Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
e9e9da43f334773383c000bd8c41f8b5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9e9da43f334773383c000bd8c41f8b5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9e9da43f334773383c000bd8c41f8b5_JaffaCakes118.html
-
Size
53KB
-
MD5
e9e9da43f334773383c000bd8c41f8b5
-
SHA1
5e7a4a49922c027e57594aed7247d7ff0ad0f4ae
-
SHA256
455475cf055f495d9be457a7b90cc8ae78e950b80e86b9a49f66d2d9db25be44
-
SHA512
b7a5992547b46fccc8fc8b427a7bec430d8c88f6e41403af3f8b0d2344a6d3cf3ee6a53dd07ba51b83125669783474227bd6688e203599f0cbf99c9146e5d102
-
SSDEEP
1536:CkgUiIakTqGivi+PyUTrunlY163Nj+q5VyvR0w2AzTICbb7om/t9M/dNwIUTDmDd:CkgUiIakTqGivi+PyUTrunlY163Nj+q1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000000d9df592903a066f2497f6fc5ac5a7b95c1733688f15296b2af79d1db7212d96000000000e8000000002000020000000d07cad0aee29083703945068b580d9c6be3462072c028279d89de17312445697200000000b8616ab274ba01de087a04ff332c79ceb28b8308f05bcbe3af4958801942bf640000000e65d4f98ea6067d9d0bedc775adb900a586dbb7c27cad057f062c5f5d7940bf3ac5a2817a926538ea226445fdac404af4efa696c631e53632561272856df00bd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432853026" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36C4A4C1-75FC-11EF-B2BA-D686196AC2C0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705b1d0e090adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1800 iexplore.exe 1800 iexplore.exe 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2588 1800 iexplore.exe 30 PID 1800 wrote to memory of 2588 1800 iexplore.exe 30 PID 1800 wrote to memory of 2588 1800 iexplore.exe 30 PID 1800 wrote to memory of 2588 1800 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9e9da43f334773383c000bd8c41f8b5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1800 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518f0487e8ab012b173003c1130547dda
SHA19a34bdd431138cac20d10423c5742511ad939679
SHA256ddc2f26cadc41183ba376bfc7936bcbdfcacf5ddda3d573a3660c23d74acb872
SHA5124ea63dc307d29d61192a7be402615d006d18fa948abedc3690a53fbdb21c536b1c7aa31aa663725af83083c08af1f5f1ff9345636c594e500ca328fbb54e5933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d81c483d45b0a5b54ee19cd0b11f2bb9
SHA1d0b941cf4bd0cca6f02f21e3e54b5a7f27de38c3
SHA256b7c552a86e0c29dd57bf9894714fea92c0b55a49fe540d75c58e550ac7710f32
SHA512b08e67848357d2544e01b3aa488e6e410b76e989535ff9dbdf26ec229f0f33b34c50ce9d0c530a105ddf358a7d1f18c06b583571e0341c4686174f14766687c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee86d0626e28beb7eafa55da649e7df9
SHA1168460662cca254646b9ddc329d9c0af20df1147
SHA256fdbbc52a638c547b0b8d8d3e0c7c37d7c77d66cd3a2f4c006e9a0ac84e5fc8a0
SHA5120bf6a30dcd0e5198d396dc5f93c457c2d6351b3dc6c297c71940f0cf46bce9d46f6996ea65e67199ac35a5e113aa113fea7554b9ef749ee61c6a720a2f3ce160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ee6fe87658ab5fc42f7976487511fd0
SHA1106bd8ec85d8531e3611f2f3c567b472e13ea1e0
SHA25622accf34519ea8cb9d40cf7d62fd48b26c8eda65a84c947a786f4e1d06e0c9d1
SHA51216c156fb6083f6f3ca93e2e8106be517f83fa8d3d36cbf6f92c0de264c8fdfcd2a639cd509a30247e1ab5f9c622ead3dfc4fc654afd03d23e2e66c7d704be046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c49377b35937b2d3ff6acccb01848d3
SHA19fbe8bd5587cd32c005763dd54e0e12db9e86d0f
SHA2560dca6e84c9f2af03613058272bd60b1e0c20045328a0318d8312c2f183200956
SHA51240061cbcb5e6795dde1d80ad6f6bb458de27fff1fe6f268f2b275e8a4503ddaf639e081683e67b52671e82d3281f3f6fa8ca03ba9026143bdb16a8a09146e116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e9a11aefae33da48fc60667947e5827
SHA1a86a4cf2643cc7dd4120e42911ce4468b48604de
SHA256691a66f006bd4fbad04625d08700a3e125ba68c9bb6559ebe2a39a4138165d38
SHA51291793723cff3c0f276f5d96e437163b48a72ef3181a27b2e5eb7f0a6d093a5736a2237f7c78b2474e78d0ec98c654b53d382924bfd77a7e5a9f85ee2934bab3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5906ff9734c6e3eecf9822ba639b6f811
SHA10ab12b972b540ae0f26a5f7d7fabedf1a40fb21c
SHA2560aaeea43eab94665e8516f7a8331d1003850e1b2b7e8615648de4a0883103739
SHA512eba2a2c8925a01c9547e3de00cad149e242fdc30b75a48dbb0df074de861cbee7e6fd7e01c8bcfc3f01b00c96284fabc92f2fa7f3ebe7dc36ce752c021f0cfdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f43d31cc482317a91a9ecfccf6ddb82
SHA1e36fc0037258f873feb6b1d35bf64af7507f6b37
SHA2566047021558d6677e23049357a9b1e7c38b42cbd083ea24ada42744a85a81fba6
SHA5129c06f71f2fdc061e19d758e74496676527405071c42f7bae1e881a326ebc9318c1347e5b33ce8f6cbb36d9c57a21348d65b2c02fbb9a8aa478fdfcf6ad829051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e57ac9c557730b8c5e3bd1dc5948e773
SHA1e812a22484f98e26849d690afd34867c44b593f4
SHA25683f73ea8fdcadddbc4f9a3c21cce9220853be2d3f356a6303e2b37152acca6b0
SHA5121a38d3d4bb92c717a2102fb3ecccd881a3986a48e62999977d2c730e7e511ed20a3586db75e148bb52d6f296a72cbe2e27fd371003273b867ff89806d9241cf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae60366f838631914a3318e8c60482b
SHA1217944c9950ae2020193ea732e2fea9e77c15232
SHA2562f006ab83a484925a2c29daa6b641ff126628bb0e21144e867c80ec1a7f0f3c5
SHA51227d96fdd8bba080bbc32837a5f306935ede2c748762627934a5dfee959e53d673149f458797450fe4b1bf09017d6584a9c1c8996294efe2c48e1a9ac56c6d971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f31adf25f7a091e27112dec551b74595
SHA1a8f749f086f89543ac96e1d477e102bf967f4502
SHA2566659cdb5f57339f95673a243830a8eb24f011ef81835baa6ecb0afe66a52ca26
SHA5122451ae7957008c6f2ab1fcb38bdb587e4cd8238e3aea800465ed2d911d81731bcb10fee47b627614041aa23d3ef7e2f9b7a323dde95d93def5e3d58b1ee2b04f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55093b46da9b1f2f679c803a8775c4cdf
SHA1644b0907033358aabc1de90bc1458e64a8109e7d
SHA256ce5c14621ad177c9cd1a5bad7b0b3bee70a06faf91990332cb8646ef8b7c762a
SHA512066d8b8ae4e005bf9fc85b2d1c85c566030dedf983936837ccebfc95f16a22f3c98a901bb13d622ae9f8c68b257742c88bed083b8fb90c648fe99b6128aa1823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510d96f84ef024519fc503f13512adad0
SHA1ea2dbcd33fce009a3db9766be8f9b99a5e67b9a9
SHA256ddd5c3173b4e8218006cb5ca135620281cd678a8821bad99bbbc97d8f3bbb8a9
SHA5127c37f0d4005ff6c5bf57dbcf13eefdc0aaf48eed05ca3c829c3af8f4e73ee08cd1059f39dde50662818f0e0139eb903a470d1cf48b1921f8e034d6a52f7bbfa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dcb72d2ddff893abefa4a2acaeeeb8d
SHA19624afddbd1dfdbed33227cd1d45970209427010
SHA256b7be202191a6bfe6ac2220e39f528500569fbdb340691095d3b56afcbdfe7e16
SHA512bc951cace4185cf3b29ee365084f3123d5eed6554c4639cc9526f676ecaadfce56fc078fc622f52afd65ef934f00e6da2607f376935880fc139e7b2348008dc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e12131fc14675967a91399708b47662f
SHA1dd378585369a146909dcbaeac35aa8cc325caac2
SHA256cf9f8681f3bf3d6b6ea6467c4fea5406822e751ea5f86b889c3c95e063b96cbe
SHA512092e321b9eed72dc792584b5d0d53ad0c46a4503da89d955f37967f81543fd28dd5ba87dc3b83ed83f38cdc5aca9cfe9217d8eeeeceec9cffe63264a99f93a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f3e24128299e69fa785de3605127e3c
SHA11ee75b259823259cfcc997097098ac85711f6690
SHA256a056ac1e96035f1746d9c849b734f360b204c5e57c7892655a430fd0e5d5228c
SHA5127716f3b7288372a44275608eccba0b7c288779460fb252266b78a09f759b2b437b58dd4be95b199eaca5ee33df8a3724d8a46239797ace4ddffc3d4eca91295e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e109c1efb842364d9c390c0339010101
SHA19fac1e0c684788f4546ddfdf180b7abacaf0e7bf
SHA25630a38972dbd62a8af8b26b5457131a1b02d4c957a8b4b49a818c15b345f22889
SHA512abd501b432b778c04f78bcf8ea00b842024cabcdd12c14e7f1f17b0e1d0810d88401dd5b303b0adc4b085cdc33f230fe15fabdca65abf9ffdf58a80a667f90b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a996cb3155fde270c8e6eb9d72676bab
SHA1ab9686720562168a3b7730f608cb45c3f356ecd2
SHA2562d611060483d44df9b690064171d29f89cb6062739aa01d68b2c49a79530d240
SHA512a4d4108a67a7e58d0d0c5db93571e677e7bf2a2e274dca865a9cb7fda9d65e0877bfd1fb78f4710e1b91745f187edfea29aa612df6fecb562c05108fd357d356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cef53aa252d0da433f549e87ca5bd833
SHA1c48f3240e7a9573589e96b9562c0848439c94ccd
SHA256b321080cc5c4f1a8428043247b7d20e23c16c13d49a6c3c468d90289cbf41d1d
SHA51262940bfdf7e7435ab2a306fafc3b9051730b8a2bc4c18e5b1ded28b995c323fe4cbf5043655abbc931d429999cc179699e132efdca0112da5268fa1e24d5118c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b