Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2024 23:02
Static task
static1
Behavioral task
behavioral1
Sample
01dcb4b9a9567c061f6e5431b3fee91d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
01dcb4b9a9567c061f6e5431b3fee91d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
01dcb4b9a9567c061f6e5431b3fee91d_JaffaCakes118.html
-
Size
175KB
-
MD5
01dcb4b9a9567c061f6e5431b3fee91d
-
SHA1
162c1691f9f5a0b2c476a21d25361edb856283d9
-
SHA256
756736afee78cbbf0ac27b344f08a1d7df5eebf98086ad580838f067d9ef2e03
-
SHA512
9e1342989cc6b1fa72622178eb1cb48dfc6a70f5f711c5ec33924559bc3c19db7ea1634e4b3e61fe954c44c801619e2d44b1b71e6e7ec84d6bd82c9e9d44a808
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3IGNkFtYfBCJiZq+aeTH+WK/Lf1/hpnVSV:S9CT3I/FoBCJi1B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 4732 msedge.exe 4732 msedge.exe 2084 identity_helper.exe 2084 identity_helper.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4732 wrote to memory of 1996 4732 msedge.exe 80 PID 4732 wrote to memory of 1996 4732 msedge.exe 80 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 4916 4732 msedge.exe 81 PID 4732 wrote to memory of 3724 4732 msedge.exe 82 PID 4732 wrote to memory of 3724 4732 msedge.exe 82 PID 4732 wrote to memory of 4588 4732 msedge.exe 83 PID 4732 wrote to memory of 4588 4732 msedge.exe 83 PID 4732 wrote to memory of 4588 4732 msedge.exe 83 PID 4732 wrote to memory of 4588 4732 msedge.exe 83 PID 4732 wrote to memory of 4588 4732 msedge.exe 83 PID 4732 wrote to memory of 4588 4732 msedge.exe 83 PID 4732 wrote to memory of 4588 4732 msedge.exe 83 PID 4732 wrote to memory of 4588 4732 msedge.exe 83 PID 4732 wrote to memory of 4588 4732 msedge.exe 83 PID 4732 wrote to memory of 4588 4732 msedge.exe 83 PID 4732 wrote to memory of 4588 4732 msedge.exe 83 PID 4732 wrote to memory of 4588 4732 msedge.exe 83 PID 4732 wrote to memory of 4588 4732 msedge.exe 83 PID 4732 wrote to memory of 4588 4732 msedge.exe 83 PID 4732 wrote to memory of 4588 4732 msedge.exe 83 PID 4732 wrote to memory of 4588 4732 msedge.exe 83 PID 4732 wrote to memory of 4588 4732 msedge.exe 83 PID 4732 wrote to memory of 4588 4732 msedge.exe 83 PID 4732 wrote to memory of 4588 4732 msedge.exe 83 PID 4732 wrote to memory of 4588 4732 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\01dcb4b9a9567c061f6e5431b3fee91d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1e8a46f8,0x7fff1e8a4708,0x7fff1e8a47182⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,12611808632510719081,5831989194515350033,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,12611808632510719081,5831989194515350033,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,12611808632510719081,5831989194515350033,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12611808632510719081,5831989194515350033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12611808632510719081,5831989194515350033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12611808632510719081,5831989194515350033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12611808632510719081,5831989194515350033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2836 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12611808632510719081,5831989194515350033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12611808632510719081,5831989194515350033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,12611808632510719081,5831989194515350033,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3412 /prefetch:82⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,12611808632510719081,5831989194515350033,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12611808632510719081,5831989194515350033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12611808632510719081,5831989194515350033,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2844 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12611808632510719081,5831989194515350033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12611808632510719081,5831989194515350033,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,12611808632510719081,5831989194515350033,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5ea6495ca393c86916093bf5b386354d9
SHA1c87d65a735090a0aad8bc3674724e930e7898ad9
SHA256dbb29fc2f40f8f258a0e0a0956a27684eb8400941d7654ee8168e526eb41bd9b
SHA5121d88d1b8f4291da6b639c55a2f2e04dea1c01b9b5030a96c7c655c7c9e8d81d09613ae811fe3db8e796eeeb2a273aded9fc962fac5d10931b16b2227cbb02c4d
-
Filesize
2KB
MD57eacd80f0149d114a2d5288885d8e554
SHA1d0c156f853978280235ce70d98c8137b513309dc
SHA256c74ae0fa67164550cfc3f2c0e2336ede6a2d2bc17143b7614b9c08d484e22709
SHA512d842df43495930e4c92e41b82f61d36f6b94a0ca2c8088a13d45e006c5ab3449a0b20f3ef5c540808f9cb641c199fc6d5213ee712d4ae39eff38ad84682bf5ba
-
Filesize
2KB
MD521f5fb7ede7262145595ca57aebc3d7c
SHA11718ace4d6dbf43366e257e29a493726dec8e79d
SHA2567548df650e1e098385ee7cafa0ce3a59e0a110ed3b98d5114e44e38f4d773ef2
SHA512b12cbf6c42eb911342689bc699b3142d914f207a9f7e1246124a3e4f1a8cf57ce8c11e02e91daaa088f675495d3953e4363132ecc891c5db60712b45d3fae785
-
Filesize
7KB
MD5cd64be6401d1e76506a6d7113bc8b963
SHA15abf9706dbf4ca5e716136b11df27b0d9a4bb46e
SHA25665eeb77e6f528dc1a125e491811241b648cc2f48a87e63579c51e57198fc122a
SHA5129a997fcac24bbb28c25934dcd2f304e70a1f915f6c94d441c31028b27bff335784277814fa2a542c70d9c9c2a4bf7a78e366dc1bf0ac989659e678a875f6fd74
-
Filesize
6KB
MD5731f3eb415c4f18042570b5ec32aa378
SHA11b1c3438e79432fbd604653e3db9b0f6a8e3b878
SHA25600e8def5c533170d4ba400976df3a0d58562869405bb7b27247284623d6fce3e
SHA51227980d39723e02387bef55aa1bc1c0dee5ed53dc978116ed98ecb20c846a0364df2ea0226c6ea8c6d32c3a546a7c5ce5349c39ffc72e5ac457ff472123eedb9c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5bf93e5c8121ae8f2f4dbad5c1fcfc451
SHA1f22d913bc6da16077245e165b64d3ca8baccca22
SHA256698e9d40035732af698e875d4b97fb9e81cb107882e11ddcc3875463aaf7d789
SHA51227ab53c9a141dfc0d7fff01081fc8bcbb33cffdbdf0694f7c208226ff83ea8abf69d2a73bcfdb2c057f998263656a95ef067b8a9f8dc53e2baa29546597deb7a