Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
f06ee2594cc2482030c6c45350cab184_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f06ee2594cc2482030c6c45350cab184_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f06ee2594cc2482030c6c45350cab184_JaffaCakes118.html
-
Size
110KB
-
MD5
f06ee2594cc2482030c6c45350cab184
-
SHA1
4b6358333d5c3a367b366ee1123eb147d22f1b4b
-
SHA256
bb611d56d19f6d8dca264f144c886d53446fdc6a9789c417a666d412646c0509
-
SHA512
5d0737832e9c7aa5725c5fca6fc9e9eba04d41b6f19ab3c433e72287354da4629657cb96f5d73aaa4654181486ff1b0750e3c884431daddd1153f804e677d62e
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcYolHA2DALkU6LScZfG2kCp:sWD8Lzi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000016cbad95cbb53ec9bce4d93b29b44e645e1c891bab9ca27e7787839a6b4e9cad000000000e800000000200002000000004dfbfca1b3f0ba0594121db254f1698f753290ed7f53b71185844ce90d0b2d220000000ecc5cd498ddc7ab4091711ed849c8f171e6f3139e1cd21a0e4c93621ddbda5654000000013e691e0de17d0f84e306bdad687206e3e1bdb711f109f05c03655fddcd75d953cd9a77bdfd0c9d2e4e0a7c7cc71bf771395c325933df425935f6aca3f8d65ab iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433106435" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A562D71-784A-11EF-8DAE-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00bcf427570cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2748 iexplore.exe 2748 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2688 2748 iexplore.exe 30 PID 2748 wrote to memory of 2688 2748 iexplore.exe 30 PID 2748 wrote to memory of 2688 2748 iexplore.exe 30 PID 2748 wrote to memory of 2688 2748 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f06ee2594cc2482030c6c45350cab184_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5056aac24b6400634a71e94cdfbb88304
SHA1b64aa25cf71da0a1a65394a82e14c5b3ee67161e
SHA2566f582e5ba6c7cb4a491a9ecf497d1cd1dcf821e360eaafd7999e4978e58c18b9
SHA5124a028066216b3f68d8c88857956cc04479bff7e61015e2e5a00ef22967e1840de8e053832e8c1962197ab2d6056f2c5e96d42f1308e9a819429a43c2b3fd940e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da4eda5bcf59a73a39c89f0ed90d9cba
SHA11177da25c199ee5e918ee1f549aad85021fcfd42
SHA256fdb8ab46ae413b71da8a8bdca6b2df6bb1c199f0bbc895097d897d752ea2e495
SHA5129c4c9de489737e5b1e0c0aeba3fad63280ecc30049c53b8881857527f3b158f1f8a34102414828a715964bb0d7a0216cced749ef2a22ff57e8e661f248ef5f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568aa173724d4e556f8c6b7d02c1d0f4b
SHA160c3e0d2a547a3f48cb86f290c00139b089ae63c
SHA256a366b56a165a68b23dec1b5856e7c91019842e76627ef883270ec5de682381e0
SHA512df8fcdf0d00c5cc0fdf307209b846112081e47161f7cdafb7fbceb040eec589e12370a1231494c914d1df853b1c969f73addb3f4f3e8e2370828fbf1f4a8012f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518a3a8d747c7630d44a6dfbb691cefdc
SHA1b922e209ff561c4849d425c5e51dc2369f5a5e5b
SHA256a027b758cd5989f7929ecaabd8573e38c48ec73f4854474bcdb0b487b88e6906
SHA5122a93fda8b4a2dc032d803cba215f00b0b4b009fde9bf36d5729c1409a265e8828014f3ac9ef62cdb87601cf90d8e9008cdd0900810cfeb0192e1bd720b857ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c0db02527a6d24d8cf2904062a7d85
SHA1c39b9029e01635003468dd5e3f4a6f5ebeb268e6
SHA256df3d479f31187ff98104867184886007b38021fdccc86fe117bdd965b819da6e
SHA5123819f239e9d4282f8c6b2ec06aa13b7ecbb5bb22a988a2aba49a5a4aa4fc72b49d9f6cd558112f5ca0761a5c5a09c91149938a6d2ea25c5009a908a3aa03f6a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b88d53f459efd8bc52ec4a9e555dfa1f
SHA1850adb44870d1705c650fd7fa03aa233986cfaf2
SHA256ad666a5c21bd79fde451fab429bff606cc7bd48a5d84e967ec19eae97d13f3ab
SHA51204e73b1d06d3e3e7b63dc8f8e70d29a4d7f56525ff2d5edfaa0d8e0dc55b01da12dba5114371560b6c43ce97bbd57310c050d737a1440c76c5e45451fe0c6770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58285ef62056e8312a351c9d6649eeb89
SHA15d39920372bf9f1266a68727e466a0ca8dd50f21
SHA256291f2e1b90526bf20d0fc5e919306b630ff20dd86f605802127ff372857aacbe
SHA512500ae207043724d8a382d832843bb6b55582701f5e60be64e3c4cd1d63aa69a3313599af9a669101512cd004eebc9e13d994101b9696d3dec41c6b7f9e4c408d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9a3aad075702d58211f1d622c161e60
SHA1158ee99e8fd786e41cf0ffbdf17ebeca05642852
SHA256e8b6db5ec27e3ff716c63b70fe7be359c5b38f6efd3760e29def2503792c514a
SHA5126fed3e078bd94cd5499dd9080bc11e5f7fd50417d0114384113864bda0d3315f7f2affdd7f704b968fca5c4434fb87936bfa18126b765f6488a2729c77beee66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5870524a7dc58a549312c5ab8d2e9d993
SHA1eac74dc657aa9a57be35d21ee98187fc4d3a55fc
SHA256f7653b7e64715d12a86b499dbe472eecb2af0acf5bf30bda05215bfdba639cbe
SHA512353f7526b39d13d4c0b708220a363d745b4cf9b453ad4cea46f9498e78ecb6c86a20e54548d0d79df45a3cf8a8e48ac7cb78b7c5ce0b22785c0cf8d86d67c3c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59047b9e363b6f2170e63d05d4351b21b
SHA11b0057731d2f035e66b25700a7f8f67263ddaac2
SHA256e7e9c4be563d21a58e61e4ba8edaf9e26ea499be33d7780975524a578d2c57e0
SHA5123e4cda13ae0ec98394323f301835720ab74975ab76a6b8af0c9ebbdb940e65cecefa4835a8d55f5b1976eeac720d59c9864381a75f68193abf767fb6434fdcf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d07cb759023feea1fa30aecc962e44d
SHA1f6b52ecffabf80bd1f9399963e1a56c81efc9ea4
SHA2560d16905f5be6d7c69ebdd45ab86899e72e537a055a5171ff14211f2ad97ebf88
SHA512e014b51fcac3b68b4f1bc82e39aa2629faaa88f0aaa4d98ed7ba99de3f8746e9fd25690ae401fd1205778b1e9e7b7ab50b0e875d2240417e7d52f7747aae7b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545baa384c1cd600c124a6728b2b36880
SHA1bf5f356a737e023813838edc63b61c6cdb4730a9
SHA2566e03627eba6ad1e6246e7d3e45771c6b7a111d1fbd4edb38d9ad46939227c1cf
SHA51208e3318f7515b2bb6d71cc4ea217992ede91e09433d44170ce8ce492970e1c7f45d4b6acaa1919df95d48e0f0e57f976ab5c3aaf6938fef3f13e85ae3e4f69b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebfb4eac4c8cfcd0cc1bc83ce2603638
SHA181e01dceaeaa24f5cc890a0de3dbf9edbc805c5a
SHA256cd6d43a29abeff99c1fb60caaee2830d74a3ea57e634d3cc0956490e491a3735
SHA512fbe7b3b6b92aa52c2ad9c4964727375febe28009748ed61fa31b122b3b801b96aa770afe60f132d268d88786a19f7f8245e8f0576bb918054e0ef4cdd000b299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea60b723c1cf80f18b02dbdad71cb30f
SHA1546de39af8dc07ef3a73d8c868e552f133a52f2b
SHA2567304538e1188dfd3905c85dad335d36f68e8849e1457f929a3cd66c7e80aa958
SHA51252abf7ded02fe0e354ba524437a546ce02493e6e15c6509c6a8b2b197ea1920cc265b38c197478a61b91696459fc7f45e33b37346dc8380b9982d409129821a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b1a80147a0036aa31b5fef0d6198d83
SHA1d408687048ad8025f52f360ba19c999dd72428ea
SHA25646424f9cab6922adaad01b90245485365c08a5eaa234f3248d25aa848dccb8c4
SHA512903e2ea8a6389f4bdf4d1997de9d3f63a4a715aca25dd85f730e5ab3cc2d56f568a29d5eaf513564c77c393b355547ac57084c699bc8bf563ac155958c791b34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3f0870ff76986db57e1cb62bd81cb21
SHA14d15d6edec7bced718d48d8f3170393d56cefcab
SHA2562075da161758d7896450f81e9857c84f42be482360a5d3146394410ee598f846
SHA512374cd509983eda383cf8a324d999dc43ea8764508a85818a6c863a751e9a25e0fe73237c05bbf76423f870b0787bbaad5a2422a7de8d8b36b8071635fd7a88ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586ccc9c6e944f15592d70f332d8ac965
SHA11ec1c7cebd1bf9c592e66a8e2a09f5e337e15fef
SHA2568989eb5b1eb8f01a94ea88abb711bb4aa5eee9d4e29de23752171b37ba28d0dd
SHA512b14dd04c6033223d9b33bd9e8140386fa676e9c6f6ca14db384a930e5fc59aee675b390c5a261af3eaad5880aca7a48e32a52b763e8b4892a50209fbd70e2606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc81ffffbfc567d7f72047e049337c67
SHA13fbf50c79f8e8e0555d72ce1a662fc715a46ea8b
SHA25649dfebc62efb955d91f6cedd58a6e136eb8088ee069b0ebb35d825b37c89aad1
SHA51299eb9feca16d51b6213fe17931f74461fb9ceabe5a7ea5463295f15d3052522ca4b603dac5fd4b881a5eadda0d6f35cec47eec65fafa64cf44a3cb744da3eeaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fae7e105d88f7af074884fecf9e2e37d
SHA19cc9295b257e4c0f910dd500d5045c6575fecedc
SHA256bc6a83edec3584ffae880b5d7e604d3d5192aa041601da23e9c3dac68278e83c
SHA5121d0708a3e7308d610fa35953fd92c4477b6f198199a7e7b880349b768fb31e5f42b1f9426faaa5021aa8ddd84b21d4cd1e57b3c70e51a04906abe11d306dc03c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54df8ab520603fe05611270d83c416b42
SHA1dad76fde5209178118a5a2e7eeeb92e291fd6e4b
SHA256fe9ee4dc626c4ce9d2f8f15b964017012e3909278b52dca04d37252b48877261
SHA512c2087430fcd6ec08048244ae7f2926c7230f33526f5bd212272bcaa85e26ecdee9947d6a9cf6759ed511e43d58c140e0e81d70590d318305cc12c2eabc13d5c2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b