Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 03:05
Static task
static1
Behavioral task
behavioral1
Sample
77b5d08dcea58845c8b3bb97462646dc_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
77b5d08dcea58845c8b3bb97462646dc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
77b5d08dcea58845c8b3bb97462646dc_JaffaCakes118.html
-
Size
175KB
-
MD5
77b5d08dcea58845c8b3bb97462646dc
-
SHA1
b5d8316070b482e1706340ba70b7617fda080837
-
SHA256
ed304c4a942a7ecbbc8049b1af30179ca80ff4430f130736ed01b30699f1f336
-
SHA512
4141022eea46765fa814e1137a80a9e5b2b5157aa4efb1002b4436644bc6a1e828abd9fc3b5f2907de32c6e38f64f11c316accff2d45a65e3c900cad2bb9e539
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3FGNkFuYfBCJis7+aeTH+WK/Lf1/hmnVSV:SOoT3F/FHBCJinm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3928 msedge.exe 3928 msedge.exe 4216 msedge.exe 4216 msedge.exe 2136 identity_helper.exe 2136 identity_helper.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4216 wrote to memory of 2612 4216 msedge.exe 83 PID 4216 wrote to memory of 2612 4216 msedge.exe 83 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 4600 4216 msedge.exe 84 PID 4216 wrote to memory of 3928 4216 msedge.exe 85 PID 4216 wrote to memory of 3928 4216 msedge.exe 85 PID 4216 wrote to memory of 4908 4216 msedge.exe 86 PID 4216 wrote to memory of 4908 4216 msedge.exe 86 PID 4216 wrote to memory of 4908 4216 msedge.exe 86 PID 4216 wrote to memory of 4908 4216 msedge.exe 86 PID 4216 wrote to memory of 4908 4216 msedge.exe 86 PID 4216 wrote to memory of 4908 4216 msedge.exe 86 PID 4216 wrote to memory of 4908 4216 msedge.exe 86 PID 4216 wrote to memory of 4908 4216 msedge.exe 86 PID 4216 wrote to memory of 4908 4216 msedge.exe 86 PID 4216 wrote to memory of 4908 4216 msedge.exe 86 PID 4216 wrote to memory of 4908 4216 msedge.exe 86 PID 4216 wrote to memory of 4908 4216 msedge.exe 86 PID 4216 wrote to memory of 4908 4216 msedge.exe 86 PID 4216 wrote to memory of 4908 4216 msedge.exe 86 PID 4216 wrote to memory of 4908 4216 msedge.exe 86 PID 4216 wrote to memory of 4908 4216 msedge.exe 86 PID 4216 wrote to memory of 4908 4216 msedge.exe 86 PID 4216 wrote to memory of 4908 4216 msedge.exe 86 PID 4216 wrote to memory of 4908 4216 msedge.exe 86 PID 4216 wrote to memory of 4908 4216 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\77b5d08dcea58845c8b3bb97462646dc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90ff846f8,0x7ff90ff84708,0x7ff90ff847182⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17519836336584961927,1032830636082517642,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,17519836336584961927,1032830636082517642,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,17519836336584961927,1032830636082517642,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17519836336584961927,1032830636082517642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17519836336584961927,1032830636082517642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17519836336584961927,1032830636082517642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17519836336584961927,1032830636082517642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17519836336584961927,1032830636082517642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17519836336584961927,1032830636082517642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,17519836336584961927,1032830636082517642,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,17519836336584961927,1032830636082517642,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17519836336584961927,1032830636082517642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17519836336584961927,1032830636082517642,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17519836336584961927,1032830636082517642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17519836336584961927,1032830636082517642,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17519836336584961927,1032830636082517642,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3164 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD506c896cbe6ed9a8cd54af397ea9cbae7
SHA1e3e32e31958c80af0fd9014d972d18868405b400
SHA2568f94e64039470d91c85398d97b53cc6ae9361177b7b2232f0517a2ab0d6faa70
SHA512b1946cb562e1920ba35866dec8d2216ac173547785c475740ac0ad6a0cafc19f07fdd2b4037a661854a069784c9cfa6223ff424c13df95a6c60a5fc1d9617289
-
Filesize
2KB
MD5687174c239340be0222c751b1e0e5f42
SHA1caa0319e5292ae2a419d3018abf622ca2d0ecc5c
SHA256d19a9fa0094e5a5a8fb660f6c4572ab51cfd30089ad6990e69fbc41415d1c1a5
SHA51267caa04f4da1d5605de49dc304900d06eda1f77d645b3a00259361a27d58000e7f7e4783e76c21bc0e65cd574a64ad69f736b4e21d7a6817d0d7a1f4d4229fb5
-
Filesize
2KB
MD5bfab4d1fbd8ec827e7ad811b25ca1e9f
SHA150a056fcd14d51aa96dab74d66066bae2b06bffd
SHA256ae0d15812c1bf9f4994891bf0d7a201caf7a370a29414e2d1fe42cdfda7a2141
SHA51224458e4baf0bf5aff41bbdb37fc69e5da2e4f5ae9f5477b168b799f5394b5cee293d38fb81b0c398f18319bd79c1ef80b2cbfef403fd1a740bc79e4cb1f2a34d
-
Filesize
5KB
MD59a5daeef37d059f20f5c57cc84a28370
SHA10cb1ee40f74fb994935606ea740677663f027464
SHA256e9ef9dd870c3bf911e32d1f48fd1e19328942ae4ebb719ab5dcef180346a1469
SHA5128dacab4cb2008fc40bd25457aa82a6fd8b86b5a588eff7d1c87ba701d24e1a24d58d5222fc5577b1827fdbf137102619f48594a67e729b099c0a4c9341219c3a
-
Filesize
7KB
MD5022f651eff3b83bf816f75b24e314618
SHA15df3e3af3d5081adafdf9efe0dead4a3b538e9d3
SHA256fc8671785bd1298922282054d8c1408540518a3a67d26b9e44d7713bec1e134e
SHA512108983ff9a2f76aeefa767efd3c7dda393eea8f5e8a3fd5d59e6572b5de36196951391c8fce8e325f69186afd3af2e2b0925c5f3130e6227edb9ebb23e715b0e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59de85142d26fe3a940c6716e4f2ad862
SHA1e4d369eb2422b5dbd2e3c1bb1fc6245f8df905e9
SHA25673a0601d5511805202e66cb9602855c04bdf581c2b72c782e6594f93cdfe160a
SHA51241265929097beac059734cb0cf22b2b311f96d2c63efc6b478dfca6d927c7c3b6289607e3b0b42e29e74c02b9dc71f18a1a356092bf7112ed47a686ee0a4d683