Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
afbecd839c11dfbdc493b3a6d6013dd8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
afbecd839c11dfbdc493b3a6d6013dd8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
afbecd839c11dfbdc493b3a6d6013dd8_JaffaCakes118.html
-
Size
64KB
-
MD5
afbecd839c11dfbdc493b3a6d6013dd8
-
SHA1
09dfafb394524b9390d7b3f8cce3a957c1731a5a
-
SHA256
aae41649e8f4c5679fc5c11814358a9ec8976f364600b2065aea5f14c268bc23
-
SHA512
30ad448cdd4dd8d5be171ee5718c27ea67fee5460b6a0fdf8dac8f55fabd299c45314306a4527af6a1bbcc27ad8ceb5d950f7de1c6546c195763ada48c2fb1d0
-
SSDEEP
1536:EV6wP3wIrn0nCpGUCvA695q5XtLHCMX+o41XVDJ1qhUHGZurlOaL5EWXFK8s9DAU:A603w6gCpGUAA695q5XteMXKXK8s9DGo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 4756 msedge.exe 4756 msedge.exe 3032 identity_helper.exe 3032 identity_helper.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4756 wrote to memory of 4260 4756 msedge.exe 86 PID 4756 wrote to memory of 4260 4756 msedge.exe 86 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 3996 4756 msedge.exe 87 PID 4756 wrote to memory of 1840 4756 msedge.exe 88 PID 4756 wrote to memory of 1840 4756 msedge.exe 88 PID 4756 wrote to memory of 2844 4756 msedge.exe 89 PID 4756 wrote to memory of 2844 4756 msedge.exe 89 PID 4756 wrote to memory of 2844 4756 msedge.exe 89 PID 4756 wrote to memory of 2844 4756 msedge.exe 89 PID 4756 wrote to memory of 2844 4756 msedge.exe 89 PID 4756 wrote to memory of 2844 4756 msedge.exe 89 PID 4756 wrote to memory of 2844 4756 msedge.exe 89 PID 4756 wrote to memory of 2844 4756 msedge.exe 89 PID 4756 wrote to memory of 2844 4756 msedge.exe 89 PID 4756 wrote to memory of 2844 4756 msedge.exe 89 PID 4756 wrote to memory of 2844 4756 msedge.exe 89 PID 4756 wrote to memory of 2844 4756 msedge.exe 89 PID 4756 wrote to memory of 2844 4756 msedge.exe 89 PID 4756 wrote to memory of 2844 4756 msedge.exe 89 PID 4756 wrote to memory of 2844 4756 msedge.exe 89 PID 4756 wrote to memory of 2844 4756 msedge.exe 89 PID 4756 wrote to memory of 2844 4756 msedge.exe 89 PID 4756 wrote to memory of 2844 4756 msedge.exe 89 PID 4756 wrote to memory of 2844 4756 msedge.exe 89 PID 4756 wrote to memory of 2844 4756 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\afbecd839c11dfbdc493b3a6d6013dd8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcdd6546f8,0x7ffcdd654708,0x7ffcdd6547182⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,17681032087785511514,13224230264616293869,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,17681032087785511514,13224230264616293869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,17681032087785511514,13224230264616293869,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17681032087785511514,13224230264616293869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17681032087785511514,13224230264616293869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17681032087785511514,13224230264616293869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17681032087785511514,13224230264616293869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17681032087785511514,13224230264616293869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17681032087785511514,13224230264616293869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,17681032087785511514,13224230264616293869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,17681032087785511514,13224230264616293869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17681032087785511514,13224230264616293869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17681032087785511514,13224230264616293869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17681032087785511514,13224230264616293869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17681032087785511514,13224230264616293869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,17681032087785511514,13224230264616293869,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5fe89066110380c195b039b2cc5ec27d8
SHA14ef7c4554e818cd16dfa45dc4641384fd1d89757
SHA256b5cadd7ce71cb6b47010b37c2a29c75422787c0249b0c639d7ed407950fac6eb
SHA5120c4bd7c0173378866a8a5b5177c97a807923ac865a73021d9ae436cfb98d42fb0d6973e01cc16d1ba8d60c2100f545d5d62cbb9ef1c2f65bdfc13c8ab2ac4bb3
-
Filesize
3KB
MD589b1a93ac8441747c599327c59d349bd
SHA179832febffb4f91123c8a37ec0b0f88b0bc69f28
SHA256c65af7c083c5a5197889ab8b08e7ad1c2f5caf6884cb8baa9cc3f9561dbbf97e
SHA512ddf4eb8416b02474c254b2e9362457846055fec81442aa48d526a2a78a38a11718cad4ac23ed8f8be1672814af5d8aacf8c54533c05ab7b841ed00171374b6c9
-
Filesize
6KB
MD5e792e586cea16cd29d59413f0d864536
SHA1aef08cf77c4bded5524582d0f1330e50fb20273f
SHA25612fe522463dbbc6590b98bb84a84998e8f9d7aaaea8892c9f15bc2dde45c9a78
SHA512695b1f786143c103646251a43d2a88c6be57c9fe8872e4eb41e27523e3e3cc3473fafdc1881b240479ff347683213576d8ea97421236e1eeba1552f3429c40ab
-
Filesize
7KB
MD57adb60a3c67327ce4a236b70b386dc8b
SHA1759bd0d15e9e92da731e14887deb67d34c30c86d
SHA256eac04ba47aad0b66a74a97c6a7df06917ee1289f9495551bc9ea4878356ce4df
SHA51277bcafe96af9f87e28f703a449897e9342209d64ef49279c0c70f7129b5e7c5eba65e5cc09d2bce28184589f7fe9f161ef797799715043948d5bf817a328618b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f42aa1e7-01eb-4b3e-89cf-112f1640388c.tmp
Filesize5KB
MD514102cb79a8def90933dd1e3a4822b34
SHA117f4d740aeda213986a640dc1e9c7cd24687095d
SHA256eb21725a350620753784ca69ffaca5cf1cea14604687a62f48e83cb8fd7963db
SHA512c881205abd78129f19d9d227ca11dffcad3c3431e78e688ac359b6bbb1506db88978e03f41c8cc8fd27276b7535a7fe2aec706837d37f517fc965d49525cedd5
-
Filesize
10KB
MD57d388e74ee222ed6f1f4fa307148cef8
SHA138ef115b81c3571945077209cd20189ce7753bb0
SHA256c71d93b26a211f361f9ab327a02dd7fdd0aec23df6ca96bcd39b44562922e74b
SHA512c792f98a4f8882d7b7a2719e9e35aae556f4bb87a0a6a6b0dcfde63cd9b8b62096c819adb70bb47c84d3e037fde4aa18bb91bdd8e81670cdce0a76b4fc3ce293