Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 00:18
Static task
static1
Behavioral task
behavioral1
Sample
2e58a98870ec7fa01db4c8085f66e030_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e58a98870ec7fa01db4c8085f66e030_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2e58a98870ec7fa01db4c8085f66e030_JaffaCakes118.html
-
Size
11KB
-
MD5
2e58a98870ec7fa01db4c8085f66e030
-
SHA1
8c3b980023d60634f543205eede2e3de2ab846fd
-
SHA256
c8f9f3dfd53272391810264da6178525fa18d7041b315310cfd9bf3bff5282c9
-
SHA512
6319f6720d1bf48d372d0fc4dc9f5cabccf2920ffb367384c42a5a8ce73eadad26fc1604411e84bc4ffd6df7c939d7bf052cbf640bb8ea4a56fbb50cd40dd8c1
-
SSDEEP
192:2ValIsr0r57MQxHT8A/w1wvqa1pmuBuLbdU8d:salIcIQQx7/ggpmguLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426667515" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000003ca87dcf0a96229259dfd0982c67379e1f9d85c6783e59ba69c20916a626fc0000000000e800000000200002000000053498b9eec5985844a0dcf4527a4dafe06d0b83ebaab8350dd47dc7230315af920000000660b49a5a8b22bb6af214b0e04cde34509a9edf524f3eb2da0a6b9f60415714940000000cd7ad70251e78716df389e08d311ac2c34ad80ee77fe1e9e3777c0f8b1636c7aee9b2b2b30f3e7ab5c7537cdb0742e632dfe9f9dab4d771b4550148e8957810c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{72EDC821-3DBA-11EF-8CEC-EE5017308107} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000bdfaec12d63e7ccd0e2859168587aa91d189471c198585f02accbb2eef7d2d6d000000000e800000000200002000000023607b50d184177dd0c906fb2d8fa23974623959f7a2d85f60f4229903a1cd1590000000a042f76422ad3f50ead9509805acbbff851374b1ca3fd6c41004ba42be09892f914f46ba896992fcd81def0170f07a526d0ad12b7159a44e30dbf4128224b15d7a7808755d289f2380a69597f2b8d241b2e2f47b0f658d60c9fa571c0d75f65dfdf6d94481fd39f9452ea80e2445991dc5d99903e3423e6f35b273f6045164827c6e35b54e21ac9d72f4c77e847b673d400000007951993fd4a0b6e4e60943e1518c023fdaef9f28a804117191b51e51922e289572372d917b116e776714986966c5e6704fe10ac692f2aef6fdd9fa5fcbcbf4d9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4058196fc7d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2776 iexplore.exe 2776 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2812 2776 iexplore.exe 30 PID 2776 wrote to memory of 2812 2776 iexplore.exe 30 PID 2776 wrote to memory of 2812 2776 iexplore.exe 30 PID 2776 wrote to memory of 2812 2776 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e58a98870ec7fa01db4c8085f66e030_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d42e8b30334b1c78ddf36bbb4d6266c
SHA141b7e64083b4d5c7d7c3965b0a4f5d790a091246
SHA256ddc44aad70135275ad606cadefd1dc5d5db89ac556b29a752003b9979c744301
SHA512d3deef72552d39103931b856754037cc7f2d0b4311a73789e17c3e1d132d30c3b9865dcc853d0837e8e028a03d86b9cfce2981c2309d362e1c3c1cd372d8f0f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507cdccd0cea2ea47dde5b5f9f05493dd
SHA17f3a474102f90e6aea99c569c2e031934c44084c
SHA256baee3afda194824fe5c2b6bf03e5d58ac4643185ad49fde715c62e1ca652116c
SHA512f3d79b069aaaca32809fc552573ec886e779961648a408d1ac76080c6a555cbdffa0114207869035c14273b00da60a3ca25ad86d4dd4d92718fc572207d9f4c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57177625dfb5f788f746aec0668fe3406
SHA1a45189400e8dd85fd5a93b19e2832fac2a4f31d7
SHA256c3a0aa521d01a3acff2fbe71c49abef147cc24ae47a375fc2a4de630de7c2cec
SHA512880ad0a07726a4d2d49dd2111c94d853655901981979b7b14483de13ff5c92ddfe7997a280044cad0df855a7ff3ec4e520b2145a8673d45c62c6b77cb50825c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e587d002114a35a674de7d3bb92bfd1
SHA1d1bf2f40aa05bf93fea9e80abb8f966924ce1767
SHA256e2c5bbf2c6840aa12a8c33055fec36f86bbb021272f6b9002786e2e02455f4a3
SHA5125698d77dc0eb1b823338a5e207ac82b1e418baa19384890ba7e2ca87e658044c62ca5aa35a17d47f6bdf7886ab426891319609b66686710d76928c383e78e078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a27946ddebb858fc5ca17c4443862f58
SHA1d970ec3ccfee59385818594d1109d8ecb3b47e79
SHA256f83e723e804ecd59d8c03f148998ad021c77c663db130ec8f66c828d602b0eca
SHA51237324218a5482608864ac29e171b9ff73e6413cab3a357e639bbc3718b936f4cd459b39dd96ea2b9de083720866b5097bd26077bd4ad5b627d18f0f0048811c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5056ffcf33a56947395da82a93b42ee7b
SHA11b5fa65e99efaab56b84ef74b7e8e2d92eed5f2a
SHA256a02419b0e40d92952fb0f750e1546d857d0e8181f6f8a8750c2ac5ce692902ac
SHA512d1d4633d02ce9973433051850d04a2724f40c0ba592efa8e5dd9166c4bd41271c8b59ab8d804b5d6612351e7100356291d4e6c20bdf357c1a14b04622aa08958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dedf98754a80c73f6830057f227630f
SHA12c5621c804fc7ec397ed0e4dcc202f080ede4720
SHA256f3581ac0c55a60dff2639f2a83647a63de7d79e711514a70c839a1128a454e55
SHA5124b35c1fef51cb2b996a226ab2852ae02e9ddc616ce2bfbf23624ec5d4a25d7d8fbfe94b727eb3319b7611a5c20a20e09be85ace18cca941bd1a2dcde6eb722e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fece352ffcb2100cef3523e663233a0
SHA1ec9d9dfd4882409d62e08627f8c5e08fb6827012
SHA256089595ad93bc15c81314a5de52733f932a632c8ce6c6fda77a168a3b778a0e4b
SHA5125f3a61e78c1d261021f6eecf2f888115a92fb50481d29077909e1569a5d06b92d536193b29101d11fefa5b0bcfdab3472237de747c9c7b4503d673d1c0a90dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5177f3597f32627c9339ee527a18c806a
SHA1317cc6e61b4edb38400844ba07cdaa506e1747af
SHA256b4d7f340adf9ba65b450c76d739b7b2ce02528334a4a3f1b92bf6d79a9b72f94
SHA512076b5827eb20fe74ee0444b0ae546cd4a8c6c1d2ed5f8ce606a265f38a967128ba4f7d84ce173f6e812b775f7c39cde5e2aa0959c2521210648600a6977c1052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51044a3b2a0ffabb6248ea23a5af74bb7
SHA12ef1b6bbf58bdb60c1a5de027966ec6ce0862f34
SHA2569841692b76bef8a1af86f0dc6df445b54af47128e4378a1aa412aa22428a1a80
SHA5123b1742b1db5bac0b12a11f6dfbd077ead2b168b29fb99042c2026f9eca07f8e9c19e950c13a2fcdcec309e1f0c8f66b9ab0129b60e34031868104dd9cdd4b686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51024678b54a5986efa5a484444ad5d7b
SHA13912610d82b778ec53a1223baecbe8493f986f33
SHA256a4fe6a423863af56479ecbbd3633d8878a192d63715ab6835d3a4924edc5533a
SHA51211eba3702afca758b68fb450a50aa91061e23253b858ded1766c7c10ec7a3d5bd3287f00914c2d338bd73d1e8b8ee4d834a8923b66565f74cf227c61e201e45d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532a3428d5b723f6d7f697f00d8060a62
SHA1e0b5453e2854d3df7ce6ff29d4619bfd40376b58
SHA25675bfda1498a5d2fcab090695205529f07a9a0a8e9c13e75b70ddfced4c4f6b65
SHA512af490db7525262ed9e72414d8822a3ecfd67e88ba0a31daf7b84dfb474abb5be770af576771c2aecf2eb010bb307cc8841700c98638f8c6235afde62f41e879a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e0ca9304ae266059fbc8caf8d656764
SHA1aff58937a6d3560210be7090a2b4087d76e90029
SHA256a83a18287b323941f9fb679bcfa0416e77c864e7deb7d3108f47fac4e029f1cd
SHA512e9d6e5dd433e7802b0ef509952e80d3326f173fc055457923371a27766f3272bf8f88cdc484f5c316b970cfe495c4c5e0815f3f16bc3e660c64ea03dda9dbe5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbfcacc4fb7bec5d6e0392555a648c30
SHA1f9080fe03789165d746cf9d3d3d04e1372bafb93
SHA256b237056c80b18b604281255c69a312b6162063674b0525929779ffd12a0fc914
SHA5121abebb33cfac3ff9841d150b17eeb3694b80609c8da42c6e177a31858c5ebb3efe69a92b8c49c1714a8ffb3686fbe0d45718ff7178678d29525116041bbc90f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc7501687c277bac6df2f0a579bb8640
SHA1dc03c6f04cb9cc1dc096af6560c28a7f47e276c8
SHA2560acbed06a443d5265af2e07803471476bcd950f6c2d77d40110b78c8d43eb334
SHA512c2f934b65e3beb6a39175e567c55300ca5df7f097709393738b452aebc61d8fb3168c0e09e89c65cbaed65b8c0e9b580315b21a4ff1082b36d61ed535acbf35f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570345b3f8ef77d54018bcc63ac69c136
SHA129f4806dd081787503821fcae71e217c884db2b2
SHA256ba184a2413fd2a9b884554e6839f95b08f0da6da17726e0db4d0f501105b877e
SHA5126840d15caf7b06a7e7583ebdf47b038c92636b864a8fe5861003453df01e8f7f35f0b5271d6d3f1458438bdbf2be194e0055b0cab2c97ba25691d2c09eba359a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b29d7f3a3418dcddb14d83e2fe71231e
SHA138df2693c606e424a1cc3da07e6b9b085a4b56bf
SHA2565acb474828be546b04b7106198fc3ab235349cf9324a32b7432fb1beea608da3
SHA512e997738ecd2003bb8f1ac73f89c88ad08f6eb2a4780d393537fd6bea06f4c081a2d30ffd81ebe0c68d9ba5537d97f11c2115d727903fbc18f08c578552ffff7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9d082d118f0f56bb0e2b0a0c13ec186
SHA1fb52ee809f9da7c4d61071d7b4526e2995bbe39e
SHA25638335af1fac4c5dbcf5a2c3a5869556549377aad28deb9e7bf0be41ac2ff09ec
SHA512948fe7cfc4c3225b3334161fd22d2a908260a51219fb56a3b0228454375a6e599c322c62c1aeb5d81102c0564eaaeb6de42bee9533c2c7803698766bdc190252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e123bf0a71cac710b55bbbd36eee1537
SHA1472dd3cc001412e0fc93a311fa651c962bfd7c6a
SHA256fcb59390f4c4f9625e6a1af4c5fcae9356f677a8d9e873b42b8c8fc3ed080e50
SHA51209c480937b2d8b5fec8c689a8472fcac87ee7042d615592ddfbe38b2777050dc42a686196d4e0a0d25ffe605d7abff4cff0d7c9b72493bd93c52dbe0e8949368
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b