Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
a6799d63169c655f9110b66f7db6871a_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a6799d63169c655f9110b66f7db6871a_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a6799d63169c655f9110b66f7db6871a_JaffaCakes118.html
-
Size
175KB
-
MD5
a6799d63169c655f9110b66f7db6871a
-
SHA1
050b005ed782cf0e77261d1e9865247abcb49ba5
-
SHA256
b4fa431eff683b667162785d1421ae1865d5c630c1143274bcb7770de2c4e786
-
SHA512
11fb851bbaa262225d58a4e8a0c87d45cc56c1d2b85b41bc217985d51f00453c256ac4ccbc359b379f9cc2a9062717770b43d2d1a898ec505015bbda3f82a256
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS3RGNkFgYfBCJist+aeTH+WK/Lf1/hmnVSV:S4oT3R/FVBCJiZm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1524 msedge.exe 1524 msedge.exe 4780 msedge.exe 4780 msedge.exe 1704 identity_helper.exe 1704 identity_helper.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4780 wrote to memory of 2960 4780 msedge.exe 81 PID 4780 wrote to memory of 2960 4780 msedge.exe 81 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 3068 4780 msedge.exe 82 PID 4780 wrote to memory of 1524 4780 msedge.exe 83 PID 4780 wrote to memory of 1524 4780 msedge.exe 83 PID 4780 wrote to memory of 336 4780 msedge.exe 84 PID 4780 wrote to memory of 336 4780 msedge.exe 84 PID 4780 wrote to memory of 336 4780 msedge.exe 84 PID 4780 wrote to memory of 336 4780 msedge.exe 84 PID 4780 wrote to memory of 336 4780 msedge.exe 84 PID 4780 wrote to memory of 336 4780 msedge.exe 84 PID 4780 wrote to memory of 336 4780 msedge.exe 84 PID 4780 wrote to memory of 336 4780 msedge.exe 84 PID 4780 wrote to memory of 336 4780 msedge.exe 84 PID 4780 wrote to memory of 336 4780 msedge.exe 84 PID 4780 wrote to memory of 336 4780 msedge.exe 84 PID 4780 wrote to memory of 336 4780 msedge.exe 84 PID 4780 wrote to memory of 336 4780 msedge.exe 84 PID 4780 wrote to memory of 336 4780 msedge.exe 84 PID 4780 wrote to memory of 336 4780 msedge.exe 84 PID 4780 wrote to memory of 336 4780 msedge.exe 84 PID 4780 wrote to memory of 336 4780 msedge.exe 84 PID 4780 wrote to memory of 336 4780 msedge.exe 84 PID 4780 wrote to memory of 336 4780 msedge.exe 84 PID 4780 wrote to memory of 336 4780 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a6799d63169c655f9110b66f7db6871a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdab7846f8,0x7ffdab784708,0x7ffdab7847182⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1768,12563129559526750317,4477197518479008755,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1768,12563129559526750317,4477197518479008755,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1768,12563129559526750317,4477197518479008755,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,12563129559526750317,4477197518479008755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,12563129559526750317,4477197518479008755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,12563129559526750317,4477197518479008755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,12563129559526750317,4477197518479008755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,12563129559526750317,4477197518479008755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,12563129559526750317,4477197518479008755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:5848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1768,12563129559526750317,4477197518479008755,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3360 /prefetch:82⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1768,12563129559526750317,4477197518479008755,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,12563129559526750317,4477197518479008755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,12563129559526750317,4477197518479008755,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3924 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,12563129559526750317,4477197518479008755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:5132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1768,12563129559526750317,4477197518479008755,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1768,12563129559526750317,4477197518479008755,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5144
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5a07fa178d411ec433ae81646e039e190
SHA1af0e85cbae25695d2e0c8f786595ee3c9d1e2108
SHA2562c2e48a2ab9476f6c8d4aba91010e27772c41f194f0c91ffc723482c5b08b5f1
SHA512134ae6afea4980453ef47d498906c645136634ba91bcb50a4fe464121c5ce17bb13d0bd8c83823a7037480d3c4d2a64c39098b302c561cc23c05057476721fdd
-
Filesize
2KB
MD55cb9fc5eddb9dfa9d19e294babfbb139
SHA19759c84312d5cafba227137a2a2fe90bf7c49549
SHA256005501aa2cb9ea51068f25a1005ea6f13e19b8cb8dcbe842aa50142a5807a3a3
SHA512799cce91264a936bf5f9bf213fdce4c1243c44280a2748a2c548aa019443f94ff45792055f7a5d4b9b54920a8708f626bf54a0de3bbd19980a7d79f5809dcfe5
-
Filesize
2KB
MD506f3732191c3ec27a60a773d20fd666f
SHA13054e0dc75c08bf5948bb379828f3ed52e250a18
SHA256fc8de99b6f362799f62c18553059ba6bbd263af430c225981d77a8d9963a88bc
SHA512f85c7778300fc7652294c825eda26ee6bb4cdadb8f1607765d35082b659ebceb22e08ca4f63a80d42834fc28ecffe6ad8f11ee5f6a0ce10a3d2b54516ea6e1df
-
Filesize
6KB
MD5d1f465d9feeb226a791c0e7f2542ccf1
SHA18df01abce2743cdd25f01e45ba6e4345f6735b26
SHA25611be64d92a003881c4decce49f2fbc3156cc694f76fc69632be89351f678bc87
SHA512da3a1fe619cbeeffc7d14c4c615291bd64731c767cc3573bf1df85f40c446d95e8d97c9f5daee8d7042dd4cd7752d36ce44aac090c52d448592d34db336a4df3
-
Filesize
7KB
MD55f52c3e960b313ec74f351aadac6cd96
SHA1b9a54d9493f9225c0f0f10145700c75fe74cf40a
SHA25660c381686c71df0c4e979266fe861671ced95c683974ef8f4ab7a46fd515043f
SHA512bc8d75a3dc922c597f0e2b13f22154d8ee97fdddc6f33653efefa9dae76bfb6be45ebaef26ac39337155d23052efcc3ec2c71a39bb1effb12e3b2fd7a6b0902f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57c41aa4fbff09c6b225a186cd4c457e5
SHA1c77ba676294f80cf3204fa010f1cd4a22adfb8e0
SHA2567fba41c32807256e195a5ec86cb7ff913cf9fa4688b2b359d34b84b97d9b9951
SHA5122e07342eee1d5780a82859b79e2eb969ef688fd24d5965fb6a420ba4bd34bdf1d14a77a4929bbbb02716af0afdf4499d27f319ecd02793d75636682d0b1819c6