Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 02:00
Static task
static1
Behavioral task
behavioral1
Sample
3227ae7581fd78140ba49ff99b8eaf3a_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3227ae7581fd78140ba49ff99b8eaf3a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3227ae7581fd78140ba49ff99b8eaf3a_JaffaCakes118.html
-
Size
175KB
-
MD5
3227ae7581fd78140ba49ff99b8eaf3a
-
SHA1
61c4c2d3b38dbc925b70bde996f803a5c23e11d7
-
SHA256
b78696f30f499f2bcd3e1d42a2655bc96498bfcb093535e04a2054d4fc416fb2
-
SHA512
e6924e71771aead74c53199a7c7d10e84031ff0f71140e36e3f0b397e85eb593809b3b925a62bd162e9ce1bf64d509cdbcd1c7b329dbd42e91686ca16fecee4f
-
SSDEEP
1536:Sqt58hd8Wu8pI8Cd8hd8dQg0H//3oS32GNkFeYfBCJisa+aeTH+WK/Lf1/hmnVSV:SOoT32/F3BCJiUm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 3956 msedge.exe 3956 msedge.exe 2412 identity_helper.exe 2412 identity_helper.exe 6120 msedge.exe 6120 msedge.exe 6120 msedge.exe 6120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3956 wrote to memory of 3624 3956 msedge.exe 84 PID 3956 wrote to memory of 3624 3956 msedge.exe 84 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4428 3956 msedge.exe 85 PID 3956 wrote to memory of 4860 3956 msedge.exe 86 PID 3956 wrote to memory of 4860 3956 msedge.exe 86 PID 3956 wrote to memory of 1544 3956 msedge.exe 87 PID 3956 wrote to memory of 1544 3956 msedge.exe 87 PID 3956 wrote to memory of 1544 3956 msedge.exe 87 PID 3956 wrote to memory of 1544 3956 msedge.exe 87 PID 3956 wrote to memory of 1544 3956 msedge.exe 87 PID 3956 wrote to memory of 1544 3956 msedge.exe 87 PID 3956 wrote to memory of 1544 3956 msedge.exe 87 PID 3956 wrote to memory of 1544 3956 msedge.exe 87 PID 3956 wrote to memory of 1544 3956 msedge.exe 87 PID 3956 wrote to memory of 1544 3956 msedge.exe 87 PID 3956 wrote to memory of 1544 3956 msedge.exe 87 PID 3956 wrote to memory of 1544 3956 msedge.exe 87 PID 3956 wrote to memory of 1544 3956 msedge.exe 87 PID 3956 wrote to memory of 1544 3956 msedge.exe 87 PID 3956 wrote to memory of 1544 3956 msedge.exe 87 PID 3956 wrote to memory of 1544 3956 msedge.exe 87 PID 3956 wrote to memory of 1544 3956 msedge.exe 87 PID 3956 wrote to memory of 1544 3956 msedge.exe 87 PID 3956 wrote to memory of 1544 3956 msedge.exe 87 PID 3956 wrote to memory of 1544 3956 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3227ae7581fd78140ba49ff99b8eaf3a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4d6046f8,0x7ffe4d604708,0x7ffe4d6047182⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,3695552735220422803,5814026888566983230,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,3695552735220422803,5814026888566983230,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,3695552735220422803,5814026888566983230,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3695552735220422803,5814026888566983230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3695552735220422803,5814026888566983230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3695552735220422803,5814026888566983230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3695552735220422803,5814026888566983230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3695552735220422803,5814026888566983230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3695552735220422803,5814026888566983230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3695552735220422803,5814026888566983230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3695552735220422803,5814026888566983230,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,3695552735220422803,5814026888566983230,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 /prefetch:82⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,3695552735220422803,5814026888566983230,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3695552735220422803,5814026888566983230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:5280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3695552735220422803,5814026888566983230,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:5288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,3695552735220422803,5814026888566983230,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD582e80563d09d47e6e7a5d13c1c3f4e7f
SHA1078283d1e970da467611b63543bdb0c3b8d2d9bd
SHA256829e288ceab25debff6a554a3239e7ee0a7bc812c690c8d9a767c208487de798
SHA5124f81473cc123058a197d9c1dac4b2acfe9dd4982a1f9e0fab3cb762e82df82b1ecd8c3e85fe96043eb86f029d9a635a82f346f3f25904d8f7177481c83a26164
-
Filesize
2KB
MD5721118db9548df6990c6bed41b45878d
SHA1958c734885f7dc76f58c2ad6f31a91c7f63baa5f
SHA256bd2eca711ee74b238eba449492361f989c1fddde156189c00093c58094613e2b
SHA512bfad5b9b0b349453e4971749f754be5e16a24d0b0b8289b8541ee39c4802afbf49b18c6cb739a46fc6e0d72fa674dccf1ef6b35beb95d84b6319ca83abba9e43
-
Filesize
2KB
MD537ce9159fe7253c4a28e1cb0da1156d1
SHA1957738470f389b75cd2cca7f2e3136fdca84a8e4
SHA256611c362a25c154a8afbfc21d24cc5d90903d34e6177ed4ef83ec0c7879625c92
SHA512602c871ab45208563dc1acf6e1a18223aaaff42abb9e9f0dd59bde62b2629948dc1756e88937907f859f2c09ea03889d1c498a1057eacd814ed54b58879dfb3a
-
Filesize
5KB
MD51fdb43858f6c28e8336dffc6404efa91
SHA1aa27a45db347120e211bd6246d893dc8558c98b2
SHA2566dca50730acd54c4e0154c5511261f05866efc4370322b92af2e3a2039a193ec
SHA5128d58b1de4081114cf4d0ab9c68e2ec9e99726dcceb4bc985d3ceef9e9cf12cc6e2bfa635155237658d9920cf3ee80c215b619c3ba072eee3145e33ee40973544
-
Filesize
7KB
MD532a37f2f81cab8ff60a277b71bd91aec
SHA148d33dcd109557f39e8fe00e82efdfb720aa5842
SHA25620f02c0ddf95d658b40ca9167d413cc883de9b024d29ac5689dccad696e30e45
SHA5126d1c926988e46972baaaa1d03e7f36cdd0454d847121ec97fc26a0d7dc252ec6852ca18605300ee0f9d712e5fab9467226d1918c0b8c65d617fb580e3e04430b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b2de5465b747d20db0da210af343c902
SHA19b18da1689717677e1a034bea6bd14a54805dfa1
SHA25628ceb4927cbbc256edaf89a9ffd5a5300b733de1948274432dc6178bfe5ff1b6
SHA512c0edae84c664ea0e9c0a0b4cbfab550eacee1509a75cf33d1080a218bee41720f0bd51843144389411fdeeb0adc07464e22d1b63f2927ae333c6bce19a656b5c