Analysis
-
max time kernel
146s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 17:04
Static task
static1
Behavioral task
behavioral1
Sample
9289f6e4bacd9538339720e83b442f00_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9289f6e4bacd9538339720e83b442f00_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9289f6e4bacd9538339720e83b442f00_JaffaCakes118.html
-
Size
31KB
-
MD5
9289f6e4bacd9538339720e83b442f00
-
SHA1
31b9ef327bbdb3fa70544918b4cf26cd61883182
-
SHA256
7d5db7b9e999167c12bbba225338cbea37456e9157563b126e0e972d6d7a2c02
-
SHA512
7c0dac540b182043efae3613566751d64a751b13250d3707e72ec64702b18bbe729b74420568c725f317054ac210629e3968898efa6ffd7fc6cfb383dfb1330a
-
SSDEEP
768:HZIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SN1n:HZIRIOITIwIgIiKZgNDfIwIGI5IVJ7SL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3832 msedge.exe 3832 msedge.exe 3688 msedge.exe 3688 msedge.exe 8 identity_helper.exe 8 identity_helper.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3688 wrote to memory of 2608 3688 msedge.exe 85 PID 3688 wrote to memory of 2608 3688 msedge.exe 85 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 4984 3688 msedge.exe 86 PID 3688 wrote to memory of 3832 3688 msedge.exe 87 PID 3688 wrote to memory of 3832 3688 msedge.exe 87 PID 3688 wrote to memory of 2428 3688 msedge.exe 88 PID 3688 wrote to memory of 2428 3688 msedge.exe 88 PID 3688 wrote to memory of 2428 3688 msedge.exe 88 PID 3688 wrote to memory of 2428 3688 msedge.exe 88 PID 3688 wrote to memory of 2428 3688 msedge.exe 88 PID 3688 wrote to memory of 2428 3688 msedge.exe 88 PID 3688 wrote to memory of 2428 3688 msedge.exe 88 PID 3688 wrote to memory of 2428 3688 msedge.exe 88 PID 3688 wrote to memory of 2428 3688 msedge.exe 88 PID 3688 wrote to memory of 2428 3688 msedge.exe 88 PID 3688 wrote to memory of 2428 3688 msedge.exe 88 PID 3688 wrote to memory of 2428 3688 msedge.exe 88 PID 3688 wrote to memory of 2428 3688 msedge.exe 88 PID 3688 wrote to memory of 2428 3688 msedge.exe 88 PID 3688 wrote to memory of 2428 3688 msedge.exe 88 PID 3688 wrote to memory of 2428 3688 msedge.exe 88 PID 3688 wrote to memory of 2428 3688 msedge.exe 88 PID 3688 wrote to memory of 2428 3688 msedge.exe 88 PID 3688 wrote to memory of 2428 3688 msedge.exe 88 PID 3688 wrote to memory of 2428 3688 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9289f6e4bacd9538339720e83b442f00_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bed646f8,0x7ff8bed64708,0x7ff8bed647182⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,7437918811832828314,1082843918741092386,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,7437918811832828314,1082843918741092386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,7437918811832828314,1082843918741092386,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7437918811832828314,1082843918741092386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7437918811832828314,1082843918741092386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7437918811832828314,1082843918741092386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2852 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,7437918811832828314,1082843918741092386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:82⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,7437918811832828314,1082843918741092386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7437918811832828314,1082843918741092386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7437918811832828314,1082843918741092386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7437918811832828314,1082843918741092386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7437918811832828314,1082843918741092386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,7437918811832828314,1082843918741092386,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD541552d717536a85466710f44a94b7c77
SHA194c1564ef0dedbded9aa82d7fe3333092786e6a8
SHA25680bdbc4a227dfe552a4022e15a95918e211cfe2b1717b7ac191f846675c7d7bb
SHA5126292c3547766de98f47d3d61388c495b26b641f9e5a9191fe52e458a37ab3fb1645323705ec14c4986d432885cedd3468c408165d951df4683b53820b2266a6d
-
Filesize
2KB
MD5144c4ccd60a88b6b84f8a080d706a1b7
SHA183b1b3027f63cbbc034db6e182807e5551d4712c
SHA25632cf5b136951a891af5789e97f3ed59ba05c6b67ee9da7f25cd7fc06873b7d22
SHA512f943029b4b89ed74ff90ecc6780f9b05b36b9f3de42e963fdadcdc438e1edaab17d3d3525d369e5f0574147cdc2f687ebb23c1739fa2d96d2df3c5b76468eb4d
-
Filesize
2KB
MD5cea3e09e40a8e36ab3ddeb30c9ef45c5
SHA11cf8a465be35ab7d850a33aa9b50fe4f8fc0f29e
SHA256d7209eeb35c48b735f225fcdb4718688b47ed5e2ede17df30fde642492a99842
SHA512b7908c7341997ea4de7168afb1ec87aa4c33878655124efb78a57e574dfb61957ae68e6b93a6e8155c0c24085985e0d19009c112817245768d71ae2ec3b720f3
-
Filesize
5KB
MD5dad4adc23baf376ada5c808dd8482a0b
SHA1426813bc13b2c997ad4fc2b083e32700aec4ad4f
SHA2567b662b80aaad49a8e83a7cc0f714c4216b117328017640db4d61373ae3c631d5
SHA5123a27e7e1154266aa879232016bc2ddc8a15ceb313268d3f81f673e5995b9c42148eb57d00b6d6b72a21c4cbe95cc3c36893ad7ddf84c3a2c64cd181b186d9009
-
Filesize
7KB
MD5a23738b83617241d5747dd03c990be70
SHA11447efe27cfea30a78521d37a69c6efd5540ce4c
SHA256f213a4a474b24f9f563c938075d21a289659de815821c14ffb14206d388b0ffb
SHA512e9d2afa7430d8002554f8865038d9c1b33a00eb54c18751daf7ae63f069ce8538038720456cffb1047835b057d2f2c6f4a8305357e199631c775ce13e32011de
-
Filesize
6KB
MD58ce24010cca65649b853a481ad3e673d
SHA14ca5479279877eafc6b8120ea358f4072f919bae
SHA25671aa29ca8f5d4b7f938689231205940903759702f1abe47d0fbec60b9599693e
SHA512c2d4f82c9268624db3b18b4256a15c22eaa4908ed9f17819024704a11e2505b3d464f5a05ab98ca51cda4e9ca37e413c4199a414acaad3cf645661a47665af4c
-
Filesize
372B
MD53b8c2a1c8755630ce3630d316fccb25f
SHA1d39dfd3d4f6dd348da264d0e33cf11ccb41e3e8f
SHA2562161aef9aa86f24ef0385cb66c64262c7bd20f86d362c5f3455b92cfa5cabe3a
SHA512db1ed13045d47105c12b89153ac314b30221fe38b786fae6b5885f8792cb1c4a28bd69510b06a622af50417f96af08a5ff633324116b6a0fc9f535e089d8dbed
-
Filesize
204B
MD556bc2784afaeca626393c7351ea42a8b
SHA1338b5a4afb4ed84c1bdea678c917bacc7669d23f
SHA2563c615a7b83866edacf41793bdb92b7aa728146a86fb5744ccc10d7c031c67dff
SHA512feb8fec157bfc58a17cd33b915173045925cbcc3f48998b6bfcf8f69c3575b3446b6fa511fc3504d871062c129e15c9f91a5961c7ec61b1fb3798090c905d531
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5153789880b4ddc8b8b6c53521d9fa2e6
SHA113529c9d798d2873a1642ee604498364c3b8adfd
SHA256d118d137c14ab603993d65f7efa24a5ba1b178ec013e93ad16c14b2c1973acd5
SHA5124120b943c09c6341a4b043e5d7984307a8f1ea5dcbf2932dea8778bf8d54ef74d31cb82a446f006c922e39809e70247e404ad81b0b853cf6b8800464380c2212