Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
538fb41fb846901b514ce2f4323434e3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
538fb41fb846901b514ce2f4323434e3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
538fb41fb846901b514ce2f4323434e3_JaffaCakes118.html
-
Size
53KB
-
MD5
538fb41fb846901b514ce2f4323434e3
-
SHA1
31e417b5bee05930d3b58fe93e3342aeb9c56165
-
SHA256
b653b4bc998758f3cb0bb46a6781dbde2891deddaf823c07c031d532684cfca6
-
SHA512
b022c7c9a25319acaca1a32c668a47bd28c083d6936610c9aae571c9016e719c1c2ee68d10ef445e0619f59df646bda616c44380e1590c9ecd954f33c36349d8
-
SSDEEP
1536:CkgUiIakTqGivi+PyUQrunlY363Nj+q5VyvR0w2AzTICbbHoY/t9M/dNwIUEDmDq:CkgUiIakTqGivi+PyUQrunlY363Nj+ql
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 305c8cc6d220db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435358592" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000002530467a0db64270a4fafd85cab87c27f9c0d924d983262a267225d822667738000000000e8000000002000020000000908c1566ff2d61d8c25a70a5ee09b01ff4a993554a7668ef0ea56bf50313891220000000663f1bebd9cf531f624349e99442a2c5bfab04cf39daf6fb4bd753910876cb1f400000003ae40d45d3f1403dc14dffcbae90094e2d11cedb768c516b8333d9ba8233e3601569964990476c09058606dd27a7652c291f4b68ab212c15ae2b9a68e3215df7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F1210631-8CC5-11EF-972C-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2800 3028 iexplore.exe 30 PID 3028 wrote to memory of 2800 3028 iexplore.exe 30 PID 3028 wrote to memory of 2800 3028 iexplore.exe 30 PID 3028 wrote to memory of 2800 3028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\538fb41fb846901b514ce2f4323434e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51344c5e824436b74b6fa877476380fb8
SHA11d579db9694d6e6245a39d3b4a0f0770e96bc7c7
SHA2563a6ded2ab0b4402b5d5310cbac6742e024744acebe95d63f5731f60f7346ca2d
SHA512ea158a369e8ad32e06f532ebff2329d40b0c3836f7e6fc806f2c233f5c653c77a8693fb2a7baf83d34673f910b13722708734f26fe73fff12cce973628fd3477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589a4ff2332937cf5d5fa20b2d09dfd5f
SHA1357e86a5369a31bd16196769ec2a47b05d0bae2a
SHA256e642e0c3fbf39a6fcb6b2b70c542d4008c5d5820d74b4154d1fb2aa671d7b186
SHA5122a44e97d93bdff0719738cec07bff0a4e3e4411a5b7044ec9bf99ae09a8baa7ef9c23fb5f9bed60c2fbcb3036cb1c810ef8e376eb41904900ca9f6d583256090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd19d476c7ef7f4266486fa90ec72534
SHA15a5f79b80604d52805f275f553607bd1e6693450
SHA256e12d3b2042bcb52d79bba5a95cc41129198078c5869d89f4b3d08e5c93a0063a
SHA512e38ee0c3c89a2547271eca6cc2fcbe6b9504009a98133d113473d01e7967e6d584e4701448daf863679292f7e073dc361fa6e42d1fb842789e437a710dbbb59a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a770c26be5b211c73b9d5ed9d2015e8
SHA16110ca08e3bf52e3e38947fe1e458dab3313c36c
SHA256f4f234feacaa53d0de8dc3632be91ec396891b18aebe62597de287d66e917e9f
SHA512ac15ff3a7a399e1288c988334cc47071e81de0fc21d233ac582efaf0baf3ae77e999efa2daec7a4eaec1558ef6c8e59966ddc2ed020bc4cb6507ec91ba9ed0b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519d022ad8f0b5076530c17c9a2114b41
SHA155a53814fd68ece25016e0c5326a066f55f098a2
SHA25651ec0f425bbfd7f28955291e4df07495664f3c2a983a3c12060b87d976241948
SHA51209430782ad4d7761f28f5719bba811304eadbad79b77c9e9080e98f176229d7a477884480dede4d4ba4053c242804dc0a74352569fb7bbee62805d6d9376a5a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afb233dea41e67fae4bf0d9d27622859
SHA168e261d6e81a3777ca4d3ccdbec39efd44e5d906
SHA256fba28ece6778c800293b8bd1f7d1774dc8ccdb63e804eaa0b7860fd7ec5f11d0
SHA512fbbc203d58c0512a760ac1668c675cbc0b78fd0e0d7cd1b77dfdf61c665018c7baee20b4ba5c11662908c365f40637a2dc6a9fdb96f0aa039d9d6f0fd58921bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507721c7428044dff58154dcd5fe021b8
SHA17caab8b62d3e209bd3b14c7e2f57db14f756286f
SHA256dca1dfcba2438b310ed9ab600fcec00d4b9172e4c8f8f39bb6e26d4b66d1c93e
SHA512e6978ee45569b4cc0008d483b072fce472e3a890bf65f6aef2bc3770c714555445157dd366caf50b23b7a92492be9202b9d8f9832a35f68b806dde8d065041ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd5effaadec81d4afb3cda14bcfe4d3f
SHA1470634deb6846c122ee45971905eedaaf02eb60c
SHA2565811abf589360258a8270c8eb938133ffd75406337e5c8e8146fc1aac26d2c6c
SHA5122341535123fd9127abe6fd318ade8dff48505bda757b7e5aae3e9ec1c2e2b59196a3da837f604ab28c02f8156bb127a982069c0f5eb3d6e35b54f74d3a8142d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585f0c4a2d2ca030110b416b2a81dd084
SHA1d81e06e45eba0572e152c902317f1809435fe655
SHA256637adc2cad0dc79b31e2d5ab3d444bb1e426accc9f0c4aa929f643c1778b82ee
SHA5123f4ede8feeca4b2cac253fd8d675dd65d716eaff6f2e0b09e0472fe2e99f49cbf7cfdd809eae7b0b03840ee4fe4c587f3aa52197012501dd1be8ae727769ecd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc27c870144f158e90fc676fdaee6f00
SHA1b2d42163af0ccbdfdbcac33b0762ca1747050391
SHA25688c356c177754cb25cd0e7a92161abab8e35d2991e1b4a04ae796ad10fc4aeaa
SHA5126c2a6b52bf0efe6a7a21ab4bd72e91fa08a5cf54d67b2b75b671d4220ddbb7423780fcc48ee9a2bb86aa42e76e3d964c37b3f8b151dcc9d2cfb186758b7c67e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550e807cf35bc0e985b16b4922b1b2d61
SHA1546c02451b7b599b08b22c23ee648e4221f7ac0f
SHA256d810a74e4d27a2d78db9abd0f269ff169260f03a2ec19c19237868326709cacb
SHA5125a10af81d7402bf5ee8e95e063f4b9069b4b3f9f0a39039ffe915b0b011a326d5f5dca34808920a3a64a8122115fea2f191c288b7850301ddf2e67b5b5b4b694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc7492408478a3151d7d5cc76abd7d15
SHA14c9f67db706ec49b1e38b42f0e24224ef33dc6b9
SHA2566050ef2d9676971243fe956a2be09f0bf1933ea83b2d7331790d72b491518243
SHA512be4b61c1cba008efaa4997c859106af336b78584c74517e0c9b1e71d052a06e6893d59122aae610fdb6d446e7ff68138863b1a42883540920214fa4c599251c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d7da156fb4862d9b5e8d99becbd1b5f
SHA152aa7d9920ee452d2259fa01045e2697e2e97b83
SHA256049aa5a706c6e75d0d6221b42e1992c0a71103e9dbef8db486508bd7c7152140
SHA512d866e9a328fe359ff7a2b4dc75810cbc59f9d19fb5aa82fac0395e3381466e01d66e5700167ed243e80d9d65c217d8d48773c7ab75fb5ad8892221eaba33645f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5286365489ee7927f4e96dd9eeb1ade11
SHA183eccf5b1deadb55818398a7072663372a8baef4
SHA25651885ca2f0e7921a49ecb2aa6dca6515a38d4f7dc2054d71f5fd1d5dfc619d60
SHA51210fe81eb8c9973b56e20f16c1e092e0f0f3969759457214818c938772442490648e23964f1b142e628aef7656c5b32668a431612709ecaecde4463af18a70a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f07bffd17106c01f77f16be79901d8
SHA175736769a17331ff0ea153d8233f980ac8ae713e
SHA2563fd7f12149f68c671b74d0910a36558a1bdfece5c8a9556526f99c8d6d9e5ce1
SHA512ced5c39acd6096f8510d04ed8bc16fd5231c41e176649a1b816b05696a49c73d9465df240bebb893233a5941ce99c408a29576bb81761f92ab4a21c6204b2783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51814dc223c6351604ba79ca4c6ebf793
SHA192566839c5fcd168cacb20ba5f79dd1f11dbcd91
SHA2569ffad536693f5eabf4de7731b407f69f73c0751ccd080f4d43be74552d78e988
SHA512198bebf47dc33a1691299b0dba078d1be5f2565675053be0ad0c8ec90a55ec057fbfabc5144169de4ce336f49531672b1ac59e58cc08ea2f00115905bb9fa098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59039d583a6f79afb7e0b1d33f979180e
SHA1e08505be36d3801558a790a3f86b5d325cfc4f54
SHA256187ce2bc398c1d26ae836da1099b2dd6c1f5900d2b3abfc8a0c72db6ea821e41
SHA51271b306a899ec9d0c545641a1dc4f5ef92f3ab79213775c0d80e7813572e502d85d5f90389bad6cd21ff6f16c678297c4c74af91d3e8d49ef25e7a50024a57867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db7eceb2408da3d3afbe1d01eea11e42
SHA13694b9fd4becec83678e47afc9ee383062998af7
SHA2564720c0669ad95227cecbcfb9bda8eba173e73d13328c5bc7a49e2dc42fcb4d6a
SHA51244913d31eac026a3c66b8357a39ff8c4553aa0656748c529778de93d3b99c7232bf2c8da9e8ab7fc204c95b4becde4ff12f99ca7ffeaf32fa6d67d75e8591f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7b8f67d3cf82297495098e4378acecd
SHA162f3f67d04a5b3a630586c6787f403944274af0c
SHA25694500fe17eb17bd205cd3de3ae3312b4d1b547c62a2b1a336f6f1ef196495cdf
SHA512ef77cfa3871296d6c38d2231963dbb53cabbb3cb9223f380eb1770c6c775485e7e6b9d2beec9b525ae6b4848126a8cab68d6afac599aa40caedc98ece3b06488
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b