Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:38
Static task
static1
Behavioral task
behavioral1
Sample
690591ba34f93d9664e01c260ef9be58_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
690591ba34f93d9664e01c260ef9be58_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
690591ba34f93d9664e01c260ef9be58_JaffaCakes118.html
-
Size
246KB
-
MD5
690591ba34f93d9664e01c260ef9be58
-
SHA1
0d98a99c6b80d6226939d82c17068357444e8978
-
SHA256
80208d59e0b1c405933179041163d361c1707262b0da620df1c9ad9422b9d07f
-
SHA512
24ed6e5dc4b853754fbdf891b8144346303ccab279f127bcc8f0a433cab7866123e7e71a4f52f2a50d20c672e634c7576483c24059302ab69824e154ed7eeae1
-
SSDEEP
6144:Ssr5W5sMYod+X3oI+Y+WsMYod+X3oI+YQ:Xr5WF5d+X3I05d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1184 msedge.exe 1184 msedge.exe 1916 msedge.exe 1916 msedge.exe 1472 identity_helper.exe 1472 identity_helper.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1916 wrote to memory of 232 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 232 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 5048 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1184 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1184 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 1480 1916 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\690591ba34f93d9664e01c260ef9be58_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc2ac46f8,0x7ffdc2ac4708,0x7ffdc2ac47182⤵PID:232
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,13336967323245229354,8363230719384125289,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:5048
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,13336967323245229354,8363230719384125289,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,13336967323245229354,8363230719384125289,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:1480
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13336967323245229354,8363230719384125289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2416
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13336967323245229354,8363230719384125289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1308
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13336967323245229354,8363230719384125289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:2140
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13336967323245229354,8363230719384125289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:3592
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,13336967323245229354,8363230719384125289,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵PID:3968
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,13336967323245229354,8363230719384125289,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13336967323245229354,8363230719384125289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:4420
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13336967323245229354,8363230719384125289,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:4376
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13336967323245229354,8363230719384125289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:4424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13336967323245229354,8363230719384125289,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:4804
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,13336967323245229354,8363230719384125289,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5e130121664915920cb82fa0c8da9b277
SHA1d79a4e8ac18386aa59a4adad250227ddf2bba449
SHA25699a949703c3899b62697e2ae8a318af094297af80dfdd842c4a18671bcb41046
SHA512d3a778b93b33930a18aa10a8c31e6fa2f4abb0786bd03e2fb388cc6300f788878f0a0942c6fafb0b0983145f9fb582060df37ecd9a68ff387331e3ece48da071
-
Filesize
406B
MD5d498d9d2e9e1b819fc5f5959bf4805f5
SHA1c3e41f85bdf497a03ea2cd8467bbfaa65903ed39
SHA2563a84859f0e4287a9c71c3e971a7b993526c345f269efd3ebec25bb9a0b3e3719
SHA512f0eb330e78846366b3026c2a1ad5d549e819750ac62353f177d255a092f68a7b950bf3c3c79d25f47728effb13bd9214137a0d004d28fd7dd643bb93d2aa50d1
-
Filesize
5KB
MD5f422a9bb054bdbbd408095a209115a6c
SHA1af9fab4d5a75838b45057e60f3042eefd7420e67
SHA2564bb0bcd66a333736036e61040a87dc087acc611013ffdc1b94461be03c33e0ab
SHA512d9f7a40af7e15c783f0126f4d0c4166af8dbb99280309435a4e60e7d37cfa50314768309b459349b72ce0cfd8fac3ecce358f040625710f13b1c1b273f03053c
-
Filesize
6KB
MD53fcc015e4cb7278a66776ec8720508f5
SHA1d40f47b7b8afd8fd2e2a0aa4d8cb6c8593692428
SHA25697a973ac506994a434f890f38a77cd5b0e98c3ca9ec1db111d4cd7b213e5a7bc
SHA512067857d748c00d5f17a2e8f920f007c68f09cccaafb0704404cb6ee9d50e77d1eec222f582e8b8edcdfa76e912d7580e8eaeb2e781b9487dc07238da6ea1b9f2
-
Filesize
6KB
MD5a4a91cb9a74697b2e744d839eebe3098
SHA1baf04cdd029cf2ac29046dd4d4f5260cb72749d5
SHA256f4d61496acf26ef068354da14d288742cdc4d5cc163f8ec55c304f210a2a27cc
SHA5125cf1ddb8b1b4b043d01ede5e271a5e0497705dbb331de1af3b7aa5772bc0c834bcb6f057a9979321c156f84eb48d12cea38337e2836164f309d98816978057f0
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD58b5bef1f3f01fb8a23c1345a70d08915
SHA1103207b1c0779fa1cebc9fdd57811d04824fbbea
SHA2561b07c6ea59cf996cfcdedb1d39d57419981739a1f90771f203a93b296a0dc633
SHA512d35958f088244542b6b4a84c83d3c09af70d0c73d2cf4f1892c81288fec629daac53760aa9a71d612638fddf989b24e4202c98d7a557529cd5542a9eb12dfcb1
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e