Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
894127dbccd2a5e88f5d9943b992b908_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
894127dbccd2a5e88f5d9943b992b908_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
894127dbccd2a5e88f5d9943b992b908_JaffaCakes118.html
-
Size
48KB
-
MD5
894127dbccd2a5e88f5d9943b992b908
-
SHA1
70dd68a1b5b3338e7682af9b8586e5e52f67521c
-
SHA256
56fd17be0412f4cc7195317795ff504bf1900a502210f6d8898cedca0bf10ba3
-
SHA512
06782a0428741c4ac5089b4e72297d8ea7a151925c89b1deb13a0059bfd5a055f9389b8ac9fff1742866ad2aa052fb4549381cc2e5b3509c53f181a5719cd4bf
-
SSDEEP
1536:soPY5kJa0Jw8taj3MOm9cVBppM7uSfhmGnbRUJ7:soPY5kJa0Jw8taj3MOfVMvk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 4612 msedge.exe 4612 msedge.exe 4924 identity_helper.exe 4924 identity_helper.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4612 wrote to memory of 2508 4612 msedge.exe 81 PID 4612 wrote to memory of 2508 4612 msedge.exe 81 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3580 4612 msedge.exe 82 PID 4612 wrote to memory of 3460 4612 msedge.exe 83 PID 4612 wrote to memory of 3460 4612 msedge.exe 83 PID 4612 wrote to memory of 4972 4612 msedge.exe 84 PID 4612 wrote to memory of 4972 4612 msedge.exe 84 PID 4612 wrote to memory of 4972 4612 msedge.exe 84 PID 4612 wrote to memory of 4972 4612 msedge.exe 84 PID 4612 wrote to memory of 4972 4612 msedge.exe 84 PID 4612 wrote to memory of 4972 4612 msedge.exe 84 PID 4612 wrote to memory of 4972 4612 msedge.exe 84 PID 4612 wrote to memory of 4972 4612 msedge.exe 84 PID 4612 wrote to memory of 4972 4612 msedge.exe 84 PID 4612 wrote to memory of 4972 4612 msedge.exe 84 PID 4612 wrote to memory of 4972 4612 msedge.exe 84 PID 4612 wrote to memory of 4972 4612 msedge.exe 84 PID 4612 wrote to memory of 4972 4612 msedge.exe 84 PID 4612 wrote to memory of 4972 4612 msedge.exe 84 PID 4612 wrote to memory of 4972 4612 msedge.exe 84 PID 4612 wrote to memory of 4972 4612 msedge.exe 84 PID 4612 wrote to memory of 4972 4612 msedge.exe 84 PID 4612 wrote to memory of 4972 4612 msedge.exe 84 PID 4612 wrote to memory of 4972 4612 msedge.exe 84 PID 4612 wrote to memory of 4972 4612 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\894127dbccd2a5e88f5d9943b992b908_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae23946f8,0x7ffae2394708,0x7ffae23947182⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,5346601731170183735,16793848024708442514,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,5346601731170183735,16793848024708442514,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,5346601731170183735,16793848024708442514,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5346601731170183735,16793848024708442514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5346601731170183735,16793848024708442514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5346601731170183735,16793848024708442514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4572 /prefetch:12⤵PID:6024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5346601731170183735,16793848024708442514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:5968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5346601731170183735,16793848024708442514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5346601731170183735,16793848024708442514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:5596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,5346601731170183735,16793848024708442514,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6336 /prefetch:82⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,5346601731170183735,16793848024708442514,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6336 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5346601731170183735,16793848024708442514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5346601731170183735,16793848024708442514,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5346601731170183735,16793848024708442514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:5176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5346601731170183735,16793848024708442514,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,5346601731170183735,16793848024708442514,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6640 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5506c165cac00502a2636be821d28fa64
SHA157f2b1c5503f8c28172095ef0640e46836707ef5
SHA256a64a25dfcd31a374966bbe7e08571e023b0a6a657fcf7022f38c9c9f618eca5f
SHA512ca05c558b48f4d8af50f2d5a9f504620da6a29d5cac8ab91c13303dcc8a5826cee5332b575ba05e2fb41a554f7cb304b2a27c604442dcb38c5229dd1503c2640
-
Filesize
2KB
MD5fd2280b9542d76176b23f93acec4a3eb
SHA1d58b15a0debdf9a2c4c02e1a0a5c90b6c828b2de
SHA25639533eab717c0ca9aa76e0a32dfbbb4f792ca158adc24f00fbe001926a2889cf
SHA5120d65b83889928eb8d3829035c7da60d7c70da9a25a29065cdef9d7d4a54da1d92dff716b621e5ca053713f02857a14b9387f31d4dd33c528f3829449a2e8a574
-
Filesize
2KB
MD594baaf0ed9f26b2b20fce03e18eaf4c2
SHA16b18101668223c449d43d7718ce8e89d4045815d
SHA256cc834394a29a1a6e4f4a41da0fb5bd5f703b2060ef98cc37b29d158a20b47cab
SHA512c1aba6d1fe3bec7dded603934be9304577009a09389fe704a87ace8d9eabe6f4c92096ef7f8207fec38131db1baf8191952aa8c4bc092913e292c22f30cc4af8
-
Filesize
5KB
MD58c4cf45d93096d32e1195d57a5f1f8ba
SHA1127b6d6042e1be5e53c4a0c785e02cb246a96c9c
SHA256a6ba7637ce48f8048292ae61c85fe1072f53f6382ba0e003eb08f79e5cdb1054
SHA512b279646e542be2763447597caf4474fa6d5f9bf37d43c9e1b07bd6f5df934ee31480be2bacfc74377b72ba07731ed5350dfbbde6322c98fd7633419d1d7584ab
-
Filesize
6KB
MD5df61522175e0df592d8147503230de37
SHA15563f018b22f91912729080f5bf3238f8a750ee6
SHA256c48654f9448f65ac963eef641bb33ff1bb9c59bdae0faf272b0a21afbf7e1eac
SHA5126f840f5470763e814bbbe4b4b127692e7094fc02bb4a29f4d0ba49f7d719ff2f615d2dfc26466ad1739b1f32b4b94a8fc12ba318a68a06a654098e31c3f70d29
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5431536eeaf2dcc5f791d9595550a5e1b
SHA12f7bd679aae5707d58a45218b13b2fdad700e3a8
SHA2565d5256cea1ed8ff9ee314740fd695aa18d3afa576724e04bef7621ffd95e1378
SHA512e8cbfb39a052eab8b1c8dd17fd9eaa8aa4ffe800d3d65acbc9d1270e77085d466ad1494589015c679df703ff00540e2df97fe3ced5f113e874d94a86fbe032b3