Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
fcf1cfa4e8a9561a64a3ca10345ad0a7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fcf1cfa4e8a9561a64a3ca10345ad0a7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fcf1cfa4e8a9561a64a3ca10345ad0a7_JaffaCakes118.html
-
Size
42KB
-
MD5
fcf1cfa4e8a9561a64a3ca10345ad0a7
-
SHA1
bed1e08b83b4bbb20ffba359ec8f0d24f5d6b2f9
-
SHA256
e659f79f8b45d0f69a1f933877f40c834a3bab0fed1c9f1779de72158d17e1e2
-
SHA512
30b5d2e027ff35827f3a3d34f563650d8dd88f3672902e8b5338e3b8af0ad0fc438fcb571c1dd7fc4283521fadca4016ca84b52631ed78eee771eb32e8cef635
-
SSDEEP
768:FPtiEqK1ZtIx82nrjzFky3j06QbKD/my/XwGhuWyd:BtiEP/v2nHzmyT8s/myfFIR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433711804" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6527101-7DCB-11EF-96BC-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70bad3b2d811db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000007138a8bb27a96f450e27c0107b12f58f80f5b6013b442fcfa9f18f2c7bd8414000000000e80000000020000200000003455217dc558c95f74b2ae5c5336afc7ff76609a7f6e45eb316d36fea412daab200000002b1f20766c455fe956b6239c32f48d27ab87b5847bc172c971a3e0e57332bcbe400000009a9c08e9917efc5d8de2013249c1235ef9c33efb5ab5d6169175667bdebdc345368b3f99a7484f23e4a0c0f65e704b577609428081b5c4853f59d30774d761fa iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2256 iexplore.exe 2256 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2804 2256 iexplore.exe 31 PID 2256 wrote to memory of 2804 2256 iexplore.exe 31 PID 2256 wrote to memory of 2804 2256 iexplore.exe 31 PID 2256 wrote to memory of 2804 2256 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fcf1cfa4e8a9561a64a3ca10345ad0a7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b765f2686a0d5dc3780d42091b8314f
SHA1480eced23f315953daedaccf19f8dd50946d1093
SHA256bf844750273e4c47c4b425ca3cef02dee72dc1aff105242c04dd2972880a4b73
SHA512b81eccb299f8fda371fc136f7e0a1d0dc46c6e509de868d90b32bc78bd65b3387a4d23140facc7796d1ecbc558aabd1075535ade96fcf02713bcac75615a48e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5085fb00575bf6130a575af657e42af41
SHA13b0156d1c6f83501e081eb5d01766fcb388e216b
SHA2564420d751353c05f5f57fc1153e9ac3b8f3a1446e179b1a5cd370edfbe5c110b7
SHA512750c520163e12c31521f61fe096c08b377be7cfe2d9f4dfca05dae1d8a8bf602d06715daa89374698b37da5dc773dce01587c0bb2c1360e1d2742972c15da28c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587422422b4502d388f580ec7a9398271
SHA1a96aee4b6b55bca11e544464e4833cf6590588f3
SHA2566e9e6f849000603cdd8eee6bf27fbf319b95f7798879bc33bdbc1437e97464ea
SHA51265433544d5760e9845c83a5efa3fae421d6ff3f47cef1ddcdd32cf625aafcc1abe52e0ffded507ca801c1dc66c50634eda0545eee6596d9695a72be0267c74e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa972aca43a5a0f68d146758325bff2
SHA1e703defd131632f06bcec1741b5042e69d8d859b
SHA256e0c2414e8513efb44d0773b24aae1ef38758437380a9d9b0e4231f7f64c53fb4
SHA51298a76387ec183e3bc5abb22ba3aa94b8a1e07a33dca8c76be6ff5bdbc62a210093a4329753fedf8ab80cca75604ed3fcd36a741e4c26ab84fb0867ceb397f453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8e92ff3e3b76c12502af5ba3fd03a92
SHA17727352ee6a6edc6e33809a216a8b5adc1ea92b8
SHA2560ffa3172a6740783a7d3553ac5cefe40817d542ebc0aa0d235e0ee80184b66f2
SHA51261825be5949de0f1a5fd0f0a7777c421d339580f309ee1061ea1a040c75b72272e6849495bef81dc8d291c84b38644c2222866f229a200f6ddaf55f3be0e5862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df6365f5530ccd3687bf4338f2486800
SHA15ea6191f7591c5f2950d53da3ac5c26e7c07b3c2
SHA25605461caaeb4c92607bec325be9b5e14f26960553efb0bbddfa0b5c2d298cf9b7
SHA512f3e4e9f61f75517e5399823816a946e1185e6cfcb4fc322dee986af8691c85fad240c9efd35f05321dd873830ae0ac9955e72ebc5a793fc9672be501c7f85494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a08575e84fce94e622cb32068a9ff9c3
SHA1563cbab578b5cf73abfef4de04a10859acdeb086
SHA256d88a16440823a05aef51a3e10cbb07b42edb8e8bd0e8a996a13e81c05b294f9e
SHA512de749af8ed806ca107895c2f8214cb8cd9e34ee9b11716f0842bc9059e268ce880714cf85e1388453e1bc2b91e67b4d8ffbce99d2dfb27084ba47b5bba9d1a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4655a0afd132f8af2204854081b7572
SHA1622c737e7cb57db42f5bb42fa8296176110299cf
SHA256ae9a5cdc43e228f11df94b9efa4171c99e9c5303e616b4a5226745c2ad6223e3
SHA5129eb4ec5ae0e90a726e56b6c76a2cc739e5fd2633b833bf3f0b508914cefc8affad25469ead7597370ec10573d7fc815319661b9ea7d92c6c9d121bc2f14e2222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b83f972597450a4cc5d38efb021d6648
SHA1e1a639730daf423f0382f3f4335a086d7e1c795a
SHA2561b7526464b18f8023346c815f6da900f632c25b45384212aad835b67b10b44c3
SHA51236e380895cec69fc0c06a1bfac2038ddf9bd590c910974da27980e17aca622de319a64af3e6c8d011c396128f28b1a6dfabbba93888c6e22e45488431d7c67f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55448fbb28fd1bbfe92065f02d037ed99
SHA1b3b768e6d840e22965f25a084e0ed96c61206d13
SHA2564d103ced7d22a59bdea2fd05e455b8185681483f8d78d64b657367ed853c5f42
SHA5121eef167e0857f6b03dff291391d186ec57bde2f2b704838cf4f31b5d1e7bd440ff11e7b364bda42dcce213ac09089ce4c1bef65670c3d08b5398634929c2775e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b262897e4cf6ddc0ac93de9ac2e650fc
SHA1d113b6e11acb214fd70c251d3153149ede4ed473
SHA256c54386d4f3aae7809dfead5f9fa7ba15365007e1eb6f210190ea7191675ff7ca
SHA512950ee3205736146455d3ef14fe1a7b9ee07f7d75732c220d7bb9e65587e52e440c5b754c78248d26da4737633d878ec5d3062d0548edad6bc9af4db17656fb13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d83606a115dd57858e6e8b512fc48d06
SHA10175b615b1c1a3fba99c8df0c65f84a59477f3db
SHA25655c9b1d170f5f7f37704f78298a3839b57b4328585f2adee05a3082772cedcae
SHA512b0472c69db40f9850f2e5ef782985f7bc55b89a3e238a65dcbfbcb31c289cabdb7743009b3a1adb289109e3b96a0e9d1e74b04f2ae81f266fefcb3660ce48805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aed0808a42515757b0e38678345b55c
SHA1231a4aae2304f588c1ed35878b3ed9cc65c920c5
SHA256b312546fae6ed359bf5abf86ba13abf067e441bb8ff625470f53d987abf05402
SHA51278824490e1b203de2678de46cf13ae249ea843a7a3da165ff64b83adb057741fa371f67e512d3022d26f917939051656f098fab0539efe263cbb81062c2bf207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5012b487ccffd65b98ac2b4aa6d9e9b9d
SHA1b10f12d910984614504c933c264989396eaf8807
SHA256879c46559006f2970d1ab37527fe86458b8413975b93862d5334abacd2f60b9d
SHA51272fde68df694213a4dfc28823208f76ea1b5ab8f54172db07cd01c4ba3d8f6d30b460b4fe4b2730ee113aeccde3606bd8be23f958785c562cd6497b8c0e00ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9ac8be359fb34c74bf88651a4ce9dab
SHA10e5c7b04dd0e3eb90e1ab22424572be584097217
SHA25692abca4cca5331db363d1b0dbdf1be7a1562f393a6160963c3192162463e68b5
SHA512ac8da4f92b167bf3c5ed08f1155e1bd2f10d26367ed9d0928164b97261acc4cfac63e6bd3f9a4e65c72cde5cbf5e25fd279da2a7b589fcf2868091bc9a756f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55155b1e8141b1398b14bbed9ef323706
SHA198c18130413ff3cbe2eacb8504734ade10b9230a
SHA256b1571a10461e5a30555b40cdc4d81fc475c2d7a4a243c595440d3fbee57caf96
SHA5120dfadf91eb9c669cc7fb45af43d17b283af2355b54292b4f440c1b2426ed35560b5476a0eadf13e209cd51ccf44d70b73f93f6d268cb36305f6f6b801247c7dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5866dcd5dedd74ecb5716199fe14e53ce
SHA138ab77493ffe6d6d88b4892669042d0280c31f6a
SHA256e677994d170287a0b9e45bde410f0fef2e1922d91acc786ebed22a2d15850a38
SHA51223757af837269e32b1a49b25f2e5b1d072cb75490a0c77b228dc880eed3e7c078b4add6dcc350010ad5db08a3f0526a90fe3e40054ecc6f270fa4d785d7663eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f61a9be8d9bb0e67751942909c1af4f5
SHA1033c55680689cab9e54adcfea8d262bab57da2de
SHA256bd1a028fc60b2f003124a7270d6396aedb3fb0e494827929cf6c69fb1ef7be88
SHA512ee4d35b44314db52b9e2cd12b3aa5011b41e6816d11626de1cd60b9cdab9ac45002cd4e86463b190a20c7bb3289583aebb20130f6ac0ceabdb72330326f145ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c7e91bc96855f7042b02856982e6282
SHA196645e6cb537eda5539710e041771fadb77c65f5
SHA256518fe85a051e3c97f17bede5526b1e28120f86160c85c6e8987b7e478be01ce3
SHA5127c28f565394d21e5fa55b9743ebf86d6b26196656830334c8f608088fcc3613cb6a9b9e82c12493ddc89fc67caa3aa37a50361c500980dcfe9b790e6ff36bd65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d87753790b91de2483439e9cb4a53500
SHA1a939a779fb825417f39d680c4f4eb097f9fb0e64
SHA256b9b6223f9f73530331519bda893930d73d7bb41a64b250cab250dbada31edea8
SHA512512e394b76970d753b552110e3d462eff26e3b928b7c11b95b421b628a5bff70702ac8148b81a39a1ceacdf7859badee1d58fd3d253ad75b5e53b04fbb3507b3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b