Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
d734b83905e83ea3d9492ed33d6856e1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d734b83905e83ea3d9492ed33d6856e1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d734b83905e83ea3d9492ed33d6856e1_JaffaCakes118.html
-
Size
7KB
-
MD5
d734b83905e83ea3d9492ed33d6856e1
-
SHA1
17ebab234a1617688401891286c11e28f669782f
-
SHA256
1dd0f24ae28ef8199967e5f550e74b78c47d67f6de09383f90f415d0626dde29
-
SHA512
467e5bb8a9b9db41e6aba33fbb3274c6904d763745d5796ae29c53839e3e020fc472d07e29c35b5c924587dbfc42903675c31abcbacf662ae91cd797fa436077
-
SSDEEP
96:uzVs+ux7fYLLY1k9o84d12ef7CSTUezCca1sLiQcYR16cEZ7ru7f:csz7fYAYS/ogR4b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000006ef28dff5c4aea7daa5309c325c398324db6c7f07fdb8dbb77976fb55c2a06a4000000000e800000000200002000000026b02852da20de2a03bd6c637f1d8def517da6ce882a4fe0d9a7a404153a84a620000000a6e1b57a66cf083f8dd98ff6f0bc9b31211758648707823db5b07b6a588f9e5240000000e90929e7c2bb8f51f5d46a722c34a8855d49a083e1e60abc3c61ae15cd6fb7a0224598677120214f7acd03f5e91725cfb2e4c48e94174e373f473895437d2017 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1616D601-6EFC-11EF-8CD3-5EE01BAFE073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432083313" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a000d6f00803db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2092 2532 iexplore.exe 30 PID 2532 wrote to memory of 2092 2532 iexplore.exe 30 PID 2532 wrote to memory of 2092 2532 iexplore.exe 30 PID 2532 wrote to memory of 2092 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d734b83905e83ea3d9492ed33d6856e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4e42d5ae29b3659e104387c7ca511fe
SHA1ba704494665a66008b849ee183240835d50aaeaa
SHA256eda2fbd46db7c9c730595761fd1201fb0f725ea4616c9e4f35e63a7a2f42d53f
SHA5128bd58a260cc392854a10b98ec0d5978609f296ecb0f89ac8a4d0d2e93e932b70375eb5c5d0403b7ef8a087f9554da0fdf4dd71bcbea84c26c971feffed30ca8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbfe14a9eef347c3d17fc0da6818e414
SHA1c9b5c2cfec1f8adf915a8cb9854befa48de94ea8
SHA2569babc8754d1b73402c087ed4f3c84268c05ac5261e911fc0aa1db1cdbfc8a4e0
SHA5121b322d698a6d70548de3c91b2fa7e181e867d522283306f6452696ff8ba39711ed4b4349616cc2b527a6a61d68869bb9dcad585050665b96f5c396581c9f2fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8cbcf2ca9760eea4fb0028a5fff0b2e
SHA17cc485316a06cd6c587071d032ed26f93558abbf
SHA256fc2418a51ccf56b0bf347312ad7a26a02b78858f6cc5ba2f25bafd0a710ce3bc
SHA5127ef327ce60f5ec6e72542823ce373bd26713387efd99509bffebe0414d839fda9ee23260164c4891dfd1730ab2f9882af0b18d53f8a683beb1904b56fb0caa1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c094c380de1d2c897270e445dcbecb2
SHA117abec1a584ee95beb5d81a735dc3ee93a40d678
SHA2560ebe0879119623a95e9bbd99e20f538640a52c4d488c0228176d4d59aafdd759
SHA5127ca3b2abff35efb9e673ba67e85b6d60140ef181782157e31f91d8c38e877c2becd8d8ca2f9df05902af3c45c69a723570a7ecd054e50d46fc896bc344665a6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562878e84e756e0c82f9814996d6e1a4a
SHA11028fd29900b92a6dd9ac9fa439983ae057e9e20
SHA256925bd1c9e903030e2d199ee7a5c72b581560adf5b5da77214499c64d3ef3a285
SHA5126281402c86ebf3bbb554d90c213eace5b65b63b7a50d5cf08d0892741b371fa829458f482e75b0c7cad3d3d62c9bb737c2225693d01134e152c8081af52070c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5633d7f803fb91c91bc8524a1f2895e5c
SHA18a6af296d5f403664180aef6cc99c66982860085
SHA2569c57a82e4bb89d6bf4f830e85af093913009f5a5a86f972a778747befba6c7b3
SHA512437a573e131855b290984b0b2eca920b396c4023968e854130e0832ff8252d8a38b6f7912a48428cb01727e3e03ea7dac80835e35af1a9f982f36e2b3abf535b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514cfc5f5cd559fd42ad588cad9bf050a
SHA1f81b264e2749b3e2ef39501dc4c4f13d1dd5260a
SHA256ee424b84d7ffb3c81ef6f67e463d277a75187e8bbdea15383527df9b44a5e5fe
SHA51271680966d2a3f5ab1e1a180e6caa6a6f80ef99d106b5bff6402b43de90b0db3fc5740fd589e11ce752801dd93a001140bcaf153cf525f1e7f8188c6e8bddaa81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b7f2ad0e04e0be4782c120cb24c1d62
SHA190d8b4e7d32e096e587fc811c9e4a5aefea06d6a
SHA256663fe08076f63588cc076844f5e692a8a0986e84d9567f4aa5d002ba919dfa60
SHA512a3584674e11eaa434dcf695028060cd0e960a31162f95b6a7290e70dc93130c52661b7fa97ff6b1722b574e757c2ad0b7a88c2bf17818e3f7f05a61e0a0cd44d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567b5adf75481a9d7f489d62e8819bb11
SHA12f9fdd9656c145d1837ab6032e36b18eb12758f9
SHA256e7689e0492405f49cf35cd0020bf47a674f21b4b238c926ddcc05402129148a1
SHA512e91dd0327064e8600220d76596b76240b1ebd109f65d96495b8916a6a055e44e37c0c636cd4fb70226474277d00dd282b92f7acd25cd7791b3975702c55fd019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6fc3c8f686efaa1b2d42b7c7f1ce32b
SHA14dcbe96b9e8c7e06c38a198cb5b829aa4b2d3232
SHA256d43633ce3ecb9bc0c2af66879bda9a3c092ebc3283649616715ecdaf28154875
SHA5128427e9460439517a4e8fb0756143897f60fb6976e494c7e846fb1d70017a462cb7a64fa424848bd29677e025464faa5102594c6c92e9ec07700260b1d50f6786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590d9edc9da0b9bb46971f45ce80ea51a
SHA1deba0ba825c59ac7cbe74da04bebe7394fb2a2b8
SHA25674b6dd19026dd52b06c3bd666be1f7517c64652419919294dc24d4b55a66d322
SHA512e71f49d35a2456fde65b2d29cea48f2e8a25078aaf04db02ec58b19a98c257db16bbde4f408b7f4b4ec9c450a81a791b80dcf32aed73a35d9b4bf01939ab800e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536bf52ceb3d5e9c2ae5629a7b1e9bbb5
SHA1b3d493b24d8e812137b0682987129d512dfefbcd
SHA256101c97241f3f13156469f45a1492586cb8b1969ef7ceefee338a68f9907ea011
SHA5125a70b134413f187fee42771413e8f376aea09789391c3753b46080951015901c8944edd8c1e1513e8ec14069367340e5c5b0acaad371edddba531bd0895a5907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a0ae9f8e920c967c20154abe024da0e
SHA1a8d0b3672df65b47b9852c4260c0fdaa6598b0c5
SHA256592b6c98dcf77bd76cea704f6447164f78617a6f77b85a63538069fcdc553f7a
SHA5128cd1af93d229d9632075f5bb3d1c6c34e6cfd1aba4f1e70281716653c2302c36dd5e085b93d8265a91cd65edd50421e9283281bff5a6a1b2cc9edeb4af18bcb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560febd04e2c44bbdea6b3582cef774be
SHA1893c3049da6cb0ac600e4804e767dab04319f9f0
SHA256ddf3e0c44008410a2d5e9937d824af75816768ff635be54783d3eaf66dbc3ae3
SHA512613d2538a4cb49c7953d44c8d89bdd5f85e594163934c439437729541d160d67c2bfc7474ea45916dc1ae79051d04f3c1a1426d70d2b3e99199640863af14a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b129ee02a995e733b8801fb83669e8e
SHA104f2ca646d0d46ff241f207692f520dbaca58794
SHA2560b662bc6e288cc1a50feeb716f78a8116adfb5017c6e0f64e2cb7f1a0dd68f31
SHA512f64dc593f363f593f92f8255424714de07ed60cfa2984d80da9eb3215c595e3afb9aa3e1126607a23889fbe214f11151af5b8245f33d2c04a9d4179994e74982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6699765a5cb406dd45bfe2ccf81bb8d
SHA1dbef86dba2a357c8a07334099e4ab963a7d6bc7c
SHA2560fe0911758fa9023e0be9ee105858feb91983e36649b80c69a69d624dc5d4416
SHA5126a5db1e36595bf00568866310267ea79041eee75ac60cec2fbaf2500b204eb5c3b08a0212b03bcf6f3f65f67bc7459cd202ebd5b533bbeb0a53445a0bf995fc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c32c30717a207837f3ecf03773a755
SHA1b96e654bbffe30079e9314166fb1c2b1d76d6f34
SHA25665b6ed50b57907ac8c3d5d88e604ca4f0f062b78888d2fa399937ba454886268
SHA5127b1045a78d7bf59e5f23fea46dfd0eaeb4bbf3d550e999075f0652cc7859a0735d4e1fe049c625d591309830cab9c24035ee9b6a9bad506b6afc729d5a619122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ddf70c707eccb68cba0fa934a2b32fe
SHA13c713980b4fbafdfc0aac65ddb2179be1b9cc732
SHA2565c41b680603cb9766358647bacb4585e67a6c7d6cc060d42e1dd7b04e6267873
SHA5129cae0ce7404691ddf7910c627bf12ac9c8bc78297eb78f95581811b3479919692d808ce75d6fa16b5eec423d048bdfa7e620730961186bed20ce23f1f71b378b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eaea43c96e24252b0b8b22b8eaf5fcc
SHA160103730c3cf7c05c3231ce0b5b6ae50ea40f23b
SHA2560108c41d0ee3be521d33144d295df506c1a05e2dd5dfb11417044acfadd42e37
SHA5124200eda13f1f1ea3e0c39c17a21bd5cb585182c4b54ac4052ac577de2f5659577dbc3fed7557ede4fb9108e9b217ff137625a176c691bfce42fdd26a2c5c8008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b57d7f2a54e22d252aa2ae9ab35590c
SHA108ec48fc63edae58408fa99123cb0c3466e5f358
SHA256db285d0a5281cde306f36cb9c37133849db7a2a241f3c2db2060f5ba54a2f3fb
SHA512d7954d8d45833118bc985b8f6fb0e62aac8526bb20663bfcdf55b95758b9be0e8d4545e810639c4b85d4b7d08bdde7693228c56292801a59b9c77cf57157d8fd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b