Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
8c95bcc25bd7755ab4ce8998c6a96aa3_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8c95bcc25bd7755ab4ce8998c6a96aa3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8c95bcc25bd7755ab4ce8998c6a96aa3_JaffaCakes118.html
-
Size
6KB
-
MD5
8c95bcc25bd7755ab4ce8998c6a96aa3
-
SHA1
11dccf31bb8fdd4bf1d783a255c836fb5dc091b6
-
SHA256
92f062e2f95a1996e755f2d0359502656c850d95314b9851c0577d4b285af566
-
SHA512
3de1c1279ce2a3e0a409274b8561c22f46a658657f988cc2654c2aeacfe7f46d17473ed27900c0a747fb2c629a257f164928dc31542320afe6edc7da11c78f41
-
SSDEEP
96:uzVs+ux73YLLY1k9o84d12ef7CSTUa6o6M6dcEZ7ru7f:csz73YAYS/Kor0b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 200a62d54decda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000009f0c44177113444b33de0690499b2c9db125c0115799da78edc1b86ad512146d000000000e800000000200002000000087fdaee9c029b9947d79f99f38456d85d636d7b0f57f00c01f780bc13e93f4a52000000016e4c851d1c2a3428a0644fa0c45c360839ccee2d160321a0cca401f9541cc6b40000000aea0cefeb6d2428ee4580b056151029ee8be3535115b9ee8e484f257c9c297d38a047b1647185bbd7ea2c8f7f8915834814736e75747660b448849c248fd253d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FCB55C31-5840-11EF-8F49-62D153EDECD4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429584028" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 400 iexplore.exe 400 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 400 wrote to memory of 2860 400 iexplore.exe 30 PID 400 wrote to memory of 2860 400 iexplore.exe 30 PID 400 wrote to memory of 2860 400 iexplore.exe 30 PID 400 wrote to memory of 2860 400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8c95bcc25bd7755ab4ce8998c6a96aa3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5711eb14831dca8e8c93b8bd21286fbec
SHA1dfad62cea0bc686e181e4a692479e0e0ea0f7ff5
SHA2567f02603fe0a98477ecc90cd0d31f8d5602284154ea256891862d47d3f3f15b1d
SHA512495660f9070417f0457ccb893bb82171cf7d7affc25f4679fb815edbaa5619a4934d203137205f8e33e2196949db4ed10a1dea62f104643fa40547ec30768ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e7553757ec90651a423ca71a2ce82ff
SHA1a49bb0f6b5b09c05fea262ab1382abad94c83d08
SHA2568456d6c9b18b271a55ca3e1896f1f94cdfaa03ac723a223487f1f78b4d12aa00
SHA512cfd34617157a85b0db2a670cfd43039a7d78c58b4492b38015a0e28a2efb56cba00d64ced9b4062503d44cc7e1071002e433cfe76629ae82f9f54c3c36182b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db15a84f320381c52aedd692559035e3
SHA139c12bb4be86d7d060013826063a058cd8542773
SHA25634cd69595ff837719abd270f41ab73321c55a95bc8afbd45c85da8e1e578f76f
SHA5123c3d2ea1928c260c275e5b56e54ab064b6902b02c7b571631ebf80381ae650b0ed46a0ffcad22a4e595caefe8c0f22291c9b31d11099c5693eb1a07102d9d795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cc4ef6e4497dea10ed9774e822c8bdf
SHA1ed8a8bf23e6d16556fddb9fe20bc0de6ed1bf230
SHA25698ec7e338082bd2576ed4f863e017bc372a4f61f64a76b2b7a226abd9367eaad
SHA512bde14f4d5b3f8cae2d39adfdf0c862f4dee79cb9bee0b70f96a57ec787fb2b406a468512b1bf2754e1dfc7e08b482a691ff9a6f5b10ad1155fe8b51f8b1e3a17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e8cc8cc3d3e78484fe603a37d029e41
SHA1a851c0e9f0bc331672a35a818ce9d78798d27d24
SHA256bab052f8928224d2cb8a75ab4d35073427d762f679dba81edb655de225234184
SHA5124d9282b2c3223785b673646267c69bf0e7009034ed3007c15332b083e5ce740421a090ccb3d1e42c7c374fafac7ebd56bb113773482e7552a0eeab4845b1dd74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c315c0cf0886ad2cdde923e6f93dc0fe
SHA1a4a17f03cb361c3089214438028adef885aaf068
SHA2568e54da3f5ab2e60eae64991768402eaa9ee7372c45a9560a0783539bb50d0ea2
SHA512767541c9c142ea654e058903a44988f05240a55153ab10ec727baceda9fc839aa7ae0d3f12a5314c14f7961b03de0496f1903f807bed939d2e88a430fc83e5ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f34b6ebb1692445e567343ecfae60bc7
SHA161a66ddcf790cea0d99ee1be020ee9dcca3d8a70
SHA256eac4a8b6a8e90167ba3f1ce354abd623fc693844b2c1d6e8cf3430e452a03a6a
SHA5123925143914eb57d66bc08ad52bf82a0829eff520343752821713917219eed1c9154929467e8659d46df6215d3f96623394f260c1d757276db7481f7d653fb0fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534cf3126298d0f1b8574c157d7d8c671
SHA133c91daad249f3d2a8c480029b4eff3ed130b943
SHA2569feb88cfbe870e7724e140db817462ae907895b18e107b2d4119d520b3a5d514
SHA5128f62a66e19d92991afd07f449a35fb165c8d9b36d33ada4dd1d92a1c8478103b7f935faf7fb6d01d5613a6822586d8590cafb052f47bb14bcbcb005573ddb508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572994326fe73b8939bba0b6f84adf7df
SHA148f418ac9bdde8989c60596481ba8f125524c7f1
SHA2560b5bc8abbc13a5a7cfdbbf122cdc08e711e3a69fcc8e0051ce34f408d59e5504
SHA5127cb4c75dc45ca7cc54dafabac2f5c82f9ea63af36f89dc3535710af17675538fcac485ee9e74b9ff84a188fccb2ecc6937ce8fd6cdf681c89b261f9e5be5d1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525499c7d78c531864dab95d3025fd17e
SHA1533102be7862760a579ab2574986a16c0edbff91
SHA256823b328613f1fc050d44bd849b5d846a041ae303a487a8550dd84f946c1a1a19
SHA512bce988b5f874413359de6987964f99151f0ebd605d65a22eb7f0ae1424ed2689e742ba0179e2684f9866c2cfda9956ee0eac2b08ed6901a17452dfd17ae77b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521bc46fb5491c6bbe9669174869e8542
SHA17394e2508e2c6c5d27ea53013d36b6785b3c3ec8
SHA256e04a2cf18cc6a96930b79533c8b74eaffa48e81d3b19c18310be6554cf68f4ff
SHA512af22f8ed2a06523b787d1076e76d370b99029d5826db29bd556acdca540febb2cdc2a145000012270be8ecd3c53911c47d518f15bd2f2598962bc448522123fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54393de91cb0964b18a8d8177b240f82d
SHA1aa6e7130ea993499eefd8a4c342e0a674db757c6
SHA256a476e95d0fc92e45be9e8c2f7ff07af0dc2fcc30b36bc2ee99120d67a2282632
SHA512d3342142d26ac68485e1dddc6eece814ef9bb19779f9f80bd8c30bab9bc42df64de09a34c74d1843e8d88b4ca3bdeef1ed696e4d34677823078e3ff1a3e22c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558eb9894ec249073d87ec19cf88040cc
SHA1db2a86b1f41b273cebee2ae39eca37c0e52ea4b7
SHA2569bfa337ce2a0b0242dbaeb904c40fb4d448483ef059b9cf991b4baeffaf7f4cb
SHA512b07eafc96600b96080c1eb6b685aa0cc2bfcbb9b57cac8c7e9e88cc572aa571ff75487d4ed657f8eb3f6452520ef39d64768f3ae083ce803a904d74d3ec51314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef02eab09e36de1298dd64f7e7e0fb2e
SHA1b7f05b828bf23100b0f6b3f46731f349b3f95a23
SHA2563a6e2e8e18d849f43f5283a30cda988bc9e2bf30679cc3515d91e2c194aa7fac
SHA512acf1f71eb28583af4c9054e102241fb1c907d69dc9b73561eeb6be58448a076b134ead4a8ce3797cced2e0f42f74972e102940f0f4d3cdbebfdcf2311dd454bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb83b3b747a1dc62324287bc47a36b38
SHA169e5fd63b817ed9e214af4816454b7f8b29ddb4e
SHA25678acb026bd0efd8f3516d254cb34bed3a93e4fcecda9543e8cde387e7b664f01
SHA512c4f6d69069bef63168a304dc5192a23596e7d46dd9c2a349afbbb15474cec8b0d3e6365ba74a6ecb7910e6e3b627a5a797064922a3ae45c620305596ef10a3e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55faa2ff72979f1d597da3dacf4c85867
SHA1acf4381dedbad803778240f1589dcb220c9c71e5
SHA256c73a11635a17ef0bf6b1f96a94360ba807bf665868f2fd04d7c3797d72d32e7c
SHA512987fdc54ba1cbe0709302c275188a63e537ff0839bc46c5bbe70b133b1977227c4e01d2dcab198314ee583e4281a23cd7cf482fd017b16352d0a71e7b65a4bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e49ed2ea8e28f25f2a83c138c74ffe6e
SHA1a0f21de5d47f244d2072e1402a408e1f5a8c76fe
SHA256d81f9146737b37c4328b2871bfb1191037e18f57b63062677b2ef492746c1d0c
SHA5121767c9fffac6dd32b039edd3400123d3e7eaf3b14c940021ca672249b9c6ce8e88d7007c12c5b0b94651f11ba90b466558a910beba2b1199836a8869b1127997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570af3ec11324adf2f692ec92f04d5bd3
SHA1bde93b3656a24e3069b29727db98fbf8583b44e9
SHA2565809f4c7a60bf53dfa86fe94d7402ca92d7f06a61005c24646fc52a6e66f065b
SHA512dda465a36883860a8995111425c9cbe8c0dfbb726ae5b102234f70863bc640f912a5b069b50ee708a8ddd7aab620174d19885d9aae626afb0c1558177abc20fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd984545c636456689748983c3c050c1
SHA1d31c15b2f0e75c3f33e42a5c8dfff5ffa56e7b96
SHA2565dfe816588ec923711590f1d755db6a7087b43934dd823a51f2de0966fc70d30
SHA512879f0a70e1c6ad9ffb6ac4ee68e08db46547659257e7d8de25ff1f010e4ce30fee971a8cca07f6110a881c7d41c7774bd33dbd61a75c347cb88f89e527584efa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c07dde15afec16e5511230a607744b7c
SHA172292e2262a71ca26971819b7e5e9b3b9ad60bed
SHA25620f725f16f0d92dccb0b926f1546f95c6364da9d5695a9795836a2f157bea0f2
SHA512005859cb938cb4dba0ed335ea3174bb646823c17441da4c251c758b473f45ea42e098d9e10023c44c02e42532c06050ca7c8fe5faebebc6113e869199902d48f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b