Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:10
Static task
static1
Behavioral task
behavioral1
Sample
65785d1180db1fb7dbea4b070196baae_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65785d1180db1fb7dbea4b070196baae_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65785d1180db1fb7dbea4b070196baae_JaffaCakes118.html
-
Size
81KB
-
MD5
65785d1180db1fb7dbea4b070196baae
-
SHA1
29c498960f42a85f47ec27ccb486b31c99922f39
-
SHA256
43039991d13798f6a2713fc6c18ccc8da1ecc3e112a7e19a76f1f0d639c405a7
-
SHA512
000149279944b8d0bf3925c0ed6b3632272309bfe183f02bfb7f42d39b369d017460d064de1c51212a7076db6fbaaa2ed57986c64c9ccf32dabfb118f98ae709
-
SSDEEP
1536:Pgs/AVZp1kllggbbGGllmmZwL2O6eoOvB1OLfqzXjgKUOJtH8uKzU:4s/AVZ+I2O6XOvB1OLfqzXjgKUOJtH8o
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4756 msedge.exe 4756 msedge.exe 640 msedge.exe 640 msedge.exe 1152 identity_helper.exe 1152 identity_helper.exe 5188 msedge.exe 5188 msedge.exe 5188 msedge.exe 5188 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 640 wrote to memory of 4928 640 msedge.exe msedge.exe PID 640 wrote to memory of 4928 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 3532 640 msedge.exe msedge.exe PID 640 wrote to memory of 4756 640 msedge.exe msedge.exe PID 640 wrote to memory of 4756 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe PID 640 wrote to memory of 2972 640 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65785d1180db1fb7dbea4b070196baae_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3ad546f8,0x7ffa3ad54708,0x7ffa3ad547182⤵PID:4928
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,17485512747746223121,802272295758993327,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:22⤵PID:3532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,17485512747746223121,802272295758993327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4756 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,17485512747746223121,802272295758993327,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:2972
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,17485512747746223121,802272295758993327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2952
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,17485512747746223121,802272295758993327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:5048
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,17485512747746223121,802272295758993327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:1392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,17485512747746223121,802272295758993327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3040
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,17485512747746223121,802272295758993327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:3888
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,17485512747746223121,802272295758993327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 /prefetch:82⤵PID:3716
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,17485512747746223121,802272295758993327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1152 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,17485512747746223121,802272295758993327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:1480
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,17485512747746223121,802272295758993327,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:2112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,17485512747746223121,802272295758993327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:2204
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,17485512747746223121,802272295758993327,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:3832
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,17485512747746223121,802272295758993327,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5188
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD54c11289ba9faeaa62a6e61c947efd87e
SHA1a14da734140d425329dc8cf26370bb5a767d8fda
SHA2567e582668e5a618d970097268a39fc83b3f8b34f0f6e23e9d867d4d4d92afb54b
SHA5129ebbc4264218223b26eee6f71c56a311796bc3748def65d06483c7bde89c9995b51a8eb5f92d50380a10fd040038b879f328d478a52650d173cd4d1dc62bdf25
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5eab33c14b36b84421c782a7f8e493a55
SHA153ea7d2a45d81b144800bb518a5fc1ed8dc03f3a
SHA25636a5c9b3b4cf9f7ea4dec6d4c7399fc6fae5d426b0078e9718d263bad4abab8e
SHA5123ddb5cdef1f740f2bec12367b7a8520c3b656f6016544631641692d8911d4df220c145f1a541b8df2afcc51a63e98923c081eb054f9877ca74aa0f92a3d835d7
-
Filesize
958B
MD528814a9c82d070040305664a381a7f78
SHA189c3c123fdfa721f965e40c7dc00953da135b47c
SHA256d5b19bbaa2b69e16d7af5033e5c18b9e0bde44d6628eb1518d65a5eee4adc6c8
SHA512afae4c2ba5b72541e57a136ac92269a057d824fe8fc75ef6c9c627cf4d2ddaf55090a5f3df21079144a46858648256dd880c0889d66ca82face6696aca45118e
-
Filesize
5KB
MD526599a9e1efd21d734bd53fb7be78b82
SHA194b272f67fcf98433175d5478930495f6123c427
SHA25601be22b15be7a78786f2342886ff7ae84c043cd18b04a3b5762817e50340d379
SHA5120bb047271c5a6a859ca5bab1c3bb50caba906779092af88cd1f54fa5dc3673f4bb274caa9e11d49c4ce070c3fc006ad74d1380788b6ade7f38fe22ee5a8d685d
-
Filesize
6KB
MD563b0c82c19cf2b726a6206fcb534f17e
SHA10999b138e110628ab62e86cd00077c62cde62b05
SHA256c9cc3440bad41059454b4a2a7dca74f65084f68b221dc4d4520a9376e6b2203c
SHA512844d18492448e456610dc3aa3645af337ad1233faf6059cabb817eb4924f283eef474de692bc82b09787ea5171985a74eb1e31b7c8dacfe1eb105121abb522c7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59e7635884e9cb4b880fcbed2e2460625
SHA142bfd3b53c0c426e7244f0bb564372364d26cf1e
SHA256baaab6378fa8f5ff88cc556ab7a0eccc32b58e8f851cbd5ce907284b03abe9b1
SHA5126c77928d43b55edd39bd311824b28be4cb8de43372a88042987a644a4ca6e1abb16552da834abbbc4c02489963ca60209798ecbc197d63a6323ce4aa10c18d23
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e