Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
500eb6559c725a6580f9965f1748437d_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
500eb6559c725a6580f9965f1748437d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
500eb6559c725a6580f9965f1748437d_JaffaCakes118.html
-
Size
38KB
-
MD5
500eb6559c725a6580f9965f1748437d
-
SHA1
97a3814989824bda1623e0cafcf3f142308331d0
-
SHA256
21bd3efc859a3af9989e1a56e165b79b8dc300274cc496d3d20c93d2d29a26ff
-
SHA512
3ca52b522f507e571ae1662c583f3c5fcd462135bd23c094f32e4fd68b7dafde4cbbbea8ecd8c9ad9427494d180f19e5bb85fb780d09c832124e51cfea647b03
-
SSDEEP
768:BV6AmQf2qKf42k2F1Tb2KA2krjIFsqZ1fC5a6eqS+42NDUGb4kJ8:Tz2FXTy92krjIFZ1fd6yp2NfLu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 1736 msedge.exe 1736 msedge.exe 2540 identity_helper.exe 2540 identity_helper.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1736 wrote to memory of 3536 1736 msedge.exe 82 PID 1736 wrote to memory of 3536 1736 msedge.exe 82 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 4492 1736 msedge.exe 83 PID 1736 wrote to memory of 3104 1736 msedge.exe 84 PID 1736 wrote to memory of 3104 1736 msedge.exe 84 PID 1736 wrote to memory of 4628 1736 msedge.exe 85 PID 1736 wrote to memory of 4628 1736 msedge.exe 85 PID 1736 wrote to memory of 4628 1736 msedge.exe 85 PID 1736 wrote to memory of 4628 1736 msedge.exe 85 PID 1736 wrote to memory of 4628 1736 msedge.exe 85 PID 1736 wrote to memory of 4628 1736 msedge.exe 85 PID 1736 wrote to memory of 4628 1736 msedge.exe 85 PID 1736 wrote to memory of 4628 1736 msedge.exe 85 PID 1736 wrote to memory of 4628 1736 msedge.exe 85 PID 1736 wrote to memory of 4628 1736 msedge.exe 85 PID 1736 wrote to memory of 4628 1736 msedge.exe 85 PID 1736 wrote to memory of 4628 1736 msedge.exe 85 PID 1736 wrote to memory of 4628 1736 msedge.exe 85 PID 1736 wrote to memory of 4628 1736 msedge.exe 85 PID 1736 wrote to memory of 4628 1736 msedge.exe 85 PID 1736 wrote to memory of 4628 1736 msedge.exe 85 PID 1736 wrote to memory of 4628 1736 msedge.exe 85 PID 1736 wrote to memory of 4628 1736 msedge.exe 85 PID 1736 wrote to memory of 4628 1736 msedge.exe 85 PID 1736 wrote to memory of 4628 1736 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\500eb6559c725a6580f9965f1748437d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffefd5946f8,0x7ffefd594708,0x7ffefd5947182⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,11836720484225408023,7192199611313009461,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,11836720484225408023,7192199611313009461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,11836720484225408023,7192199611313009461,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11836720484225408023,7192199611313009461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11836720484225408023,7192199611313009461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11836720484225408023,7192199611313009461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11836720484225408023,7192199611313009461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,11836720484225408023,7192199611313009461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,11836720484225408023,7192199611313009461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11836720484225408023,7192199611313009461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11836720484225408023,7192199611313009461,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11836720484225408023,7192199611313009461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11836720484225408023,7192199611313009461,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,11836720484225408023,7192199611313009461,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3144
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5be6119894a52a393c6e4d5d6089474ff
SHA14802a847950316306180515217439677774cd192
SHA2565459cf8634c8764c1c19309e70e8f4332dcf976f90c3a6d941954c44d457a81d
SHA512076668c4bb4694c1e0a231a7e30d7200e4c33dd050840c03d6f2fdc76a67673ff60b66c5ed99946c09cfce8cd28b309c0349ede3444a6f1fafd081f750fffec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5a8091ac272889ddf68171aea889f9444
SHA10ce3dd85317349a36cb85d89ec1ce2cc14d6b41a
SHA256bb3506ec6f2635e2a125d674f6080a6792948e1d79ad78bbfbd2ef41a454612d
SHA512517bf3778d707574a9c69b5b9299213d4c4a38db1a9eabe2fd7b95132588a5379145d3ee5eda214d031f960e1bdb5f26bc39bbcd8f1de31fc4bd3fa9af357811
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD597f06b4dd5ff9764da01b46ef99b198b
SHA18b3df439ffda740f163555ede50c5e51cc5ac50c
SHA256f26efa5db0908828f40df552d0ff8cc17db1ee1e65f49e7b07693539e201570b
SHA5128ab1ec8bebeb030ff8c6e4a98750bd551710d0b29fd7cbce1a7a6cd66afe2450ce2d56e647f2545048ecec2ccb666eb081c2db3a07294b95414d5d8f4ee7c5a0
-
Filesize
857B
MD5d25c21185c63a7468d0a92d4d1479cf2
SHA1ec039ecf3cd31f74b55ab05c8627410333105d35
SHA2563a2ab6b108cc809edec8996b9ac2240e4f21e55473d781abe82e0e9394de5538
SHA512e4317c492107984ad8a0c17a4f6052e33e5ff6dc84bf92b2f18a101ceb9aca15c39beaf867b0cc46441e3b598dcfc9241e4971168318e41a754c40b4819a3962
-
Filesize
7KB
MD536f1f758bbc53ba4332bd8f4c16ae464
SHA19864f8bfc1780c5a4b3411efd85ed17f144d5157
SHA2567821264f8dd3610613bb4a5eec06edcb0b472bf28ea8d9fb1590d84237ec4ad8
SHA512a19effc292bcb81146ce64f4275209cf18d77b7615cd7ac1837a965147659085cfb685d52da96efe3e9b4765dde19b5f7d1c8fc5fae3ce65c3cfa7bb8c8b374b
-
Filesize
5KB
MD5705fa2c91683f4aba8f582f65f051975
SHA104f79c8097467d2438d6c221e310d257685d5312
SHA256eb693adb45073c7b7b4ee073fc2de16d9bbd013c9912169551f7733d125929c6
SHA512e9a0f37e0cb444493d13dd89222fd14b7155463223e57dbc1d25d50c278b4500ca19a23d0a934f25d216f92a781b89946d593d3709a5969ea514330fb251c8a3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5a5ce2435b02544ef442e54d1ad909ad5
SHA1cade22cb076986f22740bc7c53c85afcdfb9df9c
SHA256a58e45f9ae063eef264f2c1f0788c8b91e5c0588c9f56b048abcafb4376c7866
SHA5124479faa848279f3860ecef9c06448de8439db60d3c58f7ccba050f3a7c65638d594f127fc7d0665602c998778ce0a296704d005429e04c1f7c174dcb981f7997