Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:15
Static task
static1
Behavioral task
behavioral1
Sample
eaa70e2a3f198048b36b4266e67b8022_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eaa70e2a3f198048b36b4266e67b8022_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa70e2a3f198048b36b4266e67b8022_JaffaCakes118.html
-
Size
175KB
-
MD5
eaa70e2a3f198048b36b4266e67b8022
-
SHA1
10fe2ed99130bd336139416367e36bec62be3617
-
SHA256
c2ca9541944b0b17cf839593bf983ba1a9700c7b775b74d6a1d361ba2bff15fc
-
SHA512
4a985304507a8056055a3f87121aaa2611e47293e7dce4fd4c56ce7feef2e92905f336dddce2586a5a7af3699639691c576d1a356c841a6428fc23abc644951c
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3iGNkFXYfBCJiZZ+aeTH+WK/Lf1/hpnVSV:S9CT3i/FmBCJiwB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 2232 msedge.exe 2232 msedge.exe 692 identity_helper.exe 692 identity_helper.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 4888 2232 msedge.exe 82 PID 2232 wrote to memory of 4888 2232 msedge.exe 82 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4292 2232 msedge.exe 83 PID 2232 wrote to memory of 4924 2232 msedge.exe 84 PID 2232 wrote to memory of 4924 2232 msedge.exe 84 PID 2232 wrote to memory of 2848 2232 msedge.exe 85 PID 2232 wrote to memory of 2848 2232 msedge.exe 85 PID 2232 wrote to memory of 2848 2232 msedge.exe 85 PID 2232 wrote to memory of 2848 2232 msedge.exe 85 PID 2232 wrote to memory of 2848 2232 msedge.exe 85 PID 2232 wrote to memory of 2848 2232 msedge.exe 85 PID 2232 wrote to memory of 2848 2232 msedge.exe 85 PID 2232 wrote to memory of 2848 2232 msedge.exe 85 PID 2232 wrote to memory of 2848 2232 msedge.exe 85 PID 2232 wrote to memory of 2848 2232 msedge.exe 85 PID 2232 wrote to memory of 2848 2232 msedge.exe 85 PID 2232 wrote to memory of 2848 2232 msedge.exe 85 PID 2232 wrote to memory of 2848 2232 msedge.exe 85 PID 2232 wrote to memory of 2848 2232 msedge.exe 85 PID 2232 wrote to memory of 2848 2232 msedge.exe 85 PID 2232 wrote to memory of 2848 2232 msedge.exe 85 PID 2232 wrote to memory of 2848 2232 msedge.exe 85 PID 2232 wrote to memory of 2848 2232 msedge.exe 85 PID 2232 wrote to memory of 2848 2232 msedge.exe 85 PID 2232 wrote to memory of 2848 2232 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eaa70e2a3f198048b36b4266e67b8022_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7afd46f8,0x7ffe7afd4708,0x7ffe7afd47182⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,13665138855565649544,2158094754936024822,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,13665138855565649544,2158094754936024822,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,13665138855565649544,2158094754936024822,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13665138855565649544,2158094754936024822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13665138855565649544,2158094754936024822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13665138855565649544,2158094754936024822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13665138855565649544,2158094754936024822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13665138855565649544,2158094754936024822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13665138855565649544,2158094754936024822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,13665138855565649544,2158094754936024822,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3412 /prefetch:82⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,13665138855565649544,2158094754936024822,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13665138855565649544,2158094754936024822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13665138855565649544,2158094754936024822,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13665138855565649544,2158094754936024822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13665138855565649544,2158094754936024822,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,13665138855565649544,2158094754936024822,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1920 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD565e2f091738ea15e13c8e0173b02967e
SHA1233f8e38a9187b01edb2c0c833e061630398c4fb
SHA2567e694361548cd09c694b7a1a5f30b3bf0d8f35f7f6205e29409ffc7026cca8dc
SHA51207c862f30d56851cac04afaa22e9f1e0217920a86e679301d307f31098d8a2940523686d2834702e4b4855d940cd63ccf8c0b8add155d19ba643be7d8cbe0005
-
Filesize
2KB
MD512c03084ab967b0c7cc612f3e7fcc5ba
SHA173051305b3492cd6c656ceb79fc68420710d5fdd
SHA256d44324882d7129f955e29085cb59c9c9b9db1e9514a5c117294754e5d6f9752e
SHA5129f2737c1cb087805cf5d44c913ca4b310bac5ebe8a9c99f6a2ad21928b5362507f5274e38cf5259845cefa9263fcb9bdaa0d51f5646e11ef02d36077c774fdf5
-
Filesize
5KB
MD5d127df44798d0eda5615a5423d7cfcaa
SHA14810e71199d82995de8af8f1e10da027e91cd8a8
SHA2566a2ca3970a06745bd7a90f12bec875a59fd211e7105109c3e92a5fb8b8ee07f0
SHA512e1fed694eca545f4109cf58b0b18705df59ff6a490a8ae8ed7dd5738b983742c3fb380a83415a54392a04e685397b9c61892a8647e6d17b89d786f9903b66fb4
-
Filesize
7KB
MD5eed632a317070924bcd97b5ee2b95d00
SHA11caf7d89887f48b86088ff3ec5d727247938ec52
SHA256908ce005b31069777d61f2dd8ca0a59156b50481c2d9c3f9bda2fc416e19ab70
SHA5120cc23a4b48769ce2a24e95dcdfcf6a5ab3d55c0500aff57905a1694f7469c288d36592c06dbccb26b0611c8c841fb0ef61bac362039ab49d1796135412808dd3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b97bac1a-a79d-47fe-983f-4d93a1314aa4.tmp
Filesize2KB
MD5067edf2572ef098e21007202def4489d
SHA1c25967ddbe8fd17d0d1e13034ed5f69b17327dcf
SHA256beb59857b94d1cd52ed656a558a7486557f990524b40c532163c2a94c1b54024
SHA512a523e8abf0e8e293e84b5793950dcd92038c25d016776b4cc0275642fc1dc964a2dfa3c52a1ff5fc0a92b5ee75d12ac158fd0b394c0feea17c6c5be4a199f861
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD524d0cbe55f88c611ec6d24cf7e83a507
SHA1b519dca4724bdf302e6144eb1d6d62f43dfcf551
SHA256f718b8f43e35022e20252e1906d0552cd24b67d4e534a1ab8bb2d5863b817cd2
SHA5121f69f5f9f754d15f4d878938f5040f8742200b3e89cf6fda5d01f16238820ec38acddbecc79caabf0697aef8d1f9b2bf1b5e1c5d00dd322973df79517e78d3f6