Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
f0ce8ccf7515ae27a1911ab82be0bc3a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0ce8ccf7515ae27a1911ab82be0bc3a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0ce8ccf7515ae27a1911ab82be0bc3a_JaffaCakes118.html
-
Size
139KB
-
MD5
f0ce8ccf7515ae27a1911ab82be0bc3a
-
SHA1
8628a2bfb650d06ff7a56a00ebddf053b8cdb714
-
SHA256
913d9cf8a8e946e399ece82bf2ce941c174745399c88c171b3715c031b24725c
-
SHA512
65ed9722a16e1d613254120ed171f35b2770e5a8e8b3975856dcdb243df28859092a9ad7f0c01db7f40263edf802ea26b5201f55f1aa5c039c561a159ef68a4d
-
SSDEEP
1536:SfT5SHDl1oKyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:Sf/KyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000de388d83af14583fec75c947e22ba468dc21ae04fa3f89f6d2e9ef000fd63aab000000000e80000000020000200000007e5b19f60f9bfff3b7272edbeb2b79c2f24dbe464a0af72658e93b0e0e2a3973200000008437b34020570402d3082ac4f9b597190f9620f0d6fdedcc09dc687296c6e5e540000000107afb7e59367a5e7bd3bb53b7ebdce1eb27e74e5531361fb4a8bf6dbce1112b7eff7c7a7da70f539ced274a162ddfc55bbfbdc9b405377b58e32232c4c38c4a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d7086f7c0cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433122378" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{591443D1-786F-11EF-83AF-F2DF7204BD4F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2664 iexplore.exe 2664 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2760 2664 iexplore.exe 31 PID 2664 wrote to memory of 2760 2664 iexplore.exe 31 PID 2664 wrote to memory of 2760 2664 iexplore.exe 31 PID 2664 wrote to memory of 2760 2664 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f0ce8ccf7515ae27a1911ab82be0bc3a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573572ddbd0fe2320278e01c45cea4548
SHA1b9d0c58e3eabd7d61c3a087ea564b413d7a679c4
SHA25621d6de0f952737396530f1e065553b7682ffc5a8f6a7662f438ac4b8a9c9913f
SHA512f93c531e1b223375de4ecbeb5be2db025e8c9217ed42fb90353b656127a8f2f8a7ffd3af0fe6037820a682897c0be140351a227bddc19b5ffdd9a9cdda3e17a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5450fe019dfceea9172ae46ceac56bde9
SHA175e961a95812581da61590e12cb9740eb369ada2
SHA256b0450352cf6b3490d6e37b95c7c90d07ccb26a09407ff7547fdcf71a3bb0bf81
SHA51273942b715952279a3b71abb9ef8b2ad7a12ad09f89a4fc7f1a751369c138317d2c6a4182c152a9bae5ff2d2fd3317532c3834ac5a6b98307cba1405025a4247f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554f65b741a6b2051b0d0f55852a0180e
SHA152ea4e1b19eae884695028e8d212840c4d7d68c8
SHA256ee8c9acdc6741c66eeb3ad6da1bb15ba6bd684771f1a62fbe28c1db8fbe11bfc
SHA512cf6c3969f9ef3a4949532be20d7c028824c6181e9c9c7787d9904d963baf3ecae95772ad6b60f31f8a1f90744a04ad17035f471be527afe2305545a4a6fcc405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f8f7554164fcca876738355fc86f8a7
SHA1ccede2e2b0c93c35075ec29dfa5293625416c7d0
SHA2565dafad1c2ea7b3df396d60ad5559c703e66b7419a2709f912444bc729af063c3
SHA51219e9522a70bba525c127c4fd8920b47335942aa2828996258474f64dba0578c92d25b301e19947683afb015e0b69c9375ce61cc83a391c4bfa5c09251334a4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d281b0414c5faa138f5da6ea15923e17
SHA1aef8e1d3e4e93b19fe2ca85c13912a6a74cd08a4
SHA2567fce3329eb06bf5c99076da0d8553fc6a53e9e4a2d6bc309e312396ef3e1a81e
SHA5124fb3e07259ae3ee82b2adf436bce1d7d6a4012c1ba35ea853560b222ee4f0879ad8bd839007411fbdecd28f111e7c5d02039937c4feb658c87f7c287e5fb14a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cb1dc96a837298258e954f3d578d135
SHA1431ef38b0e9f30bda6fdf0be5926381301c8f227
SHA256e5607371f89c1323291400d19d0d56fb28333ae9d7fae380b558771d516ef8be
SHA512ced1cbcf7ec2ab0cac46236e6776d1496670aa0ad6fdec1a011ff44c0b89d9d0ec041d798d97ba3ee5fbee65a2629e3e37754b50a919ec3d3efec715bdb9ea09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590903142b6139b92c1c0c3a5296f6cec
SHA1139ee8b5b94250c893301d75c94d89665b947eff
SHA256a87f908033cba7fefd4970aa776c5fdf4e0eb13658d700f705f7b33596ba1350
SHA512730585507180ed3374d69e395f41a7e9f49dd7ed743efcbf93b53873441bbda991b95f9f556008cccddc9aa3dd81068bbd0181fb50401b689bd57aa2c7711ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c65a773ab68156085162266ba7af10d9
SHA1efeb557002700e4a9d06c59439d8397008288b1a
SHA256b7a2f7b4eb8270bd7cadd708818047232c64fa44cb80c9f227c2aa3443848fd9
SHA5129aff3ebb444a585a520e076ce8d54e0d6f2fde8099366ec7534d491225747a49efa2f936e665175320f8125a591b653328ffcb88eeaeae4fd9ca650c04dffce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560217325453ab82b47a4950a39060607
SHA1d8d8f0fed16257bcef694e68e66ce2c2de73c17f
SHA256dea5096280ab6643b1d80259c62466b1f3a0fa11106ec044d82e738c789ea3a7
SHA5129646d47dd6fa0f25b0ae2583fb1967c72d33a31456075b8ce24d5109ab7b3c89da44316610b6cc23339f2534a263fe83dd487153e36675b4fdb03117db5fb705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5446acccf6a42c7586e03ef90f034b716
SHA1176ceabb91e8fe4e1b00147ebeb4522ec25de6b0
SHA2565c72bfac9b91bc0ce5ef33100ac22a6ebaa0963ac532c6f7bb40eb49baf38694
SHA51293ee203e145f5bb97becc5cd964b30b83de7fd92f0d449db2d52f0f621c942d8064baf7d4e9dd495a5ac8d6eb0bd54d690ca44c8c9b3ddf5e92565bc646020e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ce96a668f735fe1f4bd0bf468d4924f
SHA111dd723263ad75bb9a000b29806326cfb69ee11d
SHA256920a8cf83f843b48c65643b588888e5b16912cacf52c0f87415c5392b7933225
SHA512972f05e709580a9825e317c93b99392c3c08a44e1b12a185dbb36017027c45377437c22ae0c6b3e504a4af6c108d26746a535209320f0eda4d4e5244fe075ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567d9a5edccdfe9bd45d9a088a4c5b3ca
SHA1dd2b47d4bdfff3f73e435a12830ecc2613a9e5e9
SHA25657d24dc29e48a30a4611bd22f87b87414fceff0a71323fd0be332bec91e6ee1e
SHA512fb525b0a0cef26e554ab1b9d69679fc104069df0767d6e7dac305a0246e6789f0a94d08598d7997a27e4178e6a636f86cfa4e42630ccd6e5c8a9abde96d4f39f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560cc655d6f29b88dfa5b676db035bfc6
SHA1685d824eb862f85bcc637436d7a723a5c7137e28
SHA2560144b083f64874be31fe7581ce910429437918cd6719ca2b0cf8d6d61344e27f
SHA512fa9ab6fa4a9d68c9fd3247b4a21da69c20196c8c0a7c4a741dca438c0e304e5d572efa4430e68a16656338c85ca9c4cfc1c26b8fd6a93f85048105b3e8edaca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5162bdd5e11905dcbb8585c3bec82a792
SHA123bf40a8dbf203fd16a0045ea06cd4a898c26c95
SHA256a22f77eaa3b16f7e68c5fb97930a425885dbf7ebb0b503984395e7feeeb8eaf8
SHA512b912c03ce6aaa30b8371c360d903de09903dc9891286f48bd64490a5986c106eb7ff46d09f70a08f2349559e4b6ed85de2f85ceb9dba763d00cda0738d27afbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5436e322abc532bda1925f3ecb8cf6d65
SHA1c084fccc80bae9f9dc50579124f37e6d6b812076
SHA2564b8f3ae900588425fa761c4ae1ab03618f2375a3843be4c11dba7965066e3ea3
SHA5122fc3a491e68d8de55e80bc396bd41311f5833d180ac1c97976a094014176c9bb7f6762d115477d6f614a0d5fc2565669db7838c61b2c99755bf3b805d71f8c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bbdc5c893114901285c6cc90e5d32ce
SHA17cfce7fcf962dc8ae05ab250e1035ad5238e5c71
SHA256714987e979eac035a56b36ce306583d560eb6623ea5d1f782f54c902fb0f3f79
SHA512f84b017672c1f846a75908ae05fa4a4c3a7be612e88b4705315301c662c78a60d6a04308cfadd43a6a3ba2255bc59c30d9b54bc9c3c76b5a5dfbee592b2106b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ead607a2ab431d2458bbeda834022ec
SHA1d8a21158cc87bd25b7628c77f692b29ce893202a
SHA2565351709bcb03fc0f8b97088e8819fa15a15d439ac48e003f9ff2d2332e3e2065
SHA512fcbb8baa4ba969467bcb8b684542803cf69a421a3b1b22fb90c8014cab87b0dc4c09cadbb08d475f4a2a1536b7031e63b0c673bb8ec80284081b4f2e83e92e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518b0a26c2ecd9f7681f71cee3dd0392c
SHA1c344c3bf78c249b123bba3cf40ac95e609ae9f12
SHA256de1fa319a36c285150292b0b39bd7861807baeb96ede9daf51845968a1f8384c
SHA512eb722c0735ce156e0f2544fc9af6d12d373fdf264e854ec5086ded575cdd03066b3ee990a6d1e5dde8805f28f0e288399a833ee2364531263af6b4b58dce99fc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b