Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
81ca504a13a029db2a91f8e39a2d02dc_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81ca504a13a029db2a91f8e39a2d02dc_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81ca504a13a029db2a91f8e39a2d02dc_JaffaCakes118.html
-
Size
3KB
-
MD5
81ca504a13a029db2a91f8e39a2d02dc
-
SHA1
c9c9550a0f3cb1426a31cab4018650b22030ab9b
-
SHA256
f9eb5ca73f9e5ead6d40ce3d1e392391c9129e5ebc8088282b216c05c2e47251
-
SHA512
f7aac7e4209cfd79c0ca2174b6281808334c0be400809c3ae95fad70fe92138fa31f56331c40000f57ea44ba0e53d9bc43d34469e8cb2d9cb1dda3677c669a63
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 2828 msedge.exe 2828 msedge.exe 3404 identity_helper.exe 3404 identity_helper.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2300 2828 msedge.exe 85 PID 2828 wrote to memory of 2300 2828 msedge.exe 85 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4700 2828 msedge.exe 86 PID 2828 wrote to memory of 4548 2828 msedge.exe 87 PID 2828 wrote to memory of 4548 2828 msedge.exe 87 PID 2828 wrote to memory of 4756 2828 msedge.exe 88 PID 2828 wrote to memory of 4756 2828 msedge.exe 88 PID 2828 wrote to memory of 4756 2828 msedge.exe 88 PID 2828 wrote to memory of 4756 2828 msedge.exe 88 PID 2828 wrote to memory of 4756 2828 msedge.exe 88 PID 2828 wrote to memory of 4756 2828 msedge.exe 88 PID 2828 wrote to memory of 4756 2828 msedge.exe 88 PID 2828 wrote to memory of 4756 2828 msedge.exe 88 PID 2828 wrote to memory of 4756 2828 msedge.exe 88 PID 2828 wrote to memory of 4756 2828 msedge.exe 88 PID 2828 wrote to memory of 4756 2828 msedge.exe 88 PID 2828 wrote to memory of 4756 2828 msedge.exe 88 PID 2828 wrote to memory of 4756 2828 msedge.exe 88 PID 2828 wrote to memory of 4756 2828 msedge.exe 88 PID 2828 wrote to memory of 4756 2828 msedge.exe 88 PID 2828 wrote to memory of 4756 2828 msedge.exe 88 PID 2828 wrote to memory of 4756 2828 msedge.exe 88 PID 2828 wrote to memory of 4756 2828 msedge.exe 88 PID 2828 wrote to memory of 4756 2828 msedge.exe 88 PID 2828 wrote to memory of 4756 2828 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\81ca504a13a029db2a91f8e39a2d02dc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1ac146f8,0x7fff1ac14708,0x7fff1ac147182⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,5911373055080303792,5756758705767465508,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,5911373055080303792,5756758705767465508,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,5911373055080303792,5756758705767465508,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5911373055080303792,5756758705767465508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5911373055080303792,5756758705767465508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5911373055080303792,5756758705767465508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5911373055080303792,5756758705767465508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5911373055080303792,5756758705767465508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5911373055080303792,5756758705767465508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,5911373055080303792,5756758705767465508,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,5911373055080303792,5756758705767465508,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5911373055080303792,5756758705767465508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5911373055080303792,5756758705767465508,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5911373055080303792,5756758705767465508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5911373055080303792,5756758705767465508,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6192 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,5911373055080303792,5756758705767465508,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2324
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50dc31145339977b457eec605c4e1a567
SHA1deb6ff8183afdaafd849858c821af52f93936e1c
SHA2564b1ef876e1d4f2c9726b7b966222c336d0be026c588178ad40ab476be4d353ec
SHA512ef095404247530ade966bae7d6920f0ff060852e3dfb545f4bbca384f88d0e2a4622b55e4b856ab63f6e6c56196a8ad1257711b53a2fcdd89962d1252b6c4e17
-
Filesize
152B
MD531f5155eeaa8631c1c80614efb4e73cd
SHA1aac054ba3a9bd71bb2644cc541aad11a5f119017
SHA2567e0833f04bdc7ed7a88940d793f110d199368d7c2ca55eabb154de84a355d7cf
SHA51294c43c4e59ae3745fee5157852c279110de2f89dd1562c47627ef960a70790db0b713155817ac7ac636e43f0218f73d35c915f9de61df019ba65c09730a21452
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD574780b9cf12b7cbb06b18fef0f67d333
SHA148e437f8aeb3cd87537b71ac4d7e3975c25c33b0
SHA2568314b933dff042b87da3f0ac688aa84fb1b9d7ddfffd8a1ef88e4d2f42ff666b
SHA512c0d442e1d31e15e11a1584dfe1caac6310e8a549e060907c3674e057a8e14e4d6035821853ae7b64ea07d627a992e7360f842550d9c9a17d8cd0704310431868
-
Filesize
1015B
MD5f82d1219952cc6c3a1104b5961c4dc94
SHA1c4d9ebf9c3b1032f9752c87cee69cd97bc8cfff0
SHA256ee6ebc0d38319d71e36a981376d49035c2ea2fb1c78e90002b5f12603c9db2e7
SHA512551bb0db26f556c01319bc3791d8b7167f5eeed45699d7e750810f736af3a64942d1c0124917c2964398fb7d8616a00c01470611727f3ea7fbfbe8a2cbfc7d06
-
Filesize
6KB
MD5963bc47287cfdf212593dde332cbb1a7
SHA1706aadcca7d36e868ce9596ca8eb337328c132ae
SHA256a122dc062313025010b8f319948799ec8a469df11df1277425c8adf972ea932d
SHA512df7b0213afcbd260b20810cc394e4fabf17655be5d050b4af0b3669d4914a5c51089101b3e59c42bafcf1a9b6a255a653fa5ba8d96565578eb203b0301d2dd59
-
Filesize
6KB
MD5ea0219ed291ba8ff97e99935769cdec1
SHA1667022a971532cee78966968e3e6c71db7a2ef85
SHA256a6c9e5069955bb1b9256aef1ec3a172d7119d6f30f4e07bc0d80db646ad9b97b
SHA5125a88b0e9a6448fd61d249cc1ad5c84981edc84d3061ad1c94facf27398ab714c63f39b310da00f63a81ca33becab1fab2e05b0007494be193a50d92db2255a43
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD51ec65805426a6c879a350c6277af48b8
SHA1d1b1304e56ea1babf38edabd046984358aac4b08
SHA25604ac6fee732dc3379492815729736876fb492c13541da4fc71b50393e2eb8cfb
SHA512e5d5157e341cd3cab22842e05355686e9d7257840977be6ed7c64ffcdd1c5f588b8c5c20495f2dbab1835818e53ac1866d8dac8ece68c7585fd4eeba3458b263