Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
bae305a2eccd7b4b32c7e0897565a22d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bae305a2eccd7b4b32c7e0897565a22d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bae305a2eccd7b4b32c7e0897565a22d_JaffaCakes118.html
-
Size
122KB
-
MD5
bae305a2eccd7b4b32c7e0897565a22d
-
SHA1
23cfea664c359af46591201e9b37bccd6b625470
-
SHA256
61f2ea7bc521f9b7e9ad68c2db7d05a3b22683a4586a095ce526dc804e36af84
-
SHA512
d19987420963032b4abaa81d0f002e5b273ca63d3c3d3436592314378ca82e8f682f84637efd0fc454d1b39a7945e08b38f972ca427c411288dbff0f836d68b3
-
SSDEEP
1536:NxSyBqTqvaFXRswimeg4mulM5YrkhfKGL+1X4JW:qUAoaFXy5Dmul8YAQeE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000008e948521c81894b099e85283560fb28e73e3b764984d262cf084d7e45581efa5000000000e8000000002000020000000059f1c9e00e648ce8ff71fd90435221965272890e38e63167b1d9d90d0fe53e1900000004c704f86e86c3baf931a232622c53622640e6d8e99158c80f04ba3d6462b7bfa3f9a00ce276e9f974b45eb5b3ad6258c33dfd9ba47e6845e4b950fc10b008d8ef64d1170668712cdb80da4e9c71571a2570841fb15ac377aff3398b19bff4bcccf61d6250d8e8700dfa0136b4a5438c0876946ddaf61127f73a3ba5af317bbc2b508bbb1f84e19acb1886a4a7c2492ce400000005a2010600ff049433b7515d908d3d44ddf8a514daa9e39f7d2c51cfa0fe9f6484e5b6561d7a0276595bf046da714ab021f7b8cd26c1ff1b94794e9cfcc5f457a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00e407bc30f5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA9EB111-6123-11EF-BBF7-D6EBA8958965} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430561050" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000feacd50b0319ec833f89cad2ff389e521bc182eba008741239f03ed644d13453000000000e8000000002000020000000c4d153fcc707270ccc83ee2b70b4fb76179e0e8b3877b3a37a78b31ce65a7ff4200000006231e9d24733ba0f5e128c8ed99fb04c5294ecf4674b161c2e2c459ce41fab43400000009d9f61310563118f9ea58631287a2818b89b2d48918c13fd4faff89bb45d445cef2d17ea25e0f90c154dfb0393d375f98ec71085a04d767008efd48e9a3275f8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2032 iexplore.exe 2032 iexplore.exe 1304 IEXPLORE.EXE 1304 IEXPLORE.EXE 1304 IEXPLORE.EXE 1304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1304 2032 iexplore.exe 31 PID 2032 wrote to memory of 1304 2032 iexplore.exe 31 PID 2032 wrote to memory of 1304 2032 iexplore.exe 31 PID 2032 wrote to memory of 1304 2032 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bae305a2eccd7b4b32c7e0897565a22d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51aa266752709bd07b7ccea567463b580
SHA12f4a3133eb02713bf72442a0c442b19fa02a7178
SHA2565d373e60f5cb93c7a3cd5c64e4a61aec4201dfff6f600e0c608c8759b5a99eb2
SHA512f924afd0146d7a62c56861e67ba45160326bec26ae580c9e7b910bb6aa88f7f132b4d0a56ac0e8f558f5c256fc2889a7193d2d4caac2b88c7ad56b53419e1699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD528e6f77d087670196d7569620c3088c1
SHA12875e797ab1aee5d1234d9a948e031e9ec5f7095
SHA256c7817105ce41351749a1ad47a6569fc37a5c81d385227d6419225a0a1757df76
SHA51285e35a4a4dbdc927ac5b6ec995f3b814f3c515d5fcaab529f40dda67362948075b365e68e67a47f8bfe08e69c3e45c5f5aaddaadc2a19b9ad00b0246760ea85a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57c077c9249eb2f6f7d040c16746e2613
SHA1e4753a46541b1900a7a2d5be06c9c997e53ba113
SHA256a2f41866659cec9190038043f57531988d89916ae2eddca4bcb3bd7ccff87d24
SHA512254491a3be27654699abe86d815a6a8a01d65b9e8a76781f1a4d87611e0298382b48e9fc59d5d3003458e278c5d69a05f334d23d7e1b723b152a277bce3f77dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5950189e2f03b6439c5e84f379e65fee8
SHA183b3a46f5592d990eebcc3073fb6e5924b933052
SHA2566b7481b006c1ea09cdc92272c08f8ef8422c7bdfa33676ea13ac6d3dd7071d10
SHA5129f234abf128c5d5857995a1ef5f6267a8d938ea0d4e59dc9cf6b6139827e7501b596090fd01bea8bec05800cb487a0033d2669a693d2a186e49eacb456766afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD548779121f90ed2a067fe7a628c88a173
SHA144e46c2ce2c9dc120e4ce1ed0b56f0a5f2c0a3cf
SHA25644392a6d2501830aee3eebb145f701d45969586f01f573914981c30647f1372a
SHA512a9608fa37f42d8f9f3cc075d0524732ee06de3de918e1ed69649e5e68a045b16aa674ac223923033873342a38a4cb6db12393365e5acaa25ba85252fae61e73e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56df889b5b56b67535b4cec5198aade1d
SHA169916bb9cfc55776a917073f4967be421559b63f
SHA256790d1524b6960790f547d73b5662bf3397b3f6c34ca6c36b76ee337290a10815
SHA51273b4cacebcced6096ef657590ac6492b1fb37c754047d5d01effd88a5b551ac902e8f8b44bf2fa7934996edef642154705bc72bec76861cd9ee1372ace3953f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e0f701b32a3e618a9662b15dfa5a3289
SHA1671d30a90122ea6be23ba8887eaacb9eca40607c
SHA25652307f2f41c05e6f34b9f0118ba5e95379772ff5d5c06b1c0eb21e33922dfcc2
SHA512d45a3321b38e0915c2d3e47c53bf5418cbe3793fe37ca632c04526d3b7f579fd7e20bcca860dcb7f1a0007ab99900217410170de0ed5fbb166dcb29b5523df44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c26dffde157524309cd4130f506cbc91
SHA10ebdcd5ee906142193ffb7c6aa4b90770783e5f1
SHA2567d0479e54b76854595357597d1b03d0f7b718491a96387889b10ed02b528b7e0
SHA5123eccf8bd249475cfa40af700d21ce93eb76d9dbbc906b43943d6fce6c6ac2598ca83c71c6fd2c756a24d30a5750233e6eb7cb893b0034fb521303421d6f404f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dc1204e1cc7eb33ef6a41293e0f69351
SHA1603c9fd9de216398eb5646e95829a5663398c0de
SHA2565e6423802c5d2b5c16bf60e878bb3fc3809dd7c4121dc65512939d72227c2e15
SHA512792162036eff1b8126f96a585f12209e212c0081276f94fa5a8a6d6e26b5b95b1e7773fffcf20d8ef620e536e9d0e9ca2c75bbdf19657e82fa1c349eec151ece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c1a2813f9fe007d06d96b1fe996770e9
SHA154ba2a53b5bf6bbdedaa27f4963efffb90e76526
SHA256073829dfe70baf66790126ff6dc02ebe4e1f1da32f14db6d21ce6e56bd6b8bf8
SHA512cc4fe1ef16b49b05d83e6603c7eb36cbad488b27768085ef156e8861302c698810f0cb396ceadbc98bfb082cdce88ecf2f164729daea96f27b3a4a767957ae5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD596a44cdc4e1a49e06cc2f43b4b228f06
SHA1b6382078d9eff6bc6f61f0f02d22e62505ffaedc
SHA2561e3c26bd22d30c2400fddbd8ee84393c6bcb69cc153256641fe23ec8eb22bb8b
SHA512e674087b8b6b92d1aa9698e993bb1d5ba2390604380dc4ea127c3b97929dd7492bed78a41bf2c7efb8b7eb9b9324dba87dd962889f43ff9ef0483120784fb082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58f43bf0dc9bc69516f55d75221facf46
SHA1a354479138a60d15000532ff6be3c3617bcc9b75
SHA256e1f19b446daf8f0c7cb1d429d67cc5a8c4b70fe67cf416d4e8cc937ef5479e24
SHA512cd490982f17c8ac26ab287f6d19effac11b62cc7579481289ea9213e1a2df5e862031c3cbbddbd9a00554fdecd033161173cad9c9ec9e6fe365ceec136e7ba8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD551e5e5c29ac58031d37d6e5118b0a06c
SHA1a628629bf7bbecdc77c8b312e2f0bb20231d3229
SHA256fa0f94cdf8a677de65b75ffa2fdacbd432d7c23fd1bfd9b4d7b1ec9b962bbb8c
SHA512ec062f7122632fa159ebbfc40f9a5b16bcc6e5d2dc3b83c415f071caf1617807403fbafb98265869d0e517537fb63a21c014ee06740e62ba0f99be8efc6e68ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b8af27209b113a17c9814af26ccf8272
SHA101a655130ec97281e7b94e1470bc75316962ef6f
SHA256dbc5c16691d23a5750f9095527b7d254fd7be03f0f62282cf0517cc35da76374
SHA51245dab0525f409de4a8f87ac01fa889e97a077429e7d273b17bd116003856f3f3fc9561d6c6741358e25eacc88a07b4ece5ca25c191a19893b2a05602c8db68eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD535b889a853903a043c89e8c5d6a1724e
SHA140f2bb4a3e093e03f15daea261b0bb9f0215f262
SHA2569b38d98ab80f52bb7c210d1f3973186ada7f8199c73dcca0492b0a047430e851
SHA5125e2a021ca296cf7a94b447a92a1fdb35978b12a1c34e0f20f377e2f4ef3a097530471221977d155d386fe35be4ac39f5943dda20aef9e9d216f3ee38e4ed7a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53c58a8eaa662197f7bc19d184296d1f8
SHA17089f667cbc314b0fd3e517ad23dbe78c2eb0942
SHA2564b07dac9aef2c1cc40e5e10eb5f7a9786dd82ce6160dc38c53b78b7c280ab20e
SHA5124e3522c8ebfd62cbf37c0fb76ee30ead5cb5faa3c60e5eeead933a8b3b1d7820a7be5d0ab32dde93fe16d81630ff36142d6fa5c4a79d91d176c74d3e51ee35a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5db4d74faf8b49ffeaf87e44229f22c20
SHA1ad28e79b0f9e84d7d89100915128c9e9e5741b33
SHA256428180cf27f6a115b361c269979dc3f6daf7f6d0999acb753c02b96f1de8d938
SHA51270d45c8858e1085dd1b7f3b7c609e222797acb73ac709ba220b5e707d6ca9ee66a021bbf31299e1662daba169c7f66a3ddcf33c3c517d785dd8a1435859448aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52e6974bc061a9516a143ccfbb44998b7
SHA1f316b9b63d866a4bd88a665afd47acceff0daf92
SHA256d2bdd91c28d8f677e7ac0bcd541bab213c73e8db3e3bd6a5ba7ca94eae7be7ef
SHA51227fdc2aafd2e59a6213177cdc767d1442391c80fcfbf0ba9b4d23c74efbd03263f03e93d5fd70050aaee90e3ebed7f52b1031fcc025380a0cd3bb10dd4ebdc91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54bab540fcc07bd91cee74eeac08f3fd2
SHA11eef02d513205ed326e74feb4eb7b4c35ccfc56a
SHA2564b97691c53be72becd5562fe9c70164e12142d30ae1edef0f03a678f13022aae
SHA51259e98ad471486d55c7d243e2ba4e9cfecc6534d1a4130f1e35bb18ce2e8f6c829b637332f25253ce72886c60a24514bf20b3cf3c2a3328972f3ee755948a60d2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b