Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
37bc5cf38b126cc11730bbe310582b3a_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
37bc5cf38b126cc11730bbe310582b3a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
37bc5cf38b126cc11730bbe310582b3a_JaffaCakes118.html
-
Size
36KB
-
MD5
37bc5cf38b126cc11730bbe310582b3a
-
SHA1
0d308487af71cc801bb5da25aba066321d991d7a
-
SHA256
6c89a297c9dc0479dc213d1def4f6b44ed9991c9f3e741c6ca421ad6c65015c1
-
SHA512
950de7ebf5faba526ec53dc6979a802c5dcf57bddf3f16247000fae450fe9577d16e76db65316eebe10811eb3a33c8ff3e99b8e5a7d0bcd34d0550480d7886ef
-
SSDEEP
384:1btmysSWL7QmuJTGpO+p/Q3XxJfg5dAj14P9XfhtSGY8QBlYuMDAEEZP0o9x//64:1ZmynU8TEm9/CKfLDVafUkbq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1720 msedge.exe 1720 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 2816 identity_helper.exe 2816 identity_helper.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 532 wrote to memory of 1508 532 msedge.exe 83 PID 532 wrote to memory of 1508 532 msedge.exe 83 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 3580 532 msedge.exe 84 PID 532 wrote to memory of 1720 532 msedge.exe 85 PID 532 wrote to memory of 1720 532 msedge.exe 85 PID 532 wrote to memory of 2192 532 msedge.exe 86 PID 532 wrote to memory of 2192 532 msedge.exe 86 PID 532 wrote to memory of 2192 532 msedge.exe 86 PID 532 wrote to memory of 2192 532 msedge.exe 86 PID 532 wrote to memory of 2192 532 msedge.exe 86 PID 532 wrote to memory of 2192 532 msedge.exe 86 PID 532 wrote to memory of 2192 532 msedge.exe 86 PID 532 wrote to memory of 2192 532 msedge.exe 86 PID 532 wrote to memory of 2192 532 msedge.exe 86 PID 532 wrote to memory of 2192 532 msedge.exe 86 PID 532 wrote to memory of 2192 532 msedge.exe 86 PID 532 wrote to memory of 2192 532 msedge.exe 86 PID 532 wrote to memory of 2192 532 msedge.exe 86 PID 532 wrote to memory of 2192 532 msedge.exe 86 PID 532 wrote to memory of 2192 532 msedge.exe 86 PID 532 wrote to memory of 2192 532 msedge.exe 86 PID 532 wrote to memory of 2192 532 msedge.exe 86 PID 532 wrote to memory of 2192 532 msedge.exe 86 PID 532 wrote to memory of 2192 532 msedge.exe 86 PID 532 wrote to memory of 2192 532 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\37bc5cf38b126cc11730bbe310582b3a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc45b46f8,0x7ffbc45b4708,0x7ffbc45b47182⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,7499425175867425889,2108465353409553208,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,7499425175867425889,2108465353409553208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,7499425175867425889,2108465353409553208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7499425175867425889,2108465353409553208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7499425175867425889,2108465353409553208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7499425175867425889,2108465353409553208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4292 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7499425175867425889,2108465353409553208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,7499425175867425889,2108465353409553208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6596 /prefetch:82⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,7499425175867425889,2108465353409553208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7499425175867425889,2108465353409553208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7499425175867425889,2108465353409553208,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7499425175867425889,2108465353409553208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7499425175867425889,2108465353409553208,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6412 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7499425175867425889,2108465353409553208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7499425175867425889,2108465353409553208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7499425175867425889,2108465353409553208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,7499425175867425889,2108465353409553208,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5348 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD53dd6a9a86f0f244fd124fe3fd2b28f1e
SHA149820461bdf6daa6c2d4cbcdd10a27a14359203e
SHA256f36a213bd1ae623a796088946743b0f4480d1d8595f7f668c4d6f7b233134e61
SHA51233021ad78e29c109d82facf5e8b649e04087e64d1e52901db8c4209b52a44e77e747d5f4ae96595a4c2cb2aa6a43eedb1c21af6d76fa76628373d8157f25e879
-
Filesize
858B
MD50934e2454464ad6f5797a17b5bb928ff
SHA1bb91441a75ffdd40ed97cde6c1b864af08d6207e
SHA256b2e16124f4b878fbee46f1db955a9a7937796bfdb919e10c3c5c7549620556cf
SHA512a2f288a2300dfc593d901de173a513e1a05fe51cacc1238e1ddb1d8d584792d783d1780da38f78a79781b43860d41044a8d11be4eb033100b2f963c43f006b6b
-
Filesize
6KB
MD59c88e98f9c88048ffd5c80aa1251103f
SHA13eb2c4e13acdf4510a48c11598c46f139e3c8209
SHA256f24642ad04a2ec81a09ee35b3ab9977586df9b089af7163dda6c81f64362b01a
SHA512813948366f62de69d02b08fa458f6de309e461df622a2edfa71f9d21b53e0ba5193b619efdae9db294eb9ac437cfd8fdc10f397b4db3fa8ea7e21fc4d089f3c4
-
Filesize
6KB
MD5ef46f262bae2d0dc54139b53503d9c61
SHA15bd3f3dae8d18cab2c850c39e3dc0b002c6ed45b
SHA25633f9db8623c0f8d6c35eb8602e65532dd430eb0aeea3ac47f30731b28afb44b7
SHA51202017283eb689e39d3cf6b07e9e9ac8deaefb2a61b89115092c01468abee19de9847337c5eeff43062d9e1cdad11ae65cdc696f96a8caa4326290bfd7bb7b8db
-
Filesize
6KB
MD5ebfc9811444293999c95bb6d1615d1fe
SHA111edec3c66c56d8785fddb842f4f6a0e63b57dde
SHA25604ce0337d412c52d303a35a54c059742c5f5a3d1939619af2d9471ff537b36f5
SHA51246e238262556e5a497fb0fd9eaeb41d9e822a7d3eeca389af54b13065c44b950845bd27dc9bd9b95bb49d8968999de4a9c6e67f2534a9b0988281928f39dafcf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f03d60253a160058e9264483f69ce402
SHA145f0f86799c41553f556eb8f5f4f2613c6bb07da
SHA2569a1e0aed0f92f22662dceb1fef584c3b2dcb43c303fa9ac6bf99598b30f43b93
SHA5124a0f0f9a6ca1103ce5b1af3a595a37562eaa9b3137ec3674df08e4e2e5fd20aa69fab182376a8f489ca66f4641c4303e9945c0eeb6856de351a77df964b59488