Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
6086ca33232e254557f65fbae5cc422a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6086ca33232e254557f65fbae5cc422a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6086ca33232e254557f65fbae5cc422a_JaffaCakes118.html
-
Size
175KB
-
MD5
6086ca33232e254557f65fbae5cc422a
-
SHA1
5fb7c1d0ba1ba8037ed3a5ee456e0d2aa4de0fec
-
SHA256
1944f78ae6a601fb8321652ee70a5ceb7a1d14ef9e46b46c9ec1e2a3990f0c79
-
SHA512
ef9a6140f5cb494fec06a832165efcb1f2f80a4a38eda56cb42fe13292c8c72d69129197eec7b60e39e4c2c8fe649843cfe27a2695df1858e9765aa4343b8aa9
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3uGNkFBYfBCJiZq+aeTH+WK/Lf1/hpnVSV:SHCT3u/FUBCJiJB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2412 msedge.exe 2412 msedge.exe 4036 msedge.exe 4036 msedge.exe 4564 identity_helper.exe 4564 identity_helper.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4036 wrote to memory of 2340 4036 msedge.exe 82 PID 4036 wrote to memory of 2340 4036 msedge.exe 82 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2356 4036 msedge.exe 83 PID 4036 wrote to memory of 2412 4036 msedge.exe 84 PID 4036 wrote to memory of 2412 4036 msedge.exe 84 PID 4036 wrote to memory of 3344 4036 msedge.exe 85 PID 4036 wrote to memory of 3344 4036 msedge.exe 85 PID 4036 wrote to memory of 3344 4036 msedge.exe 85 PID 4036 wrote to memory of 3344 4036 msedge.exe 85 PID 4036 wrote to memory of 3344 4036 msedge.exe 85 PID 4036 wrote to memory of 3344 4036 msedge.exe 85 PID 4036 wrote to memory of 3344 4036 msedge.exe 85 PID 4036 wrote to memory of 3344 4036 msedge.exe 85 PID 4036 wrote to memory of 3344 4036 msedge.exe 85 PID 4036 wrote to memory of 3344 4036 msedge.exe 85 PID 4036 wrote to memory of 3344 4036 msedge.exe 85 PID 4036 wrote to memory of 3344 4036 msedge.exe 85 PID 4036 wrote to memory of 3344 4036 msedge.exe 85 PID 4036 wrote to memory of 3344 4036 msedge.exe 85 PID 4036 wrote to memory of 3344 4036 msedge.exe 85 PID 4036 wrote to memory of 3344 4036 msedge.exe 85 PID 4036 wrote to memory of 3344 4036 msedge.exe 85 PID 4036 wrote to memory of 3344 4036 msedge.exe 85 PID 4036 wrote to memory of 3344 4036 msedge.exe 85 PID 4036 wrote to memory of 3344 4036 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6086ca33232e254557f65fbae5cc422a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa270646f8,0x7ffa27064708,0x7ffa270647182⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4408574996777435956,14706004472396988401,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,4408574996777435956,14706004472396988401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,4408574996777435956,14706004472396988401,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2488 /prefetch:82⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4408574996777435956,14706004472396988401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4408574996777435956,14706004472396988401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4408574996777435956,14706004472396988401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4408574996777435956,14706004472396988401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4408574996777435956,14706004472396988401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4408574996777435956,14706004472396988401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,4408574996777435956,14706004472396988401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:82⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,4408574996777435956,14706004472396988401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4408574996777435956,14706004472396988401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4408574996777435956,14706004472396988401,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4408574996777435956,14706004472396988401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4408574996777435956,14706004472396988401,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4408574996777435956,14706004472396988401,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD58a6c14d3c559a9b11b25abbdb371cd19
SHA1de72cadc171579660093fa028b30a7e43e1d7563
SHA256c9ffb885952d20919c0eeb240a1fe0202e791c06af362e1f1ae5216b7b6bc7aa
SHA51235fbeaaeebaf2ff8aec35e4c192fafc93dc9cd6223a4234208d58f686adbf91af8fe887f6ac11280c84176783cf0891ed40168b51485bc411d52adc0aaced18b
-
Filesize
2KB
MD51e1eecd1758d87377c333dd1df297c29
SHA1c4e4551bf7a95c478a7496e34c7064a150a34463
SHA256769815a95bd3cf722c0c2c717e39fb62499624592f69e1cf20139bbc77ed2f6b
SHA512b5ef1ff2645e93c325d4390ea3d807ef859d438da915ff91bef10bc0c26d14fb30ac99035ee49bd8c6ec5bbd0098cdaffdb8f99bbf80bf145ce19ca0ad1599c0
-
Filesize
2KB
MD51e202d6baf7bcbcf2540a26d760a72cd
SHA197de290c16a24f7ef94e5f1549a66f4397249a6e
SHA2566f85c44df7e18105195af6fd14ec8b3a7bcb7241a380a5d1ac9ceabb3d7ed210
SHA512a6d519dead61ce2ef4766cf0db7b0f1a7077cd17309b4e49022940a350c716bf6888fee4c028545d40b218893d99c128628f214e1886e0f6c718fe960291fba4
-
Filesize
5KB
MD53b417e409de98b265ddc1f51140b2c3e
SHA1544772c50b365fe225510d019a7be574974d0546
SHA25632113a6d5f6374747b3e65a5d621bde85027cefbc99d8637970ff8531b990854
SHA512434e9d20f5298e8a30183f8d50f784dbf11e669842f1bbe724d0d008cb21486e4713c5d30ea70cc63a855ccf54e52039d7411e5ac706a9eec9f9cce4f8fe384b
-
Filesize
7KB
MD51bd9be94af5af5d5fc4bceaa38810b90
SHA1043b51f5ae05092964aba3ecb4208e3e387f7cd4
SHA25618e09c0f213b6962bcd2add5439b389172b4087a7556524af6442b80b0566a11
SHA512f91c2d51cccb067baa3e37829d34ed664e55f9792f64d077f32b6642a9450767e5d0293e508d19cbf6d65e5841932781d21b2df1b73f7951803d85e514e1bc15
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e443257e394d42a4ecf9c5d8f5bcfff1
SHA14ce123d4fd923f21fce1e7fe2dd27b2d1ddd7f36
SHA2563952f0ddeb02c033dc1d37713658824198f939d9131c9b97919291e0bc67a665
SHA512890d5c6cc7cf6e861e5bf2ab4a06d3a5d43ff95f8a0e7ff2bd0faffa8aad35dc92c0002cc7dd037273ae5ff169b3f06336630304334addae62ee5e012999b38f