Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 08:07
Static task
static1
Behavioral task
behavioral1
Sample
5faf91fb8402e9ecb6dc7885bf123533_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5faf91fb8402e9ecb6dc7885bf123533_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5faf91fb8402e9ecb6dc7885bf123533_JaffaCakes118.html
-
Size
14KB
-
MD5
5faf91fb8402e9ecb6dc7885bf123533
-
SHA1
fcf53eb5458336dbfe62a3c8d4bfa6fce05bb75f
-
SHA256
13ee993b1835b494f9cc2b4933706d191672d0d19d90cbb819b0c8ed529e5816
-
SHA512
ad9b2b66161be2b102be6c2ac7457c92c9665ec83c7623e3bb35215a06e28431e576d25c342423ae2e33cc66ed4904f8091147e3811d1691a68517c5c0f32744
-
SSDEEP
192:SI+pfu72t6ol8Xxuxu4X6cTcilZaSdekhUcxNVdlGG2KVxKm2fBvEntAhddY50kJ:SIAuOlfxuEOS/NVdlGG2jfBO+PYaUJHh
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000003a12d1a5a37a10a0fefdca3c256f46d8babdddebe3a932cf165d3682d01cd1f1000000000e8000000002000020000000c3441b954fdd844a1af9da5ee500645a1cdcb2fb72f9ace4a741ebc31844477a200000009682cf3233475cebac4056f7db3e4d4a01694f85bf08ad0531cc9d29f708fa0e40000000cb7fcf22b088041848c8e85dbb53762a7781d979425a0264d02954ca6ce61ef40d3d104677e320801383cee73d9cc7def078cb26c0499e078a130de247059f3e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501b520f7cdada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000005a8714e853a5006906d4073aa6a6132193dc0f60ccceadebb28efb96ca6cf7e3000000000e80000000020000200000007d246c62598c7d6ed596e41e9f017fc286e90f4e242f68a13e6ecb0c167cb241900000007251632c26b1dca6f22cefd52690c412dc75a4ed972de5c353e4a110a7a1608983e6c41dc24220f034989a661f531242b578729dc21351b53026dce6745cfbdf8cbd99ee45d2eb1ed4680d7733a0018e0f5c2efa545d63357d733589b361dd39c9e4b5670646b4baf560c74eb2fb2882699de65cf053ae21906290c2fceebd2c2a1b19a215fbd24e53eb5aa416a825b940000000e855b2e518e0d450c9a3a0086418e5661d708c505ee730588e49fbb40e209a82d01b49e9d94faf436aab5ec5be53160284d90e652234e4de70724aba29471616 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F3BDDD1-466F-11EF-80D8-CEBD2182E735} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427624725" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1624 iexplore.exe 1624 iexplore.exe 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2452 1624 iexplore.exe 30 PID 1624 wrote to memory of 2452 1624 iexplore.exe 30 PID 1624 wrote to memory of 2452 1624 iexplore.exe 30 PID 1624 wrote to memory of 2452 1624 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5faf91fb8402e9ecb6dc7885bf123533_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1624 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529194a1d8f418cf49d58d2298c09d9cf
SHA1633041a19b48288ffba720579ec728a793444492
SHA256c19650102abd1849e132727cd72cb9910ea3c79c84b40b6c5bb79bdd56941166
SHA5128abebe0c6f8fa5c7aa787f2f3ca3328f7363dcab0d6307d17fb16a9a3e639e131ce9743ad61da66f38265927979513f66c3c2df86619412568034606fd2b2534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c764b93421cb7e2548a60f1f058bba99
SHA1156b24213d3fdaecd2fe856544f9c2ec9ed6b58e
SHA2567bbc0e992630d1ecd78da16e9c16aec202f2db4477d54ac61b9b1cb94fa874a7
SHA512fb737fa22d114756d87d493bef217c483267fa4eea83e1b942a56411dfaf73b2745a65eb16aa85c37576c5275ef6eafc2e2a996e832b622333edb877a3b8523b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2bf8038c9f3d8c0c898efe19a633263
SHA18608b8ba2f8f57da82c678416364a54a8f032926
SHA2561214f0280fae7f83e75af10e2373cf1acbebfad504cf2f3a17672f3c88f2046e
SHA5125f499db010e83940bf12e4ccf2f4cae44f23e5e3c9cc399a0f3b7238bb4d4e738e6bac7dbfc43cde853195a785be1805e7d369c2b47ab5d6871785a364d27954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5425e2228b83ad65d8d9df52e9bc2ad54
SHA1eb0b172b31255a8a88651dfe7b5fd1c159ae7132
SHA25694ff4902ebe47035832ac32a9baac16299e55364057cbf0229dd0860acd84f50
SHA5126d033de7753a01175d57df3ff1dc9fce3991d1a14bba71bb6cee766c18dc7621e8b470c868c67414a5346fdf1786b13f6391961576560c7976a5fce7399d53b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d63de39e8da5a085eec0340bc3df804
SHA159dacba1e832542279120f9271d6d32aceac4b08
SHA2569f7299582faf5482ae74870cff45f89c86a74a36ba5112c07b8d8ce88137a669
SHA512ba8d0c1ca81e06dd582d8a4de97ac0edab31381aecaebca4c7ac37149f8d8454a8615ab356088f586e0b96bef312a3470f81a611a0372a8e0b113616768c4118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588d206a4ffa8b4ad957036379a8024c2
SHA1910c8460cbd578610b1e442423fd9f94c376e8a0
SHA256b9e89789e2742da462462eadfe8e3637ca742c96dd388b3890d69c28ba560d60
SHA5124e11e83a82f9dced3dd225a8fbb82ca5b8c8e87e43c15a7d60440e2276dd65adee74c75480cd3a9e00c0d52024231db0750f7fa72d4b4aee0750269d0f1b06a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efbd15fd9500dba36ec2932ff0cccac1
SHA1a67c22b1d779a59d1340e79da6de18dfa0bfbf58
SHA256a47111457bf358f30d3a601ccc1493ce12c96f59fddf4c6d6ebdf0014948145e
SHA51216f3de1d86103e7b30a74ff93c423dd9765f42a34309c114b6113ad15ed466f650ecc6342f665d1293fb6f2c9673341837aab7ab7f6dfad567cdf2db80d90e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eea5e2e58532d8312ae115d30749b036
SHA1f7b88aaa53152576f51270e6250d072b8fc11ad6
SHA256d0970f9b4fba9bf90acd5dae2d6ab08c2450108c03ab56d58282cbdab98f6aef
SHA51272e949eee6ea6b0578077fadd14dee4177c79a670574b0f3dbaa58699d4184b114c24a51cca531942626364aecdf3fe703d1cd50c1ca7b85f7255fde837fc057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51581c24f1e6e421f9c800e7ec79e62d3
SHA16e0eb2600827d2f8cfdc35e24c4d51cb94ce86f0
SHA2567fbb07a68d672f98f885f7dae761990b3c065b1999bc4b572862d313578db509
SHA512b5ad14a43df41d3ea4eee2bdc27e0fd9af81cc5e8364a50ab5df6745938695b4d0e62b5a93df789b41314009ccc46af7669a76a19d31973925b6405c5ac44976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b27b5783433eb7bfb8af2fc3c87cc049
SHA1d285184663e2312639520cfe9b4c84ee1ce1efb9
SHA256dc96c7f5108c3443a79b089dc38fafecaf845cde96aede06f16b8203d42f343a
SHA512b20a8f3b7565582a3a6ac3c1499a42c46706b896d94eb36014601e9e43686c63310ee2caef15a29d307edfbabffda6d9dc248c974f6c7a4acddadde152d3f5b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9db4a24ab53f2042a02eeba337c3e00
SHA1a1af480822e2982005fd63b1d1f35206406da81c
SHA256a1bd28d46d5252b7917b12b18d3dc2394821f1ba3da1341c5dd35b312c354d6f
SHA512b5c33667d7fd743fd7abd912b6cfa8723357b325b150b29e36970e6ab54a1d9e973d258289fc45f81487f52e583ede609ab12039289a6aca3ac677fbe46ed23d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563937cb617ac313f251db5f7a5a3e33e
SHA19abd97094d806077f8a8931aae758334c2274606
SHA2567aea9f8244157ef38aebd98e3af41a4a2af5ef8a1888d43eb6709c74a3282084
SHA512fa5e0ec290b0e009f1cca475422e242b3c874fa858285b47842e8362fd0902c53ca92d53dc9d1cf8b7d2687be785b9dbc07ee84d15d576334e2038106baff42d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59284064e445875c96e28f09588160fc0
SHA158aab2c1eaa757ad152e00865463f758a3abd78a
SHA256c85764ebe6e8584326e054be91ea32773daa97fc0723c72fd4938208cb468187
SHA512fa53395a734e25ce304ec328570998e15a3f270c73e05d0f8841fc15c0353d48dab688f0612d3c6325f359f5ccdb789677c7230e1090482fff7d5f16e3f21fad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5212a3886883d0cad83d510f71d8dd76e
SHA12e98759be44a2a9e2817bed8609b55e680d4ae08
SHA256689c8c6312c82ad1b99d98359ec5f05ed33ce22bd0c7017a30b28e70b6ca43b7
SHA5121dd0ffe29d66fd1ac9a1bfd079ff4204ad50c788fc1787ced11df5aedf727e1187ffff8ba65b81e7df77fed12cd1036ebcad5c886facc4ac661da3f25e849dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5122664c95497e19483467c93717fa0ea
SHA138cff5bb0f8dbdf697357b007869ecb294686307
SHA2564384bca002a11c9e0f82d1b6f04cac02fec46a5d08e266de2e631ede6b81b5c2
SHA51296220337d9abc593f5a20e1efc8368e5b1077a4cf873f623a33fcc2ef40f400491960622e7fe6bc35c8dcc54cba5195bbf39191a68ace9eec2b972c1bcadab61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e9a5534b29d081f794e2138c2076f34
SHA1428e2e41bd0726b69c6fd2f7e26bd373d299da12
SHA25664822a42bb8463352ff45309006afa0347b51dce2f1d4b921c6340f3f53c7cf7
SHA5120b2cbc5e6e54179a2f01294cc1c21190edfe30ba079b3df19823851a6e56cb0b2bd08f5f3870d47a192e13fb58579d2062ad500be1e653c19e8b69ddb35acb20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcf65d69435a8bcc31db660bededd4c2
SHA1322da9e49202244d88cc09e085cdb8aa039607ac
SHA256ba64dab07365a707df8a0a2ab80d40f6319847ca08229ba7bb0fdc8bd51e1f06
SHA512b6e5d5ad831db922271172e7c47a939f9e95b99f43dce556437c71cd81b2edf895047ae6595bd6ef3b1b637171659207eb2127b09f5c680f43b7a6a962e52f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500eda9f97ca324813235da81b6bea539
SHA19e17b603a6d302f54610a27e53c0772f2ddd9890
SHA256e3af6104a3f40d7e9741f617cc47b28ff3e5225ebee9a35f7cc652123937a3ed
SHA512fad4bd932025a23671717bd5c0adab155651f2ee1d89883420ebbf5f1e2104c42dc8c83b694e9274f9f85d47a068169526cc52bc0aadddb335b0f1892596e58f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528387ef4059cba358411e8fc4230df42
SHA187958539871cc340e1da15c4da929866d1ef9d07
SHA25671d25662c19eab8e29141ff600727e32280ae0eddf942114fedef8a0ba673eb0
SHA512c73e366ef137fae3819d42a0ff894494722883482fb6a0e7eba4fbcacf32354de18cbc2c18f3da3a873ddfe2f4eae7a95c1b2f82a20a3f518d922c082af107dc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b