Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 00:29
Static task
static1
Behavioral task
behavioral1
Sample
b5f787eea95f30b2362f013b867676c0_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b5f787eea95f30b2362f013b867676c0_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b5f787eea95f30b2362f013b867676c0_JaffaCakes118.html
-
Size
175KB
-
MD5
b5f787eea95f30b2362f013b867676c0
-
SHA1
2985f787216bf6355d373537df6365445787eb4e
-
SHA256
4648f518fcd44362fc64a2a5c88f619c969ac4820a6bd502c29abd9e71d42125
-
SHA512
ad132815d33f6c580b8a78d91b5bf90f001305ef558f0d6421c4bb5ba0ab49b961a0839919c2726c9d33eca27e81d5f54f96f4f31a085479ecc321a18bac0b4b
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3CGNkFAYfBCJis0+aeTH+WK/Lf1/hmnVSV:SOoT3C/F1BCJiCm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 2556 msedge.exe 2556 msedge.exe 1884 identity_helper.exe 1884 identity_helper.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2556 wrote to memory of 700 2556 msedge.exe 86 PID 2556 wrote to memory of 700 2556 msedge.exe 86 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 4272 2556 msedge.exe 87 PID 2556 wrote to memory of 1940 2556 msedge.exe 88 PID 2556 wrote to memory of 1940 2556 msedge.exe 88 PID 2556 wrote to memory of 2220 2556 msedge.exe 89 PID 2556 wrote to memory of 2220 2556 msedge.exe 89 PID 2556 wrote to memory of 2220 2556 msedge.exe 89 PID 2556 wrote to memory of 2220 2556 msedge.exe 89 PID 2556 wrote to memory of 2220 2556 msedge.exe 89 PID 2556 wrote to memory of 2220 2556 msedge.exe 89 PID 2556 wrote to memory of 2220 2556 msedge.exe 89 PID 2556 wrote to memory of 2220 2556 msedge.exe 89 PID 2556 wrote to memory of 2220 2556 msedge.exe 89 PID 2556 wrote to memory of 2220 2556 msedge.exe 89 PID 2556 wrote to memory of 2220 2556 msedge.exe 89 PID 2556 wrote to memory of 2220 2556 msedge.exe 89 PID 2556 wrote to memory of 2220 2556 msedge.exe 89 PID 2556 wrote to memory of 2220 2556 msedge.exe 89 PID 2556 wrote to memory of 2220 2556 msedge.exe 89 PID 2556 wrote to memory of 2220 2556 msedge.exe 89 PID 2556 wrote to memory of 2220 2556 msedge.exe 89 PID 2556 wrote to memory of 2220 2556 msedge.exe 89 PID 2556 wrote to memory of 2220 2556 msedge.exe 89 PID 2556 wrote to memory of 2220 2556 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b5f787eea95f30b2362f013b867676c0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82b7446f8,0x7ff82b744708,0x7ff82b7447182⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,18012173231686611858,17266553247347023251,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,18012173231686611858,17266553247347023251,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,18012173231686611858,17266553247347023251,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18012173231686611858,17266553247347023251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18012173231686611858,17266553247347023251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18012173231686611858,17266553247347023251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18012173231686611858,17266553247347023251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18012173231686611858,17266553247347023251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18012173231686611858,17266553247347023251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,18012173231686611858,17266553247347023251,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3376 /prefetch:82⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,18012173231686611858,17266553247347023251,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18012173231686611858,17266553247347023251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18012173231686611858,17266553247347023251,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18012173231686611858,17266553247347023251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18012173231686611858,17266553247347023251,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,18012173231686611858,17266553247347023251,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5412 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57ccab4f7814f0a963af204d376da21c9
SHA1bf18ff50f0b86b9a99e0fc290b6846ee6d913e39
SHA2568e901bab235c0d6fcc6a75fd14cf8377d403d5a1e5f813739a18da53a2d018bb
SHA512520207a7db43fd5f2a907e3ddf2d6a0145433dc152ff9ae48019f09d2a3975b694d82b4d7be1f2ebb471f04f9be72413cdaf395b60079cf1bff6556a737c714b
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5d7f041dbdb17547a33a97edfcc3f5a91
SHA11d631455742369aff2b4ca5d7073bb798d610e92
SHA2566190eee4a6f0e5b7986339035a70f751673209378200456b698b4508bfbb2755
SHA5124722303d4ad0892f2504e0512371cb11269c04ba4eec06396ee75fafd1e8db633f6d67f5ff6ab81557a13fa8a8e36b7d60dfe0b76265da878e6275ae4c65ca81
-
Filesize
2KB
MD51b7bb8e6732fbe3e53dbd0a9a281c7d9
SHA199e53e9fcf5df5a53d1338cf316b63be0f9ecdf4
SHA25617e96d7bedb565d7697425678b626e1ef60667bed26c20530c889bdb60badc8d
SHA512ef099f8d59f8bb59955ece11fc4e2446733955417021332b576a17761fb44bfb39788d4d1b6784479be5d365f580378abee9f51b35b9bb593bdacd1c1c4b6bdb
-
Filesize
2KB
MD5e3d959dc34556cb3ca8654dd562e69ef
SHA16ed059d518350d2a2c5f4fc27cf10659ac32cf05
SHA256af6f900b5ca0ba6b01fc1a5d137f154f1c504bc234940fafe7434979ede06b3b
SHA512ff62dd8be71efc365879501366f8e993b679fc380bfc3606ae311fbf56630fafc0cdc0ba2cf785369b29c17e33ac2d34cc3a781e2ee9fb6ea016f09368786615
-
Filesize
7KB
MD5c1a603d54d6ffb2c7d57696eca46da03
SHA13369674d640d40c2c72b2dfd9f6c35d025115221
SHA25653c93451780cb916e85d5909aacba1150357e42aad5a72113c4b15453b7cb689
SHA512bb21a241bb7d8f750f1fb9338720b42f95445394fa0a6494f5691c1dcb50a9dffe2b612972925d422fd18a1aab296a7fa4a98b31bc341bd25828bebab640cffb
-
Filesize
6KB
MD542de0e4bf17a4daac0a103ac3d375abc
SHA18e19025a019ca10b2784f92d61f1d89a18adb98f
SHA2560de0465b30b924c8c8a2e2e96ac0889628f55657acc1e7b8b946bd2ba13c877c
SHA512472a52e0972e544d78da6a9aa7d97f407dc3fb2e8e6be18b2f080e09c563cc6e16264b6813389986734477471f323554e680e3ba0bc29ff55d4116cfd3bcf26e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389