Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
2c6b1ed6fde6465cb3436bdce4ce741c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2c6b1ed6fde6465cb3436bdce4ce741c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2c6b1ed6fde6465cb3436bdce4ce741c_JaffaCakes118.html
-
Size
175KB
-
MD5
2c6b1ed6fde6465cb3436bdce4ce741c
-
SHA1
19c1d46b60df1ffc39b151fc9e5d790d25b1ac87
-
SHA256
ffa284e6af8d27ccedb3c2c604410d11fe1f0f14550d4a1b5ff82e4ab4a5f22c
-
SHA512
e4f7fe169f112b2becff5270f3e3ebad75fcc873d603eac5da235f161f154dc0dee66b5c1e7b366277cc028bed45a6c378a92af7c2ef186c37ceac93b000760e
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS3gGNkFKYfBCJisI+aeTH+WK/Lf1/hmnVSV:S4oT3g/FLBCJi2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1540 msedge.exe 1540 msedge.exe 3328 msedge.exe 3328 msedge.exe 1392 identity_helper.exe 1392 identity_helper.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3328 wrote to memory of 3812 3328 msedge.exe 82 PID 3328 wrote to memory of 3812 3328 msedge.exe 82 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 4600 3328 msedge.exe 83 PID 3328 wrote to memory of 1540 3328 msedge.exe 84 PID 3328 wrote to memory of 1540 3328 msedge.exe 84 PID 3328 wrote to memory of 2384 3328 msedge.exe 85 PID 3328 wrote to memory of 2384 3328 msedge.exe 85 PID 3328 wrote to memory of 2384 3328 msedge.exe 85 PID 3328 wrote to memory of 2384 3328 msedge.exe 85 PID 3328 wrote to memory of 2384 3328 msedge.exe 85 PID 3328 wrote to memory of 2384 3328 msedge.exe 85 PID 3328 wrote to memory of 2384 3328 msedge.exe 85 PID 3328 wrote to memory of 2384 3328 msedge.exe 85 PID 3328 wrote to memory of 2384 3328 msedge.exe 85 PID 3328 wrote to memory of 2384 3328 msedge.exe 85 PID 3328 wrote to memory of 2384 3328 msedge.exe 85 PID 3328 wrote to memory of 2384 3328 msedge.exe 85 PID 3328 wrote to memory of 2384 3328 msedge.exe 85 PID 3328 wrote to memory of 2384 3328 msedge.exe 85 PID 3328 wrote to memory of 2384 3328 msedge.exe 85 PID 3328 wrote to memory of 2384 3328 msedge.exe 85 PID 3328 wrote to memory of 2384 3328 msedge.exe 85 PID 3328 wrote to memory of 2384 3328 msedge.exe 85 PID 3328 wrote to memory of 2384 3328 msedge.exe 85 PID 3328 wrote to memory of 2384 3328 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2c6b1ed6fde6465cb3436bdce4ce741c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc113e46f8,0x7ffc113e4708,0x7ffc113e47182⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10542558773644196874,13549700766555203890,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,10542558773644196874,13549700766555203890,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,10542558773644196874,13549700766555203890,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10542558773644196874,13549700766555203890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10542558773644196874,13549700766555203890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10542558773644196874,13549700766555203890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10542558773644196874,13549700766555203890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10542558773644196874,13549700766555203890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10542558773644196874,13549700766555203890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10542558773644196874,13549700766555203890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2036 /prefetch:12⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10542558773644196874,13549700766555203890,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10542558773644196874,13549700766555203890,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10542558773644196874,13549700766555203890,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10542558773644196874,13549700766555203890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10542558773644196874,13549700766555203890,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10542558773644196874,13549700766555203890,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD597fa39f5e49f1f78c8d31621c686d5b2
SHA136c6658680af8374e7c71220624ce847c06970c6
SHA25664d9dca94fb98331467c35bbd215d8f9427dd6cd45329d2e8813962d064e8960
SHA5120eeadf347a0d79548fe8196ad67097944558bb464d8678949673c1d21c29833e6a96d939ced04efb65a147a61d1812fd66befc960439b694da702128284ee471
-
Filesize
2KB
MD5c6e03b476626f7cb2fde0e0d2ca069a0
SHA10bc4d7114ca7d12ac5d7e55661cbaae0ca1908cb
SHA256162d0ea7101033b7f80c0de78fa48b26133a8ab14f66818f26f13db1a7e69565
SHA51284d90c243f0a2868f6dc9f71882ba01a9512f0506cb2c4dfa0e26b8168641e2697a6133ef13cc730be63b448f2c0484341ada8bddb98e5802278bdcb60addada
-
Filesize
2KB
MD573c41df716bcd215928107820ace67d0
SHA19380911587d054deecce9a11fc15eb0d5edbed57
SHA256bafefc07356b75d3ca99a85f3e6b3a532342ea448efcb54450cb117dac2a94b6
SHA512e26ed22802f71f73ddda6f8d5d3530df969a4a7b6ccc75a133387daaadfc10c38ecdd613d3ac16b223c6a5e369cd45fe254bf519e005c6828fba9fd83400cf8d
-
Filesize
5KB
MD5359c60e3e9c1429b2780353c9b3e4961
SHA13eb8875d991f9143b7e38429c764fcfa9a216405
SHA256da2b434f7dd731f5e7fe4075d5571c01933e6bbe3dd57e09aa3b5c663a5504f2
SHA5127f6f70dab2fb7986846f3ae0ee9c5d4460d36bcbaf8a71d178fd2b4d10632d82c8f106332d734dcba6151240ba411e05a9d90390ad5ce8118c7a5463c9967121
-
Filesize
7KB
MD5f8324423393d9a6ca759a7eea975906b
SHA15baef705d1fbebef6af44ed3ef1fbfcfb6abf017
SHA256004a8795e0fb8017ed046127d3b0b05947bca449bbb4d9320effc90b49989bb1
SHA5129d2b2e466d782f60c83a7177036085046a8820e9db7a79406258e1b365eabbdd98c0b04e156a45be2baf23fc119274c34c6ed15fc25a773e8af89a9a37c104ad
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5acb2129e36791e27b5b150a208fe6f5e
SHA148b760f52d3c30cb31be4a515dba476568ef5058
SHA256a511cb40b3cfc4b830189e1eee739868b46851103da93d7a2d60f8c3741460e2
SHA51228dbbf30e004cfb3c62b7434db11c5650e20bc245ace1dbffc80959a411feeff9d15e2da37105a8d860c0b8221d76646cdcff7af4c3053fb36226608f63adc40