Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 05:12
Static task
static1
Behavioral task
behavioral1
Sample
f542c435c3825b544f81a5c5b5f096ba_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f542c435c3825b544f81a5c5b5f096ba_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f542c435c3825b544f81a5c5b5f096ba_JaffaCakes118.html
-
Size
133KB
-
MD5
f542c435c3825b544f81a5c5b5f096ba
-
SHA1
43173931063175266366eff682e6d482a1f5e96d
-
SHA256
3f19b26adcff19224934e98be59303fa2e75ad647bdad253fcafbe68861084e6
-
SHA512
f4df84b01ac9cf51387ed1dc79611865ccc35acb60da5e69d4f9babdc287047f0e946b6013d0c31c59c664ac90ae85ae040810e39c4b505f716e78b1dc53f98f
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fc4USHAbOHL5Pj8abycZOp9hnp:snKsLrbyX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B70B8721-7AFC-11EF-8318-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000008075c3cc37538ce6d0f7ec1ea4cf0a1052aa9e435c59ec1332339f0973c001ba000000000e8000000002000020000000da4a7bce7379325ce2eac7d92a422d35679e4d3d5f5cdc1c7c22f9b2d9b309a3200000005d42b2ee2083b34b86b1702bb68d3dde7c94832de3ffe3913ecf1e049b85f70d40000000cc71f74a139483db2ea4570dd1c5b342fb8db164795784c068e040a8c5f09bafc24ba1029d4407f7f0ae289fab5a24cd14d24ad5f52df3c48d4a689daabdf8c8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433402996" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602a86a4090fdb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2892 iexplore.exe 2892 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2812 2892 iexplore.exe 30 PID 2892 wrote to memory of 2812 2892 iexplore.exe 30 PID 2892 wrote to memory of 2812 2892 iexplore.exe 30 PID 2892 wrote to memory of 2812 2892 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f542c435c3825b544f81a5c5b5f096ba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5121b5465bfd5db754447f30222789760
SHA1b3c8ff9b8b154dab996384f289739ac991fe30da
SHA25683349bbb62f4b21238a1e548b7dcc855069c7028cff6486e259dbd504bfef06a
SHA512de11914b253378a0069a92f0388116fe78dc39f9dc1c9841b82d6d65cfa038c9b0c236a3ba7871c2f78a95cce790ca4bbbe803bae812ecd32bbd7e610f17c00f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bc0d2f4ba42ce77dc8a98fb37e66dc2
SHA11ba773c7bb6e643c9bde00e78d10fbe239d068c4
SHA2564fa25c228c5a434db0d1006b230b1ccdda4726d5d2af5e5e77964e8d8f58dde9
SHA51223e22ae54ddaa6c2f3854efd74abb1b391a830112f3606e3ba39bded22a7a048ff69caaf2bb7e4c2550fc40939b50b63430dab58e35710e7eec5f309daa30872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ded8034486437ffe64f50448fd1edb
SHA153695dcfccb554af84a1d51f1955fe6a2ece13e3
SHA25637ff3fc02bc8a4051fb1e47187fe6df7345189b68446014b0d26dc4db7b40b32
SHA512bdee4cfc22e2d778eba0086022285a529461bd4976f5af5661a7f7a44e43c8c1884d259b735ea1e95174ee8c188ddaa3799ddedbd9be2dbca66a5b48949d9725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562f4f47025a1d8fd8b30b27bba79bf74
SHA1892e250e07383dd28fef36fa9ed04c5dc838d9ab
SHA256625560d48800ca95c174516ba79c501c21d8e8cb2306ca0bc10df6f5fc36f0a9
SHA5128f5afe61163004405d933937d8f1475ec786de56a14c6c048bbf8dc95d9763f1a589492be623903b7538aed4eb5582877619c28e982a67cd1fded887d0c3df94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ab1ca0f974a13800a35ac7e0f755a29
SHA1c8ec09f948489d8d27dff48128160ab136a365f7
SHA2561a8191ec0c79d1cec195d4f7dfd7358fc076b5f49b9029320213b2628621b4bb
SHA5124717b8573244b5590f7ef9960e8dc5b9f1773559f210546d363bb2a3dc21b8e74831e3704dfe20b8aa653faad8c5cb86ff8a283b64daf5e05fe669817c61487a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1094288a83e357e757e7a015eefa674
SHA1ce590393b3e463ea272c56ca5710ad542fd38dba
SHA2567dd5ecf05bc34f07b5c746836e5a1e44c53e0b302e9b35262374eeba958b33ee
SHA512aa9873377eb510dd1008a37025a0eabe11db54a9e826fbf5767ab251b12a798ec672385371079901d85526e3bd7c99f2ad91efdb84992d6df3484ae9f17bfa24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bb284173437fb8187d6ca172835409e
SHA18fa1968f4c2bddd2871e5575159fab72f5da6d56
SHA2567b237c7c544a2438cf681f81d4f3076a46291e02059e037f37f2f157c9dfe376
SHA512c488d90e58f9f280d5b7593f0db38a255360f8e61dd53d90cb41add12f4d52dbb5ae87d05d43598c903e6f274baf9dd13d964777f31bd21841dc3c2b93cb84d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b89cd5ebef792a2b09b80fe2f28ba9e
SHA1995e3cb6b02c3f9d9b017e8559d56e3184a934d8
SHA256fca5bcf4eac2fefde3848464deed5fb28c4a5f3ee2b9f0d360046d6e28dd826c
SHA512dbda38f1b00dee66c190ff94e4f2a08017ef4ff20a0686ec08aab12b5cca467f50bd69f899b097dd3fea9072eb7852b9e3e6f739d113ff1a5c2eb712247c04a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592eafe312750b70129844dc108914cd1
SHA14b7d9ba04dea042d76f82e9ff71bbc2dbf05306d
SHA2560be7e677076d2faa175fced9dd577e1262cddb2edf202e4359ecba305ba53110
SHA512f28363967f070bea38c9e02e6f7b67833d5fd50e3a3c24fa87caa6940cfe471d9687e7db338e7a7e38023e9420a7b3abc3f19997fd8db9edcff2f1e146e1731d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d3a8ccf21df87bb85948dc98fbea565
SHA1f95b60e0b5aa25d582024fdfd61bb88256bd1b22
SHA2569f775f62f83809987631dcb9292fbd863a003e86a728d4c1f49e0beb0b5b40cf
SHA512f9ac7f792be4a1236df9762685802de081f859db004967d28f85d54347d4f7b3145551d88f7b1b08fd6bfc7b92ff59185a672697cf9077c7a86a2ce86a60fb94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf3ff7fe0bcb98bf4248c970249a5981
SHA1ecdf86cc976c72e1b457b18ec4e658a325b26bf1
SHA256317090d52a11b8a092cac4a22aa5d5bbf1b3ad64da97a4dbe482279f0babac3e
SHA5129b7c8f8b66c871c5708c4b67263d67335e94820165f62ed1a91d618d5d3d9159f3e82bf9f7d3b120b0659bdeb24595025cb5921f1abbad7815e7fc0ee0220dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ced71dc49f06f11b022b15e9f8fd200c
SHA1647af1aa779096c0ccad5516dae85a6ea7f30f89
SHA256dcb9f1806c9dc2e5d18bbb09a9ed83a47742f17db1c6b43a4aff4f706b56cf6a
SHA512337c346841faacaece216eb36c20b130f27e68363a3fbc137d369843d531c7652c27bdfd68c4af2bc54dbff5809591c816554f3a25d129759a90bd2c60e26d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f60b97cae57e70b34c882bba12f7d25
SHA1177dc3a9fec78568f61f71e5133cfcf2ca34d31d
SHA256b2e0a438bde9cdd21902ee3370d5de3e90d7ec9278296e404dbc00d2205632a6
SHA5122272742824a940bdc20667529c94104444329ff4278a0e9ec662493ac02f16aea1c1e4a9710077e05cc3fc3b453fb84d8d599058707a8a5ef1cae0dd358d2267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502efb0918602200b3abb8632cdf300c2
SHA175c2cb0a40d99fcf29d5272acb2f4954ccbb75b3
SHA2563b884688dd5890861fd8efe71cfdea2366839a44d56fa32caf520feb4031ec27
SHA5128cb70ddef5ff1348cb5b54f73f51f7d081d01dd187be253938c7b5de0ed0bb48195754a4184ed867bbdd1ed3ede17adf932ead214ddf4748d89d396ce34635d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d3c57b2c2e318454a792887880dd0d5
SHA1ca82f46c3816837fcbd0471e0e823c0f893e7613
SHA256772634c7f42f2fbd1cef9dac8ccd6aad414b5e1e3e9b6ba1312a8d0d7116cda4
SHA51297369381db06b43d8a33781223a15370994da618e042070cbf022b646e5535e442a3bea68c038f49178f2063f236e369b4c72a6002ed7048ff920816f656d8fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55537be9ea65ec024a1d66a96f9f9151d
SHA104420ff7ddda9cb77ab3aebd673412f9db728e65
SHA25672b51e71c2896b792bc6f2bb643402eef0d8a510961defd8fcee56c419e2dcd5
SHA512677201aa587ce42f6fa6d5b73be03ddb1646e6d613a21f0c0f8c1cbc3b6074b8b9a18c84f3597d5bdb272ffc5eb90e3d3bd4b1e09437d59988e740da092588c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8dd5d7fd340197e3fa202d4560c52cc
SHA104a3b74feef142177886b4b7b1350d5a14e4f9dd
SHA25628973a4aea67c89b748b85aff7e337be672101d653d4fecc7d17d73194b37911
SHA512152aec6356f10b9f1c5b41694f445f38145ddcebb76134e8942ac270ba1a51cde840c9d3c2ae975a5e79deb512f37b8fff856c587e2e58cadc611b19a2093fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9689ebef750816447f17ec5576e6ebc
SHA1d9400a8b4adf1a6daa0a4500ed2fc4c198e65409
SHA256b8942d863faf5456b33ca722007f2f5f2f5f9b953cefd24613e46b183a5c7acb
SHA512101899fdbf46232c4005094dd7800f888c422bcbd58c174c7d8df6dbf1723dfc0233940f392eab1a908ae74cebd6aba29312a08f2265febf192e2900b8f98358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c71afdaeca89ad63a241416f6c58e0f
SHA1fb635c237018728348bf25812151f24b37610fa1
SHA25634434bb1a98bea22fef411e242f55575c7fa9ce60ecf8443f4d70875af00f1b6
SHA51266be6a926adaf0791b4fd24816dc87c127b96ace84c2cb99960e22eafa5abb290add49c68eff96dcc4eb62116f429086ac2aab86ea570a28ab3d5f739c6a6a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a688b3565750a734628191193ac9955
SHA1ff2967b7c9098736d8280a00a9fb3ffc8e3f6294
SHA25673cc04c9b407653c32a5116e992d8e7fd2f38379d21c6ff19cc493fce5fc6d3e
SHA512e72ff9b104fbcb131f49e682a2d931f912dc9f8cbdeb2a8132d623b0156e7bcf82092399f52fe5f97909165659077d32dec7e849c8989a29badfec282ded2725
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b