Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
dd7b6b2c654fcd771807b4e613b02422_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd7b6b2c654fcd771807b4e613b02422_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd7b6b2c654fcd771807b4e613b02422_JaffaCakes118.html
-
Size
9KB
-
MD5
dd7b6b2c654fcd771807b4e613b02422
-
SHA1
b8b07e63ea53a1e31a8255cca6c5d16000971a31
-
SHA256
47d3b703a6cca9e1d95131a14c7a7adf3a57510df282d7cc953b16c7879f7f5a
-
SHA512
dceb58edea7d8ae675f043f2b7ed81013a7967b4fbbfbea7dccf32ab6600207764200da5129bdd6e08fe29d9677374ca329dfcf34c61a35cbdbb6b5bd59266e8
-
SSDEEP
96:uzVs+ux73HLLY1k9o84d12ef7CSTU3GT/kSxQDxapJO5hslVHcEZ7ru7f:csz73HAYS/SSWWoEPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000054a6e4f66cb362533d1cf1786a2d54e22ae98390475aedb2108b87bd59337ef0000000000e80000000020000200000006df47f47e12654ca41222249046d237d8a4be6b35affabc5bd3b9a321c17529e2000000003d4cbf554dc0ccc9c240b4ed5a213f5389766a5f1229ab2dd6596df92fb92f9400000009c5fb7d477e5399b25bb255ce4701116e1507c41334f20b1f11b3a346e32daff1e88e6474b0b408c2fe60e1ff61c7d810150bd43ddc19042dc4c7310d6bf2799 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432356261" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98634441-7177-11EF-A6EB-D60C98DC526F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1016096f8405db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1304 iexplore.exe 1304 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1304 wrote to memory of 2536 1304 iexplore.exe 30 PID 1304 wrote to memory of 2536 1304 iexplore.exe 30 PID 1304 wrote to memory of 2536 1304 iexplore.exe 30 PID 1304 wrote to memory of 2536 1304 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd7b6b2c654fcd771807b4e613b02422_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1304 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546b6626a731632ad53964fb0ea3d0c26
SHA15dafd73802cc29f6085e7ac1bbdb6ed157dd5004
SHA256a8792dcb9f260f9f152821d18c6013cdceec948302c4da5fcfaf694061a57686
SHA512cab6ee08f3997dc0247017a2fa2e455677fed5f54a48664286f93ae0c16a32253c8ba106ed81da1741bbf114bbce8baea1f861e76dd23f2c9f516d8f64fa1c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5904b680bf827f5dce3eb8b3517d95bc9
SHA18f46ab9e4416d97a47569b3532feef156cd0add0
SHA256ce88ad959c778a274f84a20add5843a4f93c5b70dbcb23cfc161a5068c7c0202
SHA51247a686af723879a0685d24aec8850dc2b8dc8f2f07b3f3fce739be7d232995849516ea877156bdee17182d0f8174bf598bc09f718d99a8213d1bbb508d56a0bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5ea9f5ce43cb92631e4375baf376de7
SHA10d7d0c5f4a90b0a62abc8fb948cc8c62893f9014
SHA256038640edf41d7fd2e621f03adab3fa16a53f89504c3da3c116d5d0126318b432
SHA512012ff97432d1632a2e46ee801b849756976cb1ee40b281bd1f3d447f2cffe0e0a0a5b804adff23a635407c9724e2353a631939785417ac36c636940331959019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54728ed2eb9c6bddf0a869cfb50902f30
SHA1246887977918bf2f50ce2ebe7577c8ab0f925aec
SHA256e36ce0de90b0f7b8ff615abb902c9ebfd78260ba7b9049cfdf30118ca7760160
SHA5120be2e8bfbd0862a5821e600d7068dbc4e28a6b0ce0b29ade570359d246f1eee93bf54a63787af3a10c3311e75a256666776a6b11ec78f26efc33de854624d32c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547919aaccb1a88fafd971fbc57a5b2b9
SHA1327b6d2baf328255080905fd884359f0e3ca7d88
SHA2563494546800f3486b5bed2b524da17506419185e762284c94482f0eca9457a5bd
SHA5123a2f4fefd960d649f3fb7f3128fdb3f741397f04b048cf2dee7764f1504a07c186757a1f9b8718b9866e6d6bab69b4ab0ff56cae7fe3af8679daf114ccfab3f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5af99cc38ddfd8a7db604a0e1e240ed
SHA1f07fd0f16e1786f4658c23929c3795443beeb8fd
SHA256d3e9eaa6df575c8595fddd49c6c7832c390161759dd1e495bd843f963ea3325f
SHA5120a06a6ee559d554a417e5b798f905a3863fb3349d2e3f915e74341b89dd374e8c65bd5e206d30decf92ffee1ee4a2970b1ba181ddfe961511c1b3f886b571f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5279218d17ccb47172d04358b340a98f4
SHA12109a4361b1c4ab41abdc7db9e43c4a2578ae334
SHA2566ec146993bb01d9a44fafaaed902c5e2fee933daf6c56cc753d82d8bc075cf56
SHA51235353dba40036759faabfd21bd513d9236674cd312fc4474a3e22adb03ffea72878c11a579a7d07bc0af0a525a5131c814aca6f02b4120e28cc8d64a53c39d9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0ac2ba2266e22678f29ea62e02ea1d8
SHA14521e1a65bfdb5af9d35931913c5c8732903a613
SHA256b180b05e979b811896ebc09f6c237ec80d629cd2a82a856086eae3b3c8cfb20e
SHA512943694314bdc2a968865a21961efa56dbf91a7083291b93e9c0227fc2cc8049d3c87bfe5c6d9239928cf1b7c8d8de60f1b5e5dea3f0c4057855f4d9d6e2e4acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53532a54193e01998f253d5f289646443
SHA16b7eb0467380f59959bb5deeb9142c102c16a30a
SHA2568afce6d064c94eb432193f8d5a8271ff610a1cd6687a5d08c10b3e793a87cc3c
SHA512b3d5de64810abf8ab30f78bad32576fdafa5ac0edf839e5294ee274f8277c77c49a4d1f50c16e3c3a49e5049c6f29dacca0c4b5edadd7c504a83098b14ecaf67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7cf661d2ef3964b69ed34eca30eee66
SHA1f5ffd6f7882d890dca051504812cc57abaabbf28
SHA256c5b17b5b6a88b2369aaf7f8d952665fa3c428a4a8a6832eddfbbd89fac93f39f
SHA5128c46b0b417faac7148b85fb9e70822e5c656cf3166b34690e7e9db485abb7933dc80905d5271229bc5da1106a32de4f21ac6d2e3c46fdda65f54a7c870e23f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d8eca9d1d7f508a72a52a85d84660a6
SHA10206e32684ee64c239868c12229bf6a207b3ba78
SHA256b70a42cd45e4a8f9b72f1c0b3f8ab5b8e6aa109a20b996bed01b087149852392
SHA51251f29d4ed066f33b2139a30b56d9bf3498c5f586587d64ba0f8aa122a14093b738e0a4dabd73bf03e173e7f887845918f6b87e5c37dc123c9423a393c35af173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e93fb199c5c049c12b09a37aaa697c
SHA10f529768cdb625f407fa530bb6b93d314c6c8697
SHA256046e4ef263c957842c65c7aca5b7d9fb144040d42ba36adae20e0347de121c95
SHA512d3861997eb5f2830b69e9b4f32cb74f32521baca871daf39a3ae509cf024bbba1592ebab302edeb297369b963a4df610202a2814d51b95d2393364ef94d0bd96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5089b481dd424d3a8da539d9a3cf5a802
SHA1839308663b8e6f326fed91415b1c9335f486f600
SHA256c02d6849d5f6edd121c1def053bfcc09ee77d0c86dfbbbd8befda397161ba5e7
SHA512e11dd9d99ae1edbbd27c9f2ad3defd51cbd0727a69cf483c492d69b045cdcc7abb65ed6a5b017ace8f6f06ff9b99cf70ca17c6b730eff2fdd50b2b281391d4db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585141b1a1d983f0f0ec0113bbeef1557
SHA1b33ff4dc070ba6eeb8d4cde9b5dddc6e22314328
SHA25639632bef19770c3f9b83b74e06ab2cbddf1a4090de52c73850a1e66b00774a99
SHA512ea2de04a4b5596ea6f345777c7742a5f8bcfadef90f03e773641405657871c0fc864f368400a7956de9e8589371093213620f0833d0f3a20d5707b5a5ee0e45f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e3d93e8b9b4e79bed0d9bfd6e6c3f08
SHA1d33394a3ff6799133e97bd3ebecd5b59b2dd20cf
SHA25640afaea2bf0a56cca4e63c08aeb379273b8c39e617a2d0e294b6671ff5e2e04d
SHA512eb949234c00ff44e4d582b84f6ab05218f62c7da699a01aabb75453ec2d9f711481df3625b6295115e060ad4bbf097e07363ea81f658d256c4c385a9066024f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57152a6233c312afc5d1a3a77248639c9
SHA103a1c7de0b4f1e42babf05f9fc2ca454d8deea30
SHA256456f31255d25850fa02496f3cac302aa6d77968fb6f2e158bd4f2da5aae97142
SHA512fc7b4d1fb0d7e5c0c89ad3c20f8594914ded51bfd32c99d3715a34b9df9dd001d7a61e018e0c01d8665b6ec5d4badebfd1b76a193fc80948b08a85e343425484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511286e4db6549a0c7cc8ee21a8668e34
SHA1b923910fc0c704c68e044068ed06dcdb8085ba56
SHA2563b51cc8c2075f5e0424b36a1950aa717e5d7454172e61a8cb6b50a469414a11d
SHA512e2f9cc86169e338f4ed1dba90d6e3f3484a7aaea16188869a4d91f223b4a703d673f817b1356bfe71ec2d0d3d3a18ec2d6b3bc4ec896a6dee457fdf2a2566b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ee49a9f1f2d69fddab2321d3f3ee225
SHA18916c95b6d5850686dd4b64ba667f5a8cbb3b837
SHA25666944792f6bc9d04726cff2b74e7e36e8502641607d3aae01507883c8b2764b4
SHA5126b10897037ab613f2b972d6a668b13ac79cde6f9f026c4ad7ebaa0ffa0d100cab6d98326a81ba0bee45ba418be8db687d0dae6445d4e87499f89138ab48a8abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e0ae5d3ed133d5f800fb3d9aef21179
SHA14728d42d04de556ca4b29d775a1133f810fb36c6
SHA256f83622416871dfee8354d542c380daca28c1e3836f20a50f24e3e8047cdd911c
SHA512ebecb03f592e7df74a0110742639198f6b4523818ac261b00d883b430f04393da00d138a8a2ab2b6f4303e094b9c98738d164f63f64de8a7a19e3471db775b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c35a2273051029806177888b292b615
SHA1ea8df73cd1f0a9f2150b3d2e17f7833855644bdf
SHA25627a31d9e6c08944843e43b765551b01345172b8dddfe0a4769535ecda333e3ef
SHA51227f9d6233b3670c565e83cac796bd28cc8bc8b287e030ce90c6d5385ef915ff2bf56ab80613900a669f389bc19d1ff00ab62b448b0b78f3de59a040e4f6bedbb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b