Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
76441aab270456046fa9809a91b73e09_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
76441aab270456046fa9809a91b73e09_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
76441aab270456046fa9809a91b73e09_JaffaCakes118.html
-
Size
53KB
-
MD5
76441aab270456046fa9809a91b73e09
-
SHA1
d05e332fc7c11910e82ef0ce601c4e0853b16862
-
SHA256
c834203afa71396cf30312e799377807559b6ae4ceb81dc44a4083ba53a5df0e
-
SHA512
9124e8ce1c7cddf5691b90db85608886c458eaf923bba4a8ecfbbfc6fe7f9e7dc527e14050ee2b041cab21e471674fb10132cbbff94cdca800533dada299a8b8
-
SSDEEP
1536:CkgUiIakTqGivi+PyURrunlY363Nj+q5VyvR0w2AzTICbbyog/t9M/dNwIUTDmDM:CkgUiIakTqGivi+PyURrunlY363Nj+qN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1DE36AD1-4CA9-11EF-8B52-DA486F9A72E4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309770f5b5e0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000642f325aee8e616a3c51007f10fec4fb7292db27d4f966b0ebdf059921df3890000000000e8000000002000020000000f3f56bf46c6d4ecfebd61d12f96714a2f04247a6430c161a13140fdca8315cc7200000009736f07d4482b4659992800e704500f7d16e4f7b3733c6845c176958a2f389464000000035546d5c13312736eff5c6d23690d859aecd4e45a0fed335559f58b3596913a70fcdfdc4398223d372a63fd8b78fbae196f18241d78b8268458fc5e4b439d27d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428309338" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 448 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 448 iexplore.exe 448 iexplore.exe 1056 IEXPLORE.EXE 1056 IEXPLORE.EXE 1056 IEXPLORE.EXE 1056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 448 wrote to memory of 1056 448 iexplore.exe 29 PID 448 wrote to memory of 1056 448 iexplore.exe 29 PID 448 wrote to memory of 1056 448 iexplore.exe 29 PID 448 wrote to memory of 1056 448 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\76441aab270456046fa9809a91b73e09_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:448 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aab2f6106e430d1e2032014b860688d3
SHA1625240aadd76333d7678666995eef96abbd708f0
SHA256bdae6c1d4c34dfb404b79c105f2cd36ee67ee61a9acfd1dc746b30486f5a0a23
SHA5123f65177a0983b84bbdbb8d9c4a23fcc650dc5f56f55b4340ae8c466a91816a2120e650bd06821151ed4b555abe2469ff213dc33e3045509fcd0370b079e60a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceebf336e25631b225fad64568e6b2f0
SHA196fc7d9e2248cd6dfab179b5f97be6af6d9d7a25
SHA256ec52d8609a403f2600acd6eac6fb08e92d416f8494ef04182ba799fa4bdd6972
SHA51252d24091403fc7f946c6aa4e537f54029a676626ee57fdb7a6f46cce241dc5c5c9600df3c460e6b054ab56666400f39215b0e2c08ea2c99b346ba1df4a0cf83c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541fc563ea16413cbd6db789260163ab6
SHA13de09c650589fa7fcf91ae05b12807f344c91e86
SHA256a9d68b7f358c6826cf1491a47263f017f10d1bfda177b3090fbaabcf44c08256
SHA5123f59d4c2f7d2a49344fb95cb6b80d7284ed8d0eb9cf4491554d5d7021c829ef72dad50a33f3e620afbf8ec87942c9fd2c2d47d0eecd7d0e387c397a80503cd1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c291ec6513dab352fd53120a126741ff
SHA1c6873b31fc26e0b1a4ab0dab585c70055ade930c
SHA256e53e35b06a264fffa1e8f3c84ee331045a0a0f54357ece8ba608040a64acd5db
SHA51286183c3d44098feea4c5f04fd8c7f571c49ebec8c422bb7d3c7cb9e8994e9cfddf73b80255e7fd5f1e403c0510eba2fdc6fb17736c8b7bfc7fa6f2b0b2fdc785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb0216352aefb7f93235de9ce0f8a3ab
SHA182b9d2548ba9079708714e7b9ca1372a3eab9562
SHA256e9eaa59e08c314bea6682b864f096dd33e456248a4970c29fa620d060ae35964
SHA512cb55e7b887dbfb47f0189421789352824aa12a9801cc771ff87806e8f39656ea6ca473d5c7e774ba6d6095bfe9e2e6c07d89d02e4ede2c09cd3103156f065042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5700e87aedf081886f843a5240e158d6b
SHA1470d753d7d589c42c050a08546e22b1093d88b54
SHA2560712298165fc66b65b1fb2c94f848222e88a3c96ce5004a886191ed31160a86e
SHA512dc02f4a919645b48e3833efa3c09d8a4f58c66ff2fbc2e0956b6a98f29bd2171d4ab73bc5ccc08fc7af9fb308628eaa119dc7cd644ecaf0cfb8f4c67f8acf8bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f00dda5cc2e3744e92068fdd233b410
SHA10541c3d3f2cec8b341da866fcc02f9fcfcf64ef7
SHA256720b7ec3a42f9589b349720798f8c43e41a9006819e3d00f9326dcaddda53cd1
SHA512cd10a1a0284f5058a7a67de7c9291f31df51fa56ff23aecc9e87220e8d0a6560d83ef693b84812093bbefd219d3c9a9fd210eff7530e4430095f0e47fdc344ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5516aaf240749c3833a295673713cb8d3
SHA1b9451cd54460dcea77a8831c9b983a26e2ddd84b
SHA2567a7c57238659aad98f3d300dc5aff4c917fd7a9cd36daa1aee9db1ecffeb08fb
SHA512fd666abc01904cf401c6be1c4d13161ddfd3e029ec60a0200dd1da9d3b95046b47a8e99b3a274ec890f9240c33df36268a3c1cc832687b35f5ee05099d0d44fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591814b12d0bf186a513aa44be4ef3d5c
SHA1163ef4eedd2aa128ff2afe5f56a2740fd18869dd
SHA2561963faf7ae31f0ecaf96bfe4fc17cfb46d9112c47c07770a9a3ea52fdc80b930
SHA51271f43a310076e6707e218d62cd2839d234c7a608b6f1763dae4c22ba4bb35b302b9d50e5d10069ba9a2c5746f75345c59f33e29b85d66569c646faf4cb5a3492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deed22a53f6664fe2b66bf17322b3b40
SHA1fd03c2e73ee7500a1c2b20a9fc5b402dc63eb5bb
SHA256985f2ce8bdb64dc56e4135883da82336b52d10a5566d6eb720d4d4e3a64ef9fa
SHA5120eb4c8ac8d0292a90d6b35d85d8d5c999fb48794a25936b076a80217ba81b541543ca6355890a8aec92965f167964fd4665c69de2126a25d621ce10b89c20ed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ac7db6951a328c1181d9fcdf6aad54d
SHA1cf18e46a4ebe7953a5764fbb0b9a220b9e90dc43
SHA2565ec34d3e53d77118f71cf6179b01ccd44b07a93aa42394f607319bf3e8bff48f
SHA51272c133f7a9a7a32356fac55330f6222161dbd59886d64b2811de1c29e47f7758f4aa718461c54a18925dd041e6ea59288553431e4bf189afec7f16345498fa75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5306226d6db1244146b77c068460f69c7
SHA1bb81631f1dca422dafb3bb23873d0786b6e36e63
SHA25690b0df4fc6e6dd48783b4bf981d4504a0f30a65071d9768e416044aeb6fdca0b
SHA5127582e092e4ce3db4f5bf227c0abc9281484cc0a6bab5bae69a842b23b262ecff4af3e71b8eba755e5ab011d48bd03e2c67e897f47b92c37953a5750e33234637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5359cfb9f1302999755c4b7db18bd3ec9
SHA1f25f078dab96bffdb676a22143b13a79e8e5642f
SHA2560ca176b069f5f02304de5ee80b052e9a4eae15c7eb9cc2465ed0a9654ae38162
SHA512589bf491e31b9019aa3dae4e533eb18152ae671608e090738a7532766b98ca67793e356e46d3105c2ae8b007a460a483f7a64c318e96ac6b098b1c95394e0b24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564aeb8a2fa12f3f646a92736372e45ea
SHA15f4d68cae1436dada790aa7736f02946dd9e8bd7
SHA256a77ce2cb282652e9dade3de7d45cce11b4ea4f314e4ed0b09d06d5350df02ca4
SHA5125d21dd02628c5e4b6f18862f1450cbb0cb09ce97341bfcbda2f88c6801e29ac0a76ae00d1c4c90fc1bf973ba432a49b84e846a4e1248076da9c7aeb183d395cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f6bbd5b0e16b3275d123bc7e7203fc5
SHA1b60402ca38be8f18c3855a2c6360cdc5edbe1408
SHA2560561ab6320ae06f35203209d424716165b4c02266c6f4778d0177e45cb0fac0a
SHA512011e93317f71030c795bc4edc4198bdac9f47eb8393e79bd8a867977ffbda817d6368aa96555da4bd1ff914e684ab19f0736a8432bd37ebbb148558b86f59356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b56c01c6355c6a15bced41b04a83ac41
SHA1be30850a8d06d5e562984cbd813a8698a072d639
SHA256b0548b7b685eb495b7b8cfc38cf8394d789fd0fa7b9fac9e943b98598d1cf772
SHA5121529f5f919ccda67e7024cf63d17f03f6c4ff9b246d11b2b157629a43b3fab33e7b40bbdf4729d1215d92d8e8ad3829f3c1db4d39f299a93563fc6b09416456a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e37325982d14d725908649d04727d715
SHA1a4c36c151b88274682ed5fabb223fca5b6201eab
SHA2561e3f8d87d14daa90c8e5ac066015fd8ec837a76ba37ddce7eff8a81fea7a336f
SHA51279146357fe1dd9b3d4fe1b802a5cedffa1119a0ba16a70377d1c93b4576689ab593184d2d7542be3521f51109bd31e7a40be1aea46fd90b8a9f30fa6d9af8871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5923405b23277879c197e1390a9b94b32
SHA137f83ada81c0a2de6a4d9ed1eb6fe092c5b6fe90
SHA2563aaac30a60e0fea1ce80977c57be83ff18b6ea89c813a244dd3bcfc0a406fe73
SHA512bce4a398e1b8365060a455f86ffc75a19a94d27e80a9fdba6d27332c1dad0132ef296fe537703ab58e651fcefc179e1f98d0406d7bc7ea58f716e8057d83d0ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54481707a29cf54227d151475f3caf747
SHA1a7202185a27ebb5b69d9358f62fb7f99cc1a995c
SHA256468872416b536184ace23ee506ae2e35699960b3a180f3348259feeb50080d46
SHA51215bbfbbe603421f210455fd7e0563f7803fb17667729d7b3fe568e12e391a9a3f8508fe1eb5a995e57cf40094301d5e9532f20a15dac6283273c3c38d2aeaba6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5J67VDZD\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b