Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 01:23
Static task
static1
Behavioral task
behavioral1
Sample
e16d53464e1a876b544b61dcedcd480e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e16d53464e1a876b544b61dcedcd480e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e16d53464e1a876b544b61dcedcd480e_JaffaCakes118.html
-
Size
21KB
-
MD5
e16d53464e1a876b544b61dcedcd480e
-
SHA1
0522add6f3ae8d9c31c71d1c314036b405c4b4ea
-
SHA256
aa8c4956f3cd5b554c2695e0a9f87abd4f74eaa78cd9cd5002fd2453a0cc3458
-
SHA512
c6762e63964cd706c9f3ad7ff1ad7e0484a0785f7637ed229e53baaabf913e6880837620ea50947541ab2bf1d453ee34fee7fb08a0174e4e9e4d68d62a0d4723
-
SSDEEP
192:+78//FnAj2Br/sbEjITjkQz0n+QCzha8UzLjk1bGyMsUiGoCxdaGqavCLuDkQz0q:+78//FnAK/sbl0Yk8S/k1bZq/xdk00q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 4540 msedge.exe 4540 msedge.exe 2364 identity_helper.exe 2364 identity_helper.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4540 wrote to memory of 3648 4540 msedge.exe 83 PID 4540 wrote to memory of 3648 4540 msedge.exe 83 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2324 4540 msedge.exe 84 PID 4540 wrote to memory of 2724 4540 msedge.exe 85 PID 4540 wrote to memory of 2724 4540 msedge.exe 85 PID 4540 wrote to memory of 1728 4540 msedge.exe 86 PID 4540 wrote to memory of 1728 4540 msedge.exe 86 PID 4540 wrote to memory of 1728 4540 msedge.exe 86 PID 4540 wrote to memory of 1728 4540 msedge.exe 86 PID 4540 wrote to memory of 1728 4540 msedge.exe 86 PID 4540 wrote to memory of 1728 4540 msedge.exe 86 PID 4540 wrote to memory of 1728 4540 msedge.exe 86 PID 4540 wrote to memory of 1728 4540 msedge.exe 86 PID 4540 wrote to memory of 1728 4540 msedge.exe 86 PID 4540 wrote to memory of 1728 4540 msedge.exe 86 PID 4540 wrote to memory of 1728 4540 msedge.exe 86 PID 4540 wrote to memory of 1728 4540 msedge.exe 86 PID 4540 wrote to memory of 1728 4540 msedge.exe 86 PID 4540 wrote to memory of 1728 4540 msedge.exe 86 PID 4540 wrote to memory of 1728 4540 msedge.exe 86 PID 4540 wrote to memory of 1728 4540 msedge.exe 86 PID 4540 wrote to memory of 1728 4540 msedge.exe 86 PID 4540 wrote to memory of 1728 4540 msedge.exe 86 PID 4540 wrote to memory of 1728 4540 msedge.exe 86 PID 4540 wrote to memory of 1728 4540 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e16d53464e1a876b544b61dcedcd480e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbfd4046f8,0x7ffbfd404708,0x7ffbfd4047182⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,7353163954786660914,16619064824879390891,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,7353163954786660914,16619064824879390891,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,7353163954786660914,16619064824879390891,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7353163954786660914,16619064824879390891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7353163954786660914,16619064824879390891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7353163954786660914,16619064824879390891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7353163954786660914,16619064824879390891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7353163954786660914,16619064824879390891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7353163954786660914,16619064824879390891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,7353163954786660914,16619064824879390891,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,7353163954786660914,16619064824879390891,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7353163954786660914,16619064824879390891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7353163954786660914,16619064824879390891,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7353163954786660914,16619064824879390891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7353163954786660914,16619064824879390891,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,7353163954786660914,16619064824879390891,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3612
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5879ea2a59f549565a26238ad157ea09d
SHA17fc7fec925721f7b527f85559dac805aa856f190
SHA256477fa02602c8b7f2deb13d5cf33d76f223468d1fd3f5a7a47dd9e9cf6425cbad
SHA5121f93cb4c6b4b5534f0c877b4443f5a2242d349775188090c5039c1bf90d9a75226c38e587925e04fad9451ce892d95f0e737289e527685167ff109c50d14ac14
-
Filesize
1KB
MD5df1da7c4b3717550328c2921d535d9e4
SHA120498a45945faabdd7e11228b79bd596598b2af8
SHA256f60f1b38fe2ac84552c0b2d09b78e1d0a874ec56c121968d1e751b38325907c4
SHA512f6b7ae9c2e909dc3b6e9d3b0bbab9b7e9f1c7c65f5f296b4c5f83f9a4a489dc0ecd152cacd42d50a22a2f79bdc963d980bd2c69d1002910c5224ac3005254e90
-
Filesize
5KB
MD5ab565ddeec53548bf1f027f22e9317a0
SHA1e8bd4bedd524ab64447705997af1a92a421bffe9
SHA256472822f8ce641e59545e435d47e2c3c44743fb5d0fa74132747e7bd084f5e14e
SHA51264774e8d4b9a0362c029dc3e9cea95827fdb2625fff16f4d982c38bc8f0aaf2bf9f3220597004df3fdef6c84f1fe3dbe7cd6bc0f797e73c1313a8f63455e83e6
-
Filesize
6KB
MD54d029fd3c37709e5395644079999e174
SHA1b0b18b8769b624980f788b3a2057f9be84da3d3d
SHA2566e46fcbc9e55e723af519336a9b9a340b07421665372d670911227fa70b6b21c
SHA5122c0ad21719c1cd6faefd9c58f04a867c8e66a2316ab661aaeeea2666efcd198dc1dbf351bb85271062d3dc73f00db0777f1ade6ae384131fcd4f63b88d5f6d65
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e3c792694fcf343516aa310703260e4c
SHA1de6aa9d0bbbb77de76f3cbee0d03ef3a4934aa19
SHA256132b472f83a837a4d539ac6fe39a9c3a6e2d61143194d35d3d367a150c3a7105
SHA5126af8f7931f3c854c43a29e2331658dce22221ad5a401fb1adc373a0d070d9ebc68cd53cc41595975601e78f313c94620214ba138d7f930866f3fad704b0d613a