Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
6d05b770048a7f3e283ea0b69e33dc54_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6d05b770048a7f3e283ea0b69e33dc54_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6d05b770048a7f3e283ea0b69e33dc54_JaffaCakes118.html
-
Size
175KB
-
MD5
6d05b770048a7f3e283ea0b69e33dc54
-
SHA1
e13674f646c0d673fcc49472806e80f221df0297
-
SHA256
1a84455177509cdf9e3f7e046dde46cdf74d8f4484a8bc76f9da42322208cfd2
-
SHA512
4b9a0f95c34bab913d6d9ae56b384391b743aacd5924f588a9b635c87b54c9226d346f1599f91f500d54ed505f76ecec5a8d935f8d373725713703e8f7e80e7e
-
SSDEEP
1536:SqtO8gd8Wu8pI8Cd8hd8dQgbH//WoS3/GNkF4YfBCJiZo+aeTH+WK/Lf1/hpnVSV:SaCT3//FdBCJijB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1400 msedge.exe 1400 msedge.exe 4196 msedge.exe 4196 msedge.exe 4148 identity_helper.exe 4148 identity_helper.exe 5944 msedge.exe 5944 msedge.exe 5944 msedge.exe 5944 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4196 wrote to memory of 3316 4196 msedge.exe 82 PID 4196 wrote to memory of 3316 4196 msedge.exe 82 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 740 4196 msedge.exe 83 PID 4196 wrote to memory of 1400 4196 msedge.exe 84 PID 4196 wrote to memory of 1400 4196 msedge.exe 84 PID 4196 wrote to memory of 1416 4196 msedge.exe 85 PID 4196 wrote to memory of 1416 4196 msedge.exe 85 PID 4196 wrote to memory of 1416 4196 msedge.exe 85 PID 4196 wrote to memory of 1416 4196 msedge.exe 85 PID 4196 wrote to memory of 1416 4196 msedge.exe 85 PID 4196 wrote to memory of 1416 4196 msedge.exe 85 PID 4196 wrote to memory of 1416 4196 msedge.exe 85 PID 4196 wrote to memory of 1416 4196 msedge.exe 85 PID 4196 wrote to memory of 1416 4196 msedge.exe 85 PID 4196 wrote to memory of 1416 4196 msedge.exe 85 PID 4196 wrote to memory of 1416 4196 msedge.exe 85 PID 4196 wrote to memory of 1416 4196 msedge.exe 85 PID 4196 wrote to memory of 1416 4196 msedge.exe 85 PID 4196 wrote to memory of 1416 4196 msedge.exe 85 PID 4196 wrote to memory of 1416 4196 msedge.exe 85 PID 4196 wrote to memory of 1416 4196 msedge.exe 85 PID 4196 wrote to memory of 1416 4196 msedge.exe 85 PID 4196 wrote to memory of 1416 4196 msedge.exe 85 PID 4196 wrote to memory of 1416 4196 msedge.exe 85 PID 4196 wrote to memory of 1416 4196 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6d05b770048a7f3e283ea0b69e33dc54_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffceba246f8,0x7ffceba24708,0x7ffceba247182⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,15995532403738038111,6784688930971081181,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,15995532403738038111,6784688930971081181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,15995532403738038111,6784688930971081181,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15995532403738038111,6784688930971081181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15995532403738038111,6784688930971081181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15995532403738038111,6784688930971081181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15995532403738038111,6784688930971081181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15995532403738038111,6784688930971081181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15995532403738038111,6784688930971081181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,15995532403738038111,6784688930971081181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,15995532403738038111,6784688930971081181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15995532403738038111,6784688930971081181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15995532403738038111,6784688930971081181,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15995532403738038111,6784688930971081181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15995532403738038111,6784688930971081181,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,15995532403738038111,6784688930971081181,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3080 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5944
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD50603cecd84037a57203e3c5499893920
SHA1ac214468eb695c329583f50f3612340c378137bb
SHA2560a41863b247cbc070e73d4d4ab2370137f83446c06cb5295c0c51b38b789d982
SHA512c19eda79dbb830aa06a56c7a4c2f363b564eadc337db7c02a49dcff7d429127495e683e74e4c94fdfd78c06367c94c9509fc022105b8a493848822e693c3a609
-
Filesize
2KB
MD581e6cc7fcc88d328257f6f8f4333da6f
SHA1b438d760766347379d1f84193f2db9972a47358f
SHA2564160d619ee9cf2431cc98b5f9981498d30d06fed5cb0011f7182dce0254c04a2
SHA5128796d8c59ccbb442ffa9fceff887b8726be510d661106157a754739647603a61bc7e175a1fe544202677ea6d0a3bd5c59918a4a138b3cde4e5fac289b1e842b1
-
Filesize
5KB
MD506f4f68753170497495517c8d463de9c
SHA15b3fb6bf9f32fb6324cdfbd08c210ffd31099bad
SHA256ba0706ca2277c7e617db02313da300f44f571537125bbd7fa21267b4f7ea22eb
SHA51204e18e300f11c9eb2024899f7802bb2b9a101a79915b7c3f896206c7eb17364e2414db0c3f339256c1d0e2023648ddfe9fcb579f6d3396f04f23fd59261d8b88
-
Filesize
7KB
MD5da91ea995ed744c36e64636273693dec
SHA187204a70d6dabeeef257629b8c981ca2eb4589e8
SHA256674a437f6321f392712bcd5b3477f3b84e910eb5c58302e5f8805ca2cf4f821d
SHA5122e4439447b41c4fb54fc64beae6f2d403cfef8c1cd6fe5cd2b309b1e3cd323ea8ea344160a81fb664de98820defadaeb578abb0b8c558389fff3f0e8fa04666f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f990fcf6-793f-4b6f-b5d5-18ef29e9a551.tmp
Filesize2KB
MD5f9aa4e4e66b3abbe4d9be10a48bec6bf
SHA1d7e2e6aa1a2308ddf9627eb13d10f089016c6d25
SHA25659ec56e88b6f9f6b260dd9144f893fa15e120399132dff6391f230a94a105aed
SHA512f9972ac8824fd661819251abdf6931260ef2ccc36e7e5c29b7d2ab47108d2207504b4f6833f265ae0c63208e62b38d71b9a2104d6bbde7679859c57b5ebd9b54
-
Filesize
11KB
MD505406c9c7ecf49a43845c28395de5114
SHA1a197c80f98dad70ac8cd86502b13ab4465e45971
SHA256ea7c568755b3c0a37bdf715ef47455e1c14f7853a321f9c853b023d3ec1ef3e9
SHA512b883d943267e565bf7817b58dfcb0a919a2ded586fd1b2e92190a1743f2b7229ce3366af51b3a6d87362f2e02c9f31c1d180c41a6077e68c1f02698d5976757a