Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 19:41
Static task
static1
Behavioral task
behavioral1
Sample
dcecf4ba5efe5beab3e1cf568dd70eb0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcecf4ba5efe5beab3e1cf568dd70eb0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcecf4ba5efe5beab3e1cf568dd70eb0_JaffaCakes118.html
-
Size
175KB
-
MD5
dcecf4ba5efe5beab3e1cf568dd70eb0
-
SHA1
b83a5d9b8c2e27d35c04006e0983ec7910035cfb
-
SHA256
003ab9296badfe85aa998eca6c736e42b7f18c57ab255cc9f1977fa14dcfac2d
-
SHA512
8824f0277c81405e561a75f3c21e22d5f6f404d2f287db64fef31f79726f4b16a9357d3609f690c07f027d2fded78c6f0af624085d349903361affe905c0aff9
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3XGNkFfdYfBCJiZK+aeTH+WK/Lf1/hpnV+:SHCT3X/FQBCJiJB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3952 msedge.exe 3952 msedge.exe 2292 msedge.exe 2292 msedge.exe 1276 identity_helper.exe 1276 identity_helper.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2580 2292 msedge.exe 83 PID 2292 wrote to memory of 2580 2292 msedge.exe 83 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 4964 2292 msedge.exe 84 PID 2292 wrote to memory of 3952 2292 msedge.exe 85 PID 2292 wrote to memory of 3952 2292 msedge.exe 85 PID 2292 wrote to memory of 1876 2292 msedge.exe 86 PID 2292 wrote to memory of 1876 2292 msedge.exe 86 PID 2292 wrote to memory of 1876 2292 msedge.exe 86 PID 2292 wrote to memory of 1876 2292 msedge.exe 86 PID 2292 wrote to memory of 1876 2292 msedge.exe 86 PID 2292 wrote to memory of 1876 2292 msedge.exe 86 PID 2292 wrote to memory of 1876 2292 msedge.exe 86 PID 2292 wrote to memory of 1876 2292 msedge.exe 86 PID 2292 wrote to memory of 1876 2292 msedge.exe 86 PID 2292 wrote to memory of 1876 2292 msedge.exe 86 PID 2292 wrote to memory of 1876 2292 msedge.exe 86 PID 2292 wrote to memory of 1876 2292 msedge.exe 86 PID 2292 wrote to memory of 1876 2292 msedge.exe 86 PID 2292 wrote to memory of 1876 2292 msedge.exe 86 PID 2292 wrote to memory of 1876 2292 msedge.exe 86 PID 2292 wrote to memory of 1876 2292 msedge.exe 86 PID 2292 wrote to memory of 1876 2292 msedge.exe 86 PID 2292 wrote to memory of 1876 2292 msedge.exe 86 PID 2292 wrote to memory of 1876 2292 msedge.exe 86 PID 2292 wrote to memory of 1876 2292 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dcecf4ba5efe5beab3e1cf568dd70eb0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0a3046f8,0x7ffa0a304708,0x7ffa0a3047182⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,2418680136019654723,9606165043552104196,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,2418680136019654723,9606165043552104196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,2418680136019654723,9606165043552104196,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2418680136019654723,9606165043552104196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2418680136019654723,9606165043552104196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2418680136019654723,9606165043552104196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2418680136019654723,9606165043552104196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2418680136019654723,9606165043552104196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2418680136019654723,9606165043552104196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,2418680136019654723,9606165043552104196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,2418680136019654723,9606165043552104196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2418680136019654723,9606165043552104196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2418680136019654723,9606165043552104196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2418680136019654723,9606165043552104196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2418680136019654723,9606165043552104196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,2418680136019654723,9606165043552104196,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD52e6e773fe586859a3355d9bcbe2ded8a
SHA140bb66a6e77cd8c46f32214535105ed19740ba3e
SHA256a4902b7402f8f4e77fa0cfdf1f6e94e5385d3e5f51e2aedad61231ec99de0a99
SHA5122463b299cc7b8ffd96009d1fa67f1e96bdcf69c7d2d8ffbaf66b80744a1a6533ec1bcee2548f64b8651e883667e7597d504c150d7a53c29e98d24d989a81e25c
-
Filesize
2KB
MD52dabefd51892895e3c6f383bd321604f
SHA1c6e84e7f2d8d4e453fc15c976aaf132bcf08d155
SHA256bd996c10a9d0236d36baef43268e5d6036d5802937c98597b64f4368af81dcfb
SHA5120bf0977e71dc8d43684dd61680620b5c3230392512146a172a55713c4ad14cabd713bf245d9c7af584d2a2817a5afcdf687142873b737d17d5feef11603e0d71
-
Filesize
2KB
MD5a34d4e3f3fa1da99b4c52f80d28e3104
SHA1dd22bcdf277ada3843bfc18a608a7e11f74517ed
SHA256d23007c7fd2ac48dd194dcf27991dd67d056447b4bba5f5eff9cee08b7092c51
SHA5125c615525238bd13d2228ce5c6d72e6603c9904ea4e6e2add734de848a1704607f4d833bc0f3f6a9c5f75eb1f6af752dc3d6ab0e35909c4f73f4d0ca7c44491b9
-
Filesize
5KB
MD580a3c1e47d4a4c91c3fe7a45cf3e77fc
SHA10f05cf9773ce35136ee251b72a001281810c5c2c
SHA256a4cdea593fd4bf669716fb4faf000348b7fe41c76d8e149561f255d93ef302d1
SHA51204626d3ecede7ba6ce272bac69ef49a2a45427e73fe763babad7dd00ca792eda9e021d8c7cea5ab23c0603da5c19bcde2485b6b0ad8c05757a87fb59b0b508d5
-
Filesize
7KB
MD5de9889f1468401341eccad5fc95f97bb
SHA1ee22ab7214e227810f6df5eb968b451477b8e6f4
SHA256bb67769d12356397618f92e4ebc978b03b7f654eeed97c12eb2ee7ef7db04d1d
SHA512dfdd4f49976194bb2302abf26ccc3a4e3021f8f24d06eedccebc989cc16679ddd92602aedf515ee2c5b5fe0421be28c4d05b063370a4ce4cba05a564a2ba97eb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5687d6703b82199419274e4dd14079b3c
SHA1698e035e93af03dccf6c5dec2aa36071e522ee7b
SHA25620cffdde0a4b7a15d82b27750163fbd8c76c1773f19341106194d987ea2c90b8
SHA5126badf9e7736fd4fe779882ab5f20714946c6eb2d5efca94cd4d97cd18cf7691ce589185a591f3a19f1260cbef34e834b33902415169aaabd2c0ca204addac5d6