Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:44
Static task
static1
Behavioral task
behavioral1
Sample
eac8b33928fb29f0dbe0892e28c214e1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac8b33928fb29f0dbe0892e28c214e1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac8b33928fb29f0dbe0892e28c214e1_JaffaCakes118.html
-
Size
175KB
-
MD5
eac8b33928fb29f0dbe0892e28c214e1
-
SHA1
f169ae709fe1567a89e5a6c90eb9bedcdb85c256
-
SHA256
c3241358c44eac5f0508ddf1e29d5f8d037374f6d9d774be361ae209296dc036
-
SHA512
302bd3f65a1d41418564e1ac31d9fc6d3de6bd2a4785b81deb5d5afc27434bf9f434591af0ef4473a95fbb704a45b12ab8ee2645fa481c7284d623cd5d6a6920
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS36GNkFfYfBCJisZ+aeTH+WK/Lf1/hmnVSV:SOoT36/F+BCJihm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2556 msedge.exe 2556 msedge.exe 3572 msedge.exe 3572 msedge.exe 1496 identity_helper.exe 1496 identity_helper.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe 1380 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3572 wrote to memory of 5072 3572 msedge.exe 84 PID 3572 wrote to memory of 5072 3572 msedge.exe 84 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2844 3572 msedge.exe 85 PID 3572 wrote to memory of 2556 3572 msedge.exe 86 PID 3572 wrote to memory of 2556 3572 msedge.exe 86 PID 3572 wrote to memory of 1464 3572 msedge.exe 87 PID 3572 wrote to memory of 1464 3572 msedge.exe 87 PID 3572 wrote to memory of 1464 3572 msedge.exe 87 PID 3572 wrote to memory of 1464 3572 msedge.exe 87 PID 3572 wrote to memory of 1464 3572 msedge.exe 87 PID 3572 wrote to memory of 1464 3572 msedge.exe 87 PID 3572 wrote to memory of 1464 3572 msedge.exe 87 PID 3572 wrote to memory of 1464 3572 msedge.exe 87 PID 3572 wrote to memory of 1464 3572 msedge.exe 87 PID 3572 wrote to memory of 1464 3572 msedge.exe 87 PID 3572 wrote to memory of 1464 3572 msedge.exe 87 PID 3572 wrote to memory of 1464 3572 msedge.exe 87 PID 3572 wrote to memory of 1464 3572 msedge.exe 87 PID 3572 wrote to memory of 1464 3572 msedge.exe 87 PID 3572 wrote to memory of 1464 3572 msedge.exe 87 PID 3572 wrote to memory of 1464 3572 msedge.exe 87 PID 3572 wrote to memory of 1464 3572 msedge.exe 87 PID 3572 wrote to memory of 1464 3572 msedge.exe 87 PID 3572 wrote to memory of 1464 3572 msedge.exe 87 PID 3572 wrote to memory of 1464 3572 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eac8b33928fb29f0dbe0892e28c214e1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb95f46f8,0x7ffbb95f4708,0x7ffbb95f47182⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,10263591213500648567,4225632674789927412,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,10263591213500648567,4225632674789927412,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,10263591213500648567,4225632674789927412,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:82⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10263591213500648567,4225632674789927412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10263591213500648567,4225632674789927412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10263591213500648567,4225632674789927412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10263591213500648567,4225632674789927412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10263591213500648567,4225632674789927412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10263591213500648567,4225632674789927412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,10263591213500648567,4225632674789927412,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,10263591213500648567,4225632674789927412,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10263591213500648567,4225632674789927412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10263591213500648567,4225632674789927412,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10263591213500648567,4225632674789927412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10263591213500648567,4225632674789927412,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,10263591213500648567,4225632674789927412,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5244 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5d998c0b114a6cacc3838ad39df324ffa
SHA1959451895f0b48295bd78b4f77ad3d708935deb9
SHA25608bfef3c274b29835ca1ea42eeea61d34bcccc0215b66e77d8ffa2a596540d87
SHA512ac91c44fd336af66249cdaa378cf9b12724de6ce76f88e806cd8f12d764060e89a5e5bc6d206d2c98f1829d099e283bfb3d858821432cabb8ebc4e306ffb6ff4
-
Filesize
2KB
MD536883cbc6aabf13b79e3ea3fdcc61698
SHA1cf935030479dcc52f8982c59baadf19a3d89afc5
SHA2565530fd8e6e7e12a405d79faf40621b6aafc468195c91f4fb596abd5ecf357551
SHA512003fbcf4cef5eb45a7ea10a97edc63e0b352d286e42ef5152aa7861d08eb81d7d86dc21570c63fcaff1a5c47b4aaf07a4a8b527a4b3cc246345e64a471dc7158
-
Filesize
2KB
MD5c62a302f5f925d024aa4c84e5931ed92
SHA100566e3af260ac37daf6d7a422f1663514cd15e3
SHA256000617f3870a1ccaa4736dc42cf9e1889b8e899b9408f589920b8d7805dc4f33
SHA5129aec263c05219767231b0e55e0ac08f868f4bfa888b53ead459e707ff2aa71cad1ca31889d6af9743882de8af2d16c5ef632936b98f972a53027e838856b59f1
-
Filesize
6KB
MD5a0cb9e0d855b9f26cf57543e996a6294
SHA199131335764a43d51826c9a8370bae980ea53129
SHA256f91af58d322d6703fba977c89f4c4e2778c90026209e8ccffea74978e8afb2c6
SHA512dfe3861b43e047e78d6c89b12760f238f3ce3343bfb6ee71acfe2fe90d617d7f426fc13c54f42a7593027a0071717c96fb83bad29a2efd909f7cdd9dd2911040
-
Filesize
7KB
MD5779e935cea8f6043f17c26d1f13aaa21
SHA1ec4549b5ad97a913395a258f42543f704291ed55
SHA2567bcc435ac51ef478d3e7aa05f26ac8001739029cd57e55b390cd0a99d30ce5c9
SHA512f7515ceb0ec347f1600a0779a95184bffa1e5e2ee9eaa5e77dc2155fe7ccb25b4acf2487f904738b6c1b62888ac51c0d2fa297d18f78cdb9609e76912c691bfa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e0313baf802761cdadcd138f53ed4e2a
SHA160aa238436e23a0c11c57d59fbd60094b7e52bec
SHA25667c3ba0e27181c39ee0af7dad334806688e1c2e30415110114381021700436d1
SHA512c1cc769434edcb4c0cd9a8c20f76ed7728b5989cd86df85f4dc5cda6218cc37e2758d5500d75fd64f9019755169fc1d07e5035b061a2026565b53e815dbf933a