Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
178f582c05f1fd0e2cd86bf7dbe240c0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
178f582c05f1fd0e2cd86bf7dbe240c0_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
178f582c05f1fd0e2cd86bf7dbe240c0_JaffaCakes118.html
-
Size
176KB
-
MD5
178f582c05f1fd0e2cd86bf7dbe240c0
-
SHA1
9b277ecc9f1e464c969329111de199cf81588335
-
SHA256
7c875e265e98defeebfd9343ada09c6995e7855426d1ffb5618cd71255dccc5b
-
SHA512
0db2240c0abe8db437f3e857f000f4b8b45d14d2de802049dd09e346249e394fc43b86d5cb9e177785e3e58975db0c2aa104599303d3c42d369f96227b51ba98
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3dGNkFOYfBCJiZv+aeTH+WK/Lf1/hpnVSV:SHCT3d/FnBCJiWB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4056 msedge.exe 4056 msedge.exe 3880 msedge.exe 3880 msedge.exe 4624 identity_helper.exe 4624 identity_helper.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3880 wrote to memory of 2724 3880 msedge.exe 85 PID 3880 wrote to memory of 2724 3880 msedge.exe 85 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4132 3880 msedge.exe 86 PID 3880 wrote to memory of 4056 3880 msedge.exe 87 PID 3880 wrote to memory of 4056 3880 msedge.exe 87 PID 3880 wrote to memory of 3856 3880 msedge.exe 88 PID 3880 wrote to memory of 3856 3880 msedge.exe 88 PID 3880 wrote to memory of 3856 3880 msedge.exe 88 PID 3880 wrote to memory of 3856 3880 msedge.exe 88 PID 3880 wrote to memory of 3856 3880 msedge.exe 88 PID 3880 wrote to memory of 3856 3880 msedge.exe 88 PID 3880 wrote to memory of 3856 3880 msedge.exe 88 PID 3880 wrote to memory of 3856 3880 msedge.exe 88 PID 3880 wrote to memory of 3856 3880 msedge.exe 88 PID 3880 wrote to memory of 3856 3880 msedge.exe 88 PID 3880 wrote to memory of 3856 3880 msedge.exe 88 PID 3880 wrote to memory of 3856 3880 msedge.exe 88 PID 3880 wrote to memory of 3856 3880 msedge.exe 88 PID 3880 wrote to memory of 3856 3880 msedge.exe 88 PID 3880 wrote to memory of 3856 3880 msedge.exe 88 PID 3880 wrote to memory of 3856 3880 msedge.exe 88 PID 3880 wrote to memory of 3856 3880 msedge.exe 88 PID 3880 wrote to memory of 3856 3880 msedge.exe 88 PID 3880 wrote to memory of 3856 3880 msedge.exe 88 PID 3880 wrote to memory of 3856 3880 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\178f582c05f1fd0e2cd86bf7dbe240c0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9475d46f8,0x7ff9475d4708,0x7ff9475d47182⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,1044535468961801268,12366192613260543886,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,1044535468961801268,12366192613260543886,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,1044535468961801268,12366192613260543886,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1044535468961801268,12366192613260543886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1044535468961801268,12366192613260543886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1044535468961801268,12366192613260543886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1044535468961801268,12366192613260543886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1044535468961801268,12366192613260543886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1044535468961801268,12366192613260543886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,1044535468961801268,12366192613260543886,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,1044535468961801268,12366192613260543886,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1044535468961801268,12366192613260543886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1044535468961801268,12366192613260543886,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1044535468961801268,12366192613260543886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1044535468961801268,12366192613260543886,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,1044535468961801268,12366192613260543886,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3168
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD59a454ef92215e87ab19857542db5a1a4
SHA15e22aacd7e7ceb44197f4af30844b5ae765c4456
SHA2560eceeaf9cb752b758bedf6ab334980219913a0a4673333d900f1bd0b3b352f3a
SHA51297713e2f63d2f0ec7836b21b2b103294d967418d91caa463c565a708cb1ca4fa856fac896edfb009b461cb6a4a75738de85559debb0297928965116f4728eceb
-
Filesize
2KB
MD5026019ca60bbf216bd74a1c685f5ada3
SHA1cf76e1cc88996ae39805e1bddbe3c9251964c3cd
SHA256dd57d2e39b211a17073c3358d484ffe5242793051c231159be73b28f2e2b1b04
SHA51203f41502a37b7ac6974460121caae4e85996f835f3261242ce591110f8c01633aac862cbddf5a509caa3ad0dc70c190efd144853d3a68c9a1d25a817a868b08b
-
Filesize
2KB
MD5f9d1704e12d27938fe34273fed6aec6c
SHA1d1fa289128b3a343fb382af0db57069a19e17c35
SHA25635c51bd04c37bc9c938d668f6790cfc7df19e21689c21734e96993e2b5a921c1
SHA512c0db85c0c8874aeab57d92f8194b152a07c6c0cf40c36844752dd4ed3c25a0a11fd038e331fa110163593c33d1f519534d630b3fca416977dd8d9a43be2b8d88
-
Filesize
7KB
MD5066cbec639c756c00c39b8f7a4436639
SHA1aeb86af32543f751d9b5a18918844d884ad5a488
SHA256890f1f45e9767e02141fb5926f523ecc786e396ecad393f26132ec3ec76814de
SHA5128741499b8cc9f7b8d1ef5ecffbe951bd840b3ae32f09e8c98251bd0c9f6d564142541b2428ec65a350d745f8918dbca8f2ddd817f57faf58d8a5e917133223b8
-
Filesize
5KB
MD59936b31206148b3c2ec9c23c473c6950
SHA132e7d091eb23571adbfca963160a3f333d136843
SHA2568acb81f9cc350d6bba974b948c2c4f1c76a69503852c1655b37f6be0b792d2aa
SHA5129b4affb8229355b1d72189087a65590fcc50643fdab78764eda137942e2a57d348a1242ad62c9cf39dedc26f11f37338331c628395761ea220d67b20d8f581ba
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55ecf191f674f04cf788352a034b61e7a
SHA1b0d5ebf955a391ef3da1d4ef408a6062ccfa5e6e
SHA25619a5f936f0a7545d5885fee0f72a49d8980845d1081006df38e77ec85d4d8ec2
SHA512b4a9f139672d4fe62e8838a064b04bdec5ed9630e9eb02c27af8e419b1fa177c918bd97f1bdef80ae6f4717208ae8f53440ed4f2eec3d739efe11a54d16dadac