Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:34
Static task
static1
Behavioral task
behavioral1
Sample
eaae2c99f2c6fb47bdb400574873ca32_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eaae2c99f2c6fb47bdb400574873ca32_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaae2c99f2c6fb47bdb400574873ca32_JaffaCakes118.html
-
Size
48KB
-
MD5
eaae2c99f2c6fb47bdb400574873ca32
-
SHA1
661f0deeb97c94b764133027e66ba56728608863
-
SHA256
8a273c07688b007401398b4a277b5e0a7bb46206a73fc554a29434da9f1853b8
-
SHA512
c2b1abf634e1beff993ae416f21fd2180048cc299bcf036bff6a57f67292352e5fafaf5d1ee516f6906904882142917262e633f3041ad9c441be3503a6b55d43
-
SSDEEP
768:ukuyAzS9EHRfE2/idtfwANS7nRo86rxN2SQ78oT:t9EH5Xidt4A86rxG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 3856 msedge.exe 3856 msedge.exe 1940 identity_helper.exe 1940 identity_helper.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3856 wrote to memory of 4104 3856 msedge.exe 84 PID 3856 wrote to memory of 4104 3856 msedge.exe 84 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 3188 3856 msedge.exe 85 PID 3856 wrote to memory of 4356 3856 msedge.exe 86 PID 3856 wrote to memory of 4356 3856 msedge.exe 86 PID 3856 wrote to memory of 4924 3856 msedge.exe 87 PID 3856 wrote to memory of 4924 3856 msedge.exe 87 PID 3856 wrote to memory of 4924 3856 msedge.exe 87 PID 3856 wrote to memory of 4924 3856 msedge.exe 87 PID 3856 wrote to memory of 4924 3856 msedge.exe 87 PID 3856 wrote to memory of 4924 3856 msedge.exe 87 PID 3856 wrote to memory of 4924 3856 msedge.exe 87 PID 3856 wrote to memory of 4924 3856 msedge.exe 87 PID 3856 wrote to memory of 4924 3856 msedge.exe 87 PID 3856 wrote to memory of 4924 3856 msedge.exe 87 PID 3856 wrote to memory of 4924 3856 msedge.exe 87 PID 3856 wrote to memory of 4924 3856 msedge.exe 87 PID 3856 wrote to memory of 4924 3856 msedge.exe 87 PID 3856 wrote to memory of 4924 3856 msedge.exe 87 PID 3856 wrote to memory of 4924 3856 msedge.exe 87 PID 3856 wrote to memory of 4924 3856 msedge.exe 87 PID 3856 wrote to memory of 4924 3856 msedge.exe 87 PID 3856 wrote to memory of 4924 3856 msedge.exe 87 PID 3856 wrote to memory of 4924 3856 msedge.exe 87 PID 3856 wrote to memory of 4924 3856 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eaae2c99f2c6fb47bdb400574873ca32_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff969c346f8,0x7ff969c34708,0x7ff969c347182⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14139761216618393399,8876592929941853670,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,14139761216618393399,8876592929941853670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,14139761216618393399,8876592929941853670,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14139761216618393399,8876592929941853670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14139761216618393399,8876592929941853670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14139761216618393399,8876592929941853670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14139761216618393399,8876592929941853670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14139761216618393399,8876592929941853670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,14139761216618393399,8876592929941853670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 /prefetch:82⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,14139761216618393399,8876592929941853670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14139761216618393399,8876592929941853670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14139761216618393399,8876592929941853670,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14139761216618393399,8876592929941853670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14139761216618393399,8876592929941853670,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14139761216618393399,8876592929941853670,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
23KB
MD5c897f8479da25ec570027594f1b4db24
SHA181a3ff06cf35a87e697fc4733966dffc270ad06b
SHA2567fd05e325904c9c31e435d5c65b9b4ffa11a9116d1df0282d6cd7c87ef6f1dbc
SHA512b1c1c46810c3bc5c407f7d30a9d74db8242860965d958ffc5bfeed35b1204774843775ae81b8c414ea89322d00d7ab97313965e20cebba588edf13b9b8dcbc10
-
Filesize
45KB
MD5ede70f717200a59b4cb831635de913a1
SHA1d4d6e893ac192b5df087e924ab3356852f8a7bc0
SHA256c63fbcc69de230e4844cf735ccf668eeaf30e42126eeb464da39c2de6b0b0051
SHA512b621bde28b90ba97c122677989d994cb5e88fd0906366af1a23ad3f9d9f3b7f2bbef95873f29100433d4068fbbf7ab798505e68deefc118097fc5f76dfc4b672
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD508117594d92321c8a0be0b9bb741d8fb
SHA194100ce55d68b298292bf9477133efb189b1153c
SHA2568a69c59a201f5e95d1fea46fb8a6098a66c7df1c38e6dd85b9269b75d02b24e4
SHA512b790929871be478ae897cd7fbed6d74d036aa869975d04942f19b18b23d0efcdf9b1fd81fd50a908fa637f133f759af694d88f5a8fc171ccc63fb67071a72167
-
Filesize
1KB
MD5c8e23b74bac2fbd8a816327cda3339d5
SHA1ff181bd9c706006a8691f435743addc4fa9087f9
SHA2560fb73df638dff7548fe74da339440aee8697c50582897a271a13aad124b2d4d2
SHA5123461f13c537ad9e64726bc268e91cf35d115b9a0a86f199666e3d0a53f4db521feee927df1e40b3c5b9b9842a9ffd14e61410dee2c29a82c572f130976df431b
-
Filesize
6KB
MD5b31ee8780fa9d80486c8a96e3cc53672
SHA172299bcb3cf6db763d52f644a484cb9a6ad05667
SHA25612232421e0e1788502040f116c1429390df4b0424450c625373346383b68574a
SHA512d782b634b4e7fa9aa6589f70874fd5052d88cd1788c54947f12e2dc995455507ecfe94438fa47a63a75b55a1e77c18e777ce343a97b5555ff55310bbafdec99c
-
Filesize
6KB
MD5e452deefeb253309eab08a60f7954d49
SHA124887c9c2df5631afd6d140bd482655154586398
SHA2564caa25038e8bffe6f5ccd118ab255d9413e874929241b09f6014903c21fb2b6d
SHA512c4a5dc57a5b60459351ae04725c9e957a1e8b16fda2345dc988e547227dada7b4af281ded1e25a5841bf81208b1d0230bd55d4f700d4af3eaf30850cb47efc96
-
Filesize
6KB
MD5ee878d726310fa27942f35b3684c12b6
SHA1c69372560a1c71dd64296af942b8a62459d3cf36
SHA256fb7ff8cc8fde6ebbfcdd2de0c8bed24a505970abcb3688a9809e2b9e5a2c86eb
SHA512be9b357de5057a18e9f7a0d50a64d0ee1e4aa5a2c600d3ea6291250b77a21f34d86d567dba16aa737858c6900af8559b83b04e26e14f57fcb47a3c83092de2cb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a36078fcb541328774437e581b59924c
SHA15a9bd1959237393710054e9535b4c4d788d18a52
SHA25682e8b2b3e4a3b5d9185ab3ec99cb0955b7c380066b952b47bf04bb0da6685f18
SHA512719976957d11d02aa8df183e9bca22332cda2d46deb9d1ed667179e9a5a6bea334a4e633b072ba06392efd90ca8e2d2b8fbc2cef02e0a2ecb29d2594e81420e7