Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
bd46a76bd2d1cd53d134989a1814001f_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bd46a76bd2d1cd53d134989a1814001f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bd46a76bd2d1cd53d134989a1814001f_JaffaCakes118.html
-
Size
15KB
-
MD5
bd46a76bd2d1cd53d134989a1814001f
-
SHA1
d7baee9a160d3fcf1bf81ac6efe101382ad1e1a7
-
SHA256
d0bee457ac6112bedeb83395b80210bf6359215a84609eafcde4b12e84c0ad11
-
SHA512
5b8a512abafca439fd1e5894df860ae21e092771a41692348b5b5195e233a4cd78728f1c31024fd4f55ee85fc5b9d160f55b036e17da57841d61f6939d8e7c72
-
SSDEEP
384:/3saVBRdKVa/vIWs97K4XXz8zdrA+HXRS/:/3saVBRdKE/vaXz8zV3RM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430611510" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000001804b20778274e0f6e9fbac1aa83588e308ae534ab1800a3444373331392b649000000000e80000000020000200000006e81fb6d4707dfeb74051fee2f42e9348a21264adfce0cd5564201b1df63e1fd200000008f94a97971bb256c1761555310733c7bcd162d8e81e287331428efe99d288d1540000000aaf57753ca17284f8f09321dde77f04cfdc61e4013af20212918be29500f9107de15fa0c6b73e485ed8c9cba2f50dc04c312f33f1359f0a405340cd60e1757f1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{471F5121-6199-11EF-AD83-5E6560CBCC6E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06e4b1da6f5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1696 1688 iexplore.exe 30 PID 1688 wrote to memory of 1696 1688 iexplore.exe 30 PID 1688 wrote to memory of 1696 1688 iexplore.exe 30 PID 1688 wrote to memory of 1696 1688 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bd46a76bd2d1cd53d134989a1814001f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0125b3a97ec03dca69461adc1cb5cc1
SHA1ce4e2dc3d344434fe45d6a4c89f56eb1954d5656
SHA256724d3512817a3ff1ebd190c458b89eda5f60ab86ec8f5629747565a48a67d841
SHA5122ddf94812d5c320b98abcba4419baa954df2facd4342a41ebe3bee84cc92ccc20ff0f0cac92504e3cb01b5f848020889b95e57029fdc35663c5d8b4b47f1d110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537ce6c3af8fda0dec76d21b8328330ed
SHA145a72da64028ca8ade0a6f99e9455cd52f5ea634
SHA2569cbe2b51ff73ed27c25a719d4448422cb8559961ba185ec7de297ece7a24bd8b
SHA5127b48b7f011dc5c2ed5ac951d6ddb4f1df8126b0c7bbe8a6e459538bed4735865c08a2c4adce1203920f7f27e6c9c152ea5314727db99947fe94ab21b6f19a42f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e22aecb254b619910a2dd9172f004a20
SHA1254bfc821d1f5126fa1002490945b595d4b53334
SHA256a25ecce7659f53ef9d3dfe73b47a03eb36a5c64fc0917de04d366fc35ed37df0
SHA51240674842241632465dfa28b62d9d5d99151ea68d1b4c77bfbffbf276d899cf1c4abb8214dbfc12bdc91ae7b85eb95e697c15c02c501e058439390b716d19b97a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c1356d1a592d76355b63dfda0bc16b3
SHA1dc929c006bf22025e4e2b9b181744c70f19d5dd7
SHA25689fe28d240c8a11cceb71aab7e72a5d1237d9b198defce05d107d19eda0ae6ae
SHA512019f6da14100f5dbfd06199c64621772bb2b7c5840fc990548dce7fea8ee01c6879ae168e5220fa1cb53b007bda0402f6d7ddf01bbce20f50aa6fb214f17abe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da1ec72b4de4efee2accae80bb55a93a
SHA1c7d2614b9724b9eb7b3b67d0474e6031855f2713
SHA256f4e212b73e6cda702743bdc1ce01bcafbcccb8ad636c788e669c7e2da301eb49
SHA512dd322603616056d0b170383ddefc540ee5f6c03624f71ce396572f682d370e8ab670c3792d1b23c4c2b789e43e6104e9f6f531364c5855d4ab6696795a3e8dc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5627419d3df8ba61ea1d1edf7d9f8c61b
SHA1299b07e9a1518be7ab50c6ff319fd4f27c5cf89b
SHA256562435e11c82528292a68167c60f69b78a6e7965c46cb65f78a30cccfc706344
SHA5126e4ee565155001d63bfba13c98973abc9d46e1d8eadaaa8575665b9f0e5ef3de87f7dc0edf007b371d44ebfd246697b8a486d5bfac25d9850c013eb84ecd0fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a703805b966b53e5a888db26c66e5469
SHA1c757b801d7c52d82004e37fb4915b441d7abed67
SHA256e66af8d7e83d7c133d4777a00d165ff178ba95da9787efbcad825e9055145931
SHA5123192fd48f64fcc2886c0b8329dc25551a87a8aa59cad73c4c628fa0c0f6665d3aecceaf168c091485ae03fdf474a1f71643f2bef5c6018843ed9b04b08aacb48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565089e4bd9d0cfc58a5bd443a26b27dd
SHA1f4e05e8f7ebc370294a16e5f7af8b6adf0c5e9fe
SHA25672d5dbb0704bd3f27f3b568d7773566623e5ebb5017a60996076634e68c30600
SHA512e258fc4f4694b2e0e9ce00302cac6892042fad3544b0f209992535cdc4da81b26c4e9ae80494809da2161cea5e26b6ab8943f3e9e2cafb9456a5a7a0e16367de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0b29eceb19e4a7dfbcb38ddab45b4aa
SHA1ed557990c2797dfa7f2032b0d747a3b7c976c659
SHA256fc77ccd24286d1f1a5a326bcdc8e78c43f20e51d8c75b5de2823b53107a3760f
SHA5128bce8805980b2c3c76d46e02f8ae9dfee0a2d3ee762f41a70ade2ad09a83473157848bebd69919db8001e100841104c95dcafedf9288bcc063e5d02f41b5e9b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513b9d0c4cabddba5364f04124740be2f
SHA11c1c08bd0628ec08fb2560190509cf2aa943b8ce
SHA2564c82149916161b2cf198e48e20d6b6219c295bb18cf5092eb2e1bef231b97f8d
SHA51277e177eb173f6b072bdc04292f6998220a6034ec869ef81ba26d039f65de09879bc12ad9ba92712816a01e7b38259b95245616c18a21bd463ba90e0d396c7898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57714fed915f200747c4f65cff558c09a
SHA1c235f2aa83e1c65b4b943abeb172dbabdbbdcba1
SHA256fe726badc84de918e80603bf3eb0a030d9f732623859d02cb993c331466befff
SHA5124f8bb7c2f8d1b6e30f556cecba2962758d8a64c5dbb09fdf1e5dcd1ee51e5b0d0d5c6e1ab16956b671df3b3d92dec13fb261e8742e6c560126d95c12143d7f91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59701c75c47a514858c6b2e6454d884dd
SHA10534df6d4100132dd18d38012a1506f56e125288
SHA256b442dcb2dc8b577a48aacd0508975e2f42a87d1ef3cd0917ca4cc33c94bbc6d4
SHA512c76d2cc33ea6ff60afa6f1d3e60fa5e674dd73e6c10917a80d7c8dc38aa65e84c654964464f8960357bbf75393fd71aa8cdcaf521fde67c42df57d0e9bbee545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e050a37753a8e21903633b1d2818958a
SHA1c0697c883ee0e6d8905a4bad63734febefb7ecfd
SHA256f0dea2a5e285200251d18265aeedb67d0bdb1900a28238cdc398e57f996c7c9e
SHA512c8e03e4c9b2089eca81f5c3320bae9c2a4d47aa11c462762d50f1a108b684a94f25eef7f906a994cd75e4f9a133c90270c0f8569ba1544fae5f8208fa9575343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b162103e95c86e200ad14ebd2660fe1
SHA1ee606c7f3df4c88f836902c1614671383b550a81
SHA2566f5a4e5598c0ae04e0a43b8d27faab9db3a8ace12dcc54f99b7f27086fb63ad0
SHA512f5a7c63ee4edb096dea255a31cba4b86cacb296ef21ae8d1e497ecd60ffa0fb80635aebdfa350fa3354910365ed84c61fdb50c1e3ff4acdb58db27d977d0c357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e7cab1921b6bbc9aaea47c7509bdd4
SHA116bd0a1b0e541ef1836beaec32efa94a91230789
SHA256bac26bb4f4ffc4a1ccedc8c0e9ed41d9d7d0eac6c3724f4139a1080570ff1309
SHA512e9493d46b62c1fa05759508001d60a7f61fcdf559561807892ea0d35b4a2fdf1bc4c0aac04b94d55ce4c2d48b5d4b63178e208d7216f58f9b0fc1289f3563376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590e1bfcd149aeb10a8f256f836d75b2c
SHA1fe5fde973e53b496aa9838b9a26e418c6953e485
SHA256e64c5c57def22c1ba6305ef863716b45a9f0d48b92cbb889d6cf52003fc0f5a6
SHA512f04ecaf18ba7ed575dabb372bedf8c0e749d70ac6dce0297086f377da352740e82b491893f996665e2b334625e41138a68ba9569a48aca6c8b767c93e9d4f0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d10dd233d9c3e711d6e5cd1332c94d1b
SHA1a5f0fc01476f36834a21d02e82acaa147b539729
SHA2565b6d53acefe5d75918d8701d07557e95204e43b9bf8271dbb7af6ce5387755b9
SHA512c9b95d8cb8dc844ec31c027b0c9482eb744f6bc1fa29e3855e8f381c6c02a95421228b001b590614300e1c1da7eed0ecd95d014a440722bfe4680078fcb2ad08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca824581fbf65bd939541cf2df7920aa
SHA13082060ce7f2cda2dc8d25e26ccc525c02c7c62f
SHA25605ff45f5c2f1283a57c6125aa5d6308dec2d636e4b55b9b0278c67cd584f3667
SHA512860affd5d1e877413f111bdf4be84a4b4fcc09b51fc93c61820416e6df27d6d967cb5108ac7d3b0f1e0c89a96041e0ba6f1975f447f69d5658b6498d097774f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a1726199496e56e1cf4279e8cd3e462
SHA1f2e2a29c7dc358cf016994a162efbd6e5c2d1f89
SHA256db5c1aa1a4639b7df8b9f87549b82573f3780615e3ad532501144f1400e3d61a
SHA5129d41d6e9095ed98eab03bc8dd8498859b913cae2771e8c84822097e24e3a5c850fb7a90abde6b2bdc436721077590b77efca8dfb8e52d377002901bad64cda3a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b