Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 18:48
Static task
static1
Behavioral task
behavioral1
Sample
140616bb8cfc762cdf15b77d641f53a5_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
140616bb8cfc762cdf15b77d641f53a5_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
140616bb8cfc762cdf15b77d641f53a5_JaffaCakes118.html
-
Size
35KB
-
MD5
140616bb8cfc762cdf15b77d641f53a5
-
SHA1
9b924bf84257c18965adba99a70542b8da60b336
-
SHA256
43969e672cb60bca72df932c0015c5b3576c01e8aceea0f62146d327c1f5d1e4
-
SHA512
585508a8d9f4ec81da2b140464147b7bdb3765004407a33e616245394b426a733897bf362199e6221cafe338c3bd397e68bb51b5ccaf14aa0f4329acece2923a
-
SSDEEP
768:wkZnYXJE8hcSvIEe6OkrTssKiEBmfjD78Mfm:/D8hcmIz6RuJBmf2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2720 msedge.exe 2720 msedge.exe 3104 msedge.exe 3104 msedge.exe 3644 identity_helper.exe 3644 identity_helper.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3104 wrote to memory of 3660 3104 msedge.exe 84 PID 3104 wrote to memory of 3660 3104 msedge.exe 84 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 1840 3104 msedge.exe 85 PID 3104 wrote to memory of 2720 3104 msedge.exe 86 PID 3104 wrote to memory of 2720 3104 msedge.exe 86 PID 3104 wrote to memory of 4168 3104 msedge.exe 87 PID 3104 wrote to memory of 4168 3104 msedge.exe 87 PID 3104 wrote to memory of 4168 3104 msedge.exe 87 PID 3104 wrote to memory of 4168 3104 msedge.exe 87 PID 3104 wrote to memory of 4168 3104 msedge.exe 87 PID 3104 wrote to memory of 4168 3104 msedge.exe 87 PID 3104 wrote to memory of 4168 3104 msedge.exe 87 PID 3104 wrote to memory of 4168 3104 msedge.exe 87 PID 3104 wrote to memory of 4168 3104 msedge.exe 87 PID 3104 wrote to memory of 4168 3104 msedge.exe 87 PID 3104 wrote to memory of 4168 3104 msedge.exe 87 PID 3104 wrote to memory of 4168 3104 msedge.exe 87 PID 3104 wrote to memory of 4168 3104 msedge.exe 87 PID 3104 wrote to memory of 4168 3104 msedge.exe 87 PID 3104 wrote to memory of 4168 3104 msedge.exe 87 PID 3104 wrote to memory of 4168 3104 msedge.exe 87 PID 3104 wrote to memory of 4168 3104 msedge.exe 87 PID 3104 wrote to memory of 4168 3104 msedge.exe 87 PID 3104 wrote to memory of 4168 3104 msedge.exe 87 PID 3104 wrote to memory of 4168 3104 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\140616bb8cfc762cdf15b77d641f53a5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbfd346f8,0x7fffbfd34708,0x7fffbfd347182⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,11187318192665521020,222344987701225175,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,11187318192665521020,222344987701225175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,11187318192665521020,222344987701225175,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11187318192665521020,222344987701225175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11187318192665521020,222344987701225175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11187318192665521020,222344987701225175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11187318192665521020,222344987701225175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11187318192665521020,222344987701225175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,11187318192665521020,222344987701225175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6892 /prefetch:82⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,11187318192665521020,222344987701225175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11187318192665521020,222344987701225175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11187318192665521020,222344987701225175,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11187318192665521020,222344987701225175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6716 /prefetch:12⤵PID:5288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11187318192665521020,222344987701225175,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6896 /prefetch:12⤵PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,11187318192665521020,222344987701225175,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
20KB
MD5397383c90a2d930f866f405747e27466
SHA17bb6b5d6cee104c877dc5c3462f61232ffe5b360
SHA256a67db01d19e15d8fa76e5a075e336e195325d79d277a83aadb6a440acf887c47
SHA5124357eddc0581e3cd6209646540bf59756cb4035d7dba47d5cb6b0050e6c202bda65721d4e9d644f37e3cd105bc5fa240574cfa96649f01e2769b796b523e08aa
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD56e7ae1c74cd07917f223c9867eb97b7c
SHA1e3eb930befb21c21eeb5814706d30c54d751e129
SHA256c31901ac1f0bc8b82ea7f498c6bf4bc161fdc8a3cfce1169fa71bd5e2309d186
SHA5127290ac64a6cfa0807c4302ef1885e33a6081547aa64b00ed5299eb31ecdbecb7f96115a4b90cf72a53c1db9302aef80430b9c9aa8daa37624432580a443afb9f
-
Filesize
1KB
MD563c07b0c4a6e15077e464aea0b844ae7
SHA1b1db2e19065b9e9168179f461323677e178afae5
SHA25648dfd4508bceb06ae6d5e49743898190cd5f349a71c60ddc13c60e43311e5bac
SHA5122ff133cf6f016390e4ffa179307194cc7f57f7bb986ab8adff7e23dd9cecba73fbad5059e205080ca08519d6f2990e117643baef60e3840d4ddef180c3f5d17f
-
Filesize
7KB
MD55512d085b2ddc2a91973cbc187ca7ebe
SHA1a7b0f512cea573a4e440ced4762adae5cd74eb59
SHA25634000de5b95149dcc2403986557fc0a79bd170380a14445ce440a4e1f3bcad44
SHA512184da8dfc496e475e4759d4a29a6eda1374e29badf255bde8b2f6d5bf5de6aaf81c11a895823d4d2eb08b5048a706674f0952db6a6470613e5a183db506b0d55
-
Filesize
7KB
MD5bd084da9351a465bdd1d10713e0153c8
SHA1770f76ae2080ef90c5803cefff8abc6073a9c850
SHA25656b6693dfbb0d6c21d5fa7303d18965fcb4b38bc7d5deac72201f85bc070c177
SHA51224c45658caa4aa73ad62f0ef160bd9f31d84055ae45762c561c82fafcde04e7564a8e83627848d55ccc3e15b436b8b5422450888a1f111e2fc3bb52af5e679b7
-
Filesize
5KB
MD54e07145705fe544fa2287156ebff67d9
SHA13f3a74793371aa6233ec72d8eb8d10b742727a43
SHA2566f64371ab993ee1319838e511fcc5ae204dccb73fb86968f0c8a61c72217e1a3
SHA5125782b412d65d851f067c8000f27b17921bc21b6c63c90f40aa0984f84e5b61a7555d92f9d1a22841890402e3c8a64998467e2dbc364663f61fa28a8acbed9ef1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5df7f33033409e975c557f26eb669b43c
SHA191497645e142bdc75d258e93811f46b713bd69af
SHA2567661122209fd0a2b663e3b022ca61ae4a7a10e27e7da5a2cdfc7fd922611e43e
SHA5124c986e73041fa6821239b3da8c9e265164acad98893a0f67cef8d0b760089df7e261367f220ef43406623c748c23c864316529585706e3dcd1a8790f7d8f0bf9