Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 23:02
Static task
static1
Behavioral task
behavioral1
Sample
3ceebe725c8597df7641b809d11b0d6e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3ceebe725c8597df7641b809d11b0d6e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3ceebe725c8597df7641b809d11b0d6e_JaffaCakes118.html
-
Size
175KB
-
MD5
3ceebe725c8597df7641b809d11b0d6e
-
SHA1
f86b3b3b278670d9d3a6517dd4303138241a32a7
-
SHA256
ff565d40fb95c961319c7c8d9c7234a29fd128a45b6bcdac6a29ef6c1fbcf5d3
-
SHA512
0aa13d9353897833e7d3ac124ab756e81aba3f811f86067ab2f3959ff21780c0a6a39cd7b7c06b0b9561d691ec79801a251d8e83439902901e22e0f8a30837ea
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3XGNkFiYfBCJiZ9+aeTH+WK/Lf1/hpnVSV:SHCT3X/FzBCJiwB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 3144 msedge.exe 3144 msedge.exe 4188 identity_helper.exe 4188 identity_helper.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3144 wrote to memory of 1892 3144 msedge.exe 82 PID 3144 wrote to memory of 1892 3144 msedge.exe 82 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 4860 3144 msedge.exe 83 PID 3144 wrote to memory of 3276 3144 msedge.exe 84 PID 3144 wrote to memory of 3276 3144 msedge.exe 84 PID 3144 wrote to memory of 548 3144 msedge.exe 85 PID 3144 wrote to memory of 548 3144 msedge.exe 85 PID 3144 wrote to memory of 548 3144 msedge.exe 85 PID 3144 wrote to memory of 548 3144 msedge.exe 85 PID 3144 wrote to memory of 548 3144 msedge.exe 85 PID 3144 wrote to memory of 548 3144 msedge.exe 85 PID 3144 wrote to memory of 548 3144 msedge.exe 85 PID 3144 wrote to memory of 548 3144 msedge.exe 85 PID 3144 wrote to memory of 548 3144 msedge.exe 85 PID 3144 wrote to memory of 548 3144 msedge.exe 85 PID 3144 wrote to memory of 548 3144 msedge.exe 85 PID 3144 wrote to memory of 548 3144 msedge.exe 85 PID 3144 wrote to memory of 548 3144 msedge.exe 85 PID 3144 wrote to memory of 548 3144 msedge.exe 85 PID 3144 wrote to memory of 548 3144 msedge.exe 85 PID 3144 wrote to memory of 548 3144 msedge.exe 85 PID 3144 wrote to memory of 548 3144 msedge.exe 85 PID 3144 wrote to memory of 548 3144 msedge.exe 85 PID 3144 wrote to memory of 548 3144 msedge.exe 85 PID 3144 wrote to memory of 548 3144 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3ceebe725c8597df7641b809d11b0d6e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe410b46f8,0x7ffe410b4708,0x7ffe410b47182⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1950635866316547789,17215037044506784770,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,1950635866316547789,17215037044506784770,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,1950635866316547789,17215037044506784770,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1950635866316547789,17215037044506784770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1950635866316547789,17215037044506784770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1950635866316547789,17215037044506784770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1950635866316547789,17215037044506784770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1950635866316547789,17215037044506784770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1950635866316547789,17215037044506784770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,1950635866316547789,17215037044506784770,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 /prefetch:82⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,1950635866316547789,17215037044506784770,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1950635866316547789,17215037044506784770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1950635866316547789,17215037044506784770,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1950635866316547789,17215037044506784770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1950635866316547789,17215037044506784770,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1950635866316547789,17215037044506784770,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3160
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5b1433a3724691e8ff17ca166e7ea1d44
SHA1d0a476302773f736eb6c233edc83c713aaf467b9
SHA25603d2ca93e2baec51fb308f2888c8f1adea42bafbe24917e92651b5bd563b6b82
SHA5128e2edbd165e3edc87627a1c66c7e11d747cf596fb3d5117267d93b102bec0b41cd28906c1366950b2eaa02a0bd5a9461d7eddd951280a5a2a6406712e9ca57e4
-
Filesize
2KB
MD595a71aa9b108e503262eef6bcb78f1ea
SHA1a1a5a3989d96a6b6089025719669767e78e6b03c
SHA256bfda58c173de037a57c44658299f06e359094589f8d5b632ddfab3ae0b9007b7
SHA512a5174cd3172cb5d9655b1ffb2a87b14a423d535c736cd6984204ed40b724c65ed7f428560f4f134cfb05c7f79e852df6afbf5d90339f6b1e873cbbffea0654cb
-
Filesize
2KB
MD54a3d804d8e0790aad92eae8a45b13174
SHA19c7ea89fbbd5cc23940f470b00ec33965de7ed2c
SHA2569fcde8ceac9e96fa22523b654b3d069342a384277491c1a669fd621270c1f0a0
SHA512683688e7b001a743f1ab04c80b188c2852a913c70fbe816df5c4d090bee3f64543eea0efd98ac51f434037560f5f5401f43825ffc3be416c03d21fe67712a9f3
-
Filesize
6KB
MD585ff7fb8d344986f1ae53998dcb7ffcd
SHA17f8ed00b0a5f560e6d1ab20b7a7bcf4f9af7607e
SHA25601efc1aa469008bc91edfa71501ddcfb03d7dc6247642af4ce9335f5d2cae893
SHA512dfd035a367caa28cf2212441061de45298d467359511db85138e97bd9f9877cfe0c8725b47895c44af5626a4bf7d06b98aafc950f925657627ca54a8e55b274b
-
Filesize
7KB
MD53286fe71a13f38eb2b976c301274d8f0
SHA189d5fc319d5bef71d48c1e24ea96a901b9dc7f15
SHA2563d22db1b016a64c9ea6fc8b6cf58f885fd7a0fe1c2f84d5157fbabbcbcd16933
SHA51253078cfad3c6264cf930616317702959d254f5a115ffaf3c867c285d0348f3c3b6dcef621fc8912dee5fb3702b2c189ee336b908b2304576f6ce5429288a7cdc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59bec16e815b546bf52c7cfee5a946cc5
SHA1600476f74e9ddad28b12fae460aaf1d18e1b16c1
SHA2564349d11842635179da1e6f9e3b086714e296c4532953ef276b55451abd65e3e9
SHA5129b524ff6a8e9c64984aaae8b06dd47c075abfb0a3e18ce64c0c3af6907babad46f22a1df3ad32510b0a775c49ea8342e9b1ff48045bd14bc59645c8fee182a88