Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
7Executable...ce.url
windows10-2004-x64
1Executable...rd.url
windows10-2004-x64
1Executable...on.url
windows10-2004-x64
1Executable...um.url
windows10-2004-x64
1Executable...ub.url
windows10-2004-x64
1Executable...te.url
windows10-2004-x64
1Executable...e).url
windows10-2004-x64
1Executable...ub.url
windows10-2004-x64
1Executable...er.cmd
windows10-2004-x64
10Executable...TI.cmd
windows10-2004-x64
1Executable...vc.cmd
windows10-2004-x64
10Executable...ev.cmd
windows10-2004-x64
10Executable...er.exe
windows10-2004-x64
3Executable...ce.exe
windows10-2004-x64
7Executable...P1.cmd
windows10-2004-x64
1Executable...P2.cmd
windows10-2004-x64
1Executable...RS.cmd
windows10-2004-x64
1Executable...OP.cmd
windows10-2004-x64
1Executable...NP.ps1
windows10-2004-x64
1Executables/EDGE.cmd
windows10-2004-x64
1Executable...ZE.cmd
windows10-2004-x64
6Executable...PT.ps1
windows10-2004-x64
1Executables/ONED.cmd
windows10-2004-x64
1Executables/PFP.cmd
windows10-2004-x64
1Executables/POWER.cmd
windows10-2004-x64
1Executable...NU.cmd
windows10-2004-x64
4Executable...TH.cmd
windows10-2004-x64
1Executable...ER.cmd
windows10-2004-x64
4Executable...00.png
windows10-2004-x64
3Executable...rk.png
windows10-2004-x64
3Executable...ht.png
windows10-2004-x64
3playbook.xml
windows10-2004-x64
1Resubmissions
25/04/2023, 20:18
230425-y3j7yscg23 10Analysis
-
max time kernel
509s -
max time network
513s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 20:18
Behavioral task
behavioral1
Sample
Executables/Atlas/4. Troubleshooting/Visual C++ Redistributables/Visual C++ Redistributables AIO Source.url
Resource
win10v2004-20230221-en
Behavioral task
behavioral2
Sample
Executables/Atlas/Atlas Discord.url
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Executables/Atlas/Atlas Documentation.url
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
Executables/Atlas/Atlas Forum.url
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Executables/Atlas/Atlas GitHub.url
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
Executables/Atlas/Atlas Website.url
Resource
win10v2004-20230221-en
Behavioral task
behavioral7
Sample
Executables/AtlasModules/Acknowledgements/Atlas Utilities (filepicker & multichoice).url
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
Executables/AtlasModules/Acknowledgements/setSvc GitHub.url
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Executables/AtlasModules/Scripts/Auto-Cleaner.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
Executables/AtlasModules/Scripts/RunAsTI.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
Executables/AtlasModules/Scripts/setSvc.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
Executables/AtlasModules/Scripts/toggleDev.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Executables/AtlasModules/Tools/filepicker.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral14
Sample
Executables/AtlasModules/Tools/multichoice.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
Executables/BACKUP1.cmd
Resource
win10v2004-20230221-en
Behavioral task
behavioral16
Sample
Executables/BACKUP2.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
Executables/CONVERTUSERS.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral18
Sample
Executables/COPYDESKTOP.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
Executables/DISABLEPNP.ps1
Resource
win10v2004-20230220-en
Behavioral task
behavioral20
Sample
Executables/EDGE.cmd
Resource
win10v2004-20230221-en
Behavioral task
behavioral21
Sample
Executables/FINALIZE.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral22
Sample
Executables/MITIGATIONPROMPT.ps1
Resource
win10v2004-20230221-en
Behavioral task
behavioral23
Sample
Executables/ONED.cmd
Resource
win10v2004-20230221-en
Behavioral task
behavioral24
Sample
Executables/PFP.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
Executables/POWER.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral26
Sample
Executables/STARTMENU.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
Executables/UPDHEALTH.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral28
Sample
Executables/WALLPAPER.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
Executables/Web/Screen/img100.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral30
Sample
Executables/Web/Wallpaper/Windows/atlas-dark.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
Executables/Web/Wallpaper/Windows/atlas-light.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral32
Sample
playbook.xml
Resource
win10v2004-20230220-en
General
-
Target
Executables/AtlasModules/Scripts/Auto-Cleaner.cmd
-
Size
1KB
-
MD5
385004fc5f168224a63a6ffc89c0b8a2
-
SHA1
4d2f8af8bdd7c6212c129b4a73b463b4b2f7acb3
-
SHA256
e49d0ad09a63268f89ca78ff02a7453ad98e5e58a4a5bb8db6d64e3a3440a5f6
-
SHA512
d30e4449a3ff551a288300026a4a08912e30796a284c03155ff5f16f0756103de16d8eb8c101250963c7570f54cbc6e9bf3229d101a17da40b5d5d5df14d353e
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2756 created 672 2756 powershell.exe 7 -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3948 sc.exe 2564 sc.exe -
Modifies data under HKEY_USERS 48 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\S-1-5-18\SymbolicLinkValue = "\\Registry\\User\\.Default" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-18\SymbolicLinkValue = "\\Registry\\User\\S-1-5-21-1529757233-3489015626-3409890339-1000" powershell.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4360 powershell.exe 4360 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 4300 powershell.exe 4300 powershell.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeDebugPrivilege 372 whoami.exe Token: SeDebugPrivilege 4360 powershell.exe Token: SeDebugPrivilege 3604 whoami.exe Token: SeDebugPrivilege 2756 powershell.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4276 whoami.exe Token: SeDebugPrivilege 4300 powershell.exe Token: SeDebugPrivilege 1520 whoami.exe Token: SeDebugPrivilege 1520 whoami.exe Token: SeDebugPrivilege 1520 whoami.exe Token: SeDebugPrivilege 1520 whoami.exe Token: SeDebugPrivilege 1520 whoami.exe Token: SeDebugPrivilege 1520 whoami.exe Token: SeDebugPrivilege 1520 whoami.exe Token: SeDebugPrivilege 1520 whoami.exe Token: SeSecurityPrivilege 4300 powershell.exe Token: SeTakeOwnershipPrivilege 4300 powershell.exe Token: SeBackupPrivilege 4300 powershell.exe Token: SeRestorePrivilege 4300 powershell.exe Token: SeDebugPrivilege 3516 whoami.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1452 wrote to memory of 372 1452 cmd.exe 84 PID 1452 wrote to memory of 372 1452 cmd.exe 84 PID 1452 wrote to memory of 1276 1452 cmd.exe 85 PID 1452 wrote to memory of 1276 1452 cmd.exe 85 PID 1452 wrote to memory of 4056 1452 cmd.exe 86 PID 1452 wrote to memory of 4056 1452 cmd.exe 86 PID 1452 wrote to memory of 4360 1452 cmd.exe 87 PID 1452 wrote to memory of 4360 1452 cmd.exe 87 PID 4360 wrote to memory of 3604 4360 powershell.exe 88 PID 4360 wrote to memory of 3604 4360 powershell.exe 88 PID 4360 wrote to memory of 2756 4360 powershell.exe 89 PID 4360 wrote to memory of 2756 4360 powershell.exe 89 PID 2756 wrote to memory of 4276 2756 powershell.exe 91 PID 2756 wrote to memory of 4276 2756 powershell.exe 91 PID 2756 wrote to memory of 3948 2756 powershell.exe 92 PID 2756 wrote to memory of 3948 2756 powershell.exe 92 PID 2756 wrote to memory of 2564 2756 powershell.exe 93 PID 2756 wrote to memory of 2564 2756 powershell.exe 93 PID 2756 wrote to memory of 4300 2756 powershell.exe 94 PID 2756 wrote to memory of 4300 2756 powershell.exe 94 PID 4300 wrote to memory of 1520 4300 powershell.exe 96 PID 4300 wrote to memory of 1520 4300 powershell.exe 96 PID 4300 wrote to memory of 4664 4300 powershell.exe 98 PID 4300 wrote to memory of 4664 4300 powershell.exe 98 PID 4664 wrote to memory of 3516 4664 cmd.exe 100 PID 4664 wrote to memory of 3516 4664 cmd.exe 100 PID 4664 wrote to memory of 3956 4664 cmd.exe 99 PID 4664 wrote to memory of 3956 4664 cmd.exe 99
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:672
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -win 1 -nop -c iex $env:R; # RunAsTI2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Executables\AtlasModules\Scripts\Auto-Cleaner.cmd" "3⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\system32\find.exefind /i "S-1-5-18"4⤵PID:3956
-
-
C:\Windows\system32\whoami.exewhoami /user4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Executables\AtlasModules\Scripts\Auto-Cleaner.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\system32\whoami.exewhoami /user2⤵
- Suspicious use of AdjustPrivilegeToken
PID:372
-
-
C:\Windows\system32\find.exefind /i "S-1-5-18"2⤵PID:1276
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ( FOR %I in ("C:\Users\Admin\AppData\Local\Temp\Executables\AtlasModules\Scripts\RunAsTI.cmd" "C:\Users\Admin\AppData\Local\Temp\Executables\AtlasModules\Scripts\Auto-Cleaner.cmd" "") do @ echo(%~I )"2⤵PID:4056
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -NoProfile -Command "$argv = $input | ?{$_}; iex (${C:\Users\Admin\AppData\Local\Temp\Executables\AtlasModules\Scripts\RunAsTI.cmd} | out-string)"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /user3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -win 1 -nop -c $cmd='C:\Users\Admin\AppData\Local\Temp\Executables\AtlasModules\Scripts\Auto-Cleaner.cmd'; $arg=''; $id='RunAsTI'; $key='Registry::HKU\S-1-5-21-1529757233-3489015626-3409890339-1000\Volatile Environment'; $env:R=(gi $key -ea 0).getvalue($id)-join''; iex $env:R3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" start TrustedInstaller4⤵
- Launches sc.exe
PID:3948
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" start lsass4⤵
- Launches sc.exe
PID:2564
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
Filesize
1KB
MD5a9b53645ac136a73f0af2f791f716efd
SHA19917c3c61b029440dacd1b93a80700ce4afdfae8
SHA256e9945e3f08483ef253189f405ad6ed0360649884e7ff534bbb233ba93fdd71d6
SHA512a10d2e89faf9f76242edf38c88af522c7739402e158b7202566442bcbe78c84e7ff1c375a90c75bc396046e90a8a57dc24817a1a5ae524da148c1eef034962b9
-
Filesize
1KB
MD55bc80686e64f8f734bccb28006482dd4
SHA1019fe11e3297db51c11b683ff182a384acee44d4
SHA2561da07144b4a4e1d623be86f696b804513e556565ce3782cff6a1006a16d0b5b3
SHA512373164463d3ebbc18113084c9a9bf05f9013dc713ebf404994264a1ad7351f2a8505ba59b137be85bc1ef1706d3398c9110ada3e81451b228defb3d59e664dd5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82