Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
95c526a78c9f05287de3a484718d9728_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
95c526a78c9f05287de3a484718d9728_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
95c526a78c9f05287de3a484718d9728_JaffaCakes118.html
-
Size
175KB
-
MD5
95c526a78c9f05287de3a484718d9728
-
SHA1
6bcea788c55e644ea626e5a8e6ff3fa963c63bde
-
SHA256
10f915f2e9d430d9f5744250c5c81e7424322048f840099e378925ba1a234b59
-
SHA512
b9b5ab15e355eb1dcaa78ae8774528038e2a8c1ad3f420ff9646e4f18f38febe664634296c8736c4877478488b20c405cf02ad0d36b0806b0fb1fb2c9d64af05
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3SGNkFgYfBCJis4+aeTH+WK/Lf1/hmnVSV:SOoT3S/FVBCJimm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1244 msedge.exe 1244 msedge.exe 4280 msedge.exe 4280 msedge.exe 4712 identity_helper.exe 4712 identity_helper.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4280 wrote to memory of 1192 4280 msedge.exe 81 PID 4280 wrote to memory of 1192 4280 msedge.exe 81 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 4048 4280 msedge.exe 82 PID 4280 wrote to memory of 1244 4280 msedge.exe 83 PID 4280 wrote to memory of 1244 4280 msedge.exe 83 PID 4280 wrote to memory of 4208 4280 msedge.exe 84 PID 4280 wrote to memory of 4208 4280 msedge.exe 84 PID 4280 wrote to memory of 4208 4280 msedge.exe 84 PID 4280 wrote to memory of 4208 4280 msedge.exe 84 PID 4280 wrote to memory of 4208 4280 msedge.exe 84 PID 4280 wrote to memory of 4208 4280 msedge.exe 84 PID 4280 wrote to memory of 4208 4280 msedge.exe 84 PID 4280 wrote to memory of 4208 4280 msedge.exe 84 PID 4280 wrote to memory of 4208 4280 msedge.exe 84 PID 4280 wrote to memory of 4208 4280 msedge.exe 84 PID 4280 wrote to memory of 4208 4280 msedge.exe 84 PID 4280 wrote to memory of 4208 4280 msedge.exe 84 PID 4280 wrote to memory of 4208 4280 msedge.exe 84 PID 4280 wrote to memory of 4208 4280 msedge.exe 84 PID 4280 wrote to memory of 4208 4280 msedge.exe 84 PID 4280 wrote to memory of 4208 4280 msedge.exe 84 PID 4280 wrote to memory of 4208 4280 msedge.exe 84 PID 4280 wrote to memory of 4208 4280 msedge.exe 84 PID 4280 wrote to memory of 4208 4280 msedge.exe 84 PID 4280 wrote to memory of 4208 4280 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\95c526a78c9f05287de3a484718d9728_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff467446f8,0x7fff46744708,0x7fff467447182⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14118777826513468100,11105133487541544850,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,14118777826513468100,11105133487541544850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,14118777826513468100,11105133487541544850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14118777826513468100,11105133487541544850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14118777826513468100,11105133487541544850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14118777826513468100,11105133487541544850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4264 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14118777826513468100,11105133487541544850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14118777826513468100,11105133487541544850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14118777826513468100,11105133487541544850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14118777826513468100,11105133487541544850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 /prefetch:82⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14118777826513468100,11105133487541544850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14118777826513468100,11105133487541544850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14118777826513468100,11105133487541544850,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14118777826513468100,11105133487541544850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14118777826513468100,11105133487541544850,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14118777826513468100,11105133487541544850,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5cdfe00213f22da7e6b64946e3373f6d8
SHA189db772ba13e1153e2b8a7d7c495dad885a669f5
SHA256815dab2f4dc7e858c0bc81c5c9f4a571482b29ef703c7ea2ca633c290fd4d10f
SHA512694fe45d2518b9c7b291393a5f8c00d8b2134978934c619c9df28365c15cd3c541cf7a90d3210cf67c1336437177baa63fd70600a694a60517948daf2400f36f
-
Filesize
2KB
MD530a8bd7f64bba2d816ffbf30e78dda02
SHA17246d488380c5763a7e2989ead27b509d340b3ba
SHA256a0bf884bac3cd5a7be682f11ac47ee2713c72ee08d40f779fbee8a835a0efd19
SHA512f8bf6767ad73db8366eb10109dace0bf463bb93cca3298386fed74738b1634f1c4871940fe001d511ce017535b0558abdc88102e40ebb05604a83efbc7753700
-
Filesize
2KB
MD58be8f9f6a964be4d24bd4ae28dde2545
SHA19f3c9fe29d532ebc299a26a28debaa7a49b5591a
SHA2569a9a5452a7e46746449a5e25337a3e2aa2c41f3db0ed2276e6a9b845e401e393
SHA5125278a5bd2db4bc8e13afd02f2a074a3f96bfdbaa17fdd1bfd707ae7600340824aaa964bc9ddfbfb24a5270cabe3dc6fe3a1ddb8162e56d53b7e90cf6cb99b80e
-
Filesize
7KB
MD5c03e513f4d5caa771be9c8bfd22ac5ca
SHA1f5910a805e01ae080ff0941763b2eef93c3a699b
SHA256fa4c5055dbcc6040e28064925679b366dfc4b4a99d0a96b4e37e8c0392e3d778
SHA512480534e97039620f6592a9d41c7b91fb98661cf4ca3f798706be194b27534e64837a6e9c8979ae6719d665c9c6487d64994a568acf1a2aa200fe9154a4f4a164
-
Filesize
5KB
MD5b1380b99a1d2e3703973a382986dd7f6
SHA16115f4d461252ea696fffc3ff8a78fa219660ca4
SHA256339f8cf63af40e67019cac7d15422d68d856c99817fb22aaaea7dfcf8ada2975
SHA5128df74088a9c23b850295da9137a01919d21011e4288739061080dc94cb597cf0c4b91fcd0a90e85e6a50b41623ed12f4cc2f78a83a3969e1a6783d0f95b62b33
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52412e85d8deb689a8475f389eab04487
SHA17483b596154f1feb995437b3fc42e282ce9ca0eb
SHA2567d5596c90853f3935bb14fe16fefad0aaaa48b1092a9cc2f308b1e714e3c8998
SHA512af601f3b26ddeba9ea72c58128a9149a451853dd4783afb2aaae0d439260539600bc29c9b16062bb9ca1d25499a4cfe1fd8333f1732d4a2dcade77d8ac55c8f1