Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
842e20b59068c7ab4f439ba0a3febe1c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
842e20b59068c7ab4f439ba0a3febe1c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
842e20b59068c7ab4f439ba0a3febe1c_JaffaCakes118.html
-
Size
13KB
-
MD5
842e20b59068c7ab4f439ba0a3febe1c
-
SHA1
b27e03d569a0eee116fd52418ea05c03e7f76831
-
SHA256
c9e3812e9f3e15e9f425bb3fcc94b71e48c1663d9061f36ca9570a30d2eb559e
-
SHA512
6ba1e489d1e17f8427e3bf240177e83d17f429ae4c5720c1c20b1d68167c372647fbb1d0566f59f0ff028978c23ea035832092e6058a7693031a0bdfebf0d8e4
-
SSDEEP
192:I8/hz5jc2UeEwgMHfhCTKEinaY2RbWnZ+eAujSKA/gfozYMlmP3KTAL3E2:TPc7cJCT4naYCWnkeAueKAYozlJ2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2212 msedge.exe 2212 msedge.exe 3068 msedge.exe 3068 msedge.exe 2288 identity_helper.exe 2288 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3068 wrote to memory of 4628 3068 msedge.exe 84 PID 3068 wrote to memory of 4628 3068 msedge.exe 84 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 4312 3068 msedge.exe 85 PID 3068 wrote to memory of 2212 3068 msedge.exe 86 PID 3068 wrote to memory of 2212 3068 msedge.exe 86 PID 3068 wrote to memory of 3928 3068 msedge.exe 87 PID 3068 wrote to memory of 3928 3068 msedge.exe 87 PID 3068 wrote to memory of 3928 3068 msedge.exe 87 PID 3068 wrote to memory of 3928 3068 msedge.exe 87 PID 3068 wrote to memory of 3928 3068 msedge.exe 87 PID 3068 wrote to memory of 3928 3068 msedge.exe 87 PID 3068 wrote to memory of 3928 3068 msedge.exe 87 PID 3068 wrote to memory of 3928 3068 msedge.exe 87 PID 3068 wrote to memory of 3928 3068 msedge.exe 87 PID 3068 wrote to memory of 3928 3068 msedge.exe 87 PID 3068 wrote to memory of 3928 3068 msedge.exe 87 PID 3068 wrote to memory of 3928 3068 msedge.exe 87 PID 3068 wrote to memory of 3928 3068 msedge.exe 87 PID 3068 wrote to memory of 3928 3068 msedge.exe 87 PID 3068 wrote to memory of 3928 3068 msedge.exe 87 PID 3068 wrote to memory of 3928 3068 msedge.exe 87 PID 3068 wrote to memory of 3928 3068 msedge.exe 87 PID 3068 wrote to memory of 3928 3068 msedge.exe 87 PID 3068 wrote to memory of 3928 3068 msedge.exe 87 PID 3068 wrote to memory of 3928 3068 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\842e20b59068c7ab4f439ba0a3febe1c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4a0046f8,0x7ffd4a004708,0x7ffd4a0047182⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14205369731267592272,10131463945355310103,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,14205369731267592272,10131463945355310103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,14205369731267592272,10131463945355310103,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14205369731267592272,10131463945355310103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14205369731267592272,10131463945355310103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14205369731267592272,10131463945355310103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14205369731267592272,10131463945355310103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14205369731267592272,10131463945355310103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14205369731267592272,10131463945355310103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2220 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,14205369731267592272,10131463945355310103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6196 /prefetch:82⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,14205369731267592272,10131463945355310103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14205369731267592272,10131463945355310103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14205369731267592272,10131463945355310103,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14205369731267592272,10131463945355310103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14205369731267592272,10131463945355310103,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14205369731267592272,10131463945355310103,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 /prefetch:22⤵PID:2572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3144
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:32
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9012ef35-6ffe-4db3-b75b-c4d41d8fcab7.tmp
Filesize6KB
MD57bc31f01e89040f8433ea8caf7a5dce7
SHA190790fbf25c479654b9a7bac47c0d3710eb34562
SHA2568e5dd23469c22eca720ed60fa954eb10bc1b1f1311ead9cbbb3ff6a78adb69e2
SHA5120099e0392f209b6eaf0fa59f64ca1b82eecf7317a82429e972de5bb345f2de51162172392792dfcbd0bd3f63e15c23728513c5c95a661eefc0f4ef2a397d62e2
-
Filesize
210KB
MD548d2860dd3168b6f06a4f27c6791bcaa
SHA1f5f803efed91cd45a36c3d6acdffaaf0e863bf8c
SHA25604d7bf7a6586ef00516bdb3f7b96c65e0b9c6b940f4b145121ed00f6116bbb77
SHA512172da615b5b97a0c17f80ddd8d7406e278cd26afd1eb45a052cde0cb55b92febe49773b1e02cf9e9adca2f34abbaa6d7b83eaad4e08c828ef4bf26f23b95584e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5088a0b0821fde6942811dc507d3e61b4
SHA1998dbe3d2a449485794f45698e382ac5bd9c88b9
SHA25653d88233226370215306419fcda877db36da02c12ddb984e0872270e39b53356
SHA512afb099ecbde383eae0a6465cb989bfe37399d30ef9c67b1df68b06e780da45f84c8dabff521247be8f5ef15543f41665d06b879d2a72be558e50af512b5bd95c
-
Filesize
1KB
MD504d197af357b1f4f8bbc99b22b235d2d
SHA182bbc8129f1c8de1230b13fa52abba26d379d63c
SHA2563d09d230ce9a80f627f8becd15f58c830b2de7a5d9deed941a240e6007f932fe
SHA51266faae8483b0cebb9ea4508cf298878dcb6deae9b87d4f6c7d424e055bd7ed6fbdc63f9814b39dd5afb3504507c8109e6002ef51ed77840736e56da89dd82beb
-
Filesize
6KB
MD52f66c39ff2dd9cc2a5897202d70f6592
SHA1e32beb35e91c93291256bb60a9e7ad8c9b018663
SHA2566a4524a9ba034cecd3551332bbd0ea8781cc3fcd669b70fcbb1f54043d81cf3d
SHA512b436e4059cd2ffe902797db928abc7ab14c55f6c51ddf9e6eeeff2ff872e989f0d42feef0a9dd5fce7e9fdfd1611c37a4bda0174174520b0696faa9957a2091f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57cacc6256c8f9e1a7d1552aba43204f8
SHA1e9d73b3cec6a972ed264fb429fee80b65386c391
SHA256e2f7ae1aafbc753a2bb5a10789d2de1b145b13905e5f0a7e433f12f32f485050
SHA512baadbbfda56bd5769ecab3d634330adecaec380d295e9defc5e1af703a115db0e289960329301b1e83219fdda3552a6b52668dbac7b62cc7dc3bbebf3425dcf1