Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 05:09
Static task
static1
Behavioral task
behavioral1
Sample
14c847a58b631cb965c432643b0106ef_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
14c847a58b631cb965c432643b0106ef_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
14c847a58b631cb965c432643b0106ef_JaffaCakes118.html
-
Size
53KB
-
MD5
14c847a58b631cb965c432643b0106ef
-
SHA1
d98f7c6525950a6811919697bb81911d6d00c316
-
SHA256
44d840c02721763dbdf727c593c1e8afd9a0eac4bbd8fc9adbc7f129b1332715
-
SHA512
ca83acd904b85be3beb8abeb853066de39c1fb97541ba96bdf8e865b90c67ae990ff844d01632268d8159aaf0003992a240e00aa654035fe8c8083dfa942629e
-
SSDEEP
1536:CkgUiIakTqGivi+PyUbrunlYP63Nj+q5Vy0R0w2AzTICbb+oE/t9M/dNwIUTDmDc:CkgUiIakTqGivi+PyUbrunlYP63Nj+qQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{63C09F61-3443-11EF-831B-46E11F8BECEB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a66b41f5e5c7d742a15519d20381a194000000000200000000001066000000010000200000001a3f27cf04d3f0fa71d8959eab48a31ecc5b65c08200b9058a1a5f39d604ec74000000000e8000000002000020000000fcb98f75bb32f980ef253e8e4724121d8bbd189ff0cabfbb57f8f528d0a90da820000000afad606358a346e990f6c0967297d27ff48074b5d8a1b6356a1bd1accc67260940000000d674215034c612522b39304642b19bec673c68c73c6c8b0eba79801cd15a593652c4121ba1fafcc0e10db9cf37814d6a0d3bfe1a8b0f2fd0ffb5f47fb28a5b9b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0dc6b3950c8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425626818" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 iexplore.exe 3036 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2944 3036 iexplore.exe 28 PID 3036 wrote to memory of 2944 3036 iexplore.exe 28 PID 3036 wrote to memory of 2944 3036 iexplore.exe 28 PID 3036 wrote to memory of 2944 3036 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14c847a58b631cb965c432643b0106ef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9735f871c2f269d27a6b29082d8455a
SHA1d75b364e251a26892f225e7a1ad44068c8842173
SHA256eebaa836ca3d96413cc4e0aa6886bd5117587c6146ce79586c642cf38e28adad
SHA51288d9668d1075d08806a77aa5d04b4c393efc72e6fc198112fb677b0c8a1337919e18a2b8c19a2079ae64bf8dca049a9196f3be5dfc139e7ef1e69a14ff633650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553046463d96a5ce1af05bf7a835d6fea
SHA1bc71aded34721ec54616e2f1743e31f326e023df
SHA256b2474560f98a51f234b093ac11cdec2980942d13c0c9bc1631808073410d3dd5
SHA5123167610cc1f8bc806950f34206e7b43be1694df6e52883ca3bae181d0a421cd56cacd1b5b965f3b0b52a4605a89b6db2610af6e5af7b1a00e067c89f1514c909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535ab34eeaabae26e903685495d494621
SHA16a9c6d7c4752242104ef76ef7525616ee926b2cd
SHA256fe53659f2f220ad56c77aabb5cff3a1a9e76f8f8221338f02060705a4109ad1b
SHA512128098e1a999403ac97bd5dd1ca41f8bd19dfd807cb3f8ad74ff4ce22c72a1ac51b45e6d6717d2116099f8ba037593c1d1b5bdb429a37384229c97f76d729971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f6320a586e617248c91b41955521919
SHA183221882141e5fd43fae8f6785b184c68b2fdac0
SHA256533689e9500fdf537c23aa279a946b4d2fe3a9875c1770c166ae7515c425114a
SHA512b602ac387dc773c46254084be3149d36d490e7c33d1a2d4510c51384a27d44dfc28de51c5d96d049e67444f27cd6836a83e15591857e6eec0327a13f9487ab48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a181766b3b7349594183f2b43d61ecd1
SHA13e9920206b7bd0280e8e6a4851b481c3b438baa8
SHA25692b2176acc5a3fab9a6522f0df4ad3335f6b29777dc029f5ec2b0e1995be3a94
SHA51295944c78a4de7e0cfbb26685ee4cb80b25ba4c4be2f29a7ece93207f8d051e6a000eaa09ecb65335981259f71250f1d074d23669bae5d628f9621274be0f28da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b06a2156288e52dbbca290cb563b7814
SHA1be2bf8b12218cbd819b911e5b5be7c2d7e064d49
SHA256820e021a3cb84fc519dd8fd7e1f0257dbef128ba9fa270fc168e488f7f8a7822
SHA512417257f37348374e8be4e557c811744e4261c010844ad5a7271a08c377000aa2f37194916138ab11c06ad2ce537a61cfe2b07d020cd0cac768dd4ec4442826f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d2cf45fcfdb9dd2e5958786da2e0647
SHA15e28dfad3f25930ae303ddc9f2f1980fc6feaa94
SHA2566cec526cb176c4f10602b161d6983f0f5ec29e1cb5968cb3fccc70a26b790687
SHA51223510aa3f02b2164a0a21eb60be7b35b0f318ea2ae84c8a34eb21d9f50210e26d283add901a0a251e127b876d5506604e6949f1cb29746cd5d5fd1d551f54015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558aae049de9ddcb5ff1415ff501dfd2b
SHA19a723ac1b3cdb7180bfde5f479d530645c010da1
SHA25690c2df0a4966c51d95d98f1d66daa8909ba353b5ebbd633443131bdfe1118017
SHA51292f9412460358dadc2e856a2df0fccdd7244033e2fffcb030843d17233661eb825ab9041f2a99e29ecd910cf3748fc7f74084f378b233b3fa75224cded17bf7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d8f1a252e11f4db3c507943145121d2
SHA1b3e2ec397b8eae94554f3d3a2188c33372a0b292
SHA256f0bdee57b45ec900cbf88e3528795ed55119acf2d2f461eccf6d6223dbb402bf
SHA5128106a407327a5bbe7bac410f7d573c2349ea8870a46afb0ac70a1bfda2abc69b83bfaeaa7745a841946abed4e49774f4a3e2708626697ef97046592cde421b33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fa4097375662f973e76e1a8c0fa4aa9
SHA1fcb5bd687fc1bd6623973d7b36c733dfcc2e1d7f
SHA256955ae06b8489130577907beb86fdcd5cc950475472c5d3ca3e74f4a99018ec43
SHA51217a61909774044139e5b000cb00ba1fed0cd66ad126a2f000eff8044c22255e89e77472520e441bf35e3c3446304299732c63275d1948de9febb2e1abec33e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d5fd8f6429aff7af256124fb883330
SHA1ed7658c731b9e11886e51f76d9435b9619d9db08
SHA256e4c1e4c6ffeae2e908ab13cea8666c833d0194e9bd577dd30c377718fbabd4b2
SHA51299d8c6ced6c97cab64175c1aa1de2e4097002e3515cb729ab2038c3b67481e3b5d42f691996200435716f046478eee5d8df5f1d60f6608c4562158a0800be441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571b26c83e925fdd6710a09f9480c98f9
SHA18ceb978dcdc4d6c74d25bc13499c97266d1141b8
SHA256df19d507e7a3f8e03d71c3b9fb1b0bec6a27dcb443ae62cdc7e7f2c40393090d
SHA512cb33a646d64bbd86621829536a2eacca81bda41430d25e91e99f22126e20bdbafee3cc16266db8b6ace985a88e7a31443277765bfbd46c6e8dc6970827ea47cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e278720e11b223fc007894937e588121
SHA1182c828b407566b989d4ec5fba3526af475377de
SHA256179de8038725ff33955a8ac5e1060a28658d9d4332793ff6fb62a737ca43ef36
SHA512575a393b2deb6d25106b1f603498a26e9a449b2c5a9e8928c9705317cbf97e1ed8da060bc107f1952dfb8b22c2cfaf36d45022b00976a6de19b156cad32874c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da33a7d08ef2dc3c46f9c619fb96da19
SHA11e7ec23488c2f3148fd82e1c27f77979e27a5718
SHA256116345f9b9d327a72a6d8611bc711a795b47992b9700d04b6f87b0b1f671120e
SHA512a6b0d90d86d5403a8b11c74f791c920a65a3005d6e123337bbfd403fd4ad75336aa357d1de1adee3a6a886f80e15ddec5722f7a278b8a60d9b02c263c5e537dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c4b477f0283f8329dd988585754c406
SHA156622412678755257e114b3761968987c736c7c6
SHA256a1878720ba6ab9eea9c22713005bcfb42a2d3f7b66b11f5e25285c9ea9429f3a
SHA512df1e4153b1e494f43253e70669ee4847e5456128c5ddc95afdf6f1fa9ccf0e7e5ea8385ddb2a9836231a078cb80bd4c210c473ae233e514ea03431e92136601f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c09790a26d93b4f28262563753e2fb71
SHA1fdbb59062a907a7f7546e774cf40af317bc579e2
SHA256c35a96bd1c22f7da4f87add239446129dd56b6ea59943d542f763c177126ba91
SHA5121d0e6e0b42e55d94be951aafb24b7c55e3cac2d6ed85592b6242177b92cd20a283121061c22040848b1b26faabfc39751bea609c0817a19749322cf1c61a9917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cc53bb0e35685ed5d4a943d619b3724
SHA10e34c0584c3a5fe6888f52f55d5c0ed0b65ea9e8
SHA256fcaf5260679a6834f3f7cee912f6b411be3a96fb73f237aa8b0febfd6fa0fade
SHA5129033330cb8d3c5175a8fd6ac31d3cee48ceaf09185a61fd9112da93001733bc4a956ecbca84ccf308c0a7d53fca81e49a26391fd1d8b81baa2168c973a775bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de901602f1c9593255843a0006f210a1
SHA1d5c9c57babb219b1e11e346a4542115dda3bfed5
SHA256141999661299ad2a136bfced1a6fe6e1465f54d515666c959746794b7a8d7368
SHA512d4d5bc6ab1fe9f3e3be035e53a6f619229f998df14fd72fc05f8fce652e558f4029950bfaf1281e391b94f8ad3852ef2481a953ada9ecba2a537fda5a2b03269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eefaded7a733e5b5d26ddabcd2cbb376
SHA1cdb3db64709c9504fe7a5d06ed387c25167290a8
SHA256f97bf6263785873815eb39bbf0ce0d51f7be5a7b5e1b0fd24608a4a590355cc4
SHA512ab09b27afec2e2c2bc09d57540408bbef775012700c8d3e43f1838b6acefbb5f4c36f5a37183778dbaa74d9b702937a32cfeb1bfdd90d77739b6d0e5532be7dd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I819HQXH\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b