Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
70921ee0f79fc88a131dff430f80a43f_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
70921ee0f79fc88a131dff430f80a43f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
70921ee0f79fc88a131dff430f80a43f_JaffaCakes118.html
-
Size
120KB
-
MD5
70921ee0f79fc88a131dff430f80a43f
-
SHA1
8a861ad466bd9150721318406b6255d3b0f45a8c
-
SHA256
532c6c34a6a64b628839db32172e64c03e2940a9b88049cf09bfefc9e21b3256
-
SHA512
8f65ede0ade7922fcd8c4e8f357c95c1178c858c1cebd1c3b4421bc004bce22d21c355fe5c2580c75276b43138fc7cc13a341941d6db332918e2a71d35121cc1
-
SSDEEP
768:Kx/HMSpWWSYCvt9vJj5BAwG7QQfgXvUzXk9xO3RFE0fsCB8cR4XidnxL4o2B3bi8:KB/WfPkZS5xOwC72kGxWaVzjB02
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5047654db9deda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428090836" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000ed6bfb52289eb3bf0893f9f3793fda304cf48dd637917d15653bfba286fdac66000000000e8000000002000020000000870a033f4ba24df93f28ae113e61c72ca576d3b6f6a508a1561e5638c3c159ee9000000066ddac8488ac7aa134385b6a088f066175684de700b68526fc40dd4b5c7f0ed8c9c86ad0881ced919afba92e2f52e296fd4c80b36459c62a017a63ea17ad16bf5690228956179a989329b9bd443f1dc57e53de96eef260c6336d9aa04004bbef2499742fc36c627440598368721cef5e4eff540f09b556c87a461f46fd97f5e8b7c02e8f45f2f8a4dd9ba7c518542bd540000000dc4c52fb5734bd081a3cbc93b5cd310c9c16e673018fda5a5131ce76983e81562afdee64589ed1122643630199ded387d6e3827e21ac192798afec1b5b776a1a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60633F11-4AAC-11EF-ADD5-E21FB89EE600} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000ff0bb9d089c2b4ed259731dcd82eb78e4139d0ab0866834155a7ca34b32178ab000000000e8000000002000020000000408f137f44881d7919e5efc0561a45acba0d2862d447eeffcf699b205dc9f4e520000000b821e70460b8810387ce8e5b4dfa9f9db5a2a8c2e33176eeeee1d2058cc2d07040000000a659a310dc1cee8026e11e5afc703218b219bb3267d2556930fcb317addc6c67f5d1da4221b57f6647f329807d17a763f32b55ec1359624a9edc323b003aac02 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2852 iexplore.exe 2852 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2808 2852 iexplore.exe 30 PID 2852 wrote to memory of 2808 2852 iexplore.exe 30 PID 2852 wrote to memory of 2808 2852 iexplore.exe 30 PID 2852 wrote to memory of 2808 2852 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\70921ee0f79fc88a131dff430f80a43f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559aad12d6e6161ff594cfa0356d8cb5c
SHA19223b359069a9b59e0d8823354498c82e16228a5
SHA256ac3c78107395b1a16235716b693ec5edd978da1ddbe19d69556f3cd87fe3e4aa
SHA5129c9bfc12eaba1dbde1a559b56fb98890451e3773bb76861dc56aa5dcfb86db6c3203e947911fd9381a004dac1281222030c7dcddab1218fa7641c7a9d80b7d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5236bc707ce9e768aa6a9ecf4dd51a78c
SHA11f151bf10ddfdea0ec5e60de4a5169f806003879
SHA256c5aa8ccfae13519a652b69c9474c55e41d80a405cbe629a7762fbeecc8fc7d5e
SHA51235da32b909d2d9fceb3c505a43018116cb5a9369e24c9503db1d823e1aa6d9b72bf974dc99132d45e5ad0d9c48de07a18e8120871963f2433257d6c8d0dc772f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0fdada5afb795151622af9a759da135
SHA1eea814b92fbdc6f05de9c1d4fbf5b803126a78d0
SHA2563a09fd779db6f13d10528b3b67349cb9e3cb7bb269339a88e9750e45f55b51c3
SHA5123f0d22760fadec10c6d3f3b16259d69fbb83bd8d2c6dba9e4db873e8367e4ff0d1bc7ebc236340581f2678328a079df700580888453ff118953629ab785f0958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d6f5e026bf7c17dcf8e1a890a58ae26
SHA18fb8ef7fe8dd8da3748c54f6805ccf0bfb090ecd
SHA256b3830bd989ba90a19d121a88e65f701c65e79cd6b7632be4da7010ced6e9361f
SHA512c2d5915e75e842b841d8cca053e9660224867326b2bf43ea35b7e8067325a18bbc52b5087a48ef4b6b119f82e50b02a7fc17b1aab4a4fc3a44a3ecf1ccb8d870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5981965800e89e19795a3ec0e427428b6
SHA1a78b97b4e0c7aaf0af5b7d28aa6dcc5e17e705ec
SHA25632ca4122bb7190d6025597fbece5a626310a252277bc8fc9fe109f229b8b54da
SHA512602737ba269023ab6bb2b38da392b14e36ceea0a6a3d79d510fe1d150a46896cec14f8546c177d443c1297d9a2b23142dd27e7b73199e14e2446ddc6f84a1ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53167087c17d2f0fd9ca418ccd5334ff5
SHA12fb20a41e81cd56dffb4abfe808be82a7e9ca466
SHA2565f82a104fd11ed38e081bcfd13ddbc3db15f0998ba48dd8d9225950eec9c4dbf
SHA512e7f9f78b20decf763840c660da95bcdf8a68e147a8500dfecffea3d137306fa2933d0e6a21d86cfd2ad530de64d35d4a212568987a6153ac6c09ec4589bf3234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c7b95b14ba96627aab681eb0adf1379
SHA1a991d2950fac002ae5cfcac1c07fbfdbfa977066
SHA256f32ee2ae8dd266e93e6b54e7ef5c06be2cffa79eaa742319ddaf65c88c9bb691
SHA512b8ad96d70145997f31bcf4f13380a945918406c725077eadf9a41612f0a24471a78cb809ac76e25ebfd404e0e22278df3e2b4fceddde9791a4c6b07e84817f7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f108c4227bfc7612d5dacfe7df5faa
SHA1f9d30bed38599cc99c9a92f05795520f608daa0a
SHA25628a8e421f5f7036f2fa8b134a4eb57bb4e593aeb75e8e5db7413cfb3d52bbf83
SHA512851fe3f75e3cfb326ff516db8ee855ecf8eb587121c3bbd98aae5eb31d9f0d89ea01f109c655050738a2512a77912e66630267310bc3aefd65a7fc832312d92d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51deaf9b7b019b16a19061ef404ee5aae
SHA15a86639210dd076a83bed99a8e4346880937fa9e
SHA2569c2b12fb45d7028e32d3f1be480549bc31e0998bfff1f6784019cbf8a6f131e9
SHA512c2c06ce83a5a2a4a01e12b3b918c856231dd216ae9f666082a7b62808a3509ac166882ebee2e5f366f32d977b05cd8a6c9049b762abaa1b180ca06b765544390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ade4b0faf83803f5a82c342b5de3588
SHA12d9612700f6b18b36cad29d8a2af51171ed2d93e
SHA25620eb23d9a50f3146deb05b05b6e7c93d949265f8ace4c995f9cba6e7cc337c33
SHA51284e3dc27f7a063ad7ad7525a831ddf227e2dc20b48c23b38817260d44bd45e93f66fa91114f92248616bbde700e8aa0d98aac5553e8ed65e8b53e7ca7ed1c94a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb8eaf0ba07cfcc44fdd04b446384c5d
SHA196bb7fbb8f438efdd8ca4d3925b97c75a3421a12
SHA256d3fe46f547517f70fb94c6803f1178bcb2a9d9e72c6ee691ba363c351c1c2b8e
SHA512f4f3c69d92a58caab8acaaff0e860cf127fe05fa9b5ad9f1cef7620aaa425d4bba62777641d2984c8a41cee6331b77676d53836c5c5982549470efbeaf64082c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5919e7b3815e7cc7a7c529933c5134fb0
SHA11277874a12d35a83201e4493f2f099ccf1bb30c1
SHA256c5c5b5626ce5bda2290f9f28e8a03a49c640b08bf7b8e44ede82622f1586832b
SHA5120b75a28a5f95f00b39ccc7b5e8dcc1bd76ec041c8b6f60e72b5c36e2ae94f8d7366ee112ee1b0c40363b6903513cede009db0da6142c1f0b0e1622cf24588b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597760bc1853b233c1020c8b546b8140d
SHA1704df10bb2689b9a79681f5f14c4b1177221328b
SHA256f1c93d00509860bdf1f813b3fc60c6025a37f5009d14a4396b9d5b3b7d62f827
SHA512bae32e7a2cd4263219fe185b67a028e86cb3d5eceb0458318aedae94e82213e29a140991cb9deaa2ed2cfafbd373bd83ec5dddd27b2c04768b450c34234b5513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff3c42292298e0d3b00ae423c9b9f90f
SHA1af255fba2431eafec38c56c315b08810be947474
SHA2568581e7918cf758574584aba0135d4302b73a0426c72e3d4fc5764c98aabb2423
SHA512acd3beba64ee8401984bab246d2887caf8bf6cdcb7964362646a9596f5abb2dd2b8a35890f087bb615fb1f9461f5f33edd6ac7c2afa23c0312b848519fa9f0d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3c63b675f21afdd1bc89dbea2fb3515
SHA128ce14b5b459b5753d8c5c49e3ca9fae1d38a939
SHA256f99f01f0831035393e8318ec8d1f4fea06833180aeabae7221a90af0c4332aac
SHA512c454eaa4f36734129c80aab20ea28373943069c2b6a52652b764c7a78f58a6df5e4652347cb434150f78aca78c201036e02d8230a6703c1decaae9995dfb4d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da04f10818acacbe341369d47e75b9b6
SHA1f966d4332b4196186e2effa958fe738d35969ecc
SHA256df551f0a7b27326238b2ff59303fbc6239aa5dabd1eea261740ed5a15b159dc2
SHA512e1297b79f373a2b22c62046a1e3e16a190665842abe2389183e2e68a1ad3161106ffdefc254c9b89bf198b5c320353560f29c2d109b47d4edca6197caeafd621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfc601cbb22b9056676f62d3159bcb2a
SHA1275fea7224ebfd1095c5ed20303a8fe5e35b1cfb
SHA256e7a22d59020cac1dca8836b2dabfea24d81cd96cc5ecd119dc0eea68d5827217
SHA5120aafaf61de169d212461a0dc81774ade5214d60ba6ec32ae151b17e43b6713830450c1e3cddca7da2cd06909c5b6d87de137db441067719b93d76fc31f3eca1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562026654ce3243273c9d56f267d8c886
SHA157759a17dc594451008e05550a768717052c3891
SHA2566ad261bb899eec4f7dc10944fa4a9e4b5d0a491531ad7b0b4e925fda00752f32
SHA512b5e201b05d41b9415a31e8e6287c0271a6e32fcd5b18dd3e4677a58acfb8b479a7a241a21e20e8ed4e8e9ceda0e44fde6898a04ec772365b2fb27a2e210b42da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51141ef9f3c28ed5c98c2201f1579805c
SHA1bbd67ae146b4d321e84ceff35a15f4e3aa340f56
SHA256066096df69bc71659c73a9e46cafabb878af4d37291da9f8d148af6c847e820c
SHA512f3c38f65126ee7f96e8699d42a47fa976b04c99ab834dd6959ed799ee17f032117b76f0be46fe475509ab903990e0aabf657b0661768b6f2f804690701d6c8ba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b