Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
fb9d713a31b5371ecded39159feb0be7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb9d713a31b5371ecded39159feb0be7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb9d713a31b5371ecded39159feb0be7_JaffaCakes118.html
-
Size
17KB
-
MD5
fb9d713a31b5371ecded39159feb0be7
-
SHA1
7d6d4fd47feb265b1070cb8a082a38d647269b18
-
SHA256
52744755b47da947e8a0f49029a6dbf5a00616ee7f498c5679e94d2dc1a4fdcb
-
SHA512
7e4e1e0e8deacc2952b1a4f6306769288fa82a02b4e37da84e36953a225b6ec05f470052754761103c0edeab063322c4b9757eb90c63b8abecf530601051bdd5
-
SSDEEP
384:p3KHJbGLsQN6SxeaAjUU6kpbgVe2OLAQMWN:p3KYL1rcrf7r
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433664004" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6BE9EA91-7D5C-11EF-B36A-E62D5E492327} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c00604426911db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000bf1bcc821f3b12ec484a37418d7796dbc3d99fc47cd0a77a376fb83a13eb44a9000000000e8000000002000020000000ad70bb1502315b980f6c863a9c095914b10d85ff856ba9da8683f8516fdfec9c200000003e01ff2bf0decf1e21dfa54bc172de3b62a57b445aad431369621a67dee5edd2400000007a103bcc64ca2c1007025a3fad4e2f9c405cfa79529f8be58f9dcb7c12291b0b8607cad972366fe95a4285b8497cd8e5bd3ed5e9e7aac471d1b3b90d72772a38 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2284 2252 iexplore.exe 30 PID 2252 wrote to memory of 2284 2252 iexplore.exe 30 PID 2252 wrote to memory of 2284 2252 iexplore.exe 30 PID 2252 wrote to memory of 2284 2252 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb9d713a31b5371ecded39159feb0be7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548f080ab0b2f2e2df01098fb841cfe33
SHA1e0a914189e3a1fab5f59a2bdc14b6aa0e7c27d5e
SHA256453307641df2921764672bbc673a9b9a5744abd231d46f89df12f777bd571b33
SHA512581f425201a3b6d9fb426528e8f1e81378365bfd66107f09fae3e7b64ce17ae9c12b44b283898d9ca230495585e69e84eabaf6f1e5085e7ea9266ca1f9cdb31a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c823ff1c33f1efb9315a3396bae5fc1d
SHA196c0317c508799f25de450e4c05c69e4fc01524c
SHA2565b3d480756dd32a8180b91fe039bdfd8eac712c3639751e9b4e683f8ded23a68
SHA51294259fcf1a38579577607860a7922ef29a7d0147fdf1ab441a806ff58358320c4fc1e0f44339bd8850727201a0ebe8c1795de0d6410c888ecd9f426aa7932a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e956aa90bf7a91caba383d7329dff0
SHA11a833b44530f541e27da842c29e533b21a530be4
SHA25605861c4db06a77f777c18f5fd663e272ef0fbdd8138731c470e58c47d55e86e4
SHA512942f2941d7fb2ce8bf271108c88f088dbf67689ad745062a4e271d05ec5a93e03c40c1659edc6546dae050ea81a1008fe6601826e75514112c5973baed93ebd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc6c8b319036bc422b30556576468a9
SHA1f775e86d237c3da03fd3fcb132d69d4e627de923
SHA25632be86206bcf4d9cedb49ce6623fa57b532f572e18ed9c80cbfc70b58ec1fa39
SHA5128485c6399d0e3ace8e808cd636c2ff43d298c187772b5e86ce85e438bd4e5e147832585763626ad1a06b32411516ae6d8c502f0c4c4e1b68fe3640dbafd4d235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe6af998fcc3577ec9e2efde997b63ce
SHA16224ea0845342eb20e005b519537b4eb4b21440c
SHA256d8c187e5327be05a8ccf8c2c31b933e4feec6289d101a24db52239bbb70fd08f
SHA512f9a880ec66a19499aa9b587db0555a36f47ea140a9201fc35817d84f7bda6b867c311702b012e4cc74f1be6cf0c427a2765fcb13459eb86f91041178a4de99ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5162b5266ee3c1130009daa9857625dfe
SHA1a7d01a039016c5c1b48331d651b3d75aefd4c2be
SHA2568f84e27cf504e748f20ececbf7968a6dbb78c2ad2ec92b74341114c4d0f1151f
SHA512d9dbefb27242e4bd72805a60027847f4e1a14309ac4163fb28d1d9d8ad180825e8f771d248fe14f904207e000232544209ed8fb020e159235190b4cf44bec63e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570d6161d0f84a7642797fa9003927fab
SHA1827868b2f56ce77d71b33d85eba90f50e7314f3d
SHA256fd61e1c7ec539bb2183d75cbc695ec7b675c75fb9d88613cd9e31dc00f19e2d0
SHA512ef149c0770aa00ba74a4e58565b4e8012cee94aae379a9864bc8543e586113639505d28259dd21a140f85ded0259bc29dc98a50625cf21b9a70059c5cc0c1532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee079f1ec50409ec8b0cb40cfefbae76
SHA16f9f2538924fc5f4d628aab69cd13460faab16f7
SHA256ef63519e07331ad26ed9ad234c4723cf1b87779e1de238cf083cfae83d6c7ccf
SHA512281dda4835d08a21c9bdea7e30213becff68a34c694d1480504533795895989637b3e7383a86ae674b30ed26053ca0dd73b33fb2d611681a243c33fb35eba88b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dcc93e75dc7abc4354d2615d76a6375
SHA140fc9835e3aefbe7b98c49be079321d9f7a113eb
SHA256a57025456c6903dc996d670c6f3e928e6c20ee8e097c2b90e31d3373df6e3310
SHA51213eb71d58923e4f3f0b48cd284af8aea69e36597e0dadcfb718b0d5f97184b14375bfcb0343bffc61d9f867eb7aa2638b828b9d73f55810e29d4f765e1649cf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551ff34edc16ea3d200f2e910027ef2a3
SHA14107906c76ad3e1fb75cdce4b14c379c4bebf30d
SHA25630d87daa181167138a4bb02da00bef34696137c821ef31f02ace1436907d345f
SHA51266dc5c91d2829defbb3211fd4478a72a39c678e77b4af245c1e666e1fa4e9d1b7118f433e6e20c7584b313ad2b14322fdb5d711563c2a60c2cf0fe70f7a64c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af5b271b7fcc14da3b20d44938e11ac4
SHA13d973323ea9ede696080e0a7e428cf8b0ebf44da
SHA2567714e5b6dc0482e511b0ff1568dbce80c858fd5dc0e475b712bc852eb1a08a28
SHA5129e8fd4352914eac88823f2f9cdd734d21da70f9589a203a2a69bb4d18f49757ecfafc0550646d62efc54944e7dc1b4626f3a46d8e9e469ac2b3109f78765976d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534874c7f4609aea5284cfff1b32a027c
SHA1c9ac5a930e63fa65996da2b26dc5f21a8cd96265
SHA256fa869fae5fe4949176e08585a8f3a1ec5862fc38b32ad872c52c6b173e1e827a
SHA5121783d7de912992d17b878811a9fc65f330bf4cef8084fe9204966ae64f25db0665e154c7b85bfccd699f680d051524f589be16110ca175ea5e5d10858f62b1e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a95702e1349e47718f7937e890561c33
SHA1d036932db71210a710890acf03b9599d642752f1
SHA256a903c5208d2e434b2004552a875aa22d1ad204beb382bd7c5097c487524f2ef8
SHA512495492c18162b5a1efba7a5ecb198ab750c339143ef73b19e94b4eb290237fa41adbc0eff95ed686b3d335c76dc1811ea97ab994fe0fa8c993fdca9c9be6c03f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dc98eee0885a1963b71837f6fa59a31
SHA1988809045cc7a4a56d6ac9d0301673920631e9e1
SHA2569d3820a7dadd86e2077cee2180318056c8242289a0e72fdba062bc20118bee02
SHA5128a457a697003b2be1acb89434936f14520e7a76423dc2d3799259bd7986c9a2e7683959bb42cd9944c2c7486fafaf301c33c1b837b0219f4a045b9aec96c2d61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de6fede8290da89940548a22d4f679b
SHA1194e27a7b21dcf5860e4d1f7f63ca5d128e86d61
SHA2562759a13ed36821148bc813308251ea3c310bda47c92b5eecfacdfa1fb5276ef7
SHA5125ca46384f5c3f16a1cad767c3cb738facadfc00ba851e722359bb6d364ac94c40ef7bd8809dbd9b3bce9dff7a286c76632ae8839a99ab8ab9692a8e3afe20889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ed6436fd0aba06b09ce89459f32df79
SHA1aa915b671bbf6588400964f4389351605258484c
SHA25661e5e28e7a26041dada8f76a3895e9d35802f3865b604099ac8c5e4a0f89cae4
SHA51291b35b31d922dc890e026fab42040ceb4386dcc6b0995886f4ad395103b85b8fb07046fe5f30e5490f693b387cd9d50307201df3cfecfd1395931f9b62115032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a13048473b2b710070393321a48b53f
SHA19d6d99499363d4ef2203253086ad7866a0a57f83
SHA2566da0060e55a150fd437104f1f17e8c27fb1aafd03ec3a25e8350e91cfb8f70ee
SHA512f12119693ba49db189f76daa949b07ecd1990e730169f3cd64c3b0457554f9a16b664d02641839fe26e899a06ccd8595aff763c720745b5e6090dd952043ce02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c473ba6304b3ba36adf71749abf9c6d3
SHA105d7cb09e18bf1d21cf042a1c5d16fce30dae979
SHA25632c34ae2b02d67ce1220338d91f56fbd75f37ebd6de91a9388e2c2f49258cf22
SHA51246a16667f374449424bd05271203c5f08794a8fe109466441db461ec00833309b9c8129d4f5cb04925098ac6d40ef7ccf61e820ce7ee4498dea73b76f8963c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf2d120bd8d2c796c8e70cdde2e1f1cc
SHA1db15161603d2f728f6e9da52864680392d67c630
SHA256d3c72948970ded2c5872d9adedbc83d9a03060eba09d09b4f900b4e773457d89
SHA5121fc981b46c63165a31476a1a719e310610e0e27e06ca49dccc53e1bd8d10f174bac5939d9d92d62fd236e79fe65fbe1a20931c30bf5aa6e0e00a393a5acb6e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547f494b13e35352dbc364755a8580ef8
SHA17a4110e42cdb797ede839c91eb07079ebd2025ef
SHA25616aa7ea37ca30fc66ff679d4711cda6214a3a1ab8435e8ab768170c12f7074ae
SHA5127eb723e46dc24352dfe4c55faf9cda8a02fd03fc88eaaeb97de75d473ba5b07693f4633363e4d33c0b481abd22033d1cc30166b1ee5af266b8ad1e595f6f5211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dad954ef49503d7cc3a0b1d04698a31
SHA1f100473ecb112bf788dea1bbbe808064fdb55ac3
SHA256e52fc9e6e0cc1b2d116910ea34835accb6f5fe254a2e1827d0980564d04df522
SHA5125891c1e51d16be8f83439bddfc0aff66d78686647f3b3a61115e06662198d6bea3f6980432970b56f68e2bb0553523c6ddd5867be75d4513158e79852c8a10e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b