Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 03:31
Static task
static1
Behavioral task
behavioral1
Sample
893ee020bb0d066ccb5165e6182f645f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
893ee020bb0d066ccb5165e6182f645f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
893ee020bb0d066ccb5165e6182f645f_JaffaCakes118.html
-
Size
4KB
-
MD5
893ee020bb0d066ccb5165e6182f645f
-
SHA1
a0880c73e7f6595951f8f5563a5245939975a179
-
SHA256
bebe51642375337a15cef67948cee0f0cba7636a907ffc686eb0b79f6907bb6c
-
SHA512
b626191c7b83592b897e1dc2673b4789843a44c80fae240f0d62b0d73a3519240e186f091c5a788f818cffd9ce66f9315504c28b349250df5e07424dabae3431
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oZhoJtTd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423374549" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6A3ECBE1-1FC7-11EF-B587-FED6C5E8D4AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000a1aeaab5661fccd406c24cf0c149a6c141b37dea90015cbed19be9bbe42a9ac1000000000e800000000200002000000027748f64f08b5d6df660181e0276ef4e14bb9484ac3d334517520adef4def5c4200000003c013f03ea1c1628e95d7216b8fd9c2d6d694302e1bf12796d43cbe105a63b9f400000007a2acb02a4906e178a6c61270d11d0f507efcebdb96ba5680d2d7dc8032e88cfaa54b2a8ad3f8e71190878b904a45a497559358bac3c41fcc92f6696e9c02e9c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f094cd3ed4b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000f719888757a527eb49614c1a1b4611ff774664cd1f1ceced6c65ea1760c39759000000000e800000000200002000000074782abebc5bff79025ada4b84f56e7cc4e56945f05e09b461479d62e8da380490000000d1ac8a42a5d46b1c5ae20116deec963f393bfb88461719bee648d460147f31e3c0b2095eb0b6e3a0ca87c09cd8e5c18f6a41531324b838f0b502e268218bf6a9b6b568223ced4a73fc10a1daf1cb425488e5c81908b8b6545df525b9600dbb55700055096d9b080beced769149ed1492b47a3dcc773933bb24010c14b60b3e98583bac02f2e3d774f5af5fc1494ae714400000007fad90d3755faa943b1b3723b52ab563f7426f179bfdd6eab6bf8367f50d0b936574448b1cfe49b55b8996f5241b902161e5c2574ae77c2659dc8ba74db7a6e3 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1548 iexplore.exe 1548 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2128 1548 iexplore.exe 28 PID 1548 wrote to memory of 2128 1548 iexplore.exe 28 PID 1548 wrote to memory of 2128 1548 iexplore.exe 28 PID 1548 wrote to memory of 2128 1548 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\893ee020bb0d066ccb5165e6182f645f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1548 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58233d30889d0691acd8df0510981266e
SHA19b121bd860f1dd146c226e90f61cc660a40a0153
SHA25635ad15201b66fa151c13f8ce5d24e99441f5af2552d39a77ce5fb12a379fb55e
SHA512cd07f6c30fbda951dfc681c7d1d1e877dff45ef743e7c4c2eb1954cecda0950cd1ea22e9fa901df1ccbc4c12d1a23b778868a07572fabd0c8154cba4211a53d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a2a5002834235c560701b3da85c69d1
SHA15d580251e7fb3bddda06eed48be342f2d83a81e2
SHA2568c5dba4b218fb8f4e265eb75fc5d040dfcba14e0feb6e4ea264684dfe16c6793
SHA5124f108de2f9e326ed2fd2760a1457fbb782a4a14b9bc948814ae145a01fe884e29d4ab9265fe47716b4bc6c49e0adaf6014664d371a38f479699345bb12feb6a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550eacb0f576db5741694ab5c29f0a1f5
SHA13cf03b2fae6a0dd8704fc1f26d4d4f128ea3acdd
SHA25689337290bdd6da4b01e5e480226092ed670c1f7ca53348e9c90bea18daadf72f
SHA5128d7b0324cf713e8a2a01009bb1865659f3536ca98b96721893638bcd4720bfdf8c310bec7d45b3bf67e5f85f8f009fab9ffa98fafafcdf6549d91a483d32006d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfa2274da1c56f1e150d9f3b2ce9ec9e
SHA1f217c0d042845b1b255c0f4f395cb07054a5d556
SHA25675133c1ed85b3faaef43fbf5a7d89d5df239c53c4a4c982ab2e6c17f2c774947
SHA51207b6e85cff69f883cbab0afb0bf6e04b36da56c9602e1aa881e50102d3f4bed81c92d4795a2a4dd44f869d198dccb542a4d1c1722e2b3a766f36e2acdac38d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5699b63a8bea985627e41dbb120520f75
SHA1e17c64cd7429de80bc1ceb1bde73b224e7fb881e
SHA256c47f4b2e8f17c2582f2f25b87f6ad8f5f7de184ea8e1a8c9cfc3e91e97842f4b
SHA512c9a687ca5766b7e0a8808c7e0015579b5482ad2ccc10af1f806fabb57d44312cb86fa9754159a3d24a9867bdc90980c47e0d5cc10fd23d690417671cc2dc3ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ea9b25361549115aaade7b89bee9b10
SHA107b653abafc30a2512e7eb8caa798c1f443755c5
SHA256656b639e4f70268cbf4168f01b913dda1594ac8f9b5c27b798049b702df447f0
SHA512bcea90f0d1fe75b325ea836d41cfcf88a0b80ae42cfcb13cab57d3f3b91c743815802413417736b337d4358c352793ee7c0816d7f630bab388593ab6382b5977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc6a8acb79a5cf4e58438682f39f291d
SHA1ff7494e90a62fbc5b54edbea1116521a0abb51bb
SHA256b8e1897861ac2cb61bb769efbb7014aadc5be94681384a1fa0df54e06ad75415
SHA5126fc8d66c1d1176cf2f7357bd9963a3420d2175d54bb712deeda3450c9df55d88aeb517e42e027971b58bbeeb06c36caf761ff52c2d059934a16207cda6472a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aba1cc097a082818cfb69fbc17e68f10
SHA1dae34dfbc510728589f440c5f477ac04e6b5d82c
SHA256cae6898687c8a5d766338d6240b52aba499059630635135ae307db800ca2e9ad
SHA5124a10180be11186dc1d6b229f5df6139c61a81f2cdf7879a02f87293257b46f2bc1ef1229b96ae7a08b33be0506cd81107aab17280e995bfb6abd4893152cb431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b815039d9f51e43948b4f1c218adaed
SHA18d21cad7331ecdd70f02e09391aac8201a1d8769
SHA256a29b97f00e9b23ebdf82ba9d29fa7abb260207f6fe8c9c7a377ec8eb65e5ee1e
SHA512c3eef565ba52a3daf137f3d592a2ff825689aa268d9ece62a78afd5a424f84187f4eb67f4ea048f6ffe7fed6c3e0c645221825b88bb7aebf37b6d31ab4de0bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb56f7abdc22531c1ebbdd0d298e0136
SHA1beee5aba5a749b294743e157a96f3bfebb45ebb0
SHA25627ee5b276102ca91fe7b1eda76f144a8f2b75cf47d3fdd2853b6e2b1779adb95
SHA5128b9aaea3200ff7ed39b1ca8534328f699d20c894c8aea2111d32bf4312358851355bf0fabac6034989edb6e195be56d7bbffcc2f86f86fc4bb17426891547aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5868ee1306f3b1d54b9b235bf90e48c3f
SHA1c041bfd8a82a869e7a97af5ecf247de0c0d0032e
SHA25627e128c9ba3c23c08e90bb9012510802d3096ec661cf28591b77327087123896
SHA512ad6727c51ba3db8310224376b7d8fd53a99e427bdee4160e342c368d4da92e0370f0d6d17e33beb83f47e6e1dc6cf575b87dcd1c2e61bb46ce6bc1348a69553b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582494694ca385454f2cd1063db215ebb
SHA17d0fea7ab7be63fe7a4e65cdcf455228dc06b6ff
SHA256c939f895b390e5e57da3e8607458c78359220f1e65ad19ec826e950870fddaef
SHA51217c26184a19881bb0dcced4ed83f98ac3d068ddbffae6df239e7af128e37bb795b6b46391439abeaebf9b2b6201cf69139ad026a4cdf08f9a0836a01084f2e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51591b6bc99aa9809548b901c6f2947b5
SHA18fa2509a88e518f500e11215a78c8243ec97d6e5
SHA256294a5cc6998c02effa42625be05c018dec94062a10eae9583cf381134a95ca0e
SHA512e5769af7657092d229e86201f46eded345ea79fcb33be8019b40b8493519250696ac76a4f0ed8f99240b6ea5df48c43a79687f0f1a8dc6c044fd18557bc40976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50554f87c5ea57d7a2459aadad7bec07a
SHA1bf70eea2569a655214db9227f86f15a86d6e4ede
SHA256022d10f33b52006ae880dbb9a9752c052100d48c985f213037b8e465880d8739
SHA512e6392a2d7e31fee490cba6e299b6c2efeba9d05e59f7b89e59acb99f0bacfa86440d711c584032ada466ba4574ce59770355b8aa90ff8a1cde7a0570bae58016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5650f93ff81caaf526ca7e4e85caca3da
SHA1245df6ced57d57465c717646dfca01d006fa4e65
SHA256cad25fedea288699e0462cdd88ebb3e2f87edc99a79a4f7450a500859b1be68b
SHA512d6681e75f3306ba42af3c21215da481ef93320cba698dde2bf61433e2874c4e4018b5632f4b438b9143fad6b3b1840f877dfa916f8f344b1f26b8060e6f825b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb252178d1948915d15d63ea5afdd784
SHA1c9081ddd80783fb49dd6a116a95d37d8cad9c14f
SHA256a776995964ce030ec618758ab58195f67196b4911b6c08326aa3724b73d3e24b
SHA5120fe72151ef6e8a456f18e784463681a7b9f170d3b074ac9d7c88db012c21a263c3a5fbe68c41402bd77ed69f1c4e48511e880c10d8baca8c1bf65d5b1adc114a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a951d981bea21b09049d6a64034ec737
SHA1f767423004f77e7970bb18531e1351d2886439d2
SHA2567c0a8c7bbaf0a1d81ca42c58ddbb69180919e2d5201e0d205bfd2e2385c6255c
SHA512692e08f498d8b6ec59340c443052083c8e15b8ac74ecea248f5ee1db654acf7ab50663b047b0fc7d603c83ec83c1df23f0f5846c8eecae7cb1270c8c700e1b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f60ebe48f19dba68f70d67fc361dc342
SHA123b42eb2035418a6b4005a0cbc9c08e279fb7277
SHA2569d58066ec22512cc0c147af4cc2bb6fe591d81fb871abd5bd042bf5f88665003
SHA512906447fec20faf72f1e3b3c0a298556bedc700201810b4a02b0844dcfcd2f25cb2c401eecc67f0354bb8acc6b3412919021442d50ff4fbdf9a93bfc0684a9d28
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b