Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 09:06
Static task
static1
Behavioral task
behavioral1
Sample
4574eb2a6d7a72aa41d7f2fa0c7ff045_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4574eb2a6d7a72aa41d7f2fa0c7ff045_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4574eb2a6d7a72aa41d7f2fa0c7ff045_JaffaCakes118.html
-
Size
462KB
-
MD5
4574eb2a6d7a72aa41d7f2fa0c7ff045
-
SHA1
537afefaf7026ae908c05ead959a8ae4215ea370
-
SHA256
3858b100b099ce332bdae0ee844c6fdc0c51f5ea63e6a1db08995e90be7beba6
-
SHA512
999cc0df3a08897dd0e9c93872ab89e00a714de79ba4c12f29b875a07069de8fad0928fe1e5e77818b22a74982ae7b429fc21d508a6ead945eff22901d8c69d9
-
SSDEEP
6144:SgsMYod+X3oI+Yh0sMYod+X3oI+YFsMYod+X3oI+YLsMYod+X3oI+YQ:f5d+X3jC5d+X3D5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a1c5e3806973dc4ebcbbba32771dfab000000000020000000000106600000001000020000000878b1fd70f0a79c3be8ce315796b7edd3557e1e0e45cb1bb4e9079351ca78315000000000e800000000200002000000058eeed4b4bdd27f902858377e95bf79b49684dcb8311a212f5bdd5b1717b130590000000861afbfa5006653179c7819ac64775c86a8d1ef041913def1e4d0269b7847f49a3e11e4638091391f8a5fc88a7ab9ea832aae72470ebb76f2bc566e9bf1d4188fb524d62f4810c2c3f72b51ee6698d7e4bee4002837dc5043d56205cbb6a2d173fec069678c5db3790fc136252110f0973f04829566442d6421d36b1d8da2f33cd50cef9d86bb360ad513dd79ef2c90d40000000c68bc7ec255e052d7d494810b3573ff0ebd072ba55f89cc855a5c8c3163ccfca55cdd239c802175b914ae86b00b0f3888d69eaac4f65c668ec1405f72e22bb1b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30c38633a7a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a1c5e3806973dc4ebcbbba32771dfab0000000000200000000001066000000010000200000007648e4f415dc49b48bb73c5ab0c4c5cf4d3d8b3131889662f4087839bb34ee66000000000e80000000020000200000000c0f571891ad1e3faa3d07d678187bead85f5b613ca4e3e0a0f36958c13f8ab7200000001120e5c92d65ff464fc5125d0231a1936083e66d55831166f10306690b14f77f40000000b7dc298d4cf37fcac5e525e9f80e5011808365d7b37b56ff1f95cdc7dbc6c9440942f0a8e217b4751df4c7cf2b35f93d91e4dc1399dbfdbaf4422e00c645a3db iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B036761-129A-11EF-8FD2-F6A6C85E5F4F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421925831" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2112 2916 iexplore.exe 28 PID 2916 wrote to memory of 2112 2916 iexplore.exe 28 PID 2916 wrote to memory of 2112 2916 iexplore.exe 28 PID 2916 wrote to memory of 2112 2916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4574eb2a6d7a72aa41d7f2fa0c7ff045_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bba21acd18b27502dc71872c13800aa
SHA133eae14a78067d1ba2fffcb9b5fef4453ce6ffbe
SHA256c698b1847d0ee41a7ce179c53350ed02345c3f81bc7141f7cff88bfa10216aaf
SHA51219588c2820e4d2ad55bf3402a179d8a9134e0fb9953750894d59b31c851e89b18753bd1d7f0517acaa489609af55e5d935b9179aeccf95eb8bd6048f2ee01c05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fafb35ccc93a88bee394ddec9183d214
SHA1e7d5b6c99c67d06f64d99e41adbef85e1cc77c4e
SHA256497eca3675378910c792f47f635655177d935eef2a27fc48e8601da824517488
SHA512a80b226b8549bcc8e93a1bcb4def33fe5d6443d4b700df4e0a458149653e292145510a8dac4bee23f74364fe2e67d8a552cc118130adf4976cf4a6d23a012e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de3d0b222d187a44d3d3635ad3472292
SHA19b1ad9a829e0739d85cb73ecde7af0d2664b9f24
SHA2569da61ffc5f7efe3b20164b214e6542544b55d46db3c9e30a68ba65c026664a86
SHA512b3a52480b6a3dda5a08366ffe55b80b31277b7d9e53af057c4f46d2cc6ccff0fc847a825907a31d227b104b9def0f50e91dc7b1a4d091390a4e0e6196aa55c1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522c981e4804f34d5c3c997c24046da4d
SHA1f994f968f31b94bad235b7e7a9285b591d9a072d
SHA256a6e309f7f91fb2b5bb36c89439a68b9b95f9fff3fb0b5640121f706dd3e87849
SHA5126ed4e4e97ff984f0978139c38278da125e9a20ee2616ef8d8f66e77b52048f052f56398ac62ce7990bef2e73479cac4c0eac8f3ff19c062d127441313099e5c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5644444ac9a11fabc6fb7ee4e269577fc
SHA1cf33744a4d45c27b963b2713b578998ae7efbddd
SHA256076ed8e58e9701f6286b46dd1d4be524072771b71b64749e5c7df704857425bf
SHA5129cb14fc0203dc25571a90defb8dc9f8bfd90d11cdd5e4d9f3466c1876b00d1aa61bf7c18ae758512148bca15aee4a6b30d99f52323513ce830f7eec44b56d8c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6a15d56a4284a4fd88c2139c999e337
SHA1acf56b731a9f670fe34df65642deedfbd88e772f
SHA256d389d4f5872b742656c147d30925e76dd9082f7a5754314cb7a6d1a93667f1c0
SHA5126e888e1c7a8477a5fb65c2d2a0128a80a8a9e43aa5aec67dea0d5999517224c0197d3046a056ecc4e66465fedb6e1373ecd59dac6c764eec8016285d75a9c284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bac0a7e6440cf3e587c4275d0ea84829
SHA1215f9a5852a63e97470dea9e9c22c40ba14a0ada
SHA256b5b65364a26dc9f9104c1341dcb2e515e2f2108bcfe977be6d94fbac9d2a8280
SHA5126ee933cffeb5c7418b5fd51255f5d74ef167e126b8b24d8344e480a1df21b78dcfeeb75d90c4e34e04833ce0016474e67311658bc477abbb966907d503413b78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599b4fe12818204737e05352cb0b9b125
SHA180b6d2dba2077ac7af09a6ae40a481e20cdab714
SHA256914dc32d98088a4a5451811e721aadc28a9ecd3b2bf1e54dac95d4bc3d5db191
SHA51209b4f676d49c9d5a5befbd7d7a3cc146b93d7a29d2e961134baf2b8d9109edc6b2b2ac0e467b71fea168380fcf12c2675619d1eda7c1cf91fb5cee02614ae179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563e9bca89dbd47319734518e6c19803d
SHA1d3e7325fbab453ff312e68e27eee6e6a0d7867a4
SHA256c8c2bf3675bb411b7fe8f7d7a9c576ab1e6595e2a4c8e264c31f78f768141ba2
SHA51253b66907075bd3a705f4ae42e192cb37126efe339fa72e772678b117baddd7971e80fde10bb59b016238a5b3c6015e20ea4bc69bc9df9b87283b031dca7c3d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da5d037d2cd85761fd0919ed68071bcb
SHA1b36d20c5bd048944880c14c966ec693e91cffc95
SHA25699ac4da214dae0789f6ffd8ed53a6d77cdbdf90c308a25ee51eb41827b6f2051
SHA512b0e812a100eda244b85cdefb3fed98bb9d3c9e5f71f83df60dd6dc81a5bd14ac46ae1502f334ea879550051c29c60a1f824491d4c3709005a606d14bb1d865bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5e36959391665d77f6a4ab763de8f61
SHA1ab11be7ec04082794220c967b54da286e0f0970f
SHA256cd64af5e9b82aa671d33fe2f38a4c63a5b37e889e767c371926cad92112cecb2
SHA512d370078633d203527b41864167d27f532710512b99739579b3755a2b9ce8a5b5eaaa0b47b01ff77e93e4dd1dbea7b01ef3fc0df9cb6bbaa8fc0f114f3f0e31ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d345d7d25da102b6f71af461567f9a8
SHA143c1920c533aa06f0ec616ced6aba988888c5a5f
SHA25675c513b1829a1569fe5f454fd238ba58abce4441b751767734a5183cc1be1b2b
SHA5120d0ed55b9d8cc3c9427d154a8e0dc7c3cdb623f90b2efdef1534311620663aed78197e26923ff1f0663a4825caa8e2696f3c6f495ffa8c4e8a31d70dad84f98c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52be21be53ca98ac6af6a9e7a9e30113b
SHA101f9dcea046ff8c4ff932358afa6112009193332
SHA2567ddca25918c9c77316b94fe99d9c1d907ef6910725569dd1f81bce7f172c1e35
SHA512169d11b05d0e1245175e2dc808e59d7ea60e8c89f2dfdcb2d460e1004ca2ecb07a123186f6994656bca359179350380ab8407328237a33ea7243eb64637a011f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52455ee0d3c9fb564b8623d5c86fdef4c
SHA14d3f8efaf6681b8c51f3e0f0420f15219573b2b8
SHA2560cb4131440769d4c3f10365c286aacc0250dfe264d740ec1ab0239d15b12047e
SHA51259296ffb819285ab05489a15fa26b83b879acc926236c5629f5c7b8ba0b899c984ff69792b51f08da545f1c3f7a8aaa664d3e7247688425b8d33adde61b69e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9ee3634b35f98fb5234829ac1e97fbe
SHA198f54e0a00eb426b1b20facf7728ed60f06ca933
SHA2563572a2a6533a7aae4cf226c2253ff34ff78ab8642f23ad1ea61f4aab0269d0aa
SHA5125d6b263b771e62b9f903dfe455458cde9daafb780ea1032d94d20faa437060685351ab940f1484150bcdfec7c029a563f4b000d054660b311a1ecf4a8bcb0b86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca204244a95b40a4de2c7d4323d8315a
SHA1c15e60e554817cf27604a1449e2a4fbb62c55329
SHA256b3bc81543fdcc6f07073b901065ec5a1c20f2f443d8ba2b34607066af71b64b7
SHA512a89d1e9a193d6ada62987f85c4aadd92e024fb5ab567a3e4e7f276d22d0b4e610713a12ce9d0f72bb4191574ed204903fc8e66521e67dc1236c34d03bd0d3ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea41037b56ce98d6e72e41ea3d16fa2f
SHA1c977cf483918fcaffd3601854e00ca7c7c2a3384
SHA2565739518836d0862a0866674f074c7a06c2ca264072bb1de94587c177dde0d8ec
SHA51242004eb3a3fde88190ff3c48676782966a957e3afc300b2612ba58e9ddbdb667a7eadf6830f7e59448973b65af055d7ddfd2849d4000abed81c7b78ded265d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c764d0d358b4f0f63fb78589fa954e27
SHA12e169f3f3d720cb2dc59fddc840c844920e9703f
SHA256ac09db5620e34cb8e8c560f34f4ef77a9f21fa24fb2f7f42ac34755191f50a1c
SHA512f8e21f592e337f4f415b91f613ffc77ee7f7f50d91ef660ee16b208b2e4b21fbabe0c8411554093729981f9ab0037b17cd40db484249742f2881a3c2619063f1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a