Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
1376d4a6cb6465ef41dcc6417745eceb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1376d4a6cb6465ef41dcc6417745eceb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1376d4a6cb6465ef41dcc6417745eceb_JaffaCakes118.html
-
Size
91KB
-
MD5
1376d4a6cb6465ef41dcc6417745eceb
-
SHA1
598fd20a638feb404f156004623fa945a57eda8a
-
SHA256
64554b80d18ecf9bd9583b24517e55e3a583f239d5acb9d080000721a2535c1f
-
SHA512
2494fa9a0f4dacd84b61339ba1fa571140f4ed1bbcc3073745c7b35e0d448a6308540595534aec3d5be28eb75f42d691a807d8e31bbf73942f8866557eaf176b
-
SSDEEP
1536:gQZBCCOdf0IxC4gYai4MOS1/N5QJDaEnIQsu1yMTSaO5xmVCQw7f5TYvuRpDIxmP:gk2t0Ix/zPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000055c21ba95cc4d2a4adad73b7358e71f0ae067f2112c23eb6c368319a7de26b9d000000000e8000000002000020000000e31dde659392bf1b2d1079391d611b8cb4ccaaf0efd731baaee4aef59e473ae120000000c5001dbe258cb03c7e9fa36361409aa64fcb62bf699bfd722d145b9677fc9bd940000000a27997366b5a69e16c4fab5be9f47acb11a08c05635fbe1d4205380230f82861b064782b74b8d00cdeb6c0a6c5098df498efac51e12eee73ffd8747fc1a0a296 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434208870" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{08BB86A1-8251-11EF-881A-CE9644F3BBBD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606e48de5d16db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2608 2848 iexplore.exe 30 PID 2848 wrote to memory of 2608 2848 iexplore.exe 30 PID 2848 wrote to memory of 2608 2848 iexplore.exe 30 PID 2848 wrote to memory of 2608 2848 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1376d4a6cb6465ef41dcc6417745eceb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce9dd7a5bda0e17659811e283985b2be
SHA142f2365bd6b07c6abbcfb0744e43c68ac4721a54
SHA256276bda7ace5eb6dd9bb5901a6cd0980d4fa2522fb8ebcc23fb96edca3f919164
SHA51236c4dd7cb6fd2515aa664a61a1806009ef2dfc08a7df48f35b87810f188758aaac08726832697642e74eb88a986db2f2e401a869b230a3aa71a46730207cfefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5456e14f1b03f9711f0d71e1b5750abbe
SHA1a84b082d69fb4c513a9a7683a06a643c2a090985
SHA256fe53226e70843e9e68169c02ca78b5363cb08bc90d6b03391b49fec0f8150b50
SHA512184e7ac423335c7359c6a1e870725f6b6755acf48177e526df80e3384c26ed72cae2ccba3f9917f7ae41c10a34aa350c09fba0029233233e4c2a6a9374a74a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca7d199623aa54fdafa40c2b41d37990
SHA105f5338118878be95ef618b5bdc88f8bfe99eb70
SHA2568f9713c755d194b4e99cc197945ff4f29074e307a4d145a435c41b15f1dd5d3b
SHA512ca8dcf4f9f7a5fd17c1f4d20e2745563706810668a1aaab0d7d426893fdc8e2cba5e11bf01929e46432a684be6fe75662a25b6646b0743c691f92d8a2f5e5ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c441a0ca0de806e6dc106781b685bac
SHA1c88921377ead126495dd0836f660815fed9fd19e
SHA256800449d983094dc7fe7038c66c6d3e6f7ef788ec05ee51a86024232444dd476f
SHA51257441bf0d150588a16441d84c9f087035efa95d93de742be21f1d15b87f1950e1f48319ec335ee2c01c9ae7c8fd0094fb1990cce1b4ee020f68c0bc0818d1119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c58363e649e2fa76de6e24d96ca5afa
SHA198091b2ea88c391f2fd810afe94379630f5d7523
SHA2566ab955984c3ce2181e67c65093eb716df4f4a4efaaea0c8fd6ce4adfef3641fc
SHA512fcecd7d44e4b41e97f365af76003977f447e94d228e4b4f9634b93d54155be6589cf3ed5b1e02e670d4072d902085636b7fae79c7153fe687937cb09f11a8739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5152a84e5e92213bf151196dabb73285e
SHA1f9fdb806dfbf84850ce8aa996dc70ccb1bdbf6d8
SHA256a14b5c1da4a067ac8a38a6e5ce0091ee6bec6af40ca372ef3fd17467a9e54022
SHA5126db70f6ee9801f34f059ce905045258fdcd4e6affdb8f3075f61b4c585e313539a6c5b89625c48585996d0e4a081db3a6f118a89c9785fc1a59b6bcf56494d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5415392f8eed0b16862d88b719332e321
SHA1d93c2b1c58aaaf4e9b8e1b2cd1921fa055649c93
SHA2567d5b1dcd60ef6c8a7a6ddead8e0dea104842531c6a88871ff00732e77fd2dd77
SHA512ac02ac6e1c7e69480f13c0de2ff809cc0bad9424d6dd2e1b46a75b5c64bcab82a057e3d2cc1fe9692bc52e50aa0f393b2b8a0092af52fbadc6150716352d4885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ca94d5f319ca5ddfe840e98a026e233
SHA1519792dc45a9f08fa5dba3f80ae1060cb6d81328
SHA2563b9da381fa8670c8337e473fcc82313b6c0285f702d54f958fbc5a0ffb847c5e
SHA512ab0e753e5ca008530ec86325bcb42bf8563b354d3f82ffc5f1893983ee22dab76d689bbc86060b78bbec3c6091ed0e7c292b885027995606d0b06b5d13b64d69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb301fe5bee85267f51d4ad7792fa554
SHA11c810f86b40d0b84873be26699ec50ec694ea55a
SHA2568bcdc058e592bafa050559e3fc267c4f81a116eb09a2117a25c6f42b6e27c3ca
SHA512be4d76b3da20aebf5680826b10f2d3c3d6ce9d9979c07d46c1ec928a235d6e97cead9c714ee2ef64689e8f6727dd122ebaeba9c4db572f7c7713a1bd0ec79462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5666de2f1f9f6d36e37b1023dd96566a5
SHA1ac732323089634f426f684627b1ccfaf07dc6626
SHA256c6dbf6c63f90ab39adbe33c0bfd1860f53d18889c12fe2db8519e8c7976c7290
SHA512faaa223cc5dfada3c60fc9279673e130e71afca6144ae0cfba191d3f96c28d49d96ba7248d293f08fb3ab9889c2590669d95df88c8313a1834d71ecb3ac8a1a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5578b21eceb9ad8511ed08e3daf2542c7
SHA1dd353f7b78306a7135562ed9467cf177d621c607
SHA256b0db890f170c8290c8e8c3b46c89a19258abf6dd01060f959c151a56db52cb72
SHA5125cee243474f64fd3dea416ea8768e0a4a38452d40b870de7a2933d6d89620c94f62623945c21dd5a718091b5360c485b1c2b184f3c98505a7ea7d61688f1a8f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57542f8d141beab6165d06187eea63331
SHA1530e657c6e366116346f0df43a4f96dc19846831
SHA256f8fde5bf3cd7b1ff4cf873cd9f4ca1a6e98db6a39323f4db37e45cb9fd3c8688
SHA51219593638ebe0453a4c050e7acb08ab683275d316b6570b642e354334e54961748156732f7413f26cde7d47042d5cbc073f1ab949417136be40963744c5b4f892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a7ceff5bfc9fe8de33a8aa337e9b7e
SHA1b5062540ffe946f0e31aa492c118667df6e18564
SHA2568d4e46a9a7c16e195dbb551d49447290be55582805df86fcd0bd0934d3f1783c
SHA51265053619705126374137b0d2113ec3d3b27a8cc65e08f0d3ae648c330b8b6b63f911d9cf309b3fdc1ce8bbf7b8aca5fd3d76f0e63219e103a4c1e315ab0aa0d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a6bc3dc77def448d7cd20f6c3060e61
SHA197ac2adca47529a92ad318d788b03bb5663afbb1
SHA256396bd7792729525b708f9840698f5c8c4ae5449d5e0e33716b82e862139bd61a
SHA512af0c960b8f7acbf9e48fb83af83a13ee4d183d8c20fbcf2be8c3e7ac031da492061a1dba2dcc2452fc7d0a09d470feb4f5e4b6f1e18dcc84f60fabfc19056f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b38cfc9f7054bef998890db01d67f6ce
SHA1b3e2b56527198047c03aa59e86a4b652eddc0874
SHA25681a55795dd0eb71eb9aece58f565946206a6a29f7e44f6f060fbeb50fc355936
SHA51298f631b646ce9fc2ad30c9e35b6f13cfcabf3dd6d56e3564c4882f68e2012f4bb417059336b45ddfcc25981b11f63e4b130aa666140f43784e9b0a3e61636b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd8019420fa5279640007d1ef03cfaef
SHA1651a559733dab2898cb9c2d5c44e9f4ea2bc4d4c
SHA256f9718c1dba101a05364e91726ae80053530acefc92a328e218b38434c326ceda
SHA51230426559f82d1664294503acd1ff305da4e420940b41ac30197c11942436abd710a970c3a1f5cc0ecbbcd9be166628e6960714d83bbb688089574fab87dcfa1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50550108e465c954f6a8b6b918063d844
SHA14020f7d22130c16d59951ac696d6ae18aae5828f
SHA2562ee5bf60994dc36712365160eb73a991cf6e8589742b413f2e2edaf07c8f628b
SHA5120f60e456427254bc33b8294dbd9e7e25635eaf9cb41128724bb90686fc61d7f6a18763284c579780b7221cd5b7f8278988043a995576389cd77b4d6be8856eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8e638c9c2d5af7d070aaea94a855bfe
SHA15f894059588b635a6ef72fee5ef3d1230856e2e5
SHA2562087f328e5bddeee8361423a610c5be03eb1246ba540acf12c3111ccef8f3612
SHA51293d44fee72d38481ce187da727ccf018f83dcb6b0bb5773bec909a33575e2def50dd2467a8a3c0693f3b18ca9e57996d9ac8a9358499a67b588ef031c504865e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a61c7edbc82bab983ce91f97fa6355a3
SHA11600202518b38b32ec6ad8f609e660af07641114
SHA256670a024c8cdb2e5f239ddf60767d2e490563168eada3eb6d84cd7cb8f6cd3dc7
SHA512326e2b9b6baaaf0965038d81d7094d3b1ac06e97c0cb624265089006d84b27521186e8b7445ce754f6af083d2bd07771f59107c623dda607852798c982900c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5143bf64709c56aa1999ac2b6a4f15e74
SHA135637da6ea0d2a16ec241ad9ab859c4b1484f51b
SHA256fad1c4594f29c725d46cfc81c7d6f5e21c6e4d9d38d0b2dcff493b991451dc02
SHA512dd4fe8a1e537ac2e2b77ffb9063d748ecb57533c0dbe9a6625fea2ef2cc155f1b77cf42698fbca0605b9149a936a93df26a64c54976acdc9c586c81e88a7e6c3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b