Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 11:22
Static task
static1
Behavioral task
behavioral1
Sample
3f3bf05a31a7d0348764a5ba70663ce2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3f3bf05a31a7d0348764a5ba70663ce2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3f3bf05a31a7d0348764a5ba70663ce2_JaffaCakes118.html
-
Size
175KB
-
MD5
3f3bf05a31a7d0348764a5ba70663ce2
-
SHA1
9e78652e0e19f96cbd142e6739726ab3af4db84c
-
SHA256
fdf1d436062e0d06bf75f203581a7074a63f37a278820a0f33a96b6e54816722
-
SHA512
9002840a80e62662724c3a11bf24dd8a2741c260b633ac8ca20712ce53a654fea3c1e8bab205147f2975924d71562bcdcb2bd3b1789b24e7f0bb7837a9d8b848
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS3AGNkFJYfBCJis6+aeTH+WK/Lf1/hmnVSV:S4oT3A/FsBCJi8m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2380 msedge.exe 2380 msedge.exe 4612 msedge.exe 4612 msedge.exe 3888 identity_helper.exe 3888 identity_helper.exe 5480 msedge.exe 5480 msedge.exe 5480 msedge.exe 5480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4612 wrote to memory of 4832 4612 msedge.exe 83 PID 4612 wrote to memory of 4832 4612 msedge.exe 83 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2044 4612 msedge.exe 84 PID 4612 wrote to memory of 2380 4612 msedge.exe 85 PID 4612 wrote to memory of 2380 4612 msedge.exe 85 PID 4612 wrote to memory of 3204 4612 msedge.exe 86 PID 4612 wrote to memory of 3204 4612 msedge.exe 86 PID 4612 wrote to memory of 3204 4612 msedge.exe 86 PID 4612 wrote to memory of 3204 4612 msedge.exe 86 PID 4612 wrote to memory of 3204 4612 msedge.exe 86 PID 4612 wrote to memory of 3204 4612 msedge.exe 86 PID 4612 wrote to memory of 3204 4612 msedge.exe 86 PID 4612 wrote to memory of 3204 4612 msedge.exe 86 PID 4612 wrote to memory of 3204 4612 msedge.exe 86 PID 4612 wrote to memory of 3204 4612 msedge.exe 86 PID 4612 wrote to memory of 3204 4612 msedge.exe 86 PID 4612 wrote to memory of 3204 4612 msedge.exe 86 PID 4612 wrote to memory of 3204 4612 msedge.exe 86 PID 4612 wrote to memory of 3204 4612 msedge.exe 86 PID 4612 wrote to memory of 3204 4612 msedge.exe 86 PID 4612 wrote to memory of 3204 4612 msedge.exe 86 PID 4612 wrote to memory of 3204 4612 msedge.exe 86 PID 4612 wrote to memory of 3204 4612 msedge.exe 86 PID 4612 wrote to memory of 3204 4612 msedge.exe 86 PID 4612 wrote to memory of 3204 4612 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3f3bf05a31a7d0348764a5ba70663ce2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff8958546f8,0x7ff895854708,0x7ff8958547182⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14012111880112155909,13196558873262904676,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,14012111880112155909,13196558873262904676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,14012111880112155909,13196558873262904676,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14012111880112155909,13196558873262904676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14012111880112155909,13196558873262904676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14012111880112155909,13196558873262904676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14012111880112155909,13196558873262904676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14012111880112155909,13196558873262904676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14012111880112155909,13196558873262904676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14012111880112155909,13196558873262904676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3380 /prefetch:82⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14012111880112155909,13196558873262904676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14012111880112155909,13196558873262904676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14012111880112155909,13196558873262904676,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14012111880112155909,13196558873262904676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:5284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14012111880112155909,13196558873262904676,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14012111880112155909,13196558873262904676,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5b0461a751c36d91be582773c7b902390
SHA11f75c9f7e6584ae190e33ece3d4263bb1e83a730
SHA2563d8ff43e1681ba4e9587c8b4723439401a18c0678935b9f2c9a999e8caf78c1f
SHA512dcb7d4a12de570ab7deccb21571c0d37be897be1940ebba5953cf907378241a58c0364debcef9a5673d3aa7276e10c6857e94974f8d3623bbc2bec15689fd476
-
Filesize
2KB
MD537f1d53ca7bbd381dae2516049228d30
SHA1c994495485703d20ce60516ab7af535621d3bdee
SHA25687ffbaa22fc99c51ffd80c99b6ca2fe4d3fd4314695672f5076727e4ab24a757
SHA5124736807ca8768c821338f2bc060adcadb58369e939d137728437cbd04f9fc29bb47a41b5415b50a152f83d97c1179e90c87110fc8e44317985a81eb55efbfec9
-
Filesize
2KB
MD5a0586a0f19be4f687e70f35cf8010c55
SHA14261b47abdec9298a5f21487d5c5c8fc738c2132
SHA256145f0d07577c9369b7fd64c4c032f4be81bd78aaf18164d2cbd628408b9852be
SHA512daec334df8a9e2104ee40f4d9c4d6c7e30dfa1921d37a2ac93043cd868612cad0db79a1369acc755e27dfb4842c42e7479921a3f9160236eb89d528a400c28c3
-
Filesize
7KB
MD5713792137796bb250e9e74843f1d1618
SHA1232b0ff5fe51576f794db340c48e3befb10fe4e6
SHA25670f218e644d7ebcf6e7106f91680c334c8df21302dbca9bcc67beb732321a6c1
SHA512e94303f5735b05164f013309333643a4e15234d942d2bd744ca179c5e5fe27cd627c63106a618702010819ce2429e08a4ff5bbe9fc5423a77591eecc77886a70
-
Filesize
5KB
MD50b3022e4231e0d7e70ea94f16c32b091
SHA10ec310957e627b4ff62ecbb6ae054282a4431dd0
SHA25686100a30e052570f8d815bdce5b2abc73986ebe2bfb41cc80c4c998e21ccc232
SHA5126c3d3a7a5925c34f4c54d3e1a4f2e3f1737a5d5ac8c91dec5d4eca2e93d35d7fdd8a3f273b6870d27ff53d67c3bf830253788a4b1546f23be62fcf170eda9838
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53b14bab2a4f09486a6c2a15da5257dee
SHA1a1158e8ee3235bf50782457940d040aaf8483fb6
SHA25686fefe07a6c1ea42c7573f54060b2c0a2c325b45c7f5994082f736836c0da42a
SHA512f2e6988f5e52a5b390c87b0dcbfc0052801850e4168e9502409534e0b96784572fbe5d5b6749f5ba19ae8ad48aa8ad0658f9f8f899d8b42d5e1649235468df01