Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 07:19
Static task
static1
Behavioral task
behavioral1
Sample
19421044181460a7f73fcca9b0f990c2_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
19421044181460a7f73fcca9b0f990c2_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
19421044181460a7f73fcca9b0f990c2_JaffaCakes118.html
-
Size
108KB
-
MD5
19421044181460a7f73fcca9b0f990c2
-
SHA1
e6c78d3e8f51cab11d39344790197c02249abc6a
-
SHA256
ce93111cf2b6e816b3bcec76fba899a1bc165472cbb2b82a39764e9319cc3279
-
SHA512
b0accf140ae0ad8264d4aa803771258d97f3b173e8828f8f07d2cb90fcd0c73f4512caf78623a0bcf84deabb185fe9acd771f37a51e9ac2a7a1d4db4183c5296
-
SSDEEP
3072:g3k8zB4armwQULt+qR8poQItytVJBp8o+Xg9eUQtWuVRCZGj5oT/QiJhKtbThu6U:MzB4armwQULt+c8poQItytV3pJ+Xg9eq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 2484 msedge.exe 2484 msedge.exe 2656 identity_helper.exe 2656 identity_helper.exe 6000 msedge.exe 6000 msedge.exe 6000 msedge.exe 6000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2484 wrote to memory of 3936 2484 msedge.exe 82 PID 2484 wrote to memory of 3936 2484 msedge.exe 82 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 1356 2484 msedge.exe 83 PID 2484 wrote to memory of 3488 2484 msedge.exe 84 PID 2484 wrote to memory of 3488 2484 msedge.exe 84 PID 2484 wrote to memory of 808 2484 msedge.exe 85 PID 2484 wrote to memory of 808 2484 msedge.exe 85 PID 2484 wrote to memory of 808 2484 msedge.exe 85 PID 2484 wrote to memory of 808 2484 msedge.exe 85 PID 2484 wrote to memory of 808 2484 msedge.exe 85 PID 2484 wrote to memory of 808 2484 msedge.exe 85 PID 2484 wrote to memory of 808 2484 msedge.exe 85 PID 2484 wrote to memory of 808 2484 msedge.exe 85 PID 2484 wrote to memory of 808 2484 msedge.exe 85 PID 2484 wrote to memory of 808 2484 msedge.exe 85 PID 2484 wrote to memory of 808 2484 msedge.exe 85 PID 2484 wrote to memory of 808 2484 msedge.exe 85 PID 2484 wrote to memory of 808 2484 msedge.exe 85 PID 2484 wrote to memory of 808 2484 msedge.exe 85 PID 2484 wrote to memory of 808 2484 msedge.exe 85 PID 2484 wrote to memory of 808 2484 msedge.exe 85 PID 2484 wrote to memory of 808 2484 msedge.exe 85 PID 2484 wrote to memory of 808 2484 msedge.exe 85 PID 2484 wrote to memory of 808 2484 msedge.exe 85 PID 2484 wrote to memory of 808 2484 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\19421044181460a7f73fcca9b0f990c2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef34646f8,0x7ffef3464708,0x7ffef34647182⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,301792638516350141,12695963683836567806,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,301792638516350141,12695963683836567806,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,301792638516350141,12695963683836567806,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,301792638516350141,12695963683836567806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,301792638516350141,12695963683836567806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,301792638516350141,12695963683836567806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,301792638516350141,12695963683836567806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,301792638516350141,12695963683836567806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,301792638516350141,12695963683836567806,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:82⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,301792638516350141,12695963683836567806,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,301792638516350141,12695963683836567806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,301792638516350141,12695963683836567806,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,301792638516350141,12695963683836567806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:5284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,301792638516350141,12695963683836567806,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,301792638516350141,12695963683836567806,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5eb9d38f7bab6556b996ddd0a87c856c2
SHA155d99831ef47027afe14cb96fda714b767148b33
SHA2564af81c2f1d116adbf8e2fe1e79d598a7ea2c7489626a4c5db0659f79cce7b510
SHA5127e6ed9253587b11c0336238026798a64c548ec5ae7105240690be9d4c562e7ae271e9db84e30d867639e979c86b4d2e54543a5f19623a79d29d88fcd50b41ced
-
Filesize
1KB
MD53090cfcdc191aff36a367fdd5136e2f5
SHA1e3037b0b73f1aa2afbc7c35b213d7734f394ae58
SHA25669c5033e47ee280bccccb983f397671d44ceab3f5ffbd1a5384a79e15e0e83b8
SHA51271b1e67f78213cd07af1c7619df83666567b79c4d9dacccd69ca65080590d5d5ba8db12c07cc38514c9bfc3923515384ef335641725e7ca01e39905f061794cb
-
Filesize
5KB
MD5d5f1df1f26ff8548251ef43ffbcadc46
SHA15c6b09a0e7ba5252fa781e027644a4829bdf3f7b
SHA256e7919d4ff62d605979f3701e088fbd4b4653855447a07843c61f18608c696fdf
SHA512dcc625ef2fa5c4884c7b45abed21f47feb5a58d4b05a95b8579d0171aee0577664516c1762625aa6cb09b1401d74cff7445443acd7cce6b821fc3913210f48a5
-
Filesize
6KB
MD50fc54db59594425dabb4ef1412e0ff10
SHA1ac88449554abb9b942d45b06487ad857654d5fe2
SHA256ba96bedd5a731802b91071b6a9ebb25820d17d155bee1995a4dca9695b62f944
SHA5123b00a35c97c85964524d54cdce1489b08d29bb2b7116af5493d4677e7350b999de98f994afcb0fab7c2fd6812196e98af1cce3c4a9e2d2b83101992b0e9cd981
-
Filesize
7KB
MD5f1c604961f828c1d89074a17aa231a9b
SHA1aa05c7b4411c5a5cb3243340de065e395d394093
SHA256082b0bdd30b0de20144af3f9c471965d841a8decd4e3532a3d58e984d20f3e0c
SHA512e8dba1b01e99c79e9edd8b0d432fc3792367fc91ea76047ab5e04f363679acbaeb15ccf2a4b3220a684aef16149f9ca958fd58d409dbbe9707878efc23383394
-
Filesize
538B
MD5f7ef5655a66007eb11a09f617e0797db
SHA183ab62033f78a3a42f016eeec690ae5715b0c268
SHA256bb0236cb9a69508339c87d8d9aaf8cc1e7c28ff2d8ddb07f997880475d8c56b9
SHA5123d2dd505e78a02cd0d4e7c7a5f9d659815b905c34d92f2e2c8b808528342a66b113b5c9d73111ffd9f8883ce6a0037f0a3144f6a9ffdf15e0bc951289d82ae8e
-
Filesize
203B
MD52f2fdc95cb7b6f2f397172d2dfc39d80
SHA1be4d2fecad1ec262623f641397b0066effab5067
SHA2569e5ad4faf2c4ece0a5d2c6cd3c78f2c422dbde24d407523a015a8a714ed99897
SHA512f094e1010827ad7c4e5896702cd35e998ba413a001e344d0de5483c94f5d913a395e57a74b4896457405eba84a52520101c9ee93c431e41f83200d3270825f7c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51aacd576497b86ae523424cff34aef5c
SHA1eae7e9520c1fadba85ce485d42836bfdba215054
SHA2562ed6deacd534e90affe283150dbc26dd5ab2e1f1d7f9ffc62c89eee4fddb3771
SHA5120cd9686dddc46a73a1d638f3a79785212b7409c84d7570793f9a8b73cdaac486e0421490bac93fb2a9498c8391d49bdc8d6a84a6e9dadef7e29ff33e4e341cec