Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 05:47
Static task
static1
Behavioral task
behavioral1
Sample
37ecbf6496c8648967f67da3924c6f0f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
37ecbf6496c8648967f67da3924c6f0f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
37ecbf6496c8648967f67da3924c6f0f_JaffaCakes118.html
-
Size
106KB
-
MD5
37ecbf6496c8648967f67da3924c6f0f
-
SHA1
e37377455f12fbb77dd3e06e2da79fc8c28143fc
-
SHA256
9931953c585a2c86139957a1f1824f3bcc09787cb5f29a1c7241e1e45a1cf94f
-
SHA512
b7d767c475f81727eed5be268276e4eda09e3ac38fb6a3cf0e9f01bd3e760bb27315e8844f9292d1eac210042c6a94b4a48a2c031360c20b9524c7b0f3ce6a98
-
SSDEEP
768:p5JEXtHEEsCgOr295ufDnDD9BVZfkHHjqEEpfF7wsG+w+iyQ:p5JE9HEEsCjLnDD9BVZfkjGf5w4w+in
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 3656 msedge.exe 3656 msedge.exe 4720 identity_helper.exe 4720 identity_helper.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3656 wrote to memory of 216 3656 msedge.exe 83 PID 3656 wrote to memory of 216 3656 msedge.exe 83 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 4344 3656 msedge.exe 84 PID 3656 wrote to memory of 1648 3656 msedge.exe 85 PID 3656 wrote to memory of 1648 3656 msedge.exe 85 PID 3656 wrote to memory of 656 3656 msedge.exe 86 PID 3656 wrote to memory of 656 3656 msedge.exe 86 PID 3656 wrote to memory of 656 3656 msedge.exe 86 PID 3656 wrote to memory of 656 3656 msedge.exe 86 PID 3656 wrote to memory of 656 3656 msedge.exe 86 PID 3656 wrote to memory of 656 3656 msedge.exe 86 PID 3656 wrote to memory of 656 3656 msedge.exe 86 PID 3656 wrote to memory of 656 3656 msedge.exe 86 PID 3656 wrote to memory of 656 3656 msedge.exe 86 PID 3656 wrote to memory of 656 3656 msedge.exe 86 PID 3656 wrote to memory of 656 3656 msedge.exe 86 PID 3656 wrote to memory of 656 3656 msedge.exe 86 PID 3656 wrote to memory of 656 3656 msedge.exe 86 PID 3656 wrote to memory of 656 3656 msedge.exe 86 PID 3656 wrote to memory of 656 3656 msedge.exe 86 PID 3656 wrote to memory of 656 3656 msedge.exe 86 PID 3656 wrote to memory of 656 3656 msedge.exe 86 PID 3656 wrote to memory of 656 3656 msedge.exe 86 PID 3656 wrote to memory of 656 3656 msedge.exe 86 PID 3656 wrote to memory of 656 3656 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\37ecbf6496c8648967f67da3924c6f0f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab2ef46f8,0x7ffab2ef4708,0x7ffab2ef47182⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,3851246018748053164,14401198079960019580,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1988 /prefetch:22⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1960,3851246018748053164,14401198079960019580,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1960,3851246018748053164,14401198079960019580,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3851246018748053164,14401198079960019580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3851246018748053164,14401198079960019580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3851246018748053164,14401198079960019580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3851246018748053164,14401198079960019580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3851246018748053164,14401198079960019580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,3851246018748053164,14401198079960019580,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7160 /prefetch:82⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,3851246018748053164,14401198079960019580,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3851246018748053164,14401198079960019580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3851246018748053164,14401198079960019580,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3851246018748053164,14401198079960019580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1760 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3851246018748053164,14401198079960019580,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6972 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,3851246018748053164,14401198079960019580,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:756
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5161ab674dbf6246c30153209536f6bb5
SHA104847d9418943f942a1edd30031657c46ac856ec
SHA256b7321bf4c1a3bbd693052977b766da8e5885308174f04d962e4dfe657f551bd9
SHA5128b5c55877de7db808f444ded1c590d2a403cab747e5ef14f8fb602d37eabcf6092cd91c784430cdba21c8c1e0d2389b13f227312602524c04efce26854dabcbc
-
Filesize
1KB
MD54e99ec507dd1727511b245cae6481158
SHA10d903ca37aad77adbc53b5f336aca0d0522273aa
SHA256c2fa4dd3ccb2d452b4664c61c55dc35dfe0e1c726168306b295a6aa7eac76efd
SHA5120cee6672d15965c5034d90b25940960ed523b7c75e4ecf64b1a1514263b080430cd8f46a192bc69e87973639b127ef0919408fadb40520c91e1f393bdcf982e3
-
Filesize
1KB
MD5e5b04ec9ec1290d3b377fa432a2eb166
SHA1dc96702381ba5dbfe7a7517ba2bbb864197c1132
SHA25662e576cec6a65e632531f58c2f75f927321bdb130fbc0cf462703ad903a8dded
SHA512851ea8e3f168a499fff7304ceeb5823e876c1cecfca7d4cd059bb3ac1a1ede4b37c4389483231b9fa1f22da81ed3dc43c284472de004f536f010cb3a58e45227
-
Filesize
7KB
MD582c515779e39354f0862dcd5a69dcc82
SHA1c3cc2114949a8cce0fbaf50194d5b3a4eee73fcc
SHA25699b5fad12af659eaf05c28c917b59d7c4971f72b6755a7271028728651c9a207
SHA512c8ca58bf8a2e755797e28bcb26ee86d3867de5eca965668e73595ef1a782160391389bc6ea59585e4bd19a761f5f63ecc095640349a4273a901ec9efda0a030b
-
Filesize
6KB
MD5a61fd9d6ca4d6a3e394ed3fa4ffebba4
SHA1f4659a87b76e28500359af6b74fb6b9e966b9baa
SHA25669681257ddf10e1d215cbc73262c4e45a95d353314b7efd2c17e5d128d61d786
SHA5128650f3af3b33daeb145132d1180166085729d4ee211aec8e714ff5fd0eff19d22fee9379469e4a651a90a979bd161d49ace1289c631ec49a6f0fbfbc6b76c0a0
-
Filesize
1KB
MD5295a6ad265dece24ac6d657ccb2012e4
SHA1ad11bf747770c1124120ab188f05af03554cbfa2
SHA25671880c2e600932256c21f35d220b5c3d271a20ee7a329cda908179e081dc59e6
SHA5127b7837150679e04ee08d8e5784dac05496ed7b17a85f941b7da540ba0e99fc81679748b757eaa2251bfadebbcda26e51f227b566ea6162b3aadcc8b96566d797
-
Filesize
1KB
MD54588281e380a39d9683aecf108962e4c
SHA18deabfb7c95a08dfa24af75140b507a48a50742e
SHA256319f42ea1f691a64238a6b0ddb36c9b812a133a95f259ca175d2822158c60ca2
SHA512e6c2c467abe28025ff5e8cfeb2b54b498a3848f7158df5b5cbdaeabcdb22938033a8bf5462db2881e4269bedac6f85032de006d58685e3fe4bd9f180655e3e52
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e7c26f7cb4dfd0481787ea01736b4b2c
SHA1a07b8affc638856bac64e1bf6e6ef78d5b9f34db
SHA256a9e62bb7f1481c68d186fc80f9988f26d4f6dad58ad7345aaa734d8d6fdde041
SHA512526cef0ba54593c88c6416a24c4bbea617557835d19ae611f6174e7efa86b8e0960204aef3e59f94992e9ca72bc2d4c020824c325cf79530d6b4f223ce65d65c