Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 14:00
Static task
static1
Behavioral task
behavioral1
Sample
3a650d9720aa9fa95faea5f8e29619eb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3a650d9720aa9fa95faea5f8e29619eb_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3a650d9720aa9fa95faea5f8e29619eb_JaffaCakes118.html
-
Size
71KB
-
MD5
3a650d9720aa9fa95faea5f8e29619eb
-
SHA1
4c1f75862df46eee3b5644ac646da60dc28e88c8
-
SHA256
b76ac0badbc04c2e70685f6e252acef98db1859133ae4ac61c093a07600aaddb
-
SHA512
d34c78b3b9013feb721b587d6e98699dcc61cb4bcce818c51dda271caf7e7499750e5f60c77dac4663b850f70b5245c6df55dff631fc2326a4813005e1caca56
-
SSDEEP
768:Sc0hqGbIiP//mdvsYSgLj/DVWmTMYq8Dfr7Vq3t40MSxjfLD+PHgkyMrj3DZ+/VI:SBpIk/OtnwOHuESfucg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 3104 msedge.exe 3104 msedge.exe 2592 identity_helper.exe 2592 identity_helper.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3104 wrote to memory of 4704 3104 msedge.exe 83 PID 3104 wrote to memory of 4704 3104 msedge.exe 83 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 524 3104 msedge.exe 84 PID 3104 wrote to memory of 3528 3104 msedge.exe 85 PID 3104 wrote to memory of 3528 3104 msedge.exe 85 PID 3104 wrote to memory of 3136 3104 msedge.exe 86 PID 3104 wrote to memory of 3136 3104 msedge.exe 86 PID 3104 wrote to memory of 3136 3104 msedge.exe 86 PID 3104 wrote to memory of 3136 3104 msedge.exe 86 PID 3104 wrote to memory of 3136 3104 msedge.exe 86 PID 3104 wrote to memory of 3136 3104 msedge.exe 86 PID 3104 wrote to memory of 3136 3104 msedge.exe 86 PID 3104 wrote to memory of 3136 3104 msedge.exe 86 PID 3104 wrote to memory of 3136 3104 msedge.exe 86 PID 3104 wrote to memory of 3136 3104 msedge.exe 86 PID 3104 wrote to memory of 3136 3104 msedge.exe 86 PID 3104 wrote to memory of 3136 3104 msedge.exe 86 PID 3104 wrote to memory of 3136 3104 msedge.exe 86 PID 3104 wrote to memory of 3136 3104 msedge.exe 86 PID 3104 wrote to memory of 3136 3104 msedge.exe 86 PID 3104 wrote to memory of 3136 3104 msedge.exe 86 PID 3104 wrote to memory of 3136 3104 msedge.exe 86 PID 3104 wrote to memory of 3136 3104 msedge.exe 86 PID 3104 wrote to memory of 3136 3104 msedge.exe 86 PID 3104 wrote to memory of 3136 3104 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3a650d9720aa9fa95faea5f8e29619eb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6dc246f8,0x7ffa6dc24708,0x7ffa6dc247182⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,5336910998751754934,7061503862682243888,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,5336910998751754934,7061503862682243888,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,5336910998751754934,7061503862682243888,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5336910998751754934,7061503862682243888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5336910998751754934,7061503862682243888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5336910998751754934,7061503862682243888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5336910998751754934,7061503862682243888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,5336910998751754934,7061503862682243888,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 /prefetch:82⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,5336910998751754934,7061503862682243888,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5336910998751754934,7061503862682243888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5336910998751754934,7061503862682243888,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5336910998751754934,7061503862682243888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5336910998751754934,7061503862682243888,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,5336910998751754934,7061503862682243888,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD509042beb74d0b5234bfa9a03421cfcd4
SHA1ea49d1ae61b03415e71491830fafcda7e1f5acf3
SHA2563b63d4bf70758d2e4559b191831340cf2117b0ff81c5fdec3efc30c9575c04ca
SHA512e7cd0e051e8dfe7237995c338d7fc6034dc5acb8d7edd9a400e86bcc0040313d8ab6548af7e46daaf522d6715ae904024fc75120a06ef66723702fe969cd6af0
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
400B
MD502e18324dd71f32611b2e76e3be6e640
SHA1013eae59b873498905cb2c83383dd0688dabe6c0
SHA256a236da5e3e45542afb1c0d6a53fc42e22e2d1eb703c2b8a1bdfb8da5bc24aae0
SHA512a7bfe10932211aacfbfddcfe25d83237e96d2b377799989e2e72f5b89990bbbbe363d775b45ba1c8fcafefe3a12fe64feae153d7fcdacca000bbe988b73103ac
-
Filesize
6KB
MD50fad1292d2cf14027f51e2a227047fc8
SHA1da2d99b6df5fd8c398a0cf57c02143e64f1dba7d
SHA25608f9a91253709a99d188b5d756ab066cf10b19f3baaed83ba0c7a442ef032810
SHA512e6b2a4886254f5e8b25486f66656a8f6259ff8a0291c6bd28645d2afa0678ffb545f7955a3d2dabd4a9d48d26fc5200e75482e5a7d3e6c1573a21805d8938cc2
-
Filesize
6KB
MD56043dfc63e356e7deca17853d4fb9991
SHA1d5c3b9ae67bab7e88d758500e0243ad4ffd60407
SHA2565c41de82661bab9161609a639ad53a840ee5d912067296ede84a3273a24303c1
SHA51289f4e3e5e75d9a6b23e2ba69e61cd1ad4881b787b963f2d3a9ef63a2c3832ce0b779afc4696fc7cc1aff96ab425b13cd33b7b99b98569ef09b146918b1f3a6b8
-
Filesize
6KB
MD55aec712cf30a03b8c7a9294963c98e1c
SHA1330771703f9a6f8527fd6a79cbc91334693c2d3e
SHA256603d291da3ae41fd838610c08716972996cbbc469b48fa6631ecaadaf536cf17
SHA5121c2b1a80e75617bc37878bca615d0a6e74277c4571c7552565fd0bc7993621a471e833bf0a4f86ebbf2b572e967788ef2153123a3d26a4f3fe105ecffd0c4fcc
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5c0fe08362304cb49c705d1bb66ad060d
SHA1bbf8c977de1deee1713fc07a922db42057578183
SHA256260c3975bd2c6ab70879ee973b4c4ca818270d358ba6df7eaac5de4248bc52dd
SHA5125c2abfef815c7c014cf813d171e5e4c6ace9b47484bfab8c7e3d10db56de117da9f270972a8bba76bc5ed026dbc8a0d8d01d16c62465d0fb84b06fa1c775acb1