Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
b479b80af05596bcb21dda3776353aba_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b479b80af05596bcb21dda3776353aba_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b479b80af05596bcb21dda3776353aba_JaffaCakes118.html
-
Size
53KB
-
MD5
b479b80af05596bcb21dda3776353aba
-
SHA1
c4f38cee04d7cb5feaa32c98e9aa1b66b112b61a
-
SHA256
493b8d14c9f48b6e030698b3e489acb519cad50be30ce79e3a651f1b2c6a54dc
-
SHA512
b06b279135b69d3ae4a9b4d3bf8e02e8b3d6c6221fe00cfc9e101b6071bde46c925fd10f3fe1448ed4dd979cf8a7cdedd6bc0e859929f33729bf3fee99d1d183
-
SSDEEP
1536:CkgUiIakTqGivi+PyUnrunlY763Nj+q5VyvR0w2AzTICbbyok/t9M/dNwIUEDmDx:CkgUiIakTqGivi+PyUnrunlY763Nj+q5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8D28291-5FE7-11EF-946E-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000001a6c975e2bfc7633d65bdfb31748af5e5f4adb60c53315b35b5d692b658dac0000000000e800000000200002000000076078d7481ed47bf00159900f18c64187239592899d25a762bc0dc4239562ca9200000009d7cac34259c17baf23b37315ec9d61e337b037f14a6b3ea869ef984a87689ec400000005b4e1bef53a946899fd22986c008b8e2275903533608d879521ad3c384048f046ea0c5bed1b6fe6ca79c0f43089c28d47ad8151a5b30ce0599da8d04c8cc66b8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430425326" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50a7bd9ef4f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1080 iexplore.exe 1080 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1080 wrote to memory of 3000 1080 iexplore.exe 30 PID 1080 wrote to memory of 3000 1080 iexplore.exe 30 PID 1080 wrote to memory of 3000 1080 iexplore.exe 30 PID 1080 wrote to memory of 3000 1080 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b479b80af05596bcb21dda3776353aba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1080 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fb1695fccd71d07e7c6602dc948fd32
SHA1d673cea88c97f81207867bb63580347ded13a624
SHA256742e21202c34d5015ef7d4f7e9d17b3cb0556aa77a8ad063c5b7fefb79a4b246
SHA512d5d3a27f585b1c529f7036ca0fb8b2481e8c6068fb59beffeb2cf28ef0886016ef3ea9479ed63d42b4316f6deacc92002bb8e7bd3ee7265edd13edf37739262a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfa5e0e66fc5ed08f5c83187e23992e1
SHA1837c0951caa52ec2123b3460709f57817a3efc4b
SHA2560f751c36e6b3fc3880f23a8d8c705cb4e9cb0984526c2883b03fd347959a7583
SHA512f7201fa4d97c3301c3b889e44970debcc16d48418768e461e20f7e4928198d7905d79c19286b4f272187e3a76d2460a2a6904020d9da3a32d951a7b4ffbc02e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562cdab1f9a1b6fb7bf47615596af0b90
SHA1884cf5722176f0c1250dd49f73446a1f3783162e
SHA256f8c63683f2b9af40658a7c01e48fca09ab13502ebb390a652b259163010cce66
SHA5126052744e2072e5a193c6d65e147f3a2fa5ec801a78b904fd5fca01a7d6ed197ebb0b9d1806f6b4b66d2487823148a456e01f2d1ce939b82c6d271b1eb5460d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540478ee8e3fa4daee2fd6ccde4785b31
SHA1838e4e952fe9e5a168f2bbc059db67d7a649a2ca
SHA256241fff53da286ebe0e835153af6947f9eea0737135d362917fbf9039499065a8
SHA512d1dd31bf1655624f0472514a8e5ca98bbd4ae8254f62078e3bcfe28bd044c6ef9991ed12343a839ccb9d7482327c376f8c5a66228acd070634974b22c1659a3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2190393b56959a1315ab97445cd99c6
SHA1f24fb8fbc72dc57390153f7032b6a26ff57bf55a
SHA256f9a756ce392de19764cfad14ea9eee322f72ea195aac637e6460f26329ce34fe
SHA512640ad2de8703c072f2b349a1c1b989f23fd862e56cbc6012cf4013383e75fb253e8516b048031668a5423cede967061d3df6ff8e91e9da8854c97132bf7cdbe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d9d943f1de6f4e8fe65bb5ad00448a
SHA19be2f9343e368d3d336f31e176f332ffbac2ea62
SHA256adfaf56b8dabb7c542bbd97b96b4d6a48758b520697a1964fc42a8dd74dcc946
SHA512eb679a588264c2e203951be169d607eae890be5faf4bafc0f214d71b0b142a9061cba7ee1726dde7e001960380954f18ce233dc1d40b4dbff6181e3510c73176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75fe29444dbd9fd081f8013a2c0b15c
SHA1e48c4c6bad850a3808b56981ec67c0be97f1d5e5
SHA256e203641673b574bcb764903167689bc7a2798c2e147616a8ad5c9a64365d92ff
SHA512aece2b5fc8698d2297b595a296af556aa801e033d1179e7ffc31138b286757a8edea9a8aaf8e6f3d34b9a2527d7d1727b412cdc4538f33fe37ad81ce39f022fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5163935002550fc6994f45bc6be5d3d73
SHA173432286e33b0853b8a02760cc3dbdda21c75c63
SHA2567c7f99f9c1641cf6f16fc7b5998964cfe38caa724c42a8a70e5ced9ecfac6dc7
SHA5123c9dd239e9d8845d09102ae1f5f4bbc59ed9355e969dbe0ce9e6917d81f540c225f32886d7f3e5ea8f04e6b8845cb53c87f0858bed2c9aa0cfc8b5604729b1e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f32aea9227c57c3c72694bad226e8bf
SHA1203b8b8df3a385a0a6e7c773701656e7e37d30e7
SHA25619d215d3803a718aeeb8eab92609e9bbcc32ef4acacde8e4f1cfd925f4efed32
SHA512d94a286f3d46d9eb3d465c4d60c0cd6c381ff16a15c694247750b95d3640c2651f3bf016f7ce878e83d79c4f49642087866dba57c9aeabd691cd934c13ceb975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51961d1f03993db446a16cb88a7c48f9a
SHA130561b2d7962e5e01e77e00a60db184413327cbe
SHA2568588558ce668150ee5edd49ddab1ac1c50e0569d657e36e8078e69a96decbf5b
SHA512f603124f48559a1e79f48e1f23d146fa57d06c7170543794c9a8b01503cf7d2782aed8763c74541813b61ae29127a2b8b2c0019ccd6db5fea721fe9ec8dcbd45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f155fcd68c4294c09defdfff548ffc47
SHA1368ee582f53a542596e5c2531a729c2f060ad6f9
SHA256701eb99953c8f50cb7a8b7e4e729559869020e066f39cf8349ebe0be637cc1b4
SHA512e76c9841f07f1fab2d4b7dbcfa75ea43aa67a43bb2ce914ad13ba63b781d23e68a35c7615ddb5aca25c8a9767bcc513e4d9807d7f38f75adf21ea246668b8574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5678a53eb033949429d4f92ea1f76f8e6
SHA1205113dd31d3dbc265143fd4e0840544e2f9582a
SHA256754717f5bfa61d9239217252ece818fcb37f23be24fedc15da29b75ce2d6cdef
SHA512c4aedcd5a0b32a14e029e1d0c5b29fc0186b368a5d610999dd6bb59867d82afff0ad07a8d5e116f8ca8c447abd38e15c14a9387f7854ffc08daf798a34b0bfaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2eefaa20399a1d1cf2e338417fc15fe
SHA14993ce0df1d504c84cc393eb1340e70a326c55a5
SHA256f927a8a8a8fd5efb7e705af26307c10c8dffef72dbdd1b927e2bceb59dc1a865
SHA512880feccee01be60ae826669e99b0f92591e44f4476dc2a9d9a13f43c9436977ea6c49b8fe3ccc0864f466b845da992f3a461448205b21eaf6ebcf0debb34123c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c298dff35fea806c3bf4ee5de65bd980
SHA135570187a2ef223ac1d3b2dcd32c86efefa71a4f
SHA2567639195eccf26af4145851cb303d413a709d115eae5256f01f737806ba6e9e00
SHA5124f355a25353ece20d7e5be215fcdaf879572671527be617a1922ceab41b78169c90e5e462064a401cf05cc5e68aca003fd8971cc1554c1e2e951f62497657438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545d174ef44c840f6633c6bba426c663c
SHA188399d48116475070ca6601b738d41565b503571
SHA256bdd37adfeb00e367c01245b3e96a53c4c1021afcb09bec88646ae81e099ce223
SHA5124235c78dd8f274223e22be805dcbcb38e398d586429f7c0a07dc10eab892d3123674928408c770bce0985be83944ce4b15c4c5822e5c33d8c61d2c71798bc050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f7507f3c5937d53d419455dff685b76
SHA19bddc72ec9a2fbf3e5f81dd7d6a15fea15f5f453
SHA256fe0e6466426940949f9dbe5a58abfcc3f99d353ca5f01c0c924414d7b9b278a6
SHA5121eeef0e9e791478a115fa0d77f611e675e7973b781bae977044d29bcd0b39f208b2611207da37f401ea92432c470b319803a9e5399cae68a358c0dfa469760b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aa1523e577f2c9bd1d76236365d39dc
SHA1694dc5f3f94f950f8528685c165b18c553c0e303
SHA256b5cde7f026ef78f126616168acd890649efe7eb6120d33b3a9e3d8cb4876c391
SHA5122314f95dda0cb95011510b4c0fd81954367fc768fc17226104259a90da6031728f203452d9ff8638195704ce4c87472166c32997e8adc00d248c761d9a5a5da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab5cd9f231d439aff1f70f34448f05fb
SHA1a874045133f7dce9c499391ebfabd83eca80948c
SHA256d285960c2387a4814b53b87a274513f1d6f8389098057be53b9a9de8bcd95ecb
SHA512d58e88508d20aa4c5bd590115c8aa529e5c5bbd58ceb2b0f3372f6b8125c30de79565f957b9e8e6d6b36b1f86028edb6e7c7a053efb81586170791f87e3c8711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fc85b3268584d36674e73e4117fbb0c
SHA1f257004f55beba19d5843578bf742db2725a32c8
SHA256000d10586e62d2e8fbe3061e93c758aea263b53a0b1ad7a2f1f8eeacc0cf8ae3
SHA5120aadc3a3f0d04dfcc7240c68ac9555e646a48240e7d8c864f64e6580e099cc2adf2c5f3723d68b18238a8242a842bbced50226ca98574952edfb8fd2c65ba027
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b