Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 08:57
Static task
static1
Behavioral task
behavioral1
Sample
fbf15fa97d7455b5e484d953dca56551_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbf15fa97d7455b5e484d953dca56551_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbf15fa97d7455b5e484d953dca56551_JaffaCakes118.html
-
Size
175KB
-
MD5
fbf15fa97d7455b5e484d953dca56551
-
SHA1
151f7c6b7aeadd08ec38e5ce290588b90e195e61
-
SHA256
6c05652c6f3706443a22d5aec56395d56b3d8b7d485b48b9923823fd9003160b
-
SHA512
f8150e4e00e623ca473b282af026d1a5f2f8388d12b4f871b197aab780bebc94e220aaa75f4ceccea99a1078d1ba799b730b0c07e5a05a7e972439e601dcd844
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3RGNkF3YfBCJiZd+aeTH+WK/Lf1/hpnVSV:S9CT3R/FGBCJisB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4632 msedge.exe 4632 msedge.exe 4368 identity_helper.exe 4368 identity_helper.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4632 wrote to memory of 3592 4632 msedge.exe 82 PID 4632 wrote to memory of 3592 4632 msedge.exe 82 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 1032 4632 msedge.exe 83 PID 4632 wrote to memory of 4304 4632 msedge.exe 84 PID 4632 wrote to memory of 4304 4632 msedge.exe 84 PID 4632 wrote to memory of 2472 4632 msedge.exe 85 PID 4632 wrote to memory of 2472 4632 msedge.exe 85 PID 4632 wrote to memory of 2472 4632 msedge.exe 85 PID 4632 wrote to memory of 2472 4632 msedge.exe 85 PID 4632 wrote to memory of 2472 4632 msedge.exe 85 PID 4632 wrote to memory of 2472 4632 msedge.exe 85 PID 4632 wrote to memory of 2472 4632 msedge.exe 85 PID 4632 wrote to memory of 2472 4632 msedge.exe 85 PID 4632 wrote to memory of 2472 4632 msedge.exe 85 PID 4632 wrote to memory of 2472 4632 msedge.exe 85 PID 4632 wrote to memory of 2472 4632 msedge.exe 85 PID 4632 wrote to memory of 2472 4632 msedge.exe 85 PID 4632 wrote to memory of 2472 4632 msedge.exe 85 PID 4632 wrote to memory of 2472 4632 msedge.exe 85 PID 4632 wrote to memory of 2472 4632 msedge.exe 85 PID 4632 wrote to memory of 2472 4632 msedge.exe 85 PID 4632 wrote to memory of 2472 4632 msedge.exe 85 PID 4632 wrote to memory of 2472 4632 msedge.exe 85 PID 4632 wrote to memory of 2472 4632 msedge.exe 85 PID 4632 wrote to memory of 2472 4632 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fbf15fa97d7455b5e484d953dca56551_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdce3446f8,0x7ffdce344708,0x7ffdce3447182⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,8181781647711734204,443623071404224666,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,8181781647711734204,443623071404224666,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,8181781647711734204,443623071404224666,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8181781647711734204,443623071404224666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8181781647711734204,443623071404224666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8181781647711734204,443623071404224666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8181781647711734204,443623071404224666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8181781647711734204,443623071404224666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8181781647711734204,443623071404224666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,8181781647711734204,443623071404224666,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,8181781647711734204,443623071404224666,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8181781647711734204,443623071404224666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8181781647711734204,443623071404224666,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8181781647711734204,443623071404224666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6148 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8181781647711734204,443623071404224666,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,8181781647711734204,443623071404224666,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD54c868424263669bd00941b67ec3a6552
SHA1fad43fb8ec6a43c18fd68bada31b5237e58deafb
SHA256ae91957f0f67308c7afef097e18c0f8fb6e351739a247381065e442e988b3b23
SHA512f1469976d47af448707ceb149852c67f33364f33cadf8f0c30b7202d320c8790dbe9a98c4884b4d48fe51876918c1430fd312400b695a4374f229db066f5adcd
-
Filesize
2KB
MD5e6b7ba3d3983cd9f17ff77b0cbce50bd
SHA1c6b3a38122eda6d61129d557a53e6de93db4e514
SHA2564fae9b88cd15721dcbfc31f6926e5c561157302f90925f9d474cbe5457fc3304
SHA5121d70d11c641fd3dc73cd25dd0bc2c904dc23a8db0dddf3f11cbb1ced8e7dc4cdd9b3eea0f51ea5a4ed7e273703b1d006de8af6ccc5f790503d11b2242b5c0b99
-
Filesize
2KB
MD5dce1425450ae3c5d2d72411e28b1fe8b
SHA1ecf0c77826d87170e8e1818892a68ad941869145
SHA256cb10b4dc02cba16bc2ff79c25b2339f526885a794caa5f587e0d49908c0574d9
SHA512c9604d6c25514924ae477cc6317df6bdaae43236e39b074551ee382021c568cdacdf40c2efe9f4f9b163b217968448c99cf698ea53bc8b8f59bff7e363048ae8
-
Filesize
7KB
MD5097c6740e1512722639ee32d39677e83
SHA188ea2c64ee29184be0f6ead7eb144f6eef67f735
SHA2569fc1a12b2d37e979a3ea5ea2d00ba84c62b54a1d75d7d2bb9a1c49f73bf11a55
SHA512a4ad369de38c4972fdf4fdb774e9a397685352a6ce51d2aac2c1def3f54b817b5a5a4588060de52055eaded5c16d482153c70ea2af8091e63a82ca30705c4b27
-
Filesize
5KB
MD5bca41d3b4afa4bef6abb0dc17aacc02f
SHA1772433a6b352acb3f0c38f94748891b20845873a
SHA25656903cc8c094daf935144e2e820beeb0ebf2da874859c2e9fac58cd259d4557c
SHA51254798bf7e4ee99915d87c9e1676e5fdf0fb4e51cf2956342041550fb308c1757dbf91cc57fefb09bd11aa723235cb8423b31e4f5d6d44df47eb62294d0271d51
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a41f52ce7130bbf24b90d0796d0303d6
SHA13c0db4761810be3975e4aec6c823d4273644a280
SHA25602b9932ec9322de7e864a8eaa2c58fc8b54a3dd4eb6b8abcf32da3f47f646d6f
SHA5128203cb33742359b067c7c22ab926c138f5e724cf0ec3fb511007d25be40a84518327d5ded32537b1a828106e181a2ab42d96547c15e7bf8620e67385a204ada9