Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 20:47
Static task
static1
Behavioral task
behavioral1
Sample
7e581d4780a77d2bcd14fe48b45268b9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7e581d4780a77d2bcd14fe48b45268b9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7e581d4780a77d2bcd14fe48b45268b9_JaffaCakes118.html
-
Size
175KB
-
MD5
7e581d4780a77d2bcd14fe48b45268b9
-
SHA1
786e10640a0c177bc4b318e3b093b7ca24964e00
-
SHA256
5acd2f1f72e7e3dd14284eb92015f7f6b99df6ab7e496d883f9f3319933465ca
-
SHA512
5d201893bd22a1baa75f553de85659dc5e771f854eb06609d656787fe36c26e57d582ab5161b7139c94e0575e48353a6dd7532a8a3bcef9c370fa43e6be49855
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3wGNkFUvYfBCJisZ+aeTH+WK/Lf1/hmnV+:SOoT3w/FrBCJiVm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 1544 msedge.exe 1544 msedge.exe 748 identity_helper.exe 748 identity_helper.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1544 wrote to memory of 1716 1544 msedge.exe 81 PID 1544 wrote to memory of 1716 1544 msedge.exe 81 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 1304 1544 msedge.exe 82 PID 1544 wrote to memory of 4936 1544 msedge.exe 83 PID 1544 wrote to memory of 4936 1544 msedge.exe 83 PID 1544 wrote to memory of 3372 1544 msedge.exe 84 PID 1544 wrote to memory of 3372 1544 msedge.exe 84 PID 1544 wrote to memory of 3372 1544 msedge.exe 84 PID 1544 wrote to memory of 3372 1544 msedge.exe 84 PID 1544 wrote to memory of 3372 1544 msedge.exe 84 PID 1544 wrote to memory of 3372 1544 msedge.exe 84 PID 1544 wrote to memory of 3372 1544 msedge.exe 84 PID 1544 wrote to memory of 3372 1544 msedge.exe 84 PID 1544 wrote to memory of 3372 1544 msedge.exe 84 PID 1544 wrote to memory of 3372 1544 msedge.exe 84 PID 1544 wrote to memory of 3372 1544 msedge.exe 84 PID 1544 wrote to memory of 3372 1544 msedge.exe 84 PID 1544 wrote to memory of 3372 1544 msedge.exe 84 PID 1544 wrote to memory of 3372 1544 msedge.exe 84 PID 1544 wrote to memory of 3372 1544 msedge.exe 84 PID 1544 wrote to memory of 3372 1544 msedge.exe 84 PID 1544 wrote to memory of 3372 1544 msedge.exe 84 PID 1544 wrote to memory of 3372 1544 msedge.exe 84 PID 1544 wrote to memory of 3372 1544 msedge.exe 84 PID 1544 wrote to memory of 3372 1544 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7e581d4780a77d2bcd14fe48b45268b9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5e2e46f8,0x7ffd5e2e4708,0x7ffd5e2e47182⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,7218431052963294844,8370524701926774011,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,7218431052963294844,8370524701926774011,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,7218431052963294844,8370524701926774011,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,7218431052963294844,8370524701926774011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,7218431052963294844,8370524701926774011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,7218431052963294844,8370524701926774011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4528 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,7218431052963294844,8370524701926774011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,7218431052963294844,8370524701926774011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,7218431052963294844,8370524701926774011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4272 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,7218431052963294844,8370524701926774011,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5788 /prefetch:82⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,7218431052963294844,8370524701926774011,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5788 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,7218431052963294844,8370524701926774011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,7218431052963294844,8370524701926774011,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:12⤵PID:524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,7218431052963294844,8370524701926774011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,7218431052963294844,8370524701926774011,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,7218431052963294844,8370524701926774011,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4584
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD59ad0a77b667fac94fe3f3f8c7e878375
SHA1a6c0ad37a6daaf6a8f235b4dd68a91940b9e3af4
SHA256b3370b3c53165ef4337f9f9adaa20c62811e8a2fe5e719d25fe0e933bf7c3a93
SHA51205dc039270da8fe15b662f2e2b860fa3455c3c16988dc0bd3a4b791d79a45369da0877cd898cdddbe8eac89fb55cd08863929a00500b472a921b754588bfca24
-
Filesize
2KB
MD56d673e18fec47a1a6489647816561c97
SHA17fbfe73d8f942b3808201ccabaac96e53531c921
SHA256ea263d2584fcc5344fa815a1d65a4f9e1888f886dba2825892955ccafe8abb27
SHA512b92dd5901ee2c60adabfae725f1a50d12aed74bb0d05f1a5f7b778a84d1119ca6c07a062dbc74745e762866c34cb43cfd74cc8cbb5e2d28ee800f8b4a91fe45a
-
Filesize
2KB
MD56fee70a84f4ff9f3c738e6f1207b6587
SHA119a275e424b4af146566825877b7c14389c94f72
SHA256629267f5776e42acf0cc7d66f8e3ce73af063abedc250bc400fcdf5ee64b1762
SHA5124d1a34874ca7742ce00187036f00daf3ad0c23efec269068aa83435491f43eff08b821674c7eeb226d15e689b7b2249d50ab8f8ba362d9d682903aabbac21aed
-
Filesize
5KB
MD53f5388f2392e5fb17b39cfc8a8fce129
SHA1fcd332e040c9f9f98bc668e5b4d27c07ccaeaa50
SHA2566007e43f6f949fb5c6b4712b5fa3d2b5c165c29f345ae69c0a73bf0b44aa380c
SHA512dadb6fef2e39a39a1f985f17ed770d55e058b47e448be7600360b3ae3fb006a4d5be492919a96e218ebd965350f8807120487f16bc17991ad0c95b6ab4c619fc
-
Filesize
7KB
MD589cf313a85c67c59309a578670119bf1
SHA1e728e85d00d775ff5ebb0ca6fc3678d7ec65ff5f
SHA256ddd7647ce7b89e29185d7001b1cbd32b31b8078202cd94ac56a6ff34f9174222
SHA512eb5522b68034ada34c406fb88a15534e3a869abb094571c83e91604e638e9dd4669fbb70ff3c22d2012693f192953f8be95343469e93b099f85e46fa3deea770
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54596803596424f1f04bcea7c1c3b9698
SHA1428f1fb7841fc3a4dd153b29c5581819cf9044b9
SHA2563e885bdfdd24c744d823b292152b1cb2b74597c730f7ac0301ff9b1ca8ecd9c4
SHA51298353fa9251ad7493c4c513d1cd2a1ad3c627a84428524db99590b4960ce05bd8fbad1c880ef89988e7bcb892e52a3a1facdd472e283b57077444f61c8418d90