Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 11:23
Static task
static1
Behavioral task
behavioral1
Sample
b344c39265c15f14c6b876af77982893_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b344c39265c15f14c6b876af77982893_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b344c39265c15f14c6b876af77982893_JaffaCakes118.html
-
Size
1KB
-
MD5
b344c39265c15f14c6b876af77982893
-
SHA1
0addf6130b82f1cf6d9a2e30bc90e1222f7a0ad5
-
SHA256
f5437dbb1438e59935172d84ffac0241c12bb715fb0d1c1fffa9714cb49604ea
-
SHA512
21a18573282a99b1f3fd7d827fd78263c52fb968dd947a9621ef457519614fca6b197089328e8061d992850009f55fd54747f86b5db5b695d0f9110c44311f2f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000006c78dc11d0204dc4e37c65261182a072d4af4c5a138ad38f13d55f271941d449000000000e8000000002000020000000aad0c18e695f5ef9e85b4f0b58ef69a24e7da7822675b202f75abe7ef816387990000000972b6b04afd00721640352ebd44b08fb8f6a63adc6abad1a6f3265ca1f4f753e5c273a2e384659a2fb2625ccd938fad69d45f938b381f36aa0a7d9f59873c5ec72a0edd5ee97ab97f7049c670093ed2861e6fb41c5fb6c05c09d94a9545878803f02f27e8408dcbfa95700a521cff8b6b9874330d717d08013088af3348bcc0ef0d8c838ea0332b3a7f89990d0e33e394000000074d20440063781eaef7c2b2ca9006167472c24fe051db3b00d2c7583be99ffcae095bfc079f1e54f0041ce5722950151ea6a1cf3712178f0b7ee635e9e249e2c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70062294bcf3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BCD02D91-5FAF-11EF-B44F-526249468C57} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430401254" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000017c68cd169a80edaec1e358043aca283d081bdc526d996615b85e9a42d5d01f4000000000e8000000002000020000000f154e7fbec483ebe8ac518079a9cc493124b9c7776bc87719b13bd132e1310fb200000008d8401beeeca36e84a3cb8b65f013a87418d3c8e5868d62a2d5f490e2cdf01a640000000c669d2b0987134a05d3c5da8431a2ef782f7524f199adc9ec5a106511f3696de2261ec8e6205df97e0acfda3f446c0537e067a0a0737a09702eac71a07df8ebf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2724 2276 iexplore.exe 30 PID 2276 wrote to memory of 2724 2276 iexplore.exe 30 PID 2276 wrote to memory of 2724 2276 iexplore.exe 30 PID 2276 wrote to memory of 2724 2276 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b344c39265c15f14c6b876af77982893_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deb11e75fd42b075709272edf43e79b3
SHA14145935359f92f01719d787cebd72fd92f8a4f71
SHA256e22cb1e476376a6917d6c0eb88444bd34005c1f7876ac5ddaf31be385b1959c6
SHA512277f53bdeb36646bcc957401382bde84b7b33c2a109dd109c256d0257350b82af7eae0bf89bf77596ce6eed75a083aae85a15e86f80c49a593a0feab7a303eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5103b8f2ba79fcd76b9039e4c4a143a49
SHA12fc7a45fd83813a347cd3d3e8579da68cc132350
SHA25663e15b9910c4232c66722c906d9e7f7ef5d40083eaea384c91abff3e405447fa
SHA5127d4fbb1bb8d4f9b2b959bf23cace8730dddcdbe9e3c6c56c32c5b9ef77577bfb6894faacb197914d6f7e6b58681578fb29b8ddaeff3183881904eb253beab188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502385989131ba3cb4494ba870ca1edc7
SHA1cf42a4f5e250e1b9b7196097342ac5c4c79db727
SHA256204d033b7ee18d3fd91425da85c73ec524202632618cebd468dbee66d3fdb5e6
SHA512e5d32b9d22c78ff3e2b2e47c5c8711e6487c293d7cd4b2b49ce49377f4c2c791d662439294f448a3f027c3616264573265e87dca88f3886d6ece595129bc1eba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550e31c04018b70de7c23305efd8ff1ee
SHA150dcf15d940f90ff2042c1db3738b3383850d042
SHA2564bc8dc446c66bac57cbe44f9c453985306f6a024727020d527def9bb649b05c1
SHA5122b6d6c07abe5cc7b05d705bc0cf6c77b5b88dbfcd08f201be4d5be619144b953994c93b6c3b0e3fc1486bfea3bf359795b7ea99f5fd50008eac163f3151bf05a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575bd61a712014b5772834e1619f87ad4
SHA14e893a71210c4a6931683fa4d7c6fa9f45b4ba13
SHA2565cc8478c98d797828489893a1be6607cd2060ef27e3ca96a0c1e43f01cdf0cfb
SHA512f54850302a9af7eba3c626257bdeec76c42ef737b67cb591eba1c5b68b9b0287216e7a12750db44f0b6c589870e787f558e546d7563e9cd0b12952c6ee0124de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fb516e98da5266c846a2b8c873838de
SHA130ee441062167dfdf8a85f8a024e5afb09b2c8e7
SHA256ebd05655e18a73de1e5fdeedb71de31ce4073dd9e0591fc34638eebe4cce0c61
SHA51200623e8d31091f360e13407c29745644b52ef3e74cb317612364523f1c72633bab559ac06157fa36c000fb84c4d786acdd759f5a6f2040b6eb2c683cbc14a0c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5031d747ed85e73bc080b54fff3e28ee4
SHA150af388170a255ace830ce20e45570ca541f86c6
SHA256cae047e6e8c1f278b9d44a33cdce709d9de46cb6e87519501fcaebda8f842055
SHA512862e3d8f3c1fe3bbffa7ff07bf69cf26089c317238d99388bf5fca64ef972f3272ef91481df33e5a1f413b95c90ea714879b9789aeea26ea959faabac3f2681f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4853c59b0032c2148ad8c228e49a7fc
SHA14b34e383174162be7c16e872dd0fc9aef9c720db
SHA256dd21d2a91b507c50e066c13e59865a712867e7cd13d9239eb81166b243a88ebe
SHA5125b0427440184ec8dc9e52f126d946a5395d4251e426f28fab905e9d528b232cb93ab81beb3de959728311d3c09594e8f897971d7a8ca865d2563f6b10735a243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eab8dae8eed6ec5ed5b4a719c328392
SHA115fe276bdd77338bf3346fb225e7269a9d6a51ed
SHA256a7031c664f17c8cb5a0228ddcd66ee1e5b557d33ad42b07e31eb204f4f57d1d2
SHA512b931d82d5039bac0a669f976a5584f3080db230cde8eb2182ee113bc86336336fd05a314780025b4f5147c1324cff7581e622000d4506e201bf273aeaf8ad401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bcc61ad7d446b97993b9b04fd1b3eb6
SHA154c596e1f0318e841c41e06b37aa6239ff2a487f
SHA2569dea1c5cf0cc4bd1eb4d1ac48e976c1751d1ce5d31897f831820804959f9c89d
SHA512709dcc46a6eceae246d623017dab84333fbda4ee945daca3016e32b54299500a75c2d099d1629f0dcaa113dd503817424d12ca27976bdd8608a5440d8fc18657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a708ff4bf592edec3dff2c5e7738ae42
SHA1244b7e0ee6d64977625baf0e1299e210afb62bc1
SHA2564b37eb814b1a0f4be0a69086fde22d964305730e82f6128c4609a1cafe9ac162
SHA512b56bd265cd26aefb6c9a63ffe9da0fba81d31df978c2ba66dde6b13858fb747a08c7d5ac39ba4aba4ade7129b3bfc093d0119c9a46d1535b3e91871f8d7669bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504ec509f17eef0eaf66c5178de9a17e2
SHA1616c81591bc31101fc6c8138af54c873102e6622
SHA256f174bf1782047250df521ec77125a8c3d45098f2e16bae97a19404c2d43bbba0
SHA512e5fcfaa08b6b5727ea994b43d0fccd5c00fc48d1ff9bf2b9b915fe4a0478b1b489ea520102742d643788a8efbaa9d44ab0c4ae17b72bc17cee17db91d727ec3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3330c9c7f91b5b8fa4d1fb814c2cb09
SHA1a8d82ae29fc54002651c8d13a773742ce959bb5a
SHA256784a6adc061b10068058a8238453a09d893125f3f128dbef49a714fbfce47f79
SHA512f52b0ba99a1b4ee195ed32ff92e6b49dd62a36ed7a07857281f68b76e107827c3127f00b5f3a37682e9073d7ed41c38bfb2b2bcdb6522ef3f0d2b6ece1c99f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe541c66628d3af2b051e3764c402057
SHA1b67bbfa57674bfcce9aceec06a4807721021ec30
SHA2569817579117941404e03728bd159213722e5c366d6bd1aacbda594087b5359a4f
SHA51263662b24f469c59fb70661be4217c69e7728afe34b62782f752f7dfe73de5c8ddaa743e88301217ba97ca206a5da65c0840250bff2d0acc41601cb0c5008957a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589bb07cfc73db8dcd08221290e72b255
SHA14e2483ee01ba2e3434ef7d059d78a7350d8e6dcd
SHA2564fe7ef2ad954afac370a2614f2977678afa8b00b1258efd572db78dc15e5aa19
SHA512c3bbc4766ba3f4be980cd509db19d7d37316fb36ab4e0864fae038d86587f884937e089b0f8dea57c84ca745ddb55dcd4207cca282befed87407153c926cf8e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d8f9e567d3a77e08ed399076818d29
SHA15e68ad7a1ea4909f1a58c0cf7365c06221798635
SHA256997431a6421a9d5c6354eff9385508393ec627b2f51bc4f4eba263ea34a269b5
SHA512857e8b5aae75688623d21f7a5d7b37bc0feecf1ffa96f6f5cbf1453e044c8e21a369e634daa57d1e84b6fa822335a645460fd9f21289b2f6676e1229f283d14c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bbeee43d526b1a135a02b82febe4345
SHA17ff092b29a65db6fe6cf59e7f7b1b04ec26b1a33
SHA256194e658f2d3368ad61d0553ff3d4f166f4232b4cd6139b723bcb265f2ed39e9a
SHA512f78f00542bfd1e14608798e4ca4c6b3a2fd33fd06a8e27538c712de7a364e90d2b68fa9826911b33fe9b9960b10c02febcb3f04327f9fcaef54dcee083aa186b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561c9f7256d2f34b3554432499e036566
SHA1ff35d8ca474af5dcfa112b9ae6e188e65961f70f
SHA256e31a0110cf4349d4070be11fe17e14e9b97f29a784695f82ac0d347c853b290d
SHA51266565888c5ed2fec675859579df8753e32bfb737917a71021cc87d90c9dbe69e621b8459e03e4211556bd3ddde6f2544a8d1df420489a4e697bddebbf914774c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cedb57577a42fbcd4facc2f0567cc30c
SHA16cec2139f6e90bf44623d4b75f43866f5f9ddc6d
SHA2560f2ea92b32e4af413a263394273f9998bda2b4399f68e66fa8f19d54e312a62d
SHA512113db123cc2ba578c79c07ea2d9dfacb80ae921332727f4603a33373b2a2263e76b2d976917006b2e608ffafe2dbdf457924f1615c4d2c9605eeacabe816dea2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b