Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
fdff6044e267418fa1bad48504e1c537_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fdff6044e267418fa1bad48504e1c537_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fdff6044e267418fa1bad48504e1c537_JaffaCakes118.html
-
Size
175KB
-
MD5
fdff6044e267418fa1bad48504e1c537
-
SHA1
c0cbfc4e2406367b86986f7839f426ef4948417a
-
SHA256
d4560bbb4d1e0ee31f20bdbbdec509c82b387c30b4fb7c7eb67321a90c1ed5c9
-
SHA512
d38bdaa44c2679a402673d6d9949a451a3fa96db78ded66a0edc8fb63c11c452bccae44a517d8380bdc3d6cd3a123617a8f2e2a5406084410766e412e5b03085
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3aGNkFdYfBCJiZb+aeTH+WK/Lf1/hpnVSV:S9CT3a/FYBCJieB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2856 msedge.exe 2856 msedge.exe 4880 msedge.exe 4880 msedge.exe 1832 identity_helper.exe 1832 identity_helper.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4880 wrote to memory of 3148 4880 msedge.exe 83 PID 4880 wrote to memory of 3148 4880 msedge.exe 83 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 1124 4880 msedge.exe 84 PID 4880 wrote to memory of 2856 4880 msedge.exe 85 PID 4880 wrote to memory of 2856 4880 msedge.exe 85 PID 4880 wrote to memory of 428 4880 msedge.exe 86 PID 4880 wrote to memory of 428 4880 msedge.exe 86 PID 4880 wrote to memory of 428 4880 msedge.exe 86 PID 4880 wrote to memory of 428 4880 msedge.exe 86 PID 4880 wrote to memory of 428 4880 msedge.exe 86 PID 4880 wrote to memory of 428 4880 msedge.exe 86 PID 4880 wrote to memory of 428 4880 msedge.exe 86 PID 4880 wrote to memory of 428 4880 msedge.exe 86 PID 4880 wrote to memory of 428 4880 msedge.exe 86 PID 4880 wrote to memory of 428 4880 msedge.exe 86 PID 4880 wrote to memory of 428 4880 msedge.exe 86 PID 4880 wrote to memory of 428 4880 msedge.exe 86 PID 4880 wrote to memory of 428 4880 msedge.exe 86 PID 4880 wrote to memory of 428 4880 msedge.exe 86 PID 4880 wrote to memory of 428 4880 msedge.exe 86 PID 4880 wrote to memory of 428 4880 msedge.exe 86 PID 4880 wrote to memory of 428 4880 msedge.exe 86 PID 4880 wrote to memory of 428 4880 msedge.exe 86 PID 4880 wrote to memory of 428 4880 msedge.exe 86 PID 4880 wrote to memory of 428 4880 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fdff6044e267418fa1bad48504e1c537_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba9d046f8,0x7ffba9d04708,0x7ffba9d047182⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,14681779893367995004,1749857829494797039,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,14681779893367995004,1749857829494797039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,14681779893367995004,1749857829494797039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,14681779893367995004,1749857829494797039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,14681779893367995004,1749857829494797039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,14681779893367995004,1749857829494797039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,14681779893367995004,1749857829494797039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,14681779893367995004,1749857829494797039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,14681779893367995004,1749857829494797039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,14681779893367995004,1749857829494797039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,14681779893367995004,1749857829494797039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,14681779893367995004,1749857829494797039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,14681779893367995004,1749857829494797039,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,14681779893367995004,1749857829494797039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,14681779893367995004,1749857829494797039,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,14681779893367995004,1749857829494797039,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2408 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5039971f7e97fd81f777a5b192d581421
SHA136d6f9c02a1dc38d87bd3f64f6ba5d6d286743e0
SHA256add42978c854676e264010555b4306cd41655a779dd0195c87907966ef5c811f
SHA512c56589a5d17e7c50432d2f613629c350727be87b912ec2a6f51dbcc0238a6f3f9c356a2fd92c4ef8b3e9af2b1d36a174fcca546d54ba11ddb613698c841b9ca2
-
Filesize
2KB
MD56aa4f9b12d21c9c5ed11bcdc2c5b203f
SHA1321572deb0a1bf8a6b4e0bda1b0e64a6837d9238
SHA256bf26d9043730dddf7d58bd9a1d952a9af35ef7c7ce1ae6f3ceab895c7bfc4d03
SHA512331a6644aedd85f94813d73835e23b6d8a041504650d8d1861c0226e8c597727b4eea23e6b948be5a23aa7afc834ba33b6ab187764b48f8af3e65916db06f2f0
-
Filesize
2KB
MD51faf6b5cb94221c328d68e5df8294b1f
SHA12f08aaed058601d586c84d9595710b1d18addace
SHA256070b2bc0de0264b3dd5f1d9ca13fd3ce6b4713629a2aa5a084ba776c52419fc3
SHA512174aecbf093c60f24db21e659d3ab88cd95f3bb9bd2bb1ca6213e97b3e6d8c8ff4b7a6604f22705b2edf94698d80fe608bb51ceeea06636f7e648ba1ff245a85
-
Filesize
5KB
MD57d6fd70622f05da3964aeb3c21d1e97c
SHA1b1c1908cf8bc92464c0e63d7a8d7fea01dc9fdcb
SHA25616d8d9db51421f2fbc25f34c79bc6cf6db422b93f88766d0400f2cff5c3ef953
SHA51205f181601ae80976642b06a11b3a28d5efbc08307d0f7baad982fa885cead271649fbe4ec278b24168e5f508bdfd81dc097e56da4c007cb306ee3da950587e8c
-
Filesize
7KB
MD521a0e9d38abd4b1eb577f88c1c3a31a5
SHA11633d425b067ec37a041ae03927253fae6bf7b8e
SHA256451529be13be9df42ce51951d977d6b0a832418bb8e8deecd7eaf5ff232d407a
SHA512b4e2049f510f89bc8c74b50f483d1456f6f72ce1edcb619dadc8ff8304c2d5527a5fbdf755b9716b7ca7d255fb5d8064d36fec17bdce94b6ff15e6b2dec08e0e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5446040bdf8c82c77da1eebe9d6f4cf21
SHA1643e9524e27078d25dfea306bf6c46f5e2e7e11a
SHA256ad85b8ffa87da0c595f733d0faf9fc2e23e4ba48d3cc36cce70d51af8a94b402
SHA512d69a0fcfa45a50775962b50359e91cbb5039c22dcdfead3f05be341b4d759e7af2fa29ff402e3372a5f1aa71dcbd7ecd4f984c69bb8804f9bbc69b95ebf1c455