Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 09:24
Static task
static1
Behavioral task
behavioral1
Sample
6a7a19922e90f456351b102e8072c449_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6a7a19922e90f456351b102e8072c449_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6a7a19922e90f456351b102e8072c449_JaffaCakes118.html
-
Size
8KB
-
MD5
6a7a19922e90f456351b102e8072c449
-
SHA1
6153febf466dd9bb986df39dff9da7c637d1c718
-
SHA256
cdd6eba71c4eead19e1997d9b6f3a14c3af82243fe1b82798950055dfaa5863f
-
SHA512
4c020a73f1566c5011219e8d028241d436abeab88dc3ea8ece38af275b297718b3dd2d1d47548eeee94b04f92f344084188c505eea83ae0f7597f2f6fd580104
-
SSDEEP
192:I2jdpii0sE0kkLedUcHaDVrTHy0vhjnL4/Xh8S0ajqR7NyTztVwJBm9QK:I2jdpijqkQedUcWV/z9L45iRhNQ5KJO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 2016 msedge.exe 2016 msedge.exe 2304 identity_helper.exe 2304 identity_helper.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1028 2016 msedge.exe 81 PID 2016 wrote to memory of 1028 2016 msedge.exe 81 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 688 2016 msedge.exe 85 PID 2016 wrote to memory of 5064 2016 msedge.exe 86 PID 2016 wrote to memory of 5064 2016 msedge.exe 86 PID 2016 wrote to memory of 720 2016 msedge.exe 87 PID 2016 wrote to memory of 720 2016 msedge.exe 87 PID 2016 wrote to memory of 720 2016 msedge.exe 87 PID 2016 wrote to memory of 720 2016 msedge.exe 87 PID 2016 wrote to memory of 720 2016 msedge.exe 87 PID 2016 wrote to memory of 720 2016 msedge.exe 87 PID 2016 wrote to memory of 720 2016 msedge.exe 87 PID 2016 wrote to memory of 720 2016 msedge.exe 87 PID 2016 wrote to memory of 720 2016 msedge.exe 87 PID 2016 wrote to memory of 720 2016 msedge.exe 87 PID 2016 wrote to memory of 720 2016 msedge.exe 87 PID 2016 wrote to memory of 720 2016 msedge.exe 87 PID 2016 wrote to memory of 720 2016 msedge.exe 87 PID 2016 wrote to memory of 720 2016 msedge.exe 87 PID 2016 wrote to memory of 720 2016 msedge.exe 87 PID 2016 wrote to memory of 720 2016 msedge.exe 87 PID 2016 wrote to memory of 720 2016 msedge.exe 87 PID 2016 wrote to memory of 720 2016 msedge.exe 87 PID 2016 wrote to memory of 720 2016 msedge.exe 87 PID 2016 wrote to memory of 720 2016 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6a7a19922e90f456351b102e8072c449_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa604a46f8,0x7ffa604a4708,0x7ffa604a47182⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,15277213293548272324,4466499098422844372,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,15277213293548272324,4466499098422844372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,15277213293548272324,4466499098422844372,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15277213293548272324,4466499098422844372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15277213293548272324,4466499098422844372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15277213293548272324,4466499098422844372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15277213293548272324,4466499098422844372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,15277213293548272324,4466499098422844372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6252 /prefetch:82⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,15277213293548272324,4466499098422844372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15277213293548272324,4466499098422844372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15277213293548272324,4466499098422844372,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15277213293548272324,4466499098422844372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2032 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15277213293548272324,4466499098422844372,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,15277213293548272324,4466499098422844372,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD53126d6caae76975be111e30c78acd781
SHA15ea40edcff46cac2d8e64226cbc29ca01bb26c0d
SHA256dd1edde340c979665cd007c321bcdc8b62fed08bb933bff195cb9f797466d4f0
SHA512ebdadc3d07875c69f336b45f860bf004b72eb32487faa5a8127aafced77a874aa258528b1f97463fa117a301ae05de9675dd10f3c62e503488425ff373858403
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5c39b7fa3a73a6ccd36a678cb344665f4
SHA1400c2e3c74e809776f14a9bb62c7c44f01eb5ee3
SHA256893c6247d029ea40c93d01e292abcd345f12206027c0acd73c04cf4fc3495b89
SHA512574413e8ce5f0728f28585e613c7b0349acb844ad6bd7c1e24a6bbfd6ed649312d671448100149261ec57c64551ac75c68da6a5ae714963ade759eb0c6db7271
-
Filesize
921B
MD5f72373e0e0015fcdaa46d19ccf57848a
SHA194a992ab9d725879b20087f706e2c62d90226190
SHA256a689e636d333fb3cf4137accd5ab405657a46d883f4bf4f34cd2042f507c06c5
SHA51273f80b88f8ddc8063706b3568a0f5376f96a06b1a6623664c3a2ecee2b79806ac1933014242209283d6c070fda0c9aa911f8b5ad46551d75e0c02f2639749310
-
Filesize
952B
MD5fa14fb9a9f38c940fbd7bd49eb196ed5
SHA141ea74a74d8d3c3f011a3eeb697ea81fc2087e54
SHA2569889dc5fa04d9b76b220fd3389aff6f95482c6ae0a745b4fcd4d25d360dccc47
SHA5123c16ae8e3ab4cf9c1eb9d3ba8af8084489981f1ebae1487afdff73f3adf3968b58996757a368f6e7a9db6bf33b2032df3d12535110102add841323f3fa812a03
-
Filesize
5KB
MD5ce70fe069500162d8b4f0eb05fa4235a
SHA12883e4da9db3ba494e6a5d41164bf110a85c2e52
SHA2565c64df82ce69e24ab3bee88004a4acd184f78db50c22964a4be6d354d6f09ce5
SHA5121568c3cdf8772b25b44fdb61036f1071e6abc7d7fb39cdbf192d235227836a9beee57ab2d37746cd88c5d950d97fe6db08f3b5308737cf75aceaaea88da4ec3c
-
Filesize
6KB
MD5a778bca5c373cbbdc37128be753d844a
SHA1c0a79875125a05d989438cfbdf9b9d0badc85952
SHA256f76b1475a2432052bef83bb0dc0e013285a82f6b3d9e37bda6a9ef0e43d724bc
SHA512cdc848dabcffba16dc576418b3b176d5a59b56a109852d050b7d0e33bfae52716de6c6c5cd8ca2068304132328ebf62912fa9b45201e21bec2fa9638ff718053
-
Filesize
539B
MD561b1269a1d99f28a81fc194330d47f48
SHA1f93f6b54a951d7c03ec5cdb9922c4f780b49b652
SHA25674dfccc4dc6077a815521122eb60f4df6e167243276597c64da063e33b1ac4aa
SHA512f114e48aa4204b3aaf9e806c376e0b8cf8c3f365d66080bbd6d74966b99eea46176055c432203359e5e38a3ca42d193cb2bc328d992df1e6db0b7240bfe1503d
-
Filesize
539B
MD5ae8e20968226d3de4107d6fa1c9cd8ae
SHA1afff1607ffe7849762b8bcaf36c5ace6b9d03d24
SHA25679a2e970a58d384991ab3db403828f53b2207d6a97a852ff02201aa7f30f9eeb
SHA512af5324bbb58151ac0c1bc02c3fb9e44231b6489cb36a6417fab5ea3fb517c195a440191d4d88df26d57986387d693c31210bc119200a0345d49ba3391c392aeb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5594bccc5f279d59297bf1b54c2d63e3a
SHA10fcbde7bc13843a48301269b915e9fa000a44452
SHA256c087fa1a5984c0d85b6c7a316aca463110fabe18ae4c48e91e69089a1c63ad4f
SHA512d30fb01f7b914a973c880b1b2b07ddaf10c419dee56171a67c9dd929b94623d05dc6e79125e49602364c70fc85ac0e1fa49db2f384b3d130051e2e92d65fb586