Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 17:50
Static task
static1
Behavioral task
behavioral1
Sample
2602b036b9dfd808298b012e5aa04b94_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2602b036b9dfd808298b012e5aa04b94_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2602b036b9dfd808298b012e5aa04b94_JaffaCakes118.html
-
Size
175KB
-
MD5
2602b036b9dfd808298b012e5aa04b94
-
SHA1
65f66aa13d52010faf94079b4d75ee63b1b2e2d5
-
SHA256
4d56953fe7e1c0e7fdcdae91f185be44c5d39d6c94f16f691e1f1651f0d92d8e
-
SHA512
595cfe39501dfdbdc8e951c919939b573f4041df83aa9c1edf8c6a6b0fa52f08c1408819f9b7c8c5e763fabc97d38e3727cf74e06ac1c9436b1e5665d778595f
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS3TGNkFtYfBCJisx+aeTH+WK/Lf1/hmnVSV:S4oT3T/FoBCJiBm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1516 msedge.exe 1516 msedge.exe 1776 msedge.exe 1776 msedge.exe 532 identity_helper.exe 532 identity_helper.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1776 wrote to memory of 2592 1776 msedge.exe 79 PID 1776 wrote to memory of 2592 1776 msedge.exe 79 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 2432 1776 msedge.exe 80 PID 1776 wrote to memory of 1516 1776 msedge.exe 81 PID 1776 wrote to memory of 1516 1776 msedge.exe 81 PID 1776 wrote to memory of 1512 1776 msedge.exe 82 PID 1776 wrote to memory of 1512 1776 msedge.exe 82 PID 1776 wrote to memory of 1512 1776 msedge.exe 82 PID 1776 wrote to memory of 1512 1776 msedge.exe 82 PID 1776 wrote to memory of 1512 1776 msedge.exe 82 PID 1776 wrote to memory of 1512 1776 msedge.exe 82 PID 1776 wrote to memory of 1512 1776 msedge.exe 82 PID 1776 wrote to memory of 1512 1776 msedge.exe 82 PID 1776 wrote to memory of 1512 1776 msedge.exe 82 PID 1776 wrote to memory of 1512 1776 msedge.exe 82 PID 1776 wrote to memory of 1512 1776 msedge.exe 82 PID 1776 wrote to memory of 1512 1776 msedge.exe 82 PID 1776 wrote to memory of 1512 1776 msedge.exe 82 PID 1776 wrote to memory of 1512 1776 msedge.exe 82 PID 1776 wrote to memory of 1512 1776 msedge.exe 82 PID 1776 wrote to memory of 1512 1776 msedge.exe 82 PID 1776 wrote to memory of 1512 1776 msedge.exe 82 PID 1776 wrote to memory of 1512 1776 msedge.exe 82 PID 1776 wrote to memory of 1512 1776 msedge.exe 82 PID 1776 wrote to memory of 1512 1776 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2602b036b9dfd808298b012e5aa04b94_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c50746f8,0x7ff8c5074708,0x7ff8c50747182⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,9908431364734826170,14411637240839943601,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,9908431364734826170,14411637240839943601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,9908431364734826170,14411637240839943601,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9908431364734826170,14411637240839943601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9908431364734826170,14411637240839943601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9908431364734826170,14411637240839943601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9908431364734826170,14411637240839943601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9908431364734826170,14411637240839943601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9908431364734826170,14411637240839943601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,9908431364734826170,14411637240839943601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3396 /prefetch:82⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,9908431364734826170,14411637240839943601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9908431364734826170,14411637240839943601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9908431364734826170,14411637240839943601,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9908431364734826170,14411637240839943601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9908431364734826170,14411637240839943601,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,9908431364734826170,14411637240839943601,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5596 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD53ba19a237244ce6bc66fbb13fd1aafc2
SHA1341a72ba314b6216c4af0d76d3e2ef7d5c66ca0f
SHA256c52e55c5cfe982ab3cd80241fb35b8b9d4a119fd71df162d14c00344ea28bc14
SHA512e61e4d3706c19188508e7b7db57b9d8fac53bba943d7e96cb36cea258f451375a41517e1360eb2a65bc19fcc1a3cc91022e4e2e1e9989e0796f70d62f02aaee9
-
Filesize
2KB
MD581edab3549652d5472a97d0b4c9f1583
SHA10f71940a6cf587d4f837e9b677376454c31508c1
SHA256d339cee7011fec4a138ce24e219777b6781c827b182633bb6cd8397edf7750d8
SHA5128f7d9dcdfcdff3be9878d1234f140a87edd6f1ee605d3db8cf1b048b2886de8dd91a948a8243d6f4d9881018276a0de13e5048bf36fec46cace14658d7cb6661
-
Filesize
2KB
MD5a19258b4d0acd7515da4272f5dc3791f
SHA1af4d8211e43299a419bc9366e5828bce0e637d72
SHA256756cc46623dd5bf4654eb2b7fabd1c91c7fee5c6d368e0e3ba56097b90ababe6
SHA5128e62ae8f81dbb6af815fcc455347de238b3fa03939700796db9fe90d84778bf4d133a259bf201214cc8e77dfaae8809d6b82b980b67f990864164d947b006e4f
-
Filesize
6KB
MD5e91179d3424d3aef0676d9c387a3f5ff
SHA1de8667c623cde9879465bab78cd90de3778ffd6b
SHA2562dce80f1a3a4472dc3898ba7f81b8ec88a8c40abe1ee08ac3ab9d9a8156831ab
SHA512441edf3a9e9fbca6a1275c6892be7f47b8fe180d189789275f4f255c26880d20cee7c0fa7dcef00084074b75e578b4ce25e5a32de24506da684aaedbf366069d
-
Filesize
7KB
MD5e288a2020c9291a5c72c7163b38a6cfb
SHA1bc6d829c3effa17ed8a1f328411479fc0abc7549
SHA2564217b3bdf222025e82ffff2b93dd0b45e89950287eb1344e16ccca33e0d05838
SHA51215837a8b84b780b28bd8208edca888d8344ac27f5ec237f8c2091e25ec986a0272fd4b6d2be42ba4003b311f307942feb5922e30121fdbfbd7b7f37017583df7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55608e263032b90660d0237b0fe274dc8
SHA19e09c1bd78a2177760b07ee05f646318a75c6b4c
SHA256e5939d5eaa8f38dc7938d4cba3ec3ca427473925febc026097f711cef88e4a28
SHA5122a205cc9f6c406f1ea0ea65a1d3e0a8e02a756d6ed515b9d05c80a5861fcc2a0fa803f4aa0a15df0caeeb645ec435cfc766343623903b450fbe1740f35c6076c