Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 07:39
Static task
static1
Behavioral task
behavioral1
Sample
62867896a0410cc1b62231593e9b5df2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
62867896a0410cc1b62231593e9b5df2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
62867896a0410cc1b62231593e9b5df2_JaffaCakes118.html
-
Size
55KB
-
MD5
62867896a0410cc1b62231593e9b5df2
-
SHA1
67a258c756f2a1e9b19fa3d2b84b426030bbfcfa
-
SHA256
c5ba11ed38f6d73f29885152b54794a36e29458de5828e4d4ea40cc8b2164b5d
-
SHA512
6f09dab142e26e6d194521aeb4330f15a31a06c22924c98c7ae257ac76eea33d53f440fc005a5dda10162e39773d71764c07139e5962b3070d54566c4f1b5e35
-
SSDEEP
1536:Ti1yYOpjYwNT6PDMmYQkNV2YFF1vGUJlkAOU2wqJX2idEb:Ti1KpjYMWPDMmYQUVzF1vGUJlkAOUIXi
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 10 sites.google.com 20 sites.google.com 21 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3320 msedge.exe 3320 msedge.exe 2336 msedge.exe 2336 msedge.exe 4204 identity_helper.exe 4204 identity_helper.exe 1056 msedge.exe 1056 msedge.exe 1056 msedge.exe 1056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2336 wrote to memory of 4156 2336 msedge.exe 83 PID 2336 wrote to memory of 4156 2336 msedge.exe 83 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 2612 2336 msedge.exe 84 PID 2336 wrote to memory of 3320 2336 msedge.exe 85 PID 2336 wrote to memory of 3320 2336 msedge.exe 85 PID 2336 wrote to memory of 1136 2336 msedge.exe 86 PID 2336 wrote to memory of 1136 2336 msedge.exe 86 PID 2336 wrote to memory of 1136 2336 msedge.exe 86 PID 2336 wrote to memory of 1136 2336 msedge.exe 86 PID 2336 wrote to memory of 1136 2336 msedge.exe 86 PID 2336 wrote to memory of 1136 2336 msedge.exe 86 PID 2336 wrote to memory of 1136 2336 msedge.exe 86 PID 2336 wrote to memory of 1136 2336 msedge.exe 86 PID 2336 wrote to memory of 1136 2336 msedge.exe 86 PID 2336 wrote to memory of 1136 2336 msedge.exe 86 PID 2336 wrote to memory of 1136 2336 msedge.exe 86 PID 2336 wrote to memory of 1136 2336 msedge.exe 86 PID 2336 wrote to memory of 1136 2336 msedge.exe 86 PID 2336 wrote to memory of 1136 2336 msedge.exe 86 PID 2336 wrote to memory of 1136 2336 msedge.exe 86 PID 2336 wrote to memory of 1136 2336 msedge.exe 86 PID 2336 wrote to memory of 1136 2336 msedge.exe 86 PID 2336 wrote to memory of 1136 2336 msedge.exe 86 PID 2336 wrote to memory of 1136 2336 msedge.exe 86 PID 2336 wrote to memory of 1136 2336 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\62867896a0410cc1b62231593e9b5df2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffdf846f8,0x7ffffdf84708,0x7ffffdf847182⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,12276888381804740467,1432698272781969832,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,12276888381804740467,1432698272781969832,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,12276888381804740467,1432698272781969832,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12276888381804740467,1432698272781969832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12276888381804740467,1432698272781969832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12276888381804740467,1432698272781969832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12276888381804740467,1432698272781969832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12276888381804740467,1432698272781969832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12276888381804740467,1432698272781969832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4560 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,12276888381804740467,1432698272781969832,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,12276888381804740467,1432698272781969832,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12276888381804740467,1432698272781969832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12276888381804740467,1432698272781969832,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12276888381804740467,1432698272781969832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12276888381804740467,1432698272781969832,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,12276888381804740467,1432698272781969832,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5ee1cc30f8853bf73e282b96d9def6818
SHA1fb229995b9ba3e4eb1ff40be725268c13d1051b9
SHA256060e66286b66f565507fe018d23c33e5ebd538ef93162ca69589b7d581899dfa
SHA512bf5dd8f6ed8e3be4273ac5161e58dd5193e0b0a0c1922c54737d64ff769be80caf1601b57596965d77198e0731bca9e220d1996a748bae4522e28b3acfc8453d
-
Filesize
1KB
MD5b867cf2d328c16053b37921be8dfbd22
SHA1faa177676f7622f36ac9d570691a0ffee150ef9a
SHA256c745f44f85881568405b15249da8eb118f4840519ac251b9d0cb00b562f4bc2a
SHA512df66aa261f1465729a07bc16c0e0215c636cdabe3c747ffd66181e4d051fc4f99a9e42edc7406f906d74f65847c76d58f2da7697245c7668f599d19a87725f61
-
Filesize
5KB
MD571ba5bccab1589fd771daf505cfa80c8
SHA1d20a08a4140e79424995ef924cacb9de3e7974b6
SHA2562efe7539638ca16701f4ea83308d1e1bb395a1f61504705e28e1c854674218bc
SHA512ff5aa3b1989a514eeee956bf14e589cd9c24163bb03b0bfd39224ad4a6feaea971fb8e0d677f629e0b80c1cdbba5b78ce9789cade1b8b2eb48c69f1a87fbca08
-
Filesize
7KB
MD587e228d7c6b771da72a9b19fd658971c
SHA13f52a72dfeb4b53b3af9ca53782f8155375a8df7
SHA2561452d94bfacbc1b3d8ab0713982b8e4293ea39002f48f95177648a54d22c9b53
SHA5124978e5ca78af4e7b22e186603b2e5af1913e981ccb44efb4dbbe991a97589375eba59af7292833435f45479a8a473dab99a7da4380e1274747bcd31d672dc6c3
-
Filesize
6KB
MD5738deb498faf9f8d4da9ef4cf6dce815
SHA1849adf609c8104e443838c41c6b957c8ec7af2bf
SHA256b2e0563551b881fb316e4022a0a0de59fc155e79cb91eec4437a4c48dd5596a0
SHA512a8a18781845534d2488bf89c05ec96f5d6f128560b6457cb306f4c06482b2514ab05884d065cfa71f1223efcbc0a9405452eb0eb67bd6312dff15cec4404d647
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53d3af08b5ff778bee78078cc4396d8ae
SHA1b4904b168f0c80fe80c24136c5904cb94a1d1a2e
SHA256b1424dec5665841abf2c59ff18891e6788a21e319a9c8dbde113bc1745b451d7
SHA512fae4dba388f810b1c97cf0603c4680e35d33fe38d7c2ca89bf9203f37f16481d05f21c3ebcaec43738c9f0a76d2fdaa5322693bf959a4d03aac232edfc6f0da9