Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 16:00
Static task
static1
Behavioral task
behavioral1
Sample
2abe19f7d67ac48dcf57c89451acc05b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2abe19f7d67ac48dcf57c89451acc05b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2abe19f7d67ac48dcf57c89451acc05b_JaffaCakes118.html
-
Size
175KB
-
MD5
2abe19f7d67ac48dcf57c89451acc05b
-
SHA1
23fa6d8c9dd348788d1863d24db4492edaa44da5
-
SHA256
aee45881c1e166447351d3afe2c9b292161a1ed6c9082923d5987c2ede018828
-
SHA512
596050c4389c576e704d577d76c8271288701abfdecacbd99284c14ccbd394b2cf7b3a25e57fd19cbd3c1ca66620bd4ebb12550b59f0504fb4dd935d027fec37
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS30GNkFoYfBCJiZm+aeTH+WK/Lf1/hpnVSV:S9CT30/FNBCJilB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1220 msedge.exe 1220 msedge.exe 3472 msedge.exe 3472 msedge.exe 1356 identity_helper.exe 1356 identity_helper.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3472 wrote to memory of 8 3472 msedge.exe 82 PID 3472 wrote to memory of 8 3472 msedge.exe 82 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 2316 3472 msedge.exe 83 PID 3472 wrote to memory of 1220 3472 msedge.exe 84 PID 3472 wrote to memory of 1220 3472 msedge.exe 84 PID 3472 wrote to memory of 4620 3472 msedge.exe 85 PID 3472 wrote to memory of 4620 3472 msedge.exe 85 PID 3472 wrote to memory of 4620 3472 msedge.exe 85 PID 3472 wrote to memory of 4620 3472 msedge.exe 85 PID 3472 wrote to memory of 4620 3472 msedge.exe 85 PID 3472 wrote to memory of 4620 3472 msedge.exe 85 PID 3472 wrote to memory of 4620 3472 msedge.exe 85 PID 3472 wrote to memory of 4620 3472 msedge.exe 85 PID 3472 wrote to memory of 4620 3472 msedge.exe 85 PID 3472 wrote to memory of 4620 3472 msedge.exe 85 PID 3472 wrote to memory of 4620 3472 msedge.exe 85 PID 3472 wrote to memory of 4620 3472 msedge.exe 85 PID 3472 wrote to memory of 4620 3472 msedge.exe 85 PID 3472 wrote to memory of 4620 3472 msedge.exe 85 PID 3472 wrote to memory of 4620 3472 msedge.exe 85 PID 3472 wrote to memory of 4620 3472 msedge.exe 85 PID 3472 wrote to memory of 4620 3472 msedge.exe 85 PID 3472 wrote to memory of 4620 3472 msedge.exe 85 PID 3472 wrote to memory of 4620 3472 msedge.exe 85 PID 3472 wrote to memory of 4620 3472 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2abe19f7d67ac48dcf57c89451acc05b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff61f746f8,0x7fff61f74708,0x7fff61f747182⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14167873521538928759,18255234137728419060,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,14167873521538928759,18255234137728419060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,14167873521538928759,18255234137728419060,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14167873521538928759,18255234137728419060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14167873521538928759,18255234137728419060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14167873521538928759,18255234137728419060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14167873521538928759,18255234137728419060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14167873521538928759,18255234137728419060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14167873521538928759,18255234137728419060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14167873521538928759,18255234137728419060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14167873521538928759,18255234137728419060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14167873521538928759,18255234137728419060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3960 /prefetch:82⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14167873521538928759,18255234137728419060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14167873521538928759,18255234137728419060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14167873521538928759,18255234137728419060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14167873521538928759,18255234137728419060,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD57bb93dc7d3f901398e5c0e080db032ac
SHA1e0a817ad1204303b1fae9a4877de768ae5efdc3e
SHA2560eec1ba6ed09141d66eba0962e65d2c4336a6377124da89270032fe22e362f13
SHA5124b93eb1a0d291dd75b10df1f11ea51d213a9b18e8870df6544f9db4b67b892cae8bbd6553a61bf7214f9a6f02e29bc4841a4a8f5c3a0cb37a05b8a07c9e9798a
-
Filesize
2KB
MD5aff86e367d3fefd237eea522dee4e0ea
SHA1cfbc3fcf3b109dc85612f346008c55ecc76d9598
SHA256da6ae265ba3e4055ec9e73b61852d2c89edc67916b26b7a9167dfc495b760fad
SHA512dd42618f175adb80ca8af55f50f50faa83ad8f140da820c6835f2d7ce1b806ba3963de07297f2605bfed6f7c91ded7ddf5f1c8a797c6b41149e4f6ec21235cb6
-
Filesize
2KB
MD544d0f8cc02968aa4a9672ba460c02390
SHA1de9fc2a889522f7dffa643826a80e53c825a97ea
SHA2563e6e1064dc0f0027cee7a6ca52a28a683bbedd7abc1e0d6c8059554326338bc9
SHA5127c0d934ffd4f4ae4b891f9fd2eadcdbdf3901b2933950e181ec0068d8b79133b2ce388a3e55beb1449191d31872db0ae3b05f9472cd6f3dc016c2397ee618dd7
-
Filesize
5KB
MD506ccc16773ebf9f84cb2161d0f25d5f4
SHA1c26e350fdc268acbedf9aefaa6ba5634340b70ff
SHA25692fcf7afcc09e40d06f333668fb6ebeb0befc4e7c1e9f7b8df8135e2d0eb1100
SHA512a59aed9b1ee211f2cf07d436ef0dbb56a6e3015ba01d8af89de777373e8165cda92a3dcaee6c41326c48ff4aa60b79ab3c53b7a3296498b097f0224cd6a3ab9a
-
Filesize
7KB
MD5a05413b2b3fcaf52a556556e28725f9f
SHA1b417e31f37596bbff69a116341e8bf1efcce84ae
SHA25610a9d915a79028305c452d9b058ba3a095224d73b71f8d724c712bc681e9dd71
SHA51215086e0f902663b064216abd7a318468747a6aeb1855732a58b2e8f05799c05000362236aec1f052b03f462b60e7709d55059ecd0d0f0d82bc660cbfe4c2cac9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD528099eaab4d1589645555f1efc3498f4
SHA170f58b076e1f76e4b1a044a86d5a90baa59408b2
SHA25606cd9275048c92702cabcfe7f65830c4c69e49c939a9c0161d166568eede1b99
SHA51293d581721ca95dde7eb863cb5bb6fa9571813117270dd8c9216468d997da9b7ae1fb1f0f35cb49e15cfd978c14a133b745454593394ef6b20987fdf19d76ca35