Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 08:07
Static task
static1
Behavioral task
behavioral1
Sample
0eb7b87df6b6ba1a20a2bf3f808dfec5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0eb7b87df6b6ba1a20a2bf3f808dfec5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0eb7b87df6b6ba1a20a2bf3f808dfec5_JaffaCakes118.html
-
Size
53KB
-
MD5
0eb7b87df6b6ba1a20a2bf3f808dfec5
-
SHA1
a517f37be6b66a18549327715606673730e80f53
-
SHA256
68e5d263488b32668b61662c80971f7c46410068bba9ee54f55634deb7dd60a1
-
SHA512
bc9411a3e3140913e3af0182f9409b2de34bc354d164a509c928c3ec22058c952773372a1b0f73b9ec17de4339ad4f00777e79b3e4f8459780142c0d3f1077e4
-
SSDEEP
1536:CkgUiIakTqGivi+PyUXrunlYK63Nj+q5VyvR0w2AzTICbbZor/t9M/dNwIUEDmDn:CkgUiIakTqGivi+PyUXrunlYK63Nj+qn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000029d9f50638841b409ae11edfc99b51c400000000020000000000106600000001000020000000888044aa8bc89e54bb07e9f49c70ea53ef013a529a304428dbbd18a0e221d905000000000e8000000002000020000000a881883d104e9b666b6f3bdaad7f46206a584cfaf75604fdcfb498e63f3fd79a20000000fd8aa4cd2f10ce3db847d5422efbdc1ed5e33accda436bfa3b7bdf61401179b940000000fb56771e2d4f05cb7f612b857c1d3e75749a4425fcc1013f7d50e4c443a6e906e78bef44646576bf4dbcc49eb81f76592ceea599966b6b3001b5029a5723d361 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434104723" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C4E9D71-815E-11EF-8EE0-F67F0CB12BFA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06ac9636b15db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 340 IEXPLORE.EXE 340 IEXPLORE.EXE 340 IEXPLORE.EXE 340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 340 2716 iexplore.exe 30 PID 2716 wrote to memory of 340 2716 iexplore.exe 30 PID 2716 wrote to memory of 340 2716 iexplore.exe 30 PID 2716 wrote to memory of 340 2716 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0eb7b87df6b6ba1a20a2bf3f808dfec5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58205b07e27c408eab8a889fb3a5552f1
SHA107963c6d51a368f29f2fafe7b9237c89025804c3
SHA256a719369c3a40bf5878e915a79230cbf69d68256e7bf044f9ff671b573082b841
SHA512444267151b561d0efe3626c1fbb6c6f3578dcb1cac38d6745ce27854da3e2ca82310c659efa26a4106bada297e3717c4f7614f0360b28b4c6ad4501e4b81b03a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9d0838635248ae7cae82a2d0f49b27d
SHA1922e5af5f5bb90857653cd5d41cf0442eba54af0
SHA256122c5a53eb781d26c03e23eb808ab02f791029801966ff2fade7d79885359310
SHA512a6b2b0a71a7f16f45824775a661cdbbe8d9ef144512144dde94e2bc5a179c2288a7839ecb383cfb03bb303cfbfca5d1b38d34302d1676a281830bc78914ec351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ef6198de1813b185640852896e8bc51
SHA1d263b74ee4425c35bc0dec128053a62fb23c596b
SHA25638f156555fde862ad1f9086e6de8fc85e5a9185db4bac5b8c5c0d6d1098a5e45
SHA51216df7a4f7785194399cbc7a4226f3d9ff44230909548c31a151f9881d39fc71b127f7a905947a6249e07197d605a29a23511846406ee0f5305c38e0368c1d44e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba82f7cf72a7a7cdf29c536f3e10d248
SHA1b08757361afbe801681cb9b745de9c6eebe8f04d
SHA2567c330281d42b9bcab6257bc49c62bfa008bb7739dc2390fe823ea088aa1909de
SHA5126170b49b732db68dc4f07818b90bbe46dc7ac852f8ee28caeb91021236006bc0d96d27f269dc9142c6610204ea4315143c7135b8ce426887f3eb922500479e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c1bc336e89730f8cee5e952672eec84
SHA104e9e761f338cf7eb9e9ca829889cba71a42ed89
SHA2562b7792f6ed96a57275c3822d8b48ba3317caee4a40aa003bcde89b65401b6f9b
SHA51284b0d489f2644bf613ab8defc14c1cb92e94f894a8156ac9209470775e870cd241f28d4683df99362b2d216871599ad27a16b008133f345bcd4283ab9e1e52aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5b650d4a6e3408d89b875ffc5ed2bd3
SHA1be368440f24d75fa024f3f6dea762b01987537d9
SHA2569aaa0b86dc57b6faf711935d7383735d8c5ca386f1e1b3a56fb9d7289f40b3f2
SHA512409eca85c910dfe204865c2af8664621d250523f708d6132a783f023604fecd43306641ff95057f75de831e966b5ba4763879825071714a54fb2a73ba89a2ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6143e7cbd742c1f4d3229a364493b50
SHA111cef6626ab19d04809dffe04f321d7577414696
SHA2567aad23e1ee84627863274d59f4e0b01bb290102168c29620634c5becf393608d
SHA512043af93d5da83fc45415ecc0cad7caa3a8d5f7f4b73a6c39ab77ac83fdfd0045fbf063ca82cd3039cbe3ac4e3e7e747acc5d663b223caf4c05afc4d709575e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7b3e2933223c62eab7a93cd50e6453b
SHA1b344c669e599656236b56d705ae5776e39bde5da
SHA256bb45bd51f282596648a43e329449a2328665baba9e2b10d07ca27c25a5544127
SHA51273615ef11dd908a089b676833bae53d966ab68159b72faf7820463428a731e90071a33a6f8df1dcf17b5c720bcc25efdd16bf454871620d435ebee43de6fb080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa60b39a6d011180cc04b1ed3875c5bd
SHA1a66154c2352664241c1e01692fb764c4028bc5f0
SHA256efd5b63ec04136b2534c895975f07d639c06141fe2f80c2ab2d0c6429e00b6c6
SHA512e04f633ecc0103580c68d9b3eae4ebd9b99826a1e92692f76b8397a686b6088529f16bf9f3b214d580fa775dc61522106751e3186e51968ec41fed883493692a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522c532499d7169b04f0003be2714b68c
SHA103f9b2d14e0126fee0e9c01b5e91c1479d5f139f
SHA25671892871b9cbb4c76e4d4476c75c892734a10c83f2bdd1c759315675a234c81c
SHA512c8d5ccd66d570e43f93b32b05de4ea63a43171743037fe7e2858d0e69bdbbab8a65df61100883a0e6d75dad51cc3bf7ed1453435a3cc2bc9ba6fee5c347199dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c2cf31addb797c999bddfe9b46f1d9d
SHA1542038470048d0dc975872c6c3cf426a4413b161
SHA256cd9fe7b8dcebd312de249ea0acf5338960b6e46a9ab8d65515f7f7e50ff4a90f
SHA51263afe6ed8b0cd91bdf604d47f9ff1b6e89f2b9b0cd4a8f7a1eb832830c8982c130ea035bed491cc296a7ee7e9f0052827cfbcb715ffaaafa6a6f6835ce1ba49c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f49c0f1cb90440403405189206a35c2
SHA152c019369b5d47e8c5dcd9687d810da81f8c3ed8
SHA256585ba8dac05b444229858aa693ad0c072baf427771530c6587002b2c28b4ba40
SHA512684ac5884b34464ad0e2a7a0121d7135a1443800042cbf5b0c3e2cd6b7acc44f589cfc393b3a44e9699b15a1e4e2f1057acaee283f509af8dcdf84feffbfc497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f3597a27bad9cf930a96764fb063e1f
SHA1f3f67dde3ac7b56fe88a945c68a021c502dfe4a1
SHA256ef3f0e6e274aa290a91a984a28f39e9a5b830a38ca1e8ac9971189b4b549e627
SHA512e5ebc78f9f4475c696b1b5423999365a8c19b046cc0a04543a8627ebae2fdb361b318f8104462e7c6da970852786e15fd67a89d01c456027d3903432e37c1196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5118306e7128324c2ab2d803ebf8bc822
SHA1def3f855636de026621876af05f6434b83c5cd90
SHA256624df1d99d8157b3ed3c02b098afe6b3e6a6941ee1b2a5e7de0495ecfa2c25f6
SHA5124be3f37c9b72b70b39658feaf804c12f10796f19b152dc91afbd947db4d7d4d5d800f3f294f7fab474d76c5a18267a972c14de7c056253e6a1bc78e01a91a321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a67e9fa8f3f8f586f94fe042c7f22977
SHA1f857a26f87d8970c173992767dc95f426d909025
SHA256043a7d5e041218cb5f85b8a4a115cc4216ce36d1b2ada264ce28d817542c2755
SHA512e11e7780b3ec71a8246df5e9a282ea6bd8d94cd4aa941f4c00bbfe087954c0b4421a1514261132202e8f15cf86b4a91f53ead1c57f35926d1b6585ca7e768bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c070b1e55d91aab36db0182a58b573b2
SHA1a34ee9ae446aea9b8b6056fea86be514e38e8573
SHA256b9ffdf777b9bf8bd9b28a4371e7dd801effc1aa6e9e303c8ec14753578bda00d
SHA5123b9ed368065066564ca3afed71863b3fea4321f2eb155cb58e22b928b03c575c5b84e6cb4be9478efab4f95c7ab3171ed9e991417536fa48907bdfe4743c4b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5764d5cc90a626782fc256ffcb5ad7dff
SHA1f9a6851ef33e098563bd3a93f1289feb9d0cb479
SHA2560b6aab1ad0a85ff013537aa0817ab760a8ac70c21310956214ac5500ac43942e
SHA5126419920da39ee04070616d6c05da8dd057e58e1a6dac8ca546b622a69ffcf3f80c07d27cea1957a2185fb4cd45ee6fb4221a1a4dd2caa150fda371082e98efa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c356c2042f3dc6e9203ad2e09c682bf8
SHA183298d229de051993fd4d5782fc0398db00f68bd
SHA2561f71e5cca2feabdd8515670b8e91fe5e0b9214fb2921cab744608a97d3dc5f34
SHA512241b0b2a6b823f9143cafab272a9188517590c9c089d1a4fe1e0c24874065901b0c0bbeb1af39984d5976778932a3d38be4ac9887db7e30bbe505ddb1ab8a4fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ae947cc1aa27219bb26fd2dc1206c8f
SHA1db762b6abf2119bc663f41c7e6466a4305ba9078
SHA256498430104f2af7d4e2d3d47a178db6d0a32ddea82907b8762243a9ce1d3a4637
SHA512049f0d43ab5e7ad1316b577dbdb1f94f49bdfa446b7ed93a165d0cfbc3483c40b04e018c96ee521bfd8af2c9abd4203ebfd5bdbbd907f52da1051e06185f15ec
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b