Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
c7cd8289ae8ba66f5a6cc22bb4608f44_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c7cd8289ae8ba66f5a6cc22bb4608f44_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c7cd8289ae8ba66f5a6cc22bb4608f44_JaffaCakes118.html
-
Size
55KB
-
MD5
c7cd8289ae8ba66f5a6cc22bb4608f44
-
SHA1
5a6f729ef1899e2d78c3a1d3391fb929d3f16199
-
SHA256
737099be2345d5e2e89bf6b585f064ae4a5b4a57f740905dcbbdba86b2f74553
-
SHA512
b8ac34bbfd54982a8c5bd3cb443cb2449b4af6c12b6858c417b19132b23f56f77b44fd807c548e99e9b959c799cbc778dc09f96e2faeff2ba74ba8eeb7a35c54
-
SSDEEP
1536:S0uGR2Yz0w0C0C0E0E0/0/0X0X0SqTQetsRjXOAY7:SqR26VXXttGGqqFrOF7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b07920f19df9da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431047796" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15D41AA1-6591-11EF-ACC7-DA2B18D38280} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000088afaf21bc636bd1c0c3d8273bd782afa0bd3e48162d150baa97d0e34ee07aa3000000000e8000000002000020000000972cf8c9f266a8ec490040224ee842d223aafe3c29003ef354c49676233ea580200000005b6fb598b8162159bc5af6a0430ca1b1260f8b3de5eb56e81916f3f2857be2494000000069bceb4e4020909f9533dee11fce2a1b2a4735c332af8f5de8c753134cdad6dae91b19bbc3957bb44eca56220232c56c915f62d34a53423cd0858beb7d839c8d iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2292 2488 iexplore.exe 30 PID 2488 wrote to memory of 2292 2488 iexplore.exe 30 PID 2488 wrote to memory of 2292 2488 iexplore.exe 30 PID 2488 wrote to memory of 2292 2488 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c7cd8289ae8ba66f5a6cc22bb4608f44_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0a4479c2608877572f152a4006a6f88
SHA177d8174288c74ce281775a139d14e53a3b653f5c
SHA256e054a0bd22713fad6816c0eba994f49e66266048db1cef3261ffe23722dae7bc
SHA512aef9a991c928e6ceee47529ce483bfba2aaace54190a0f1205a29d7258d3e0d011e798958991ec0641e856e46f6c35e23551440dffa97cc63fd218fef94080cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51875c8582fbdd1403c09acd18536e9c0
SHA192daa5d8f10a580e519bf4e4d3e956d30455c6ee
SHA25679a01f2853a2d1634a16af8cca5cffcb02cb5ce804d70b6535e96e3a3f140c1c
SHA51283ec486b2e7063fd01149c731672085201bdfd34167cdd66ec3a922e3034bdd9646efc663e33e550e29fb09c3df451699d054266c86f165ecad16c90a0612630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f54ffab3d96bc8f2e962fc0026d49d9f
SHA106898d5a2365e3e6c1a36652d3b9012b36597d47
SHA256b9f63d5c18425a3e3c36f3fb70e64bc407ecd633dc0a89f65689207d338a86f3
SHA512bfa803b99d7eb989c352887e4a54b0df257d0bd964f4d31e657c839a17f1edc25e6feb5030756d8be55028d275a0abc4924bab0bf8185332f2cbc9e15de5b998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ac008c6cb97ad2f89e6b5140f308f64
SHA1526317130c1bebc4831f34b306c3338390f34a41
SHA256019b4989098f5c5402f6fd5cefdd9fd0fb544431faf6d735e40cdc90d6c1c7c5
SHA512d032c3c903875d546bcd848ac4a1da9098bfe9bf4df287500fe11168d8eaaf08bb5493e85276dc9629842840557d495cfb7f19aa80c03a549853b67a5665ae00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ed5d42e2a95f106759b1b18509d98ea
SHA1ba8d8d8a2ce22acd482f904d4eb85e567da37d1f
SHA2560f7b22663455a61c5b5a75ff4dbf5380bc283770a23101c85975acc58add6d30
SHA512180a5f9cdc9feeb24afa84306b56d4170c15f44c0add3c894a41a722b2421f3a45479949aefc6399878a384dd257551bdd8dbc515dc47cd7a3c9b11b0c3766fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e2eb8d8aacb0100dab6ebf4aa907fa6
SHA122161b0c16541156d65a637576f1679666e9ede9
SHA256e870b7829513b2ef300f77c4a7df2604c51dee4cb852630f4f127b22b7723d46
SHA5120d0d827281b2cdf6ecd629dfe7cb790b1352069be3e2671119f7b0889af3b0c8000314f7543036c72ba89ba9091a9285101cd9f797ab7ac79b5247220fc0fa3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d083ed3a138f3917fb704e1a2ea7a67e
SHA122163a310eb6550ea66f139037cd9ba2f214a439
SHA256f644f3dafa49499cab9196c4181306fb45756e442c0c3ec36cda45d4e24e5b13
SHA512a176194a7529df23898f817350ffd2cd7f81db755416100fd057a10dda0acdef3901ab58c07483fa5ad5ef5b7edc7bb7dfea7cdf413df934a9bab137428b6c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5597b7b53679741b42ddbc531d47e83
SHA1066150cded4b72870f22fb091de6156c22d0202a
SHA2567eafcf4809b20f65793931aba9f87b4322fe17a7ffc6020f171e5dbb1c25c1a7
SHA5123a1e7d3a0b717c01325ecfe846444716aeebf18f8c37f079d977cb9b128d6bd30b6920344316d14cf931004baccdce438bee982790a3501279069eedb996237e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e4e94b3d2f1de3d358fc321e7a3e54b
SHA16dcf7346fb6854523be6705ef523ea7f93268ce1
SHA256112eb65ed0653f786de673361651c48ad78718a5e55f60245e0da67d813118dd
SHA51257767707ced38e7f61894d3be8bcfc54bcf85c0d7a312623cafa40f423ad54bd1040306a8e102ece571c5ce25caf5d18e490d46a03bf5d8b2ed825521c439e0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e21379de97bc72652c431366986177a
SHA123b836018657faa5f8df08770af698d925657b47
SHA25642f3c9fde40d416b7ffc86403c3fd4a577d58b6c5ae2563c088752c376b9d787
SHA5123b86d4569a94b8f4f815f7afcdb3f4210b74cf0b154c98edea9be683d8c11948bd247185a094b1612b2790c7126c82975696c60e74acc657f6e47741087013eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5154dca2212e085b7864c30d54af91a5d
SHA106061b15c7f29e94e4f1431d728e05cefcce3219
SHA2560219ba5c5c28ada0f0c94bf12a687d355343afd7575e32467bccb569dc8e5227
SHA51203c4f7ca745b5a883eb2a75915a800533df35d53162165be2aa42ee890299296df5d030d39c035ff5286ec7f7bdb81f07ab5562d2b8368454733ec9a02b1b74b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebd7d0ba756db18c134fbb1dbaa95e3d
SHA19aa7c1b53f575355b595ecc42c9688c886917051
SHA256ae1dedf03f9ef7c4968f14898b87238e5cdec9d5924cbb5bd23d8f1beb1b6545
SHA512f1c4d0a4d2fd15f5b9d808e1ba61dcc8b9d339f95023843dfce8f501fd8f1c4464870d1158c21882c27be7707ea1f1bdae31052f9fa18b433ebabab0aeeb0121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598aecf68db67a02218c255f0a0c6f6fb
SHA165528e2a9180e2a239c3a502de1199376ec2314f
SHA256a0a00fbb3ff7094508b1990df1d195b8b3d415e8e3cda4668f9c6594a4ae8f4d
SHA51226549d8008910e296d690e597fdde261b95ac256f0f3a5a1a29df8e4d51c49abd5ed48c2e7c6d2fd41f9ef4c7fed416e13bc46f0af7044c9979f65ba23c52592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bab5f0c3eb95ab4c0fa230ed31ac107
SHA12af68fd92c40d386b017c929fe4f7b28ae797214
SHA2566dcbc6bcbe00f4b270bf137f1717328275a2acb772889453db7e72500711b5cf
SHA512da3b70f8e3eac8c6089a95cc45371dd29c539b5b8ca29bfab078617ecb8c9e7ad60357b30bab63f4be00b410b88c2ab266984cf9611b28a27e362980318b054f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc12bb73b694d2f2b7ee4617a5820b7f
SHA1e5fe86e3a889aff1281d938c5b5d8576c41cf3f2
SHA2567fbe2495c6385f323c117eb2ddc1575232783ec07b0ffc3598c1d5c05cff2151
SHA512476229da1c5d7c8fde515397d4c9a53a6f10a7f583b84914fcf37f2e060e94173bbb918b53e9c1842eb1600db31b4c5106046878a0fb75056f7d988d6f328011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c64bdba72ec598b81ad69db2420127f
SHA174652dd4ef8cb940620118d377c5113292a6a5b0
SHA2561e9f92fac1a5fe59a0316ff81a5fc1b272fb88b22dae2e2910f5044422689a24
SHA5121e0f746cf41a2ebef03435d0bc007f9b387c1c545ddd3e83ecafc32e926eef1c5620511ebe471c639de7ebb40dabe28aeda71c7c4ba691a4b91c9f9653c5191a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d58aaa79f10860c615f51d6aac8921f
SHA109f5097064568d7ba87b9b239ee526fc7468a16f
SHA256e2cdb377483910fc8a4b89d486644b73a8a5dcac522a9ddda74668ea01e15b53
SHA512d11aca9f1f303007996bac296f68969a3a6fa569c48b92e8f4e5bbeb97bde40a5c6ff9589db76b37fd23c6c43397e68b863b1a6eb356b6934c268560e6a67767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8b9be11c65f6eab1bcee5018270536e
SHA1c638453ca3ed5d3970df5512bad76a06c126a3f1
SHA256ba3c0c694f2c5a85bbc38749f3a7bbd3e62609a112240478606b63f5bfc6c3a4
SHA5125104775ae3725aa3fd1cb3f1cd1d6c82afe756692e6ec1e3cb399114f3678d30ba196a0dcd8a9899dbf728ab54f5d1456a2c95469b261df4ee44e6514a73d5bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5571d8a18ab1a207add6bb1584d28566c
SHA13451301f215f7acdd19b0ad9f58237308128109f
SHA256f08e730b60378cb100fc292754d0ded9af8da72bf5e668cb851dfc33382494c7
SHA5126aeafde780d59a6bbe6f154e556b7fbd1c106968967613cad8c669513a47ed41eb87881e0a1d1c4e9db206f3d3b2a0f8438d46c54891cc758af719ea96f90af8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c738235f5c2131529bcececfcde6da85
SHA1e760c87f091166d951c9e2d1f70b7b036ff2bf2e
SHA2563c85425ab39f2480ea9713348671758ddf5314cf300fee0015b03dac13d19ad0
SHA5128473889dd7edfff58e05239329c1601216c5263ce7a41a52c1d45370e384644788afe7a419a0c81c0d260731520bc055ddf4b1b23400580f5359e07c17c86f00
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b