Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
f97b893f80a83dfa8e8be80c7f0d8702_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f97b893f80a83dfa8e8be80c7f0d8702_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f97b893f80a83dfa8e8be80c7f0d8702_JaffaCakes118.html
-
Size
4KB
-
MD5
f97b893f80a83dfa8e8be80c7f0d8702
-
SHA1
d1c30b8d35ce751eafaa76ed2fd03b8077586aac
-
SHA256
1af1171b1b49e4a307054617200a783d6e7cddc1adc9a293e3cd818392505c1b
-
SHA512
fa74ea5357ccb12f42c44a67ffad46aea6311fe7b062bfda8e1be7887dc8daf780dbd54d2a32d5c866f88ab8dc24ced0812e85d87ea87ce566582e9f1aa4d105
-
SSDEEP
96:ou+EhMh3j7VDkxEEMtaCO+XSNPQSzmBZh5MpJ1Xp5kX:CEhMh3j7VDkxctaF+CXzmBZ3M/1XDkX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A642D851-7C71-11EF-91A4-527E38F5B48B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90ca2b7c7e10db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000f71fd0b7f142ce8bac12aebec7db6f1cd335e60333600672f042ecaafd38f324000000000e80000000020000200000006e8f3a083c5ed8bcb9e5dcb767e0fc7c7833331a64a4638d10534e13c1e4984420000000ce7db5a02d40c82cf1dda42239d559cda4644cb6ef43eed56819a69f9ad925584000000031a695b74bdee500b74d1df58110f484cf3a1fe72df76bee8901fc8508f9c2983f5819be9a7299712366f1afb9cb77b450d33ce0f947b65ae38c1920fee996d9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433563172" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2796 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2796 iexplore.exe 2796 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2748 2796 iexplore.exe 30 PID 2796 wrote to memory of 2748 2796 iexplore.exe 30 PID 2796 wrote to memory of 2748 2796 iexplore.exe 30 PID 2796 wrote to memory of 2748 2796 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f97b893f80a83dfa8e8be80c7f0d8702_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2796 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5323fa4b83574d4af9a01c203456be0fd
SHA1c762ce758c264a07d162a33ac60809f5d05a7d71
SHA2568b2947015140530a3c9891f582d3ce7eb0a4e11359263336d6af3183c43dd7de
SHA512f9dd4c9ce4c01ecb66e5ec3837209240b3a5f0f4e54679c1c30b8368114cd9e2f47f523ed540f1d545f0eeb61ec6586e739c6c4d953c2d0f6fd5c5bea2b1cc34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edb129de606d9131d01ded2cfc1945ca
SHA146bfe63f91657e29525484fd6a862a64a826e640
SHA25682f7de8cc723221e631ba435d260eb422aa64853a5e35943c1859f0980fbcbb2
SHA5120d92478e9d92942d8d204ba546b284018b41045819f3b76184d5efeef2a28bc35c68d78c4bf44ccd8b0b9df2ff6083b345e46adae05139c71d3ecd7ed2eed940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a477d7190b626dd5638d76ca2f38fd62
SHA1361bc5d1b9f75ba831d273603859dcd89a1c4a64
SHA256de016cfce8091d7202230645dcba3d445ee56f97cf96364e1cde96814c25fa03
SHA5128b60fddebe3e1a54ef5e35b30c9cafd18b29c1f4217b6de1c3bea098c422e39d5c02cb496c40573f959fe3d7138ac1c0ae2bd516aba01be72aa93a91d3566ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccc1f945c2047eb6780621ffb9f8daf3
SHA10bb7082b6c6d94950b167cbb379d114de3a48700
SHA2561a4b4dcf651eee5c983e3adfe4aaafe7a2500f9be4fcca282ae4b6f82cac5d77
SHA512e020e39952f06d489b49d86ae1b185ee6fb154be9da77959bba90a469a4716f3e2c1b0ca28b871b685a69fa04065eb20a9402de1ae328af494063b3c200b9cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b8fac0d72593544e22a2fd7148212f3
SHA1ab4118a47fb81acf085e75c2765aa76add13db07
SHA256def8101fd47ea6ce2e87e4ae56e7760c317d29d225585491ebe821867e0741e5
SHA512a04a1b0bd05ea71960bc67009d613ce51868ef03cf68f0592871a98a09989aec1b5b23a7bd4a0b7905525edd615c5dbe2c5068d4a32bed482ce1932f3ce2e9ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b490aa6dae14218cf3c0e8d7c1a0b08
SHA133e4d6c32083bcebe33bb17977b0e7ae7cc2fa50
SHA256b33731715c287bb82a2ec8363e487adf18cc75a66663e93a95a557e37be03fe3
SHA512a37e344c6783345d5703925a915a8c9487e3d397865b8e29f99fd097a54476a3f614859d6183c8215c9c8c13086d38729acfd259b04c6c14b24689f15a99102b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561edc355c58be1bf5c1b37cba3c7286a
SHA1ca252518f41c1a0ecef55344b33c2d73c8911450
SHA256c785eb68cda39922ed1681026664fda3ae5123716556e3eec88d044ca895a2e2
SHA512a19f19acca5e8c11bf630ebee96c3bbdea8e30184d463de85656ca03239da314d21bc995f2ddbed227c350fe066c3c09d94a0b982b78f1252d97677244881427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5548b2511f2fa21838cc0fcf92c6bef2a
SHA10ea48e130b9b30b50561c9ad18c9221d03526646
SHA25695dfb0d975b28be3e973fdd214cff976666137f3062ef9512631ee123ae30f11
SHA512946f42d24459aa10039c2d3ee5adf079ddb65085a1f352b1cb042eb4a93c519e2bc227d2c90e0712dda0ea35f211d06ab914f4879a3b6b83b8d5fbfd46c0d719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c055900e9852cb20a83912dee7384e1f
SHA1d11134646c1573424431e25d72783916fc197cca
SHA2567ac879a4272583a1659324909c4d469a044a73e712cb4965b9e3c524ac6dfdaf
SHA512d9c06b5d68597341d31d822970651de8fafeddb64b18189b45fdabeb83fe1a1d24ab51100e4c013c1cce696c340bb2409d2e52843da277ab2b4f99a571a06565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f27d1874ae93c6aab405576f2b8702b
SHA1803febc701bc7d6d594f647e8dbf12d9248dfbd9
SHA2565066b5c570e415c9c1d5efc52475d55203a0aceb961eb207d39cfa6da3d2b4f0
SHA5127155b55b4bb8f320df8826af715418ff904461db6d39e67a197b331a9d9b6519e41c8b9c7e6c9916e5caef8068809f986a21687fe61ebaaa7c61dcac3201225d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558911fa345b87c582655e4f9b0b3ac20
SHA1950c59f0502b021504788f9f106bda63500555a0
SHA256d2b3a5314af582b93f21bc25b3e7631d96d080f58cddeed0ffa27db29de97d0e
SHA512bd359f63f20603aea80e99827f2c4b17caf4835efbff592520319f09baf00b94c441fe79fd73bd8b266a6fd2c2840558245c9c524f301541779a0421fceb2824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5714545d35d7f232e26371c3d0b276ff1
SHA1b9be3c0322d4730728e283d5c9068a6394d8ec52
SHA256d7c71929ac3649d248bdba109fa3ebb2049100175dafa8b93533f436ba47c35a
SHA5123817645a9c9ffdc6106dcb39d6dcd725c84b5ebf1ec6a99265bc4d5a5127e0a85f2621aacc0b1dd4dea78522f554711813acb5a45f7b1735d48faa5f86cba538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545022b4607d00c121cd66dc4e6c46c1b
SHA12f7b59aa7d5422f74248e9fe76ddb3c47ad52fb4
SHA256c3e38c69cd38c780e657e1fa4d0e0ce88cffd024193967666fadf74888e0e5c0
SHA5127918be2a4d00a6cbb962def2eccea465f1b738c9c7d56b57b96a99e147347e538b1d30c2ca6a89f344e8323333b50c512aece45eb08b59f214300ae37d9b2287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500cc79cc6aaf1913bda4c9133f4cf80b
SHA12ea70d479689b8689d17f74ad4f359ff5cb2e3f6
SHA25674d5c8ed5626f7b63934e567ce2ffe7d11c10fdc57d7beb00bff8fe0a0dfdb4d
SHA512b62876b7293b0d9523075d59465da1bb2a0fff5f8ca198c1951d2344802c7993b2cd5169dcfbf473a446b1e61e2816233db6429f180d6c439a559758aebedd4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e497aa03f13a8819778c67e192ccb626
SHA1b43566b49a1bea2c9b55053c96eea353597034cf
SHA256007fcf07de272ea2452c4ba38c18ca1ba826c57f85e1cd5b7584263ed0b53713
SHA5127c09f310b023e4484e7e433fdc7af4713d822318b44b742d7ab99d5f854489ac5a50a13f90cd36a98bf22ad743a68cd3a1db2b5d00d40f464211af95c04f59c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f7fc428234cf968a59ae35fb1d5aa9f
SHA1408a4f54e5138263a76cbfaa275941c4263682a1
SHA2567ef2afdd55ec968a3a5dbe27b7d1d83d522322c9119f1f84e9f429438fd43fd1
SHA512d3c411de7a59bb8fb14723332c51b4697fc0f0247940e61fa6d481e4832f96f0fbb663b1805c65a3f59d7eb7a080ad0a02c99eef254d1e9d1edef5bc894b396b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6479e14469ce5e84b91661ec136d2b8
SHA16a6dbb442a03469a0e85027ddbf4ea8ba5442073
SHA2560c2c77cc617c056fa8edd77c1055b0f24d929ee3dbd1bc9ed6f1ca58632a98f9
SHA512ae5bdd0432abbba6cedbe76396080c4a3c010f7dca5beec3e1fbd6a95d1304940f5cbe1f594743d5f891c8ae2817f6ba5d7b124634716a93471077283b6dde3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578b658cc0c78c337666be422b5a7b205
SHA15eb5b67e1011baaa3b79fe3047128b794cdd655a
SHA256f23e729158e45739570d6d2f4d52f39f5448ce3408aae9308548d5b6d90d8dd8
SHA512083a4a89b667252a54f2b7d1605a4a313741d51944b7d038de0630a0ae017fdad3bbf307b93987c6315a23640b0091c3044ce16bd29837643c41364983e66952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5585bc4168e59d0f18318e4b207b229d3
SHA12391569d12cd6a06d86c89be066e4bef4c132a40
SHA256b374eaebc9f40187ce47d155b07c4875fcca530fc3a614f28e2a04bbdc9dc38a
SHA512300ec32dc9a913a95612b07800224dd3fd5dba60af9ab6a75755549f05c0a6da090c23641ed9a7e990e42878fcf3201f76afd5a452fd0fb8fb2ba2d002bde79c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588675c738a2a576df8ac227f788996b7
SHA171b0cb8f0d40c3897194f744f128b936fb44d410
SHA25691d311b01d8fa3fa74d0e4a77f59adbe2570b0f5ab463ff0152c792f70267f84
SHA51262e71ac9c35a93c3a0c499e6961f67f443d9e2a94eb7b8373749b323fdbd8007d1fa7777722baffc065739ea1982c569a6d381ebf5026d4f3a6cc8f476a3911b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b