Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
f68a70c5549a5b32d7bd8e0ab4beee0b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f68a70c5549a5b32d7bd8e0ab4beee0b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f68a70c5549a5b32d7bd8e0ab4beee0b_JaffaCakes118.html
-
Size
50KB
-
MD5
f68a70c5549a5b32d7bd8e0ab4beee0b
-
SHA1
0cc759d340cb1537c253de2a6980a0eeb40c50da
-
SHA256
c242a46fdf44cdb15a50a4157dfeb4af4383b6bcc31610972738809b874c7f53
-
SHA512
99c37c665acc8fa4f57616ff3372c278f1c367306c3dfe1f318a874a187296a8559027a6b4765c8b30e36dc13ce12b921030b7a7af4493748e7405f147f48d60
-
SSDEEP
768:xVA02P/O6reZ5ckcdTjZjxjYj1jNj1jfjXU:xVA0In
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 220 msedge.exe 220 msedge.exe 2956 msedge.exe 2956 msedge.exe 1988 identity_helper.exe 1988 identity_helper.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2956 wrote to memory of 840 2956 msedge.exe 82 PID 2956 wrote to memory of 840 2956 msedge.exe 82 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 216 2956 msedge.exe 83 PID 2956 wrote to memory of 220 2956 msedge.exe 84 PID 2956 wrote to memory of 220 2956 msedge.exe 84 PID 2956 wrote to memory of 1888 2956 msedge.exe 85 PID 2956 wrote to memory of 1888 2956 msedge.exe 85 PID 2956 wrote to memory of 1888 2956 msedge.exe 85 PID 2956 wrote to memory of 1888 2956 msedge.exe 85 PID 2956 wrote to memory of 1888 2956 msedge.exe 85 PID 2956 wrote to memory of 1888 2956 msedge.exe 85 PID 2956 wrote to memory of 1888 2956 msedge.exe 85 PID 2956 wrote to memory of 1888 2956 msedge.exe 85 PID 2956 wrote to memory of 1888 2956 msedge.exe 85 PID 2956 wrote to memory of 1888 2956 msedge.exe 85 PID 2956 wrote to memory of 1888 2956 msedge.exe 85 PID 2956 wrote to memory of 1888 2956 msedge.exe 85 PID 2956 wrote to memory of 1888 2956 msedge.exe 85 PID 2956 wrote to memory of 1888 2956 msedge.exe 85 PID 2956 wrote to memory of 1888 2956 msedge.exe 85 PID 2956 wrote to memory of 1888 2956 msedge.exe 85 PID 2956 wrote to memory of 1888 2956 msedge.exe 85 PID 2956 wrote to memory of 1888 2956 msedge.exe 85 PID 2956 wrote to memory of 1888 2956 msedge.exe 85 PID 2956 wrote to memory of 1888 2956 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f68a70c5549a5b32d7bd8e0ab4beee0b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7fff636c46f8,0x7fff636c4708,0x7fff636c47182⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,5880162429516627372,9723470388762737578,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,5880162429516627372,9723470388762737578,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,5880162429516627372,9723470388762737578,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5880162429516627372,9723470388762737578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5880162429516627372,9723470388762737578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5880162429516627372,9723470388762737578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5880162429516627372,9723470388762737578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,5880162429516627372,9723470388762737578,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,5880162429516627372,9723470388762737578,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5880162429516627372,9723470388762737578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5880162429516627372,9723470388762737578,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5880162429516627372,9723470388762737578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5880162429516627372,9723470388762737578,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,5880162429516627372,9723470388762737578,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4236
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3608
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
47KB
MD5d68e16f4b1c4ac2ba25a3832816a9a73
SHA1483d682342aea24ed78443e09a4f9e1e4e7bee3a
SHA2567a3b1646e73713640dabfc22a14a07dc2f0e3eedce783f1312552286104fed77
SHA51267810d66daec6198445c431bf0b7eb1b78e8a3f92fd303ce342e6d7efe59c061283dbf7d7281fbc11416097022d365698b1f0cbef22672d09d0bc736a3535e70
-
Filesize
20KB
MD5198220cb30e70a849024a6f29d878d1d
SHA11762725324d0e63fc5389ef92fdb0c93261c2df8
SHA2560e5bbaa7183d55ed48dd5d43a901aae527e31a689aa092987780fde3f571f3a6
SHA5120e394ec4f8d5e8550d1f9e41a846ba3905d05ff0a922fa1ec69d96031d0793b4e22ac8c4dbd8adb76a2460fbf843545d5f27d5090641317c8b6d3e1bd79c914c
-
Filesize
98KB
MD59274af2682f1a438037d00be3a3fd4af
SHA19a10624558547ec9dadb63ce5e48ab92df659e59
SHA2567c5dc93fcd968fd8c807c78813c59dcb5f1b8693470cfbc4edd1d032461e5fac
SHA512cd65748b1102c42d3ee1cd835715078531a35c56859bd9a10e1385dd391b2e99558061c6816d4c25d5906a9f4f0029a74a0e17369f6ceda443e597614733b896
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5febb78e6cd8a43c67e042446deb41a9e
SHA191dd404a70a414de42ae5b48fdf2414dc1011281
SHA256587be06d59c24389b7ba993699cd560761e33bcba04f80d5a5349581de70fbea
SHA51215e9c1dafe4591e65fa048c29cf29b400c161d784124253b47681de7f9cdc3d15f742d6b2e3188b06f3b22422039a6a48df568976749bf4605cd486419c8f116
-
Filesize
1KB
MD5a586210cde433b97d5262aa7a0392d8c
SHA18e00dd753c442a9f6bf8762b6400344b0aee04a8
SHA25602e4bab43e7b3647940eb69119a8c0be4a2c43bf5d679e5c3507b94d2500d93a
SHA512cb092a8f57f878d0f91f063c06634b1319c517edcf98bb15f8e02bb1afffa5da2fbc7e09da61ffdf485dc81e90a807310c10c55012a8133b1ec4dce0413fdfed
-
Filesize
1KB
MD565cfd4a62cfeefe4c4ccb864a4771100
SHA133ddf9d7fd4a0a600923f089dd079a3199995268
SHA256a5411534026f82fd28dd287573ac3a3294a81a00d8da4053d9232f0ab1a8496a
SHA512127726570543f7d3930336f2e4ba77e235c2402a3492e5d34079e8693b7f371b4654ab22292bfc0bc7da4d9726608d3d258c132085acba82b362987d02a6424d
-
Filesize
6KB
MD51351af9ed0876098f0f7c5338f035e96
SHA132a2e0a58dfabb0071c791b87d0b87ec2e138638
SHA256d81fd652f7fde52e57e9350c14b0b4ce8ca16723d8d714a7b958f435f74092d0
SHA51256f1246922e0fd6d6060330a715fc04871e20d0c9672817d1efe6c2435f7a01ee0f50092eb78606211cf7119dccce791f97faa4d5cf6fd51ad879cb7477f6284
-
Filesize
5KB
MD51f43d045b5c97a7405d70d86a3d14b1e
SHA12c70fd4c7229684f3d53278559c563809b39cf6d
SHA2562ecb1ced6ce9b2121fc5a90057a2c269507912bb879b74d1187104d4e6ed44a5
SHA512a8cac84267d4162f37aa1005ae015cf5e42a5afd8b2f50a7cfe5f04f472fed83437b54bf13ab7062544c3ceae8483cb498128a083cffea62e63960302e807bff
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5df7c5b57982efc148f060b016eb097ab
SHA1e683f2369b9bd5e601651e5333397964fbbd088b
SHA256d4ecea044fed20cc87f22864bd600552a848665eb6ecb069e069f4d97f79492a
SHA5124af3615b95eab62fbb4d1b28f4c6cf6e2d0c467a447ee80f98850f7d3d724e5dd0977ff194777158bed5b58e80293e2e584d8aaaeec977994c1e42a43d25701a