Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 01:08
Static task
static1
Behavioral task
behavioral1
Sample
dd61483f1ec2e5896b0beffa034f6dad_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd61483f1ec2e5896b0beffa034f6dad_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd61483f1ec2e5896b0beffa034f6dad_JaffaCakes118.html
-
Size
47KB
-
MD5
dd61483f1ec2e5896b0beffa034f6dad
-
SHA1
c68e7331417eda1a49b7755b4e75cad646c61025
-
SHA256
9912ea45b632b9e8e60a91669a7f9192a3b965c1a3567c214657300a3991056d
-
SHA512
46ea1d8e33f1ea4446f0cbc4892b24ba9ccaeee1764eec03c8111d05e53fd8f9ebe6788b40ac55e53310b6058af9c98029cffcbcefa0cea060d33e3d87622c57
-
SSDEEP
768:JyavgZbp2hqL1tPk7RsHB7p1nvzWlVxCjW2hfvCWNM2zyt:JyavubpfZk7RsHDhmCVpCWNM2Ot
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000007f586dcf9e4941fb5e737c72b40207a1c96358972b5cddd2fe83b5c2caa1c156000000000e800000000200002000000070d6f1bd88df782245367922ca7bcdad03f5fd55f80283581462ee5eb7009d2b20000000031fa987c9b3b3d06741e6342ada61eef144f5b6700a44d4d2ad13a400f374664000000087339a5448f164fb062496aabf7056d561903f1e45b46f9ea1b2ba322179619600a80311399f273edad9b37b108a8684445f8184e3a5fb266f14c4cccdfa98d2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432351597" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c00b39d17905db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BBD35291-716C-11EF-A6BD-E67A421F41DB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2668 2380 iexplore.exe 30 PID 2380 wrote to memory of 2668 2380 iexplore.exe 30 PID 2380 wrote to memory of 2668 2380 iexplore.exe 30 PID 2380 wrote to memory of 2668 2380 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd61483f1ec2e5896b0beffa034f6dad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553e45f7a1b51f8ff059576cb0fcaea14
SHA12eb8b5057500f48abbd7683e070f6a3623639548
SHA25627f79d924be2c09ecbe23b48ffb9323f6b912a7a9a2f0131d57b245450188b2b
SHA51233adcc2ecaf57c0d79528c525dcb2f1b931bc6fa92339c7ffd4dc28c0aebb7117a0f8dd4094236169779b36ab7fcd3c49a928a045228538521f95c09a01d95c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560b2ddc34b0fe9a33c92e8beffad5df6
SHA1f5bd17e43ca4d24f3d08da271f87cbff0e6c6d10
SHA256ed3e233d9fe4dc5ef7efc3ceb7be33ef2660c79b0a67f3caf2a0fa1f8ee1a6cb
SHA512853f2c53d867b84b93e68b1f7dc1b8bd07baa72bbe589ea38c50910f70f1e30a8073a3219b3b23c66feaae3e2ba1a4564939ee874397da512525ae4ca855d0f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56454b9bbcda6a64222ffb64cd9b65bc0
SHA1c968f694e9269b7e84b47fd972d62d2dbd4899fd
SHA256b27459b5bb4de9e10a336a422c3246afc4a36bc35b5b8d5a9f292213c8112eac
SHA5126b66c7e01aebf87e3088db56164621b740b2db37ebf8b08bbd5c5a8a289af328baf4166b847145fbf6d4c9a9741d2e23a6117bd24ab74ade02782bd9bdacac19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f4ea25e2bd266671c70d227e9975aa8
SHA1c25d4d5a7a45a9bb9e2871315043c38067a02056
SHA256eadf51b243b55f60793e245849fe38d61fd0983147ccbd1ecb9da7be0bf644c7
SHA51215df945a831db00ae0b5f96bc6952d38fabafc39aae62c9868b81b069e24728ee97bcf32a044d8940891efbed1b2375e6c32b666d90604f6313616b0d6b777f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4e3e8710ec9169dd25b332227cb43ff
SHA168501d9cc72afbec0bce33186ecfa3ddce171852
SHA256dac9c1134378cfc49c8bef254c93dd0bbc63674531d4b1bb6fa140bb7b3cd825
SHA5126efcf7d7dc03025d661e3286698402c4935862cbdc5ef4f2e2938e95cf3b207273c1c3a4dc4c048465ee217e073665aa0a27c2049cc85b06c641a65b45132abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ea21c9d322d422e5cdd1c1c35a7ac7f
SHA13e56e13e1372f16d66cfba5c04235b88064fbb74
SHA256582caf85dcb05f725ccff1dd5c0b1e61335176defbe152dbeec597594344a5c6
SHA5122555f409c51ce18d6ad07db946e2b8cddebf4070e326f99f898afad382ae46a607654b3ec5c5b99f903b086d5f6cbaf84fd27fff564da8aff622ae5887797a31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536f0eace3536e7f9ceb767f73625f113
SHA1ad7c6b6d61019cfae3308f36c4bd6bfec6cc0e62
SHA25619a756918ed80dacca82b21f8598039f6e9f55bdb25fffacfb4b465873a1b553
SHA5128c0026c2e67747026e75f0e60d0e60630911eb3a576bafece656fac0d862a2b0118813844a4501a2e85ce74297e1d6a0e36cd5ea9837c7bfd5baf15efc230780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c36ca74940c8d75c531c0363327ce27
SHA14cda216159e27e5b2e4eea4c4ab51bea1e9e4507
SHA25629876fa750596ed89d9e99fd1efd32576dd12b8d6cb1b3267c2ddb5ad8910416
SHA5122b51b7082607f4e57ecba52a5d2fd602934a1a4b8ef510eefd6f312b9c87f0ec3fa165d1c29f8dd1bc30f56a779064fbc84b58c4a29e2e85bb1cacea59950543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fb1bcb37cbb99bcf8e8ab29f119bb01
SHA11112d87cabfe9124fbed7c31d1296f04a253d6ca
SHA256f7f62ba7a3fe7f9c9b7ac6aeb1e90e2f2628fef14f1ee59e9f9113e97907e463
SHA5122fc3f934d3afebd21fce38c7d1aef1010f785861e7cb34c39375ebc7dec820d79efdbd4906a3929e694ae9fb75e4decade0952b426a6badf3dceaeb62b4a3edf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac3652ab10817b353c19922a56e35d78
SHA1b9b4dc8775d1c99cf26589a709f2424022c7a4a7
SHA2565461c325e19f454386a6dc4d5b84ad4fb055ed0719039c57acbac6d79b834443
SHA512a2601cad0c25a49b7a71e5238f1191ae5e80355d99ddfd6ccae680cc7843fc0a7e4ab73ccbf9d92b465f7015bb980f081e8105e17a9a6bd119623c60c69d7885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ef39a4c9145a1dbfec6927bbf853443
SHA1ede7a1a850467e184d7a9625c9018274d09bd8d7
SHA25655ecc30df281f3a855ec4d4ea20130b25210f7d39260726810f2232232838cba
SHA512d76228290236dd6d57a8326ec1afc03433b248537f1e0059ce5299323cd043680d7ca8fdb7a01a391acb82415f1c601cfb8f77360b2ae51612528dbb477432d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fe75a70aa61426adb954e48453fc1f8
SHA1fb05014b1bdab9c6b850ae288120dfeb69865998
SHA25612e8b76381dc08c2b1255b198f11a9533025587285694ccd497121ea9b63f135
SHA512b400932ca3794f27da275ce01d3a21bc7687b0649e4eba32fb4113668e43171b207ec4a737fb2f7deeab2a00db31cfbbe563b389fc8c9a3de6afc5203256775a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583bdadeb458256ccbcb765eb81a22b7a
SHA1c8ea40eeac6a41655a1c4691d65020f93e4e543e
SHA2568b7e61634ab613a8c6d406520e84043ff7f44d1ba8a9f332cdba8517a1741eb0
SHA5124d7ba3356b6a76483b5efcd6825c3bb12b8008c1277a30a6438d6136edc6a351b404f81af50d2c861ae4e65a94c9b4a60f92e092955fc4005c09d2ee097ca7fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c10919de1bd07247634dc5d9ea45ec50
SHA13e7113973eab5dcd1e7e918126822c4b02352e1d
SHA256e0592466ebb0b11da70be8dd4332a724dd68266a4a73182fe6f748bef7565c6c
SHA5126631d1b233820a5532de8670a32c56249e0e5f0918000c9f2353ef0cb07182eaa9834f0539eb4e0a15e9ed7bec9dbb270b1a6717ed99fcd92cb26a15302ad910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1ab8b50a1c99f18a84abb1f19a7b505
SHA1a5a94b0b1005b5477b1cbdb9dd37cffd0719d8b4
SHA256b682de4cfd98c109f3af635cc70d14b26152155abaf63edaf56f24712122b0e5
SHA51209995c8fe3a4d9580885e9760d2328b8e401b76865ad24902f6b0d780f45e0c71d9d0f3cf350ef9f1384ca83d5207bd4c8d44950504bba7f3341d88a4fec60ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51019efd7b74742955a057c89a02272b7
SHA1c2b1b19b0f16bbfecfad4232227cf9ea6584e7bd
SHA256f6da2f7fe3afd0fcaae1df78908b1ceab7972e70f4c6fa2c549a966dd1a8373c
SHA5120a1d3bb883ec992676a6b78de8b87aa770c090a86c07e9c82754cb7c45a10bbfa27938e1bcfeb1553a0a84383328ffed65777f0ee3566dd74104fa830dac404c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0bb922f009ceb446cd682e1b986f414
SHA146f66326f279a784b60f25fb7f92eab62fc5ba62
SHA256df1c33e2161ec1d696f511abfb0c5fb5eed91255bff6d94f48510ec6f5f28e1f
SHA512fb5bd965b83dec29da6e935d94e82e570a679e30d8f26b269464f1e50636909779439dd1b9bde441d9e9f8f454f30dd907d8f48a15da7086c28164ff8cb74c1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5798c191141f96333857947e8fb8528d4
SHA1c7c2694bc7102a84fa6bc75b52bb90b995f32640
SHA256127dd2dd19f42c776ecf0f3e54fbfd95362bb4600aaae27979971e1a4a560c7b
SHA512c8dc7df8d8c6091b19e591c886006e4d5cc5139b7033ca11458285aa048f19aaf5fdb01320840a90a390a7c733459562686d6464c43412a9736cdf60e3a977fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ffd614c595329353e17424b31b05dd0
SHA1f6656a1d2c6b06ca4479a8d90d53e86ebb9b3637
SHA2567d09ca5961598a6c28f86766574ade274390149d6ce92a94a054631502d30056
SHA51290aeffdc85008c11c0793201b416f0f27928f0ffd8e2409e459b93dc20b35e5052054b7ee13640fb834ffe6ad9f0d948d802f191fde6a7c6b54e76f940ee62b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d23aaa7b218221d89d84beb3c18f5624
SHA13ae69c20823e298ded40befb6957340719bceb5d
SHA2569e671534a4ed87924b2835d859c38f8ba19f6950f35d3bdc98ed6a908821ccac
SHA51229b4998dcc466114fde85f7d1d657777aeb33e49e90945c4a2bf534576b5f281172fa49edfdad40f0280fbd0840066040fe790eca33061bd53d478bf2136f9c4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b