Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
d5d2d3ad1b2e58b1ef99878df5dfbfd6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5d2d3ad1b2e58b1ef99878df5dfbfd6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5d2d3ad1b2e58b1ef99878df5dfbfd6_JaffaCakes118.html
-
Size
175KB
-
MD5
d5d2d3ad1b2e58b1ef99878df5dfbfd6
-
SHA1
c1ace5531d85f02ff87186e5b3aa0e6033761574
-
SHA256
a8219fbfc2da2a1700365775ab280df26c588d8e5e2fee364ef33055385e2944
-
SHA512
cd9a9b4423e7a214c203fc82069f1d5920bdccaf67c5cda6768c8f789ab439591bbff531f3a5805acd8658d61697cbf6d8768a07d58ffdf3c21dad1d952cfcaf
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3aGNkFvYfBCJiZq+aeTH+WK/Lf1/hpnVSV:SHCT3a/FOBCJiJB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 2104 msedge.exe 2104 msedge.exe 4644 identity_helper.exe 4644 identity_helper.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2132 2104 msedge.exe 83 PID 2104 wrote to memory of 2132 2104 msedge.exe 83 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2928 2104 msedge.exe 84 PID 2104 wrote to memory of 2360 2104 msedge.exe 85 PID 2104 wrote to memory of 2360 2104 msedge.exe 85 PID 2104 wrote to memory of 904 2104 msedge.exe 86 PID 2104 wrote to memory of 904 2104 msedge.exe 86 PID 2104 wrote to memory of 904 2104 msedge.exe 86 PID 2104 wrote to memory of 904 2104 msedge.exe 86 PID 2104 wrote to memory of 904 2104 msedge.exe 86 PID 2104 wrote to memory of 904 2104 msedge.exe 86 PID 2104 wrote to memory of 904 2104 msedge.exe 86 PID 2104 wrote to memory of 904 2104 msedge.exe 86 PID 2104 wrote to memory of 904 2104 msedge.exe 86 PID 2104 wrote to memory of 904 2104 msedge.exe 86 PID 2104 wrote to memory of 904 2104 msedge.exe 86 PID 2104 wrote to memory of 904 2104 msedge.exe 86 PID 2104 wrote to memory of 904 2104 msedge.exe 86 PID 2104 wrote to memory of 904 2104 msedge.exe 86 PID 2104 wrote to memory of 904 2104 msedge.exe 86 PID 2104 wrote to memory of 904 2104 msedge.exe 86 PID 2104 wrote to memory of 904 2104 msedge.exe 86 PID 2104 wrote to memory of 904 2104 msedge.exe 86 PID 2104 wrote to memory of 904 2104 msedge.exe 86 PID 2104 wrote to memory of 904 2104 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d5d2d3ad1b2e58b1ef99878df5dfbfd6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd956346f8,0x7ffd95634708,0x7ffd956347182⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,6456296880202346273,13515639470189089716,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,6456296880202346273,13515639470189089716,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,6456296880202346273,13515639470189089716,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6456296880202346273,13515639470189089716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6456296880202346273,13515639470189089716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6456296880202346273,13515639470189089716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6456296880202346273,13515639470189089716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6456296880202346273,13515639470189089716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6456296880202346273,13515639470189089716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,6456296880202346273,13515639470189089716,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,6456296880202346273,13515639470189089716,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6456296880202346273,13515639470189089716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6456296880202346273,13515639470189089716,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6456296880202346273,13515639470189089716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6456296880202346273,13515639470189089716,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,6456296880202346273,13515639470189089716,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5274804d4e8856e7d8acacf7a1fc3b3eb
SHA10cf89c0064981d042dfe49c415b1174afe761072
SHA2564b365540d5ce6eb5414c2c1fba5519e95cb75478d578fd228e3d37709e52a4f6
SHA5128ee2966a457ef12246843b4b6a2c9aafea4485c001e7289d2f6cffbe0482d6feb51e422ef229567af06649693f0b106deb280667f8581b414770a7fd12cd19e2
-
Filesize
2KB
MD5a17fa38f8b3b2e9e017158345c34cbcc
SHA183be6144dd5072711fef7e2fec8dba4fa7dce693
SHA256e41c61f0e5bf6efd9f7d7f9fa948663f28d5d9f2703d9f93e1121a49090c7883
SHA512becfc10057ff8e132b5130e43be9e1f383989dd4773795b00769ecc4c610963cb89a02776cee073706d42e9de693a92d24f9c473ab03f583ef6ccb77456e2b9f
-
Filesize
2KB
MD55c9bbfd441099018b558a587a46984f3
SHA1fcf35de3c4aebbdac11ec49d4b3032ee2bbf944d
SHA256169584047dfb99a3227ea5d003671a80e4ca2cc32375427e5586a83ba762e641
SHA51270168624a29e59dad2b16634a0e5d6dd19f711889968673a59a011177af4d818da7a1f127e41f792db45570fe6a2a45f7fc82640b1512c3e8f624436e0699180
-
Filesize
5KB
MD5acdbf645ba47d6ab1c82179a5e306655
SHA18f5225c2bcd42dbb78a5675b5dc96184a57a8f8b
SHA256593dbdce063afe30cc4ace5b9a28ac78b32cc9905352fe61e8475f0405c1af9d
SHA5120945feeced82e28874212bc4a18b7e74367114870ec0e8ef037d60d2c79d7e2c36551c6e5a1c56cb9e0989662e866ecd7227fa3885c38cd52e04511e851243e9
-
Filesize
7KB
MD52d42cb53f83ea308f9914bd3a15d0d8b
SHA18461ebf9826d038fde6131676e7492a15b7415d5
SHA2569a14e4cae225d86f0d68258dbeb484d178fa2bf59ca5b23277428b9c2461763b
SHA512734ae4d976a875f915de48bf67c9cc669f9ee1441447313b38b735a6a89bc7f6e4dc89d7e3ffb5cbe673161543daa8cc68f583e32c2f5f5e6d68d6c1c3566944
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD585ed78ed6e83381e98d06c4e5789b43d
SHA150cc4a0500d80fe09dedd09a83ac36b0fc6dbb78
SHA256f49c571cac8ccf4cbb4e7a641c865d9007e7759453b582a5f0538d4d43c95124
SHA512ac17841c1169d1a75d1d342064ce8ee7b8dfd48eb2d8239722bcf776b91b47d15458b8dd9b8bf0a60c3e021eec81dc17bca54818dcac2f52342d223596bc8c70