Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
d3ad3d8a470dd5b49b244fdd8b8409d9_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d3ad3d8a470dd5b49b244fdd8b8409d9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3ad3d8a470dd5b49b244fdd8b8409d9_JaffaCakes118.html
-
Size
5KB
-
MD5
d3ad3d8a470dd5b49b244fdd8b8409d9
-
SHA1
0ff5fbda7471f65856035bb5b2123178e6917d41
-
SHA256
290c9199d301bfb1af0aa2a1bda17c7d2a1eba16bc50afaa6441a2fb35344970
-
SHA512
c75a595b6ad3414a4e6edd2821940bbf16c43cb830a092507d29b789d5203324b269c16480a6ef84af8815234d6fee50dfda3ee137f280589c158b24515da145
-
SSDEEP
96:1BM18uU6lfnogUAcf8Py3H1VKrwtxpHohEPC:G8jOfogUAc0PQ1VKrwtx9ohJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000007ea31c17d33a7dbebd0c4236c3ddb09c6038cd7886b1771b9ef74b5153153cbd000000000e8000000002000020000000445243d71d70a1f20aeb4e9516f227194910637211f9cb8380b4c5eeed5d389a2000000075e2eebb2fbfa449850e22dcac3078b77d30479cd3250e499ef921a228b76210400000005d860115460e0d80a7468d313eb6d0d7243f399c6c3a421ebc7570b3577fba15731896c9f3d7c1ba9c0776c292baeb7ed41b9396f69d546c365a1d14fc9b45f2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431936113" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f06b1431b201db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C9D2A51-6DA5-11EF-B40C-C6FE053A976A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2652 iexplore.exe 2652 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2672 2652 iexplore.exe 31 PID 2652 wrote to memory of 2672 2652 iexplore.exe 31 PID 2652 wrote to memory of 2672 2652 iexplore.exe 31 PID 2652 wrote to memory of 2672 2652 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3ad3d8a470dd5b49b244fdd8b8409d9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5991668c9685727fef7d17f92cb9a72
SHA185b7f5ec581c86e781de0ee0216b0a5ab93145fc
SHA25644b07433464bec272c1b653d7c3d2cf8dadafd463c138ceff6e5bfed1417768d
SHA5122524e920d71fd49b77491a603a7601cb3749266f11d2accc4fff92d07c6d2088979eda70ea23d66e49b2e5316968a43e9008e9aaeafedf6cbca95f102166a539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bcc857a14e9fd3fdd3bdde7ae13cca2
SHA1b6fa54f2973b47326d9877bf1c06596c6f024a3b
SHA25630258c9ce12ef89622c7f3b2f60513527658d7e26f866bd4f56a7a6aab1baffc
SHA512bd3c054d6dd1e76fad6a5c6b7516b5d7bb5f0d210c5845bb37eca8dcf0721784a5aad74f316cc345bacf1e0458ae74c06c8c7a71c153a626d67758bbe5c624d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab14c049f2569ddbfad3af0afcc2ad21
SHA13324715c3526aff75e2654fcd99b3340f9296eaa
SHA256b9367811b66f74e1906b51eec5c9cc8639ca352b5bf176f3bfd61223b25c5e21
SHA512cf527fc79184e5ae319ca2791a6700a7685ee20631e6981701440edee3906d4c1d9af9b5be94472da77eaaec6baec0fc8145a973d271d7b9b6250dadfcb2ed00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9dc72d9ee5bc13d55db3cea8b573049
SHA104904cdb3c24444a0a4f6e8e5c9449071264d4d5
SHA256463ccccc24f31f1b94e3cfc3e3ee2d2f95d369e31eae4feed12e25b0a6be2e06
SHA51220bba0d1a52f6bc4fa5944751fe583a3085f548f811b07b01dd1274e813455aa45c154216fd0929d771efbd4271c1edaba363714c9be6472de534e31f8e2b5f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d9efac655378fb9564e94ecd77470d5
SHA148a76c4d0886479f44857ad35569d29ec99da0b4
SHA2565c4e65d9f44ddca4deb7a01d92e96d03118038e9778d7f29cce56ef669a990a9
SHA512dc8108d041057c39ae2257a9be58b1921a05fa40025645049c0d9db86c14bfa7d74bc3d78a4601df8acdd8c2e18a6274ab7082157e1d54c2235d76ba228e59dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a1eb5c2fdb7d89ccfedac8514de927
SHA1a58df6dc7d5ae4b3d1b27b13458eabfd1c985e5a
SHA25604037d90eff9e9bfb10069aa755bcf2d2631b49f9bd637514df38c3cc81d7eb1
SHA512c9405145007287e413c24234faa2b617ab7c2e4dd949fe62d3e53921dab9b66e53f0b7d822ca54207e2e25060c634790917608112612ccb7ca4362a6f5d7b841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e8325d55a63e8de4433aa9f7a0c5d17
SHA1d4f3ea4139ea445371fd5e0ab4af659495954f19
SHA256a90174364114891d6f2749c7d981d96fd2979bf5f318d0c3f5521a79d8eab5ea
SHA5127b736595b9ed818ed2be90fcd5eb7c8857277f834674e551c6c3e2b79bf445f55ecf8edd100a2fde2a9476ac6a40495100d51afab6fd2a9467f2c5e801b4afae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52816079f294c108846804de02555be3a
SHA119fc3d4debdfafc969abff0991eb8a2436d36c33
SHA2560fded02186361831ae583e85d86079d27d9b5c613e9419f654870a5c515e41f9
SHA512763e9e89a8307a7820037aa83d8823c3b62760118db8ff2c2d5fcd03141faab723d1c4a52c1bde89102f7da4ed47e6636b4b892871c702ceb5cd2afa0205745b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e605bff806241d4a26bb450f75b2b8
SHA1b020aefa8d00b06180da541094dcc2ccd41e2427
SHA2563befa99f7eac651ac78317535e74415a2bcc73c283284e9c3b6cdecd76d5d39c
SHA51215da099e63ce5f05e89ea1d638550e4d93cb7608169b9a14cb2bf97dc7a089b0824e67393e3f7d67bc4bea2b2d72082fd49acf4b17f6f26432d5fb2a592afee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50173810345dd51bfe0ad2eb1468abef8
SHA112d4daa2584549bc4abac904fdfddf172d8cccf2
SHA256a1baa65a81f3ef696f0e276fefb6cf338f77f8b4899e89b788724fbe3ef8c714
SHA5129fe9270e20b30726ce98c5b3fb3a15412056fcb7273bb8ec040040cb9ad920c0a8747b8988fd2ea93aafaebf28ed1fccfd44510a45583fe2fc9f0ce3458de87c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a2be6717296f4e281f328ee8e7cbc59
SHA1720dcf5ef37ae787891e1c293bca37cc90ecd48f
SHA2568fb47ab992229ce8698b1d526d724c49903e80e932d2b8c5366aa7749108523c
SHA512dee7033c5cc4965ad2b0e7492c6839b61c58dce92cd8ce13ab3d0fb1d0d81123cab8a34192db03f5dc07e444e81985fc369a3e213983adad7717cd994459494a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525622b9d80ee2836c14421ccb8f0f825
SHA1ae3d61b16fc6461dff4ad20c0b4e954691b5b06c
SHA2565e7271f2c4c249849839fac877ada614ecb0991ba5ed73f718e7d283efe51e8b
SHA512310438cb70ba8ab1510619bbc7343f66ce6e0581259efba2b3edf147657bea1ba33fbe69e3e922c46dde40c22b6ccfe1604baa1914f623ebbc6a9c97e0cc3dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5148358b40daa7d80444393f62c6ac483
SHA16a61e11c827fba30993b3215115f8873a5a2791a
SHA256dd65a32961a2db25bdbe644f30cd22b9320176b5535ab1acb8ffaf5ad6e4447e
SHA512303b2a4345f2fa75d7242903e1d34b5d9cec70c7986d6435ba0015bb123d29045389b641239f756a4c7044cbe5a26918007cdd744625dae32a4c2374ae542314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b79153dd369c2d15362a7b98feb7010
SHA12f374463a7877fd89fe339c199914afe27d3bdbd
SHA256ee04fc742ac27f33b07ac34591ca7287645114affda042cfe7f487b75d624d2c
SHA5124aab11729cdf47a8396935f4c1f272cd39822b75cc85a00f2f7b0c763d2aaa7d401dcdc00d57cac445aed03a0837f1fea27eccfb431ea5aa8ca96b266a57a335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aabf6d01a9be596bb330165ee9b98be0
SHA12782e741593e7a8894c21eb1a89e2d48726a33de
SHA256f1b575b7daab3f9d790c8ed6bf44c2f8a40b52fb3f56a73a9d0e9cd83b396ddb
SHA5122ac4e7706cf061a6adbda90244553792881dfeec81b203578d6ef16dfac585d35acbf8806cf870fabb821fc21d9643245ec69d8d1e0505b7c8ed89ba4507aa9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572ceac153dba2a695b55c974a176e66e
SHA1a0543eeb83ced78b2e53e4c4098cc524c2747b33
SHA2569b7d3c143c28a96bae37ed5b4f6da161b05565fc719b9122ed57bbc4054e28b9
SHA512ae67599cee16e102586faebf28c798ac906e61c58063a1521a5f9718797edf11f155e408ad1de99168ed1adc3a80c1b9a4192123a454a4c3ac429cfc87f18516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5361a0992b9cd896c38bf94a883536458
SHA1913a3b57bc782b79bd5f8d7729a2a64ecf22b5f3
SHA256993c4d023d49ffef0c9ac5f431fcb8ec18b2db10e464e41f5495e29bcb540e7e
SHA512546aa4a3ea5b17d3cf39e0929b25e6b32bb9ff9594b4629704ef1ca866412748781f1c8bebe9972acdb9fd569b6d6968f1f6cfa06c811e7e985fed35a49caf41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eccb0fabc9b58e073b75e12c1178e261
SHA18b4b0f8cb6f74dddae8b5e5cefc7b4b738ac7834
SHA25624409397c76866eb3b3856f42dba0f096592e200a7e9d33f46c15ac303960c2a
SHA51296c7edc266a52b6f37ef650e082cbc7062a4ed682d1f0a14aa0097c9affb4aece3795537d70a8be73cf214d7f10fe01601f15f7d7b8b068ba891ca9887e1dca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acfd55db6c37aaa86f884d561c77298b
SHA15a526a473956959d2af66a7bbb83a526adee9ee2
SHA2560e3a024e01970273395c64fcfb56a49d8546b38d1d75a08793da97746c856fbe
SHA51290ff4389e39698ef5f66c4175a7bc049f20bbc0db0ff8ec09c0911621c5f936abdc389261ca477152d119cdbf50be4ed63616989d12709709c4b2fa0b2e362f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aef69369a17f9743dc22f9067c328c9
SHA1a766fdbee862f52af048e4ab785080c38d4a00dc
SHA2567c11993e5e6a24d139b8e5f85460ae1a69eef1b5f771bc0fb816da448f40873f
SHA512a26d16cbe1c31a33f5d4cb80bdc4a9abb4f09b83f849c9340aec0d902476d805a9e0afe980fb9be905f4e27b7e11c3c90cb1bf7a1f55daa7d0a361533340cff2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b