Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 07:41
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 980 msedge.exe 980 msedge.exe 2776 msedge.exe 2776 msedge.exe 1120 identity_helper.exe 1120 identity_helper.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2776 wrote to memory of 3204 2776 msedge.exe 87 PID 2776 wrote to memory of 3204 2776 msedge.exe 87 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 1564 2776 msedge.exe 88 PID 2776 wrote to memory of 980 2776 msedge.exe 89 PID 2776 wrote to memory of 980 2776 msedge.exe 89 PID 2776 wrote to memory of 3932 2776 msedge.exe 90 PID 2776 wrote to memory of 3932 2776 msedge.exe 90 PID 2776 wrote to memory of 3932 2776 msedge.exe 90 PID 2776 wrote to memory of 3932 2776 msedge.exe 90 PID 2776 wrote to memory of 3932 2776 msedge.exe 90 PID 2776 wrote to memory of 3932 2776 msedge.exe 90 PID 2776 wrote to memory of 3932 2776 msedge.exe 90 PID 2776 wrote to memory of 3932 2776 msedge.exe 90 PID 2776 wrote to memory of 3932 2776 msedge.exe 90 PID 2776 wrote to memory of 3932 2776 msedge.exe 90 PID 2776 wrote to memory of 3932 2776 msedge.exe 90 PID 2776 wrote to memory of 3932 2776 msedge.exe 90 PID 2776 wrote to memory of 3932 2776 msedge.exe 90 PID 2776 wrote to memory of 3932 2776 msedge.exe 90 PID 2776 wrote to memory of 3932 2776 msedge.exe 90 PID 2776 wrote to memory of 3932 2776 msedge.exe 90 PID 2776 wrote to memory of 3932 2776 msedge.exe 90 PID 2776 wrote to memory of 3932 2776 msedge.exe 90 PID 2776 wrote to memory of 3932 2776 msedge.exe 90 PID 2776 wrote to memory of 3932 2776 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.imeidsa.com/s1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa94646f8,0x7ffaa9464708,0x7ffaa94647182⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,9625420914415815765,12918112728318814488,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,9625420914415815765,12918112728318814488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,9625420914415815765,12918112728318814488,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9625420914415815765,12918112728318814488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9625420914415815765,12918112728318814488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9625420914415815765,12918112728318814488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,9625420914415815765,12918112728318814488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,9625420914415815765,12918112728318814488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9625420914415815765,12918112728318814488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9625420914415815765,12918112728318814488,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9625420914415815765,12918112728318814488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9625420914415815765,12918112728318814488,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,9625420914415815765,12918112728318814488,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
48KB
MD5fe2fffb59d3f5f513047ab77ac02e32a
SHA1c0ac1251c2c580ff3605a8a8f67f3656e4f6ad13
SHA2567d2b0c11856e5c3c6462e2b21c5b297e343adec008ecd352afbdc0581415b78b
SHA5129c2bb2cd0c65900e2f31612974edf6b13c1d648760464ebe054c13bc504c06cbdf8a145c86d5fba8639b9f000bb42ef9cd2f20b546b39eb6f41f4bbf419dea9e
-
Filesize
112KB
MD5fed8b4331f90bcb90580d8678d82be0d
SHA11182b694bbc8492e203db1beee9ff5fdb845ce73
SHA256ac4c621049dc361a4bac3e64e8ace195a10c323a506053a89e196a69631d22a1
SHA51290e45956e050ed3ccdad81f7aab8a4f8fe5536b5d6ad3769c9269e6fe36d4778f252ff6225c91da383261f0fe7616ee60dd733fcb94164a1660a21c2b3980bf7
-
Filesize
237B
MD5b816c2209a66fe743f9dbe289d77ab33
SHA154ac7e63276476f2eb93af9b49d3422b53563926
SHA256cd85b0b9610f7aa504921569b42ff219b7d3089a8e696d60a5ec6cceec8edf8b
SHA512d91a826987f597e59c7a99d7c8be66054c95b0e232827491796e331a8210ed5a25ffaff6e98e019c248c765593e80ef5f4e7b224d77e989f458d3c4756306acc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD53c55886e1340c00086f77492559dd33c
SHA11e4ff34fe06f8e20607e120f7d9ec007da127c3e
SHA256194f1bb2cc50b9e9d829aae26a1d333f2e6402491e3fcb330e07071e371744f1
SHA512d64343e2de277f35dc46b82f0b4ae09394fef2ff77853eb39eacd7437e2e50af83b9c2c94fa8d4525a009b78040b0b7d66e4fcb43852c58998e2d46c38dba538
-
Filesize
862B
MD5013faa6eec8ef64965480e49dfe9cab7
SHA111fce9f74f8d89caa730caf6702a812907e993a4
SHA25652583d0ec233199cc7029146bfeaa0ff94e152ec525ef7115bbaace240204d2f
SHA5124f664551075728919ad95b426c4dec221b10f555f80d87ff4d6e15eab1c50c60f0b83afab89a2a055a517b68833eaab4b421b44829453726cbe026c283a43a51
-
Filesize
5KB
MD5f7eb69861722b7bae73b1a39d3f4782f
SHA1aa3f776d56c3622f041389acbcfb68a983db47c6
SHA2567e548e203c6de392045d018370e2d2d93381eb3b26dec9de65c7412576417599
SHA5122d34bf330942bda93168d6cf90ed8a1f23d462ea63d11ce4eb83489de8ddd593e7d9e032d13aaee3d6157edb35565a98f246a9307ff603730516f52c2b15bad4
-
Filesize
6KB
MD55e5555fc396433fe26f8b112080448dc
SHA1c2c5f541e2f428ccf1023e7baa3250f40a7c446b
SHA256026d9fbcee366e07abec9eab795dd3aedd29acf79bdc0cbd5b741178435cfea2
SHA512235ea3f376b5409e013860bf05c02c33d5c766b2b74b8a84e402df94df84141b75d53d0566850da00f8e4a70320a6d9ab3eaec9ee458e1f61b517596bd6c8365
-
Filesize
6KB
MD5c4a516f1d6725a7d733aa8ff919691a6
SHA1c7f919c70dbfb310dd1ee8ac9a250d32a57c51e2
SHA2561855f307c4233208358c799cae7f2e1feb0d61eef4d4fd7317d2cb66b1c1c63c
SHA512ee208d6f1444c9a1a00910306a37f7605f8ae1c910bfbc7ece8ef70c46e1c73a8fcbb14f0445c591e4219bc443ad63a1e990c2072cbddd0e32d89bb9b8aefefa
-
Filesize
370B
MD53af8262c6dd5c95243b4aef9c9c091c3
SHA144e6cb067999ceb03c25fefe370359b40a242d85
SHA2569293d9e22f4b1435b8db1c36cc728626b917a91cdb698a6b265ea364b7f0847d
SHA5123f2c8dc6a5744a1699fe6ca4232f510c2ea00f201f20f94f7dbeba8c15e0e5ced02f98303d26e25f929b4d8cc04285f23d100554530948098fc116748bae950d
-
Filesize
203B
MD55d2e5afe7040495f7fe0352bcf5df162
SHA1dab73c5c3bc222b11ed5d315199a3b55f45f88c7
SHA2569857a3fa41ee925b5ae5f6714d8c40c1a228689868d10f064be8d19fbcf04f36
SHA512f634ad8c6b794bdad52dc84be2b7a0a41569b3bde54349a1ec741722edc1314d3a29845b9dc02e086dcf6e25c79157e8eafb42a82ba5c5c123dbe31bd19820a9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5733416bb99b60f45c867354da3fd8ab7
SHA13f815144a6f53e7961c87f86c733c774d866d276
SHA256659e28244e71f8ee1d71d2a12d0e780900a465b14897acb834d6b9a6f1fc9e57
SHA512de2d84bcf8163ae21953eb9cceb06b21c8c71ad620fb7cf059457d587f85a0457da399e1edbb73ed71dd2a16944baef9feb2ade3ea35429b1704d3046ba763b1
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84