Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
8b3dd184ae0ee27e03918a426dedc83b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b3dd184ae0ee27e03918a426dedc83b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8b3dd184ae0ee27e03918a426dedc83b_JaffaCakes118.html
-
Size
461KB
-
MD5
8b3dd184ae0ee27e03918a426dedc83b
-
SHA1
7cf2cbe21b8ed67436c4df2e117e5a8915a2e5e7
-
SHA256
94aad271caf2d12281b3d06629815fc6c84cb89ed335d8b4f89a56c52ef165cb
-
SHA512
2a97b5e3446883d575f7cc7d119b4ce0c32bf3be4ab32f992a77591894f2f04ddeb40ee9662d4faa35ab92367c00c7023a8c7a2465a5ad7dcfeb9ffe8f8fad3e
-
SSDEEP
6144:SEsMYod+X3oI+YFsMYod+X3oI+Y4sMYod+X3oI+YLsMYod+X3oI+YQ:p5d+X3v5d+X3k5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d048c49b4bb4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001560259076fef440a249df3945a5c4ba00000000020000000000106600000001000020000000498b2f2d4d3e72a961af0a3a3df3fb0cfde520e98324567eb0e86761c70acda0000000000e80000000020000200000003495fbff1d6fa87674b7d4f73620656987c6295a5f74f0b9ac9230c7491cafb520000000aa6eb81c58ddc7b4807b375bd216ca402c5d72fab32cd80a13c957c790c25113400000003cdec91f4dd71288ad90fde9e1bfc952ee7601194e1192844dbfe00fc4dc54721e589dd2a1a732f09ef03a72fe2ec8d884fea8c91e99cc0ca0217e5eef401423 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C31D3091-203E-11EF-8414-4A4F109F65B0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423425810" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001560259076fef440a249df3945a5c4ba00000000020000000000106600000001000020000000cc955709072071b1458eb2f9d9de5d596158f04cffc95f5a40cfcfa4de0aff3c000000000e800000000200002000000028e5426e7cdc02c309147e428fb425419b2c65b17cfdfde668d27ec231c2b511900000003c7cf8272907c713bd2668a19ba05c194c41ae6d1d3e79cd245c06a41c408542737861ea8e578917d38b6ad8f60f1e01edafc29e66d7dae0f8298f5bf1c27a13e8fb045cb41e2be16f3dd1e7fd4bbc508be726a66423120a7858b6ae42ac21f1b6ea11a1687c89f9685029956a1cfe385d421967d57cafcf71a2e9197b7e9d6f325d4969655102bb92637061b3c5b0d2400000004db8e6aa4c82822e168dfe080331454f7665953b631179c99b5de8adc5d1da4a0d3d9b6e85bf4f14b27baf0428eebce299407e653a08d11aeb705838652e43ca iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2828 3008 iexplore.exe 28 PID 3008 wrote to memory of 2828 3008 iexplore.exe 28 PID 3008 wrote to memory of 2828 3008 iexplore.exe 28 PID 3008 wrote to memory of 2828 3008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b3dd184ae0ee27e03918a426dedc83b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d633b043f677ed1aeab7bbfad34656
SHA14961a6f5c11d1ca13f7d143d68de5b864085b56a
SHA256f753164b07160452722171567a97b90de034ec9fc07f578acfbbec1f0120e3bc
SHA51242205c4db2083caf498370d0f323eaa72f5270003d023900f170a3a4df4c47eb09aaaa37e21d63382b485d40d1737a2ec0b3d1c9dc564c81b83515231a287d6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e08d7007c325568e4f2b6233d5f8f98
SHA1412fbfbed9742c237ca164f54b4c88f4dc68e916
SHA2566c73989b249298b423c02a19ad9ab3bb801449c1dba4d2114544810d3b5423eb
SHA512fbbe75754e3910d032f47a11c7886bad2b066dc990c169d9747b258fec39134c309f79028be6686a9a7ce641d3ae75464ffc36a6e2ae9178c80ab9b6a31d6aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59618cb81bb40a314c114a1b029eac70e
SHA1f23f90f74221f076ebef6c304ea749e8067b495f
SHA2560f797ff4bafbdc1c52cac867043e45007c5586a553fd3e3eeb759b5d757922de
SHA512bdc2115cf68f7403a9ff030805f6b39dea6c77f07484fa70bee96dfe22d1e2128e2a971bace59f562053dc254db940e0128969833227f53d9e5a8ab0ba1d2567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58abdf3d35e3219452c5cc8aa219a76ca
SHA1c23d78ef6d3148de79b6145e26573fa3abb46002
SHA256061fc41218237c1022ef4f121c8ba9ad720fb62abc7b3ad851111df6f0fba625
SHA512ffc8b65f3f926fd04052a69bd8adc520ec84cd621efd228af3560b691a39e3ce9bafeb2f5b4ac45738239fd44b6ed8ce6094208d56132e49ada633095adc2ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584fdc0392bb57c9dfc5605b8c3ee4c03
SHA1c12511377a8a3a9d667854c63ae8edb836b9a925
SHA2561618e21917418754528ec28c1d98e754995910114fdd8f8188bb4d12d27b85da
SHA5122c0243d4311881ed0ba038523321f2d3c3893a7ae41315aacf5b559d644626867a6cc66f6a4300a8bcb597194879976ba49f70ad91e306fee982b2cac1b994bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56012710ffb005d40beb8f1e5c55d5e45
SHA124f776e327973f6a5f0dc237379d1f76e45b298c
SHA256b3e1f8bba9f03e470217c35ac0e9500d67f8ece7c2defb4c7536801ba5f7e8bf
SHA512adfa39bf5cc4318c9a5c893d3877bf839e72bf211b0986c7600e481d661f0ed7ff05aeba70bdd4fcf3060f5c446f4a6612b9d5e546608e502a7b5115d88bec6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f941bf64720504f2089cbc6b66121dc
SHA18d004ced33e7b4c718a87d4612f0fde43cde019e
SHA256a8f7ac696ad5ca983d3a433e7a725e2506f40e2f57776b96ea76f0aa3d54867a
SHA512c5588e7ab15bfbe423be637ed74fe9d50661bcbf20c520f24bf4753b712373fef4fe0998ee7d3fe884d8201607d4556fb9dfabc253ea08a92b8451a7d68c8782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5babf2a1efa887a40bfd7f0c51022d73b
SHA1a3cd35a8c30da06e5e13feaeccf668b99f5a641b
SHA2565fc6f1e5bbaa419cd8a29ead2b3efa412e55abf557570de9436a599eb93515d6
SHA51261470275251e6d0282bdc442d11d0e11ed3c317c1a8ebf23c68507defa180aad85c550aa9b509bd0859b910c9e0b8efe90e9aab5db684c3aa6b211a9f37b46ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a10795ecd39948f75251bed7f148963
SHA18168a3f8e4c8526805102855451337d84b997086
SHA256cff3d6675d2648b2156cf4c89bad422c225359f53361ba452d736809efe85dc0
SHA512421d9b59a8c7d545f63ab1c1067758d764ec18eb4f87a4d719f6b72326a48a9fe0d36736255b759774084db449899de8a13fa0b84fc7a01b94af1cd8d58abfe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d17d76daaf3e1bfda604bb0f6158e0e5
SHA1f28ebfbdc2709e4f2dcfb4a428e98415d0537d8e
SHA2563a3d448c557f6bbbc1bd5a3f91deda546b7dcec8bad0f0bd0efa1aa64edba194
SHA512e0cfc564f8cd39d3965232dc8e0480c3f2a17aa9df6cfa3a1a254f0f53df2db284bd267c107672b25a6e8d92e144451982f2d42cbe0be6583eafee2e76b8e27b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a01b31f8e89fab2d1e053ce322dbff8a
SHA1b0078b82a51ca2c8db776a34fbf5a2b4b2479458
SHA256fb157f168665a9ae0b6c50b1ef9d4e5e3117b3f328c637bb51c7516825fe64d9
SHA512bd52e14392f9e8efe533972a47542ae31d17b9af0d758ac60e7c13266d7c537452959730b72a9d22bf3a92327d7ad501ed6218e05ef6c5089a803e6696490c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5fb340fd9eb90fa28d4a60be932fc89
SHA126fb34f093b7864dfb8f0401c77339b50ab87014
SHA25676f5218667fda68ddea3f3d7a8990ce06787746a58a0cd1586fc77abbd09dfba
SHA5124d47480f98aa92a17abb28ce98fb98da5fbb8af36f7d49448037676a191d8147518fa2ac8351fa3fad0681b5aba6ec0e8f11d7fb542c2e980e78037df7e1401a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2392acc3cccd9dade30ad6993606965
SHA18a2f6f1333821f3d55c2d5e919367da61544ca79
SHA2569b17bf695fad3bfdf5886f50dbaa4444edaec28087dff23913f8f05ca7cead1a
SHA512f8e6fd23f04fc67e74500095abc82482b253b267767a1dc4a734c94a81392b6f9d6508db789ca80c6b634ef09ad4e4f3c3b3c6eb377818eeec94f7884452b69e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569326b1abb0079ff7d8a82fafd7ea467
SHA1c9d3763e3e4b06b9a0b7a101442012f1ee8df5d5
SHA256ebd79b4d6503645eab456e45cddcc9904dcf640c066b87b0c25df8690176d35d
SHA5125b88533c1792d15f8b263ba6c6d2b47d2e8a949571f07019b71c06135624d68ed62c3012c1c7c8bc016ad5ecfd73b7797bd30626d563c831ef33d72bba1b9fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eb1cefc5eec69f2bf8503e0cd68d540
SHA1844e2623da9c7a51906e55a9830ae70592559629
SHA256643555d215cdaaf81d20c748e3b31a9f39dae1a6e998739d509cc5b36a17d7e9
SHA5120a5e1194b55b65655eb5173ec9e6c8ef80a4bc1886043023fde2afeafab53a38a2d42ad3e3cfbbd7a6fccf2f91bab7b1edff33fe314b3f453232d0e687cbbba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501794d0d000b4ea4ee33d289d6cd5557
SHA179de2619640336e505c406ca3259a958bbe28f42
SHA2566c055097e7c74ca072dd8530b3d68e7279c0c96c6c5d68b473b8209ae9a21638
SHA512c4aa9395e759119c9e6258286156210cc8cdcbce7769942fdcd8c3fbda17f47ef9b81e9f981710d27971b8216b7724a0460c699b97febf357ca6715657958544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2d351ce9a6fbee6fd5a19840f31d5e
SHA15eb17defe4f3a40ed9553865d4c5bf159913e673
SHA256f5e5f6ff0cbfd97701683763a11a73b40d8ba7bdc00677eea4f4aa092fd5a129
SHA5129d331f0c12c614fa935ef2f0d08766843c0e3675a0e870d5043edf305d4ac88c2160903d96b3a8d5102af896596965bdef34e85f0aec43d83ea363e4cbaf3dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c35151ce3fd7bc4b820cc3c570275ec7
SHA10b8d086dc88a3a72762d7afa6fa88ad571544411
SHA2560494538d5f2cc63b79c63b21af4c6a64144533e972731917148df0513b23eff7
SHA512a8255981b94ae4666819fee09b8fcb12eb9157ee717159215ff668dd4560da9a936373e8033b5a3635faddd7155c3c75c2e41c2293739b764e9afb8c4db8e27e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b