Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
67fa10a44b66df9fd298bdc51cbaf574_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
67fa10a44b66df9fd298bdc51cbaf574_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
67fa10a44b66df9fd298bdc51cbaf574_JaffaCakes118.html
-
Size
37KB
-
MD5
67fa10a44b66df9fd298bdc51cbaf574
-
SHA1
05cd80635753a81c3412d8823e87fe56dd2578b3
-
SHA256
66a56d1110564a813672f0de45b71a196d5e4ba39dc3ce79642981853ff9b722
-
SHA512
c6f269bec0af6435b3b1941e0d457d21c5cab9e8829748f87c73c603b50a24156ff6f1495c8bb323565ce6413a18edd62c20adc54395471bbcee55ac1c00c265
-
SSDEEP
384:ojvHwduTvmBxnxsRLrp2ckXWV+PzCsBSGXNEu0:ojquTv2nxuLdFWWIVB/XNEB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 940 msedge.exe 940 msedge.exe 3204 msedge.exe 3204 msedge.exe 4128 identity_helper.exe 4128 identity_helper.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3204 wrote to memory of 1828 3204 msedge.exe 82 PID 3204 wrote to memory of 1828 3204 msedge.exe 82 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 2144 3204 msedge.exe 83 PID 3204 wrote to memory of 940 3204 msedge.exe 84 PID 3204 wrote to memory of 940 3204 msedge.exe 84 PID 3204 wrote to memory of 4740 3204 msedge.exe 85 PID 3204 wrote to memory of 4740 3204 msedge.exe 85 PID 3204 wrote to memory of 4740 3204 msedge.exe 85 PID 3204 wrote to memory of 4740 3204 msedge.exe 85 PID 3204 wrote to memory of 4740 3204 msedge.exe 85 PID 3204 wrote to memory of 4740 3204 msedge.exe 85 PID 3204 wrote to memory of 4740 3204 msedge.exe 85 PID 3204 wrote to memory of 4740 3204 msedge.exe 85 PID 3204 wrote to memory of 4740 3204 msedge.exe 85 PID 3204 wrote to memory of 4740 3204 msedge.exe 85 PID 3204 wrote to memory of 4740 3204 msedge.exe 85 PID 3204 wrote to memory of 4740 3204 msedge.exe 85 PID 3204 wrote to memory of 4740 3204 msedge.exe 85 PID 3204 wrote to memory of 4740 3204 msedge.exe 85 PID 3204 wrote to memory of 4740 3204 msedge.exe 85 PID 3204 wrote to memory of 4740 3204 msedge.exe 85 PID 3204 wrote to memory of 4740 3204 msedge.exe 85 PID 3204 wrote to memory of 4740 3204 msedge.exe 85 PID 3204 wrote to memory of 4740 3204 msedge.exe 85 PID 3204 wrote to memory of 4740 3204 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\67fa10a44b66df9fd298bdc51cbaf574_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb97446f8,0x7ffcb9744708,0x7ffcb97447182⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,10685369332370114177,302015064427018209,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,10685369332370114177,302015064427018209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,10685369332370114177,302015064427018209,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10685369332370114177,302015064427018209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10685369332370114177,302015064427018209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10685369332370114177,302015064427018209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10685369332370114177,302015064427018209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10685369332370114177,302015064427018209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10685369332370114177,302015064427018209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,10685369332370114177,302015064427018209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,10685369332370114177,302015064427018209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10685369332370114177,302015064427018209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10685369332370114177,302015064427018209,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10685369332370114177,302015064427018209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10685369332370114177,302015064427018209,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,10685369332370114177,302015064427018209,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5940
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD536f66c6ad5831502e647c3dc57f3d656
SHA18062052b521507121f77346c4b0bee913516321b
SHA25632f6f5e9a2c1c00c26b531a76f486d7b34f6a41cb9041f26258c37c1365ada79
SHA512dc1080f188c2e846904758c132f3ee48fe89f00cff0b91b1ea299ffd212db8e9b5c088c887a93f109e812ce98878de8e5e89457f16fc00ff25252707a133ad75
-
Filesize
2KB
MD5512f2329648bd8ea5dee33d7ba38428c
SHA18260e54d00a55dbbf5d185090b94f15671cec4a9
SHA256186f190fee7ff35b1950c73b4aa64dfa4c8ce6949670a3cbb05aaba13ad7aa8c
SHA512899161164ea5a6aa9ad90648453dcfdf36454cad5c58401f9ebb3f1d1e16cc823454045a37dfd67bba755a8853f2facbda585c0d464f8a482046c93eff6e9159
-
Filesize
2KB
MD581264e7bee9fa0edec1abdf4421fccbd
SHA15f6d2ef13ff903ac327f9b1003c2130a8c653478
SHA2562b8b5920e1df90406f51d4607e20680cbc535a2b50165b8ea47fedc7653de534
SHA5120b0e1fd6b3d7d052871144f200254d31cc150874178e48dd6034c7792a7aedaae21bf30d6997ece9cb54ea5da80418af13078370dace0b605fa04b99c2f3e2e8
-
Filesize
7KB
MD5ce04b5b363ae05cebd0017c0f8006237
SHA11d584140520db1e321d93c41ff927c0b2d80b126
SHA25629b7e777c07cb4dd519d0d910ae0a88704a8d3b392d852ca1d919127f1ad2f1e
SHA512d1f55ff1b54f85b59e15d42f9dcd7feebd1bc2b43f087a4d331bb32bef213fa95c8b2d2d91793d7da17ebfc6eb262d8e8f3056afb4b18b29de0ca8250d487a21
-
Filesize
5KB
MD5d9a8fe5c101a779244ebdc59586d1c89
SHA1f8f29d43a15ecdc56a98da701460cdc42d9cbbb2
SHA256954480ac11a9077b04c531c32e6bd69a0339f31f451b733c0822d8365c578f62
SHA5120e31c608da0b4a3deeafd499056ccae6436ded85a4fe22e259154a369cee30fa5886251ad84f98c11cbd9a701ace6894d485df4df622f1987373f866f47a0a6e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fcc62f718bbc9e1feca096994f285a66
SHA10e9e26c98942c0093156090a82ea5c0dce039122
SHA256d5fc4d594d732641e1a304fbdd5f9b396f3564860f17387c7861715315ccbcb9
SHA51202d6cb5ad652420561a263c66ddc2aeb8f0686f1aeec83afe374e7d2b57254e9d97d33a037f99e9f40c4a548116c64ec59e9846ddca90ea63afaa47847418e68