Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 07:34
Static task
static1
Behavioral task
behavioral1
Sample
77630de588b91ff6b68598ec2b4aa47c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
77630de588b91ff6b68598ec2b4aa47c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
77630de588b91ff6b68598ec2b4aa47c_JaffaCakes118.html
-
Size
8KB
-
MD5
77630de588b91ff6b68598ec2b4aa47c
-
SHA1
b5096d7e120a7cc22ebf507aab05940f2bbf65c9
-
SHA256
fb1c4cc37cc905a8fbf576058199c173a6561f78e7d178290bad748b9e2cae3d
-
SHA512
2c9dbfe123cf080029fce66acf4b22893661dec45c0c971cc2936648c570ef831b9b2fa4792897c3f7566289e8175cf8d08c5a4305657bf8db0f26d2970f142a
-
SSDEEP
96:uzVs+ux7TzLLY1k9o84d12ef7CSTUBzfIOFu89lyaIsjMiIhO5IUFIDiL1I1xDRS:csz7TzAYS/fOEtthbPPRb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c04c298850e2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428485683" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2AB2A41-4E43-11EF-A74E-76B5B9884319} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000c216c75a7dbbb581498d2468d060a1fab5c08d5cd6dfdcb32c3cbae869906ab9000000000e800000000200002000000035c0a410790944760d4fa7718f538cf04b9c13ffa242d878909bba66a39acd2e20000000fe9e43c7c0406fb81c93f371f3b70d0ac2190c7f1a240fabb66cb312eb1a785d4000000065ac1a1b6479fe63318c0170f88e9cf2e03976213c9f575a37ac699e2130b8be62b66b4505d4b71b3ab84354945121d330f33eab351b4f96fb236d49aa5c5e81 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2772 2432 iexplore.exe 29 PID 2432 wrote to memory of 2772 2432 iexplore.exe 29 PID 2432 wrote to memory of 2772 2432 iexplore.exe 29 PID 2432 wrote to memory of 2772 2432 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77630de588b91ff6b68598ec2b4aa47c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3cea373401ecbdaa654fee72ada4c38
SHA1347abf1ef393093224e692804804b46dbbea934f
SHA256a562bcb02132bc0c7de5115323f7ac9d387ccc12c84ed780e2e2671d18bdac81
SHA51251c26c2a60a103563ce6221fefe97454b1972c4a9b23d0ebfee7f8a224aa6fc54caab3454ef6111840b51db81e3a5d5caf27ca6a1d1a687e2cce0cc3bc74c1cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c928732cc6ff4a299720ae2327998c19
SHA1a1e04992917893c3661ea3a56b82d014c3a548f8
SHA2563f6d2353cb48b4fecbf6496b1908c735e0886933961aafaac4c7f62ed54ec3d0
SHA5124f6c647ad9b627f0294c8626fa1eace4664b90b6cff648c73212aaad6235818526d022583c7c92ee4628aa0ae74942a843895a9ce32d165de6f36717fe4985de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eb2edd820d1fe49fb80d61170996a92
SHA1b6809dbf387371ee8eb1ddd912a4f7c1266d683e
SHA256c98e1e4e202402e51c2a4d630601e7460ac3fb19f396dcb08dec3a5a9b863b6c
SHA5124153843f1b85d2a465a936075daf4fe39265c69b84479aaf24b5a926643d4c7a9a853ed1f8efd3506265527ea45030420a1f9221918425d594941e69d151b642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5ef45f6cdfc132f6bf3587f6425ada5
SHA153eb139f2d14444cc4177f8f5e6523ec776eae5d
SHA256c6a9dc06e004573c4f9a4ce82b3f8b3c263a231a8eb5ab3bb4fb79a9a063b8e5
SHA51201a09d0d13eba025b7c142d41f8030922f55d850fe7b17af3f2d3ae86a8c4a460da83e87cab89bf5fb83548ad2818c4fc5aa0e68c0f861d348d561e3dcd22f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdc90e3974b5f741ffe0bf6e37998937
SHA1e6adfee620fbb6d65218fbfde8e0974768cb6be5
SHA256aa4208decc03e2212e2735b73d300827b7729cccdc088d8fb839274a4fadacb6
SHA5126451fcc8ca55e209232a37c3ca3f301d16cd4ed879df3bd9378ed647acc9a26e94cacbe23db9670e950e96eadd94a2c34f017b7de2de6eee41b526bb3407bf89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eff801133b1773cb15032dfc37654c6
SHA15a6b492b77b192a15de7482bdd3e9e1d3372a6a6
SHA256f6323fef9a915c46af87db3ac75facb812692c5be587af863be968bcf4ed8b16
SHA512a62ff4a973c166090047ff9d897c2a7d0e26035a1d37281024020d548d3b738f7a2f713485ea3a0f059cd1d743eaff2dcedc389bc206347a176743c23552bb81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56169fece0a785eece2c5e9dad2e0f061
SHA1400c6fdbc49db41851c4efdb7f06068bafe8bfb1
SHA2562c692eb564471a4ff37be7f72621b2182d1ea6f2c75356b554a0afbf377f2015
SHA512204254cf7629e4c7ae309da9d1ba0a8847c89776e7b08055d8e08baed065c3edbf8602bc3e27145ddd5f8b19cd4e910d43ef21e4428c8d1131b3f288f3adc352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e31cf692853631deee27fb9473f7193
SHA1a5dc5340d98538e4011a7a08c1a8675785514074
SHA256c6ff38dde36ea27c8c7068dabd1bd1f21bb584cb12c18a6fcc84405bb193eb58
SHA512839ce122780022b99a66664eb5f62c8595b953430b8ae399caa798606b4790995d83d58f31589cf7926e4e1b63cee8edbceec03a2095e18faa4679509f424151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a51fd5afc67e7cc7d223d50b60ba6324
SHA1ab33de62a6764d5c4f03ffc206e1a9d14b5ed616
SHA2560a54b24264c03eacbc8bc4f9083ad326419ae932776fe30521bf0e13fc62834b
SHA51275d012f627297e3d19c2de32d378cf9066e193ca8c9fb033c7611f4394041baaf6a2ef6e48cdb878fdcaad6e519ab98eb3c045f7d47926acf5f6521411f56400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53332a5a9f548c18b78ecc3c21437c891
SHA1ac4873605368ff9f80287cc69a49988b8bc7ed3c
SHA256fca3c5ebf2de6afdb98d6788c2a098eb3d9a392218a2543f4cac0a07036a8796
SHA5124cea5cdc4efaff28a4ccb468e7d8ae12f56999181c6a9599f87cb612f2c927cf7cf217cd9ca04e22158d4e5262d7c733298ad28034ed5ff850cc2ff550642a65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51028eef0a33ca090ae76151df17607e4
SHA19faa89c1bc842647f07c73bc3b416c94528836ec
SHA256540cb93cb8c33a9f5e7cb121ccf6d05d859bc4b62d8c01ca2ba04006c8864566
SHA512fe164596f12495a732ec17a4062770627167e7ddff5b068911cdd96cf08f4646a7e0212fecf32c83a71cd8b24567ee38647a4b8f4c6309a10193ccd9aaea370d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0e4069ef4ff3fd710f90e29a1c8c12
SHA193517b1d552e7823291052b0c43623ccd9d79a7f
SHA2564df2dbcdcacc6c048b89cf0d6b6029656837de0f40ad7b800622e963d3d00ccf
SHA512f096cb1709b39c562e67fd7de585715af57c91cc7d71b9b0cd4939c6c1e30bf0f758ec0fd21e4e56dd24033b58e286998b4b4f53f706c726d1600f095f0da83b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d0b4c4512c51834ca10c2735a4e6894
SHA162991c734e7d1d0a0c53a28ce2f19812011da605
SHA25652e69a044b98c32c0416169b9c2ffaf12dffaaf6b24fff36c514a472c22bbe43
SHA51295e645ac0cdf6f5b65a4209ae274e6f8a989dcb4ad2d0e6ec805eef90f82efd678e0c0b3c45cfa39ec75dc13a2042370412466d4b7565c0cf859bbf83434afd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c90daad8ba26e5f50c9d28979eeaaff
SHA161d0f4b9ea2ea074776722af21c645b692d803c9
SHA256a156eab20e0b37cbdcbcb1ee07f6640852b959d87ede8b0e45b9664bfe427af7
SHA512b8173949aaa5a3b6f5acdd9036923353c76d209470763ffc7424c4fd5dafb98c6743210f7d84fbafd737eb24b93847d169cc182c785bc79dc81a333fd9d74e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52833f771cb696b81d1a1daabcc4b0d56
SHA1f7827a611def926daf25123b0b16a57ebea96f58
SHA256607b21698f37f26ee67e62c4d77916bd978fbb018f0ca6b14de307f0a82a8a03
SHA512eb2925d4162596d3a6c184df111c92c66bc73abbe3981da198ebc7aba0f28b2bfb74451965c8a53f940f3cb2c42592e7a919e55171cd022ee421ce821aee31aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3135d48c49ea568d297dc3bb8d6f257
SHA1339addd261641506833e854d979029b8aa6827ac
SHA2562f5beb5c218a3cf9f691caa5a578bbb966b1c970c4bbec2a8d6852f08688f986
SHA51298ff40404d8cd8fe63d953221c345a3378ccdfec313855e4e538cc68154979d21cfc147905e702374e9901542025ee164af2d264a9e748267be26bb21724bfd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1617a46adf3288e64d8ee9106b0e21c
SHA158d7077029148da0d294e8a1c23e84d2569ac266
SHA256fa2e6121a1962350f78abb60e3fd39abcfefa3ef145d7813c7bb357121336327
SHA512832045c5dae374a7539087f396094a18d35fe72baa6c39c9305d6ebddd4a83523bddffb2511845aab8449c45a05d1db1d2d70acd38d276ab36cd38ad3f4cfa3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528dab26255fce48ccf9bbe21ac636299
SHA124d2215fd60657b5f355eb37cc7c00326bbbabb6
SHA256586caf59dec5163f7dcfc89ff1992cfa6f163ca69f7238b29a9ed61f2df16c43
SHA5122a869f5c71d96c705d39f048ec3581dc61599f54cb04bdda095d8d71900bc14b49d80423ccdf85555d239a5c6beee304c5db5def36aa3fabbf5bb92254cd4d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b49c9187d9f329cbd906c362ee8cdf6
SHA1a2b659cae3230c91f22fda1faf82bebfe53b584d
SHA2562c053045a97b7554821292366379538f4968bf2d497d360760c24e5096000d35
SHA5126c3bc0fcf40912db48b4165150bba99f0c8802421ae583396d98dc434b184ee9165d0462670449c7bf378ea38c7535e70be11054a2d46604fb36bfa91f739dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5552376c6886ccf2e8e786eaeef645544
SHA1cef5df395bc016fe25fb88db6c9e1016cfe9c59a
SHA2566ce2bf3c6b333e3e2f7efdb5bdb355276ca3a1fe90c504bd56a82bdc1cca9b26
SHA512226f977accb2ff10f13129093ebe25a2a5cc3d9d83d1991d6224a550d319e5b67bd5b942021d0cfbbc7a20db1b67816e9fa6942ffc652d627507638325ab2e67
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b