Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
13bb79beb8f9487a04fbbd3c294b4f9e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13bb79beb8f9487a04fbbd3c294b4f9e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
13bb79beb8f9487a04fbbd3c294b4f9e_JaffaCakes118.html
-
Size
175KB
-
MD5
13bb79beb8f9487a04fbbd3c294b4f9e
-
SHA1
ce7f85f1a109e25a140bbcc045df8a6f358ac327
-
SHA256
1495290c008340a346b9c0511ddc53ff45aba7c68cfd015a42e1cfa43a10a8ad
-
SHA512
68af1751293280d74a17cfde31be23397a56ecd38f602db7365bda3995b5c48a4e14a163791aa6b6965d511c300bdb1b0c4cddbdea9c382e20e2bcac19f2973e
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3YGNkFYYfBCJiZ4+aeTH+WK/Lf1/hpnVSV:SHCT3Y/F9BCJifB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 3084 msedge.exe 3084 msedge.exe 4496 identity_helper.exe 4496 identity_helper.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3084 wrote to memory of 3244 3084 msedge.exe 82 PID 3084 wrote to memory of 3244 3084 msedge.exe 82 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3392 3084 msedge.exe 83 PID 3084 wrote to memory of 3372 3084 msedge.exe 84 PID 3084 wrote to memory of 3372 3084 msedge.exe 84 PID 3084 wrote to memory of 2424 3084 msedge.exe 85 PID 3084 wrote to memory of 2424 3084 msedge.exe 85 PID 3084 wrote to memory of 2424 3084 msedge.exe 85 PID 3084 wrote to memory of 2424 3084 msedge.exe 85 PID 3084 wrote to memory of 2424 3084 msedge.exe 85 PID 3084 wrote to memory of 2424 3084 msedge.exe 85 PID 3084 wrote to memory of 2424 3084 msedge.exe 85 PID 3084 wrote to memory of 2424 3084 msedge.exe 85 PID 3084 wrote to memory of 2424 3084 msedge.exe 85 PID 3084 wrote to memory of 2424 3084 msedge.exe 85 PID 3084 wrote to memory of 2424 3084 msedge.exe 85 PID 3084 wrote to memory of 2424 3084 msedge.exe 85 PID 3084 wrote to memory of 2424 3084 msedge.exe 85 PID 3084 wrote to memory of 2424 3084 msedge.exe 85 PID 3084 wrote to memory of 2424 3084 msedge.exe 85 PID 3084 wrote to memory of 2424 3084 msedge.exe 85 PID 3084 wrote to memory of 2424 3084 msedge.exe 85 PID 3084 wrote to memory of 2424 3084 msedge.exe 85 PID 3084 wrote to memory of 2424 3084 msedge.exe 85 PID 3084 wrote to memory of 2424 3084 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\13bb79beb8f9487a04fbbd3c294b4f9e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8b8946f8,0x7ffc8b894708,0x7ffc8b8947182⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,16329212783886725177,14047617893866419105,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,16329212783886725177,14047617893866419105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,16329212783886725177,14047617893866419105,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16329212783886725177,14047617893866419105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16329212783886725177,14047617893866419105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16329212783886725177,14047617893866419105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16329212783886725177,14047617893866419105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16329212783886725177,14047617893866419105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16329212783886725177,14047617893866419105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,16329212783886725177,14047617893866419105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 /prefetch:82⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,16329212783886725177,14047617893866419105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16329212783886725177,14047617893866419105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16329212783886725177,14047617893866419105,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16329212783886725177,14047617893866419105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16329212783886725177,14047617893866419105,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,16329212783886725177,14047617893866419105,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2628 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5e469a36c271580b8e49c23647e87ca84
SHA1e9d55caf85dea4625ebe1d1f133daec26029f972
SHA25648a435a2293c697dbaae2a8da74e99516dae9471131898d90946520aaacc5c57
SHA51200b9dbb7a27bd9cc394740d59073ed7eca4abb054748e240abb6f47cea70d0eee08a92fc9845b8fc5b9f339a4be187efd5904e33922baadeca2086bbf41a318d
-
Filesize
2KB
MD57bbfddbafa2ce308ccba15c9b2ec8fd5
SHA1138f42a4f7eaadfa3c419c80f3528403484fca8f
SHA256a14d3c0636f166735d37d9b5448853f240898bacb30f2a3bf99af06dbba46132
SHA51214a978660e3d68d3b8b61ab329e4c24ba4ea461ef0419c03ad263b8173b2ff9369552a843009a3f8049570165f4a0131b2166e9c36daa99692d8c9ebf2639393
-
Filesize
2KB
MD599677b3c7466a5746aa72e4d0e8a38be
SHA1e398a254352f9cda80be458e03e64f87b3ab70cf
SHA256be83e0e42d7ecd3e7a682bfc43fcad18ed36c7e5e599dc9fce2da51e71341116
SHA512133fdb4b263d178478fe11d05220366869265b92467aa24d14f6bc25f0702f09fdfa71f8a80755ffda4625a0a83fe53f4fcd559563e87e52eef2da06c6606eac
-
Filesize
6KB
MD5697d9aa2c3959bb67e5b6535b521211d
SHA10f118128d337b0e23e838e31b513e0eede9d0f0a
SHA256834a5ba57ae487a3a367b54d822b034b2338beb5d6f5906ee75855eb12d285f7
SHA51251d55770872833db9a0019b563c9dc7d174c2c15a08a9e71610e1f686201faecbdd3719994480f9b223d65e3e5f42bbd5b60d017067955e8311102c5d51463f4
-
Filesize
7KB
MD578c34e11e7d97422fc6460f51f639701
SHA144c5c44ba268813979798361dc88d2cedec22344
SHA2569f403b68e65870458daba5302b415e8d5af4914af8080faf43b39d6c15fab906
SHA51269bcfbd2242d6f538fc9fd4f03d27dfac65114139887329ab7e8a7787339a683fc0d1e8ab27e39b71a9acb1da6a248cb4eab25bb7459e6c39dc6713abc9ab66f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD599d336d880abfa73f32c362bd94338be
SHA1c78fbfc8c849af63b6a3f60aa6fc9480b1b6a52b
SHA256af718989675b518c7ff131ebef1775197a2bb9b18d4dde3de63ac40d9db3c461
SHA5124ff4934d9c6a2080f3fc9f7976bd04a53a2e962a38491cdcf1e463969dea5189a0594916abe9e5c28ea030f0c7fb1cd735d4b1313d8615175006be89abc31400