Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
966255d00f71621a8bb9db26788414d5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
966255d00f71621a8bb9db26788414d5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
966255d00f71621a8bb9db26788414d5_JaffaCakes118.html
-
Size
198KB
-
MD5
966255d00f71621a8bb9db26788414d5
-
SHA1
d0ad7cc1a4d8d69a58754e758bbca0f9a26c7a19
-
SHA256
7f6617e911e2e8954f415a34170a21cf0c579562e3a36cd90d2a40fe6c17ee9d
-
SHA512
ddb875d42ffc7a53f6c8d5fbe53f9cce94322aa326c3129f299dd4d5341e17aad75d0773c8437283900a888f92eaab0147fd918d5de95a1087177fa0ea912601
-
SSDEEP
6144:br0w070X0aPpBa0v0R0Q030c0y0ql0x0N0r09:5Ppf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 3912 msedge.exe 3912 msedge.exe 1224 identity_helper.exe 1224 identity_helper.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3912 wrote to memory of 4932 3912 msedge.exe 83 PID 3912 wrote to memory of 4932 3912 msedge.exe 83 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 2536 3912 msedge.exe 84 PID 3912 wrote to memory of 5116 3912 msedge.exe 85 PID 3912 wrote to memory of 5116 3912 msedge.exe 85 PID 3912 wrote to memory of 3160 3912 msedge.exe 86 PID 3912 wrote to memory of 3160 3912 msedge.exe 86 PID 3912 wrote to memory of 3160 3912 msedge.exe 86 PID 3912 wrote to memory of 3160 3912 msedge.exe 86 PID 3912 wrote to memory of 3160 3912 msedge.exe 86 PID 3912 wrote to memory of 3160 3912 msedge.exe 86 PID 3912 wrote to memory of 3160 3912 msedge.exe 86 PID 3912 wrote to memory of 3160 3912 msedge.exe 86 PID 3912 wrote to memory of 3160 3912 msedge.exe 86 PID 3912 wrote to memory of 3160 3912 msedge.exe 86 PID 3912 wrote to memory of 3160 3912 msedge.exe 86 PID 3912 wrote to memory of 3160 3912 msedge.exe 86 PID 3912 wrote to memory of 3160 3912 msedge.exe 86 PID 3912 wrote to memory of 3160 3912 msedge.exe 86 PID 3912 wrote to memory of 3160 3912 msedge.exe 86 PID 3912 wrote to memory of 3160 3912 msedge.exe 86 PID 3912 wrote to memory of 3160 3912 msedge.exe 86 PID 3912 wrote to memory of 3160 3912 msedge.exe 86 PID 3912 wrote to memory of 3160 3912 msedge.exe 86 PID 3912 wrote to memory of 3160 3912 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\966255d00f71621a8bb9db26788414d5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9272c46f8,0x7ff9272c4708,0x7ff9272c47182⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,2557004837295229311,12836618682061666401,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,2557004837295229311,12836618682061666401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,2557004837295229311,12836618682061666401,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,2557004837295229311,12836618682061666401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,2557004837295229311,12836618682061666401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,2557004837295229311,12836618682061666401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1980 /prefetch:12⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,2557004837295229311,12836618682061666401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,2557004837295229311,12836618682061666401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,2557004837295229311,12836618682061666401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,2557004837295229311,12836618682061666401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,2557004837295229311,12836618682061666401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,2557004837295229311,12836618682061666401,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,2557004837295229311,12836618682061666401,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,2557004837295229311,12836618682061666401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,2557004837295229311,12836618682061666401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2064 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,2557004837295229311,12836618682061666401,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,2557004837295229311,12836618682061666401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:3708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
1KB
MD50dea2cc97b6ba919a8a1fce25dbfe9b4
SHA1486725518a4682f7687e8a52acc37b1c181be734
SHA256347524ab0ed266a189f6921ec792832268245429db79a00ede61f96bcdf883c8
SHA512e0988093d0188024bc33f2185a4e1d0dd18e0455acf2c55b952b8954b064b3d356decb526d9bb8a4f2eb48e766042aae0302ce5d32c73e1a0619e9bf14e4313f
-
Filesize
5KB
MD5f3579ca51165f0aae999cdb58a265c56
SHA1dfe4729b62c93c74c6c64c012a3dde1470f41fd6
SHA25677faac25953c41fc2347851c69b6b2ac58772d11b5e77e7ff57788c1ef44ad56
SHA51285d9128bcb386c363cede5574a8358201e8804cc1ba95b0466fe532233ceb7c18c141acc2583d3e0a3699084449959006ece85c0109db2a212daa669dccae628
-
Filesize
6KB
MD5980aa6bca8595992796199b066f533d1
SHA1149c03a9737fe6e60aac98eaf33cfd98de96295c
SHA256ed6f0478265eaa7f531a25c4fb0466f948da788cc5213fbdb135ef7a08ca900c
SHA51261e30c4aa3efdecd6e965b6e0441e61dd0b38779c6b23a44fba496630c07714c4430c6dd6b66f0883fa4cb74cdfb458ea3b51397ae18de999b00d7335a8b35aa
-
Filesize
6KB
MD56e5e7dd9f0da51747d7c269f041bd417
SHA10a3d17d10c7009b81743462ee62b637cd534c830
SHA2565e4689192daaf1006cd535e434a50d27a9f41062a715b69b57da2b1776342702
SHA5129e669ff15af072e1cddfa76cf054e4b5f4b494cb0c3fcfe5c770135d2e5b9f73c8952b2523dc2061f64a558fd195797b85c7f3b8a55db91385b9e4712ad90f23
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD56c301905833060a7ca2de7d3934a88e3
SHA1b6dda8759c02d7bc7399402b18ad6a0fef69fc9a
SHA25620eb1bf7eff06c9d94cda04795bab8cc48eab8ed99f895a323ae29fb3f7ea986
SHA51263a280d383dd1823951ba0e8ebe77068f2ad8b905d6dc00e09105e7ea0ac45db996294de7c0b884785b5ebf9974d526a1e6df6ffe53a4139082cfa5073f25f55