Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 22:56
Static task
static1
Behavioral task
behavioral1
Sample
4371135e06aa8533437feaee34f51151_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4371135e06aa8533437feaee34f51151_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4371135e06aa8533437feaee34f51151_JaffaCakes118.html
-
Size
175KB
-
MD5
4371135e06aa8533437feaee34f51151
-
SHA1
c41ec875e280950378f778660346c7265b584ee9
-
SHA256
4d8bcca1dbc43fd040a92fb14c62782cca18636dcc40387ea0b1426a53550c7a
-
SHA512
d26cf243e93216bd5d155d28325ca7f968c7e40e252945a36dd258e76a2b24a166f973bf160327e7125467dc3766d103fa2170ab938e65404c265185941f0e4d
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3rGNkF/YfBCJiZL+aeTH+WK/Lf1/hpnVSV:S9CT3r/FeBCJiiB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 888 msedge.exe 888 msedge.exe 4036 msedge.exe 4036 msedge.exe 3448 identity_helper.exe 3448 identity_helper.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4036 wrote to memory of 1784 4036 msedge.exe 85 PID 4036 wrote to memory of 1784 4036 msedge.exe 85 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 2916 4036 msedge.exe 88 PID 4036 wrote to memory of 888 4036 msedge.exe 89 PID 4036 wrote to memory of 888 4036 msedge.exe 89 PID 4036 wrote to memory of 4316 4036 msedge.exe 90 PID 4036 wrote to memory of 4316 4036 msedge.exe 90 PID 4036 wrote to memory of 4316 4036 msedge.exe 90 PID 4036 wrote to memory of 4316 4036 msedge.exe 90 PID 4036 wrote to memory of 4316 4036 msedge.exe 90 PID 4036 wrote to memory of 4316 4036 msedge.exe 90 PID 4036 wrote to memory of 4316 4036 msedge.exe 90 PID 4036 wrote to memory of 4316 4036 msedge.exe 90 PID 4036 wrote to memory of 4316 4036 msedge.exe 90 PID 4036 wrote to memory of 4316 4036 msedge.exe 90 PID 4036 wrote to memory of 4316 4036 msedge.exe 90 PID 4036 wrote to memory of 4316 4036 msedge.exe 90 PID 4036 wrote to memory of 4316 4036 msedge.exe 90 PID 4036 wrote to memory of 4316 4036 msedge.exe 90 PID 4036 wrote to memory of 4316 4036 msedge.exe 90 PID 4036 wrote to memory of 4316 4036 msedge.exe 90 PID 4036 wrote to memory of 4316 4036 msedge.exe 90 PID 4036 wrote to memory of 4316 4036 msedge.exe 90 PID 4036 wrote to memory of 4316 4036 msedge.exe 90 PID 4036 wrote to memory of 4316 4036 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4371135e06aa8533437feaee34f51151_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5a3e46f8,0x7ffe5a3e4708,0x7ffe5a3e47182⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,13753624744293093280,12901827125685580610,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,13753624744293093280,12901827125685580610,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,13753624744293093280,12901827125685580610,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,13753624744293093280,12901827125685580610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,13753624744293093280,12901827125685580610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,13753624744293093280,12901827125685580610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,13753624744293093280,12901827125685580610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,13753624744293093280,12901827125685580610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,13753624744293093280,12901827125685580610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,13753624744293093280,12901827125685580610,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,13753624744293093280,12901827125685580610,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,13753624744293093280,12901827125685580610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,13753624744293093280,12901827125685580610,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,13753624744293093280,12901827125685580610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,13753624744293093280,12901827125685580610,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,13753624744293093280,12901827125685580610,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5208 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3896
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD53a36150649d1f5161eeaf8e0c9c51f85
SHA152f0982a51278511771cd50a8cbeba84833934f5
SHA256711fd981587c3e6df984278152015d37d34910b773c11485d6eba4023f0fcd44
SHA5129377e0738174979c589f6f25a4659f18abc7a176e984f441bbefcf9c16a1a9d5d3f3c826a8dbbaa19a0cc1916fd7b39be654ed24ed83053c6eaa6c9f0970de2d
-
Filesize
2KB
MD54874dcee2c1b1d76068e83eb98ca4e92
SHA1408ebb9c49740b9a61591291f9d22c459920da86
SHA256313588a58c27d25db6ddc1717a0b4ea9b93ef78c5a041be82a6fd5c690f7ce5c
SHA5126a75b9167af93b6c258af053f604b21a4b1c7ac438c80692f17a575e331b2f155302603225a6132758940bb43bdcc0842b38c7c4a195bcf7a1dc177758f6f2b0
-
Filesize
2KB
MD57d764f4a7a5d94c1da0fcf5522e5103a
SHA1845e8bf9f2dcea75c7ac4f636231f7191c8faa2a
SHA2560c7df3e545787241dd59f3e54dea1b98b73590e7e02a9e6734c2043e40d3fc52
SHA51240ad3a2058db1b6e60876b7c0c3a6b4abfc89a9746c029dce87b898bf107071a2766eed4eef22f5eead99dd2487e45fc9d26b14e7781038d1652c032f215e7fe
-
Filesize
6KB
MD583fe67cd95ed7dbc80df1c3d950d44bc
SHA1b2947f86381fab3e960634e2843ea3912d84f840
SHA2568dcd110efa12d803f755d68fb8f793d1fb45bd131a21ab91049f451fb05f249e
SHA5123b27dbdfe14d39a05853ea4efbd243aa7943723d5cb160b73f32dbeace9bb0ec49608f3c9ab5962d2b2074c40a4db56801a1b552b7bc88d1b5876c13778a6552
-
Filesize
7KB
MD5a107a8bf39fa5c2cba183624b60d13e3
SHA15add7d8fc2db438474b5da286c180559525173b1
SHA256b1c155f25c93faab9461d306010cfe926aae1d2c7b12b23ca30c855aabb0066f
SHA5121d07d04933fae66fce08e2caacb6718d268372c9c5f1f5f47f10c4716aaa6195e0119c66c062e30c2bd656a828cd484122ed861cfa560efc0eaed83d48817968
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54606158d7019d22ba07c073f127a3a3a
SHA1abd414738fb7489545736f81eace51157daef12f
SHA2566cb886f0aebfce501e5195bfd4c2a65cc917ac9cc6aa5b80479c6915a1118b74
SHA5124724382b21c96c352b4b8615fa8ff651fa6241fdd529500decbed176b55ae7d86e6aa73bf2a564c9a0c6dd47ca1b2da8a5542ccc6390af27ac7cb3665cf35bc4