Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 11:49
Static task
static1
Behavioral task
behavioral1
Sample
fc3c588e1925807432d27782397ca7a9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc3c588e1925807432d27782397ca7a9_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
fc3c588e1925807432d27782397ca7a9_JaffaCakes118.html
-
Size
35KB
-
MD5
fc3c588e1925807432d27782397ca7a9
-
SHA1
2b631de16b3379fe31acf44fe9774845863cd2db
-
SHA256
4a728d73b658e431cd8a7bb3b3d855bdef1144fccc0b699322268d19e9ca91f3
-
SHA512
10dbcc11ac170c2e7ce201fd08954ebca5a7249a25d7589d891500590196d9f59a1291c5c60b8ccab2312f70621877a41538efd50538914985d6b20daa6688b2
-
SSDEEP
768:zwx/MDTHas88hARWZPX1E1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TIZOf6sggf6lLR7:Q/XbJxNVNu0Sx/P8IK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9E6ACE1-7D8F-11EF-A914-FA59FB4FA467} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a00129a59c11db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433686066" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000078b5b4d616eea3f5c40ec9ce18e34c9e83920e0bc56c716c4c0d44e54a847b6e000000000e80000000020000200000007fe0a8fad9c4b59087635ca7c94fe287f90b6ee69217e289c8039c2ece48ebfd2000000095f92a56a3a1db39f517597a3f0c7b43d92d06eb26474fe326ab54daa026cf144000000085fe6fe118acf4b3e8de99a549deef8df8e804c1ac4bfd4b8e078ae716ac1f0b8da9e630c5118bbd4c2860b726f8b2ae759591de2a57d1b47a0b495563bc82fb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2708 2316 iexplore.exe 30 PID 2316 wrote to memory of 2708 2316 iexplore.exe 30 PID 2316 wrote to memory of 2708 2316 iexplore.exe 30 PID 2316 wrote to memory of 2708 2316 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc3c588e1925807432d27782397ca7a9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab3b49b9bd472f2905382f343c19eeec
SHA1e5ef5f8b8f611cc1a47a457534310613a4a42c24
SHA256ab9acaf1547cd2130cb5fdfa7a778d5e8fe837d4b2503c1557be52f13ef2cee9
SHA512b4f3222ad8c8f53f1a1a6a8477f2fe98ba18a3ad039624f8c050d84e78b6b555e1a2dd51ea6e832267a65dcebb395a98795dc9c12339cbf058886ae857bdfaf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5130a39c2c2d8f0565f1c4e74302949aa
SHA1ed0130dc0f2f2c2a3eeec54f90f17a4fc72c027e
SHA25633f56d1bf2c2c196793457a1d866bf750c6fed2091b61a31716933052f67aed6
SHA51208fea949b9b410a79a6bb48b7f80f48e280cb16d256c0eaad954ecc70997f831bd2dbb41588abe515e5d5c403d3a9acf432176a9427dc21f4f14db3c5ec178b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57506c9fdd85ac561f8fff2c433eca147
SHA17e75cfdc8ff3e69a99184dbfa5b00436ac753633
SHA2566397b6cb9e26bed5f24b1b78b13b14e48eba79e11fd04a41158cd888a009e816
SHA512957b29825ea9857f6a706138e0045b873ec315048a10096d81d5a13662b82848c4a9d8bd6f558108ebb31b90317eb6543596f993d2094cb0ba00be0999a1ec5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af8c94f246e9591d5bbe4c675d9d1163
SHA104a49d300e4835ee29d1f28a7f574382c91a7f40
SHA25616c5cbcbc1444c068ba63ac37fab4310498a73060151df1e32f493d37a8ee6f9
SHA5124522ba8151155868767e552f068bfe882ce731a14b9d9ef09e537feedb59ac5d96be8e046fa6c1abe53be094574906b7fefa6b9029e13691bd9ed4e490231c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5540283c337cdfdff5605c9e2097f3ace
SHA151018e70011678faa170bbd04b9416d7c84871b5
SHA2564c725e91c84458ba033a56401e01b6dca396227d4702a551572ca1b2ce12f853
SHA51262c4eb1642c57c30ff54c0ec3878929410f10289c572ef4f94d6c3cc59022275ccdd1e7c47a6a1e420f71b8661973ef6dac836bab8faaea6d9855934332949ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5de079734019cfc4d161716a8f347da
SHA1137f01d1ff3862e56743021a628c0e249aa2638d
SHA2561bee8446d1dbc3d4d7dcc5d060023aa666f4195e5e892482afda60624d1b8210
SHA5123919c0395ecea564879fc6f3c58c3034da96b51b7786c8490435399de0f55bdacef498c7f1cfc16843954ce30118c27a51ebe1b2921361fa57dffd66b1772fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9b6543211874c2a3dffaeef1cb82101
SHA13efabbc8d2edb066f3cd40bfb25f5d6652210eff
SHA25697ded32e3ab76ceb19b2a341023fe9a392f90d4b7d95653840a8aba92d381079
SHA512c7d70b59a96425fa22df372d514b787f13ad27b5230f5a6eb7502b0e8155b10d395a7c2ea958ef805b58e7b30cd5150135ecbc4aedf43ed0331d9c15b91c79ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9fe45189f3ceee279d19f47ed5a29ee
SHA1a241f5e40ab1c984b19581fd9d95636b38c7ece1
SHA25666351367f1d55a37d54220a1161a9ac0e63b248c19660f688b977261917b82f2
SHA512b5b567592420d4179882ee0347658ffd915b1579d4783614efacbca0663e27c979c887225e3fdbd1a2669f5f1a3262ba1d5af8ed63daf4e2073118c723c96063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cff2f52d8e4d6a4869d82af3bd16721b
SHA1f9d8dfe0d4e7d18df7bf47395f751a4086007284
SHA256e0f660dd2a0057b7a8b8cf0751dba08c9d58262b313ac30a73f12bcfc5bd90ba
SHA5122db4be5db7543845a266e357721474c957c7b5f11b643c59a2a83fb66999b9790c3c926a2814224aff53fcc5c0272ba1a73c98889ad8667768e2dbd590121728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d54a40cbf751fc3e85d4a9082cc950cb
SHA1271c549e7012febf8b44caea913872f7c93b9ab2
SHA2568b006c4aa98f6f2a3cf723b2f5a3b3f6a51e6b17ab7a90d81dc22037d6bb5fc4
SHA512ef846280eff058c69c9d099c32e3d51a2f51a92edf2d62b694a81ee07601a4875d05bd319217284cbdca9810866d7dc7349b6c7d034b66ce909375eea876a598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571b2f266e2fa4bae5a354b1938220597
SHA1ae97b1400961db6efbf7b0ce9853d9c739b16bc3
SHA256e6b53c5c527f8bfee515f2728b0ab7408ebe6c1868d78650db6de0058ba67d15
SHA5122e0671af5be1c289b0e7c7a0ffc45c84458aa1947fe95ef51f73a6ae61e5779fb4805d18afe569ec9f2890d2bac715f427c42bdbadddda8a9aad14f65d186cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d4cb97b51288cc8ef21a5eedc60485d
SHA1e8abaa6663cd01d0c10186d5640d9e6b7eb1f799
SHA256e46eb9492508c0d9535ea7ba274f933ba4be23bc83b6c71a6d708ea652f2ac73
SHA5125c16b0a32a89c1c4d2d74fa43ce6a32f3e3c468f121446ed0abb159f52ad241caa2a5b78887906271cffd713a200f1854435a9e4b16e92b23d1814d24648c73c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a808ac7c81aef300a963255b35139d8e
SHA1efe00d47b90d21c6b9f8da1703928cca3b1da0d3
SHA2564fad83ef385141d689f0769865e3ad4470735ab0cfa326ba6319bbaa83d98bf8
SHA512ad8a3713f79e834118ce3122748567635ede9a47bed33798467fd545fb6042f035850ca2d064cfe67427aacacf548ed29aab73694022d5b266e78b047502da62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee5e4aeeee60b578838c8b64fc4703c
SHA1585af080fc172832a9f63bba9ec9041ff47bd5cd
SHA256de20992a39ae91568c2f3b49597060769009a7d241fe104a6b41a98633f3553e
SHA512e23295192b6554ebce51974d567c04387264f076f584d5da017670a279c1239df518a2f6fe383cfe8b8f58fb127b380b48c6acf62a62ecfbc85515cf28c20f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57735edd7de04bc98e10331e70796ba26
SHA13f3d8fa5d56f47008804445f3af93e63e36b0ce2
SHA2564dcf96d3640ce1ca75d892c06543b7fbe95640f3162c08922299ce00edf3e07e
SHA51240b92f0cd2c51484886e2eb586dc10392bf8b068c6d9c8d5624eee5e8d953e77c615f5f0161145abdce358d024d098b178d97d4d5a5d3e30176d855c91d74b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2532844f55d6836d699278bb495a52d
SHA1a8530782e473b263c088dc9454e94fd89f59c75a
SHA256c1ebbfe7d812f52766ee68bc790d552759eeac7ff676b3a200ffde1a546d65d8
SHA5121bd11501cc9a1d3a22cb13950bb84cdfaf6bcc7360e59274752abde3f7dddd3bcc4cba120b2017d82b894cad9659ddf348d7bef55d8da3c603aa49db7f5e86cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b9af438b1f8e4f9bfa81dcf66041f4e
SHA19b4556e7639e283cc4db9c911f3c94bda647bb90
SHA25622470f8209748f9ed5b74feae102571fecffebc19298a9302120dc58f613ebc1
SHA5122357a0ba1e73c348787cca4a7316249b3eb81a8768f0ed1b0dde1e5fcb2277fbf186db7269fdd3ecea93d6479baa1fd780fb16e8a3e4421ad6012a616dcff58d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513a5d2a2304c2d9b059e4d2cc0132f0f
SHA1918b9dfd49614027f2dff7edba6a9fcac3880388
SHA25638f14fad1c1fb8c84991728a8c17c321bfcd3534fc6cec6c891dea0f77413787
SHA512d5c77e7db8398021504884711025f9f753c70be4eb4a72369eab247563a61f3c188c009154e975abca5fa55923bb8b264afe2041fcd4c06b89b374368b6858e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57de45ef9f06696e5f52eaf8c29365d2f
SHA1d4c3ac758c744a9dc809e8c86392234edf230ee1
SHA256275182ea0dc6f07a5594dd2e51e07ee5696b85b989b686af9622623947504771
SHA5127c3f63f78b980a792d5bb511e520f7426a1b700693508483fc2b16c02b20863a54424bd3b63f72b8baa9be0cf4aa26ddc6c096bc9e77c2a89bf9deb661cebab0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CXRG2YQS\cafd83e895d821e4ada3e3e38f93582d[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b