Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
51024eff590932ccfafd849e99767083_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
51024eff590932ccfafd849e99767083_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
51024eff590932ccfafd849e99767083_JaffaCakes118.html
-
Size
175KB
-
MD5
51024eff590932ccfafd849e99767083
-
SHA1
19bf5aad991514e20029794cef23603ff2e0e653
-
SHA256
811767f0338d14081bc02a8e3b5c148b623a2d0b168067b0d2eba04240020c5b
-
SHA512
55be8a684330fa2985e51df4e8a13c5487d7cc18147885b3303fe33cb99624125b1f3c4538482eb4f781fb02c501ccb3a567f9dbcaa99c24adf52d31972658d6
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS36GNkFZYfBCJiZZ+aeTH+WK/Lf1/hpnVSV:S9CT36/F8BCJiwB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3896 msedge.exe 3896 msedge.exe 2356 msedge.exe 2356 msedge.exe 3224 identity_helper.exe 3224 identity_helper.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2356 wrote to memory of 4356 2356 msedge.exe 83 PID 2356 wrote to memory of 4356 2356 msedge.exe 83 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3380 2356 msedge.exe 84 PID 2356 wrote to memory of 3896 2356 msedge.exe 85 PID 2356 wrote to memory of 3896 2356 msedge.exe 85 PID 2356 wrote to memory of 1740 2356 msedge.exe 86 PID 2356 wrote to memory of 1740 2356 msedge.exe 86 PID 2356 wrote to memory of 1740 2356 msedge.exe 86 PID 2356 wrote to memory of 1740 2356 msedge.exe 86 PID 2356 wrote to memory of 1740 2356 msedge.exe 86 PID 2356 wrote to memory of 1740 2356 msedge.exe 86 PID 2356 wrote to memory of 1740 2356 msedge.exe 86 PID 2356 wrote to memory of 1740 2356 msedge.exe 86 PID 2356 wrote to memory of 1740 2356 msedge.exe 86 PID 2356 wrote to memory of 1740 2356 msedge.exe 86 PID 2356 wrote to memory of 1740 2356 msedge.exe 86 PID 2356 wrote to memory of 1740 2356 msedge.exe 86 PID 2356 wrote to memory of 1740 2356 msedge.exe 86 PID 2356 wrote to memory of 1740 2356 msedge.exe 86 PID 2356 wrote to memory of 1740 2356 msedge.exe 86 PID 2356 wrote to memory of 1740 2356 msedge.exe 86 PID 2356 wrote to memory of 1740 2356 msedge.exe 86 PID 2356 wrote to memory of 1740 2356 msedge.exe 86 PID 2356 wrote to memory of 1740 2356 msedge.exe 86 PID 2356 wrote to memory of 1740 2356 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\51024eff590932ccfafd849e99767083_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff895ee46f8,0x7ff895ee4708,0x7ff895ee47182⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,14075398363688854289,1066020368941004850,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,14075398363688854289,1066020368941004850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,14075398363688854289,1066020368941004850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14075398363688854289,1066020368941004850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14075398363688854289,1066020368941004850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14075398363688854289,1066020368941004850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14075398363688854289,1066020368941004850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14075398363688854289,1066020368941004850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14075398363688854289,1066020368941004850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,14075398363688854289,1066020368941004850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,14075398363688854289,1066020368941004850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14075398363688854289,1066020368941004850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14075398363688854289,1066020368941004850,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14075398363688854289,1066020368941004850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:5496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14075398363688854289,1066020368941004850,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,14075398363688854289,1066020368941004850,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3808
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5a46ddab2c17b723fc0239e44e124c32e
SHA1a2e5d0497446f975eaac53a606d2418ca37bdae6
SHA256df8592a1aa3a6e35d59a111a29432f5cc7814cdf6e68ba946695d5563c12deb4
SHA512bb7b7fa345fcf1f3ae0057524ba8daf9a8919bc0a222e4e4fecceeb2bfab224fd01dafcacf2afa3455c56d2b28aa2c6932f13124028bfad0bc1b04cba0e1b0ae
-
Filesize
2KB
MD56ef8c9b9c7a0d8d5041a36f7eb4c3fa8
SHA1127c976d38e26b6ad39574e17fe435e0212333c4
SHA256c38692d96086d3c01d46458376c0b51a0c471e921b37804e0b21fc6f86ee8e22
SHA5122ad3da10886d2c568fae3daa18f1cd64d59ec1388250e0cbbfadb81c3bd7da379573ee68fb5fd2b71485b2308f94f8d9ff8e586c01e4adcacfe276fddcebb24d
-
Filesize
2KB
MD5de85f24c51ab725252f5c53c8dd2667b
SHA1a41496c8a3781721026104c2ef7ed3d82921f541
SHA25688313ac7cb03d135aefbcf3e68823ad29854095922e4bead1c45e4ed70c75567
SHA512165eecb510d650561c8033871c8e99a836ee7e88fdc61645448c418f607464b5c63a842d50ad4f7cfab60542d876cd6d48ce0dfa51a1b6624ed081bc2f0b1e2a
-
Filesize
7KB
MD5f8b46d030de88884fbac5d193014a2a0
SHA1c6feb39407b4e00c9e6a53e0aaf2b543828d423d
SHA25638445b96a97830d7da2de8e0c9d86c345328e40e6a88f151721a049994acf4ac
SHA512722370089f752176fe4583337c504b8f506f55f8037e8737282caba04c4b4c64acccfc05079a818b1869e272b8d58e49fd292cd9a8b4247f9920d452a1e8b1ee
-
Filesize
5KB
MD5cea5bb30fd6217c524ccf59020796ae0
SHA1b8fd4308ab875e0bda7bc43c7045c445d1d73dc8
SHA25632adfd77370b9e71c16b927efa09001ed833ed514a649b02446de74ebd4a2df9
SHA512f8e98943fb5e079a6d6be835cefb697ee0f72a35e079b767f424ed5baf2184ec547fe60156c2b061a303e5b294f0ba8b29ee5e6493753a76ae28546ba1a0b108
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d30f3eb86bb991c1856d1f6c5ad031f3
SHA19912bb77884960e15294c428b63cb97bb143d793
SHA256b884494a7c0f31d27e50dd3b8dfd75d10b409d0494c0a30a2575754c63bb7dd0
SHA512229b595ea17112cdf399ebe30b18f4dba19b3acf44b7d0f93e0935bcea052b17bde3d82aedb1f41cac03b68e162bd52632c4764643ea4ab47e50176b898aa02f