Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 02:29
Static task
static1
Behavioral task
behavioral1
Sample
d0e3b389cc0d8b9a3cb25a312e59cd60_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0e3b389cc0d8b9a3cb25a312e59cd60_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0e3b389cc0d8b9a3cb25a312e59cd60_JaffaCakes118.html
-
Size
997B
-
MD5
d0e3b389cc0d8b9a3cb25a312e59cd60
-
SHA1
418141fcd9a2ba63471413826e3e6ce1739a3cbf
-
SHA256
52cacccd7b115a6884047c0ba67dd9ef5db3e66cffe6b1f99c76694888107c7a
-
SHA512
d9e0a25b5476be53bed6a57b7409508d281f95f70ad05d250f02fbc610fb0a91f234632f47ff6ead32afd4aaa24e3ce2f8aeff6dae63f8e19d7f982c8bcb1b59
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431838057" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0EB20B61-6CC1-11EF-9BF0-D60C98DC526F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000fabf3e0819313377808440031d2503838f5928fd5e1924f293e5ab1f15db28a8000000000e8000000002000020000000e14b9386436ee8f25efb158d1b92ed52ea826707e5c7867c38601fb750ae10e720000000b8feb62226e45ba14677fc758558b0fdc34468e6eee9c02e9190686620027f2840000000d32a7afb0e4584647ffac5487d9d2db10091f888bca01a974fda6bb9781054adc5c0f14d890d8d002630c51ecd9ba883bc4eadb4a265fd4f762643f866e2da74 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10bb32e3cd00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1672 iexplore.exe 1672 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2604 1672 iexplore.exe 28 PID 1672 wrote to memory of 2604 1672 iexplore.exe 28 PID 1672 wrote to memory of 2604 1672 iexplore.exe 28 PID 1672 wrote to memory of 2604 1672 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d0e3b389cc0d8b9a3cb25a312e59cd60_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579227de407df2a50f5eb5361a2056884
SHA1408f71f7fc453d3535bfe99c74ab524700d511e4
SHA2563c47460bf2b8da4bd2093d7e627d0dc4b07a3ad6037fb6e063696bbf71635ae2
SHA5126a6b98a0bda564c6bddad5a891bcbbff3cb6352d447ccea1e5d439aabcc08dbee8b8553c9eb82e58e9309f6ce89190f5bd20b76e59d2e3cced5b8ffc5f643015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5916482cc80f89fc4dff28fcdbbd2dcae
SHA18d76e7931ec6a65b757b3bf69f0fc0507f225112
SHA256c7033639b380ed7a08856bceca2784c21344d4c23abebb1b61c152541f381675
SHA512e44852016748db3bcb17d49a0b99fa2940b0c4951defb1c5073cb0122f2fc487b0efd1871d27cd7e3af341417c6c70d71033c6460e9f0217dadfcf9ba225fbc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598bdb13a8c99a9fbaf4f556a0070e95f
SHA13fcfa0c3f09e606da6e427875ef9dec0d0c47ad8
SHA256db87602099e4ca36a060dc8239bb19d19b84b46b0f721b51b2a20abaa4a19d11
SHA51225f69196bda3c287086c1bce13cce48e099a63fb4aa8409139bc03a0d514774d1b462a605fcd343f72474f54fddf2659073a6f1fc134161a4b05c15b4e0ad2ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b14a60a3b5f56eb39f1f305fe212cf85
SHA18aefb12b1e3a94612f78f6eb6b24d53029b515a2
SHA2561aea806dc89333f1cd1508a666e7e4468c0184ff73b2e3dd25b15483851f8cbc
SHA5128b0e5bcd3589209f43a04d813f6b0022ba012667445874c56a9fcf64c07fe2c95d1f380174fdb3092f293b0b987fa793b627557d6fbbcc2d3378734acb61f118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c76a8da11c9fda9a4f35cf9db577edab
SHA18e671730958c34e19b535ec6e9ff4cf893576e11
SHA25692d06c5805af2c0487a05fe959080d5add7763e3daba9702a030e43bd5a653b1
SHA51264a7e482aaaa62845f9f552f65074814ffc407649aebe238d0b03839469bbe1243b038506b771bc11667a3de89556551035b906287969ce81d033ecbf45436bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578f90080820aefa275cf925540c831a1
SHA182ca3c5cfdf4b5e98b28dd909d2a1e87950dc5d1
SHA2561afa725ee3232969ba3ddaa132ac075c5bdac5d2270993b1530d67d332b33255
SHA51255357f0a316fc242999cbcc0bbd4128875c3040d1d32194a20fcc4734fab58c556140be90c9e4cc316d5c219360f8b589994ce3a7cd6a4379c9c24fd28510000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ddeb752b99841f69b397c66b9826f76
SHA199e73b06fc66368c2cfce96f5992d437530392b5
SHA256cc6a1b2683bb814997eb49136427ccafa99fc018d0e391774c27569c755438e7
SHA512e0942893559ce6576fb76281cc3cceed724959ac98458e88ece34139e50a953e5a0f89e23761d2e37df8f53415184fa94d773e20d663246917ee314b26207bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db0861008b2b975c80f9fbe9fc677d1
SHA153df80ec111ab0a25254bd17fc46fe7f9e9fadd9
SHA256d5a8976d5513a07d634b1f2307345704ef4cd6eb7af6ad4cd0ef3ac4c489f8ae
SHA51270ef5f5c0176b99b25b9b1e1f26cefc8c8d3812e89b06a038a6ca49f72ac133368b3b4ea12cae715f6481145d3813fabb6c0dddba692bedc3c009a8c96198257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5983c5b392a66b8b639343715d57a0eb0
SHA11c89d5e27ffb0d73243eefac81191a698e147e62
SHA256ecad87f0e3b1fa20a2eef18ad1af6cba6b416bc166423975ba33eeec77bb6482
SHA5127d1c9dd3ceef2673e381241dcfec22602e56e48d6597b91fd962debedd316adb5efa3c0b3aa7ce7a37a5f4070521d131f35a41733acc6f497a7064e8998fdab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53091ce5d15c6faa02113eb9c23e3ea49
SHA1bb18c2b14cee3c027f873ae6b1ad233227ce305b
SHA256e20bd75a5a9cb3de1e49cd64adb36dfc9a042e04641622f4f38aecf35f08d7a9
SHA5128d346fd1a656ae6b2e7e5c63abc70ff010984a434428efc68b4e88559429502c6514ee7e36341e81fbe97c0df6f97d4b8c108416a385c0f8f72b991bbd3f583f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b71e63b816c959f6c9e78de291a30e28
SHA199241cf2847eb98d19a0a4426cd2ba3e638b0239
SHA2567050b3bb0ab6daa245c5c23d48d3515cd8bea0e5fb99597e1e11b48581680212
SHA51266c8a77cd2275a1c966b962f79025782c102960501454a7a6946853a26391f1f287d53edff6aa3b28f0c27ae687ac4ed5e83a62c2cd7dfeab2fcc3f05ea9851d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502e22bdef0c0bce79f15e3a1c42fbf0d
SHA145079a81ddd057e450745951a30843664b7d1502
SHA2567b3a39bae7c8dc9e42edc8a9252cb7dffb365e5a1b7e2bf0ae1dd5bcfa9e832c
SHA51216f0dcadf20088a4aae5d7adfbef7b973c1759c1d6a7bc02b73c831c3238f53191bdebed5c9eefe46d2567d2c8c59d18c06a8b32ddcbc5bf982e7bb02403bc0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba1c51edec1f035c400b02c225b98786
SHA17778a3c02f342df8040c189a6618373560dae4b6
SHA25686889e7dd56f90ce882bc3ac3f3b1fc61cfcbd447703dd4192b35e14184627ab
SHA512076396ee515a2686dc08d2500aacddc1f5acba5340f6e4f72229e3102e8bb83e1ec050fe2a7df1af8fe5cc7c4be0b62410644494286a6e2bd68313feba81b781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2a5420193dc2817bc2c6a140f5d1970
SHA1bd07955866805b051c002376cc59d6857030a360
SHA256859f4860778357723f08bd3cd6859d99e8ef8656ff4caf9a38ebe9dbd1cf21b6
SHA512d43c375825b3e34c48f0e644d940ff36952ced8e40bc2d783bc9d8531735d66588a584611e599fd6d2b2f6dbde0b64f5b9c21cd5670afbafdf44f4d562cd8c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbd480a0b09cf2189be47ae1f4a002c5
SHA16abca40b25f896a676512cfae82d59dec1415f1b
SHA25694db19f627ecf3acb50df03e2f4fcbb80f5e2608cb97119b8ea2046644565bdd
SHA512564ff56c73492325e5706d46fd42efd5cfdcabce38170a8504b10d2c7d147209997ef8b000983f50d8d11d6cbcf28099d023e68694254fdc8a5cf1cca88d0f02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df19b0d40e11469bedfc6fba17165a26
SHA18d25c1105d8e4a2723a6dc31fe704e39d4f74360
SHA256ba62c060c66e989ea9cb19aa9a303e9045e3f8a187bfc428718202c184002fdc
SHA51265f0fd55e02847894f08a30b1417827fcd5cf5c0a10760772e13c87b2b8f80029517624e3a2f638f6f419fc1a8de4aae4f13a427b296c20aa077ffb0a0882275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51404a06a0edec91a377a0dd6c64dc8ba
SHA1e1c491fbde3f196e3fbf29d300097e4c03766df2
SHA25624e94f1e4c1721ced362405b321a300a2e6daaa04fcae8aa6b58f631798c9a25
SHA51284a6e5206876dffc29a5a2b28539917c7dcfd30d01271026a79441df78dcfeb38cbf37627ac039a6aced014140a5f572b9176645d8b8631816620843dfbef8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5304d5ae0b06c8f6a525d75455a1a9df8
SHA1a7a19a24883570dbb7bf4a0501620aa6d7227589
SHA25682eff1ccb5c825b5c71b7f078f082d991f73c4bf35fea059a011119982749372
SHA5123dfd0c5094d39b3c744295c437bb7cc84813483fbf570c30b528adcd87dbf7ec0d5721de3e226632ea449aa8895360af16c3040a1af0e43969a589bacc321685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fb264df98dcda0b60bf87b92132f85d
SHA1d352910c466b7d5b48ae6b9129acedf609daffb6
SHA256f2a8d65c67bf14ae53efe07ebabfa3ab7d0c9c87df737363ab41e834161e7f2b
SHA5123d68165049197ff8d053e59e3c535350374648fe163d14c480045c9eb40295f52af5bf87c1d7592ae46f4694ff2720cfdaee93c16804cb633855893e5deb71f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560b6cf937f999dc5854d59269100bfec
SHA1246c827dda7a4e8ce738f6f69bfc4bdfc495bfa5
SHA2562ca0f0b36a07ce2984972ac1b201fee305c164f9e1d4395dc3bd909e0ff0b98e
SHA512a3ee80bb3941e3ad1991391484f20add1e68563b22334aed90623ec92d9d11dea2f89bc7b302a8b3c8d9e680d0f1b85cc7f112b4cc299475f0db195877f20b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518a089f1431f726a4aa2bb96529382dd
SHA1fc46d3502cfd5476a537b9894125bc675f711e0d
SHA25689ad68017e005bbe039fa0f9926fadb9c3866335482ad2019b58a3e771f8a35a
SHA512650f062cd84a14d1458b4eff421caadf4dc318cf3eced4b8731793fcf07cd2a26d027a9a5a61b439a142793d7e6ca2d5e058ab4e2861c17f9f2a3195ea4dadfd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b