Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
d5478f34e2a414ab9d248bd6b7c71031_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d5478f34e2a414ab9d248bd6b7c71031_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5478f34e2a414ab9d248bd6b7c71031_JaffaCakes118.html
-
Size
104KB
-
MD5
d5478f34e2a414ab9d248bd6b7c71031
-
SHA1
c930da6192a288cc879e1107276c30efe40e1f49
-
SHA256
d1f5186f89cb4d318e3cdd0a9cf0665846b08a89e899f4712a5df2e4644eb0a8
-
SHA512
2d26b78b9c0fcf11590c027a24db55ac75511fcb1b835de281a18f3abc5c20f1dac6ee4e34a6cc656c35387cb1010203912f95cbf08b4e9bc7c3632e250cfe9e
-
SSDEEP
1536:SDOM1nTXLKkQFotsx0N3A1yz9di8NuHT3Yekg8amFtsgKLuV7n7EomsS5CwN:YOyT+kMj0dAAdiGi7f83rsRC7n7Eol2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 4268 msedge.exe 4268 msedge.exe 1472 identity_helper.exe 1472 identity_helper.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4268 wrote to memory of 3256 4268 msedge.exe 83 PID 4268 wrote to memory of 3256 4268 msedge.exe 83 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1416 4268 msedge.exe 84 PID 4268 wrote to memory of 1172 4268 msedge.exe 85 PID 4268 wrote to memory of 1172 4268 msedge.exe 85 PID 4268 wrote to memory of 2948 4268 msedge.exe 86 PID 4268 wrote to memory of 2948 4268 msedge.exe 86 PID 4268 wrote to memory of 2948 4268 msedge.exe 86 PID 4268 wrote to memory of 2948 4268 msedge.exe 86 PID 4268 wrote to memory of 2948 4268 msedge.exe 86 PID 4268 wrote to memory of 2948 4268 msedge.exe 86 PID 4268 wrote to memory of 2948 4268 msedge.exe 86 PID 4268 wrote to memory of 2948 4268 msedge.exe 86 PID 4268 wrote to memory of 2948 4268 msedge.exe 86 PID 4268 wrote to memory of 2948 4268 msedge.exe 86 PID 4268 wrote to memory of 2948 4268 msedge.exe 86 PID 4268 wrote to memory of 2948 4268 msedge.exe 86 PID 4268 wrote to memory of 2948 4268 msedge.exe 86 PID 4268 wrote to memory of 2948 4268 msedge.exe 86 PID 4268 wrote to memory of 2948 4268 msedge.exe 86 PID 4268 wrote to memory of 2948 4268 msedge.exe 86 PID 4268 wrote to memory of 2948 4268 msedge.exe 86 PID 4268 wrote to memory of 2948 4268 msedge.exe 86 PID 4268 wrote to memory of 2948 4268 msedge.exe 86 PID 4268 wrote to memory of 2948 4268 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d5478f34e2a414ab9d248bd6b7c71031_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa08db46f8,0x7ffa08db4708,0x7ffa08db47182⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,16854109550624371431,3862360405559449105,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,16854109550624371431,3862360405559449105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,16854109550624371431,3862360405559449105,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16854109550624371431,3862360405559449105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16854109550624371431,3862360405559449105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16854109550624371431,3862360405559449105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,16854109550624371431,3862360405559449105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,16854109550624371431,3862360405559449105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16854109550624371431,3862360405559449105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4540 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16854109550624371431,3862360405559449105,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16854109550624371431,3862360405559449105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16854109550624371431,3862360405559449105,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16854109550624371431,3862360405559449105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16854109550624371431,3862360405559449105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,16854109550624371431,3862360405559449105,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2316
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5c8121a722fdc677ceb35123a19b15c57
SHA1d4ecc9226d4330fb0fe0add7efdfe3dac7cf8a9a
SHA256856b733065b5f815d1a8d447faddde357a65e5899d1e16f768431d2c1e28d6f6
SHA5128612f1f290a32139a15c27267e2bfb32e188034e073fcd6b2f4f1bd8f39774fe0534c35726fbb7319db3c4b190e13ec65a0d05f7b55f7243081492c6ee81329d
-
Filesize
814B
MD5c7344cec3ad35b49842af5196c7f3c6f
SHA1a541b309b00e3abccfd583d23ec1a3bfaed20fcc
SHA25607847beb3398e07cecd4295c572a159a4acfc7e7de1592b339cacdb9cc45639a
SHA51200246182e59deb885d359fb7f0304b6ab56b7cf280f6d4f2cbf27b1bf88fa3974eab4528599384ff2fb53a42d8510dd3eba32f542a09143b4ddb5f91dc120631
-
Filesize
6KB
MD5080cf46f034543a3658a339926bbd0f3
SHA16306f68a36ea1825d34f230965722e1f665a201e
SHA256e55a78b4dd97bc271f135bfc30d71fb13851e75e0b528734af52f060c28eba09
SHA5121fea3a32f6e4d9b7575eb8ef8c007e547a8c6308d68ae3ff25d54f568471f99b23f14d98e48656c66c9fd1aebfaa97e98faba43dadc125c8d0867998c1380f6b
-
Filesize
5KB
MD5d2a5fe3bf1e84f4b24eb99e569bb5755
SHA1b0e6a3a105ecb573a50179073e8124fe8730e813
SHA256d2fc5ee3a3e3d0d9ee07d3f66ff6e69930f79fcc4ab35c3dd72dc627ce6aa13f
SHA512ea4858de51af9d39da1b3e4d9eb280f7d2fa58f23420a2905cfabcd1bfb766168fcb71cc6f1db19a418214f9f8d1ed2f1673115d52dcc54eba41200c95bb7a0c
-
Filesize
6KB
MD5d95b8442e25b921c2972d4ce87e5bff3
SHA113da18838b9e65800ec3acc20cd5729c39676dce
SHA256e151a4e5f3560a4c6ae688ffb8869bf241b830e3f36aa9ee6a2506c1f5ca4c9e
SHA512436777c5f6f40d7946fca5ffa55e6e207b2b471f9c2f7d3b777c2c1bce33092ae0a2e33bee43128eed735bfd2c932548a6f398c80e79892cdb20099e68989a03
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55b3bd9963d2807269565011980048bbe
SHA16a59b5255cb888b15e64ee96ca3d374e6bf03a8f
SHA25696336b537fe76320eb7b4aedc438df1fa1b5a4cfe52b9aaf9011efb7e19ee1c7
SHA5121d16708c4bac5ec3b43f0a3015208348e7917766dde161a6d6f27fa3ab4093a3be74c20de7c5b4ba5036f43c0a9bc12b0f74b15281383143abbbfc3f7f32ff40