Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
3e6179a263b73f41783b5b2bc730299e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3e6179a263b73f41783b5b2bc730299e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3e6179a263b73f41783b5b2bc730299e_JaffaCakes118.html
-
Size
13KB
-
MD5
3e6179a263b73f41783b5b2bc730299e
-
SHA1
09fce5fbbeab0a65bf2485f3e729ecc1b06d2eef
-
SHA256
b5fe44381ff51d3875df9a4644fb70936c74786e3a99af15e4b88d6aeae89867
-
SHA512
efb5c2a147623be98393fe13dc2e7f0a500180004b07e123da2f354b7784ab80baf32a6344426d845862625390322195e85325a782f96d0ab55c5ff149907114
-
SSDEEP
384:SpHwItMLvuiqfIdHsRe6sTs0pbssJxMeuwqs3DVtJXzF:S2+MLvksHVk0Zt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4340 msedge.exe 4340 msedge.exe 2824 msedge.exe 2824 msedge.exe 4368 identity_helper.exe 4368 identity_helper.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2248 2824 msedge.exe 83 PID 2824 wrote to memory of 2248 2824 msedge.exe 83 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4372 2824 msedge.exe 85 PID 2824 wrote to memory of 4340 2824 msedge.exe 86 PID 2824 wrote to memory of 4340 2824 msedge.exe 86 PID 2824 wrote to memory of 3304 2824 msedge.exe 87 PID 2824 wrote to memory of 3304 2824 msedge.exe 87 PID 2824 wrote to memory of 3304 2824 msedge.exe 87 PID 2824 wrote to memory of 3304 2824 msedge.exe 87 PID 2824 wrote to memory of 3304 2824 msedge.exe 87 PID 2824 wrote to memory of 3304 2824 msedge.exe 87 PID 2824 wrote to memory of 3304 2824 msedge.exe 87 PID 2824 wrote to memory of 3304 2824 msedge.exe 87 PID 2824 wrote to memory of 3304 2824 msedge.exe 87 PID 2824 wrote to memory of 3304 2824 msedge.exe 87 PID 2824 wrote to memory of 3304 2824 msedge.exe 87 PID 2824 wrote to memory of 3304 2824 msedge.exe 87 PID 2824 wrote to memory of 3304 2824 msedge.exe 87 PID 2824 wrote to memory of 3304 2824 msedge.exe 87 PID 2824 wrote to memory of 3304 2824 msedge.exe 87 PID 2824 wrote to memory of 3304 2824 msedge.exe 87 PID 2824 wrote to memory of 3304 2824 msedge.exe 87 PID 2824 wrote to memory of 3304 2824 msedge.exe 87 PID 2824 wrote to memory of 3304 2824 msedge.exe 87 PID 2824 wrote to memory of 3304 2824 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3e6179a263b73f41783b5b2bc730299e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f44046f8,0x7ff8f4404708,0x7ff8f44047182⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16888792426680115940,8914917109233195144,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,16888792426680115940,8914917109233195144,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,16888792426680115940,8914917109233195144,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16888792426680115940,8914917109233195144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16888792426680115940,8914917109233195144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16888792426680115940,8914917109233195144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16888792426680115940,8914917109233195144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16888792426680115940,8914917109233195144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,16888792426680115940,8914917109233195144,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,16888792426680115940,8914917109233195144,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16888792426680115940,8914917109233195144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16888792426680115940,8914917109233195144,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16888792426680115940,8914917109233195144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16888792426680115940,8914917109233195144,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16888792426680115940,8914917109233195144,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8a5f13be-0c23-4881-83e3-01c09adb650a.tmp
Filesize6KB
MD58cf2e9da92d290056bfc97be7949cdc4
SHA11999fdec23a4590020957863d222b8686b727da9
SHA256fa9db6503ad01af91716269ab36bf2f1051898e7c490b49c44ca6d55998fdabc
SHA51248c51cf12cd1a0b3960f7569d5904fc208a924dbb249a9977537d98a6c4cfc7e12f34dfb5b96f2d5443854be6629db803a0b1ad934bda72e5d050a6886099636
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD51028fcd092e2ff5e14b295630cf7e79e
SHA1c3515bfb4c84b545586bcff997df32786140cdb0
SHA25638e39dfdd48b483b0a2a748b22e561caac57c9f70f899207544bcee836d137c6
SHA5122a0be12dd3b3a55c937c4b8d439c98006ce867c4bc2c69b2a46b618e2d1a4ce32d8efe0b041adec62818f236ea1bceca64ce0ab12b437bab99c5d942ab8f4728
-
Filesize
2KB
MD55a4d80ed00cae3a4a013adb7d417a139
SHA1d7c43a4e1577884877e8d908620476c6ecf8a8d7
SHA25634742a2898b1fee6e97614d01bb0b66af7df9e2c5c708e398070fa9e0042aaf0
SHA51204e89075ba803111763dbc13efc1133115d563ac882d372bd4eb433d5c39c6a286080adc9560919002cfd2786575fa676fd3ac08cc1183c5969f6e7e26d1540c
-
Filesize
6KB
MD557ea8bd253877cd653867f5ad8d4a54b
SHA1f949f88497f7edae4fceb9e62fe4fce7ebfaa346
SHA256c7b8f9f55326fef1057a7c689c997ae9777f4a2142a9f40abaea44db286e560f
SHA512f0925d2f338661d511eda43ade29a4cb0393f95084d7b5fa77bad1d318af70dc6766bd385f117595096ef7f959cab8e490f77858899c43968d5bddee92908aea
-
Filesize
7KB
MD5289a978d7f7b5fcc24264eda82a5c495
SHA18d55ebd917730e38f8e7352553a2b9a83f5a7c76
SHA25650f8c0a2aa61ccc12d12d31343b52c6a2f93046ee9d77137b4f9d2b965c8dc98
SHA512cf76ce756f3a6ab81f7cefbffc95c59e8c3e72997e9f1300e9ea9d52e4db505f42c65b8c98dd59159097b0eebef3983b0bd52bfa512c4606638cebe5a7e1bf03
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD571da8f3526c7f0fbe9ad47f2b7d2b101
SHA111a4a305152a45027e9038ab8a381ab12e82d2a9
SHA25688ffae2d8e8d94d16ba7bddc6355be3b1f9bcba90e916d79084ed7b81494688a
SHA5129cbf7b2cf445a486779480d58ae3e4b2b0d17feda3c8618f01b2e7fc6af4f0094ec03e4a9ef1d66dcdc779becfdd9dac8a85a8bd9a94659be99fe8676a7c9b03