Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
2360f325e5f2b7ad0b6012a3d1b06aac_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2360f325e5f2b7ad0b6012a3d1b06aac_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2360f325e5f2b7ad0b6012a3d1b06aac_JaffaCakes118.html
-
Size
176KB
-
MD5
2360f325e5f2b7ad0b6012a3d1b06aac
-
SHA1
b7e892fb44af7e5bb99d1e9d9d423234575b8f46
-
SHA256
7b23d9b641bc25e52682266defb11671b506d024181858ac5631c8cfdeba6d60
-
SHA512
c8129a32b57ba6f87cea2a40b3f4ac3e0d6e00c3f9e0f3357a3370d8061d549d10fd3b21be616ef81db10c4e0faa9b643f486fa973ed61031756f3025486217a
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3aGNkFPYfBCJiZI+aeTH+WK/Lf1/hpnVSV:SHCT3a/FuBCJiPB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1076 msedge.exe 1076 msedge.exe 5116 msedge.exe 5116 msedge.exe 4168 identity_helper.exe 4168 identity_helper.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5116 wrote to memory of 2176 5116 msedge.exe 83 PID 5116 wrote to memory of 2176 5116 msedge.exe 83 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1920 5116 msedge.exe 84 PID 5116 wrote to memory of 1076 5116 msedge.exe 85 PID 5116 wrote to memory of 1076 5116 msedge.exe 85 PID 5116 wrote to memory of 2664 5116 msedge.exe 86 PID 5116 wrote to memory of 2664 5116 msedge.exe 86 PID 5116 wrote to memory of 2664 5116 msedge.exe 86 PID 5116 wrote to memory of 2664 5116 msedge.exe 86 PID 5116 wrote to memory of 2664 5116 msedge.exe 86 PID 5116 wrote to memory of 2664 5116 msedge.exe 86 PID 5116 wrote to memory of 2664 5116 msedge.exe 86 PID 5116 wrote to memory of 2664 5116 msedge.exe 86 PID 5116 wrote to memory of 2664 5116 msedge.exe 86 PID 5116 wrote to memory of 2664 5116 msedge.exe 86 PID 5116 wrote to memory of 2664 5116 msedge.exe 86 PID 5116 wrote to memory of 2664 5116 msedge.exe 86 PID 5116 wrote to memory of 2664 5116 msedge.exe 86 PID 5116 wrote to memory of 2664 5116 msedge.exe 86 PID 5116 wrote to memory of 2664 5116 msedge.exe 86 PID 5116 wrote to memory of 2664 5116 msedge.exe 86 PID 5116 wrote to memory of 2664 5116 msedge.exe 86 PID 5116 wrote to memory of 2664 5116 msedge.exe 86 PID 5116 wrote to memory of 2664 5116 msedge.exe 86 PID 5116 wrote to memory of 2664 5116 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2360f325e5f2b7ad0b6012a3d1b06aac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2acd46f8,0x7ffc2acd4708,0x7ffc2acd47182⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,9596462249372330902,16607423843223830437,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,9596462249372330902,16607423843223830437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,9596462249372330902,16607423843223830437,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,9596462249372330902,16607423843223830437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,9596462249372330902,16607423843223830437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,9596462249372330902,16607423843223830437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,9596462249372330902,16607423843223830437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,9596462249372330902,16607423843223830437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,9596462249372330902,16607423843223830437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,9596462249372330902,16607423843223830437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,9596462249372330902,16607423843223830437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,9596462249372330902,16607423843223830437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5900 /prefetch:82⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,9596462249372330902,16607423843223830437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5900 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,9596462249372330902,16607423843223830437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,9596462249372330902,16607423843223830437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,9596462249372330902,16607423843223830437,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD51f51747d004d489088ed6799a3ed0d6e
SHA1c11590b0ae53674f63bfb19eb02ac9a908b8c3dc
SHA256c73496121c8ac3af0cb02bdffcdbf2c3eae17482f4546934d4435ec98a712ade
SHA5126354c83b94206ef71aba4acdb7b026fbf37c6f99bbcdad499c1303d1953a04410700bc5dc444fc4711a6a9fb90f74cfe95f76c34cc1ef6d4fbfc70438e19dbf4
-
Filesize
2KB
MD54be2cc50521840ebbd33f06cd88875b5
SHA13fee1d41b9cee38d0222656312304f6adf92c08c
SHA256d44a744b9a06bbf086485b71fcc3c1cad49c2e67898ce0579d34e0e92dac4277
SHA5127dbd1c57b862367aa2a4acc46a48a17e9d3a8331f806e111b5c7e85c6f9a723e7ba605eb145c985af712af3fb43d1ecb21b518984e861cf9ee36a39d501c2be6
-
Filesize
2KB
MD538219221899289d281c7e820811760ab
SHA16dd3ec68cd9895d72ca3bccdbfdd27b0404e90a1
SHA2565ccf4ab41be4b3435a72b974783a1988913f7f90f2ea8ce16e4d1911771eb28f
SHA512a03f9ef995dd9a2015a3a463e954fe285e53bc87aa7ce334d4b2e33d59889081fd015c4fea9c79352c3d0929c28fef79db30130f23e3d5de4a3969591bff3850
-
Filesize
5KB
MD5d12262859cec22699a61d206d1af9789
SHA14548ab8077da76618e946a93fab117b3f49bd363
SHA2565dc50e128bd079935b0f9cb98d71809977b9263a32603c1ec6b42baaa34316ac
SHA512a2167e5ea65cb328bdc0bdd20c25df857504b463cf2abe15f8d1079e300d2b51d225b9302db33c6f390415fca5889df6af960dd95d734b09fad6b218ea27a932
-
Filesize
7KB
MD5981e5847f4449a53ce1a55a9ced4fd94
SHA1ff86c6671b4c66f6189167719aa0cda8e3a3c5d1
SHA256e2165d96caf1335c75304c077ebeb8ade10bbf1ff38a04c7f8fe7788105e17f4
SHA512f5e05c38182cba961e97f103d31a76c31a76e3afb385114ebc88328652b9053dff32723c126ce228865f3c94c77b2b85c3edd247fbe07d4163be1977f33aea4c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD579fe52419e733cbae9f8307e7315084e
SHA1b964d31b18c6d98326f81cca2eeec6173ab6ec76
SHA2567df592dc745f7764578afffd723a9299980f7ba8650ca73d5400d7486fdd23b7
SHA512b9648ca3a84d31121b80b72082ac2fffa63c44afd71387c270ef159a76f81d9ae08a4303465210513d7cc5271cde66b36f68224cf24ada4612f4acad153a4267