Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 13:29
Static task
static1
Behavioral task
behavioral1
Sample
beb10f385e9327773bbeeaa9dae34532_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
beb10f385e9327773bbeeaa9dae34532_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
beb10f385e9327773bbeeaa9dae34532_JaffaCakes118.html
-
Size
175KB
-
MD5
beb10f385e9327773bbeeaa9dae34532
-
SHA1
2faec1c7fa70c9af5a6f68208f8e66c2f5cc3963
-
SHA256
d6bb10a2d23845b4f7c62d030dd07b40e51b34445ad89aa410382ad282cdf9cf
-
SHA512
72cb4ae1e980efbe2b13ffe033753f03a7cc90747828504d7a6c2a10f66d1af84bedeb9c5fb21f5b420e3ae3bff11c4125f75d8c131e9a8be562dcbc147d99f6
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS3kGNkF1YfBCJisg+aeTH+WK/Lf1/hmnVSV:S4oT3k/FgBCJi6m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 1236 msedge.exe 1236 msedge.exe 3568 identity_helper.exe 3568 identity_helper.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1236 wrote to memory of 3620 1236 msedge.exe 84 PID 1236 wrote to memory of 3620 1236 msedge.exe 84 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4028 1236 msedge.exe 85 PID 1236 wrote to memory of 4124 1236 msedge.exe 86 PID 1236 wrote to memory of 4124 1236 msedge.exe 86 PID 1236 wrote to memory of 368 1236 msedge.exe 87 PID 1236 wrote to memory of 368 1236 msedge.exe 87 PID 1236 wrote to memory of 368 1236 msedge.exe 87 PID 1236 wrote to memory of 368 1236 msedge.exe 87 PID 1236 wrote to memory of 368 1236 msedge.exe 87 PID 1236 wrote to memory of 368 1236 msedge.exe 87 PID 1236 wrote to memory of 368 1236 msedge.exe 87 PID 1236 wrote to memory of 368 1236 msedge.exe 87 PID 1236 wrote to memory of 368 1236 msedge.exe 87 PID 1236 wrote to memory of 368 1236 msedge.exe 87 PID 1236 wrote to memory of 368 1236 msedge.exe 87 PID 1236 wrote to memory of 368 1236 msedge.exe 87 PID 1236 wrote to memory of 368 1236 msedge.exe 87 PID 1236 wrote to memory of 368 1236 msedge.exe 87 PID 1236 wrote to memory of 368 1236 msedge.exe 87 PID 1236 wrote to memory of 368 1236 msedge.exe 87 PID 1236 wrote to memory of 368 1236 msedge.exe 87 PID 1236 wrote to memory of 368 1236 msedge.exe 87 PID 1236 wrote to memory of 368 1236 msedge.exe 87 PID 1236 wrote to memory of 368 1236 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\beb10f385e9327773bbeeaa9dae34532_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3f7f46f8,0x7ffa3f7f4708,0x7ffa3f7f47182⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16567839121901389508,6047164231356112179,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,16567839121901389508,6047164231356112179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,16567839121901389508,6047164231356112179,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16567839121901389508,6047164231356112179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16567839121901389508,6047164231356112179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16567839121901389508,6047164231356112179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16567839121901389508,6047164231356112179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16567839121901389508,6047164231356112179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16567839121901389508,6047164231356112179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16567839121901389508,6047164231356112179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16567839121901389508,6047164231356112179,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,16567839121901389508,6047164231356112179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:82⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,16567839121901389508,6047164231356112179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16567839121901389508,6047164231356112179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16567839121901389508,6047164231356112179,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16567839121901389508,6047164231356112179,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:844
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD591a3fb92cb39d3e87d2a346915e8da2e
SHA159ac4c93f6351979ca0ec25cb4683a5cc38c0b0c
SHA2562f8763bca1a6855f6a0ecb09afb2cae0c237604e6cbbef0f392668294f983301
SHA512c80c9f9d2220323170b087df3579647c07302829ce760b84a9a42b82a80605f0be81775f566adc08e9ec54af11bf28b5eefabcc559061f9d4b5c6acc431ee5ac
-
Filesize
2KB
MD5188c025494e2f558f426491a56899bf9
SHA1446c5299b55ddb96e95ae45a9480b1cc8c66398b
SHA256a9b4bc9b4a0ebb4f310040ff0398b5fce799e877f1c2c4b592813bf67ab632f8
SHA5125a76d700564a955c60c0cd16966b0a99e5de5d6ce23fda5049fee5423e9032407ef14a687fe619fbb76ff82381c7f5da4d4461813ef2461476282a75af6f05b6
-
Filesize
2KB
MD5c180120764c1166faa5ed36a1370673f
SHA186ec6423589002086453b63e3f082f0616abf357
SHA256cbbcdbaf5ffa3f19facc604c26f2d7ba4bdbaf29852aec306b1885eac8476301
SHA51249adb1dac78dbb49af9a501108dbe077e4e20d9350d09671fd788c525e4102d364c319570cefa8d1f88f39d7a3ed8d6aff776ae49d3cda5506a28330a6bfcfdf
-
Filesize
5KB
MD54d9d7b6d3d8aa9bddec2d701e18f2907
SHA175d5afaf4c39a07a85ed8bcbd68e988442f4cbac
SHA256e1e2319969facd5e521815d96c53619eeb81642d923b2813cb2b5efa53a7eabb
SHA512b8b8bfcdd502cf639409b9ec8136434352ec9b743529442107d2b45802e3e110cfcbffd0b65ea6802c3a7465e491e3557f52684d456f8d24c5fbbc45487860ca
-
Filesize
7KB
MD5c20f726973ad3b32b5cec72052d9d91b
SHA124637357043dd22f4b4e0d791c6ace943724f5d3
SHA25618505b4040f563e49fb8bc10e1de16ef6346cfbfd885b8090f3dc4cccccb68c4
SHA5127e232dbb3fb1e3f29ffdd0ddcd6c912c8c6cb69bb608c8a7c976d5d8b2b51dfe158978f945dc67dc5b752a6a666fae0bac7aa480c80fa49e6ccca844333f8b7c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54fa55af4532a749daf91d77f0c6af855
SHA12a662502505181d345250fe90e3e5a4ace295ab7
SHA256601386f9e28cdf4d096b4039b0ca8362b6c57acd06da8b1998f6a2daf5841279
SHA512b952c960f8d14d63c09a4da22bed049e8a97642ad00902c0c09d45fec94eedd342d78a8b4639aee5b865825fd5cb72b31fe99baa84a5b82368d3e84ba4d92779