Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
a7a3abc890b67fe4a3af1267b46c19ef_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a7a3abc890b67fe4a3af1267b46c19ef_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
a7a3abc890b67fe4a3af1267b46c19ef_JaffaCakes118.html
-
Size
49KB
-
MD5
a7a3abc890b67fe4a3af1267b46c19ef
-
SHA1
b47c96d77b99fc1733c8264fd4a6bce4956190a8
-
SHA256
1484c22417c792dfa7803c7321e34bc66da36d6cbba05cb8485ed3510e6b7b7d
-
SHA512
813cc33dbe99b40f7f51c04b1401a7c4f1f48e69c4ffd45775a0ae3ec0226895b0ac4e67c02b7f10fbfed8c75e674c244cb622de9e5794727701817f4d26db7d
-
SSDEEP
1536:XyZQN2LfGuwCzSejakrXoobXGSUxw0G9uS0ufU8S+7LEq8q9qqqbqBgm6Hiqsx7J:X5N2LfGuPzSejakrXoob1UxwV6HiqsxV
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b9d3ca103ee1004691cad14375e8f8fa00000000020000000000106600000001000020000000b5971a8ecdda02462641408b2607446eecfe71c17303e410ee8382795869093a000000000e8000000002000020000000b318ac1e4f611acd67a179616521ce36bd63b0d872276c531d89e4717114cb9320000000c506f63d0014381b826a5251a926515c1648169f7ac5be27b55641891b3c41f240000000eae6bf2d41df43bbc5662d7405f5f1ffd2878fc88c0ae2b8c7d6ef2f1ea5b59e98a4de955b96ae57191725b6abecf1f76da28712f727d7b88cbafbfb852c725f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C98A0C1-29F1-11EF-B5E8-DE62917EBCA6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 106a281afebdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424492005" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 3040 2068 iexplore.exe 28 PID 2068 wrote to memory of 3040 2068 iexplore.exe 28 PID 2068 wrote to memory of 3040 2068 iexplore.exe 28 PID 2068 wrote to memory of 3040 2068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a7a3abc890b67fe4a3af1267b46c19ef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD55cb790447cdb4449087a40ee8bb349a3
SHA11dedbe4fd16d84875c9579057258f5633deb710c
SHA256aba390ab9d5bacb8b79914ea2c30c22be7a787d296efaa0fc31afbce081292b3
SHA5125a84d46fd796762b87167018fc785e8a3568a810057cb7c7edd759c0b6d178609f40b238f0b45cc9b46191742842f6136c1885a7b629565402a5a743b272dc95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8ae5475df5a69bf6797d3906d380105
SHA13a1da02b07e4fe772f70f892c6eea5f794e2b572
SHA2567fcb225e2f77c6934fbe4edd57a129a536397cb39f2a2d838c87fde772bf76b1
SHA5121736bcc5ffe253b344a245841353ef67cf9fd52eb4c4a4f8490909cbb5b801aedc2df858047f6c0ac4dcbc01fa217fb4325bdb0b5961c36802a7685955755f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ff4b5ca84cd907eff58c1a37ffbbea4
SHA1fb3eb0b5a3f17677d3f9dbd8909528656d0be534
SHA2562f808dbc027768408ccee7d01e4361cf77334c513f43c927548b80c0f0207796
SHA512761a48e4509d30862a06ed5ff7bdd5a7eefef9c9e936b80eb14f713b7534479fba7b5ef62346c82e57c50efc276a121a9ae0bdb89ce8a82d1c431c2efeb3ed9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a1ebd5160e04b4e4c18261913e3fc88
SHA10c669345d7e0318dc19ec6065274972a32f34157
SHA2568c4ff33aeeefeef909eecf287b60855f0a8f5f5074ec50b49c6530f099858c0e
SHA512c904969d38d13f0ebe192c7f2cb3a68fe82e06d1ab5f4aa37228fdb035bda79021235fbc5c34babd56e29ab5e92c09d09b271a6fc035f31643ed18d5c1e14d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ac69b9eb8b1b539524f5aa6c8fdbff
SHA1ace9ef918f097bc43ec40ecf921ff69d9dfc7cc2
SHA256abc7527be29b463a46b2b780f0e3bdbdaba8de2efad7412f7c08469113269894
SHA5125f411f78ac2b0b894bd743aaaece4ee48bafc614395febf749ba7f32682c9bec718acf344f9e3e10defca175987c729f9af6bcc3e99d3e5d761c1374a691e4e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c90c34f0c748c86a0fcf543133cd9b9b
SHA1f7a8686a655a615c3cd8720034144d6de048b9e3
SHA256b43ab7e7b8d902cdc2d8129451b15ea9d318f0c23faea42a2c696fcb4897754c
SHA51294814069927a0f51249141c6117d6063db3ab9ff9dcd9bbf0610bb18eba98a6bd142844f3b7a6d05cfa791ebc3d54fc488ae552a80dc3891b1dfd383f98ccca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5576d4c8912c5544f74cffaad4f9c8ca8
SHA14702dcae937ddf8ee4a81edc1fff713d253f6072
SHA25621c72f9841ca6cdc6500b99af05a0b17e4d2aee440580fa566ed8293ded9d623
SHA5125911ce0dce1fc37e32070cb499a0f855ecc098bd657491c048667860f85ff64e55bd4e99da679afd380c005926ef75dad00f3ebbf843541ced2e05748e5d4068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6d9de721958d87f8cf269b980b2dfb9
SHA1c362382f64678783e1b63d388a407a0fc2681566
SHA2568bf3a7737241a39ef957ab1d41836393013983f8849aee680c54035aa911619b
SHA512a8385309eb5b412dac0f7727f61f71a6ce39bf5ba1b9d6ee59632ec52e4f02051c4e0f79c528329c6ac79ff1db2b5c0b10c9faec7f45a365f3a93503d14c7310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddfed3dfec2e6a3722826ccb5fa2afe7
SHA1092bfac20a56744088392a833e4576ca395be58a
SHA256532afd220912e61a171a1c4d5ca247d85b2ad7e79fd13bda13806745a7f1123d
SHA512362f371033b8b83e98e52f15039c415e23131ba00b5684849a700f0908b2ce2336e14e3269bf884e994803de0b67e86ffdc16caad486240b271f99b8a30cda6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e69f15619e587b861b24e2e5a0aac24
SHA11522defb74cfd924c202a6f06ea4252807d74108
SHA2562e03ea004f7a93ce92931d8e15037ef96a7847bcf5810ea7db124158881c95ae
SHA512732da134d1f963148ba2dd00871323b872c54b810ab7457957b335e0af60d2506b1d4fa5e8a0414e300a37306f6c3cc364582aa30a2c2acd882fa01b71953b06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da14f127055255bdcf7745e12b1b21a
SHA104fc5ce2bbafd3c6ba1b0d91e5d41c5593bd7da8
SHA256e62a314c472e58625e6d884eca5468756185c76b34359bdf5f8e9889e5f65b19
SHA5126c25291fe3a52c9d4956c05253387f309a3553baae0167f4fa7f19f05177ab0d2ace13e6ef96488d4a890f102df9a2851e5cbd88ffbecd5c8347f22545198b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD579b9c4ec9848c9c3f096cf5ac89c2417
SHA1f6a5af439033c98b4cbaa2f5851f3f4fe741e0a0
SHA25600c1f7ec87cf315351c37cd69e84104cb883b587b6af02035f6c905338bcda61
SHA512a2c69ada4db43bf08440a83bf4dc1efb8be73ae28fdb88cbd99dc34ceda2320a8fc0ef937caea1c0a5b0d22848e6384a92a15c4b7b529d45712631fe39838e03
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\slider[1].js
Filesize9KB
MD5a9e58cc5f8dd281daa8d8dfee6a78834
SHA11b6f58a68221a3a4709fcc6614cd6731ba012166
SHA2561c31525e35f50a43abc9f94ea9bfe43aa2c2c122d01cc5fd6de77b6f8f32efe7
SHA5124b67782b02058b4392ae018f17fbd1165fd003ce9eb697c6cc1f36fe9b3b514b5fcfdfe5d675e18d5815da46d519102955f376daf5edd8a16728c990a8a93030
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5OCCPTL4\dragdrop[1].js
Filesize30KB
MD5046759400db7a6096376e50110104edd
SHA1f02be2b96396a9a9aab71b17cffbc77f025fc906
SHA2561b88542d1458cd86dacd3de3cb9635ded83c01edcae01be5f49451611985cff8
SHA5120a37e1983f0e6c31a6d0b8b9df98338ac5239b46ce053b0153f4284b96910a0a9b02d70558d1cf84a5864653c0e17d74b5080e4dad0cee13c2b00d51513580c9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B1014REI\advanced-spoiler[1].htm
Filesize167B
MD50104c301c5e02bd6148b8703d19b3a73
SHA17436e0b4b1f8c222c38069890b75fa2baf9ca620
SHA256446a6087825fa73eadb045e5a2e9e2adf7df241b571228187728191d961dda1f
SHA51284427b656a6234a651a6d8285c103645b861a18a6c5af4abb5cb4f3beb5a4f0df4a74603a0896c7608790fbb886dc40508e92d5709f44dca05dd46c8316d15bf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B1014REI\builder[1].js
Filesize4KB
MD5c6321f204481f259724bd6455c0fdded
SHA1af9964a44d31fe9773b46d6cd62612ec2137ea79
SHA256828884af31cfdef92040ee522a81d8f82c7998b72c3e7d35e1c442946b5d2b0a
SHA512b4541012d505ecc1fb45f4caf49f0d3468fe36c06fe4dd765ed3a6f1947f2607139b87ee30d8798a9c29c2062350985e8a448d0e54975c26fe71564b4327a644
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B1014REI\controls[1].js
Filesize33KB
MD503b502fd8ae202eb164b348749392720
SHA18a7d159d60afcfa936eb28f6dd84d8ab874133cf
SHA256e202a06e4447b310dc039ed968aab2f0595ca77eb52ec246d24b0a80a536ac67
SHA512c913bb469109b326a5aee7d5f9b51f8c5b5169acea815165055aade6d407d466c5f61dda2751b8fac2f622231045293889ab1186f1df03a34367f4f215cf232e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B1014REI\effects[1].js
Filesize37KB
MD50dea24894889a4c537e1a451a35f03ca
SHA1f72e2ee2019cbaceff0b7fda89ebac9faa7c5b6d
SHA256055be203cf7225e94dec4a5f72ba1f469a499ac78c24d9366705c1099de812d0
SHA512c532fb6dc13525a9ece1b5be74cdd3cd03335865778bcafc012e4e7d7b6332384a75c99245dc8e17d48f3cb9461faed6a9188bb0c673b35e69fb4202ba0c6c22
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b