Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
dd5922d5e692f4fe6151d0c9264c2f6e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd5922d5e692f4fe6151d0c9264c2f6e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd5922d5e692f4fe6151d0c9264c2f6e_JaffaCakes118.html
-
Size
94KB
-
MD5
dd5922d5e692f4fe6151d0c9264c2f6e
-
SHA1
50764a4544f21729070407b3473c7110cbb83628
-
SHA256
7130b7b9a81f5ef66b5ade5408c95fafc340ceee60b27d43890649186d6f5989
-
SHA512
c1b9df9d7d8f0836960d2528390b55706e12053f9e3c11a7c4ec609dad8276f8eb49ff8374ef2775dc1c8b41de3df25e5cda9924979cbe10c40e58f1a7df3ce7
-
SSDEEP
1536:WMLiN1rl48FLe2Otdn4fiq6/NRs7LR8Dyp8BZbHBdkrY8mgHC+qpEyW:WAiFwHBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000f7254b564872e621f7cd8f2ec9c63e4a990173b709aea2ee4ff3e048f4ad08ae000000000e8000000002000020000000629aa2634631be10a2488ebabfd7e86f27550e21f34647ef888090d05246271e2000000009fed5c215dc40435caae6c32ff1cf49c57ab6ad124098966ff5792718d58f06400000008ed7741327598709306e8729aa8c46380997b607569874f6fd02470107126d80e4af484f25c16bc081105ebd52cc57dbf6f5fa5c4f9916c97f43559b60babaa8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0050a58e7605db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7ECA9E1-7169-11EF-BD1D-D238DC34531D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432350302" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2884 iexplore.exe 2884 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2900 2884 iexplore.exe 30 PID 2884 wrote to memory of 2900 2884 iexplore.exe 30 PID 2884 wrote to memory of 2900 2884 iexplore.exe 30 PID 2884 wrote to memory of 2900 2884 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd5922d5e692f4fe6151d0c9264c2f6e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2884 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58be0d9f77a62fe53039bd0d1e4140ac0
SHA1825d7d170aa3ce4bda32b1a974d16cb4dd39e3e1
SHA256e94cc2709f2ff977d01b54b29aeb7d9f3462226db6697908bfce5c305a562d36
SHA5125adaf207868f7925ce625c854c17998e09c4f30439067673c7d1f88fd2cd70f897305453b9c82c88b2d5126ffa55248cbfd98afecc52256c3e953e446ed444a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bc89ded16c7695868b89066d98e94b8
SHA1d5ce4af2a10a4107920beb0563dae28efe429d62
SHA256f294a65ba7c20ec33c43403fe0dce75bd26ba562a73e1d20fd051b786f8cff62
SHA512422ffeff305817bf77ce354e17a7be49ffb57a4facfacfa26c16edfecb61ffc2dac8a1b41962b03915814b9bc35e233d81293fb90e75d4ce865422675be4af51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d342a02ebbea92158eb27c117d34465
SHA106fbf8aae83df992edfdb366104fb1fb335f214a
SHA2565adf9379b23c8922b6b9998baedbcaba8fa21f7051f38a02e47824aa1109e470
SHA512dac9c38bc882b97a381d3e5331db9433208b55b819adecd1377a0aef8dd80b93ccd64f59c8c90ef8ec1f871dd01bd76ff61dce68dbf482dccf5dc799a31945d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d80385f6dd5195bad10cb7f2b1fc28c4
SHA123f2c4a8bcb1a30805bf167047d1ccd7bf172e42
SHA256d40fd2c495087278aa7ac03fbc24d60caa652d0615b35d166ff2d3c09358329f
SHA512c67649f70081840dcb9fac527ec48a9ee5883a1f4ffa284c8959a83d954aa32564b3fe67d18a0ba45d47e826c39c7f0c21e8442e2a080d0adac36c2653d72868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f5070604fa64ec6ff67da4890a25bc
SHA181c28f413b59e9ebe6de62756ff1f6f4d9ea023f
SHA256f66e80f10570612152c15bfa88169fcffab274619efbe3dc1fff22f2ac70e428
SHA512db57f1db06c7e54f3075d9185ff2e7535e33afa7921c3ff6c77fadba69fea546a4be4c82323ee79d8d14048bcf61ebe3adc7b651c50d90928cc45758631bdd93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52826d1ced02ab95fb753d35d0ae1fbf8
SHA10dbe1180bf92e87a142ae00bea0cddc6d4cebaa7
SHA256bc428680d7b9eb151803ec5810460aedf8293d6993d9f42494af44118fb4de26
SHA5122f3fb52c7a89f25a1c2457cec51c4301aaf796f6cfabae34201deaff4d1825bf14c44dc16fc71e741006a3034ca813e10494571eeb988f719ba77e03fce9217c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c09e4c74d12301a0a7c055e9c4386fc
SHA1d2254094b227025f5a682047da6e127c3dba2b44
SHA2567592acbd44202e43b32028489a824c7cd3d0efde6173fdd072a901e874f50330
SHA5120023583b320fba3a41167d5f511f8211a7b64ea865081dd681f79c0bbd65b5a57e0482138a445eda97d3757c4c4e1f7371fc1b1697c84dc3115652edbb4da8cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1fde33aeaa83d3d2e267b8dff8ea3c9
SHA1652655b97ce4bc21642c64c3ee92236ec39de8ab
SHA25643da346520599fa7ae58641ba64aca41b9dedde2c1471f93a6a384ac9025217d
SHA512adc671f8d4c4ff313303b133fe8c5b3cc2119de6c2dcc1d5f4e8b7d4e85cd78894e15152b7113219f2638a0b2bd6b6c738c30f754cc1547243e0e7d396e0c7bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548d3d0dea184711b45710aa53732b24a
SHA17f728ffa615dbfabb9e4c1f50972850dc6858566
SHA2562e6652544e80a936aa03929457b0d8c9036ef31b52577ae352e70e20e3b16fd3
SHA5124aedff0336d1025457dd24d5715430a50d9880a4711252f8a0ae6dcbc57387908e6084f74ba27e6fa1ed461d33a744ffe50b7eefe9f8ce66089c6c00f65473f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8d4575f087288304ec3f60c5fc0b438
SHA1f8e4eef920d1db04acd30940cabdb59a86bf851d
SHA256ce5c842fa64783611d93fb242c090ac0ca7523f546b3c636987bab32ae022827
SHA51256e7bd678d63c1160613e61c71f0c910b08fedca5c74f70bcd6af1b22e2a9ba0bd0fede4e472cb997ad7a92447c23d30770b51fca752c0580c664f8c084c9032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550df38fb1340b24a24ac4eaa7c55f5b1
SHA1112458822e7920f7f88fa5dac1b419bd54981410
SHA2561f09f0a2be699e42f0508ddbe74dc0549b6fbea9597a6da8d6602f1140dd9b78
SHA5120e3f1786ee1ec300ff7488998b048a42ebe98658b4a2ef788398a0bd8058b75154a6d5fcda7688b5c0626c519952206c93ce05ad45827438b4e74cd5f991826f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2f3e85f2a94e3eb921650bb287f5289
SHA14ec1f089eb7805bce245d902ffcb8b24c2eaf010
SHA2565fb88365cd48dea2816205cf9756831dbe8ba0e141cd7867377d1a4548950818
SHA51240a48ec63cf401f57a0deceb4dd66c66387eab44dbaf27c8e44b41c71cc07898e2aefbf8f0164c7557c9fde237a9a248ec1a5a627a3c5032ee5cedcc636a1519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c590d6905c8dcda8bc1a8e7e5e9975d9
SHA1f5e2b74329792040bfabbaf26185cd204afea4b5
SHA256643cedecd6ec09da88b1ea2b54083f74b8ffa00fb7617f1f4fc0ffcc5f2e0ff4
SHA51277fa78e7de928d1eb4d88aebce45b052516945cb02f56b5e1ab1fffc90efe2888f202f3c84c7317cf1985d043afeab0c4ac23f23ee3821bab830d86884a44394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e0344c53d8d3473ced504c90597e863
SHA13d489eb0e681af25d348a04c1f280c1dbe809814
SHA256281182a43162d41de0c67bdee29c66a17a1e64bed55d03faea36b17892822b92
SHA5126ed174243bf15f796a3e025f22926bd62f37925b5f5b6219b25f2ee568e71fae9bbe9437ce671825344a55d43db5b74f109d7ac48349bfe4a39441423d0500ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a499c56875e2a1617708656968c069d2
SHA1d20fc84ea46d068b98485c411fa6a66238793554
SHA2568414b5d96176ea6b463b0e7984d49468f39f08787db20e650310ef8d6cebc6b6
SHA512895edc4a9fe80366d493a8aed7a1a176766c3c75a2b10de07ac13faad9827d7651df6cf83d403165ad857bde99d64d001e4b51e374b7ece67c2041c5eab6096d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b40cdf5c6e2daf177eebc9ac69ad8e20
SHA10185c02d2022717aa5d8028cad811202508f8494
SHA2564272b0cc9a3ad0cecb3660c9c224a09ebcf198bd7d79d5d82dea230c804274ee
SHA51238516176006afeb2c8753d2b31fdc128b552dcf74f583f8761f436af0616b74dfb7e40fd1edbaea04369c6339cae9d0487740e9108a5eed51c4e7fd2bbc71dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c0e827ed39e9f10e5da9bfde487a4b7
SHA1069e919d8fa48cd97b28ea5ba81bfb8cebc542f5
SHA256617bd2019892cbe8e52cfe5591177e8806b810fdf1e82f2a87bc153b5653e638
SHA5126f622efc46523589510d66698c2f7bb6a883ae946f492429fbb14adc8c0e9c87c08c3abc70a3adf732d2a0f845c97435956585bb92a7625668be124ee7714d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bcddb5546fab97a5e93a25294059f43
SHA11c417337cf4ef431fdecd637ebdb429aabae144b
SHA2567d3c76a7f93ad225099f9dcdddab0fa080c4ae95c06fd8b736c5fa25c9c265d3
SHA5125aa1dfee9350f6679a1416d97c7ae8739c08446e67308e3060a7053ae360512f8e54910d946ae848cd20ad69a35771a5f0ab912e4ea2c9135a1df7de11da7b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57675ee3e6e9bbc95604916e14c9bd097
SHA131d1ef7473014dc6f3904ff88e926c653709e2d1
SHA2560ca3e1047688927de61cc678faf43308e44db57c54e11e478602371e382ad8d7
SHA51287957f27e215b20fd215dd70edce8236f5a790eebb779a9dba474243a5b66084806f218870dc6fb22da47587df7c5c6502ccd213a09976add56d4a11b1a04adf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0E1IWGZ4\wpml-language-switcher[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b