Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
a96f3c8a4732e01ed9139fdbef817dc9_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a96f3c8a4732e01ed9139fdbef817dc9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a96f3c8a4732e01ed9139fdbef817dc9_JaffaCakes118.html
-
Size
5KB
-
MD5
a96f3c8a4732e01ed9139fdbef817dc9
-
SHA1
7ad92f061185fe5ed2135d2f658668771193a266
-
SHA256
38e1afae376f4d788d36cfc96e512174b95d3968215ddf90796d6a90fdd2fee9
-
SHA512
d0e06ff1258eef9e7b012c5b33db9bc6d0221d08efa02b5c09b4df99502a5543de41f77b37e15046dbfbbb68f13e449980f08d40d409ee5795ef134fd79bc1e1
-
SSDEEP
96:SYYJZqgZSZl4Nd9YtZwXyZOlZNjxkNKdbz1Qa6JUxdfR5:SNhTdCaVx5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8AB66421-5DDC-11EF-8650-76B5B9884319} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000292a27e2ba284c13f31a578bbf155e200728d0e4e5a890727460a173c79d308f000000000e800000000200002000000025060fa81e7dfad45e3062c9363db9a7fe7ea6d1005f54cc87a1957c3512ac80200000004bb8f6f9e140c0765ae321378cbaac30d7999b231a9b7b1bf94cdc93b8816dea40000000c7fa2569c143e7dd7334139872fbe991af80f7c1a18960298f0fe71b03c52236147324d9a377560242f1945426fcfd89da9513b295687ab56584d3663f308e31 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0739262e9f1da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430200595" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 840 IEXPLORE.EXE 840 IEXPLORE.EXE 840 IEXPLORE.EXE 840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 840 2280 iexplore.exe 30 PID 2280 wrote to memory of 840 2280 iexplore.exe 30 PID 2280 wrote to memory of 840 2280 iexplore.exe 30 PID 2280 wrote to memory of 840 2280 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a96f3c8a4732e01ed9139fdbef817dc9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b268f09c6d1f3b02e0e41e84bbefb2
SHA1d5dbb70476fceb0b0b6c4880977bf2405b4df0ea
SHA25619f91c6b32f83aab13ad141d1a631394675cf461f4c079372c1570dc45bb6bba
SHA512201b3e1db9d089f87e7675ecbdd780c348a0bba0897a9b5366fa07d7488a499beea94f9768471c4664e6b484e5f5fdb115916d71f05f2996ea9784b40ac93058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0cc1626e79da38970702229f8d0e92a
SHA1dc950fc0dcf55f65a1813c61f911a63ef4dcfa9c
SHA256d20d4ec0f5fa4e70e316a1212735285cac7d9c3f3fd1567c5a637aa6058fdf94
SHA5122ee6b31deac8f21ebc67937b960f8221d5f871f261c17a22b42a2fece9d82f62ced6721da27e122e9e940a041ef5e3a9a87d32f1d06da15d37d0c9fa30941b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efce6cce75332193c4d5466b8ea4b226
SHA1fcbc90e2ee942942b2e2bc491cc8b94ed8572597
SHA256447d9a7d33f7e6335dd35bb41dedda03aaa96e7fab8a495f8828aa57ecb433bc
SHA512edc03ee9bebe6c8125482e84796602f55f9c71030310ec7836e088d1fcbf9e79fdc275c53f16e68d4ee13681efb25eec559701fa7e0ee7713879b205f99b8736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aa37b0548b2159dd3214edbade73044
SHA1421f9496bbcee940d40a76ef593013e89c1b096d
SHA256ba12d9450052d3ce99fe30092a39ff07d5cc428177d786b03c3ad638bea2f820
SHA512570bdc333a9c41c77a797176183d31a2ce9b8ddd1802df2feeee00caf72fdaab3415effa46beca72f3a40a0466c1796f7464eb40b36d7ffa0bfad6a5d048532c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8ff20f3ab06add64d05f8e13b32e9a3
SHA18d1600e0083ea7a8a4d8d56a656bc332140adfb8
SHA25686251716a995439ce892a9ce93157889056e8e8eb440a31026cad51b01d48be1
SHA512c9b3d7f78b5e84c00f4790a59a5ad87f0477fba2c0a6391704859d2772d258ee46d3dcc496cd069162fea9879a6644edd64db902d70940399422f820ac686e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502a37a34a227a60fe5f02aab848e9f2b
SHA16581e78ca1ebe3f1eb9e3a22dc0d73d0e0e2617d
SHA256b3ec5c9844c859aa906a276326800d1baa8a3ffb54e7b532fdb72c8210564ade
SHA51283fec993442c18bd943bed2d4df5f90ac2dc76208655fe0222d169bd1c72413dc3e70a3ae5bf53915825cf01179da1f3eb2ec0d1297ce850fb6025bee63034c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f976a24afcb1c933cf310368a2c64c4
SHA1d19c9b9266f0670a94f2acaa51c24c91fffbb020
SHA2563069f458ef4c8f3620c1666bf8c9f6d3ad14a3eded15dad594bcc41b7921bd34
SHA5126d6661722d9dc16e520e4bbd2fbef660ab3b7a247a9dfe5b6f49f8eea58d93331d411403687babda2b64fd96873eba9c1ea0942673fdb3fb23fa024685ddb5f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519ea2e4fc8fd380647fe35ad0d548511
SHA1c6f07854ec01c05a5a52c74b57ea106de2092afe
SHA2568368a3169433fb5904a963a4d90b23ac0e82bfc462bf931c9cab874a39a70b69
SHA512ffb81ba32ef58b8d4601068e83eee6a3abe3cd787a9564e62292f216ca686c23877b5f6d76b224e65ccecc493fd5402fa5c9a746573871d26a4b2a7b07246e85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cecba1ff0565dae801133e5eefe7dc4d
SHA1db9002737c0d0c999f9d5d07901f5cf5efc9f10f
SHA256328dabc568ca0d9b3af53c2d5103e14380ca6bc7d40be4b94c1a2645fceb1217
SHA512242c4acafb57ac8d2f0b7b2dbc9b878d6dfa604228efc75f5e4dc338567820bf334a8270638a4f7d947da4e157713323bd1d636320dcabac4ac2ae8465681abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f64099669f29d477c5f1ea1e4e69b76
SHA1ff990986aaa3bf9a41c524b7136e21a8aecdd94a
SHA256666a316d12e0055fbe94e58c0740104d0bcb316ed3a19cd0cafb5213b5fbdbb9
SHA51213aec89b5c24c0ae8abe72f63bd1c992c91203cc6e4b6f1603646d6801a26b6f3c589d5d1b94db0e243c167aa90a7baaadaa92a3ce81c815454cda4ed4697ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b986c6432af598d6b45e61ab384741a
SHA154bb280fd440004d72262052b708b327a9c6ff0d
SHA2568f49165803d777ae0d76cb27616ee80bbc534373b515632013e69b6547bb8978
SHA512fb797f2f894a7a00644d3a2862e4f4e7aa8acd839c0a5e485a017c55b9a197aeb61151e6c4e0ab012295f962f3139df681148ba1d2a69e74111dc16cb4b9b74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d9d6ca7a02dd721047fdc25735a6d30
SHA15d3c27d99a13921505bd5b5ecd03e2c6955f2cfb
SHA25617a052fd7376da98a4dae5d96a3680c4f23a7c2798b2eecaf8e859446cca9bdc
SHA51245ed424daac2d9b52e79e1b2210e7c54029914975afac9ad0e962d5c05e05d080d7d7091026246c435e993de9e8532ad0b138338a3f9417f24b9497be22cedd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58facb32278c3785674ec705d5d029d76
SHA10d00ac4306dc879f420b8c9d9c493519904af8c0
SHA25678bcf93b7733e02debe0471251a72d155bfb779e80dd2f93ddcd56b69b51e904
SHA512d1df8e8c1b93bbc33ac5034584f3b8b5d637c00f08a70105bfe3357237e69fb760584d37e2a097e03890740fb995b0f6b3e8d83075a3c11410198466a5fb2da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52021dfa720cd3070cee676f317d1b3c0
SHA1989006215b43873eeb65782e45e0e9269710656d
SHA256b98961f2356a26c62ccba8d4a0fd6ba887fb20f1c8743bf071c52cc365eb5af8
SHA512e5c60a49092012159c861776ea6b824fbfc98bdb47c3ee8329dd038c428b4d3530dc2f6fd195d1008eb41c61bc5ba7f63e85355820e0a60f58e11fdda087102e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d79cd0de7908a205f31470b084daf263
SHA18da313b19c96d8271aaad63e24fb0a23dcf15a11
SHA256d23d06df347f61955d217df320562e9727af4bdc276169181fbb3655e1b3f407
SHA5122bf4efe83112905a19378fa51ea3da9bf17c3b5f365863973e5c5b961807efaa94e8c245d6709a6cf8601da9e1d2d5816eff36e231797b975ed5449d034f5533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d8a8b96bb8172220adc12177bd2f834
SHA1dcf88c645264cbbb286851e7586c706c7366d740
SHA2561f949a295706b2cd2c3bb1c8e9a2f6fcf346247aee1d49747fdfe4135c393f8a
SHA512b8854f9dd28cf6b70a0bac3efc8411f1085bf0f5c4ca6b51f74298a2988cb7358e31d544200583faabbd957abe31d7dd61bb0d38b024398e3b3173a7dddfd996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f97447630e225ba84ef8557bd513c412
SHA19b45bdcb66202da1a9637111841b7f3b77851310
SHA256277ef510a583c3e3d91453c41dfb0b1d1791a1d39f98038b10cc448572b052a4
SHA512b07a93ef2657705d27fabd119413d7d2610084d592843424b5d471706588438f8395487811ecfd4128de72911efc69eb8b5b9b1ace77509b26649622cbfe08a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590dcc8a9673c814cb7c15f2a66d19f68
SHA157e18bc53afcca6b1537e138950644bbe6241979
SHA256fd4a16648b40b604ecfb7c0eda88471a7a75f7bb6dc2a30d88392a426c426ef2
SHA512bac548657451c027896d4e4b1c4ee7ba5563d2e8b7769c1ececf68d231e743c79c8b5b909ab270ec27192c28a391e3a74b12b46a476938b8c3392f2ceffa0d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58058956a10013aa5b02b540f140d4e1b
SHA1fb1416d368848a80a9960ac4f41b96aef16c514d
SHA256539db3b3c21db263f7e73513d3b5888a31e57679c682dc71c05278b015d05121
SHA5120ccc081c15c964996458d3b8d31818b7c3845821a737dcc65ca2e2e35f40ff1595e99db1604e815740351bf5478445a5d1e47e19882f7fc4b408d70a338abb29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59889f2cbfdb672fabc82bcacb891f37e
SHA15c5726c0b8fd0f0d1aaf5f94faf010fa1bcbb695
SHA2560cf37cc545177c197d512f2619877b8f156724d977bc68a138224cdf8e43ba59
SHA512140eeea49f56c0a323466441695f7c58cdba08f6109f5e05c63233df0da44b74bf50e97831d8e5abeb6fe74ffea8c040eaf8e96d9d4db6bbe161eabd352ff2c7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b