Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
32450a7f77619d03da53788be8319673_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
32450a7f77619d03da53788be8319673_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
32450a7f77619d03da53788be8319673_JaffaCakes118.html
-
Size
175KB
-
MD5
32450a7f77619d03da53788be8319673
-
SHA1
666614fa988043e0c7bfa1c8961fe95fd8bf62d8
-
SHA256
3042c1a70d38e491d4401f21e42de019547b57537d72211c3399e7192e30581b
-
SHA512
ff7dda3143bd7fd36e7f31697e1774ede8d192f4517ce34d44e62bc3d249c70a931636517f8b725b9dea72c70ae17d632aa0e11da70ba94e3192a98df3f6e3b2
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3+GNkFiYfBCJiZL+aeTH+WK/Lf1/hpnVSV:S9CT3+/FzBCJiSB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 4508 msedge.exe 4508 msedge.exe 3380 identity_helper.exe 3380 identity_helper.exe 3836 msedge.exe 3836 msedge.exe 3836 msedge.exe 3836 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4508 wrote to memory of 2004 4508 msedge.exe 86 PID 4508 wrote to memory of 2004 4508 msedge.exe 86 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 5044 4508 msedge.exe 88 PID 4508 wrote to memory of 3712 4508 msedge.exe 89 PID 4508 wrote to memory of 3712 4508 msedge.exe 89 PID 4508 wrote to memory of 4208 4508 msedge.exe 90 PID 4508 wrote to memory of 4208 4508 msedge.exe 90 PID 4508 wrote to memory of 4208 4508 msedge.exe 90 PID 4508 wrote to memory of 4208 4508 msedge.exe 90 PID 4508 wrote to memory of 4208 4508 msedge.exe 90 PID 4508 wrote to memory of 4208 4508 msedge.exe 90 PID 4508 wrote to memory of 4208 4508 msedge.exe 90 PID 4508 wrote to memory of 4208 4508 msedge.exe 90 PID 4508 wrote to memory of 4208 4508 msedge.exe 90 PID 4508 wrote to memory of 4208 4508 msedge.exe 90 PID 4508 wrote to memory of 4208 4508 msedge.exe 90 PID 4508 wrote to memory of 4208 4508 msedge.exe 90 PID 4508 wrote to memory of 4208 4508 msedge.exe 90 PID 4508 wrote to memory of 4208 4508 msedge.exe 90 PID 4508 wrote to memory of 4208 4508 msedge.exe 90 PID 4508 wrote to memory of 4208 4508 msedge.exe 90 PID 4508 wrote to memory of 4208 4508 msedge.exe 90 PID 4508 wrote to memory of 4208 4508 msedge.exe 90 PID 4508 wrote to memory of 4208 4508 msedge.exe 90 PID 4508 wrote to memory of 4208 4508 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\32450a7f77619d03da53788be8319673_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa445a46f8,0x7ffa445a4708,0x7ffa445a47182⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,15387010729347690430,12748890631849599336,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,15387010729347690430,12748890631849599336,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,15387010729347690430,12748890631849599336,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15387010729347690430,12748890631849599336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15387010729347690430,12748890631849599336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15387010729347690430,12748890631849599336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:12⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15387010729347690430,12748890631849599336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15387010729347690430,12748890631849599336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15387010729347690430,12748890631849599336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,15387010729347690430,12748890631849599336,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,15387010729347690430,12748890631849599336,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15387010729347690430,12748890631849599336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15387010729347690430,12748890631849599336,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15387010729347690430,12748890631849599336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15387010729347690430,12748890631849599336,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:5300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,15387010729347690430,12748890631849599336,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5276 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3836
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD50ea79bda80f46fb329aa0dc3582d5d84
SHA16abcf899577149e1401a72b76cee1b88028c80dd
SHA256499e284ce172d55fb6466b72f17966a137f19c473301e41ca8caf14a9fd3c737
SHA5122c448eefe081f378ed52836725762d67b5667ed2d0defceb9fe697412a8aeb2774f0f9d38eb4c8b93128d49b5ad4b7204eaf0c4010466961b3029cbf5641f51a
-
Filesize
2KB
MD57c0585f9d6d41294e94dadc27cc548fa
SHA136033b6031e252d3ed066a85bd05b7cde5530992
SHA256d5b65add9e7655f109c5b0b5715591e9f3bd26bdbbaa0583c8c0ab462f28ef1f
SHA5122c39c690a3625ee56c2345af67ba9adcb27eddc16759abbaccacd071032c3c15f1470e3fafb82f54e5665f83ebb04c311e823124fb2ad04b6a92c01fecccb7c8
-
Filesize
2KB
MD55308484d376378b13b5c6c917b1b6a5d
SHA18ce5949a7a6bad024fb0320a18bcce0eeaa56a3e
SHA2562447d8f4e7b9faa21221f4bf1d90566b6503e7c495445e661a630b904842b7ed
SHA512aaf8f726ca11fd111f3410be09b90c0cbc9121f07b88316f25cecaeae042e655bf47b79a17562e7f1b950e3eea65ede121aec90ad343d073599529e943e6f89e
-
Filesize
7KB
MD51b22ad406401e3d7972c00e2deb6cb75
SHA1b8fe91f4d9e39b40fc763dcf1adba9af488cd723
SHA2569f581a369994155662a596071552875fbd9bd8df84078f00a54003e3bc8cb46f
SHA512ecf262af1b9eec20ebdce5459325f554498ca1e726f3c4278ec772d1a9b90124378d72b5c92d2bd0c2d0cbbc38bb1a02b9eb26d8a385ab3a32fe31a96451a19f
-
Filesize
5KB
MD5f8d5b1061ac77a6f39aa55f46b0de885
SHA16a264606ddd47f1101cb43a28f923cb29ca8ae81
SHA256de99271e9bbbdae19488d180f7eca5802064ddd633eb78840fe06dcaa836da3a
SHA512bb2aaee26c0f5ba766cb789f050340fbee2b629ff991c6090d2f96454321a8c417ee8ec08c1768c3ba6506143de5b8fddbfbe0b5d113a86197773415f535708f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b2c5250c11cbad48e2e4cd3a1960ecef
SHA156ccca43c618797648e0a0645d24258255a75a60
SHA25675786a79e4bba1b9d4da9db19c27f2a76f9c55f544ebf1a8b618bfd484131182
SHA512643897bb95ea7aefca51d3cfda76c723f26eed7588f265a42ffb4fba800da7cea315d86b23a222e258da130d912ea76c64f4fac581ffe813070fabe57a7d6b0d