Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 17:59
Static task
static1
Behavioral task
behavioral1
Sample
fcd8de99a43217b0fc20e23133c92892_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fcd8de99a43217b0fc20e23133c92892_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fcd8de99a43217b0fc20e23133c92892_JaffaCakes118.html
-
Size
175KB
-
MD5
fcd8de99a43217b0fc20e23133c92892
-
SHA1
e315bc7483603bf3e5d838f694e7d58c46abc8fa
-
SHA256
36f42689037daa47c8687c43ab1a0354da8ef1028e1d9f3c3a7552e9def05d3f
-
SHA512
02b829ff556b6828b44e064522a25b42f9483dd098f7b7bc315e85f8806326d0cefdb983759f0e385b2711634d9a8ea1771b627108621447cf1123bcfb9ff6a7
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3hGNkFfYfBCJisw+aeTH+WK/Lf1/hmnVSV:SOoT3h/F+BCJiSm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 4736 msedge.exe 4736 msedge.exe 4644 identity_helper.exe 4644 identity_helper.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4736 wrote to memory of 2784 4736 msedge.exe 82 PID 4736 wrote to memory of 2784 4736 msedge.exe 82 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4924 4736 msedge.exe 83 PID 4736 wrote to memory of 4548 4736 msedge.exe 84 PID 4736 wrote to memory of 4548 4736 msedge.exe 84 PID 4736 wrote to memory of 4316 4736 msedge.exe 85 PID 4736 wrote to memory of 4316 4736 msedge.exe 85 PID 4736 wrote to memory of 4316 4736 msedge.exe 85 PID 4736 wrote to memory of 4316 4736 msedge.exe 85 PID 4736 wrote to memory of 4316 4736 msedge.exe 85 PID 4736 wrote to memory of 4316 4736 msedge.exe 85 PID 4736 wrote to memory of 4316 4736 msedge.exe 85 PID 4736 wrote to memory of 4316 4736 msedge.exe 85 PID 4736 wrote to memory of 4316 4736 msedge.exe 85 PID 4736 wrote to memory of 4316 4736 msedge.exe 85 PID 4736 wrote to memory of 4316 4736 msedge.exe 85 PID 4736 wrote to memory of 4316 4736 msedge.exe 85 PID 4736 wrote to memory of 4316 4736 msedge.exe 85 PID 4736 wrote to memory of 4316 4736 msedge.exe 85 PID 4736 wrote to memory of 4316 4736 msedge.exe 85 PID 4736 wrote to memory of 4316 4736 msedge.exe 85 PID 4736 wrote to memory of 4316 4736 msedge.exe 85 PID 4736 wrote to memory of 4316 4736 msedge.exe 85 PID 4736 wrote to memory of 4316 4736 msedge.exe 85 PID 4736 wrote to memory of 4316 4736 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fcd8de99a43217b0fc20e23133c92892_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8650446f8,0x7ff865044708,0x7ff8650447182⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,11809005261260059466,13420914441504282413,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,11809005261260059466,13420914441504282413,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,11809005261260059466,13420914441504282413,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2448 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11809005261260059466,13420914441504282413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11809005261260059466,13420914441504282413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11809005261260059466,13420914441504282413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11809005261260059466,13420914441504282413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11809005261260059466,13420914441504282413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11809005261260059466,13420914441504282413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,11809005261260059466,13420914441504282413,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,11809005261260059466,13420914441504282413,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11809005261260059466,13420914441504282413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11809005261260059466,13420914441504282413,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11809005261260059466,13420914441504282413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11809005261260059466,13420914441504282413,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,11809005261260059466,13420914441504282413,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5352 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3636
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD56d58aaa88f4c3b031b6bd64e31e0c2dc
SHA1cbe36265f92d19fbfc8f5c83a5e0b5c5010abefd
SHA256797bcb037b15509993b5bdd244a2eee2edb9284296efcaba40347546453c8ca7
SHA512cd5a4654217d1b356c18c03c70475d04d4a7b3a773637c99c37dba45161ba60bea1ae9cf3a13775aa8cde2dc2ec117f3125320706bbab28851de6433575de3e0
-
Filesize
2KB
MD5f442f16ccf670d84fb519e166c18d222
SHA196b4a31885f9fb7f20a439a9f9c966d30556d6d7
SHA256ca82e72c6d3750d1895a19001e208eb596aeeb8ec64e1ba5754f282cfc5b6aec
SHA5126c1f674823aae159c897fe62680b270d6dc77a6600d93788096cad6bbe7ff5c66d648d44c225808f47fea9af10fbd41e3209ab284c96046884ad0456dc1ae7e4
-
Filesize
2KB
MD56241e98a96fec0aca967cce672409809
SHA17502c65cbca2f29650772779cf08b8d9b28b359f
SHA256a07a2110dad14e92268b62d464b90913202ac619935abca6391938b83c1aeb9b
SHA5123871d70c9827001886d40baa4c10bcd7d43e93e72d8adac64baa2187ecc69427151acac8cc3bfc328f19f3902c41dfe7dfb01ecad70c6c45c7eacd2437d4a379
-
Filesize
5KB
MD50b98334121ef247572d983ce7bbc32af
SHA10eac61812457ff80bd475817159b83c8d37197ff
SHA256dbf6674bfd035db4321cac5483dc3acc5b16ef04a5b9d147c25ae50324b3812d
SHA5121df73c55630806ace5c50798767b0c6ae8c8481fe8a690b7c7d36cfbd5adc9cd06fbad9e89d0fe678340708ff8bd08c08ee1736163a46c4b9e77d7426c117002
-
Filesize
7KB
MD5a508e14cb7d68fc9491eb1d6c0127cd4
SHA1e44636266e183274a24054ee82d4ed9cdd3122b3
SHA256e76d424528229cd1d2cfeedaad65d415ed623e1ddc8bec94eddaae0406e413eb
SHA5120dceffc1c921d6189dd64219c8cb1b523a4ac6295a0530cc355d7882afb0b05577de56e87fb8d9d76bde844d59df4a2124955b028e7165ee6f06a56b98fb6939
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d4445e120924784415f49f1c62d540b3
SHA18633665e4eba3e076074e2a78a68fe2ef4a90575
SHA256f80dacd0177bece9c04350ff63dedc218d15ccafa0ace9af0b2deb5246b443c3
SHA512e91e7f0c3b8d24831c79974f32fd62d77c66a651e1d7e8f96c92dfca055b4763a22b323ca64ad4b479ee9aa21d2a276f36e060e2622508f7cb89035de0bb6380