Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
9e0ad915b6a53cca02d6589b27b2bc1e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9e0ad915b6a53cca02d6589b27b2bc1e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9e0ad915b6a53cca02d6589b27b2bc1e_JaffaCakes118.html
-
Size
175KB
-
MD5
9e0ad915b6a53cca02d6589b27b2bc1e
-
SHA1
106a6c13559ad163411fc83acfa7a4a86cf84f51
-
SHA256
c3eda92918b5e3e673b1b2a5640abd0e4741a93f4c668d31691dd47e2de06f70
-
SHA512
ff33cf2706bc1805fb2f2d784cf443635211a41a0a11548da4db5afdb281e83e8487350a54178fff472194171345999c7473ed6fded65ae3f53f20a61926384f
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS34GNkFxYfBCJiZj+aeTH+WK/Lf1/hpnVSV:SHCT34/FEBCJiKB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 4172 msedge.exe 4172 msedge.exe 2396 identity_helper.exe 2396 identity_helper.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4172 wrote to memory of 2772 4172 msedge.exe 83 PID 4172 wrote to memory of 2772 4172 msedge.exe 83 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 2732 4172 msedge.exe 84 PID 4172 wrote to memory of 5064 4172 msedge.exe 85 PID 4172 wrote to memory of 5064 4172 msedge.exe 85 PID 4172 wrote to memory of 932 4172 msedge.exe 86 PID 4172 wrote to memory of 932 4172 msedge.exe 86 PID 4172 wrote to memory of 932 4172 msedge.exe 86 PID 4172 wrote to memory of 932 4172 msedge.exe 86 PID 4172 wrote to memory of 932 4172 msedge.exe 86 PID 4172 wrote to memory of 932 4172 msedge.exe 86 PID 4172 wrote to memory of 932 4172 msedge.exe 86 PID 4172 wrote to memory of 932 4172 msedge.exe 86 PID 4172 wrote to memory of 932 4172 msedge.exe 86 PID 4172 wrote to memory of 932 4172 msedge.exe 86 PID 4172 wrote to memory of 932 4172 msedge.exe 86 PID 4172 wrote to memory of 932 4172 msedge.exe 86 PID 4172 wrote to memory of 932 4172 msedge.exe 86 PID 4172 wrote to memory of 932 4172 msedge.exe 86 PID 4172 wrote to memory of 932 4172 msedge.exe 86 PID 4172 wrote to memory of 932 4172 msedge.exe 86 PID 4172 wrote to memory of 932 4172 msedge.exe 86 PID 4172 wrote to memory of 932 4172 msedge.exe 86 PID 4172 wrote to memory of 932 4172 msedge.exe 86 PID 4172 wrote to memory of 932 4172 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9e0ad915b6a53cca02d6589b27b2bc1e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8cff46f8,0x7ffd8cff4708,0x7ffd8cff47182⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,5798216788100826464,8431114519087830087,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,5798216788100826464,8431114519087830087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,5798216788100826464,8431114519087830087,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5798216788100826464,8431114519087830087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5798216788100826464,8431114519087830087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5798216788100826464,8431114519087830087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5798216788100826464,8431114519087830087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5798216788100826464,8431114519087830087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5798216788100826464,8431114519087830087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,5798216788100826464,8431114519087830087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3928 /prefetch:82⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,5798216788100826464,8431114519087830087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3928 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5798216788100826464,8431114519087830087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5798216788100826464,8431114519087830087,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5798216788100826464,8431114519087830087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5798216788100826464,8431114519087830087,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,5798216788100826464,8431114519087830087,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2476
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD590a3c83a0e73548a31c1574c41dd2be8
SHA1420ed65d335f6f2813983db1dd3141c0daea9f6e
SHA256881524eeea644d452b011e32df48715b0b729dea6e5ce7a5ff9fd61421ba2dcd
SHA51263e4f5d57f4f363ef3db1fdbdb48f8c8a73bee227644f84fda9c18594d95b08a96cae362a2f279d46d7956bee33b5b06c703c584ce86c66cbb3ff87cb1eb6c89
-
Filesize
2KB
MD5c20336f29f32c3ec6058f2d64c7af781
SHA137a0d3ddc58eff3c61ee9719b556e46c1dc5bc6e
SHA2567a9d23147db7e087f157cc0dbc455097d7f90edb9daf357c52ed4297fc075ecb
SHA5128454867cd771038a5d6721bb37fcdddd0c8da5cb520c86aa2ab4a1fec0c2d8cba6cd3d060c5607e659e6a1a32dcdcce07f1866e8cde5e9db020951caa4120819
-
Filesize
2KB
MD5980b7fff1b6a3611f85ddcc6d2c76f0d
SHA18f07638ecf92fc423ed8b7c2be162f084a75cc10
SHA2562e980cbdccbc6bb37af5e363e70c6179a4922df0c6cfc3e7fe53048e30bae070
SHA51296ca1b9739351d98ca113824b4d3d858e3181858629a006effc9db1e3b9d5262354b8c64536042376bdbbade966dfce1bfd180ca5839b70c80ec21097590e206
-
Filesize
6KB
MD5c3204c753c2cfa7e37a83a23633b1cc3
SHA169099254745e57b8d96ae0aeb77f97ecb21ee96d
SHA25667fb195f86cf73c71098bb0391d091287620ff06acbf1b6114d09651f243c040
SHA5129f5f193aadccb77f94a0c402cfcc03552604ea7e3d8ac016fcac2248524415195354aebef99fafb2ec3c1491531660539d3747eb5bf7fa9dcf20ed37d631fe88
-
Filesize
7KB
MD5d4c4b43e297619f92998a92ce97a3f1b
SHA163ea116b16018c3d0c91d20b31b8348d8444466c
SHA256fd9e3cf0d626773ef2ef32675d53b736244227929d1325aa5c525f518abf6ad4
SHA5124169b8e96a996e3557af5ac6a7c9775146cb8e919c01210882e4f6e72de4420daff3fa982ffe579d02acb0cead0d1a7f19bd634951195bdaedf8692b03884672
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5767fa5e1258987b84f9989b72ba6b66d
SHA1ce98039f07ca8bd1ff403558bdfe0b02bf5547ae
SHA25685aad1001e741292ec7a16022601eeff8f74fdeee95f7c80bbf44583da2eb3ca
SHA5128b2b2107f06771876fa68d8559e43bf9ededc32e9414dbafd2a5eb5ddf4464e73034dc04786f4cebb58d4fce184e4e934e0bf1af44f8adff4acd95b3f8352eb6