Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 02:40
Static task
static1
Behavioral task
behavioral1
Sample
e18c2d5474270180580d37e1c7f99725_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e18c2d5474270180580d37e1c7f99725_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e18c2d5474270180580d37e1c7f99725_JaffaCakes118.html
-
Size
106KB
-
MD5
e18c2d5474270180580d37e1c7f99725
-
SHA1
ebb3633ef6e78e5bd37024ce4e8fd0876999f6f0
-
SHA256
627d28c7c832ddaae494c333d719be6685469584051db57a3edd7e1d829ee4b0
-
SHA512
b0f3117779e41b0ec609e6548ea320495cd8f8c0ee65ecce8fd0ca463e0c51e9d636fd8ab8f35fbd2b70e21d1e84a03f7418b32eea14bb98e404eceda5c27334
-
SSDEEP
3072:HCnLeCyR2ABQg0+UcjvG8rMUnhdT5UyOAjO8tsDCb:HCLeCyR2ABQg0SR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4008 msedge.exe 4008 msedge.exe 4052 identity_helper.exe 4052 identity_helper.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4008 wrote to memory of 116 4008 msedge.exe 83 PID 4008 wrote to memory of 116 4008 msedge.exe 83 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 924 4008 msedge.exe 84 PID 4008 wrote to memory of 4980 4008 msedge.exe 85 PID 4008 wrote to memory of 4980 4008 msedge.exe 85 PID 4008 wrote to memory of 1128 4008 msedge.exe 86 PID 4008 wrote to memory of 1128 4008 msedge.exe 86 PID 4008 wrote to memory of 1128 4008 msedge.exe 86 PID 4008 wrote to memory of 1128 4008 msedge.exe 86 PID 4008 wrote to memory of 1128 4008 msedge.exe 86 PID 4008 wrote to memory of 1128 4008 msedge.exe 86 PID 4008 wrote to memory of 1128 4008 msedge.exe 86 PID 4008 wrote to memory of 1128 4008 msedge.exe 86 PID 4008 wrote to memory of 1128 4008 msedge.exe 86 PID 4008 wrote to memory of 1128 4008 msedge.exe 86 PID 4008 wrote to memory of 1128 4008 msedge.exe 86 PID 4008 wrote to memory of 1128 4008 msedge.exe 86 PID 4008 wrote to memory of 1128 4008 msedge.exe 86 PID 4008 wrote to memory of 1128 4008 msedge.exe 86 PID 4008 wrote to memory of 1128 4008 msedge.exe 86 PID 4008 wrote to memory of 1128 4008 msedge.exe 86 PID 4008 wrote to memory of 1128 4008 msedge.exe 86 PID 4008 wrote to memory of 1128 4008 msedge.exe 86 PID 4008 wrote to memory of 1128 4008 msedge.exe 86 PID 4008 wrote to memory of 1128 4008 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e18c2d5474270180580d37e1c7f99725_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaba0546f8,0x7ffaba054708,0x7ffaba0547182⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14066730737228348776,3251630587033701702,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,14066730737228348776,3251630587033701702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,14066730737228348776,3251630587033701702,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2396 /prefetch:82⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14066730737228348776,3251630587033701702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14066730737228348776,3251630587033701702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14066730737228348776,3251630587033701702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14066730737228348776,3251630587033701702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14066730737228348776,3251630587033701702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14066730737228348776,3251630587033701702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6180 /prefetch:82⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14066730737228348776,3251630587033701702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14066730737228348776,3251630587033701702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14066730737228348776,3251630587033701702,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14066730737228348776,3251630587033701702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14066730737228348776,3251630587033701702,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14066730737228348776,3251630587033701702,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
23KB
MD533a83c16527e4531fbfca2631f653674
SHA187a63514c262ba4bffc52d2ceebb3ca14353507a
SHA2561156bb50a264543f6a9dc8922dd2c65d444c8bb11b3b18be95d5adff840b33b4
SHA512f1dba28d0f81aa0894436ae7b4ba76a2e635f002f666d17d31b8b21500dc2321d7862ca8dcfd22e44aab4d1f33112c076dc95191c889546a40f9c6197cccbda3
-
Filesize
45KB
MD5aa6a698d1c7fc6d35265b10af5570e9c
SHA100da372ad4964a5d5b8afff7fe1b207ff284f232
SHA25602f6ae7bda59fb1a20d3386021fb972ced348bf724fea42157225d416f9f049a
SHA512f5b2f732e899cc0fed577e1ef1c51c154ede5d206543e8ac7c1fabb182901f8e93e137b63f12cbb87b3f570a283a368bfb1b9d637cc5b1c4f1669ff5cfbf306b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD501a5fbc30fcd97e398a76a999f15bab2
SHA196e6ad83a14111badf84b93bed08544fca7dabc0
SHA256afc0459f168c92557d3a4b92f57a4626d0341a71f96a1e7af8f3f7c1f28b1382
SHA5128cd14d40faf629c60858d977f2dcce9de6cc244d0c176e9fac5f881df6759b4a2c7c39029748547f000364a7fdc87d350fdc8c9f98ead6612588c73a984470f8
-
Filesize
1KB
MD578c2a1ad24024af2c45cd59c60b89a90
SHA1052d365addcde656256d81548dee7506d4d3fc19
SHA2561114672cc84f0ecd56c419848633c1f8697d93f2a3a6918075bb79231c65720d
SHA5128b423b22669a9fdf00ae63127ce4890ae791c637036e5d3abfda6462753fbb0ebead1e1e279a7c48e9850a4462c5fec30583a001021b454c5e5c92f3fcdb2425
-
Filesize
5KB
MD5faee829fa921d638706b224fd9dbbcfd
SHA1e6303a7b443c0eebf66db4c23b0cba64dff7896f
SHA256aa40bd4e2823d05e823ac9ee8ff8f055ffc3d897c8320869428e22f4bb2f71fe
SHA51222930875a03cb8b8e61cfc84bc207f66a1d3ae9486c73d1adf10546dc46e68339538a27cb548f252192cc95212cde6444234d3a14cc5c2bdeaa5cfab2d581da8
-
Filesize
6KB
MD588853abe8c3bc4c1f87dadca290b0a51
SHA1b4e1f226ca6558e9c7cd727e67a0c0bde7c1e655
SHA256592029f39364f33a9ad3d4bee9dd5b86ea66bd6de834705801f3b8ab49cf5eb6
SHA51280f5851b31507115fc6789d5caf41dbd9a1af27ac5a8c75a6ba7a6ebe640880d9a0410c989fae6a21a734fa39ba374181ff52585e79a990cee1171a502a7ba3e
-
Filesize
6KB
MD53f4d287a4284c7a2a1229ba6d0a2c5da
SHA16b22b328ed15fc17474515bb8ed733a114701945
SHA256ee90f4a1322d631ef574c6a38d02c3da097476b313cef693fb9116d48218c839
SHA51295262399ef383c6afc13cb5fd93bb265f525d58df120d6852af9b13fd56cdb6764d33e83c6acbc4fa53176a455ae31705020b3aba310960f010e5a490d2e68b3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57c20175d12ee0cdc1e503386b85864e6
SHA1d0aeb312258568fa366f9c42f8031554c10aa8f5
SHA25685aa7b7a943c92580436564e3af01fd62fedf004d742b80c4116537da815b4dc
SHA5126961ffba64ad3121449fce1849df32e14349c6d9341cd84eb18fefa8b84492406e9b3f7c804fffe12a2b1d3b0f74b44a691479e18e58b78911dd02876ede8dfd