Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 02:27
Static task
static1
Behavioral task
behavioral1
Sample
3d4a1d28788a976e1499c76dec1e4b6e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3d4a1d28788a976e1499c76dec1e4b6e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3d4a1d28788a976e1499c76dec1e4b6e_JaffaCakes118.html
-
Size
5KB
-
MD5
3d4a1d28788a976e1499c76dec1e4b6e
-
SHA1
feeb14986786365eeac99f57bdad0c4fa0109498
-
SHA256
c439f9f33b90bd7e96a461c1bb9e6c426eef9eb4b3bef28e53c95f50be0a1021
-
SHA512
1996f43c5f81e680f00249fbdb17820344df753d9e6535b597ab32e1f7be8fa3fce0e62e8758d75971d0541c56eea985f43f032e37bd29c390364af65d92b377
-
SSDEEP
96:5K5J3+ehRzN4578kwzG46gPsf765v9rL79IRlxSWju:Af+aRp45SGhI07gB4Scu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9D84F31-890A-11EF-A0B2-6AE4CEDF004B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f999798945e4d04391bac3244835c16a00000000020000000000106600000001000020000000fce60d8bd1ade9293ad8632fb3ca0fa5ae7ccadcdfa094674d29866efae2e7be000000000e800000000200002000000079a98299f7279d5453af5901e0740e56f85a07d06607a7bfa8baedf9b31af02d20000000aa944cbbe5839098c497a9865b7c82659029feb0f4b24039ad8e60418375d0b4400000006a1cc604fff820851087c56d77d8c7e5737e2cd38e43416ee141f28b47d2dc3a26c04ba36d6a7435472e4cb269860a808aa6627190a10e9a3edaf9db5cd1433c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d082f28f171ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434948331" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2244 3056 iexplore.exe 30 PID 3056 wrote to memory of 2244 3056 iexplore.exe 30 PID 3056 wrote to memory of 2244 3056 iexplore.exe 30 PID 3056 wrote to memory of 2244 3056 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d4a1d28788a976e1499c76dec1e4b6e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecce5ec6d3442331202a69b01bd42146
SHA1474b3714f399ba60f7749457d5e5b93f91e636b1
SHA25602293c56ddfda428f1b56b05afd521f8ae9f306cd40ee4ee20ec6095632fa429
SHA512ee0065eadbd339b7d8a04305b06600e393c0529595121085454e9ce62d147c6c6dda657cdb84740b771d70ccd4366d8cc1527e1162d76f39e0792e6b90269fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ea8b2dce1d0c628b39c840167a68e17
SHA1a83fdfe25607004a8ce9b8d8b03dc098d7ef6729
SHA2562a148efd3e8416836b373ea2aaf4a571a4a4739cb68e52d99450c2a5d40b7b7d
SHA5127ba935cc35b63fa08977bf09dd60edf830bd187829f00355ef8e5984f4a29c37e008d2067456cd786fdc810d2c149082517d60a08362036b529c522b985fa26a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5695a094d1121f9174989fa7c62e3fbf1
SHA1cd8383419de9c0e9fab6598962d74314ce9684bf
SHA2569777d6a0a36f07b375a71dc2ebe3108a953bd7e36158d49ec4b0f9af25d8dce3
SHA512f1e24ced50d1b6c5a19dab4b3d5a8aa14fb32f9473463d8c0cab13bab5acae4757c8b622788b31b843e1e03d8f05c88539c33fcbd0ae1c4783a508279c2fbde3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ec7f17c8aa752aeb3aa86d28b4c2997
SHA1d3c37d467767fb778a4b4a105b986c36df14c9a1
SHA256957a21e9df4062c4da2cb48dea34a3a14f0a572285e0da2d4958f4d440ec70b2
SHA512d1255fb83e815c586e4459d3a7bad303b62c72254b417c14e0589315839dd1844775475d52f2a78f2a26df62f98147beb8e97eb40d2bf0f86e149a38862e1e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eb8166479f68451ff1c426372021882
SHA1f81f195a724b71945a1c5ec42bcb6604e1b77553
SHA2565cb4cc2e87e0bec1709075a76eac93ebe5410988e4a840b9393b025189985ed0
SHA512e8cc84b09cdef3c9429ecc234c08399f3824d8f69981400c316807898bf147c781cd8fcf1f00d7e4d606e0bdd1c93687ccbfaced2b8b2cb1230cb0169fdd7b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1254c0ae81f8fb09d9e39d01eb4af67
SHA1612a9b40e3fcac12f9341878ad7e6933bae57e64
SHA256644c1ce6f7f34ce52ebdab50a3116e4ced954267969531097ce993f3b1991a07
SHA5124439909e5f6b72bcf99dd9e16f2220d33453db1a93aafc541dcf6090dcba5751e22dd0ef4ce1509787d0be11fb676f696fb06988ec50443b685a263aaf52e19c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51600c5959d323d95c6995568d4279a96
SHA1303cb0d44c6c1ccbb0993166fa8978ee0a6c81fd
SHA256cf96680990ccedc4f6114827cde651156c86706bb54b5f5bcc78e7b9de60afb5
SHA5129e9a64f31c2391a30c23af361c32824e88990c6e61966569c133339e0705c01819b5ccf5fbbd9815e5b80d8263bf81c9f5c9d9f6baaa46898872671ced07376b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553a4ffdbcaff5386fa6dde538f46c7b2
SHA1e0f09d2769867669e7e78bb4383daa5e1f667937
SHA256e1bc0c349f32271eb6237eea418e083acf8c7806c0c1fc6eed95c0a938b224c6
SHA5127d132fd6ab1103831ef64062025b5fe15d1284f4153981cab4e86535dfc458fb81a2c0c1c316e1dd48711723ba78df204c5ffd9f204c3901f0f4f924b3429b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57388b9f90232349fa02a87606fd9f6ac
SHA1bb3f103c82f396b5a54abfafc00fe523cf0cd09f
SHA25648c53c1d12b4a93a73fb1db655efedd54882f91bd46d078a57ce9601f3539746
SHA512f06ef0379c02608937fffbb86c4c8f5523b07a8a98670774221b97012b132e858fb0b1298b69ca948abdc3a484eecc384071b3efe684e2d745eaadaef73d8dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5812017220b530301c1f21af465eef95d
SHA1d0bdc42fff7977e15d850fe366ae1a61fcbad433
SHA256f0a3de6bb789c255bbe11bc4e78abd51b5e8304d1ee73f7ca878d965d9817231
SHA512dadf90a4fd641b43327ca788b21157e901b41a7f0591f2683b81620e159434dd9435d67000c2cbb911b9229dedbc16c6d583821f9b99817c4c176de1b43eba66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fab3cd1af8edb20bb6b32bac9f1edd23
SHA155ad7ce95a650e06df0cd30b02f75dff3499466a
SHA2567f412a466abbe81f979e183434d41a6e252c17a22e69b31e2fe4491aaa0a9bf5
SHA512687dfe659ca2132d9d1620ebdf7c90b735d68085176afe46fdf2f4460b0a3ce3cd58655cad63c5411b774a5ed0d9262067e947982429bf7c9644d96827a548db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593918663f993c6e88a17de51c077f573
SHA11bd267437e0d80c22b9848049172c9eb825c708d
SHA25604d21630466be37321cc3a87c9cff26c73bcdab1c4256730972823adc6aeedbc
SHA512908e13a2575cd4a06005932b4462484f2947a460e95f1a0574e80ddec53b601ab1b7ff43436051c3657d8d64dd9d1a20752e19b0cce7b33d3259720497a1b4b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572784b2f7a663eeb7cfed618856b7f28
SHA1d4b2ed254812288140fa4b94a23e1537258ead66
SHA256d4578064d428ac39a8c806f1472840bc8a146262f3bad0250e2abcfd8a25a784
SHA5124bcd9b3a0bc174a63e713cd37a47166f840d745dfbcfa88f229d00087171e6861790afb192e28c0cf0027ae09d47bd9bfcb3ac922839e51d523de01db94c68b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d148298fa9ae9794c8540139aeb7392
SHA180a0d701cf3bd46e5d4a27f20f0f5646c5e7483c
SHA256ba380553117bb1b9886b9910e58d1b8005abace09d1b08764afc3bc63d155871
SHA51213d6b7f2e83096d352f54dee8bb277e49b536fba6101d2fc4b979a917d600b0ea382eb89efd0cdcc8fefae509d6607770f97ed0bf53701b081385bdba65329bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5ec0b63c9d25352afee94957d05fa7a
SHA1a3f6a1f1e6c7751b7192073de198b3f099b74485
SHA2561b17720a3c54ce4e483e4bd91c8d9422a9f06ca48b214283cfc4f79602c9d02f
SHA512f7fa8bd9b3a4cebe529e733ad0076b5f482e01161590340622380fd431d87a740431ffb619c41e1ac2c7c8d34abe6ff4e888d9cfb377a9aa704c9de96cf4ee03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aee25de9075111821f1aa50f2cd4bc7
SHA193150c5003586041d6af6b26dfe1eafad27fdba7
SHA256106252bab4979cc4ebad5de6d28df0e23755d55cd6dfe56ca3597a951243dca0
SHA51289359a0ef3ddc39dfdb987c6998864961bda8b420df6355b248f73bb61f7767057d54da0ff546359cd9b0a8bf7ca75bb48fbad5bd41a980af4b56eebc42d675c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7083246a63f1beaa91520a81c97e842
SHA1978639450fcc0a57e7df2270b54331e27a8a241a
SHA256ad36730b76f8d28cd4ef76a5f12c931a501d2304c7dbe04a6a5dd6c53349f3dc
SHA5122fe531dfc906e717626479351ccc662754431512eb60678af9d71694325a9d7d4f9f4a58fd4601a1b03f61f7c3aa9c38fc4f52fee4ee55bbd7e14e03d457c347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528b11137430134a37a89324c250a3ed4
SHA14b1b170c72c526a24677955ade0280aba96e2555
SHA256198bd2d5c285cbec47e20ff7c8d2b335c71120710c4e88e39a7f84393c4cae78
SHA512eb4817984d96fc81c76c87c0fdf2bc2f8646de7381c528e8ff503d9810d2c2c0df038ee7bf1a824f02d94a4348c7b50ac65260ead4ebe3c0f6407c326bca8fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8b2692ea3f915c0c2b57669eb9b1187
SHA1f3776f3034ad3e334460f9c552779aec34addda6
SHA256ea94d6f764f51dc9199e6008b757a782ae12bec8f2a819b4e4b2b27c3e3d6dc2
SHA512fce0477ae861ee213edc938d28faac01ea1ec6c1e7791e2807f93c1487151adbc6443ace972f1de952b064b633ab5f77fb42db9194facd9c96debb7e86a01210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546c17007a988388e07bb97bca5a7d338
SHA1dfa842c61b4cdefe2014f9f51ac9d5f42da59350
SHA25655a5f356135fe3333550dc5810d278e4c190a247a8bbc1732660e99999cd7e30
SHA51253656c974743570e6281038030beb7b3ff2944826d138fa478163f87e62405a45e911afd02bd0b15e4ee617cbae2052d7ec516e215d1dbcad50f598ffac6760f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b