Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
222d676ccafc212f54fbe6cbda346b48_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
222d676ccafc212f54fbe6cbda346b48_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
222d676ccafc212f54fbe6cbda346b48_JaffaCakes118.html
-
Size
175KB
-
MD5
222d676ccafc212f54fbe6cbda346b48
-
SHA1
1f269d6b8d326e581b2310923f5b2f06154da353
-
SHA256
2627c78999f3a681b2b265d6350787462e797e79c518013e554077c771965630
-
SHA512
ec28c440438160ba85b144bbe0177ce3d4f7f15a53596453fdc21f7843af41660366cdbcaee2b1173dedfedc414577a06c0863645992cf849f00772c9b69dc1f
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3KGNkFzYfBCJiZv+aeTH+WK/Lf1/hpnVSV:SHCT3K/FKBCJiWB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1200 msedge.exe 1200 msedge.exe 4364 msedge.exe 4364 msedge.exe 224 identity_helper.exe 224 identity_helper.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4364 wrote to memory of 4992 4364 msedge.exe 84 PID 4364 wrote to memory of 4992 4364 msedge.exe 84 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1544 4364 msedge.exe 85 PID 4364 wrote to memory of 1200 4364 msedge.exe 86 PID 4364 wrote to memory of 1200 4364 msedge.exe 86 PID 4364 wrote to memory of 1356 4364 msedge.exe 87 PID 4364 wrote to memory of 1356 4364 msedge.exe 87 PID 4364 wrote to memory of 1356 4364 msedge.exe 87 PID 4364 wrote to memory of 1356 4364 msedge.exe 87 PID 4364 wrote to memory of 1356 4364 msedge.exe 87 PID 4364 wrote to memory of 1356 4364 msedge.exe 87 PID 4364 wrote to memory of 1356 4364 msedge.exe 87 PID 4364 wrote to memory of 1356 4364 msedge.exe 87 PID 4364 wrote to memory of 1356 4364 msedge.exe 87 PID 4364 wrote to memory of 1356 4364 msedge.exe 87 PID 4364 wrote to memory of 1356 4364 msedge.exe 87 PID 4364 wrote to memory of 1356 4364 msedge.exe 87 PID 4364 wrote to memory of 1356 4364 msedge.exe 87 PID 4364 wrote to memory of 1356 4364 msedge.exe 87 PID 4364 wrote to memory of 1356 4364 msedge.exe 87 PID 4364 wrote to memory of 1356 4364 msedge.exe 87 PID 4364 wrote to memory of 1356 4364 msedge.exe 87 PID 4364 wrote to memory of 1356 4364 msedge.exe 87 PID 4364 wrote to memory of 1356 4364 msedge.exe 87 PID 4364 wrote to memory of 1356 4364 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\222d676ccafc212f54fbe6cbda346b48_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb784b46f8,0x7ffb784b4708,0x7ffb784b47182⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,16518550315986385148,14619270609470606218,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,16518550315986385148,14619270609470606218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,16518550315986385148,14619270609470606218,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16518550315986385148,14619270609470606218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16518550315986385148,14619270609470606218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16518550315986385148,14619270609470606218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16518550315986385148,14619270609470606218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16518550315986385148,14619270609470606218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16518550315986385148,14619270609470606218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,16518550315986385148,14619270609470606218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 /prefetch:82⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,16518550315986385148,14619270609470606218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16518550315986385148,14619270609470606218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16518550315986385148,14619270609470606218,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16518550315986385148,14619270609470606218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16518550315986385148,14619270609470606218,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,16518550315986385148,14619270609470606218,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD550ba2cebb57c5aa327b702782ff85a2d
SHA1b7ffe13612c7254df72b66f31fabd4b3e3515a7c
SHA2560ef58d2e0ace20b4fd348df49c38991887c2bc13aa3d0c02d2662a3611bf30b3
SHA512c25c918730d219069628a3f0c4cfb0856f38987428ee502d95482a619011ee418cdb0a5cd08e29ed71b81e8e024acb722a816e18614fd029a6b03d84e619a8cb
-
Filesize
2KB
MD54071d12ccbdc36ffcec2e8a8b7a430f5
SHA158c5408752cf30094c76e88915414c5460bee15b
SHA2566e776b731bf77704d29d71e94dbd6dee85f8b600e47c1c2e0209b8bf42258daf
SHA5122bda2bcfc2f5667d99da551e4b05ee7a6b7d8f6f8c3f3dbdbbe6a782a02e42d5aa3ba20cacba6a8fbfb935fef2fa0116ac6813cfdafad34a8552fc8b85f745c9
-
Filesize
2KB
MD55f54d0f844bd1e87f0923c4e6174e9b2
SHA186e70b84c25273e4c5c859d589f20a3f1f36fd88
SHA256f2ecdd8988492115475af965a9ce3f48ea9bd14d0a367ea6c6fd6ff6e48b92ca
SHA512e2cd2b21715fc08db29ea2c6c880a401728c403d5e6536c14921434ae887809c13871b727929b40af3638272cc00fbac4fb8b51181cd8cdb6719e0bdd74204ba
-
Filesize
5KB
MD53ed505e47096c38f8a697e04e2e075b9
SHA174d6ada0f7fa14acd4c81cec887f5f91f0c84e0c
SHA256e909021f6d61b717a8b4c37f764c206de7cb3483f76270cb941c835a9e2e6630
SHA512e0ab43bc8a9baaffc61c0d3f59819e588cbd8e79c00a3c64dd6e546327c8b7e8d86147c6fa14a586ae9e09007dc79155423358915bd25892c62d961f874dc467
-
Filesize
7KB
MD553e3356e4988285361e8566b3dabe7cd
SHA1c4591b169a24a8a00885f70b2d912d37ba75601a
SHA256ba3bbf91080657f0ea3dfb2733062206b6c7a5862ead7001a31bdb41d1dd95c6
SHA51270d85da1f000882e43054c8fd458afe36c8ee385e57d9db59707d911f7f2940057d9a6a53a46baa681041d8857ea96a58ea1e2c4f37366500b10949d7f0bee56
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD546c22394f134eab745d9fbfbe72c1845
SHA1ffee17b3f3501697d3755fb3e558ffb03ef1bbeb
SHA256d75edfe9aed954f6ce0a364e74ce162b3fff69eb6b1be98b4ab5bf23932c6278
SHA512e85445a0b23dc1fb4fea149f1d3b66465f0cb8b101535858fdcfd6b0b92bcfb4c8d38f3775deb1e0ff41bdc944172f359b88aac2f51754fa52a52967c3aa2e2e