Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2024 06:50
Static task
static1
Behavioral task
behavioral1
Sample
16995baa71a6d2c90a21ae21bc796347_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
16995baa71a6d2c90a21ae21bc796347_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
16995baa71a6d2c90a21ae21bc796347_JaffaCakes118.html
-
Size
118KB
-
MD5
16995baa71a6d2c90a21ae21bc796347
-
SHA1
863609647fa7acfa1bf0ab8016249a9a80f4fbef
-
SHA256
0dcf4ec8c88f3739bcadb86cde9018aab47056e491809defcddea678a6919df7
-
SHA512
0177c7f0e2e1eca208add6604846479d1d11371d012a5345cae8771dc57075c74146f0953d7c7cf6384d3da3dcaca2b0b6031d8d1e450be8b49f24853560c7eb
-
SSDEEP
3072:2rGymOAcBWyeAcBNpBeNpbOnS4A6fCaunMRgFEMtZe6ayMOJqj7X:2rGyJAcAyeAcTpBeNgn8nMR5MtZZW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 2280 msedge.exe 2280 msedge.exe 3648 identity_helper.exe 3648 identity_helper.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2280 wrote to memory of 740 2280 msedge.exe 82 PID 2280 wrote to memory of 740 2280 msedge.exe 82 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4420 2280 msedge.exe 83 PID 2280 wrote to memory of 4108 2280 msedge.exe 84 PID 2280 wrote to memory of 4108 2280 msedge.exe 84 PID 2280 wrote to memory of 940 2280 msedge.exe 85 PID 2280 wrote to memory of 940 2280 msedge.exe 85 PID 2280 wrote to memory of 940 2280 msedge.exe 85 PID 2280 wrote to memory of 940 2280 msedge.exe 85 PID 2280 wrote to memory of 940 2280 msedge.exe 85 PID 2280 wrote to memory of 940 2280 msedge.exe 85 PID 2280 wrote to memory of 940 2280 msedge.exe 85 PID 2280 wrote to memory of 940 2280 msedge.exe 85 PID 2280 wrote to memory of 940 2280 msedge.exe 85 PID 2280 wrote to memory of 940 2280 msedge.exe 85 PID 2280 wrote to memory of 940 2280 msedge.exe 85 PID 2280 wrote to memory of 940 2280 msedge.exe 85 PID 2280 wrote to memory of 940 2280 msedge.exe 85 PID 2280 wrote to memory of 940 2280 msedge.exe 85 PID 2280 wrote to memory of 940 2280 msedge.exe 85 PID 2280 wrote to memory of 940 2280 msedge.exe 85 PID 2280 wrote to memory of 940 2280 msedge.exe 85 PID 2280 wrote to memory of 940 2280 msedge.exe 85 PID 2280 wrote to memory of 940 2280 msedge.exe 85 PID 2280 wrote to memory of 940 2280 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\16995baa71a6d2c90a21ae21bc796347_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbe2f46f8,0x7ffdbe2f4708,0x7ffdbe2f47182⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13743741263420236660,278104531145619801,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,13743741263420236660,278104531145619801,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,13743741263420236660,278104531145619801,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13743741263420236660,278104531145619801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13743741263420236660,278104531145619801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13743741263420236660,278104531145619801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13743741263420236660,278104531145619801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,13743741263420236660,278104531145619801,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,13743741263420236660,278104531145619801,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13743741263420236660,278104531145619801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13743741263420236660,278104531145619801,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2912 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13743741263420236660,278104531145619801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13743741263420236660,278104531145619801,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13743741263420236660,278104531145619801,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
897B
MD578ef4af043f0724b8d30f1bafd8cd3c5
SHA19ee4aff509614c8f1d875c3c268e898e998bccc2
SHA256546a2e7c3aec2f5550502a0ce8292adb50ad61bc1c0930121eace16ba9b2886d
SHA5126bd4939e1f2d3b12f832a5485a8c4bb097c90551756ebb8e660ebdaee4f5518d8303039cf6e95278d84309f5be9311566c944e743ff8648989fc5469a1a157ef
-
Filesize
5KB
MD5b7909b77dfaf933a4dd0e88983714243
SHA1dc2b82413e1791343d5dd2d7e256962c42666e7d
SHA256ff3d32381fb5473584faaf5f62988248badd6685c0e0ef5b2f7a92d0d39340d4
SHA512777ade37adaad13b8663a9af014383accb42adf0e6857c1d3e9d24065fee6200fe83922186e4e0b869c0459018339aebcbd12e3225d0df0bfc6f651bd8eb5900
-
Filesize
6KB
MD586dd02ff18c486494d76d691f7bcd3ed
SHA1cbfbb7d8aa08c9c5c4646f273189360e81eedec8
SHA2569602247a75dfcef668f4712593967a4659452218ff14d5a8cb81d3bfd2c83a6f
SHA51202bdee8ff16366b5ee113088ee590d63d0021a3cfbb9c3cdc8bbd8eb2ca5c1130765857eefbee2cfc72ae0ddc9d9099daf607d2b3d17383ac72247daeb9ed077
-
Filesize
7KB
MD58a5437222b289924619aa4446001522e
SHA16e456aea521b0b382db4ba788a87088937c926b1
SHA2563f042ace683385f4e10037308ed0c312c68f883eb390a9824465b9ac69eb5a69
SHA512b44cefbef6e02d31ea826e0787b912a11a9f2e65741ba02d666ed3c42e1fbfb78b9297b0d7d118089516dbf714b692d3b4bc20b18b7c2d40986e7d842658ac12
-
Filesize
6KB
MD53746b07edd08adb9e280e484923dab54
SHA1c0e318e6cd0fd23be372c926a10cb8340e58d534
SHA2567eacfa5ffb8e5ef8c1b0e014c02b6ba2c0fc8cd19d06a53522368af06cb23277
SHA512225b0d160b8a46d59f74d4b3a946ab782d00694cf2dfd9f690897eedbc70c53d9fcae873016f63ae8ea872d48063fe92fe424e12225c64a1d276962342a4f010
-
Filesize
371B
MD565399cfe99e65a48ac887dfcb84b4917
SHA15e7665d849ef5f62d1c6761d07fd514e38653b1c
SHA256b2d4f53eb3d2162eb33c837c817a73c649656c2b99ae2a3fd39e5448ddf5a063
SHA512df2d429640dbc7a69412b4cee0cefdd0f55099362d79581d230314d89defce777bc76b6bc11c930c47ee55e37ceeb292d8d2bb9ee9c565bee684dca4537dc86b
-
Filesize
371B
MD52a648fa8187db9976a9d72632f56a039
SHA138f3b9f2dbafc00a8c7cf83e0b2878e8117756d3
SHA256f9574cb6d25bfa0746e61e79cc01c4e80928958495199d1f0c1fd9b01a549027
SHA512f3e249c876ad298f2bcb7fcec43f4353e9d8610e0a8d598a42dbaa4ad513b9fce20b4217031fc8321ce6879177db4f2ee6da1ff0cc0d2184bdedf827bd285e5d
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5c53d8f6de96cf4597e4c8ad49e90aaa4
SHA1fc34446c50418940ee776529ae850d6848018334
SHA2564f101b0eae01981cda5db67cdf10b4fb3812d9f472fe1b312a930f466ebc9c07
SHA512e89e41f6d897a7b43a146edded729ea1328f0ad2977f3b2ff8abaec9f3af784799a54a76ec7896dd7aca9c9b5f57b713972252fb247dbcc73dd13c9e57a9bef1