Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
db8a99b1a11eef867972e0ef02e1b03f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
db8a99b1a11eef867972e0ef02e1b03f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db8a99b1a11eef867972e0ef02e1b03f_JaffaCakes118.html
-
Size
21KB
-
MD5
db8a99b1a11eef867972e0ef02e1b03f
-
SHA1
936ee1b923e80205441952242a3778b29e919c2e
-
SHA256
8cea9eaaa39f8f4e1b34b499042fc97a747d7c2f01eb713bf2fb876d4e1e570d
-
SHA512
80f37dd5b555c2478edfc40aa45a2046db712af26774ea38d4af9d18a5aad7da513bcba2b1a3270f78821a7c6ea45d4ff52de19c154a3ee79925d1e984f2dcb7
-
SSDEEP
192:lT5l7vFZ7vhLVRii3aNaxf4KuRwppwNXNMJanGeLNNXNMnNFHeZNXNMd1ioeiNX8:xfHsWMOBMeFRybyAGSy3Ob7t
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000a0537a73e2b0240709957585dd15eff20a8470b4fea1fb35285706a1d5e5ac4f000000000e8000000002000020000000b671ce0fa7cd678a67e291672c24d9f6ab023aa5afa858212cd5ba383fd2ec8120000000c55cc30466ce3414a1eab94e283db935b344a722836b70b883062ab23aa0c6d5400000005224d3b0b4797cdf0f1088824730efb630b1d7ee9de9e9d83a470dc687e0bc81c32276a05246097c83368c5ce63b569462291ccfa0d9fbd3de38bccfb2c158ac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C33303C1-70A2-11EF-9AD1-5A77BF4D32F0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9083c897af04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432264852" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2720 iexplore.exe 2720 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2732 2720 iexplore.exe 30 PID 2720 wrote to memory of 2732 2720 iexplore.exe 30 PID 2720 wrote to memory of 2732 2720 iexplore.exe 30 PID 2720 wrote to memory of 2732 2720 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db8a99b1a11eef867972e0ef02e1b03f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8da3f0813820bd4e2dd459d716c2784
SHA1ebcc4a01db2df948a546efb2aeb8975c1f04f06d
SHA256b3d9d35a246784a6ca40593928f6ff4db3293841e539eb05724fc9253d45a323
SHA5123a103471f277c7f3cd26c5aaac772f40fed9f8dc015748b478cd8478e5eb477ff89864ababd8e3e27112c72d799f8c0171b3882b1bf829180f1921ac727adcaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e366aaa65d9a1cdb673072456c9be45
SHA1174ccd87396edf7584879fcc30591a5a7aa93710
SHA256cfe22541b791603767640abed131983fd2d7491bde5e252f47f0f04006db63b2
SHA512ecd19d32d1a027865fdec7ae431349cc08881ed949c152f8496cac648b737adb552488ce6471597d44a79fa61c1c51964b11eb436d855f5e5cb0f5188bb7134d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591e187725dfcef10409cbac8d4c5356d
SHA15526bba1340a3c183112e0622a1e073e6eed7e98
SHA2569b7d3bd454c55653d2246a14b826e67adbafabefa0b00f948b7749f99307893d
SHA5129537c49932b38cf927c56ca269b25b4d8150c0717c9652d43d39987c79c89f3ff93e27b227cca3f9834d793cb9b1ced18b9506f9eab1394c6cdc120eed2b7037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51776487e1159dd64a68ca7170f4fbff4
SHA176e86d93c8b995e33e413098ac946ab479208876
SHA256e155869b90b4815038626b70cf35757e1c1c0ac0839731fe6499218abda6e4e0
SHA51291cf97b90dc48c4e1a6ae3eede7e729854906c09d1a8d15c6d0164738597b0f1c791cd7e12610d4307752653c332cb29d0f45603fbcb35853c1e3fdae713b812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fcfc64362cf73d06d98c819167679c1
SHA1ebadd67bcf6d3cce37a0df81d0179d51c49d2468
SHA2565fdf274ee159a70ff4f9b36c9eeea72034e3678913f206cdd2d48fb603641add
SHA51210bcff44c9fa66ab8d92e7b867218885cd0898de51aa7c488f7f50d738af978ed477a311cf765afe1b76ba38484128b06ca9469812104d3caac3a000c820f7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50877750ef6f4113b97e3bf0fdf6f0ea2
SHA1b4eb1a2e6d340cc520c9820c6adc6e5d37c4fb17
SHA256b506d67075cb3b542d08f4de2e043ecfec2cd4e2c9e61ecbca79a9c83fd00a6e
SHA5120524096dc48c4cf87d6eaf7f2986fe89ca8be03352b2c8fc39fd6d42344b14f11d2c5d401dbef06ee29034a1ac49310ba56ed84ac70799131b23605296c84fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ae8e8ea777f3ab3fdfa4566db6a508c
SHA15ee6657f9a567be1fb502d8104004f04902c45e1
SHA256b0285520c988269472ea8ead7ffd16e50f160f21ee7959194c3f27938b2e296f
SHA512b87fdd22633414cd4e412ce459f5f78b0b1b590957083e14c93693966b47cecea0cab8076c352579e0f01eb34d74ab129c3afee87baf74a7bb0029034e812b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e504803e3eb970d932aa6d271a4456f1
SHA17c322234c7dcb1d9430b33bbb3a0b8648e1460e3
SHA2567175411a65a9c6e8bf15d3a82d409d2505a1d3c3e7ac8637dc37c3c586101043
SHA512a229df7450653d57d98294ca65e47844e993c8ce5852bddfda67acdfc4b116a415ceb71d03497744252be0f00967d77438579fb80559640bf0279e45f5a002fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f15d5594cf787c7904b763585ed891df
SHA1ba43a0dc3ff7f9d84edfea507f2500fe784dc527
SHA2563646e314e53fb4aa789fdcc55ead625758c2782430f2ee48974ec262ca9d4248
SHA51255598b207c2fd3bd2b4fad7120a6008da24aeb34815a1526a1325c68e11881550f227f2605b9de1229a518450a2b4f6f865ea92137d1229a4c1adb5827878df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba780092003e87a3e3ff1f0c8ed46f74
SHA151804b0f912a68b6a8b14a74e245f8d65dfd28f5
SHA2568d93a4e60da70e5be75c6605a4be347349e7aed22ea0a60aaf50b609b71f7063
SHA51218fb24ed36b7b99ac53e7178547416f304562c0dba4de7b249ec0e1742c107c5a7b2c1d542559736faf4d8058a6eb6e26081e34288ee39c95021af900339a666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542591608527327fd08e1885a52a594d3
SHA15c6a055520834475253597371cb98cccb7a8e7cf
SHA2568af6e571a41737d99ad3a4cef734f9e794ffbe64fb0fbc80b95cf383f4bd7dc6
SHA51286d6e9bdd252f642a5dedefd590a98eb095102e38ed47a1a7ce1f83a9ff190bf9fb08384922a481e8e0a1612bc16b8b39d0f61230d6df2f8f78ef26e5364158e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514595446883a05c727dcbe6768332901
SHA1b13f1111624cda90c956415a6c8b1942065926e1
SHA256005ac4c24b238bddc46b1a4daa3deb83ab072fa8b6bee2e11ca2a7cce6fc241e
SHA5128bce2a4a7193f876f17d4efb0f49b634aabd4740117713f75dd2e5d0a30b6b731bd26074b0b14807b0ebcb3c7806f1ef5aa72a6d40ff9f707e497ce2b5fe5c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd1039e483b9073ee407eca41d2e6d4
SHA16f6560147d5292693d02f073558de4a8b846da3a
SHA256538e0defae112e45ba9d4bc12eaf05686e53a5acc76f22e3921f297b5027a65b
SHA512bc71a75e6edc6cff51f08b80bff81dbf7316b6a14ee91a40a51a5c10754965e98bc3b6b81308f4d08ccb8e047b369a1f0aa9125dff45a6e0982ed6d51108d1a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8d508bbd3cd570c6b34af56d294d1ef
SHA1e923e37bc459d1aa45c33c7e416d18d93600693f
SHA25632c022ae9c83ece9157e601723487482d63e561fa12afb2fa221d40e48087575
SHA5123a190b3d5db0cc4213f7accdc034924b2db579bc1d42720d6393ab5b6fdf74f5f4030c30619bcb3d76396710c040d5c5a0a9f50699c8ad2a843a9cbcfdd8cfe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1b267488c46e9ad7281d30ad21daeb4
SHA1a3f40cd2cb5d7ae2055a810a6895eecf66d6239e
SHA25642ae5fa694fce19006e0aef36f882732f3d1361c6f2f3fdf8fc665ff2b72b186
SHA51252c94401b63a604dfc2f1b428ff608078a83ff1d68055ea86ecdc2e3cf4868acccbf5b4be1169bc1eada3e77e584cc05a2363cee058d01e8c04341788f570920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c08b3f8621263aa4a6744f989bce99
SHA1ce3b8b3fcac2a3ceae19eba646c914b517893d2d
SHA2568b698feeb8861a887bf6e948e48f73ea4cad3ab344668820272bd7cc1c51845e
SHA51277732a1e84ecfe121ee7b0187956f5671225f4319a8d71a22bbad32e3551ef94e576f676551c1479c99f3def226c8722eac0c447e9a857df6834c5cba7e9fb4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ba6c5870e3c92a9063d5f334ee32b00
SHA179004bf8d58119f991247543346321fe4193d41d
SHA25660d39618d09c1e388ed88adcc3fa2bd52ad22debc29bfe28bde1b22dcc6b9792
SHA5121c8102e394c640732732f4ba55989f56b293c9375b1f310754ca5f09632d90789feb2a206863a793db99595d1edcea6e15c18e1c1114541e367f6ed820381bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58529f1da42032e10745850d466046092
SHA13ad0451d1d20d239810e38dbe15df7c82f519f25
SHA256b3cdcf8276561973029c1a411132ae39b948962527b60b6f3dd1c63e22a89120
SHA512389be3329c2d02d515c3d2cce764f2dff8b189a98a2fa2d8edfa6dd34ab390879350d6fd8470f4bd224e4f38489376eaf507a9e17641275c81f984650786d7f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3a798cd6daa9fc33b5744b0f3af2235
SHA1c2e8c3dac7238719a83c33e6eac6ed077a134477
SHA2566a64fa3f32d58bb103737f02d3db6e6ff2fa966d363f11d4837dead4e8cc779b
SHA512365953fb1a62599ef8b89447ece51bf12d6ebda5bd4f54542c790a87f9370523a2e73c5ea65a27093dd3eead7aff0daf295a63e697738a084896e1599f2b65b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57404bc1a58250cc597ba8bcb2b0a3309
SHA1eeaf26207e835c57ec1c2dd9355df843afcafb26
SHA256174dbe4ebcd015b6429684b6cb8b87d7e5f910e8cca30bb857fff0ef5538bd22
SHA51207b78c56c3bd55db37d59d234e8c8bce1b52a9eeb132bed40690dfc2fa630dbb0a1e4da748dd3345dbf0a844f23772cc7ec7caabd9c0add2681e6135fa18a1b8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b