Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 00:03
Static task
static1
Behavioral task
behavioral1
Sample
c1dde86d06d33558aa2f501460f1bec0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c1dde86d06d33558aa2f501460f1bec0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1dde86d06d33558aa2f501460f1bec0_JaffaCakes118.html
-
Size
175KB
-
MD5
c1dde86d06d33558aa2f501460f1bec0
-
SHA1
1581b94b8e42d7aa7d4d53440d13cc5c87227360
-
SHA256
9f75b224dfc58b9760625664f22eb46219befde00a332a5e447024dd32222275
-
SHA512
8bf45d0616b4f2997edef9ec988cbd41fd97c368147afbb679d78c1557fb841e97d111e26b23cdb99daaeead05d27458c261da5853babf4b788700144bea985b
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3eGNkFnYfBCJiZH+aeTH+WK/Lf1/hpnVSV:S9CT3e/F2BCJi6B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 1464 msedge.exe 1464 msedge.exe 4976 identity_helper.exe 4976 identity_helper.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1464 wrote to memory of 3600 1464 msedge.exe 84 PID 1464 wrote to memory of 3600 1464 msedge.exe 84 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2720 1464 msedge.exe 85 PID 1464 wrote to memory of 2140 1464 msedge.exe 86 PID 1464 wrote to memory of 2140 1464 msedge.exe 86 PID 1464 wrote to memory of 4268 1464 msedge.exe 87 PID 1464 wrote to memory of 4268 1464 msedge.exe 87 PID 1464 wrote to memory of 4268 1464 msedge.exe 87 PID 1464 wrote to memory of 4268 1464 msedge.exe 87 PID 1464 wrote to memory of 4268 1464 msedge.exe 87 PID 1464 wrote to memory of 4268 1464 msedge.exe 87 PID 1464 wrote to memory of 4268 1464 msedge.exe 87 PID 1464 wrote to memory of 4268 1464 msedge.exe 87 PID 1464 wrote to memory of 4268 1464 msedge.exe 87 PID 1464 wrote to memory of 4268 1464 msedge.exe 87 PID 1464 wrote to memory of 4268 1464 msedge.exe 87 PID 1464 wrote to memory of 4268 1464 msedge.exe 87 PID 1464 wrote to memory of 4268 1464 msedge.exe 87 PID 1464 wrote to memory of 4268 1464 msedge.exe 87 PID 1464 wrote to memory of 4268 1464 msedge.exe 87 PID 1464 wrote to memory of 4268 1464 msedge.exe 87 PID 1464 wrote to memory of 4268 1464 msedge.exe 87 PID 1464 wrote to memory of 4268 1464 msedge.exe 87 PID 1464 wrote to memory of 4268 1464 msedge.exe 87 PID 1464 wrote to memory of 4268 1464 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c1dde86d06d33558aa2f501460f1bec0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbf51a46f8,0x7ffbf51a4708,0x7ffbf51a47182⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,15963894695936609409,15188698959797358687,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,15963894695936609409,15188698959797358687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,15963894695936609409,15188698959797358687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15963894695936609409,15188698959797358687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15963894695936609409,15188698959797358687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15963894695936609409,15188698959797358687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15963894695936609409,15188698959797358687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4272 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15963894695936609409,15188698959797358687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15963894695936609409,15188698959797358687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,15963894695936609409,15188698959797358687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,15963894695936609409,15188698959797358687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15963894695936609409,15188698959797358687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4296 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15963894695936609409,15188698959797358687,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15963894695936609409,15188698959797358687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15963894695936609409,15188698959797358687,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,15963894695936609409,15188698959797358687,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5fb3151b382103cb728f3644059415487
SHA16886c3d7aa99522b4c5b14ba1cefad008e28eb78
SHA256d86f7904852657b40cac815d87b257be5a5c495ab719556a0f406027e4534e3f
SHA51209a3e49bb1e558f56ff615dde9f08fd5ff0a2ba20de129084b342763f563e1e24946019c1d9b5f2e6d65e11be74c0232783e59daf611054caa8b1b5b14c483bc
-
Filesize
2KB
MD5dfd83347837cfe82ecb09198e8879106
SHA12a927ccb40bc079eb3b1ced07b3b5417147a6c9d
SHA256f2f9b18bb9f584eedb0ec55c499e8d0262168ac8ef904f634dece7187bd11efa
SHA512ab8deb815836af4934fd8f4df7212aeb53c72014f2b2a8233235f4a0737aa6b709f793c5447ae5e97b2d85ae6e839a88a9789d160678b4f78c8aa56771788121
-
Filesize
2KB
MD561d33634672c7e6d4536580715610a8b
SHA169ffa82694c79d41378da22ef5d4885d7008fd11
SHA256d915b79a1a3d5b407db13f06ecb9f1e4b98f0ccd3e5e6019f0b68019a1fd398b
SHA512cb31b878dc477a3a8440579684af93a0a98c12bea8193d21f0a29a0c6328615df6079195c8edcd636da95702d2a2eb92cc79e9578bd9087099660ff6b3ab679e
-
Filesize
5KB
MD5f7a091fb559b0700d8335917444e677d
SHA11024807c04c5f06e6b0e0b3ca65fb27579240a2a
SHA2568bd708b68ba5fb6d02242621f5a771da11c200f1dbb7ebf40420384d17963235
SHA51224754a98d04bbd6c6951e176d59dd3e8b5973f836e7f66577fef72d1388e4de9d03b5b36028423e56f36823667dd7c4b9239f1d9aa7ecfd4996395e78cbb6e9c
-
Filesize
7KB
MD5697bd9ed5c4478cb8a8ba897beef3f83
SHA1772512ed6926b8a68a55c494caa4c74918e0d098
SHA2569e096cac41bfe87f3ad0a2ccc74e66b63bdfc28ba807759ceb1860399b3024d0
SHA512cccfa0dbf7b00cacceb0412522b40ebc45d799fc678e6fab8a87c048e4a28dfabc111ea7459b30af0016d82bfb6ec1b43624d6638e64681a90103d964fdc4150
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52fa54b97e1ac469c4a2672ec90f9dca6
SHA1d74849c422a50966c449e914ee827c2dfb8ccc5e
SHA256343bc4a41b80b336d87a5a948a7909cd43be427d5305b280e254483a51296787
SHA512dc392043f67e8f913e1eba9e07fbd54ff787a02bf1a0239f0d74b4567d97d3163d76bca197ca7135f5964ac15f1e927a64d3ef2f9f1f23f8e9f8122eb7e41be4