Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
417328289b91abccf1c30165e4799541_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
417328289b91abccf1c30165e4799541_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
417328289b91abccf1c30165e4799541_JaffaCakes118.html
-
Size
175KB
-
MD5
417328289b91abccf1c30165e4799541
-
SHA1
4911911adf949ce81b1e492cd2c992736ade6d8e
-
SHA256
685952f597c204e8b8acb4f7f8437986390f443793fcd02d5fe58570e74d0005
-
SHA512
639c06fcf4cabe9ddf9892d5020a4529254b7d5c1fd1f715e816c360d9167f68d25f99e4ee2bb093cfda6b2127356e16c2e8098ff6bb751a116d19ea452e5f18
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3QGNkF4YfBCJisw+aeTH+WK/Lf1/hmnVSV:SOoT3Q/FdBCJiSm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2628 msedge.exe 2628 msedge.exe 4816 msedge.exe 4816 msedge.exe 208 identity_helper.exe 208 identity_helper.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4816 wrote to memory of 4360 4816 msedge.exe 82 PID 4816 wrote to memory of 4360 4816 msedge.exe 82 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 3312 4816 msedge.exe 83 PID 4816 wrote to memory of 2628 4816 msedge.exe 84 PID 4816 wrote to memory of 2628 4816 msedge.exe 84 PID 4816 wrote to memory of 4728 4816 msedge.exe 85 PID 4816 wrote to memory of 4728 4816 msedge.exe 85 PID 4816 wrote to memory of 4728 4816 msedge.exe 85 PID 4816 wrote to memory of 4728 4816 msedge.exe 85 PID 4816 wrote to memory of 4728 4816 msedge.exe 85 PID 4816 wrote to memory of 4728 4816 msedge.exe 85 PID 4816 wrote to memory of 4728 4816 msedge.exe 85 PID 4816 wrote to memory of 4728 4816 msedge.exe 85 PID 4816 wrote to memory of 4728 4816 msedge.exe 85 PID 4816 wrote to memory of 4728 4816 msedge.exe 85 PID 4816 wrote to memory of 4728 4816 msedge.exe 85 PID 4816 wrote to memory of 4728 4816 msedge.exe 85 PID 4816 wrote to memory of 4728 4816 msedge.exe 85 PID 4816 wrote to memory of 4728 4816 msedge.exe 85 PID 4816 wrote to memory of 4728 4816 msedge.exe 85 PID 4816 wrote to memory of 4728 4816 msedge.exe 85 PID 4816 wrote to memory of 4728 4816 msedge.exe 85 PID 4816 wrote to memory of 4728 4816 msedge.exe 85 PID 4816 wrote to memory of 4728 4816 msedge.exe 85 PID 4816 wrote to memory of 4728 4816 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\417328289b91abccf1c30165e4799541_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc76fa46f8,0x7ffc76fa4708,0x7ffc76fa47182⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,18427694374319143535,3916640934561964972,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,18427694374319143535,3916640934561964972,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,18427694374319143535,3916640934561964972,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18427694374319143535,3916640934561964972,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18427694374319143535,3916640934561964972,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18427694374319143535,3916640934561964972,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18427694374319143535,3916640934561964972,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18427694374319143535,3916640934561964972,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18427694374319143535,3916640934561964972,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,18427694374319143535,3916640934561964972,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:82⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,18427694374319143535,3916640934561964972,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18427694374319143535,3916640934561964972,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18427694374319143535,3916640934561964972,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18427694374319143535,3916640934561964972,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:5196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18427694374319143535,3916640934561964972,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:5204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,18427694374319143535,3916640934561964972,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD59d3967cddd72e1f92286c95490245838
SHA1c7be9cbcdf0b1b2e3605d9824b6f402f54bd2191
SHA2562a870c4453614f8492048e63521d81927b3c52a5af801892b2e22daf14e395a0
SHA512f4920963a4b1bf52d8dac04e056d177bb18b5136f2ec538c804fe2c21c9e2412a09892c8f1c4275e77d3560567a76c6a689cc2ea236a777b940b173e17287b0e
-
Filesize
2KB
MD5483a4ebb3cd1a5b5940eb0d5452a710d
SHA185e9eda865286ba0ca34c6947d49ce8f6a87cba5
SHA256a641c1339d3d3fd3be6406de1a07c8d2f52c71ba9fe192c391659c849e42556a
SHA5129a7e3f2b544b43803b446c3791247402ddcef590c6105098227599346903e8c8cd88c821e35d437bab4473b202c7d05a2dbf21ee707b95919c61a0952409fc0f
-
Filesize
2KB
MD5f86dc45b2dee2980a67fa36e2a5cfe26
SHA1f4d405b0cd11a600d15cb503434e564e0db1c692
SHA256d4be8c5ea06862a2bbeffd3ff1b6febd953bdbb5ab880dc4fe4518313f57076b
SHA5128b50957aac338820d3df6ba16d576ef555fd7cd14e92db71c650df2434516151f60cc99c4bb9f25e96a1574c74cd36cf5d9d991d47e84d1bf8853e006de4632b
-
Filesize
5KB
MD59876a0f746a854c9d77c634cc917a1f4
SHA1bac72322b03cd8305ff3a96a6160e2ae8a4c4347
SHA2563ed5c3f71d3f00d7eed28b571be58a55041200d7e47e7e2ff84d2f7fcc29225f
SHA512fa5b3e209d223b0c4908e649de5c41ac9938e26011391c6a7dc7516f5b6733971fa0c613f77c493d1ea7728dadac77b940f6d721e4c761b7e7322614c1dd3992
-
Filesize
7KB
MD59217c898ca204ef5e9c828a9dddf608c
SHA14dda95ae518d7facfed02b33dd743f2fd80d4e32
SHA256ef02512c391173055bf9d621b5ce9488f9cca9981c9a8048aef028735157ec5b
SHA5124becaede108338d583e14bf563a7f46ce383237207c24c1be60ba545087d2ce57c4ec92e8636607bd7b6755eb1cc5e828c40a9e91a1583be6c6b85154cd3be6c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5555762fc1e636d1f830624218305e7bd
SHA15c291fc86ad51cde89cba7612c8b7506f79db0ca
SHA2560446fd96192845913ff1343895ebfa4aa877e27d192eab76f943a104cb72c364
SHA512e4b2d26e9307c79e1ffab6fc140a58edb94d629d41004314216507aec0593214fd08f2bda5c56e9eae825c3b9f6446671bb616da43dab13adf852b7bec83a506