Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
0e3299a6835045f628f97f13f2ed9416_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e3299a6835045f628f97f13f2ed9416_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0e3299a6835045f628f97f13f2ed9416_JaffaCakes118.html
-
Size
175KB
-
MD5
0e3299a6835045f628f97f13f2ed9416
-
SHA1
8068ef4ad4eb703623e0a85311a7c0e19864c627
-
SHA256
567f7eeb06e59f1ae7e3e1a50f6052902d0904c7b629fdd8b96b799d55b79986
-
SHA512
9371dbeb463b358a9d9ceca69e2eed36434f7acc245b25e332b4cb9d72f279a0441a2f9c8fd40ed191aad62c9ae12b0fdc40f59fe35ce5afc2bb40672ae78640
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS30GNkFMYfBCJis5+aeTH+WK/Lf1/hmnVSV:S4oT30/FpBCJi5m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 2028 msedge.exe 2028 msedge.exe 5064 identity_helper.exe 5064 identity_helper.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2028 wrote to memory of 3600 2028 msedge.exe 84 PID 2028 wrote to memory of 3600 2028 msedge.exe 84 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4656 2028 msedge.exe 85 PID 2028 wrote to memory of 4984 2028 msedge.exe 86 PID 2028 wrote to memory of 4984 2028 msedge.exe 86 PID 2028 wrote to memory of 400 2028 msedge.exe 87 PID 2028 wrote to memory of 400 2028 msedge.exe 87 PID 2028 wrote to memory of 400 2028 msedge.exe 87 PID 2028 wrote to memory of 400 2028 msedge.exe 87 PID 2028 wrote to memory of 400 2028 msedge.exe 87 PID 2028 wrote to memory of 400 2028 msedge.exe 87 PID 2028 wrote to memory of 400 2028 msedge.exe 87 PID 2028 wrote to memory of 400 2028 msedge.exe 87 PID 2028 wrote to memory of 400 2028 msedge.exe 87 PID 2028 wrote to memory of 400 2028 msedge.exe 87 PID 2028 wrote to memory of 400 2028 msedge.exe 87 PID 2028 wrote to memory of 400 2028 msedge.exe 87 PID 2028 wrote to memory of 400 2028 msedge.exe 87 PID 2028 wrote to memory of 400 2028 msedge.exe 87 PID 2028 wrote to memory of 400 2028 msedge.exe 87 PID 2028 wrote to memory of 400 2028 msedge.exe 87 PID 2028 wrote to memory of 400 2028 msedge.exe 87 PID 2028 wrote to memory of 400 2028 msedge.exe 87 PID 2028 wrote to memory of 400 2028 msedge.exe 87 PID 2028 wrote to memory of 400 2028 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0e3299a6835045f628f97f13f2ed9416_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff891ea46f8,0x7ff891ea4708,0x7ff891ea47182⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,15690214608698710480,17759789657453968394,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,15690214608698710480,17759789657453968394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,15690214608698710480,17759789657453968394,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15690214608698710480,17759789657453968394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15690214608698710480,17759789657453968394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15690214608698710480,17759789657453968394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15690214608698710480,17759789657453968394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15690214608698710480,17759789657453968394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15690214608698710480,17759789657453968394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,15690214608698710480,17759789657453968394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5904 /prefetch:82⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,15690214608698710480,17759789657453968394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5904 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15690214608698710480,17759789657453968394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15690214608698710480,17759789657453968394,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15690214608698710480,17759789657453968394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15690214608698710480,17759789657453968394,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,15690214608698710480,17759789657453968394,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3480 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD52d1fd5ae3ac8a53df48bc536e7933397
SHA1fa4c96497b4a5821734b19eb14f68e00a9aa9899
SHA25601707fda5d0780cd88f6563c2ba234a0ccb74a14b570fbe4d7cbb7da9bab2616
SHA512f3f54bc5fd94705bf9bd32c1ca9d8c9ab2e4874d7feb266569b2cc726d8cbd3cbbe90d91966d6df4be83d00970d88074e8deceb9f54a9a37409f10cfb716ff17
-
Filesize
2KB
MD583dd87a17f19f6f1024e02c2d970a341
SHA173a51f01f02cf236e9f1097b5c4c64cb380cc44a
SHA25652215663d8d5ce131ea7340ec20940a75b0520c19d62c616ce88eabd86718022
SHA51280b81b081210205b434eb8d53d12d6e711160ad63a39d44689b449b2d5d8dff6cdfe239fa7df3deca5e97425ceaf5a5b8f360bbd3708f4d495d7e218639a1bbb
-
Filesize
2KB
MD50df681d076bc0b52cf837ef8d5a5a4e5
SHA1cd393c63cf174cedfcb174b11a487eb545ae3089
SHA25654ddd4a6949c78c9bb26496afbd97f3f7278cf99bf070ec8f7fd7df65c51a4ae
SHA512852f6979c766b0ee7efca1ce3408aa29a5254a96cbe6b0e94f840a30df4bf508785f23148a237893a66e0bce6d3e52a7429b4d566824d4a236ede6287b4374af
-
Filesize
5KB
MD58b70c135279a89d704777986d0afdfe1
SHA1f61bc68e2dc4f217bc678ee4346046fc49deed73
SHA256157a3361423cd57fe60565ebce1238eae56cdc0dcc44eacd6d282da00dfaa819
SHA5128c82aa82fe3d8ed318de67ac146d2e674da82d9bbc7a263683242e89944cdcef32017816e88a44fcd437d7a74b15aa849b2f159ccd1ae1111b6cf932d4b83354
-
Filesize
7KB
MD50ec37997a1bc9f40704ad757fb676b71
SHA1cbd47d719bc26e6282eccc64b3126aad998abec6
SHA2564a749acd548e53bb7d8077629757c9e662a949262247ddc9ea5c808bac1a4f00
SHA51260a308f6df2e410ce4c910e226322f6abf758fec9451c3e8f3227ae5b0c13286aaca4f4b6ca9b3d2f80553beb06eab9958539c7846ecd44c94f599e66745f150
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51027b1c44debcf63d71798e5e0d193d0
SHA1c9d82afacaf5018066244a8afd4ec72811e65d8b
SHA256886d1ef9ae3b2e94991f8ce23b78155b7d4af5e7c138e6785b34ca577761946b
SHA5123d72012e0049499528b7b8bd5a16467d9912e6f4cb01571780410b9e895d6ff4f7a66aa4c4045a1625075b90463212dab44d610a0d686d75916a857da334f02b