Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
8cd696bbc8b0f8348a21f46db6776c23_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8cd696bbc8b0f8348a21f46db6776c23_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8cd696bbc8b0f8348a21f46db6776c23_JaffaCakes118.html
-
Size
849B
-
MD5
8cd696bbc8b0f8348a21f46db6776c23
-
SHA1
38662c7453aaba0eeef103b26379cd12666c148a
-
SHA256
3d182507b930a5c6bbab2187c1f857509e88ddc081436cb7d1b289a42a4799bb
-
SHA512
c4b41b2b614ee609e5a23e9beedbd045d938911e6bb911fc496b6942ab1eccb4a584970611e951e79a443d0002308243b79c01b32194d4a58020818eea5f3dd8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3564C7D1-584D-11EF-914F-526E148F5AD5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f082e7095aecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000b9a6db67a3d1995f3d3ad3e1d37d28a5db6e0e018585f46bcaae0a8b71222c2b000000000e8000000002000020000000adf0a71bce56a229bbc0e0f4691aa29f57231ad4910c0ea4c43b6c24f0afd1aa200000002dc86c9f639078f3818cebe5617bd0bce061a23e51a9f4c9d737b59ae3c17f93400000004c5f3110f3ffc4745961c9184f0e243eec2b43ea435fe58f4b8bee809ee862b5cfd12aa481ff76ca1b04160543e573e90f7da14fa57a6e4f1fe87ee724a446df iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000e266f33c30e41120abce5affd0e2286395e92d9699181b4c7ddf2a2381a118ba000000000e80000000020000200000007ece15999b6a41b737011ecfcbc8c2300d857af5e5ee05ee029ed7ef5ebf8d0b90000000388838ec425315e1db91836089af905593f696e6c04accece252c4e01051a2e508072625c1586f4cb69dadd8f6b5c46ca185218df135c19badc0a26519fa962e03dfedf7961896d8cf756989c3977f797db72043b15ee523355df0164b7acfb78eaeacb617e6042315aec03bb5dcc1c3e8a0c95e558cdc90f4b47d44733674beeb1fd5a04d0313698051c2974c65e0b540000000b527074ba8a06147bc0b6930a201ed2e36b8b12f4dcfbd4bf236c717aa77257b1509f54d8802800dbdf2b1f65257b3d46877d829586709bc6a7e4dde43381e1a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429589278" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2636 iexplore.exe 2636 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2696 2636 iexplore.exe 30 PID 2636 wrote to memory of 2696 2636 iexplore.exe 30 PID 2636 wrote to memory of 2696 2636 iexplore.exe 30 PID 2636 wrote to memory of 2696 2636 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8cd696bbc8b0f8348a21f46db6776c23_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5840bd42b80f4cd82dc6440f817c73367
SHA18f94beb96d8ae46fde91f62dc80b14d477e530af
SHA25689eb44e477b2452fc1d6cea01a1568c37d3f763d3aba63968221df94722de63d
SHA512a7322ea9acc3f4f62d7bd882e0eeb7959fcbd88f6ff23d10f30d8d633b855c6eca1e39204cc9da96866d4b5393243a0bb995d5f4556a4e0172c6e7878ae6fcdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555d62baf936c9a498c77f900c54d97fc
SHA102bb16f4c79256c78bcc71dad9b11eb2084397a9
SHA256049d0ff4cbd5a518bddb8eef0ae8168fbd1c724f1f20b1c35acf858e0c026282
SHA5126dc1529142998907ebf17100805453c6e5195726858c24b15070620c819795ad41df974ac7d0d8d6353272df73683143b8ece1b0e29afe6452e01c8d2fe475a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5d8d6307ef799f5f4c93996dee4d544
SHA1cf24c4ba03d62301d0b1aba380891c947013e20f
SHA2560b68ad9d5b021a2013b110b6ff9859de105849c77d6b50d338de1e6f80651288
SHA512f9c54bcf8833c1cdb0015486149e92032bfdbf1430ab26bc3cddd780ee1c5a795e922cf7df9b195ebec3e4f0bebb638d4e7dd0b1dd5806a71797640334a34ce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed2f6048fe47c873a3295ac4ec850dac
SHA12df6f11f4d2e2747882edb5b9ab041254f57c015
SHA25658479151eab189007f5b2a5324e345ef1e52b377eb15f0c13fe214997fe6bba4
SHA512fe150ba2bc7e958fac158c356cf183fa5c8e1592b916c2dea0e5e2b9cff737cb4b009b1ad5d0dab74f38eac1f4bb0fd41ae1535e573d902b18bc530923537087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adc076032d1324ac3bcd2d1142fe960b
SHA145bf7120438a7debdb0d0707535428274a76090c
SHA256052bc376f468facdba415c040a5435afae897094174cbbc1d3e5549cd3b17cc7
SHA512491efb8f8b3318c6dd9d086b3d0e61e2049b6310b780454e79dec358827005972b941fcbcb540b530321f0dcf1a0dcadc2244f5548213136e58da612a9609576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c548c55689b5e184672657086d15447
SHA1969dc10383fc27eb938e605a5fd5cba9f8324da0
SHA256f8ffd38e6cbde7fb15c9442055be0451a5f4c7659f73f6dacdb33833eb7a85f8
SHA51246bb1bef07d5b279407b2e074344409e203e547b4434c0c9004196caa05945cc9e3f8ea971d095ac960c8dc7e6c6192559d5b205c8d7962531f9f6cf7139ca78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a77804aa3f4a241c3f66e4161d893780
SHA1e08f44d81da489566dc98c34548e09a04e277fc5
SHA256cb17a9469af95b21c05dfceda32b8df12da3a94296384195decd4efee3e3fffe
SHA512ecd695e83e351933da5361f24105429df3032a05328cebf92f80c1319aeba05490860197bed94ddacfeeef2ec318f586dfe19f8b89a3a0f1a30c1dac11ba62f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f6c3ddb5294b3a79ecec6bc32908dcb
SHA1cbcdaf399376efd347e4cd106bb3c20044616bcf
SHA256518c9ef7f041053cd16d6980072d23920ed9b421fa8bacfb2974d0863fe634ca
SHA5122e7df6035da93e653782bc5576570d195933d02d52fdfc752dc773cd7ba32d46f5806ddb037ad953917aab1141fe65a5d798c44ec3c454274c61519c48ffb8ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b34505ba90cc86019d95aca31593663
SHA14c9f216f145d9d12ace0f4f844bac1f07f3d2c3b
SHA2563722b71e4bb675a2ad6ca8e31878f2aa1802f6725fb745da7048844c2e16a3f9
SHA512649f5598bb1a5bad0466d0fc8ca59f084e2b63a8589b5127c9010a433a756a2630e7155af23b7307dd33742d4c970f15c0814bb72346df47e96a81493e009bb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e96cc14014eceb1ffd04bc4d47e77bb
SHA1cba88c351f1087d7896de658cd515f53fadbfa37
SHA2562f72ddf539e56877ce07e144206f8f5e7ee867622ff4537a536287a2d64b5e46
SHA512eb840a8258cbfc8ad11750d035b59126bf5614492e51d89a15c13af1cc2685b068725ebd066b702242a74a3925a7fc49872a8911ccce4c4b401f355b868d460f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0bf78ae7a1fe733c9abc70583eded4c
SHA1be384a7d697ce8a1b0ea0bb844d3ace3592ef9c5
SHA256c155c97a842bdd194dbc8d923475d54d5a2cd8597567932efd5d633939f05f6e
SHA512551f5c172bea687f2524006c7523d5767f968fecc1315f6823daf2ab209642ff4cdbaf3583aa2eecee6a3eaaab20ea1397cef5392522b84e74f3ba2c50cf75a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e04f845eec33ff82b7f9764aff5b9cc3
SHA1bbffdc942adc7eff80a7deace068b13447e997fc
SHA25612c6c0e01732ffe350ff168d4b2a42bc3d3d0bd5692530d0c77e9af09bd3fb2a
SHA51220126fd49604d04411d150a7f58bf9d900c5e3c9bef74146a908c3e99ab941a5b9063df5304b8279b81a8fdbc198fc8a4a015f14ea6f4c9c72ab0a85b69aed79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5319bf9f785185374cc6a1bb5434c7522
SHA1536861a0afd60c778552dc86f303a562b7854d0c
SHA256e24956e1a532ffe72930228623a785d9a2680d6d60fe83a41d62786d66212173
SHA512d7687a3eb3a64c8ec9afd74111b78130bfd260d4a75b741811e476764c43c73c2491046981ef45fac866c417b7c1766e77da8520c0cc012fa83dfe6668c0037f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e5f12d58ce1bbce888010c1321ecced
SHA19875996be8ce18bcb99d06823821758f7595d8f2
SHA2566524b5058fd5c6445b88d24badd2695014a4144a025b9bd0526ba0f8988598c8
SHA512ca44186440773f8d4ae68bc26fb8b630749fbcb6ea99a8c4bb7f2ce8ace16ac3f75632a10a59a2e9133054143045f1cdc5c543cbab0958b78f4370e1c5e29186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e879ea6db5e3a0991ad0a7f5e3bcb016
SHA1b983e0b2fd527f76e1e3115a845277ecce021cb8
SHA2562a756ea9b04a68df02139cbb252470af403fe004b7d715bbd4dbbc313c70593f
SHA5121946417895e87a86005b4f29292b7957fdfd1671b074ecfe3547f62703488a145aa4f8d292001e1826a88a4e77716390c81afa1e046e847bd5a78b80ce6e675e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1755155894a307d4a0703445af07b4e
SHA12456d8b00102e93f1ae36c2f20f4c7b0655b5a82
SHA256ae73cba64d8e08858042d1e533476102e4d8990723fd4927d04e33647d5b2af5
SHA5121408d797df074c389f81d459fc1cfaea9ef1291d4dd11cc86443dd2e507fe0d77b03524d7009d544d71010506907af35d092ef18ddd5e341b7c7ff2513017df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50946635dcd10fc7dd29e0c4d3ac12545
SHA100bf7e503351c09661c422a35e62b0c29430fd8e
SHA2568d10a3c3740522a5fde942661dd17c25ca6ca97ac9a2a38f77a0b4ecc1e4749f
SHA51232f4cb13416e678ad0c4d20e86c5db0e8eb022ca9b348fdfdd27e24bfa95a27c8e095bdc62cfd0ea3fbf9d8c3894e7dfefa119a7992e786977b50d50a69e63b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdc22120dcd2196c06095037a5d4584b
SHA1289afe71cc1180309008ae9a67df38f8fe799055
SHA2567f6741eb7ad69009b91b50e8e42c74f6e80c426ca3ecc3184f0a11566c9008b4
SHA512f668fa558469c40399ab77c78fab8f23c16a0fc33db7946d910c48d36955b9520ea9c0efe91b30f06217614bf3038e58b6be45ab7ba8e174e0ccdce567c77399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5327788bee78f6ea89d70a955c5c55871
SHA1917c9a731036e4893b96064d2c17475f55c9cd4e
SHA2569cd7ae915e166ca6585d61cfedb16497609af1bde339c30f18e795186e3269cd
SHA512965b575f91c8d5fbb676b1b62abecac7cdb9aeab73a8f951e8da4e123a0f089209ffcf764d5b1e22b3d3a80d7993615efa1ae9fcf28aee3522dd6d6e0e5518ba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b