Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
b1a0d1de2ce18aca2aeadbcd9c57817f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b1a0d1de2ce18aca2aeadbcd9c57817f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b1a0d1de2ce18aca2aeadbcd9c57817f_JaffaCakes118.html
-
Size
6KB
-
MD5
b1a0d1de2ce18aca2aeadbcd9c57817f
-
SHA1
d7c832f18a03380da1cf5e4bc1f9b3820810aa4d
-
SHA256
15c39b05372a4bd6b943237832765903509680de9ca3f4a00e0bdc997de8dfe2
-
SHA512
2da47e4d1fc9110182c7fab962892df351c4f4cc38c51258143bc203cbda22da83ae6ba940daecb924a9867354b5144ca21beb064cf474768c5b35005771d3f4
-
SSDEEP
96:uzVs+ux7yoLLY1k9o84d12ef7CSTUF+XjcEZ7ru7f:csz7yoAYS/3Xjb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000baf6e25a219314674b9cb858ae4437f1abb7e314cc1216e18161942d96914437000000000e800000000200002000000077062fe9c340565cff8149043fe7ed73367adbc6dc7645acbd26b42d8d8e5c2f20000000dd2bd5bb9bdc302f7accfa114279afe20b4425b3396c5641b2b6d885b8d98b95400000006787d6ddbe07f72aaf05d7778308d74466d2ecc9d1cc4a86e52b223f08fef1b5ba101715e5b673ddf569461796ecec9e7935f248a20919cc355b3155550c6a9d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67ADC4B1-5F5C-11EF-9AE5-CA26F3F7E98A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c0aa3c69f3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430365463" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1748 iexplore.exe 1748 iexplore.exe 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2896 1748 iexplore.exe 30 PID 1748 wrote to memory of 2896 1748 iexplore.exe 30 PID 1748 wrote to memory of 2896 1748 iexplore.exe 30 PID 1748 wrote to memory of 2896 1748 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b1a0d1de2ce18aca2aeadbcd9c57817f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8a36836858040f9a8aa5a7c383a73d4
SHA148a287d03d37b74d0c394971028e5d59330e7af7
SHA2565d51c4a6128fe7f0d2484129626b2f7162821710a684d4e137b8cc23c5fd8661
SHA5127fa7cefb37af65481a2895a40057469c196f826243411c41808f7a602e3a83686ab6b73eafedd9236e2db41415e4c13bce8d6592d3cd56be0475823821e843a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2b7f39d4b53fc4e6040c6214f2054c0
SHA12a7d21de3ed7e37943e07f30563cf74d59cfa811
SHA256ae5d58dcb6ee4f71ad486add70fbd067cc830030808b4a5f9e6239a3da9276d4
SHA512f67e57adefb2595c10c4dac0bb473c80880052e1f5faa91edf2b7079a2d84cec49c66fc2500fb7c805ca82b3eaa151e104e4a8c8421f9ff6022d199b5713abae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537ae8d3148548fa58dab7188a69a67ab
SHA198d9c2a50a087c3ff0197f4d4e5d82586181e7c0
SHA25652fc616005ddb63ea87d9c2ed0400cd16f0beb31cc9b765a51a8ef04a6d0a289
SHA512fd5c316b04c451b04e1d71fa7411945bac777248a443854ba7b3e9631a5a705504c00b6a89bc5ddec6376425ad8b2de406620f9e3b5963a7fe3d7f7185048178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9af594bf6767edaed62c458553dd3e5
SHA1d87f242a511599c49228b7942475e943901f5d0d
SHA25610329b6f3f1e5d77422f83dd07b0e6ad6f574f585637b9737b67a8c9667bcfc5
SHA51212d72fae13920ab5750dcd38b16208f5a441d0c75f4e7f6abb9d80848a8b64b0c7a831f62279e27bc0306fbf9bd42a8938a20a3aa21b6672dc602abbedba235c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a73b3a6c9314236af5c76322c6b04872
SHA13a283f44216ff51bba9ab5608d8225dac38a1beb
SHA256e8cffb29f8f0d7dfa106df5d60bcda593eda79901349417f102499095e0ce203
SHA512fcc486f58771deff51bf6168ea94d5c0be352743fb42d16c7c6ddfafdc34fa82c43c1c36324bf510215aac4dfc73dee6ec09a0e6117e88d45fb38ca0a0575b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558f24d874e5d67838194b3a04176dcc8
SHA1fbebad4bac2d16bcf56a93577bae8b9f9d86a4e8
SHA256fe41fb4cc686301d6013b1523e81e36edd609701f75900721e6f8576cbfb64ad
SHA512b5e69d3c6868f005eb671cb78e9cf447cca998b53ef482a61dadb0f72a31d9c1b51d98572c4c5c19da09b0f4964f6995ebc51ed58b95d855b675b448754d9dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddce52cdae171bdd1567fd10d7a27e82
SHA13580ec27f789ec11cc2b19d60419ee22e1e22931
SHA256ca6f8568eb5ad195ab110d2136b16b2717b5998f5ce6dff00a71197c89f2ff94
SHA512a372ece82438d131da1a16b959c2103366d14be70b4741c630f56b09b864367a95c53e7952323ba64a7597790649de24791e32021919bafa418b8fd4481f7d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5094cc01da827d71eaf36ac73b7e7828f
SHA10feab4ca7e4f8e53dd186f0801ef2c0bda0bb3f2
SHA2560e98709f941f749da84f0e0e3cc6f408d80208dee00730d717e49da4067fd2e5
SHA512437630518f2e1b24b316e07f90aed034f1c7a9ca390e4313c057a4550ae0e96e0bee6eafd5daecf436c193d3cf6eb2e9a09ab799bce5f960258009cda7c31600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503d7aa7bd523532c4376135eef0ec82e
SHA18ef0c5092df9fb2ffed4701e6a08319b7da67d52
SHA256ad712ae0683002bd2d322528daed2ecc716e05f5f43b8b40b1848abfbb85fa28
SHA512ed08430413cf35520af6e99d37cc44bb3c5fc52eefd95174bf106065945de00b12541ce2a6a0cb0f9006bfa749813f0606463759343c1d157adc9d2c9476e3fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1bb8bfcd6b3527534e75c2d58486e4e
SHA19bdd35799b99b34c85a2e328f95bb4aa8d49785f
SHA256e09c114bfa17814adc41af5955c0bce23215982fc9d271fd749318b36e32038e
SHA5127d70da51f036011295c10370a5bcc71cc65de04053211b49d941892d4cd1bdeca4ee39d438a981a090134f040bf07f7799f190d3f20281fe3d6db3d63c2cb975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54af59e0544569b1390adcb0eed399913
SHA19dfb687e320a15550bb7b7ab40a1a04d5e1abf3a
SHA2564de6f4485a5ac268a96dca128153559951f46bb9cb5737c470b2090825f9e2b1
SHA512ef2e3130fc0a4797a86308109867bfc1bcceca46fc51932b4e1797c4f46cf43c8fb7cfeb0bbaafed65b1a7baa144c67905ed01a7cd040d292413989be060dfa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b6a6c4c0367a8bb924ca96b8aa157d
SHA1fc28dff14ce02fb6b327f316b9e1ad2c9105c97a
SHA2560997b960e46b99faed783b7138e094f58352857b1f1232c8025c89baa74ad080
SHA512b1b41eb41790b46cd5479299bc39b16ab1e1f457054fceed0869cd16746128ae1348bd9522c75dbd445356625a438819be0a6b9d93b2b2d26cb8bea73092691c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5950fee528a0b1b8353c9d49738d72924
SHA13709509ac98c718234adfb13b8b774978fda21eb
SHA2563e746738d5e71db4019876a47daf1bdf90baac54976d57a4903cf0269c95d93d
SHA512aec761198b61a2e2e5bc7d7be252ad382dc2697944fda6c58f9e60c4a74c24d9ce5b3ee8fe5373a1af26cd14a0b37e4c2168ae54e236f69b6003ba87635f89dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d828693d1e3a04a9df60baa8a100f0e2
SHA1f7e3128ab01a7cf871f64dd7565108e9039e0bfb
SHA256c0833a236354ec7f88f9fd2600eac1c2482cf057debc029eeae7ac764b28abad
SHA512f452ea64e32feaafbe8c0b109e597f2990456c45ae9d4c370e32a2b071d8dd78f0373963f007fa4ca090b19d27360e3218f6e762d940cd0317d03aa518a15d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5821c219fd8999f637013d3738dad4b
SHA1c3d91bddfa2b8bd14fac8921dee3899ac7b44331
SHA256f75f6dc217840088ca42511af4b7783ec0a85e14cbf763e71f84db00adc70be8
SHA512d00483070eebdcdb990508146a51bbddf91ce4c93a477d95520df02510eb6ad359e6f5b197129845bdff3eaf7dbc7b67cdfdc91a482c8b08e0b10a488122f3d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c6d47d31016e7fa38163d8cc90a896a
SHA1b1bfb5df210411e008f106bf5496b0094d79dfcf
SHA256dea7b320c6b344477ac5b454caf14da881f4a654e1e3b62f2be8dafad81eaca4
SHA512a97aa299e3cc60303e7aa56f34f967f868b361ed4c11db7426f59db74bf73325be839998baad6debd0bb77212d46851c6c58cee39db13bab9e86b69943e62eef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e84c3c5e11ddb684f37b8625c21ebce3
SHA1e77768e9ff22d3de5d1e58d8e337d89069b66f11
SHA256340d9884d111fc0ab3ed594480d1d1f0df3cc6cc664a12bfe2e6a054c95ed18a
SHA51274ef416d55d7c50e9f821d351b334dfb18b3c4aed97db62aa17cfea02eec1705a9e6e1618b0777a60b47e2a23fb5d17f2c39361099ce3f094dcf5ac527627301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9f41efd284317a909e75cd60e61b18c
SHA17c798a45aaaf10332cd1ec9d8f219e7f20445da9
SHA2561d734f65d4292d735aabbb8892cda7047a7a74b22e3e214ee5bfcb8866399b49
SHA512752cc1112f3455624b407c127be8df3601eec525c3b606c3b683eb4b3279d34ffdc224a68c7475a77ccbea1ebde9199b147b2fa858701067538314cf806cc07a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edd698e0249ee933bc841a62ebeab4dc
SHA122f808bb4b6c049d1d388e9887b8a1f0f73f6c97
SHA25638ac7d590b546b4060aeaaa338f625aca02ad212cc5bed60918290dacff69734
SHA5125d18dd62198eeb62fb716279c5c289c0b6e2da23c6456eb5362c69ef4d38ae1c623da1517ffc55844597c789ee69e8b11af5065e3852985c035b47230497bf17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4a48b0c77fdfcb2c032b11de7b462ae
SHA194decff1c15d186cc7be820a250da3435404fb36
SHA256bc2bb72f8a4db39c59f8030484e0b11e43df09b4a598339b52ec57b57f350935
SHA51285d6742cc5a846a276507f673237f144cf9283a19cd941c3d6263cc9f95169646f1f437d2f23abefaa0bad8612edfad31546b5e242f4e1b7797abe51fd043c38
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b