Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
bea1a893149f2b22706a2eaf51c35321_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bea1a893149f2b22706a2eaf51c35321_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bea1a893149f2b22706a2eaf51c35321_JaffaCakes118.html
-
Size
53KB
-
MD5
bea1a893149f2b22706a2eaf51c35321
-
SHA1
88170068b63800fb85643b8b1a71d3a3ba97bb36
-
SHA256
46ba88e31aab5595cb72a046a00f177bf0c87098b32a32e0161e368a4b7a511c
-
SHA512
192ab4d8bbc07ed14361554142435d891a546e62e58b7cc45250340d876d360a26c16f06fe183a3fe67d781cfd591b3f0f334fe90f772be8cff5d1a7e0bdaabb
-
SSDEEP
1536:CkgUiIakTqGivi+PyUfrunlY/63Nj+q5VyvR0w2AzTICbbIos/t9M/dNwIUTDmD8:CkgUiIakTqGivi+PyUfrunlY/63Nj+qX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0f0d8b524f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000008b23c16d52f2c1b747bbf8e5c14ac50512d936df3bf3472baea1c792dda1cc35000000000e80000000020000200000006dca96c437d3b9572c35dc9068a818ba4babe38d6967aef1aa85721176fc0a75200000007c9af66079bc818d7c4b1304371b0e4f51c400e7d9fb3dba7ac756574c4f39a140000000b75e2310adce68b49d8ed13513b347a8513c2981a865d186734feb2fb3c60b190bfb53c2402c56363bdfbe71ead9d2564d2cef8960f37cb08597924b1435c6ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430665881" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE20A551-6217-11EF-80D8-CEBD2182E735} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2440 2288 iexplore.exe 30 PID 2288 wrote to memory of 2440 2288 iexplore.exe 30 PID 2288 wrote to memory of 2440 2288 iexplore.exe 30 PID 2288 wrote to memory of 2440 2288 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bea1a893149f2b22706a2eaf51c35321_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b678e4f0de6f7dd19e88b6597ae818
SHA15df03e70ed332adf5bb60120511d98f4f644d8bd
SHA256841dd9fdc46674d4be55cbcfa3ddb1ce971c1a51ef3f32ac0ca72b53fb912aae
SHA512ae712b6a8c994af40297b132112952f06854b1c98e608027bf7d7421c14dd5dab83448dd592ab3b0fc65f5ede680e71ad651522ef30d0258de5b769c0c708d4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fb6e8a261b8988eb659b9c684f29081
SHA1c02faef6683210b8c860d4154f274eea10b4ff65
SHA256c92967797ce3303ca657968f75090277747b3e72f0fe95b29a4ab7c91fe0e8f9
SHA512afac5e945562c07d9513b21d386956f723c4d4fbf48303d724f7cc98771bce9a913e97118788a5ae363420424f1a93a87c14df20f9386bdc2f4429e3c14ecf0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b735937805b0cbce7a7bf42e78a2454
SHA16aa95cf6895c4bb8832a96c76ca4f0bd7466270d
SHA2562271722d13cff2c5cbe8ee8af64bd8c013058b3475c8965e17b2a42cfefefd1a
SHA51263b9de458f4cbdeda512797116c5e06b64fadc1329bd3451972c0e7d7d116b9232bdad507e560b375cdc72d5f5aa41591fcec18f9a47c1f42628491ea1531dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f6dba2c4e6b832ad8feb17831d8286a
SHA16de3e15a65f6612d23f4467163a3c46db7461ccf
SHA256c2d3cde343ef60c72c6a9bfc587b159237cb52722ba0dbdd8b3bf7e47e3ebab8
SHA512450436944eed91a12c7f99c3df4566788dee20d71047fc33ccce56b76cbc6a40f55b5233638e704028de8f80c1273d6b1f7de4be36677e5ff2c18ab7819dce50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50960ee729628f5c24f388aa901d1be9c
SHA140d69d24b3a615985d642054692ca47d93a997f7
SHA256970b26ba6edacbe5d76d221628c6a729a636a189070f065b47b645115faf509c
SHA5123c87af9028039ec93fe7694d6065a4581593647fea3f48b40a06f5197e14c5b149615ed2d423d77af982a7c94dd4dd287582556568cd3fe770ddfe695672b521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bf85d5868dca0f8fefc3aae4467cb7a
SHA1e7fe8910d22a056781db71ddbbfc3d0c35b8f7a6
SHA25629d2cbc768363fdf192f8ecf988af81147d8295cb620091b40663180c1c7e2e4
SHA5124d1a12bc9bfa9d8895a9cdbcb7df29476f104c3e23ee21097b0efc78bb0b2adf5487eb367f5a56b2e3d348c20a38bf9477b829a7d0d3f5054d3c5bb4ef75da0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550b1a954ec199614ba2568936ec40fc9
SHA178878fd8f276dd9167c0afab136d981d3549dbd5
SHA256a3c35269815b90bbf033e3dfa3426034862bd188f9f1043475a68a888ec3b4ec
SHA5121963281a75a7ed90857eac03d252a72b029a80ec1129d5792e3abb63a9551e224d47a5a125c846c39b6b62ded840d8f58d934bf486b05b2d25c30974982acceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c085e3b7b3899223808964dbbded1857
SHA10b9fc617aea996603c268c3fd048ed19f5d85637
SHA256ba0995c3cc5b00f83fca17d20ddd1ed3675ac8f8df0e7864c0bb155d6a156953
SHA512dad70a770c6be5928f6dfdf1ab3b097652b96e288d7c9ab66d5ba94c5b02502225bab17504b483a3351de57730549eaed68996072c60d687fe2999638fda737e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5939acab83142548f787810ed903a16ff
SHA15c633b8a967faf1a1ae9fa2f713f376110381a99
SHA256f6b7f5de88354b58c87a335ad3ad3370dcb9647f2a122ceedafb4f245440dd0b
SHA512bcb2000cb8984e1184dec15e759993efc81a190b37540b9c3b1b123b2ef094870a80346051c98a19a1f1476f866f0c9b2990e14efd7796dfca72e84935137d7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1aefb9de30d301a38d08d9d5209f7a5
SHA1cf95f6865f4b46fe88312d54664fcce6ccdcaaf9
SHA256f78da78c26b539c7f222a0d822a37e8c92927a5b40f8d510bdc1e9e4fb953899
SHA5120725a540ea76a6fede32ea5d849d8053b9428c1112dcc2d48895e22f47744cf009b3485d90d5c14ddf4fedd70072cca2252d49e25f686dd3f0aa545f3dbeeb64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecb8a2a75c11d2427d24729ebafda69c
SHA15d5281be1ab4b547fd5e4b616dadf741abc346a6
SHA256c56dc223ee1b248fce9af436129162d401457efcdd78f5ad1b678dafcdb97391
SHA51285fdf6269eec5e0bb1572da541d6a1dbc2dcaa18cc0b8c2673f9ac814e01c7b41821f9c7dc03ad2ba932f85dd42a0d06fa242df95d6ad7e8c1654a023572bfce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4f630cb40855fab3914a7c3c1c0242d
SHA1fbfc9286c7a9f923b2d6cd90d1cf1d7d3c0d5730
SHA256ba0c48d2aa2878de900e7460154fcc60182f47071c2809ba0a3a485efc43facf
SHA512f0527b1fddc90d0e817e5c702788011db8645c4cf31ef71e333b51db4f57f742e2943481e3dceabca9e819190f26bde1330e7454d08391e52cae0dd00783e556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df2a72251a0c8a0761f6d50673de7d75
SHA1476be98adbd8a2983b140157220c31a6aea232a4
SHA256fb62f64cb9c3d9fc086b9cffc355b718b87803216c318236e3200ce3f119b64d
SHA51298d66ea81600403c3cee139283c24870caa0b88640ae321f8036996c89763cb1767d5bba96fec2e58ec7280aa4e467c645c33ab6f46ac8b1faf6e7607afa3342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5043b88e4c3d3f54284f532a1f6f249e8
SHA1b15d7def046bf9bdf91e9f90b0bf7ccfe76b18b4
SHA25690ab98cf834a96ccf3fb8c8fcfb3a084d13c261d8f32fdbc4a96217c97be39ec
SHA5124bcfd14f36854526fbf57e43203f7badd0fb3d3ae0bd0fa573e4548dd0b9c45ce9a6c44ae90c5bb7c61d66a034ddd185f37638d802c0cfec400f2476854166b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cca8e201c318bbdc248f45d79427e6ba
SHA132407749a1dd8c8f652bca509777a94d2c917faa
SHA25680621e9b5db796351a2e2716bd6de2ba3b2ba0d65d89a526c81a0feb5dc7952c
SHA5126d510deccc58567c26f18b0fd8c2e4983c23b6bdf8ce3ef2f374cdd3248f16badc480a7f06a0f62fa1e7d39550ec8a5a8ace72b2147c0043b52d69e70b130a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51961d5ff687a122b6eef157431aa7db0
SHA12f55f540b6668a999d3940bac034ba3c00e26732
SHA2560028d538280f4836b9ff1ae9b1675189e6e3a1c049f2c124c5904ff1997f29b6
SHA5123d52ff93f6a17543f201756859fcb601bac47124da0a1b0d9168fc85b656bf080b87903012c024b0aad99c40d5d3dbf2eae485ae365c4382bb30293cd37e783a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b160c41669481e994dcbf2ed8d5d109f
SHA1e1a24c7c595e972e9dfeb4d976f031cb7ea2dbc2
SHA2569282be45ebe35ee6f1b479649f8725ca7cc6698a57c93b273cf3b83779459337
SHA5124f2aa70a0005a2af0f1809fedafd3743063f54c4c58eec4adbda1f9d34387d060994c265c2e4d7ad5e1410d0b919b2ad6faa6b8075e23258d15b28c2143863d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ab4bd51cd4d17a7346d0a071d1ca02c
SHA12dcb79c4826844f24bbc119827414d2951bcfc25
SHA256326a1c8d64eb92054775ee53c42ba9742e22795aa472ed7941bb841b9beefe78
SHA512ee78336ad5eb46cfff011d18a89ee8644ce3a8f4832fdb6fef5b3d250b22e91df6869763c3f81370958c916106527c8cca7442624828cc3d13645cb37efea6f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aeccf2611a3286164d984e7f8d02526
SHA1f334e0face76d5d86a7a0bfcb5a6e5ec7b9645da
SHA25642da7b3cc30c4ec8ae61cf89a392cf06405ef3470910451dd76af7691c318565
SHA512c3d8078cffbbd196bf1db192984519b541ee0a1edf5183c67b9ee1f73855349f585f896823dee651148387bef0dea1cff011e7f0bd7e5314f17c621745eebc92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z7V06J7Q\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b