Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
6aab8909c777813bf257107f61bf91b8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6aab8909c777813bf257107f61bf91b8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6aab8909c777813bf257107f61bf91b8_JaffaCakes118.html
-
Size
175KB
-
MD5
6aab8909c777813bf257107f61bf91b8
-
SHA1
918995ac3aa1c85b5f3c23811a93b97e26e8958d
-
SHA256
f1fef7768b3e01d44650ab0087ddd3f734d58d2bb00f95bbfa202452a9818532
-
SHA512
4c1cf72528fcfd64842ea4d7227e9996f576cadde53696cdc013aa525c6a88e2fdde2ada2c8f17907201c3b7f69d4084a18672cc2c1a43db8475e0ad0aca3eb4
-
SSDEEP
1536:Sqtr8hd8Wu8pI8Cd8hd8dQg0H//3oS3bGNkF4YfBCJisV+aeTH+WK/Lf1/hmnVSV:SUoT3b/FdBCJiFm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1992 msedge.exe 1992 msedge.exe 3448 msedge.exe 3448 msedge.exe 3080 identity_helper.exe 3080 identity_helper.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3448 wrote to memory of 3936 3448 msedge.exe 82 PID 3448 wrote to memory of 3936 3448 msedge.exe 82 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 2664 3448 msedge.exe 83 PID 3448 wrote to memory of 1992 3448 msedge.exe 84 PID 3448 wrote to memory of 1992 3448 msedge.exe 84 PID 3448 wrote to memory of 2400 3448 msedge.exe 85 PID 3448 wrote to memory of 2400 3448 msedge.exe 85 PID 3448 wrote to memory of 2400 3448 msedge.exe 85 PID 3448 wrote to memory of 2400 3448 msedge.exe 85 PID 3448 wrote to memory of 2400 3448 msedge.exe 85 PID 3448 wrote to memory of 2400 3448 msedge.exe 85 PID 3448 wrote to memory of 2400 3448 msedge.exe 85 PID 3448 wrote to memory of 2400 3448 msedge.exe 85 PID 3448 wrote to memory of 2400 3448 msedge.exe 85 PID 3448 wrote to memory of 2400 3448 msedge.exe 85 PID 3448 wrote to memory of 2400 3448 msedge.exe 85 PID 3448 wrote to memory of 2400 3448 msedge.exe 85 PID 3448 wrote to memory of 2400 3448 msedge.exe 85 PID 3448 wrote to memory of 2400 3448 msedge.exe 85 PID 3448 wrote to memory of 2400 3448 msedge.exe 85 PID 3448 wrote to memory of 2400 3448 msedge.exe 85 PID 3448 wrote to memory of 2400 3448 msedge.exe 85 PID 3448 wrote to memory of 2400 3448 msedge.exe 85 PID 3448 wrote to memory of 2400 3448 msedge.exe 85 PID 3448 wrote to memory of 2400 3448 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6aab8909c777813bf257107f61bf91b8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9afb046f8,0x7ff9afb04708,0x7ff9afb047182⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16210735349556645359,12071639655556246499,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,16210735349556645359,12071639655556246499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,16210735349556645359,12071639655556246499,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16210735349556645359,12071639655556246499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16210735349556645359,12071639655556246499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16210735349556645359,12071639655556246499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16210735349556645359,12071639655556246499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16210735349556645359,12071639655556246499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16210735349556645359,12071639655556246499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16210735349556645359,12071639655556246499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5900 /prefetch:82⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16210735349556645359,12071639655556246499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5900 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16210735349556645359,12071639655556246499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16210735349556645359,12071639655556246499,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16210735349556645359,12071639655556246499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:5268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16210735349556645359,12071639655556246499,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16210735349556645359,12071639655556246499,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5164 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD54ccd3c71f937143a7716e4433fbb0c13
SHA1ee7fe2e8faa12962a0c3c7fabde67bb51aaf1d80
SHA2566ae02c23b9db45e7139e5d2a10dc6829f9a7143194e4e310d34f60cc23b24cf8
SHA512f063f2d3fa15795285962c1ad20c4309de41286fa57c4cdced19ad468c0d2f99aa945866ac2047e1bf12c6f783347d00729de0a2c1eb52d3c8ba22cc7a068021
-
Filesize
2KB
MD5eb77438ab9436334e893d73dc30a0a7b
SHA11d78ecf97cc185fc06d34b529bae432ec8444c21
SHA256f0c5262b7820b142b92975de4499510157df1f9d02135b7b524d5d15cc3f1825
SHA512c8bea45276767abd94a14aaabc31513e1370ed57bda064fc1cb5b20c0839844a4c1861739a9778e393acee4a5a97d67cc74188140aba9b1335fd4516e65c3941
-
Filesize
2KB
MD56967687da6de466bc0788513556498d3
SHA16aa56f5f65cf10364656a55f031423afc24f6296
SHA256775e2998f257e54ec18919ae8dbed3e0a4600c669e522b601896d4dd5567e6ac
SHA5125ebdbfe5948f063e40f8d49b5193fc43a4f84227ffb0b25581d8d41504baff6d402b5d93f648267c2cfa24cda3b7df5cb650966e6002a8e5449ac27c2240914c
-
Filesize
7KB
MD557cf17b2b2232e194a8d21f0b063b7d9
SHA1108e4a4627cad0f200b15c9b21dba18a5d3ec7a5
SHA2562d23706f71df859ef2cc22bbb42f6eb370ca46b5511d380d96cf66f68ecd3653
SHA51203c379a02c8d77b810776890cdff797b952711c48ae16cc06fff1f8049982558cf973ab17e1d5c16892c9e166c23fd15f71cbd6d7b5915a21b8daf09bdbcc9dc
-
Filesize
5KB
MD53c5bf42bd9539c10c6c70ea9d8189843
SHA1724e4d2dc56b0dc2b2e9f63865876235e21439d2
SHA256d0bfd10cfda5acad59b86609212a2bc46b27dbd0458507fd63684480b99e3d61
SHA5121e51683fe2d37693a2ff4b6915d650fd28292adbd5dde96670b3b9771e2cd779546e7de3e70ebc538ec7636b92dbf345244f063c55bd4e5e57925ee38944ff13
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5374062759a51815e07fa24dbec9ff754
SHA136d024ec789825d04729d438fed03bbe2d32a825
SHA256f078ce7e3eac5c3f6333cca4cc1790cb6989005c163dc9f842e68a204b32b2c8
SHA512998d639cc6eaa38ec98cfb4b41478ec8dc06ceaeae6d3107ef647f3d8d1330811e4f73635ee90f74a72a5ae31ed06d4d0e934cdb78cac1185e96775013826915