Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 09:44
Static task
static1
Behavioral task
behavioral1
Sample
91528a868a3f2e8d823febcca64d41ff_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
91528a868a3f2e8d823febcca64d41ff_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
91528a868a3f2e8d823febcca64d41ff_JaffaCakes118.html
-
Size
175KB
-
MD5
91528a868a3f2e8d823febcca64d41ff
-
SHA1
7f8f8dc092810b95c0312e8f0f34587689c14513
-
SHA256
25eb6a32be1697c728ab3bff58a0e413fb026755ae66ccef0f76c20d7b26d94f
-
SHA512
ac9b84208981e3f4e14c3e9c7990692caa6436bd34168df0a9ad343e965da48e84386ce623371f70dc795a0c9a9422e778089eb5b3fdc49149c05cfbf51a584e
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3RGNkFIYfBCJis1+aeTH+WK/Lf1/hmnVSV:SOoT3R/FtBCJiFm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2880 msedge.exe 2880 msedge.exe 4920 msedge.exe 4920 msedge.exe 2060 identity_helper.exe 2060 identity_helper.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4920 wrote to memory of 4636 4920 msedge.exe 81 PID 4920 wrote to memory of 4636 4920 msedge.exe 81 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2204 4920 msedge.exe 82 PID 4920 wrote to memory of 2880 4920 msedge.exe 83 PID 4920 wrote to memory of 2880 4920 msedge.exe 83 PID 4920 wrote to memory of 1532 4920 msedge.exe 84 PID 4920 wrote to memory of 1532 4920 msedge.exe 84 PID 4920 wrote to memory of 1532 4920 msedge.exe 84 PID 4920 wrote to memory of 1532 4920 msedge.exe 84 PID 4920 wrote to memory of 1532 4920 msedge.exe 84 PID 4920 wrote to memory of 1532 4920 msedge.exe 84 PID 4920 wrote to memory of 1532 4920 msedge.exe 84 PID 4920 wrote to memory of 1532 4920 msedge.exe 84 PID 4920 wrote to memory of 1532 4920 msedge.exe 84 PID 4920 wrote to memory of 1532 4920 msedge.exe 84 PID 4920 wrote to memory of 1532 4920 msedge.exe 84 PID 4920 wrote to memory of 1532 4920 msedge.exe 84 PID 4920 wrote to memory of 1532 4920 msedge.exe 84 PID 4920 wrote to memory of 1532 4920 msedge.exe 84 PID 4920 wrote to memory of 1532 4920 msedge.exe 84 PID 4920 wrote to memory of 1532 4920 msedge.exe 84 PID 4920 wrote to memory of 1532 4920 msedge.exe 84 PID 4920 wrote to memory of 1532 4920 msedge.exe 84 PID 4920 wrote to memory of 1532 4920 msedge.exe 84 PID 4920 wrote to memory of 1532 4920 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\91528a868a3f2e8d823febcca64d41ff_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd944946f8,0x7ffd94494708,0x7ffd944947182⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11603797759258898373,8958693720954697392,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,11603797759258898373,8958693720954697392,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,11603797759258898373,8958693720954697392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11603797759258898373,8958693720954697392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2144 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11603797759258898373,8958693720954697392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11603797759258898373,8958693720954697392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11603797759258898373,8958693720954697392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11603797759258898373,8958693720954697392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11603797759258898373,8958693720954697392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,11603797759258898373,8958693720954697392,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,11603797759258898373,8958693720954697392,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11603797759258898373,8958693720954697392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11603797759258898373,8958693720954697392,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11603797759258898373,8958693720954697392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11603797759258898373,8958693720954697392,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11603797759258898373,8958693720954697392,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5b58b62880237698030ea59fad6dd8755
SHA1ff59fe0582702ff97806e1c12d7b18f4d7adcc75
SHA25645ed386597ffaf683aaef813a1bbf906bd68c537e66178268ef1213b03482156
SHA51261d229fa86b80ec716deeefecd9efa27c5b0b57532552535e44c6b6e5bf4c38430440c3a675d424a38abc27c8b4a24b498234182a3317d6bce82cfe8aa92480c
-
Filesize
2KB
MD56f8299bededb32e33b8e9456f3eaa0a6
SHA1c35b0614aa82d7df3c7fad96acc720c83eeaf9a1
SHA256f312d8b2b91cd698b1f48de152126a9315015c24ea41f5841e4b2740a37626d1
SHA512cadf58857463070b3e13358312f15b0eaf24d6db73ec806c432d4cf0f85544272a9df8b0cf4e264cc2e96707cec0b72ab59f2d52831206ac298bd9bb12f5348c
-
Filesize
2KB
MD5df0af675535f50896036a1b7aa4e9416
SHA1d9d3bb8ec39ed86d973b43161034207b0fb60234
SHA256e51855ac359f13935f66dee845301e5a11b5abc3508dec504c33a5732b8dae00
SHA512ff0c7ff4ff783d1fe3eda70742324cb9d7be1263cf017d34c68c2d2a96e4f6720eb031a5d6fa8926c8d0e417ce76c43ca58872dce965c0b3c631458a876db603
-
Filesize
5KB
MD59afe09dc5cbf308bffdd6bd43affbb45
SHA14012ca0d39f9438db3375eb0739b1f956a0923a4
SHA256fd096817519e32a3343f7c5daff6c8cba3e54247647e276e0fa8163ad058be66
SHA51290e16dcfef6b914c0f1a0f8d35d3d2ad9a0a57957b08cbeab2f02b897f223ccf6db29dca3a4d59ec37155136e04f8930856e2e28f0d5829c5d1e9c20e2e1dda5
-
Filesize
7KB
MD51512c683226a6f8cf5836ed3a8ebda9a
SHA1c33b8a7fb2c71e0ad0fdc5024c591a301a8d27c2
SHA25655dac331848c006453aceb14b03b4ce106f9f464ff4eb299c359bf6a17b04447
SHA5128da3b8b0201849255b27294b9237ad60eb881243710acbd38c42973a66af94d01b9a8a6ada2ee90f95640aa893be39d7cab7c31a3dd26aa0a12b407c9e299f3c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ae509dc4628135e3340f4966e0c47842
SHA1558c327247beab490d48e3f88b371fcb57c940b4
SHA2567767eabf4eb4e9d4ad0ef6501a5169b38b05089a4a20f781666cf24aadf28b12
SHA512ab718f9bde2369493423edf581b75840a9f37abaf7c313818a4b23621bf3dfa68a3549b7b501c66750f5ac07b6b4676972805f056dc30f454ab5404e25fca1d7