Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
fc1ceb42d6ef830f4f9b90dc3b3a9516_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc1ceb42d6ef830f4f9b90dc3b3a9516_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc1ceb42d6ef830f4f9b90dc3b3a9516_JaffaCakes118.html
-
Size
175KB
-
MD5
fc1ceb42d6ef830f4f9b90dc3b3a9516
-
SHA1
6e23e1d0647ac1539726639131ff00759c6f8dda
-
SHA256
705b130c83fe0a1e82504f432733b51a97e87b1b861f230af555f658369e6c58
-
SHA512
56ef055aa0d6c6adce72a83f007896542d65ffbe1ee62a8febc36c0dc77637667b75aaa1088275d3530b65ee0e5b75c869bad6916e73b203d7f426f1c2dcdab4
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3dGNkFoYfBCJiZ6+aeTH+WK/Lf1/hpnVSV:SHCT3d/FNBCJiBB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4488 msedge.exe 4488 msedge.exe 1104 msedge.exe 1104 msedge.exe 4476 identity_helper.exe 4476 identity_helper.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1104 wrote to memory of 1788 1104 msedge.exe 85 PID 1104 wrote to memory of 1788 1104 msedge.exe 85 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 1272 1104 msedge.exe 86 PID 1104 wrote to memory of 4488 1104 msedge.exe 87 PID 1104 wrote to memory of 4488 1104 msedge.exe 87 PID 1104 wrote to memory of 512 1104 msedge.exe 88 PID 1104 wrote to memory of 512 1104 msedge.exe 88 PID 1104 wrote to memory of 512 1104 msedge.exe 88 PID 1104 wrote to memory of 512 1104 msedge.exe 88 PID 1104 wrote to memory of 512 1104 msedge.exe 88 PID 1104 wrote to memory of 512 1104 msedge.exe 88 PID 1104 wrote to memory of 512 1104 msedge.exe 88 PID 1104 wrote to memory of 512 1104 msedge.exe 88 PID 1104 wrote to memory of 512 1104 msedge.exe 88 PID 1104 wrote to memory of 512 1104 msedge.exe 88 PID 1104 wrote to memory of 512 1104 msedge.exe 88 PID 1104 wrote to memory of 512 1104 msedge.exe 88 PID 1104 wrote to memory of 512 1104 msedge.exe 88 PID 1104 wrote to memory of 512 1104 msedge.exe 88 PID 1104 wrote to memory of 512 1104 msedge.exe 88 PID 1104 wrote to memory of 512 1104 msedge.exe 88 PID 1104 wrote to memory of 512 1104 msedge.exe 88 PID 1104 wrote to memory of 512 1104 msedge.exe 88 PID 1104 wrote to memory of 512 1104 msedge.exe 88 PID 1104 wrote to memory of 512 1104 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fc1ceb42d6ef830f4f9b90dc3b3a9516_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb2b9046f8,0x7ffb2b904708,0x7ffb2b9047182⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2264,17153877073579759192,3205403184883750225,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 /prefetch:22⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2264,17153877073579759192,3205403184883750225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2264,17153877073579759192,3205403184883750225,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2612 /prefetch:82⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,17153877073579759192,3205403184883750225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,17153877073579759192,3205403184883750225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,17153877073579759192,3205403184883750225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,17153877073579759192,3205403184883750225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,17153877073579759192,3205403184883750225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,17153877073579759192,3205403184883750225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2264,17153877073579759192,3205403184883750225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2264,17153877073579759192,3205403184883750225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,17153877073579759192,3205403184883750225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,17153877073579759192,3205403184883750225,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,17153877073579759192,3205403184883750225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,17153877073579759192,3205403184883750225,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2264,17153877073579759192,3205403184883750225,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5576 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3812
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5c395741b40f72e0387e89c361cfd6b08
SHA1ba8ed5776177c9ad0fc63b40ca8dea2b92bd5562
SHA25658b76763b4195850730e5ceb6e5292ad73482c0445fae4bc3d1d63053b7e82d7
SHA51208be00879f731444f706d05e75d35dedbad5567de79f0e3b33c79624205c3b94f2f6106e7762940aeb215476185e1e9b424da81d5eb259667e3f26af514cd7d7
-
Filesize
2KB
MD51bffa9c663ad98e528b0e5199ad73c05
SHA1d59b81919b212001e3d9312c7b584bc9f1b18dea
SHA256949feae4a281ab5a46d236f481e46cdf5381fe2ffd3d1612bc0d2dcd674339d9
SHA51269fb15adc608c116ce481a584254d77257b181709e6ab6db0c7a48437129e8eed1e823eb863339ccf394d5577b6ff785c5c8cfa132c8ed4ae7581a33c1b516b2
-
Filesize
2KB
MD58a1c58de027fcee563a29197f508b7f8
SHA1be672f499150a56219a209648020f6677f48b4ea
SHA256c947b5ad260a32ce5805ecbdf75682e228a0f2c499b27d5bda335dc88801f67c
SHA51272149ee0f28eff72aebcf5e31c33b2a01ce2f6eeec476fcf627d4daef7e85135ba6df4c286f8df80adbfdb1277bbf492c3538860c93df49b8f1804f8586d8572
-
Filesize
7KB
MD52797a02ae5bafce02f42811c6371fa4a
SHA117b1f973f2d8c4bc0b2f8ba58ffcee2d48bfe8d8
SHA2564f2c6f6dab229ba8a76054b5fe52c0e7fc5bc9cdd9acb23183cbc0402ef14135
SHA512394d578a873a2af87be398842efdabb12c776d86f4e2552500063cadb337fe868cbd1a9a2aa5fd14f891c505d0c8fdc5cbd3735354c6241383477766098dfd64
-
Filesize
6KB
MD54a92cd57fabe195345724f25e292756f
SHA125b08a20bcaaaaf03e8ac5f2cb8ee399c6bb2c57
SHA2566eb4328086ce85d1084be21474243380b756024415402a336e95b77a55201840
SHA512d604096dfc9a611eea34c26ee49baf955abf0d7ca787aa30f61277c7f1238ab6cc8e017f708fec1c7d3aa64393b8b64b725bfd94c46f083f6f380c74afe936a1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c15f6ab69bc54d6dd460a36b4a66959d
SHA14f880f1ede7f34f5c70edc7fd7c8e93fb9c86aae
SHA256810d3729d8ad221d8fcca2497133398cbc8d42b24a9aa940b633f4454359a63f
SHA512ded01e142e086ce6008072d4914cabcebe2a4b53987eb45fb72372faae2b17e35bca794eb7cb2ce1b45f516796597bc57800301902ae9fe023a3b5a832e49afb