Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
63ddb82974824a7d1ad908bcdf67793b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
63ddb82974824a7d1ad908bcdf67793b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
63ddb82974824a7d1ad908bcdf67793b_JaffaCakes118.html
-
Size
67KB
-
MD5
63ddb82974824a7d1ad908bcdf67793b
-
SHA1
4ba16b534ca4bb2d8cf87ce83d268c46f29e41dd
-
SHA256
940d6821596c36b7dff0ad9ff39d5c83d373e3f78dd9d6c7f3a3c984f47cfc78
-
SHA512
9259ff66cc686529de02d33a0c94d81b1e20909cbb90895fa167b477be373fe1433a34df335a273ca9d84b4d9aae3ec8a52d011142994389790ae9a74ad96dad
-
SSDEEP
768:z/ukWsxsGRJ7+WAv6xkOaqtKCosybtvFxV2rpVHO6uK6:z/jxsGR9BaqtKFTxcpc6uK6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000d6b0081d68fb2ba5fe429a3e51f4a0cd3e5caf6c4da3dbd28169565df406bfc0000000000e80000000020000200000000fff4aa7c052407c68ab0831bfb6ea0d04ba34805b220701e82e01f59fa24ff92000000013e96e6a3d5521ad5a8458ea00140c9a71a97f3d84ac1bd97815353f60e42441400000009dfc58213a4e1762db18ae9319644e5fd3ae2b28a3a9f05bffea3223c3f29a0965c87f0d13c8eafcbb76985938e5a3a2b1dbf816bd7b3936d28e1c8a2e2a8bdd iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427826720" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F00A031-4845-11EF-84E7-C278C12D1CB0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5077904752dcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 696 iexplore.exe 696 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 696 wrote to memory of 3052 696 iexplore.exe 31 PID 696 wrote to memory of 3052 696 iexplore.exe 31 PID 696 wrote to memory of 3052 696 iexplore.exe 31 PID 696 wrote to memory of 3052 696 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63ddb82974824a7d1ad908bcdf67793b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:696 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD51bfe0a81db078ea084ff82fe545176fe
SHA150b116f578bd272922fa8eae94f7b02fd3b88384
SHA2565ba8817f13eee00e75158bad93076ab474a068c6b52686579e0f728fda68499f
SHA51237c582f3f09f8d80529608c09041295d1644bcc9de6fb8c4669b05339b0dd870f9525abc5eed53ad06a94b51441275504bc943c336c5beb63b53460ba836ca8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5362011c9876a93d7f877e7633348e03f
SHA1256b4bd39a48cb13fd21d0bab202c9528f1c3903
SHA256aa7e0bd62eb4ebc582a66d1544c817c4b19ad75b7147069f2d02c8d6a9cf8e89
SHA5122ffd67ff2ddb03db4462a32ce89fb3a8bc038a3ba93ecdf004e3c793ce3b6297aa21223fd7f8ca43c8534294fde89c2e7177fdcbe7f92a934c454084b7b82d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e2ae34b96f9d6aca9048eb3d6aec1aa
SHA14301b7298ceaae30d0d591852a58642f9b5e69f6
SHA256be2c363a0bafe7a82b0997f1cac9ea31cbd95337fea0af50704540c3e70e247d
SHA5120abcdefed94bb6781f90e85f7dca4da3f0066251ca2bce486f44fb7b537ad3642a24badf304909c683cd7c2e4ce9adac60ddb586599bed728afebedc04dbe938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c66197b87278489cd123a9aa2f8d67f
SHA1262ac65ed976c86317393164dc58978bfb69f011
SHA256e8b03644b174186f24cb520812b2d49662c56519fd67d85cd301d0d9f96824d8
SHA51255c7923f9b96ffa667b6642584417baefc19f56977c76264182041fff613c63546f1816eefb7f818c41e15e4c12367a8be0c6c6a0957efb0136f1884f1c5bc70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e43c3b741c17bdf6882123c3e2ac631
SHA16781c886ec4060779cac4dc82e6143226247dc36
SHA256a79c6e647af886cf70447ada54ba92dfe35602811b378af5adce8ac0c87519b2
SHA512e3248195c51302c71aeefb1b3db902dc3c594f46009f4b90d87482fade1aa50bf92002d6653807da802877f6f9864662af42d847e28a100d95cb6d872d7ac3da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0a50368247da08763a1a43d63862136
SHA171217ead6f22487bf3b7c35f59521736d3ed6027
SHA256209feeb0bfc2c74e96af8cb51857e98b43d1732d7aeecb513ff4c8480adab4cf
SHA512024ab78f0626eb7f00161e0fbc90b859c95dbd852cb4ef610dd6d93cf30baf2183d2abdf01204694fd86670cd71fdb336ebe1bbec700a4539f87c76676c84ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d037c3d7af998c4cb54b2de02390e23e
SHA1dd8b54e8e29d3684d119e772628a88f45b14707d
SHA256638d7f8751de1ca4cad6316d02f27cc27b17f55555c2ab5a563b72efa354fc95
SHA5122e25aa7683c1cc0cdb87de45ec698da9790b547583b214d4796845ba983c68c3000593433394a4b7d6cd3438777e7eaa6abf429213b22b345e33453b922a2a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a143aaeec3d82e3bf23d332da6a9b82
SHA1493116efae13c8c25a4000813594da0c2ebfa920
SHA25692b6dcef2744e00b3c6e19ff18a1342a7c38b5ae7e8d2b5e73be90a98548efe6
SHA5127fbf0a838c2e1813ec381a9e2e4885719aa1c235c1a18e3afe9791306dcf638117db12a89a5c491a20fb5c26f2e6f37702a8a3801b28f177401c4056401eaf5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58131c2c74cde6602225fa4e051a0f552
SHA18526991dd9d1bdc371b927f6ebc5f99898a1353a
SHA2566bc5ee11b204f150f23afbfa185997d15c977bf0b29a018aadf14397b9b2de52
SHA51252b83c82da189f0571264824c3984fc33045345a1c3581870da1e30ae1bb69bd7211a224019e3b56d499517060099ee6d389d33e6a6d56e378c91d4a51570ae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5877895e85297400b377db7f08ccbb9db
SHA174688f265a1137e4cf3bd5685bb26e08c919e030
SHA25629d048d3089349b9438f3c07396e752456d95314b71e3e9353066b9c1927ef53
SHA512e6a93eb74428e4e22acdf6aa1306f4c338d3f0d5d2e4f792edaaae635d9ba57be0c7024e6bc224b94296b1e099516f0c2140d8bfc3f40f5cd148e871609d7f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1f78ba3c3081c7dcb906107bd7ed3d3
SHA13e9274fbe3e61ecba9eb9bbcd4654c19b5716e28
SHA25688c48c21045fb8b3fa36c3b0fafebebc4cb846e615e68f747fe3287c78a9919d
SHA51263fa1d8b94d51ea7842cad717b11dc1de25d096f22cb60c32ed4e5f289a0f9489eb79f2baacb62f4b7ba484262b4e600bc92a9efebd91641847aebedb4f8262c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e71d065665750915b8a2642d6ead63b
SHA1fa6628a2682957bc567b8be32fbd23e32e42a1a2
SHA256e527efaf1502dda4d371175ef7d000c6110c571bf7548df01dc686117c90e741
SHA512bcd30c31f511abca1bbbd55b696350aa165f54a792ba9968e24a3f3c933cd566828f5d9df0ef6e93ae8807c5816a3fb94d993d21c925fe8aac1642c2b3e12fb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389a73aec5c211f2f364cbbd7bba1770
SHA168f4cf5cd2cab7c4bfc9d43401f81c55cdd999ef
SHA2568ce1f9138af64d1377e2e18f0d09f722cbdb047294aa8b7de5767272468370e3
SHA512cf526645e504042974f38eddce1d45b00673a3875e0fcff3606a0580646b2ba696a3ffe92f6b8a7998184fca55dd94e33511e165ca2b5050f0a561838e8d53f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c401f22261800c2266890717b2eccf59
SHA10cdbd71c8ef841e6075094af6a6cfb93cb62247f
SHA25689d6d38a4a8b69c6b340cd145231f8e17806564f3556b74bae49f55b09afcb19
SHA512a597d1370a95117a0d1604e985e2999ddc8b0c11607a4572b636030c56a1953b9fa954e7ed99fbc85d0b42f019ec4df9e17cad4ee19682f57281b4e10edba4ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccc27d441217304829706ef61361b0ce
SHA18e1684c3f77bbe5e797b166ad40c8826886dafc3
SHA25633556d73f038adafea087f26ac416130fb6a4bb650c71b15986f2f385e1e96c1
SHA512bf5c95e188d16455d64ffccb757f72ff943099c94c5e01fd3cc80c1fac1dec0e5d65cad027ebc901b8e4ee6923b1158a7fa4641e2c0b055e3fa56e60a0d3bc51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f34a505243c5389a51b3347057be3c3
SHA11752e3dd85d9667de1b5bda3cbb764c64d0ca407
SHA256c85b0f7c85e443a0a3950bab1f01caa0b92eda06a19513a82d73456f475f8e13
SHA51217774542d221fb47cf0a51bb32eafbf53d8d4fc3c15f868ca6732cf9884fc0902a3bbbce41a2c48496a6c0033ee6c03118c7fccd81748f2a51b39c1ef326427f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53383731e90c1470248302b5418e65ea0
SHA18d7a3d11d1977408daa02e09e6f6636b018bae5e
SHA25616304e1c8258b3ad1101442262876cbe0e4594bf571190ef884cd6d1d7fb9949
SHA512db0167af93903a37e512b35ce2bd8a67dc8603e0e9e25760c806b7d250b6323facc359f233ec5cab5e5e1a468ea7d97b2b05a443064f09aa1427c21b9c91564d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5625d23a6af131261312db46c2764e0dc
SHA10c3695faef6617bdabcb86c11c1adf76d1096f76
SHA256d74dfb144f8c197ba94535e014326c95c7afe3ab5e1f8ec5dbc14d18f7c7cef5
SHA5124e177b3e6b253cc09ac15b1faf2739dfed5847f7b2528d98bc39841be15a2defa56803984d4c559ba57759b1d5b893d6299294705149059ed64dd718183423d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee12ee4b02fbf35a2e5a1d6ec421fbb
SHA18c67382f91c0024395af934ecd3e0f812a7d7bd3
SHA2563356711c03fb063d83a54019b7978f1892beb74baef56c5667cdb279308ab0cf
SHA5122ebe6b15d808a1bcd8b813b99a20738e63e57ccee1929136779b846e6b2df10167bef1347ab70cee02fcaabd87b4e646b166454cb594c3b8fd575b0be628d2fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da80cbc8e337acb5eb63f12675f09517
SHA180479fd8cf2d227f6548070e2893db6b8a7011db
SHA25686b40e6bc5ec2c7c2498268421c8484e0d44f0eb7a20c4d794ad638a79125c42
SHA5126d2e6eead4a58566793cd22be1476a9f7ff5adba3188dee79c9dac8c5a50a4eacd1dba025b0c9f33a1ef5e4e9b46f7b40146957b8e2a7b32c2d3d2fd788ecae2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b