cbd900915231a1
-
SHA1
910686921a315dd750d26a3ce267e54b757510d6
-
SHA256
9531c8a3097f9d5002fd6cffc43b753840977922cc44f643687e23e1e6e2b19f
-
SHA512
5e698e6809e2501318a4a0c48f6a29227458a520a06c7caed6a79b445b2bdead5fcd7fbf6cac4ffaab0a436310498301967e802e990dc5414107f8221c879367
-
SSDEEP
768:S497dQHovsAFBAXKfQW0zTrw00GRTSyXaO2/DeVCclIG2uErCWW9EAhrX:S4t/BAXTG/Idn2uErYOYX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB183221-7129-11EF-A540-C28ADB222BBA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432322899" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000007d75da4c8cbea4624b8e83708c6aa81ad861d6b5b0cedadd90557a35f3a14caa000000000e8000000002000020000000ee6c6a35757086a85420c172806729800ec70a4898166f15eaf4edd3fa8421f420000000ff7c7bf5cd8e4284cf1e9a7631b957f620e76b55cb6b3042623b51651d3cf92840000000d954f63ea3f027179adc717ac32c2a27602d35033de977c7c2d9caf52b0180a8134973bed9da514e833af02544c6af47e1fdd561a37c9c3d8ed94d7f6e00c014 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f6b9bf3605db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1936 iexplore.exe 1936 iexplore.exe 784 IEXPLORE.EXE 784 IEXPLORE.EXE 784 IEXPLORE.EXE 784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 784 1936 iexplore.exe 30 PID 1936 wrote to memory of 784 1936 iexplore.exe 30 PID 1936 wrote to memory of 784 1936 iexplore.exe 30 PID 1936 wrote to memory of 784 1936 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dcade8b0c0e0f10ad2cbd900915231a1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be89d77dbf9b6db431d1ccc0ab9c7ced
SHA1ce5884d723868622dc7ef42f5c3dce2c0a36b6d7
SHA2561252a856526874feda40118425345e12a019c22ddfcfcc6978da7fbe6438e9b7
SHA51233e0f4b9b233783495ac3e3da049bf0e048c374166f79b3cd4a03039c5a0c8d60c0adbbf72d0c353b86324932e4a506f52bf6f21e7c459625272054f1007a95c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9c63858e728205a093396c18813efdc
SHA180a3a6251629f915c28365b35a8a363a1fb287e8
SHA256071cd05adc7efbd758bd24d47aa02d18246acff96c23a3d8b98c8d640af0f3fc
SHA5122d3252a6fa6c58326b4fa9b11897b729dc995170d9e8f9ab273f65d3fe75469e6bc3eaee078c39bc31055a459e041eb7508445858a9249df6740a833fb52e4fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5473fed56976f27890e0398d871131aab
SHA1560d1ec1dd4f591eeb84ccc6879a89c3ae779597
SHA256f814d761de37c88aa58f36007a5bc1f8c174f99dcd7ffe3cdb0398e5da3806e6
SHA512aaae7f45fa42028f51cf6379ed52145fd9585f15017d45d3f1d46f7df467451f699ff8c7b14ad6d1cabd6586af9217dac613080b5219687cab4f6aa06e75caf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57251fa6ef9cd09864ff7b5628529c247
SHA1c9fa54a5e6af1ec3e63d649f52d7f5fe61ef0e51
SHA2568ef61a4e6c276b7aab500b92cd2e168202c8ca559e28321be8782d65447504f8
SHA512e0738217b38a1c3e727de18e154e3b3372eae029c71edad6db1cb84b286da7bd62ace943a70bb70991a97b2eba0cc69b06c19a8912cd74f6855cb567b096d6e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3dc1cd1e53b020a98ff84dee4d8656b
SHA12a6c416fae3b53a6f637ccc0919d487652963a1c
SHA2569086c3914d38486c267329af3394ed82bb642aa9820fe52ae64459aea5c8b254
SHA5120fe15e04c4a4ed3722cd7c3350c55d7316b8eaa7b3c3a281e9af6410b51c9a0f8a5116ef415359e7739f0a0bf7105f95efacc1980ccffb701dfa7a1a6fc41b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca856afaaeacfe6a7b9c2da67978df00
SHA151e75fee9d373eef5059196d804163d9d3e193e8
SHA256b51eaef496ac8823aa47636de66d8aeed9a314422af96b2e39cbb35e3bdf63fe
SHA512f191a51c337e79e9f9f7c4953221df81dd1d53d9ca7b4d8f21d55bdf5ab7bec2182eb815e5514fd9ac32e0ab615e91e5e4eaa3c72fbe71eea9f60e60816cc550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588bc930bece67ff469f87e21e7ddb3a3
SHA140a23c67eb48b686deb2cb16c1b5eab77495bd57
SHA2564f01c4ec535c3af87d859e32530de8371f70409780b54cd8335fbbcc9d36db98
SHA51233470cb7d043e4b46f752d1eae4aa73c15267538ced6be95e23cba97b7afa23ea5bf63762583a3d8d976b0642622be0794660018a07ff1711ca783b583359974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e98be5cc5b2b4f625d39a48528773fe6
SHA1dea3d3116fb38346083c6ce669d341f83ac9b805
SHA256142c771cf07726eb802c7bda4d07d0800541a29be3c493a6892de8cf8b7f0f0b
SHA512c764df1d6f835e35387d16e46efc23b6e2e368133bfbe8458c7e93ca0b073d8f72ee01ece0065990554a7da0f47a5aaa66a47740e679a5329d3734294b30e665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c121709d0ecea686d7460c71883068d
SHA147a9ee08e5ab88730ee4226fdfaf66622e143dc2
SHA256544be9fc1d22bc18c11b952554f425296a279048297cb30fe518d6a1935683a7
SHA5128b43bb8c94546ba2e88ecfbda5cb910a1f066b9b2eadee7d07dc35fbad9a8b3bfdea46a2626ac23a5a7e3c53f1af3ba9e8d919b77dba4837c022c7e92f4d94ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5b38dd833e43a777b124327b9b88779
SHA15ab0cfcafcab683b4e9e61cc808b0fb9b4f2660d
SHA25601f52fbd94dc7a5f6c6b8649c81bccd894e974f18a74e0a4d3b4cdd6037b6002
SHA51234c7b42e45a92f364f4d2cc8861d6dba2b6b95e629f291ae7aea06094b967b0b715d5c7e5a599f43c27cc20d2f077a8d9e3a167d025661db76decebddc7de010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f04b625b61b5ba1b246df25d2f1379c
SHA1cbef569525ce70b07f473fd6a6afac072169225e
SHA2563b5aad21445eb0503750cbbab532d1f3f0cfcbf2fb115d03655b5f14bd52b500
SHA512b40ef74aedb137cfd5aca2b69c4a7fceb2d176bb8c3e4723e6c1f9ddf306364a7bc18cef501d02d0cc230e3354ae0b2b6a63250c7e8469ca623c59f022be9458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b02250d7a1e9a17a297fd6cd2860e8f
SHA176806b83ad837768d5d48864c623f2b3af0b46b6
SHA256b1fbe2298fb59c939a5ca69f0799abaa1a900dca1944c6ba15c24c5e83bfb143
SHA512a0b7ae420f4aee4a56e6147a5e54f5c7572254db6204aac662e138bec80fad1def71b750d128fdf431f2ce7a6c37e032166faa6fc13f0d929cee23384707483e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590e81f08e44efa639b2675bfff275644
SHA16e91b3ef933d6668f46ab60abca927a560d5ab1f
SHA2567073e10c5bd40e49d1a2b84e012f7d4da9821232516a7dba246bd430dc062608
SHA512aa483dee6389e79a4cf95ba806fceacdb22d7ca99042bed89516557fcd2642ccfd0578f92abf3673595a2fb83a7bde68293dcfef5a5762a742f67db9beb0f616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5390e3ff558fd048167513e45921cec6e
SHA177cf7c8173144159ddd8dbe196d4e6cf969c7500
SHA2566603864b08d27c2649918e39b461f8f2a5215bec4c6997ba01e497a3922bf54c
SHA5122f0cb3908c71ee975b41f5b0ef3ab6a3f82b5b76f4033c8f77b16e500db3c18f7f60217cef16b2d51c324d793fc8f1db0519501cd8baf3c2040c065b39dcb70a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506bd81af749a5161bdcf7c38a5cb83cb
SHA19ed3f7bce8f4ba613d07a8a1b10ff3dabb31a251
SHA256f6aa0c5a25614ac0e114b5d2ebd9b25d0b66373eba1cac9416930c40c28d6c13
SHA5124fe941642cf60e1a3691f8f27b4f0fed1e086692a6bc43dc92551d72a9a9c696cd26a47ffcfd11aa8ec7cbab812c9a529761cb2e9403497274088ea12a4da083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53107313525ce662327eb78027bfc1274
SHA1f0a4fb59e25b8eaffa00baf79cc5d0cf6ffaf415
SHA256ee1bb4d6efc1cfdac7fc6bc5455032facd05985c10240fcdbcc7d789e872188c
SHA512371f417d9f593ff840cc15abbe43f19949eb2e41763867b6a7b0967aaed9172dbb99a926b2a882a6c6bb439c2dae10f5af3b6f46f5517731f6857724fd149935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529148cb6d2f159b61b1a7727de1ad82b
SHA1e1d41d0d648b43c28371f45ba4862e76b236b0bc
SHA256f091b22e69b2f16190fb14f4cf4350b8d963d28b504a11ea11829fe2549310f0
SHA512ce8f67841cf2055b3b38c27ccaf0a9a10c7e4e2b2c6ff0758acc870c39a46ccb29cda9ef4abe7642cb2f7c24e51362a8ef647618a7fa5dca068da062be96e9a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4ad7bccd38af831555d1e97c9391c82
SHA16cbd79219c39bf196608719ec12a8bc729070c44
SHA2564be13871ddffb490f1a4408d5eff1271dbf51a287533f3813646fa798fb15f39
SHA5120f65685809aa2d237c34e86e43111c885265a463883d489980181df5bc5d757f98fedc7c68079fd3158481bf00788c0bcc7f08e964d57b636e4ed8c90eb8ffbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aa85f6f3d81718ce279943f770f3518
SHA1f46cb5455fee356ac78970ec62c629cd4162e9d4
SHA2569de762570825662e58aec5191e8fee956368ddc5abaa685c0456b638b7a5765f
SHA51244205cf731b60cfc6d6d15bc485f5760fb09c6a64219af3e8670619df5ea6423234a4bf1dd89a7a803d40bda559c591d441a2018c1c6f16245a0024c8f14c875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557cc162d8bba36b161e4116c8b1ce2b7
SHA189fb604e23e252b75f5009c2a09669cf3144b8cb
SHA256d923549cc882fc58278e49ff904ffdfaff7860df5e8d101eb2f609960820cef3
SHA5128754c038e526d6c674fa6d3941ea5dbe5f3213758385e21a1be18c09ab9f2c1c065c4a0216f203e3400ccafa561ea6af5997012f54a8c6e64a1bd9000d8a03d9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b