Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
fbdcc46abaa0d94bca6bf28ebf8d7bb3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fbdcc46abaa0d94bca6bf28ebf8d7bb3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbdcc46abaa0d94bca6bf28ebf8d7bb3_JaffaCakes118.html
-
Size
176KB
-
MD5
fbdcc46abaa0d94bca6bf28ebf8d7bb3
-
SHA1
8def5b6b3bcd75afdb9829e71f2da55bd7ed6d84
-
SHA256
6b1ca6e28c6bb734104a60d2a22f5044fc6ecf5574e6e16a9dd98685217f2597
-
SHA512
58676d41b28d1756a1b1b00b1b00cb5b9677ecb97796960ebe681e9f7408add913b1635282bdf963353a52425603ac73756994ff87b3b2622713af512d4a394b
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3GGNkFGYfBCJiZu+aeTH+WK/Lf1/hpnVSV:SHCT3G/FPBCJiJB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 4500 msedge.exe 4500 msedge.exe 384 identity_helper.exe 384 identity_helper.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4500 wrote to memory of 760 4500 msedge.exe 82 PID 4500 wrote to memory of 760 4500 msedge.exe 82 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 2108 4500 msedge.exe 83 PID 4500 wrote to memory of 5020 4500 msedge.exe 84 PID 4500 wrote to memory of 5020 4500 msedge.exe 84 PID 4500 wrote to memory of 3248 4500 msedge.exe 85 PID 4500 wrote to memory of 3248 4500 msedge.exe 85 PID 4500 wrote to memory of 3248 4500 msedge.exe 85 PID 4500 wrote to memory of 3248 4500 msedge.exe 85 PID 4500 wrote to memory of 3248 4500 msedge.exe 85 PID 4500 wrote to memory of 3248 4500 msedge.exe 85 PID 4500 wrote to memory of 3248 4500 msedge.exe 85 PID 4500 wrote to memory of 3248 4500 msedge.exe 85 PID 4500 wrote to memory of 3248 4500 msedge.exe 85 PID 4500 wrote to memory of 3248 4500 msedge.exe 85 PID 4500 wrote to memory of 3248 4500 msedge.exe 85 PID 4500 wrote to memory of 3248 4500 msedge.exe 85 PID 4500 wrote to memory of 3248 4500 msedge.exe 85 PID 4500 wrote to memory of 3248 4500 msedge.exe 85 PID 4500 wrote to memory of 3248 4500 msedge.exe 85 PID 4500 wrote to memory of 3248 4500 msedge.exe 85 PID 4500 wrote to memory of 3248 4500 msedge.exe 85 PID 4500 wrote to memory of 3248 4500 msedge.exe 85 PID 4500 wrote to memory of 3248 4500 msedge.exe 85 PID 4500 wrote to memory of 3248 4500 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fbdcc46abaa0d94bca6bf28ebf8d7bb3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8996946f8,0x7ff899694708,0x7ff8996947182⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,6910631242665856292,10363345509162221768,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,6910631242665856292,10363345509162221768,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,6910631242665856292,10363345509162221768,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6910631242665856292,10363345509162221768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6910631242665856292,10363345509162221768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6910631242665856292,10363345509162221768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6910631242665856292,10363345509162221768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6910631242665856292,10363345509162221768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6910631242665856292,10363345509162221768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,6910631242665856292,10363345509162221768,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,6910631242665856292,10363345509162221768,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6910631242665856292,10363345509162221768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6910631242665856292,10363345509162221768,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6910631242665856292,10363345509162221768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6910631242665856292,10363345509162221768,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,6910631242665856292,10363345509162221768,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5415bdafc71c6abfb3b4213e8cda71f0f
SHA13eadd9acb3d992deb366f0747e7e467e57492607
SHA2569f0d31a1859b3ca2306248dd747d0032170a717fea6d0f4b6736a7123fabc745
SHA512cd0d2793c5663f42502d2b75e7c44b572953e33caa44426b4aa7d0ac80f8b92456fc0edd981866d26972233ca37937ee622978443d5140c189d0b551f319d478
-
Filesize
2KB
MD5d4a1ff579fb7eda9137d0723a9d0b00a
SHA1ba13e072067ddf40b152c02b24f7563b96ae0e0e
SHA256ea0e703fb307e0248d164ea228d17cfe287e02bd1ded0c4319c8a890a22b0871
SHA5127d632dfc9a8df3f6961c55dc3cb6d58f1a14931c1f8320887e1784c88c827db853d6ee30c602189462507b40d4aadf7eb29764e1d1118d853bd2118571a9df18
-
Filesize
2KB
MD5cc0c46903118263dac8d68b77fe5199d
SHA19643ac613a266d7f3840544e3863e5209ebb2884
SHA25680ecb0edbff008119240e5fb0fd39124256d000f773ac88555e2d8fb384de51e
SHA5127d789aa8c3d7604c9e5eb5596c0449605d8af9d4b54bf72c5a3857946397cc62b8f9889c2c08cffa09b95ff2e116ae48a86e757fb17263c3a2fbb7388c22ade8
-
Filesize
5KB
MD5049de52054af7d94ecda6a1a4ddd654f
SHA1515711253d510895ece918637b9c5cfc51f3f403
SHA256843183bf7bdbd09385eccd408de027ab7b665d7989f5a1b78f6d555f631dbbbf
SHA5121fbeb24f6ce10dd06d8dcba835918c0931751345f25ec7722df4a77194fe08d7b50136d45309130727f8aa87f95f292244efbedcecc10f5fc8e85d8ea701ba91
-
Filesize
7KB
MD5bdde70074114a9d916e9edb283ed41b2
SHA1cde4bc19a3643ab8d06296b242a4188f4d4c2de1
SHA256c5200b21cf68c5deaa87b78aac09b9b8880fa5c53fac4a9f8e84d94295ff773d
SHA51272458196cd80b3d2e69566633b48421c3572090058e2984a608f7b24507dcbd0de51cdc66b347e351e8db681412f8c9ed468bada2c8bede47823bc44b610692d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5320252f8a19ce1446091b5c510659407
SHA192d9ae34f4d09536efabaf00c3c00e1d242ca617
SHA2561608fd3bed7a37df0ad513a6feaee15e707669cabd0e836368031561fffde027
SHA5127f2540e16c88af7f6fb6b13b9ad2874056d9071a33b8d3a58a4c5ad407490466517853c63e1a51a97d6f1122c73e761d33c78f4c6b1f397a4764ea4b6f8da34b