Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 08:54
Static task
static1
Behavioral task
behavioral1
Sample
24197cbc0a43d23e2b8d581b319162a7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
24197cbc0a43d23e2b8d581b319162a7_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
24197cbc0a43d23e2b8d581b319162a7_JaffaCakes118.html
-
Size
175KB
-
MD5
24197cbc0a43d23e2b8d581b319162a7
-
SHA1
6aa835ecd6f07b58e760fd9457a23416ba6e5de7
-
SHA256
24406e63609284d4bb1fe01022198efd35a47b34eb68d9d3a577c57a1b6eb639
-
SHA512
19fde5ea4a57adc8b8e7350dfda2643cc344be36e7d505e24a0e43556d10ba4c5e2f4f6f293b38d22e26da7f16412719731da0bc5269f3b0256426e395fa763b
-
SSDEEP
1536:SqtO8gd8Wu8pI8Cd8hd8dQgbH//WoS3QGNkFdYfBCJiZc+aeTH+WK/Lf1/hpnVSV:SaCT3Q/FYBCJiDB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 3844 msedge.exe 3844 msedge.exe 4804 identity_helper.exe 4804 identity_helper.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3844 wrote to memory of 3340 3844 msedge.exe 84 PID 3844 wrote to memory of 3340 3844 msedge.exe 84 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 3724 3844 msedge.exe 85 PID 3844 wrote to memory of 4212 3844 msedge.exe 86 PID 3844 wrote to memory of 4212 3844 msedge.exe 86 PID 3844 wrote to memory of 4704 3844 msedge.exe 87 PID 3844 wrote to memory of 4704 3844 msedge.exe 87 PID 3844 wrote to memory of 4704 3844 msedge.exe 87 PID 3844 wrote to memory of 4704 3844 msedge.exe 87 PID 3844 wrote to memory of 4704 3844 msedge.exe 87 PID 3844 wrote to memory of 4704 3844 msedge.exe 87 PID 3844 wrote to memory of 4704 3844 msedge.exe 87 PID 3844 wrote to memory of 4704 3844 msedge.exe 87 PID 3844 wrote to memory of 4704 3844 msedge.exe 87 PID 3844 wrote to memory of 4704 3844 msedge.exe 87 PID 3844 wrote to memory of 4704 3844 msedge.exe 87 PID 3844 wrote to memory of 4704 3844 msedge.exe 87 PID 3844 wrote to memory of 4704 3844 msedge.exe 87 PID 3844 wrote to memory of 4704 3844 msedge.exe 87 PID 3844 wrote to memory of 4704 3844 msedge.exe 87 PID 3844 wrote to memory of 4704 3844 msedge.exe 87 PID 3844 wrote to memory of 4704 3844 msedge.exe 87 PID 3844 wrote to memory of 4704 3844 msedge.exe 87 PID 3844 wrote to memory of 4704 3844 msedge.exe 87 PID 3844 wrote to memory of 4704 3844 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\24197cbc0a43d23e2b8d581b319162a7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8b0446f8,0x7fff8b044708,0x7fff8b0447182⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,1777254292500701799,14395742190393011405,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,1777254292500701799,14395742190393011405,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,1777254292500701799,14395742190393011405,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1777254292500701799,14395742190393011405,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1777254292500701799,14395742190393011405,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1777254292500701799,14395742190393011405,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1777254292500701799,14395742190393011405,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1777254292500701799,14395742190393011405,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1777254292500701799,14395742190393011405,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,1777254292500701799,14395742190393011405,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3228 /prefetch:82⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,1777254292500701799,14395742190393011405,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1777254292500701799,14395742190393011405,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1777254292500701799,14395742190393011405,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1777254292500701799,14395742190393011405,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1777254292500701799,14395742190393011405,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,1777254292500701799,14395742190393011405,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4244
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD55c489d2b6e40c914df91fb7731c04285
SHA1f3e17a57022c22c9cc37f6cd3a2bedb124d68b5f
SHA2569d51acd9c697bd85923a035f4e7bf61b9710a1b5570a21153d558f7477906218
SHA5120a71fc4b3fe798d474e9755b7f0cbc05965eac732bfbcdab1985cf759fe2d6190d9042dcf7fb1647b5e77d3335c39e175d589e917145b25044dafec91e73f522
-
Filesize
2KB
MD5a04524b64c6afd3c8d92def67ca8b2c6
SHA1636ec9eae299a0d06eef2d80f2c7f32b6774b21a
SHA256f0b0688ccaadc768c542a5a46192f626b8337a94abcceed3e8e97d7d9e7f0d2c
SHA512e583abf6912d990c8c9821c34e33df38a085630999ac766e0da37bae47fde99ef5b75094afbf8acfd153ec5002f73c970004d7df7781d1f79ddcf162c3e0dbdc
-
Filesize
2KB
MD5d4da495a3bb5eda85a69a8585c1521d9
SHA189466129f87a7b05fcac3153e2890fac407bc0ff
SHA256be0306ba14c8c3a99e8a544e89b7fef0e759be6139680af84c518213489d197f
SHA512a3c3949c570c1132b589f65da3179ea09c90330544a35af78d972dec8e4aff6c1f83a00aaefc7ec5679103f52f7d600e91f2f4718b017f14699fb9dc7efb0c8d
-
Filesize
7KB
MD5e46f683d68460b127bbde18a760111ef
SHA1c3ae5747adcb19a0a97a9441fb8603ee656bc3d1
SHA256324251adebebe701629a75e04ee37ac7112d8f8f07d8ce9b26622db1c506e46b
SHA51294c3abd295b6f3d6e9d22dfff84bdb58a0407c961f04790a226bb54ca713f90f597d01e9245c334ce1cc8857644df93758056acf4358d10c70889a3327189deb
-
Filesize
5KB
MD5377b9a3cfbc1c6d07668d198ab8e2be0
SHA1a7926e9b00353dc5270f92aa03ae9d2fe89516e6
SHA256b860338349ea94fec51c287156dda3adfec6fb1280b4aecda66f4ba6b9516947
SHA5120b074eaf61989daaee5785a5f7231cffdb477ba133fc9865932f9b20bfd40f5d7fe8734dda1c1bb16d1ddf70d4abbb6cf63803db00257eed71218d522a92a2df
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b5de28e93c1d20db82482d080948a654
SHA1754424bac295beca8684fe1eab2f02b499e88340
SHA2563fdef4a5168bde656d1574ebe292d5216378daa379538d8097581236ae716396
SHA512a114286afde4cb10c85b89a79d01c404deb6347c62a0a3d4ff316f9fb95ca924df78c2bc29b31f54c78ef8c3c26843190090e7130543cb3b19fbeaf615416737