Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
257bd03c3b55fe46ef63d44a1d26e334_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
257bd03c3b55fe46ef63d44a1d26e334_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
257bd03c3b55fe46ef63d44a1d26e334_JaffaCakes118.html
-
Size
53KB
-
MD5
257bd03c3b55fe46ef63d44a1d26e334
-
SHA1
c3b73a5aadfa7463e722a271a5644f65abb3629f
-
SHA256
b6f4a2b0884ffd530e9e4192a1cadd4adbc9b7964e4044f03858a2cb6fadb8c4
-
SHA512
1940e1e5a42f816d39ba81cb3199b66a20fd023a2f5e4c5fed62ead5f4feaac2b733824de5f048b109e34cd33823751066b4121474515f440c3b09fef6659fd9
-
SSDEEP
1536:CkgUiIakTqGivi+PyUVrunlY863Nj+q5VyvR0w2AzTICbbfol/t9M/dNwIUTDmD/:CkgUiIakTqGivi+PyUVrunlY863Nj+qe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a0146e54b197924aa8b3ff3af7d1869900000000020000000000106600000001000020000000d9f7b034638182f0e43b27ee2751930d38089747a9fe5f52bad20ecd68511092000000000e80000000020000200000000b085c84b7ee67df75ede9039f502ac265c8779fd46d3019b1970b5ca548bf5220000000b7da61147349771049308e2147859ee82af4b365840c7e26499f240a9437ea8740000000e5f341b9d6223dbca572615f841c135a33b1bdcaeffbf86c61d75236763894163c7edbdd2a940312d137599d5e65bbc896c93dab72f94c55b67ff427a3ba87d5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434605326" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1AFA6401-85EC-11EF-873B-E28DDE128E91} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 802fc5f0f819db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2840 iexplore.exe 2840 iexplore.exe 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2444 2840 iexplore.exe 29 PID 2840 wrote to memory of 2444 2840 iexplore.exe 29 PID 2840 wrote to memory of 2444 2840 iexplore.exe 29 PID 2840 wrote to memory of 2444 2840 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\257bd03c3b55fe46ef63d44a1d26e334_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546fe35787682ba079ed668067d56b6f4
SHA11e896dc5a9cf4d7854be8daef50be88e486bf5b6
SHA2566bfb09100bc8c8ced3093b761d075b6e0468f469d2c1fee5fcc222d845d795a7
SHA5125ccd5de71d55fa567615f84c383842b9219934d3de455305df025f6e8b71b51fb175483c90cc297b4ea48fa36ffbfd7f2da15830bcfe733a48b0618c1c7f1074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5466f88c52b1cccaaf15aa1eb193de549
SHA1ff597016aaac521f39ba46fa33faa53a9c302f96
SHA2563be217407b086fa4f0f1d48738a0a2b50c2c60cf22df5826f856c04bc407a82c
SHA512a3e21ff27c65c843e55064b00ff8f6731a132eb3a0eaff95f470976f650aa39982005a45a6ee4c238bc5973a7bde02521eb34db8086b1db4070fe8a5ea908e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9f9c86d4bffdcf91e09424562799c8f
SHA103455265683865d6cbb1b440be41d6dc41a09c2d
SHA256786180342fd1da13b6882eeee828685ab2133a8bcda295c9136467acabd0fc48
SHA51208ad16e82a8afee73ad163adb32587e07a47ca265cbeed9211224a662e520a373b729ead6ac59bf2974ce5f568d7724b6ec7cc8c3b771b9c482a8392a727e44f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eaf2b79a56f9448fb004a2bb54d66af
SHA13638289595eddd768774eaa2b53d366d05b72151
SHA256e29e21aecaebea7623876270086ad09ebe071e2cccb6a18da4e9f51106153551
SHA5129161139e1e07c078fc646ddaa680325dfcc2289c21a3e92866d41675fd744ccc83b15a68bf90bec2f84e2df56637bf204447c5c3628c82afd3f361f0ab1c972a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528ff7bff9809cf7b5ff77f03245f659a
SHA1572fd9bbecb5208b488953b013e0a6c3786da3df
SHA256964743523564ea248b07ddb2c78d5f01a9a079066960886857e4b791808af5c0
SHA5120cf303e1a71f3f5a9e4d03e7c24c5c003eaf01a922febf0696219d8beef7121369012177d1715e81955429a174f0b1ea02abfba0539ce553b204170a821e703c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a92411953b8a66cdb2f209ea998ff72b
SHA10fa6b194a2084d1dadf6ec0a5b1ca20e38cda905
SHA256368e0926ef7b193f51db434a9f016d08472e85901711f76c38a436cde8ad32ae
SHA5126fe3df9d8e7b9f6f03f9396b795a68bf5ef4d5af6e1563bf6016a2a96f2176861460ed98010c7b9b566d5e9506ad94d8d3216640bf2e78daef53a534a8e08516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592da8255270af21bd5cde44575862662
SHA121771582da602b4fdc45bed51628c685bca8c470
SHA2562f70ac65e57031e8188dbb23259a8ce9d8a6e008c5f43678c6cf95e2f88c019c
SHA512f5dd9ed9e036ecaa98f90986a481d02a2b354c29f539654fae7d5dc385f6da21b9d66f00a047e304ec60bf14f42f096db857d4a736118265fcdca26aef78b836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dadc8b29fd698eff310b5b925536318
SHA1ad23ec85489ff31c4abdf483af9d221e86a5e9fc
SHA2564de4b15e1e93d6c7922bca951e7a296b64a00bd94a89d90de8b61e89bb38ac75
SHA5125b63f37acabb475fb0707f7c15c31fe9c9105fb74447c58bf8f1daf49c976e71d64bb35154262f0446acf95a3a17de23bfa9a7a78c23944132f83e67a0f0abdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e689eaeb1145291c20e79ac2acc726ff
SHA132b815cc93ee38eee77612b5f96c46849846cda8
SHA2562aa0fe958217032c0845efac4775ecf337d40f01db72c54cd5a8343eadac5a7b
SHA512036cb35094e4673cf9019e7a34f6e397a6c0f77dd165b34aeebfc9d2a85c37aa9631565193470d8d28e0eb73893e0108fdab243c7b988152e6b5a25a6ecf33f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51edf4cd951e9022e553c2ed759b3fce1
SHA1f0cab2c67800190a84116c160afbc5171443051f
SHA256f9ddc2aabfc126463de5e3f090457e295dff13ca1a4bd2abdf3fde7aa29e1d26
SHA512e0465d62da7ec0dd1ae9db0027dd4274d4b61476cc32bd26f240d23fde7a15930bfa52557948677f7ee18dde735c489d0969da0e26b3a7f9f975fcb5e0bdf4b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd6c95a884dd1a1ce95dc69e4aa48e8e
SHA1e324130f4bb410a95803646da1f3acd370bd9df7
SHA256409f06ff0baf6c868769a3760ed46968f733c64d57ef5168308fd57e211ef97b
SHA512ac80438b8cb97428735635df91dd37b2d568f1c7e3a390545704f23a96a99df3e46d898aa6adbe56078657c13f6062f79ce7d6cc48ac3375f3a54aa9d1e44ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520ae31ed03c1491f935607c475053630
SHA12cc521c6aeb8fdd2dfb58fbe7ce24260f0267a84
SHA256264abaf0a14e407c3f199fbc50ffdbed5cd72e138a37c46f62e0181e6555d524
SHA512e47ab0460d09d4b3acef41d2974bbe97530a67a0528d03fcc240835a62c9220c1626762739b1910f0385fddd7440ccd012d3e3532883ab518e757ff490e4d6b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5258258db0f0031dce6f1ec9e79005c29
SHA15eeba9ec9befe9fe2462ba3d82a47ab43a9b49e9
SHA256e733f2fa038d1ce9f1b1d20390b79b03801caf287891e1ab49f3fe3bc5f6b525
SHA512ad978a7489171c23cbb40ec1f9874a8244debd39a9dea35b28686a1610d3febebe5dbb3a6d3cf72c460aebaa88717b67b593e4d6bd6261779f1727fc1f649a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5099f994e805707469d7efca59614de8a
SHA1e6462ac76a0564ce3593c6c1ef0d431a6a02d401
SHA256410def2db207ca2551cdd70a2ec0cdda773ff9a7900bad2e2eece8c651bc8d45
SHA51240bcc4d753bda804d14a925389eea87ab0e6fc737513532b4306f9d754c2a52ae9469a62dab212b73f4f161abfa7334c0077681ed82844ce10a68fb4888b682b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c613c40558045d8f286e88632966cad
SHA191ce8e33cc33982413ab3fa6ac3edc7a872c2604
SHA2562e67c9b6463b4f15513998f94e50cb95d7687d46de2c8b0d81beaa251eaeeb3a
SHA51262568c31ce5780575ffe61172e3272741ff80e751941921982b360b3da63de0ab9cf1b0ae69a46804f3a285a049ac193c6cb1231d3e36cd278737c903fc5e183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a00b99e22ac44b100897c68d91451d59
SHA1a8b484643df27490c6176a794aa55f62c3be912f
SHA256f5ac1053bf1adad900c159094148c5c81d2b9b44f8135d6dce1f35b79c310a1e
SHA512b55430e06ec480dfc8248328e2fdcce8e4f2bdf4ae3e7d404a6169763d28fe43b084a24c9a64f2e96438b7833a86b99fb1a2528b73e2af5ec700483e24661b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba57b6d9e9e0a2ea703769af64474eb8
SHA1505c257928bb44866401a5272abb0991f10c3132
SHA2562c890b7cc5db5e223d028b331cf727f19ca6a5b13e50a9b6587283e74d7e69fd
SHA5129ef5c53cdf4c52b7cb3f871c381d659b0721015b0d94316ba0989a9f9e1a97225f51cd51e35f0aee19dd977c2a14d89fc35f4a4bbf38222d35a015194684199e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4906ea218f28f6a068160d4e0c58730
SHA196ccba8ea3fee74d0e8ec55cf9cddb9cb18a3f3c
SHA25622bafc29b99aae18f056f283002382a6f952cb5e8615f2877b44e46a81c3a626
SHA51227176106d3208b1d9a06e643e1b0f599fc0cf7559741ccf94c70e1d336c3e739893a929f1fbc5c9dc6fd2e897d0a96ad866da00ff87ef8cec8098ed014a68fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaa9ad1bbe1912eb1996977aac1b5199
SHA1b46ff34e619d7ad15e9d17897cfae105323ac0a1
SHA256d3c80f676dc429642dacecac3fdbe4b81d0367e092edae7e9e2d1d2ee923def6
SHA5129be47acee299225d1343d44f861bafd5aa82a9843b393608a8134c53371eebbfc009522c2780bc95943121e9a078e924e4a80a89055d997bef23ecb2e64c0765
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b