Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
db2cdbe254800d3238255761513c2a85_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db2cdbe254800d3238255761513c2a85_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db2cdbe254800d3238255761513c2a85_JaffaCakes118.html
-
Size
69KB
-
MD5
db2cdbe254800d3238255761513c2a85
-
SHA1
1c49fab707d35f699d8e1e03ffb0661840c26248
-
SHA256
0f7538dc2ef3617c3c917e08f4cd35437c946b349ae07ad70610094e84e67744
-
SHA512
b8ba79b8ead8e6ad0e0dd5911759dce02bdbe84a0d0dbb27445b150520f400770252a3c148e6cf5feadd05be3e84e988480149351653b4f9df123eac01603e44
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sU6QTPVyoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:J3s7TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f6e5978a04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000a7f6afe84dcb60e3fd488a242c3ea1f6b274406a801208e6a1459431b3a11277000000000e800000000200002000000029d98aa959aa16e73a46cf08478dccf815f55546b878b6c4f02f461e3fa8339f20000000565d751bce2bb40756b0a39d173b58207141d09487e9dcfe0168d098145734cf40000000d1e2d4379f792fdfb6bfac1546c1ba7c6dc6e591d925c6d9cf3219f990fdee0bf943f0b565f4c85bdf6e27cf1c66ccc0e0ac8acab70c3f24229768d63326f7b3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432248956" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C19B6401-707D-11EF-B439-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 828 IEXPLORE.EXE 828 IEXPLORE.EXE 828 IEXPLORE.EXE 828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 828 1740 iexplore.exe 30 PID 1740 wrote to memory of 828 1740 iexplore.exe 30 PID 1740 wrote to memory of 828 1740 iexplore.exe 30 PID 1740 wrote to memory of 828 1740 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db2cdbe254800d3238255761513c2a85_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be92b1f3b708f73b6bb0033ca0e433c2
SHA1ff69e1f3ab0823b31e326506399b74404193ccbe
SHA256b719a4cbf4e6a1dc2460c45255f97f205ffb01c488dbb2ac15ac07b867d0b128
SHA512e7530e1efc18245dde2691b4d46f4b659f60f6d9c47ef911e12b21c5b0bbe7b320c15237e531a81644299d87afa417d7065369a174582e53e122325628c747dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547b3dd7debe350ff04c92b390ce785a5
SHA1e2d0721652c01ecbffbd4afde567afac6b60ed29
SHA256d8f7a12c904bd02b00ac592ae20de1ccce6fdaba1649f5e9af6cd374b1ea206f
SHA512bf378caf878d6e04cfaaa8a1a41ac1f7868fef9c9f9327bf3810efeb2fda448fddf48521a260c1f725de390d127cb88dedc127a987a2af5a706163d3e0b63ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56efce133d393887b80a68339d8b6857a
SHA163b09a96f77e1a7c729830bdd81b83b698939111
SHA256483f3f5513b5ceb57aeaffd674de8ec273c3a62f2fd02d5e851a48816db25238
SHA5128f38e011ae858c56870c30c734c7e2efa9eb49f2f2dbd3a2e6ca0342c1c0913fcb7e4aab333cbc58a37551ca18de5b1d1838370e1b70a90f1faacf62588565f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4319bf4cb42388a8aad3616735eaa17
SHA1d8482176dc47ddc0b99b8ce3fac5a303fd55c34d
SHA256a9c724ea6cbf7ee74b38fbb700861696e721e8fc25f24edbe5caf49870281c14
SHA5129b7c1c5c518e07ea5c468cd7454f21e802e0d605c7dbaeb5de2166ce4ea2a66e5a0d5b0e72d9c24cd8201c47796062ae9515b4133f1ac3c452e5a46963bfe1ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514afa1ef567ae88fd87d8c28f145e242
SHA13fd9b6c84ed53f3888329fa2d14614b3fa71e888
SHA256977290d314ed19d6801a4a90da3f9a3a68a2c4ab15ba34e248b2e04af0de566e
SHA512cabded756ab30c009767e3e3a3377a4eb30f75958886548d99ed1af0ead0de9c1b1122b2235a89e6ff9c7e2fecd4a026b8aceeb8674ccd283ac2abe92fb4d832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526048b0d7405901505d1de3ba464fb26
SHA15671581a1a73ffcd3f5bf12e6466e7426dcdfcae
SHA256aca0063d370a8dd0f5ae03c2220485f0ab483463c1bea326bba335df9c1f32cc
SHA512508adc520359291e8505e8e7cee34e6a432ec7db7abc9c6934309ac58750f2057486f08a64d5d1ecda95d9c4f581ec137bcd6a070a53d08b6f8af9d35f87a618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c8a15c877954023f0167e4d31ef2f4a
SHA1d9a04cba96ece6dd407ec7f8fbff9805b140b041
SHA2569a8fe48930b1ff419297ccc629e0942bc06e0b408f6d8baa16e012a38c81677d
SHA512d3a67cdda91f83f9313c1303e82083758ce4a5bc3737b5ff8a7599cfe6a6cc66eb67423a368f5ae7f51aead8bbd1eaad0314584113e39824537dd99fa68803b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588e57f51cac81ae6e2b582b992eaeccf
SHA13841ea198c560e80c438a59c75b8aa7a680b65cc
SHA256688fcdc305410dd5b54e807287d2d87708dd108ee0acceedfee6fdc8d2e55489
SHA51250426dead159660d8708b4e85e60e9d2e6891a90d8f67cd0a2718974b54e5be07a5604c1b27893933fb78dca4f4fa9da019b3e94a68a3c602ce343d4318ad93b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da9e36b518960e4e2de3c9905130c901
SHA151cf1ff16d9a20bd8be0363d4f9c3b823680f2e8
SHA256cad5b267a8ae53d87b4160eb5b5c679b62ad3f29e05579610899c278ceca0386
SHA512404b569200b031d6ed21edea3dc918614b9e45ba00f51ac424c7fc08d9eb1277fea13568a40df6523bdd1af40fa12b5425bbd34aa6cedc9de7e11aa2044153f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51249487c2dd19687708f15b89b6c00da
SHA18340fc9739bbe2487f507a5e6a5560c4a7a0a054
SHA256a119529ccc0bbe63a7799f762e176dfdafbd8d1975cea3865b392ba9c47bdfba
SHA512a599e28ce339585f674fc940c244b4776cf79a5b24e69d7531ee8a954677a6a959ccfe4aeee6dba22d6ecb51d7e03cd8aa7eb91e704e00db45bd86fe01820bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e3888997c165e5be999eb1faedf9bba
SHA1aa9d3c8021ba7ccd50e81bf46967f4fa6f80bbac
SHA256153fa8655f8a47e77f70ba498b4181179af1f825ec2f3f62fb15fe8d51110ffa
SHA512b2bd82019b7bba1e0c799d4b43176635bf80d2dce6bdda66f93613575a3024798293b96bd8cdce29fa813a7d01e985127eb7db5104894bbc9fd1e39aa23ec9a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53499c3571caf152a22772088eab4e779
SHA1cd5deaf189a51fa96b8579175ad13bc26de9051b
SHA256d2b58f128e259ea68916f489b9e01ce10d33e80ca13d44f1963275199665ca8d
SHA51296735a90870ce91d3cdf9940ff4fc8fe7b4c90be953b313226cd185263e7e8918954aa8aea36711e99bd41ccec7f2cc14a0e3643a97e05e567cc009e6f5030c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539e64faf6e3727c125ad4e0a904da896
SHA1b277a7a14040d92c69757bdf0385d88e1b34fb1c
SHA25683f5914969ba36ec29e2e81bbd5804f4c11b8b8f1e1ac88267a2868be9466999
SHA5124577c492468996d16b4522c36b8bd6c59b9ff5129b6b6df19d490dd040a87da44a2f3421f8d60e8f588bf1f11c20a69c9d1b135e64b959e78252f2a28f5b76bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523f02e125163c7e2022744cb9a84a006
SHA15c6bd31d1fbc78a80c97dbb02d0f05d7f58b8d58
SHA256ec2d2abf07cbed41509ea68f7e61cfe73f3f6b48d7c7489184ca0f48555f35eb
SHA51217aad1a325ad9d3adfed3d1d9c6683b3359d0e02417b0bfb0b9eb2fb33eca93565c6e5b9c8f136a33ec05272451ede5256a2bd093c80d406faf5b4dc70f54ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeada467dfee6bea8efeda07593d0a9a
SHA17835b3382f6187f9a2f6bc9760b1a6938e3d6112
SHA2569551ef1439ea0aa2047344afff263bf177c3a4f0e362287d4934d31a6039c7d9
SHA5125ffc4d6202a329230cd00e1c71e695a5575d73ef1cfd865a74cb80073d98d0c5658e424f3c8b127a6326e1c0d9aa1e2e3364f1e2e83888d99c572d97d3fc07d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3e1042ff8ae104da897797774cff328
SHA14603c6d4f08153c763d3f2fe3480e9570725cdab
SHA2564963a4437d8bb22006cf81669a36fb91b4504fad9988220fe445ef643c7165a0
SHA512c6d69d168516304cc4b33a4c256a274830a2dcb75e4d92786057de1b3d9807cb3d9bfb7801cd04f541db503f691c8aff6ecc67d4191febd07850d8596e39ed09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511627b606d1ec8248f71c840e38decc4
SHA18f603565d493e80b986794f75c92ac9568e82cb9
SHA256823e7f1ce07ec2ddaa61262a87b43ca11ee91ccb0e993694a3a14275e41934e4
SHA512f07a43ab1cde73f337aee1dc4ae395895d57600a6d3482f893b0c1920fcad35301234feafa101e260a568c29a60b9fd06e416aa5b20b0ffe9eb2c0d7800cb8ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d5d0b8c9bbdd8c07ff3a912e14119cc
SHA1be5d39505dea2d8c8160e9b516838162d0d06e2f
SHA256546434235e4a2402cfebb69ecde90077636dbefb9c4492dbad88070ac3c7c3f3
SHA51246dd51ad32356c9116b9e4972d8eb65ed71489d15158e28f6901febb92c33b94fbcac0c0b64b4049c52b92f632d511004294edaf6078e65d8d6a3752d5a5db31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b9224eb955992b9cd1b38358ee6300
SHA13db0c10e2fa29a8ee53f1f7f6222258147cf31eb
SHA25606dceeaf213a4eb0931bd204709d43691af165f6b079d88f0dde78b20ca852f4
SHA512732cd7a676e2d24d7c4c62050cb92ef2a9b42d5a1ef3ac282916977147ae99da82b5c70e747f2da05026da27d1587524406b9713f11489cb20d00ab391acdc49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5673fef11770b185156bb077c90d22b91
SHA135926fe422e61db4c119b70c5bc1932d1ccd011b
SHA2565baed3f60a1192857fc39dda532454c5b0ea58022e0791ad7787d575340981c9
SHA5125720b65dd20ce9e7fffeecd5bb5af9781c80cb252348e0606b18759978b84724df5b40909d519622243350268fffb4d6c6f9fb49a834bc17d3469b1cb8420b2d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b