Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
d27b005afa508d44a5732cd9ba73075d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d27b005afa508d44a5732cd9ba73075d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d27b005afa508d44a5732cd9ba73075d_JaffaCakes118.html
-
Size
147KB
-
MD5
d27b005afa508d44a5732cd9ba73075d
-
SHA1
4157e7baadae0ba0e67989bf55d47b8b9a9a28d6
-
SHA256
9ccf0aa5ac29054a8a159741e251438311f78273dcbbeaa78686ec90a4cff6da
-
SHA512
f6ed83b2461b2c5efa10ef29f39b516576f5ddba827f70df432418742a6030f5fa2db809bea6bb3fc607cee81ef528a45c609eeae5c544a7da57d410bc1141eb
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcwnQHHAoNUL6GQ9FcZZQ4OIp:s05+LQFk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 804e7aa54c01db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6752B11-6D3F-11EF-B439-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431892455" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000b79aee18719e08d1e0d4b605608cb8e6a7db698fac5b5bb3a8355d155eeb5b49000000000e8000000002000020000000440edff6606246286c6404d163b7e439973d3dd0e02c2d6d4ca3b3f3db3f3f81200000006a82d3660e0d87ba38a9369b1f74f91050eca1692c41229dc12a770c32efd3ed400000009085e04be8e5d4039202cd59eff3f98d444477bacf1802f3e0559b08ee98255dae8793d9e99c8529b31c7b25df2c1cfbf4d88799fb3d0156bdd7c040d6bad85c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 828 IEXPLORE.EXE 828 IEXPLORE.EXE 828 IEXPLORE.EXE 828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 828 1740 iexplore.exe 30 PID 1740 wrote to memory of 828 1740 iexplore.exe 30 PID 1740 wrote to memory of 828 1740 iexplore.exe 30 PID 1740 wrote to memory of 828 1740 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d27b005afa508d44a5732cd9ba73075d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fe85445485c2838f224c720077bd7d3
SHA14da1cf06fd6fdefd3db4b157291f5dc70757d5f8
SHA2562cc06529d09666bc7acdae319f5275736f6da922b786a1323f881bee9843122c
SHA512c996741e7127db1ce349f8615a31de38abdd3f2b2caab12bbaedf40b2364ff6d3f43cbdf03dd662b1c69c406043b5435125bdc71506258eba93d8f32c1532fac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca5ece81189ebf399efcaae9a6ff45a1
SHA1355256baaca81d567af503e0f005a25de94697c3
SHA25668e16c8d26d93f4c42e9cb0dae2d65481f9a2ec77c12b8b4ac5edfcddb1913cd
SHA512899dcdff68ed44f995b2eb579ef384595f6088bb7943ea52a09af4d133baa2488a34ae5db5d94b74278ed61152112271a4123e8ca6cec0d6f27bb6b65c021b63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d794ad62b95b64ee57857efdfab03852
SHA1ff8a397169097838fff5b0a27fbf0d4273d68ae8
SHA256d64f91b9023e746c11e624c540572a0be9bb28ac2f6f9252aae4894d1d11b9f0
SHA512b1155356bd37c9227acb357220c80aaa199742666cf28479cf9ad927b416b04922a7b0ad2ecb5e41c0db9fca86639bda9bd1a717857f2a8fe7d17f07b8731ee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbfc74235486a830e444b330e73e94f8
SHA10daae214fd4c4967aa6f5d6a312d76b24cd514de
SHA256ebeddef73b4bd715590a9a768c98bc83d6fc7cb13388fa72a2cedc64f9f5bcff
SHA512388ab8d6f77102343d4b404ac98afb2c3dd0c20a623fa5f6074d66be7d046f6b72bf70e1e40c313227e168b88b3a080915eef0981fd597c55be25b493fadb706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520be2762ad4c5c8c67ff4b88b9a32e8f
SHA1443d3fbb541236510c2c8ca2096d1e622437bc9f
SHA256fa325282c4694d7531f7b801bfec4756dd322cbee506a4efc5f6e20e2d62c36e
SHA512acc48271cdcc21d779d5cb3b6e37df6a2c08b1c7091f4f6b24917be93fc33f57fbd0b660b6e7fd5eef041552b388351d3413aeedc6f2731cb5a0a7a8e520ff40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ea9a6b61cde15e507569e3d3cb46555
SHA16930cfb491cb5f4c41314320b726ad6ba00e289e
SHA2565ff6a41ae9d2e3081f946aea206e576f8f2178b5783969518655bcdea57f047b
SHA5124560897e7ca405ab460532f3cf6a54c95ad24a3fc5eda7f6feda6003365eb781cd9d0ce11d635c6cce0969a3c210d37b831e57ad8d557a6f188e42aeea6f7f1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd68266f8924a965bcf4d25ec4db2a7e
SHA1083e05d72017657eb877e661fefaf7e418d6b968
SHA2567b8fabcd271fd67a9edbea15f2a9cae13175814586503b291d3ccdac935bb9c1
SHA5128f05925e74c16d97c17caef7c038094db506ad70f67fe2320bc489178c305cfdd49b11ab3fbff274ffc71813ef8dd85be3eba191625c42f18fb22fb48b25101b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d96849b09592c03a20950ca1ac72c91
SHA1aff347c8bb9ed5b5f5954745ed0cfecadb4d699b
SHA2560cb7dd5a9db906638b1577b089614755961aa961ace9a1764861ef3809f77229
SHA5125b8fee7f2f1753dd380ecaad8614c3727a133a996c82b7160275bceb3b2c5c215f2a525ac59f66f7972853f73cad3b0a6463f681d1cb03e25efd150eccd94f85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d058adacda1bbc220ded31a71cf2759
SHA11e13f2d36bddbf53e09e427aa6b22febde60f43a
SHA256f32195ea8a64bc7da9f0d374dfe64b07b6bc534e56368eb425c07ff195f60824
SHA5128584f4e7db921d0d24e8b56414e27e43b3d2540bbfd44d91aefab0fa509477a3384a85ff2b222ad169cf5b0470fcd6009ada4c8e0d830242b3c27a5c619f74fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac4cfd1664832be325ee6fcb808f5d83
SHA178af7c2b3e0e19894dedaa69a730259667b04c23
SHA2567a15faad668708049fcdb62d933ead38b9d596669d4da1cdb96cf5fb68e36c88
SHA51255b014cb3eb5a43b89cb9cb0ae6e6bf5510274b177f02d7696c28bd4d87977383033b103cf83d1909621bdd111abedac8cba75d99fadc27a2c7b387b8f0e27fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59da685cad2b73661bffdb2bd5f04e1cb
SHA118e73a17e182fa7355d42e68e58f47dcf83303d8
SHA25667325e354185b9103ffbb33381ddac5dc6fc60e2886626bdd8fb6057967cd7fc
SHA5128487c9dc3bf332682cc1f338c875fe2f41c083c9b86d9c60cee0dd42e43f473d631c306d37ab6b5abfd0cce859fbc2379dc68c11acca3044f6a1122f06c3b7d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514fe029bf56525bcebbc887e88a9117b
SHA1cf88bf0244315b4f2c5e1a890888d649dc9864df
SHA256763d393d040a4db956923a9141fa6606e16037ac6ae4161e96927d0c578debda
SHA512c5c58330ecec0bac67596c1772c1c1e8901f29573446d48d20c07d2b65dd99d5840c7e80f26b8e85957327e82546efcf942a27870b7c0b8732797fcd66c2b5c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e03f957ed538046f51f88e494a75ba58
SHA11d222cd9419d8a52feb65a4c1b4cc43c1510fafe
SHA256d59c363cc1cda2b28b351209fb8caa67003379e4ea0785e484d7f2158f775db7
SHA51274b9b5ed3ee0a756fa1ba68776d0522f78c6c4d868791c33b8ee3d2c38fa79136c782b9292aea8e4cc5f72e85a2d2a4981324a7e63fdadf398e4b7a4a0e579f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586eb4e8ed73a042682ee2b5508a833fd
SHA13a4a43ef065c99b00e4184f3e087d9fad394e01d
SHA256cc9302ddafeed64c577fde0bb4a70bf4c26c456bddfe04418562c5a92aa0c0fa
SHA512af287d4f70bf217f99e7e5dd3f10285189078c374b380f23ed781430eff45a8bb3701ed585fc3b77ca9bcbe8b66d28063b20f0ef08457b1189e4838805190473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534ac050fb955807b7bfdd231da940863
SHA12701cbfd524c4410ffed442a1e035fd771036a80
SHA256570aa65b69de0078a43e240cd050f4e043ca1e92b77ded59bd98c32ac1a8b393
SHA512aa01e4e58a01ba14d118fa8c7e2162b8f75423f51fbd59d54faf1f7ff6c0ead1826b2cadf4425ea9d696e40219b200f6050d0bf7a144653a5716585893f36b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537726245b963b5f219408a7148cbe65e
SHA1d42e19a9afa9e382ca91af1dcc4c828c10f29f5d
SHA25602e466c44b94d6ec4058ab8c7bb4fb390b87a6745abb2acdcf19d4cf5f12612e
SHA512bbf4f2df634fa727c83f63eddc93037464320a8caa1068774b40961c505bd84bc3bffbf31c66659d6639d749fb7bbf0b8ff9f20e092a639067a9f9d3873b7946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b136583f864b65fcb172bfdb6066808b
SHA15939f1c78ecedd5df6e673ede5c68e776eba7a28
SHA25654529ad7bdfb6de6cbd82b8dce8bd7eb8b51164a444a993f1c5775e67dd6738a
SHA512827518c93bba824560f089fadecb1ae7411046711b1f1eff81404ad81ce2405f2343b5f9d558435580f491db3e831f651c3a4a98bf3869d3fb2f79c502e385cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fef0eff6ca1683c3a483c10205ad717
SHA19f5c45b1f54517471a31bdb91254faac3cdd0c72
SHA256017c38d3ee2e135225bf7c477944f9f5840d596f8d5aac728ed30daf6d21244e
SHA5129a1517fc538ab64e44dbfd145eb65c289f9878ddfa0c06a493608c98ed014fdda61cf47dc57bcbd1642fcb7fa8a8aa6e520f366741bf181c25eaa7eb66e1daef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c34058fb5717f18e9357518fb916ce9
SHA18083d70378573fe4585bd823649d80a93dac91b4
SHA256581dab55a5384d9e1da6dcaf5879d0e454c9597b2d7c80ccb540a6368a610f98
SHA512120f700cebf1eb3b7c57fcc2f54dc0c1701ea088a687571a074613e642debdf1a5350704da4d27cc0953c5db0d6f985b847994bb3390857ec30ef19fff8325f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6f0f10ef789b7342ecbed3329120a17
SHA1bf4a9f467992812f3ddab90b05be83f40e24e113
SHA256bf01ba30f35b8207ac03bd4c80dd9f7dd72548b6a051a4377c115df65d7eed9a
SHA512c2c49bd1ac276081b727ab2c6a18da47096e56b143a6227cd417e3a7c541b0be9de0763b7f4a29f7e1051416a7e83a7db3644d902d3ec2945e24bc173e68e9ba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b