Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2024, 06:54
Static task
static1
Behavioral task
behavioral1
Sample
9a33b5976244124bfa3048ebadcf2b5a_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9a33b5976244124bfa3048ebadcf2b5a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9a33b5976244124bfa3048ebadcf2b5a_JaffaCakes118.html
-
Size
175KB
-
MD5
9a33b5976244124bfa3048ebadcf2b5a
-
SHA1
80abcc4154e69793f69288d395e48e1879abcad1
-
SHA256
451b183864508489720cb9758aa7c7094a2e0cc6ccd82e80c264472078845dc9
-
SHA512
3ca3fb1daba30cd8370d8f48bd2b79a24365ba519092384ddb951a15dd535c4e10dcc7cd01c875cde7b43883eebaaea29f8eb2eb59fe044bc4d6e3865784da8c
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3tGNkF0YfBCJisd0+aeTH+WK/Lf1/hmnV+:SOoT3t/FhBCJiEm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2628 msedge.exe 2628 msedge.exe 2724 msedge.exe 2724 msedge.exe 2444 identity_helper.exe 2444 identity_helper.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2464 2724 msedge.exe 81 PID 2724 wrote to memory of 2464 2724 msedge.exe 81 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2712 2724 msedge.exe 82 PID 2724 wrote to memory of 2628 2724 msedge.exe 83 PID 2724 wrote to memory of 2628 2724 msedge.exe 83 PID 2724 wrote to memory of 1676 2724 msedge.exe 84 PID 2724 wrote to memory of 1676 2724 msedge.exe 84 PID 2724 wrote to memory of 1676 2724 msedge.exe 84 PID 2724 wrote to memory of 1676 2724 msedge.exe 84 PID 2724 wrote to memory of 1676 2724 msedge.exe 84 PID 2724 wrote to memory of 1676 2724 msedge.exe 84 PID 2724 wrote to memory of 1676 2724 msedge.exe 84 PID 2724 wrote to memory of 1676 2724 msedge.exe 84 PID 2724 wrote to memory of 1676 2724 msedge.exe 84 PID 2724 wrote to memory of 1676 2724 msedge.exe 84 PID 2724 wrote to memory of 1676 2724 msedge.exe 84 PID 2724 wrote to memory of 1676 2724 msedge.exe 84 PID 2724 wrote to memory of 1676 2724 msedge.exe 84 PID 2724 wrote to memory of 1676 2724 msedge.exe 84 PID 2724 wrote to memory of 1676 2724 msedge.exe 84 PID 2724 wrote to memory of 1676 2724 msedge.exe 84 PID 2724 wrote to memory of 1676 2724 msedge.exe 84 PID 2724 wrote to memory of 1676 2724 msedge.exe 84 PID 2724 wrote to memory of 1676 2724 msedge.exe 84 PID 2724 wrote to memory of 1676 2724 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9a33b5976244124bfa3048ebadcf2b5a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff427246f8,0x7fff42724708,0x7fff427247182⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,12574638547142378275,9276881059464137499,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,12574638547142378275,9276881059464137499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,12574638547142378275,9276881059464137499,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12574638547142378275,9276881059464137499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12574638547142378275,9276881059464137499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12574638547142378275,9276881059464137499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12574638547142378275,9276881059464137499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12574638547142378275,9276881059464137499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:5688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12574638547142378275,9276881059464137499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:5800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,12574638547142378275,9276881059464137499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,12574638547142378275,9276881059464137499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12574638547142378275,9276881059464137499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12574638547142378275,9276881059464137499,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12574638547142378275,9276881059464137499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12574638547142378275,9276881059464137499,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2660 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,12574638547142378275,9276881059464137499,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD572a047f3a80cd1c3b1f26378ae7f87e9
SHA15808ce8902798229acd603b035c3598961d0ed8c
SHA2568ab9ebf671554254a45513f82b530d93b7321c2a63074fcda9e177659a823985
SHA5125cf6db13275caca0fc0325d25908408a77ac815ca6620b25d47be63d95022a5efcbb868802fc7b136c2e993d6e58ce6f7fd29b65ba7c5fc67da2456f637b57cb
-
Filesize
2KB
MD567c18d1015e187a206c2ec4ed09caa8e
SHA1d56cafc864215b99ae139d882f2341e4bbbab716
SHA256aaa0f8e7ad31f3498030af490b3306fb5f576eaa507d75f7c5d2804a55b4141f
SHA512a4fce875fae39a691d4476b3ecf27e01daacd3bed21f3d0c637c9f473207db92048ddcb1a0ff0827448176aacfaaba4b72d7eef3dfe34199723f978da94d2657
-
Filesize
2KB
MD5f8f2b8d9565ee51048b38aa4bdfd3704
SHA17e4de30e621a62709669b0b3f10bcb360e978e5d
SHA256f9c9a759f9439a14424e3508b5987d7e136be89910086684e511618521d2f776
SHA5122cb92558314071f2f2a14021fd056d18afdbfe26db264b453e8887bb8687873f2e49d7394a4d9c6b55928c34a6e8c307f1894560eee03ee357dc2036e0428bb1
-
Filesize
5KB
MD59f1142a6aa26f1942e767a0c4319515e
SHA103cbc987f1ee8a0579c485e5fdf24c9d01ffb27f
SHA25669627b7fcac133c70314d34d80f6c201324b1be62b7abc31b05d7ef8ad1d614d
SHA5121d29209faf739d0765ee18b6a566cadf0d5998c40ec9a1d3130b545c0894a5ad0248aa229ba92e27217e34b1894a2af22e2ab441669a6c9104e987415afbfc51
-
Filesize
7KB
MD5ad581c7211691b2089d23101035f42d4
SHA119c275506ac8110624820aa1f99546b45003c725
SHA256aaf70a77ae3ead593b29bda88916dc7d5a32f34a7e2ac7f614149ef018efcdc2
SHA512557aa10a8b8c2821a2138e8dec3d7e5792a4faf14b34a52eff5175df100f92e07f18dbfb3d9b74fdcddf9ebbe3d3047c45875d07e5efd6fa3d6354ecd1848c3c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD517898c8dc4b6b27371fdacbd48ff1f8d
SHA132398a068cefb4bb96bc903779f003533d79d052
SHA256b0532d6fe470f67118595257291e57dc51c2d0d1e91819a4598e60a5c865208e
SHA512ccdc7716de9896e3a571e8e722cd577592d4bedba5bb11c5302a167dcab7daf8fa4c884ebd9521a2667f8fa140f16d5d0fc1316485ca4fc547c13d9ce69a687b