Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
cf3a6f8812bbd199e5d0501842d2ba50_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf3a6f8812bbd199e5d0501842d2ba50_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf3a6f8812bbd199e5d0501842d2ba50_JaffaCakes118.html
-
Size
6KB
-
MD5
cf3a6f8812bbd199e5d0501842d2ba50
-
SHA1
7496d27ce425186e4a21466622ad727494d01697
-
SHA256
ca442f8d8473b659cdb02c28bc0381f77980ad6e36d1e22148178600f766841b
-
SHA512
7acd78e449413f19a37fd8c77dbb0f8a201659656ecfe354f6e9878bd27f7f6b21946990f0c324b9bba8074e8ee8b581bfeb74578c4fe5b93b65c6d1a5efb796
-
SSDEEP
96:uzVs+ux77dLLY1k9o84d12ef7CSTUrp/6/NcEZ7ru7f:csz77dAYS/G4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C353B3F1-6C32-11EF-9A8E-4A174794FC88} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000a45ed971c978f1ab865f41009edd9a1202a99f2c7edb53a7ebb6a210ccd004e0000000000e80000000020000200000008db113202b3804a7049e86cfa3e00981ba395863134d36948de49faa4ab0c5bc20000000320143b268e056ffad1568bced5f1fdcf0607942427416d17ec8f2c12d711af9400000009d1fcca8a0cba096026e69109228587db8be88302e1e22136968a4c6be50b839143fa7d66252980bfa1333d9146e6cde64c6f58ab7bb939d04ca67105a6cc87e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431776943" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40b2efb03f00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2744 2212 iexplore.exe 30 PID 2212 wrote to memory of 2744 2212 iexplore.exe 30 PID 2212 wrote to memory of 2744 2212 iexplore.exe 30 PID 2212 wrote to memory of 2744 2212 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf3a6f8812bbd199e5d0501842d2ba50_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bfa039dc6a281acdcf796476f12d178
SHA1df108654e1c4e7cb4f5317d40ea39c477cb1d645
SHA25661c5d2cd2623070090743262daee8cfec5f23a5f8f579a2765f51f21ebdfd1d2
SHA51275c798e0b81e90aabfbb6395f7f6cefe429cd43812d8899e1e787a4e31a820a9f86163b744dcc54afe307b92e20391045bcc65321b217221a3f4e5842ab3624d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560c47c1828dce43215930732a6a2af07
SHA1f89ad270c4485c9ce8fa73fc8bbd8fa378c25ad3
SHA256f15ad45ccced5f9131f0e7998a8e621e6a91deb9e040e7daa44c2341e29bb249
SHA51290529b3a4d2c27c97d30aee25ed1706e28d78d188454417e729cde0678c9c0faf56064dc96297b0082616ab364ff296681b834322425c069ae3fb1434a4c91cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b2dbeb5ed82f423766002e56588a6f5
SHA1070b297575707462f2820b5e74ae33295aae6571
SHA25689c492f88b9002683eeda65aa157a088b4145322b2c141fc611bbb8b200c5526
SHA5129cfa0703a45f43096dbad8a90510b60e4fc430b6fe84a25f651b4d5088920cb49eea68a0fb72151a0f6ad4c14a5453757963a6b37019f0c8cba7fc16118d9141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6fbec05238171bd693c587bd68eedc8
SHA1f94d26eb62d773cbf9e58d9ed95c84d81df10f52
SHA25647beb69805290cc702636df9bcb492dfe41c2394aea9a7f319d35b25aab09dad
SHA5123707141f13f31750c93df83302b13994834edad2546a99b78b0037cb5790d3ce05922559bcc6ad2e3f6f4ca0c770aef18aa56d1901d83861e662a115b75da634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a21122f7c42e306f052540f7d0d5a76d
SHA1822baa890f5c0369a5be56164a163f27c5bb7835
SHA2562bd5236c2c293cbf29aea39cb61fe9e913ac5a097cc1fc97c8d4e271212e41eb
SHA5124475fc03224d87fd4d1ab9c88d6a5e50b75ef5e7ceed5e12635e8c583e2aa55a3e9c0f79c8ed9108dcd045d0d6590ee57d1695eb788003517eaf9f04be27c390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f09e70ea36e6990db6242904de293b21
SHA11dc1cb4a10fdc45c4b33614287eb9c81f1abd486
SHA2567e70f3bcb7ed8cb92d1dd8caa42110bc6e9aea74136687a0e3d7cec397f291bb
SHA51266206e135e27116a89a930b335af7e30c6a6da672fd05243f6f61757f9ae0085d7e44bf31f9d401af665bbceb9c9e563d1ae87f7d270482f515aa5bc5f737a67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c8e28443106b7cca7a6100931e9169a
SHA1fbdc332ffbcdab3c1c8735b4f134dc419a6a0ca5
SHA256453c0d0cda305be9cd853561730575f8108c5c174d384d5f1046d2089a1134e5
SHA5126b3138bdbca60a71b4162f9fb7e9eec87e75561eb008032c3d636c92978a8914ceac3a1a663bc1fb29cbe812bc9855904506b87195417971292324ff785c5ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fadaa8d8aa867e0444d88cbd2da3f423
SHA15b1e27791916e781d31f7cdb698e3d6ed1e93a4e
SHA256749122ca47dcfcc758700f72dfb0d621ef6bf57f1356c85b5bac153ce57768a5
SHA51254947e5cfbcf4bfc90827d132a52b6cf1e47a4112c8cf91e2e11e7cd93ca241fedc3918445c911a78ffb61d49087271f9a0f20c56f1982193745cb94cb45c704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2ecc24a26550c96517d3ab2d8fe9c6c
SHA17ce38bdeacab93aca9bef4a7847e99af3d31ba21
SHA256e9fd7c8c6b81e4dba5c4ba6cdf6a5bc7f6848d043fe3460dad9b8c8aa0620d00
SHA5120909ae8e4485aeb99b9646f618f0074e0e3e216b8c18d0fdf627ca2c4cee3c94df51ba6d80a78c4f572c1b49526d6f42c12137c340078aed97a70d03262fef7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b31deace463c3389dea0ed0a19a3b18e
SHA1848cd2163b82a8dea1ed9364df8203d9ac6779ea
SHA2561517c1b73643ba3a6c804cd5f598e1a2a5bfc34b73b5f2297ea9afb3f979e467
SHA5121f5dd4a5585dfc792ac7faff61086024869d69f555986c82aeb808885741e332c3d3ecf382225feb117759d18825e29b08ace7aefd628dbb8fba5f6e975a3159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae04e728d6e149e96217307551e9c5c9
SHA13a49e5120f540c88f426ad37d6a97beadc163eb7
SHA25661249a3246bd9746edca32861ee3a53e4c807920ac0bcfb5da1508a02c8015e0
SHA512ba21ac442a0d81fa155e11b84732fee2cd0ccc38a585601292bd194125c98bbceba52899859e2a4de119242efe8c0f1e0fca48a9dd388132d9c4a77f6fd2c040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4caf72c2255d8ba9c3f13c7ca345288
SHA18b2fe93f0214134adbd112a90316c9f764f7a0f7
SHA2564043221513118143ad6ac7ddf5747e02c46ea2dc1663ae7df238dc68ab3048a1
SHA512168e67f78061fb2d18af928674922b571fe2fa9f92dc7e0904abc7281f28dc464e339bef0544e3c45d4ddd55df89b1f0dbf2d3df401e513ca8942c7d35c2bb38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e138019e9b8cf4e666deb25862bb6ebd
SHA156b581a29bed8f5f56e1bb2a83c7605e8818c9f1
SHA2561440c8e03cfd23ba1c22101e1bbb289fce15eb33ab540ad7e8506ca9d158a0e5
SHA512aed9cef092e1372fdd672fb5649ac7c3f6c27300c9b5f31345a6e6c30229b36f09c2d95f560220093b8d3506758d2ef5c520de6ab2dcbf78a3fa9778f6a6bb2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c6803bd0c3a934f2a20cb5fa5adab40
SHA11d855789a21c01d709ebb2a0fa31378c0921784f
SHA2567d3177f4048502543c1c1805eb76504315aa94a4cad451b9e0643607e57a8c95
SHA512533adf1c94792155fe5f0e13d039f6b2a174f4bb9de304f48262fe9728b092cc13f61f73e48e07719a5f9c8df3a06e7fb667f77858093f94d4e5fba683129e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dfdc283afe682c186425b8e0051c3fe
SHA1aba263dcf3a6e4c3c57b445a315a9011b01949f0
SHA2569a04a5c93a9ca87ba8bf0596d269d5c41554e16abc1ab12a40513ddcbb9d0fa1
SHA512b0d7ebcecc0eb3f1950636609eef6b7d930da315a0ef6dbb63ee464e6ae575c75a23a8ece92691365b5144aa1c462c5a22248ee95fd7af35f1a659a7681f3569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1531f0aeb3687157fb23baf59f7ef23
SHA1e0120da3429533d26b9bdbcbecc082569a4a4cb2
SHA25641b5af36b1e434dd8062da644404f2f259caa9545fe0acbe22423dd99f1558a1
SHA512c702a8d8ceb205f4755aa7ed9eead57d2453649dfb8bfbb25ad171efe9ac373f1b6f8116d1e6e9a641d06535e7e3e62d7df216e46703d6ab635122ca47efb52c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50983b0d603f6b497aa40fbc407d915c5
SHA157a0d25ca2114a4a65e563e8874e2a5c7d210502
SHA2566bfdb65f1bab9634566ebd96042689db529b300a873fa3d0437abda48bf2da7f
SHA512167b00262d7fef7d928d63563b22f1bc270e2b5e524fb90fd3119e17497ceae15b1645d251952fb01b274bbe568a761cec0ed1c4a3f8be63650197083034cbca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54df1aa11a22c35b348b79cef8d46cf2c
SHA1a72530eb0e6d0ebf705fa1c3ecd65d337dc135ce
SHA25641524a45102f722a6d2fa8db2c2ff243b5f72521f1c614b37d112c60cba14cf2
SHA5125fc38a178eaaf6b317eca4f60cdf09384931bfe7601b83a74d1a526f20b82852196a1e993dba4dd4e0928e8b06e98bfccae675f5d8da841fe02e7c6d9b32ba64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578618a54dcb859b9a5e5620e3f113dbe
SHA1924c2f95728296747ea955309852a43e2eeca9ce
SHA25687fa67285f95fde7a305e4db0d8a7740d0f9f7c2a57e1ed73b7fbf0679648d94
SHA5124f04e1c05cfc01920831e069bad42be88910c345f9d60a7fd18985b87ebfea4e9fbe4dbc81255c1c5d4f73a12f3ad11f61238066f73b1ba988dfd963310da920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c9c2331f541a26386a441d3fac4e3fa
SHA101f94de5206b7a2d508dfa9bdb53c6bb632db50e
SHA2569c80373793cdd2f9228c6f88bfd69bff36730d94782557ea476cb31d7ce18951
SHA5125afe5f5f8ae4670652340d3392fe854259e58cecbf26f7683f5541649c4bff533b617d64cd32e570893b01e86ca695a1691478bb09df8171ec85322c462eabeb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b