Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 03:12
Static task
static1
Behavioral task
behavioral1
Sample
22f327ac755e6471b35b4652a3952a82_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
22f327ac755e6471b35b4652a3952a82_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
22f327ac755e6471b35b4652a3952a82_JaffaCakes118.html
-
Size
175KB
-
MD5
22f327ac755e6471b35b4652a3952a82
-
SHA1
8f6acba3b42d20c2825b5d97ec592ef0373458e6
-
SHA256
251dd694fadf5f086d5625d8135ee764ed9b2ae74ad3f716a175567ae1d6fc9a
-
SHA512
49fcf15536d85a924d1c258098eb4773792e801ae666d0b949349eef754547e8cebe4fcf7141192c6c6035142bad4fa7cadc92bb62e9d806fc15e720ef42a6d1
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS34GNkFPYfBCJisu+aeTH+WK/Lf1/hmnVSV:SOoT34/FuBCJiMm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2500 msedge.exe 2500 msedge.exe 1636 msedge.exe 1636 msedge.exe 1264 identity_helper.exe 1264 identity_helper.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1196 1636 msedge.exe 83 PID 1636 wrote to memory of 1196 1636 msedge.exe 83 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 1456 1636 msedge.exe 84 PID 1636 wrote to memory of 2500 1636 msedge.exe 85 PID 1636 wrote to memory of 2500 1636 msedge.exe 85 PID 1636 wrote to memory of 3932 1636 msedge.exe 86 PID 1636 wrote to memory of 3932 1636 msedge.exe 86 PID 1636 wrote to memory of 3932 1636 msedge.exe 86 PID 1636 wrote to memory of 3932 1636 msedge.exe 86 PID 1636 wrote to memory of 3932 1636 msedge.exe 86 PID 1636 wrote to memory of 3932 1636 msedge.exe 86 PID 1636 wrote to memory of 3932 1636 msedge.exe 86 PID 1636 wrote to memory of 3932 1636 msedge.exe 86 PID 1636 wrote to memory of 3932 1636 msedge.exe 86 PID 1636 wrote to memory of 3932 1636 msedge.exe 86 PID 1636 wrote to memory of 3932 1636 msedge.exe 86 PID 1636 wrote to memory of 3932 1636 msedge.exe 86 PID 1636 wrote to memory of 3932 1636 msedge.exe 86 PID 1636 wrote to memory of 3932 1636 msedge.exe 86 PID 1636 wrote to memory of 3932 1636 msedge.exe 86 PID 1636 wrote to memory of 3932 1636 msedge.exe 86 PID 1636 wrote to memory of 3932 1636 msedge.exe 86 PID 1636 wrote to memory of 3932 1636 msedge.exe 86 PID 1636 wrote to memory of 3932 1636 msedge.exe 86 PID 1636 wrote to memory of 3932 1636 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\22f327ac755e6471b35b4652a3952a82_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb718546f8,0x7ffb71854708,0x7ffb718547182⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,8772038480086607795,12512692171545322458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,8772038480086607795,12512692171545322458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,8772038480086607795,12512692171545322458,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8772038480086607795,12512692171545322458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8772038480086607795,12512692171545322458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8772038480086607795,12512692171545322458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8772038480086607795,12512692171545322458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8772038480086607795,12512692171545322458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8772038480086607795,12512692171545322458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,8772038480086607795,12512692171545322458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 /prefetch:82⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,8772038480086607795,12512692171545322458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8772038480086607795,12512692171545322458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:5752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8772038480086607795,12512692171545322458,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:5560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8772038480086607795,12512692171545322458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:5628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8772038480086607795,12512692171545322458,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,8772038480086607795,12512692171545322458,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5196 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD59a01762da917675e1e4c25c8700e4eb1
SHA1b5616ef1a14ef8eba17462f7c2b12a8f761021ff
SHA256bafb7b2db275f028bee35f7b5b2d404de562f2c76429034ff16b07dc2b05f904
SHA5124b569bab3499289a273232c7f2a5a3c8ea004baf7acf388a8db661962f2f2eb1cf3de66f6ac07eae648579d6e5ea16c1985219c6d5d1140429423f65f1aa2221
-
Filesize
2KB
MD5800e742fed9f3c7ddd1b5bf6c37722bb
SHA1b3f79015d1d06adf194d12d37645065ff859524c
SHA256ed5eafa3037e1a894a5962b4a7da4d487ce8dec3c07d82d6208517a4a20d6c0b
SHA512d6d931bcb90b23e0fb9fbf631dafc6618ad0e0356fd87e514c2da5af64097c1d6c49310fa30d2f3b6fb6a657d3e82b33a8da226a8eb14d3c859813bca5a57b71
-
Filesize
2KB
MD5b7a45f5d37975ef7758e63725bcf55f6
SHA193fd988d5a2c7145b0a00f321932666633e2a5b2
SHA256ad63a3d4c0fac0b326636bed8acc9c71678dffc7476cc5cd82c535086cad0962
SHA51273ed2a4422306562306a1990744769fb5bc8cc8888e2494e0a84cb78c9878aeff1a6d1578523c16bef680d5391ef08673d64e1495659a7979e42eb0e6e2d7849
-
Filesize
5KB
MD550ecb0865c13e7ae82a0600040e61017
SHA18fab9d1f84a2f7c066800deb1f25cb07fcdf1d9a
SHA25671c04a5e0e97c27e28402f611a5e20077f1cd77ed774a8a894fc0c720b70faf2
SHA512a817cd1ae11e83fedea279797817cb282fe91b41ffac68a6a7a52d84817ad040eeda9b512473281479255a95a1fb53d81afc6b78a37c770ea3672f1fcef29be4
-
Filesize
7KB
MD588f2971a2c4488348dc80b460f693484
SHA1c3ad1d33f1bb4b06d2ee616edb764a0f0b79f66c
SHA25631516a25e6ba65e946a9292cfbd9fae7f2c25ae1cb202cc9ae1676b4b69d04a7
SHA5123684fadfa8f30851990550b10dfa3a738541cbdb98ead9554aa1867d50ec6a9ee3f34a5927aeca762e29e2e8f49c07b2b9808b2dc70a53112d4f06dc92c8c30c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5276b836122c7385e254105dfe568b40a
SHA180f3f50f6bf905f872ab00264abb210a4ee22493
SHA256b229337cebd538e582363d81bf539f0dbf40ccc6cb7188d3988355129a332d36
SHA512846a73df0855fe1f27c333b8b05c8b88230661b3fc47a3d93044faaea0ec203d116c82f8223133c5ed29cd38c3155666d86e2f00ee6ffa2ac4f0a5f63baa56c5