Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
66096cb4e9fbbe90b8834f09b4c6e56a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
66096cb4e9fbbe90b8834f09b4c6e56a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
66096cb4e9fbbe90b8834f09b4c6e56a_JaffaCakes118.html
-
Size
62KB
-
MD5
66096cb4e9fbbe90b8834f09b4c6e56a
-
SHA1
cdcc4b021729c1e0ce0a43476e28c646605ff4dd
-
SHA256
35a6a55b154b82e00f810c1a88ac7ace5339449440bdb8b0003c894d9555315c
-
SHA512
c40b734608ca88ec6ece0cfc24921dfc9487503ade6b2279f55604343826a5eda1c63f657b067bd8771140316d54d2b2eecd50cf4c16847fa68a9cbb5a19f2c0
-
SSDEEP
1536:69+0et+7sI/+CTsVRXIm3FSwVoZrJ0efXwqWJq5ZCGpMbhLuJ:0lwRXIm3y0mXwqZZybhLm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 2980 msedge.exe 2980 msedge.exe 1840 identity_helper.exe 1840 identity_helper.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2440 2980 msedge.exe 86 PID 2980 wrote to memory of 2440 2980 msedge.exe 86 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 1808 2980 msedge.exe 87 PID 2980 wrote to memory of 4660 2980 msedge.exe 88 PID 2980 wrote to memory of 4660 2980 msedge.exe 88 PID 2980 wrote to memory of 4432 2980 msedge.exe 89 PID 2980 wrote to memory of 4432 2980 msedge.exe 89 PID 2980 wrote to memory of 4432 2980 msedge.exe 89 PID 2980 wrote to memory of 4432 2980 msedge.exe 89 PID 2980 wrote to memory of 4432 2980 msedge.exe 89 PID 2980 wrote to memory of 4432 2980 msedge.exe 89 PID 2980 wrote to memory of 4432 2980 msedge.exe 89 PID 2980 wrote to memory of 4432 2980 msedge.exe 89 PID 2980 wrote to memory of 4432 2980 msedge.exe 89 PID 2980 wrote to memory of 4432 2980 msedge.exe 89 PID 2980 wrote to memory of 4432 2980 msedge.exe 89 PID 2980 wrote to memory of 4432 2980 msedge.exe 89 PID 2980 wrote to memory of 4432 2980 msedge.exe 89 PID 2980 wrote to memory of 4432 2980 msedge.exe 89 PID 2980 wrote to memory of 4432 2980 msedge.exe 89 PID 2980 wrote to memory of 4432 2980 msedge.exe 89 PID 2980 wrote to memory of 4432 2980 msedge.exe 89 PID 2980 wrote to memory of 4432 2980 msedge.exe 89 PID 2980 wrote to memory of 4432 2980 msedge.exe 89 PID 2980 wrote to memory of 4432 2980 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\66096cb4e9fbbe90b8834f09b4c6e56a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9cae246f8,0x7ff9cae24708,0x7ff9cae247182⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,6555001544738180743,9708007342643576726,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,6555001544738180743,9708007342643576726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,6555001544738180743,9708007342643576726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6555001544738180743,9708007342643576726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6555001544738180743,9708007342643576726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6555001544738180743,9708007342643576726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6555001544738180743,9708007342643576726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6555001544738180743,9708007342643576726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6555001544738180743,9708007342643576726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,6555001544738180743,9708007342643576726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:82⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,6555001544738180743,9708007342643576726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6555001544738180743,9708007342643576726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6555001544738180743,9708007342643576726,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6555001544738180743,9708007342643576726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6555001544738180743,9708007342643576726,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,6555001544738180743,9708007342643576726,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2648
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5e492bda6946967b8de02f33105e19671
SHA13c73a00845f88e68f577259e27a3b7370970c3e5
SHA256af099a5de02e344a0e8498b9e7c6a669656320332dd5a0f8d2c7605dc1bed298
SHA5129a9de2e8eaa81cd95c914c0bbb77c1fb70dc6e5bf14137013bf2aa8a957680ed51906a4c735bf3dbeb7635374d09b2ca54214fa78300c4afadb58f53203d1ff4
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD505448b042f37b039d01f69bcd135084d
SHA1aba714877017a306d2e5fcc2d5710d741ca9cccc
SHA2561526ff6bdf7e77add5f62dff045df06823d9ee8fa3587da466509767c31b9b15
SHA5127a4e299e804b62823a1cc2b2c49c837bc0405245bef8c75d00df736d49324e95849209e74cd296006a6b40f73ae25eec22a576b65e9109ccd55fe299e08a40d4
-
Filesize
5KB
MD50627dc68aff5c02383a8ae8969d62e10
SHA1dbaf4aacd27c7cbd47d75134f7d97b29527ea3b7
SHA256d5eb2249391cc5e239a2bb2019cf48765e148e60fe3ec8b2d3fc144bde0cabd4
SHA5123e52931e80effffeff2f497709e01897f9b9c5f0a3aa8e3d15830d3bf1de6a0ba264ced97e5abf114a757e5316e160a48406b5ccd469a926f9caba7d77f3b382
-
Filesize
6KB
MD51a1d0b8b1df2b2e03dde892d795418c9
SHA1f206aed0d6989bd780030224dbcbb15dfdc34174
SHA2560cc4e25330b927818f02812e613e6a075bf1930a494966ae198176cb1f36f654
SHA51218ba61dfb5aab1adc2e6318690f942dd9702aabf7a3463b66df86e1ea8d1441958435d02c2b8346f348b183323c6a932e678fdecca148cb615ccf8df022ce784
-
Filesize
6KB
MD5d2e527e0e57604a814aa0b567a1db8a3
SHA1871208a3fd7c363751c7f06d74e84e0355130d32
SHA2561ca1cb03ef353118d617b05a738cd19b0d918aba822c6d542afde66c22d04424
SHA512c2d38f7dfc9f75649cc4897a6e09691929664f34d1f9c564335e4f467c4e51fe57e4ffc73e9c0671732c8c261df1a2a62cdc485ee33dcb4475996dac33bda4c6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ce399baa-9038-4730-9ec9-e2b626976ff4.tmp
Filesize1KB
MD50d43e7a6500ad173524fc39c3eb708d3
SHA178266dafbce3fd4adbbba309fe2b46e9d6c56e90
SHA2568b78b052a1b673e8f57b1bacaec024b583b18e0d23542eebba6ae5c602d5aa2e
SHA512d890571fcfbcc1e9bf5e9947be9d5323742c0e31b90b6d3dce03db980709f74ae21d19e75d75e2baee5953ddeb2b8029b80bd21c170e2011e1f46a6e38af8d5c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389