Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 07:39
Static task
static1
Behavioral task
behavioral1
Sample
337b0dbd3329ac820170d07f29be7711_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
337b0dbd3329ac820170d07f29be7711_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
337b0dbd3329ac820170d07f29be7711_JaffaCakes118.html
-
Size
175KB
-
MD5
337b0dbd3329ac820170d07f29be7711
-
SHA1
2a20365d017d5467b4e69930917a630109659a34
-
SHA256
03d4ef71ab6dbbf75445182b8f50e3b2d177ddbf430dfe13bc88453a228f1d29
-
SHA512
34b77d2f422bd5447dbc7f8e2e75051e5a6c5cb9f7ba5f844c4c4d5c2af9b6d92440d80ccb8f36a19aabca187d3db0c0f6472efb47fa9f5da6beca9132a63f1e
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3YGNkFuYfBCJiZI+aeTH+WK/Lf1/hpnVSV:SHCT3Y/FHBCJiPB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 60 msedge.exe 60 msedge.exe 4640 msedge.exe 4640 msedge.exe 4340 identity_helper.exe 4340 identity_helper.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4640 wrote to memory of 2716 4640 msedge.exe 82 PID 4640 wrote to memory of 2716 4640 msedge.exe 82 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 2776 4640 msedge.exe 84 PID 4640 wrote to memory of 60 4640 msedge.exe 85 PID 4640 wrote to memory of 60 4640 msedge.exe 85 PID 4640 wrote to memory of 4352 4640 msedge.exe 86 PID 4640 wrote to memory of 4352 4640 msedge.exe 86 PID 4640 wrote to memory of 4352 4640 msedge.exe 86 PID 4640 wrote to memory of 4352 4640 msedge.exe 86 PID 4640 wrote to memory of 4352 4640 msedge.exe 86 PID 4640 wrote to memory of 4352 4640 msedge.exe 86 PID 4640 wrote to memory of 4352 4640 msedge.exe 86 PID 4640 wrote to memory of 4352 4640 msedge.exe 86 PID 4640 wrote to memory of 4352 4640 msedge.exe 86 PID 4640 wrote to memory of 4352 4640 msedge.exe 86 PID 4640 wrote to memory of 4352 4640 msedge.exe 86 PID 4640 wrote to memory of 4352 4640 msedge.exe 86 PID 4640 wrote to memory of 4352 4640 msedge.exe 86 PID 4640 wrote to memory of 4352 4640 msedge.exe 86 PID 4640 wrote to memory of 4352 4640 msedge.exe 86 PID 4640 wrote to memory of 4352 4640 msedge.exe 86 PID 4640 wrote to memory of 4352 4640 msedge.exe 86 PID 4640 wrote to memory of 4352 4640 msedge.exe 86 PID 4640 wrote to memory of 4352 4640 msedge.exe 86 PID 4640 wrote to memory of 4352 4640 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\337b0dbd3329ac820170d07f29be7711_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff824c446f8,0x7ff824c44708,0x7ff824c447182⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,6161223873286926771,10111482796879163227,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,6161223873286926771,10111482796879163227,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,6161223873286926771,10111482796879163227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6161223873286926771,10111482796879163227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6161223873286926771,10111482796879163227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6161223873286926771,10111482796879163227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6161223873286926771,10111482796879163227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6161223873286926771,10111482796879163227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6161223873286926771,10111482796879163227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6161223873286926771,10111482796879163227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6161223873286926771,10111482796879163227,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,6161223873286926771,10111482796879163227,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3456 /prefetch:82⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,6161223873286926771,10111482796879163227,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6161223873286926771,10111482796879163227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6161223873286926771,10111482796879163227,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,6161223873286926771,10111482796879163227,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD517653ed2715da5b42b28b990909ab284
SHA1d83762ddfc567707cf330cb0c839fbb91242c4ae
SHA256b3154d2899ee2b2e1f4d116a200f103bb6f1a0a9e1fc4131e4d37222dbfbbf71
SHA51233c65948577afc5a0ea8bd250a45c8eef91aa8ed92d7d29f6005010d1682c107d0e2e30a2ca47d612681659a2c13d46b44bdd40763100adb75947a227f760126
-
Filesize
2KB
MD5d1653210a411f897dfd3194533fa4e27
SHA1ad99b4be00ca656096976f6a62f651297b3e0bcf
SHA2569ee33ef1e2cce3563a0af2fc5ac47c4cc5827eb423ee34999ce9c84e7ddd3599
SHA512dd887c5b9a56c13c0a142bbffdb371c7cee1b989f2fecd290a371973e7b9558cf444963eaead42dc0ca3e69af4e6ce19e1da780c88a622af47ee7855b69d831e
-
Filesize
2KB
MD5eba467f425e3df2d7f7612942cb52a83
SHA1086ae3a49615c9ea4daea17cfd1d651b39aec734
SHA2564531774951e06f60947ff109f2f2b9269c73d663d90e0c3a89b7fc15e5b56ddf
SHA512439640faa17bfb080e31e3bbe309b561be4e136d8a3b8e17e7a9083545941384b21ee6ce6378f7a436f161a71bd0fca2ba29e7217fa7c70eb4f98fd3bffe6a13
-
Filesize
6KB
MD50e011da311d417a8955f6f0378083d92
SHA1c486eb5e292dcdc3880964cf3da8ad2addd1bdc3
SHA2565e5a857fa1ca37f91bb4ebec2e0158930cb821bd1d83a0c4cf03fca6b7093663
SHA51242239521a9de0023e6e026a12a3fcc2c8b70914398a8092d299311f63659c77e0c31908c028d1a3d5d37d52d13243c1946b52d7341e01acb5b45e45fead8ef54
-
Filesize
7KB
MD5ff18074daeb59df2c23908bbbbe87891
SHA1636f0399da73c5447ce929b1c995476edb6f90b6
SHA256bc398f1fd93d364750b3ab5833d8b6a9940548e5caf22e8eb9190a6c7e32c7e9
SHA512cf6f4308f8bb9d4a1f56baaa47e9a02d3efb82df65002fcffe1ce1aeb19019a9e1ba7ef77a168062890540f549b42502630318b88045fa18ae1de9b563eb4596
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5705e5fb9b583f5117be5d8260189641d
SHA1c147ac29794d4b272a1d412bded7b3c189f55f2d
SHA2563933f00c356febe1a74d828b40bb776b669b437512cbdea40d070398a0cff402
SHA512e71db8d7ec770803c42e1d36aaa2604c27faab86bbcfdaa82095f7f54bc0db1f458b5ead81fdc815592d53f6ebae98931158c5b76e8e5371090829fb9d2b604d