Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
648f021f035b168ef9792068ef524d1f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
648f021f035b168ef9792068ef524d1f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
648f021f035b168ef9792068ef524d1f_JaffaCakes118.html
-
Size
175KB
-
MD5
648f021f035b168ef9792068ef524d1f
-
SHA1
7c9d03473947f32cc00a51e92b7c05da8dc87c13
-
SHA256
cd3e02e88a00ef31ea51f0ced104389c4f581859dc3e62f17acd704701a799f3
-
SHA512
c93d018767d323f2bfedd37fe7a1b839162d25b2ec47391e8dff63baae37d7ec7f394b0898900efbd007891a345557cb70aaf000c6468bb722461ca4735b6e67
-
SSDEEP
1536:SqtK8hd8Wu8pI8Cd8hd8dQg0H//3oS3XGNkFyYfBCJisO+aeTH+WK/Lf1/hmnVSV:SpoT3X/FDBCJiMm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 3600 msedge.exe 3600 msedge.exe 2824 identity_helper.exe 2824 identity_helper.exe 5772 msedge.exe 5772 msedge.exe 5772 msedge.exe 5772 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3600 wrote to memory of 5056 3600 msedge.exe 83 PID 3600 wrote to memory of 5056 3600 msedge.exe 83 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 3636 3600 msedge.exe 84 PID 3600 wrote to memory of 1020 3600 msedge.exe 85 PID 3600 wrote to memory of 1020 3600 msedge.exe 85 PID 3600 wrote to memory of 3588 3600 msedge.exe 86 PID 3600 wrote to memory of 3588 3600 msedge.exe 86 PID 3600 wrote to memory of 3588 3600 msedge.exe 86 PID 3600 wrote to memory of 3588 3600 msedge.exe 86 PID 3600 wrote to memory of 3588 3600 msedge.exe 86 PID 3600 wrote to memory of 3588 3600 msedge.exe 86 PID 3600 wrote to memory of 3588 3600 msedge.exe 86 PID 3600 wrote to memory of 3588 3600 msedge.exe 86 PID 3600 wrote to memory of 3588 3600 msedge.exe 86 PID 3600 wrote to memory of 3588 3600 msedge.exe 86 PID 3600 wrote to memory of 3588 3600 msedge.exe 86 PID 3600 wrote to memory of 3588 3600 msedge.exe 86 PID 3600 wrote to memory of 3588 3600 msedge.exe 86 PID 3600 wrote to memory of 3588 3600 msedge.exe 86 PID 3600 wrote to memory of 3588 3600 msedge.exe 86 PID 3600 wrote to memory of 3588 3600 msedge.exe 86 PID 3600 wrote to memory of 3588 3600 msedge.exe 86 PID 3600 wrote to memory of 3588 3600 msedge.exe 86 PID 3600 wrote to memory of 3588 3600 msedge.exe 86 PID 3600 wrote to memory of 3588 3600 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\648f021f035b168ef9792068ef524d1f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6da846f8,0x7ffa6da84708,0x7ffa6da847182⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,18366755027461094211,8076907957752553551,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,18366755027461094211,8076907957752553551,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,18366755027461094211,8076907957752553551,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18366755027461094211,8076907957752553551,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18366755027461094211,8076907957752553551,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18366755027461094211,8076907957752553551,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18366755027461094211,8076907957752553551,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18366755027461094211,8076907957752553551,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18366755027461094211,8076907957752553551,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,18366755027461094211,8076907957752553551,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1948 /prefetch:82⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,18366755027461094211,8076907957752553551,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18366755027461094211,8076907957752553551,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18366755027461094211,8076907957752553551,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18366755027461094211,8076907957752553551,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18366755027461094211,8076907957752553551,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,18366755027461094211,8076907957752553551,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3200 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD52c952ac31fba2e6249254a5ff004d50f
SHA169a1e10fa0c42678e5726bf6f7fdd38a4534b02e
SHA256b886b910549e17807ae1bd7759e84c59738ff3bbe758089a1699d925271baeb1
SHA5126d9839087dd2239c997d6e31823d26b54bf7bfe58927a14e02d97529ae7e29467227b4ce0854f02b96e80f8ec3dee549c75db5592504d1c21af3263bbd61f4f7
-
Filesize
2KB
MD565715a0916a796dfae74006db30be02c
SHA1859e22aa9e12fa8d29dd57fe6ad5cedf71f1b1aa
SHA256d3208787ce6281f3d4329530c8b080f814468b18ae016c25f57ecd7b8f029363
SHA512cca29e2f611cb5da9b53c84cab529d64835e51f7dd104df47c070adb898b42c2ebca3d261c2aa9eb98b4abbe5d70cf98d34adf9cb50e69a9b886dafd9dc89069
-
Filesize
2KB
MD583fccb486169f9d0c552e90b05338540
SHA1ea039db3885ba3f471f0fdbf98b7553c6eac7218
SHA25671976eece790740a9a016ff2635a6b7db6fa84132c8774d1dff01b38f2e17fd7
SHA512cf21546493f54f39a63c3733122f2674e62702aebdcc48754a253f503844a7c89e46e938ad40e97ca5268132b6edb3bb02949a712a352024dd697df1815688f6
-
Filesize
7KB
MD50b242f43f4e06ec82da693d892d96fa0
SHA1e6f36c10b0234c2ed6a6442da4eb6239bb323698
SHA25655eecd25b512228d92ae7f8153cf69c7b344c3eef975440a06cfc9694df5fab0
SHA5122a0d5808c4df15559bb1cf35b586f3577270c6d29ccd430e9094ea99a91421b74b5f008cbeb61c08e0afbef602e283d6b4921d3ac66b6775316365595e14459a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b916f30a-b7a5-4def-aedd-4e7520c0b14c.tmp
Filesize5KB
MD528f1dbb1a90d86e422f48a8763f1d8ad
SHA13692dccb097dbd9b2a78c2984cbfd697e8e0ebf1
SHA256122f6d1c016f64c09edbb3655d1d0acd08c50608a3e242b0f6dc70a0c4e8f8e6
SHA5123ad3a21e14f2a288a5fc384e7e3166ab8185aba7a65e4976a8ddb395286c1c9ea6a7ef847ea0ffe5f5b9c3bd3b212af455753643280a9e18c3f9469e38487433
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5979cc47b42d941ca8b910825109e35b6
SHA1db7ac80c4f745fb8495658e27bd6e543cb4f2191
SHA2569ba19483bce79947d077f5ee36bda02c97aaea4f3eae04682bed7b8465ae9ece
SHA5125738adf4e257d349b2455781ecb4b91c7908c83ee34b60228a8676d54e79d0b7cba06c51eca02beb62dadd48b3ead888d464054be33c21a56f1f313578bff90c