Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
fdbbb566627c572a7e933a1a2849e619_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdbbb566627c572a7e933a1a2849e619_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fdbbb566627c572a7e933a1a2849e619_JaffaCakes118.html
-
Size
55KB
-
MD5
fdbbb566627c572a7e933a1a2849e619
-
SHA1
a728da3797a5d97e8ccdc483a5eef47e7dd578a2
-
SHA256
123f03510580dbf489b4d191eb203bf12286fa25d63221d8d7fb1cbb823b92fc
-
SHA512
a37df82f649fb4b2746c86644a878867c27a649da10b583b05401f6daea933951bd8efab661db36ba6d3c0812240fe57d4bb17c0d7613391ff9e4322fa25e7d9
-
SSDEEP
1536:gc3HpKWWMA0FLR/HqeFnmFLs474f02GgZadYZL2Q5p2nEdVu7TR:d3HpKWWMA03L9PGgZadYZL2Q5p2nEdVY
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 43 sites.google.com 53 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3588 msedge.exe 3588 msedge.exe 4988 identity_helper.exe 4988 identity_helper.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3588 wrote to memory of 780 3588 msedge.exe 82 PID 3588 wrote to memory of 780 3588 msedge.exe 82 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 2224 3588 msedge.exe 83 PID 3588 wrote to memory of 3104 3588 msedge.exe 84 PID 3588 wrote to memory of 3104 3588 msedge.exe 84 PID 3588 wrote to memory of 1796 3588 msedge.exe 85 PID 3588 wrote to memory of 1796 3588 msedge.exe 85 PID 3588 wrote to memory of 1796 3588 msedge.exe 85 PID 3588 wrote to memory of 1796 3588 msedge.exe 85 PID 3588 wrote to memory of 1796 3588 msedge.exe 85 PID 3588 wrote to memory of 1796 3588 msedge.exe 85 PID 3588 wrote to memory of 1796 3588 msedge.exe 85 PID 3588 wrote to memory of 1796 3588 msedge.exe 85 PID 3588 wrote to memory of 1796 3588 msedge.exe 85 PID 3588 wrote to memory of 1796 3588 msedge.exe 85 PID 3588 wrote to memory of 1796 3588 msedge.exe 85 PID 3588 wrote to memory of 1796 3588 msedge.exe 85 PID 3588 wrote to memory of 1796 3588 msedge.exe 85 PID 3588 wrote to memory of 1796 3588 msedge.exe 85 PID 3588 wrote to memory of 1796 3588 msedge.exe 85 PID 3588 wrote to memory of 1796 3588 msedge.exe 85 PID 3588 wrote to memory of 1796 3588 msedge.exe 85 PID 3588 wrote to memory of 1796 3588 msedge.exe 85 PID 3588 wrote to memory of 1796 3588 msedge.exe 85 PID 3588 wrote to memory of 1796 3588 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fdbbb566627c572a7e933a1a2849e619_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffb5b46f8,0x7ffffb5b4708,0x7ffffb5b47182⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,8451796992394867734,8896401827038047228,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,8451796992394867734,8896401827038047228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2548 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,8451796992394867734,8896401827038047228,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2552 /prefetch:82⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,8451796992394867734,8896401827038047228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,8451796992394867734,8896401827038047228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,8451796992394867734,8896401827038047228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,8451796992394867734,8896401827038047228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,8451796992394867734,8896401827038047228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,8451796992394867734,8896401827038047228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,8451796992394867734,8896401827038047228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 /prefetch:82⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,8451796992394867734,8896401827038047228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,8451796992394867734,8896401827038047228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,8451796992394867734,8896401827038047228,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,8451796992394867734,8896401827038047228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,8451796992394867734,8896401827038047228,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,8451796992394867734,8896401827038047228,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD52624885b21a117c336372c01862b0d42
SHA100ba89ff4f8d67d3b24613456d7f892ed5b82c84
SHA2560bb0e760a9bd6232b5e3be8cfa72bdd26dcbb08bbe49402c351bf97bf6376482
SHA512ccb3fa0fa17f4e9c3bdf0d69db0e72c9232c6fbff4aef35ad45ad77d9e71da91168045052c1ab54a170f421e661910b676e40a762a4a8539986f8243bb533c83
-
Filesize
2KB
MD5d69e3126e68a58c02717c52157b00fd8
SHA1a8cd6b535e0c16c7125e7ff8b6db8c6deeab4541
SHA2569c687c2849ce7f4fa39bc9b6929948867b004db5ac30685fc03c4d1325a98442
SHA512fd13331ec024f7151336f4fc5936ccd0ed790f2b10335e0df94134f103ffd2240f2a51c9e647c5263738c45ca5416e5f328905caa4e3cd76671f53a07be08988
-
Filesize
5KB
MD5d3cd133f47326c30a3d3334bd252a359
SHA1ea4011b39811a99127c33f54c9bafe4467f9cd14
SHA25624b3564c8ac985bd11d4b4ee74807da6c8bdb0b6190ae6c4b3cecd07a89f3b65
SHA512b4461ef2b721e184d9aa37f3773653049eabd5bdd1036ad7ee686fb8be2a347d9ebcf50050ac4cf77c4e20d196e551b02babd0a9e8a63c61e933fa2e2c0a8999
-
Filesize
7KB
MD55cad4848e76e805fed50a09a65010c23
SHA16c0d4d7243fc395f960279a905f0381e83c6f273
SHA25639e60c70d5f42931df6a9cd6b17519a89a0d6aca6894790c42da305c955c6256
SHA51223d58addd1e2d4122d06f3d66466fd2bd5e00295dbbfa46991c6ef435c4c1fbbfd4ca1683776324499be8068018c1445525f571950953eaf3ee152b8c38377df
-
Filesize
7KB
MD51027354ac1d05eb9e5e6bc47b37a6fa8
SHA1c08c72ae0af87eea69ac6fbca0447990246d4e46
SHA256b169f1a9641214812e60ac57f502571e169a3d6a47b4a8812564f0329d2a68e3
SHA512d9993f5e3941ffae3946a522d7d49012ae61fee3865bdf7e8eb81d9cda0945bd2d5c653c1dc7b50ea25d5b75b97587e3d8440b5e32d3b56b60c0f00005862cb1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53e7a2a5c7f52704dc78a726b579b9541
SHA16fb6ca7d491b8145ce2d27c8a117e5fb81cf4dd1
SHA2567a4a9d57978ebfb0bca4bb3dc641e5728016e0f30726eac2e22996e577b7be76
SHA5123b269e012ed425d703837c88b5d042091e795a2902b2c4361e0a0f435945de7c727fe9ba4b112352ee2e3d94c30c53a19f23dd426c4c4123f85725038598ae4e