Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 21:18
Static task
static1
Behavioral task
behavioral1
Sample
e10e132656835eac71da797543de5f57_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e10e132656835eac71da797543de5f57_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e10e132656835eac71da797543de5f57_JaffaCakes118.html
-
Size
53KB
-
MD5
e10e132656835eac71da797543de5f57
-
SHA1
d2b8baa9f9969515d52efce68b1ed0acb5f41220
-
SHA256
44a9546cf5f197325f3891b3c561d0383edbdb2a4fd3afc5afc8a6ee4420ccf4
-
SHA512
9a0e48fbe80b403f2f72c5d353993a0adafff42e89cf774f38416350f90ee3f6572207c77754fa041a0ba22a1e120a12ca6d4c5f5709d36694e8277ede4de4df
-
SSDEEP
1536:CkgUiIakTqGivi+PyUyrunlYN63Nj+q5VyvR0w2AzTICbbQoW/t9M/dNwIUTDmDI:CkgUiIakTqGivi+PyUyrunlYN63Nj+q9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432510575" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E2AE0BD1-72DE-11EF-B57C-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000cd99729358b5e3b5f7672bd22e97ec597c2623a3140fccfaddfed99d648542fb000000000e8000000002000020000000696685f85c63382048eef361fdb9dd47bf01fc2644794602f74cf0de4210401e20000000a499212acb0eadaf54c93530eec6acdfbcb3e6460eba0f57c5f7b737b70b0db0400000005054fb4205a4e945a06c5b62e070714c3fd715af0139d2531531c47a2eea551b9211a466b668e3e04272ec2ee5df324ab7b98000c5d90f0d30561897df418d67 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6049a5b9eb06db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1992 2532 iexplore.exe 30 PID 2532 wrote to memory of 1992 2532 iexplore.exe 30 PID 2532 wrote to memory of 1992 2532 iexplore.exe 30 PID 2532 wrote to memory of 1992 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e10e132656835eac71da797543de5f57_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f375937c3a1304833a0a68fe1667615e
SHA124182144d95ecbecea84c12426dbaf0ee8e36ff8
SHA25630e1e83377d2e2b2557f1d6b543ac5a67c92bee1b41e75b5867dd771890aaaa4
SHA5123ed75b1a5673387dca700d5910cb798198e71ea57f4fa136ef95616124da786d41706137752462b902504e4290779224a0935c0120858816473fb2b53a337eac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce2f19d3bc0f62b7c45a8eb9ccb0a187
SHA1bb7d360ba59c6d81d511af78a8ee43df25cd91fd
SHA25608e9ef111917dc3535820528dcc6995b964ce68dc3c62f52f1a443dfc66c8b53
SHA5128df715a1a2bc3cc40ebe5a157d0089806355b1a7378082a056765a7457a758729ea944c00d8577fba7d4fbe44ca948b9d623659991c095ee4dac369006ea699f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e08208ca4595f97a015f9c22e414a15d
SHA1ea8ddbf12872da54be8795195aa51a3260016c3e
SHA2563bc6cbb771ff18af5389935022759c0aa00a7867bbd0e330f68462073d673ddf
SHA512a9d3b70b15c3c991e3d153a9c80c03095e3f78b0dc4ff9339ac35588713b95ea94ce141b0fd7ac9593c74258662362d04b886befeabac14a676680cb6262dfa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572ef2eff20215cb3620d595d3c77060f
SHA1a2e76f90c272124864c8f47120dc4913ec940387
SHA256250e035da5b2c485eb59f60de32cb3f74207941a054f6279cb5721ae1214dd49
SHA512490c6e829aa32dd2a71adb35cc2ed32a6eceb1ddbea9f6fe9322025677f932564023895b3f375be37b0b972d43237647503a05796fbb8fbc92d32ee25a5510e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bda004e55450d5654aff25d13233f7e
SHA13db3e69b5b892b9445ee73988e01b1a313be632e
SHA25657cd369ba196bde9992786c03b5b170a6b669f8a9dd23104baff1665f75636ea
SHA512d9262c89ba046e28b622ea1202c1e57bf92c614a37d34dc5c5a9bb76e8d7a0642292f4f92e6b72d0a409ed4e220fa21f7e0a02a3490181f94fcc42efd30be196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595804fbb19cd7b2a5fc58940234cbf5d
SHA1c199d6a099dbaedb97740eb3fcf24792c693d9c5
SHA25614049c415a63aec9fb06f013d84cbfe8ff835d714dbf9f7a46a6a8581bd1da49
SHA5124a26ff12a30a9ea42a1c0a0648a3248953053088bea0525b76bd2f802c38a2793bbb16e12d723481b0e801c085a8b3b54895fddf7a4e79b8aeca7997a34bbef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5868b0e30073c826e474d7723569f653f
SHA1a48d761ac1ee65b0c281fb17a4a53abb8c7cb67b
SHA2563d7d60a1d991f3cb2ecc41ba65033aba33224763ce17d19b4a71a364b91b67a6
SHA5129fffdeed359f35903eb2deca7f07eb09f76b31fb95c5ebc561d14a7a1a984c148ea933b9e0feea2a6cf018bffba176fe45a7a0d576a36d957f62074a45bfd018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f454825a599a7a19c3138484071b0b
SHA1c890f084b0505efde447f2ead7d81bd28b8535df
SHA2563d78745898d2f89b36503ee69dcc6fa10f3854ec43a0dd6235e84ad377b71b1c
SHA51297e268f7fb073f16930022dfef32856b241249cc8b94e8fa4fe0c76101188d865054f4318ce30c60a3be3c604c9a45ba96024ea7f663c5c61fac95baaebdf542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e12ab9cc6ba60e69b7f69a4cfddc5d77
SHA152129620c1be06cee481e02d9d5355a11c23a786
SHA256fc742009d2cc38650a8e347b0af0b467bd0b6dc5de178f2848cd62773d8eac0d
SHA5122881e8805ad89188432102e6a5b848e6479a7cf42d26d4151e31a1af0d257a64586401a17be99b155cd30ac7c2a88eb741f91fb4d60e9c829163eee409978882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5818b922a3d9dd4c1fc274f39f0128f96
SHA1ab3b5702b6a9f6b2ab5ea3f2a126d86ef0569268
SHA256f3e38b54e08ea70801343349914b3e7ba33dd02aabc48b030d619ac21c8d722e
SHA512bfccf2df02bdd5208eda9737a6a578a4b5e5afc2012d303fcfac6cfc888eaf57fa2d49364192bdce306f79e0b367e7aaafb3ac69e679f14e5794dc40dab352c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd212d1a81465cabd25d8e174a2bdc24
SHA1ff04135001b675e1ad9ec10d02cb4e63bee8fd2a
SHA256c9cafd65c3daeca40fa42274f166782078e4f9a1ce23493efd071e890d5351b2
SHA512608761ed4e595483ee3c944806e536d5d4edcc03f53bc848581b106f751543215bbfc8ce95b241e3bfa2faaa2bdfe52309692a0785c99989eacc7e96b9a1353f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cf8f4e313a2e39c17582a072ee974ee
SHA1d4dab51ac8fa3cb73d31bc2adbd3a94a3d4e4d2c
SHA256e6db650a01ff3d9f52335659c7494ab6480e8e3e29c92195b79aeb6dab82c1ee
SHA51218abc282ac1d133ab867e5492587208be000db70c99afd05dd2b042f7b02dff9dfe9fab321fc16a260ec8a197c7d1f5a4ed9a69a648f5416f8edf65b71c81b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0df83d46e159f008eb0cdb80ec071ef
SHA15110796b52bdf63dd82254db1be2f28485be11b0
SHA2568d18267009226647bb58074939dde93eed1db8c86a6313a2f05d468e3903b24d
SHA5128433f6e5e0a2d9e11731fbef8357ac1dd75df4099a9b7ed3dd715e9458a4992df4aac183300c6e6a9960ad3c2bf1c5bea8edcdbba5a48fd409db26315d2fe476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b0ffedb40fa6bbe3e348fff22f551fe
SHA1521971a24402ac4963d7423a94174cbcba938186
SHA25629df943f836f08206da2e578c3d80c0ba4bdfc122c9e60a8460d51c22e72d40e
SHA512aba7e006118a0fb21894440c2375f767efcea18b0da5c8b520639515a9824d80145b6e38577675ad3ff5fd4af5bd88186df98cf645a5a090497caa8fa3350cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554abd1a02c7bf08acb9c92caa1edc644
SHA1b48b21c09533f0f4b69bc30bc1ceadef25bb23b9
SHA256a6e3703e4e41b0bf89e673cd9e95df2c947d05ea5d0737e90914edba918fc995
SHA5129c19908d161d6af15273589cfbbb57f94b27bcf3ac85394dfc4bb5073601f9ba9a1f440b225d4d7dfc0176cef513591cbeaeac178d761e991cc4f9bc824a7971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6e963373329141000e0358d0a95699e
SHA10a3dccfdee6377a29c416db9d92e2a362888c17e
SHA256e9af3128c44e07d83a0948568cfcd6d94a044b4d16b5a67f38ba321c11adbe34
SHA51291529227c7ee48cb66428658254d9b7220347a8829c413338fd38ad8b6486b93afef890015007b9327775661eed740a26b62735a52d879601a7c159ab0839cd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0a5843a5297c6358d35459f70bcc560
SHA13b8e36859a123522311202d3c61123d9098b3a3b
SHA2568b76548bdf17fdaf0c10fbf526ae2752281eed5eb8b8774af64c760a64161bbc
SHA512c6061bd9c0972d8b56ea92655a52864cf8e8a34847aee4856f333c4f33308df98c20d961004808acb4e332da13827bfdd446c8363c320bb55660da6b1a4f7e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58054a5004402bed86915b7b7904f633e
SHA1ce4fbb6dddcb4b8b63d9afc9b8b3f0c445b0c5bf
SHA25660537bd29d0079fedcdcefb49a099f2dfef3e5fdb43ed108f4271f948947ecb6
SHA512bfd1ac9771c314dd0e58e899010665b1f97fd8d1f21a5eb2ee3a3054f725c13ef3a6d6e11fbd4b6a312674cd82451d892d0b3aa4d385a62f6f1ced19ed4309cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fdc717be40e4c98c1b5ff16a4108d70
SHA1c946912df1200f2f9ea538cf039d074302b60367
SHA25605a985014b440e0586eb348de35aa0e5f6f8693eba6499769a1539af9518a0ea
SHA512fbb8ecf9cc4e9173fd5955798524d3a5c176f449321d38088918c931a956ab93c3221f58dba1ec4d8917cb955ceb88952f37b25640f408dbaf87478f4aebc0ac
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b