Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 11:38
Static task
static1
Behavioral task
behavioral1
Sample
2eec7e1e827e9f572c5cb07395513a2f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2eec7e1e827e9f572c5cb07395513a2f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2eec7e1e827e9f572c5cb07395513a2f_JaffaCakes118.html
-
Size
175KB
-
MD5
2eec7e1e827e9f572c5cb07395513a2f
-
SHA1
aa6f58465b7c2adf25749afc8f51eda93608065a
-
SHA256
133f78092c7f2cb206ee9ab156f2d1c68520908d25304aa4f8dd7732b9897812
-
SHA512
b0600a4a1d815a21343e345c5985c3a1831fa26b4c9c2387ffd4d12779cb2aa940a4bf253c1ec5e48073e9e739cd51c90636982e9387d3218befe081d42fa135
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3AGNkFQYfBCJisT+aeTH+WK/Lf1/hmnVSV:SOoT3A/FFBCJibm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 412 msedge.exe 412 msedge.exe 4364 msedge.exe 4364 msedge.exe 1732 identity_helper.exe 1732 identity_helper.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4364 wrote to memory of 5092 4364 msedge.exe 82 PID 4364 wrote to memory of 5092 4364 msedge.exe 82 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 1952 4364 msedge.exe 84 PID 4364 wrote to memory of 412 4364 msedge.exe 85 PID 4364 wrote to memory of 412 4364 msedge.exe 85 PID 4364 wrote to memory of 1064 4364 msedge.exe 86 PID 4364 wrote to memory of 1064 4364 msedge.exe 86 PID 4364 wrote to memory of 1064 4364 msedge.exe 86 PID 4364 wrote to memory of 1064 4364 msedge.exe 86 PID 4364 wrote to memory of 1064 4364 msedge.exe 86 PID 4364 wrote to memory of 1064 4364 msedge.exe 86 PID 4364 wrote to memory of 1064 4364 msedge.exe 86 PID 4364 wrote to memory of 1064 4364 msedge.exe 86 PID 4364 wrote to memory of 1064 4364 msedge.exe 86 PID 4364 wrote to memory of 1064 4364 msedge.exe 86 PID 4364 wrote to memory of 1064 4364 msedge.exe 86 PID 4364 wrote to memory of 1064 4364 msedge.exe 86 PID 4364 wrote to memory of 1064 4364 msedge.exe 86 PID 4364 wrote to memory of 1064 4364 msedge.exe 86 PID 4364 wrote to memory of 1064 4364 msedge.exe 86 PID 4364 wrote to memory of 1064 4364 msedge.exe 86 PID 4364 wrote to memory of 1064 4364 msedge.exe 86 PID 4364 wrote to memory of 1064 4364 msedge.exe 86 PID 4364 wrote to memory of 1064 4364 msedge.exe 86 PID 4364 wrote to memory of 1064 4364 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2eec7e1e827e9f572c5cb07395513a2f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8591c46f8,0x7ff8591c4708,0x7ff8591c47182⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10169744923275044328,1100856579819683478,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,10169744923275044328,1100856579819683478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2560 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,10169744923275044328,1100856579819683478,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:82⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10169744923275044328,1100856579819683478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10169744923275044328,1100856579819683478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10169744923275044328,1100856579819683478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10169744923275044328,1100856579819683478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10169744923275044328,1100856579819683478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10169744923275044328,1100856579819683478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10169744923275044328,1100856579819683478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 /prefetch:82⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10169744923275044328,1100856579819683478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10169744923275044328,1100856579819683478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10169744923275044328,1100856579819683478,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10169744923275044328,1100856579819683478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10169744923275044328,1100856579819683478,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10169744923275044328,1100856579819683478,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2304 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5edb8b337ce37519aa819ba2a7e5b4395
SHA1ffc087ade22feb3b35b42f697c62736d9bb959ca
SHA256f3da339a9b9abc513b708164cb39235d2cbdc105801da425e98d7fde847c36e2
SHA51212752b1f1a8f012bfadd51b4b6943091e9eb1802fcf1589813d96292c624ad0f3d1db9464c4f3253c5fc2df52acd01f13cecf7e4b97b1d0f5abab42a4578369b
-
Filesize
2KB
MD50365f4cd213983946f4f99be0e24ebe6
SHA1723af0d2c71185f664d3f15333f61307e9d03a9d
SHA2561b6ab1f83da91c831fe3bffd24af5a7a7b56b807ed3d75137020cee97c9b9b25
SHA512621a55c071ea5de0427284b071f81d23de1931c8e8c9c378c0f170fbc04e66d26c0c8aa63e81a547872d66b7a4856da4e013708edd410889407d365191a4ae8b
-
Filesize
2KB
MD505fe822113aab29782e78a9531d01376
SHA1141592a4c30f9690dd4584a7055eed74bab8d6b2
SHA256400295b79902cf8c44cf051965ee575b7a28b533e8d68dca2fe867f2299f4a54
SHA512c3027f4457be2dffb2c1c5ebda92e8c470ae4e05db3b9d8c06ae53edd2568bf8a426a58c67ef1f05527d7351c713a79bdf782874997f8dc3f5b616677c569188
-
Filesize
6KB
MD5241415e44fb67ddf3e829572b549c859
SHA15ea1b51ddd15d5c4d9565923cd173387bb71a292
SHA25642b4a67f35cf2d01670bf153235083c6c925c8301ae65e4c2b7a01e52d4a475c
SHA512b0c1fa6797205aa0094a5a95d738ecf54100ed30e50cec1f47d790abf6d24d14d16ab7a003a85e57eac18e062a5861c820afb78d5001b0040c07b49bb6224cea
-
Filesize
7KB
MD592b4e6880dfd102e6809fc9fbde7d056
SHA1cd692f1e1c229abaa8765bcc6ab5025eb76bccf4
SHA256f277b83711ab4f479c61e90b5d87db2b14c6e6eca361a1b9cd2e1b70e5531349
SHA5127fc69e2899687adf8be48bcc5fb8c7c2ee178dadb35fb2f7d21d119c1db975a1adb40ce279c9e4724a404b9e25ff9b5900af04850864dfd6b6cf2d69f86d820b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d2f00a04a13e3060fea92eb9c4c3204f
SHA10e9f18c2c2e8f5b857b230b0271398b0ae06a596
SHA256ef9a93f438558a0702dbe5bc1260276958a83809ab04d1775267c865516f54b7
SHA51204634a0fc39c071485d6d43eb32297cb788876f872ee686823dabcf35f8de121e6e9e41751daa7be63c94dcc38f8dcebb864da910f4cb5616c135b363d29cca2