Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 07:21
Static task
static1
Behavioral task
behavioral1
Sample
28e699da066765f8edeb524cc01e51e7_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
28e699da066765f8edeb524cc01e51e7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
28e699da066765f8edeb524cc01e51e7_JaffaCakes118.html
-
Size
175KB
-
MD5
28e699da066765f8edeb524cc01e51e7
-
SHA1
a226054af380f76dac9c926772385c06e44c7a39
-
SHA256
f740effe7ca31b89a09f50ea8b0fd3e5c177b96ec927f6b0f003a3d796452785
-
SHA512
a3e2ca79cea4caa071b834b6c564909140b2087bbcb2476564ab3b68448bab67067cad6bb16b03883ddf14dbd52461d05662f2d376d36d52f51639866dc7f3cf
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3AGNkFoYfBCJisjC+aeTH+WK/Lf1/hmnV+:SOoT3A/FNBCJikm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3564 msedge.exe 3564 msedge.exe 4488 msedge.exe 4488 msedge.exe 1484 identity_helper.exe 1484 identity_helper.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4488 wrote to memory of 3524 4488 msedge.exe 80 PID 4488 wrote to memory of 3524 4488 msedge.exe 80 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 1216 4488 msedge.exe 82 PID 4488 wrote to memory of 3564 4488 msedge.exe 83 PID 4488 wrote to memory of 3564 4488 msedge.exe 83 PID 4488 wrote to memory of 3508 4488 msedge.exe 84 PID 4488 wrote to memory of 3508 4488 msedge.exe 84 PID 4488 wrote to memory of 3508 4488 msedge.exe 84 PID 4488 wrote to memory of 3508 4488 msedge.exe 84 PID 4488 wrote to memory of 3508 4488 msedge.exe 84 PID 4488 wrote to memory of 3508 4488 msedge.exe 84 PID 4488 wrote to memory of 3508 4488 msedge.exe 84 PID 4488 wrote to memory of 3508 4488 msedge.exe 84 PID 4488 wrote to memory of 3508 4488 msedge.exe 84 PID 4488 wrote to memory of 3508 4488 msedge.exe 84 PID 4488 wrote to memory of 3508 4488 msedge.exe 84 PID 4488 wrote to memory of 3508 4488 msedge.exe 84 PID 4488 wrote to memory of 3508 4488 msedge.exe 84 PID 4488 wrote to memory of 3508 4488 msedge.exe 84 PID 4488 wrote to memory of 3508 4488 msedge.exe 84 PID 4488 wrote to memory of 3508 4488 msedge.exe 84 PID 4488 wrote to memory of 3508 4488 msedge.exe 84 PID 4488 wrote to memory of 3508 4488 msedge.exe 84 PID 4488 wrote to memory of 3508 4488 msedge.exe 84 PID 4488 wrote to memory of 3508 4488 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\28e699da066765f8edeb524cc01e51e7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa37e46f8,0x7ffaa37e4708,0x7ffaa37e47182⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,4280158805549919447,3486769668222451960,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,4280158805549919447,3486769668222451960,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,4280158805549919447,3486769668222451960,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4280158805549919447,3486769668222451960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4280158805549919447,3486769668222451960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4280158805549919447,3486769668222451960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4280158805549919447,3486769668222451960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4280158805549919447,3486769668222451960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4280158805549919447,3486769668222451960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,4280158805549919447,3486769668222451960,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 /prefetch:82⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,4280158805549919447,3486769668222451960,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4280158805549919447,3486769668222451960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4280158805549919447,3486769668222451960,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4280158805549919447,3486769668222451960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4280158805549919447,3486769668222451960,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,4280158805549919447,3486769668222451960,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD50c91c46d1d1442416b8b445f660dd455
SHA101b54675e833df47d46cba4260dfedc31fdf8cc0
SHA2566f74669389a88fbaf29b8e3d160cbf04cf71e24061913a601186009819de6390
SHA5124d4665e080a05dbe0335dd1d69a95cd24ce0c3ff1142f7c325fdb59f9f1aa31015cf890f0b597e6e0a0319cf363a866a9eccac87771a9a9518f36d28ba9f6501
-
Filesize
2KB
MD573b6ecef8d0e60228818c3a1251eba54
SHA189264d4f06ce577a9c047318017d99b63bbd42d7
SHA256eccd4fbeb93dcbf2a5583444d5ec73692ec1b9f034d14f9e1287886affc605d0
SHA51223ac5e8f0eb9c5d8503a11122ebf10f8239b3ef7517b631e76f1dca51ae0a22b5468a6bbd2017abff44d93d1545ee1d028deca5ca3d7594846e3edcb4127a4f3
-
Filesize
2KB
MD5e07715d987a9f47dd9f429b042ad9084
SHA127d1ef40c594eabcc3d6409e7bebaad69d2b7a34
SHA2564462d403e62ae3946949b0e61fbbc7618e2737359e3cd5ffee8d6a72da874540
SHA5124e221485d1cccdd714fdfb8a2f83ff2961141f040351f04424759f7d6dbc91e5fc83759d71013c0b0bc7cc9ff69e190e4847da04970a598b3f0a5a177acd5503
-
Filesize
6KB
MD5b3da3eb678dc5861dd4598094b9a9ace
SHA1f15a7e7a9c117d4f2aef57918db67961c79d44ed
SHA256f616dfafd7cb3c70d07d108e3190dd3d8729a6a20cadcba4826fa9befbb4dcc1
SHA51266215af513d8876d1c5219eaa21930f7c464d70f5dbba960444c54309cecb9e103b1dad2eeed0fd892a9f4fdbc68065f1d3517fae078c724949039be26379191
-
Filesize
7KB
MD536831fafcf9368aff467ffc7b7e8c3d5
SHA11e0bbf4d06f77cabd0f087350b61a9cbd5c334f3
SHA256893a9f68e870417482d5910a675bba1094dc52508af1d03b2271b30e06b77403
SHA51277a41e5edb7e78fe73fd9b55e6a7101ad0676b38dbf58dc5a2c5985c0f8f1fcd2c9577072ecf2b0c6a57dfc74392468ab76ed34d75a33411efdf35d53893d8c8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53d7ea17419ff60bb6c93924fb395d514
SHA15e82689807cbcc417d2fe2ca539bb31d106af21d
SHA256c1f03300fa3843e209af0d7b0e04fd7a0680295cd955f89b58f58b62c9d85c91
SHA512e52504c8cdeb6a8feff659846dfb85e542945ef7d89d185fd73312414aa57bd504f4558f71a67407506afbcc1a82297b08b712448a997b2a91a13e9629a52187