Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 13:10
Static task
static1
Behavioral task
behavioral1
Sample
47ff615f00d99b05016ae73717242758_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
47ff615f00d99b05016ae73717242758_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
47ff615f00d99b05016ae73717242758_JaffaCakes118.html
-
Size
125KB
-
MD5
47ff615f00d99b05016ae73717242758
-
SHA1
99b63cac07c0a02e312a2bf4d29ed4667ed308ca
-
SHA256
70d8df0cfc0601f2688fdb5b007aab4d34b1f37c180b8c7aa1110b8041132fb3
-
SHA512
4af97020f931b93fae35cae0794953c952b198bb3b4c142bf029561d14f7e0f1c2f30b54bac31fe5743698f3f5e2f9b9b9047bf6180f0a9878686324bf0c2310
-
SSDEEP
1536:69JEEJXF9BxmCDrnDD9BVZfkj/f5w4w+iF:6lJXbXmCDrnfVZfF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1724 msedge.exe 1724 msedge.exe 3356 msedge.exe 3356 msedge.exe 2516 identity_helper.exe 2516 identity_helper.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3356 wrote to memory of 3568 3356 msedge.exe 84 PID 3356 wrote to memory of 3568 3356 msedge.exe 84 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 4792 3356 msedge.exe 85 PID 3356 wrote to memory of 1724 3356 msedge.exe 86 PID 3356 wrote to memory of 1724 3356 msedge.exe 86 PID 3356 wrote to memory of 4192 3356 msedge.exe 87 PID 3356 wrote to memory of 4192 3356 msedge.exe 87 PID 3356 wrote to memory of 4192 3356 msedge.exe 87 PID 3356 wrote to memory of 4192 3356 msedge.exe 87 PID 3356 wrote to memory of 4192 3356 msedge.exe 87 PID 3356 wrote to memory of 4192 3356 msedge.exe 87 PID 3356 wrote to memory of 4192 3356 msedge.exe 87 PID 3356 wrote to memory of 4192 3356 msedge.exe 87 PID 3356 wrote to memory of 4192 3356 msedge.exe 87 PID 3356 wrote to memory of 4192 3356 msedge.exe 87 PID 3356 wrote to memory of 4192 3356 msedge.exe 87 PID 3356 wrote to memory of 4192 3356 msedge.exe 87 PID 3356 wrote to memory of 4192 3356 msedge.exe 87 PID 3356 wrote to memory of 4192 3356 msedge.exe 87 PID 3356 wrote to memory of 4192 3356 msedge.exe 87 PID 3356 wrote to memory of 4192 3356 msedge.exe 87 PID 3356 wrote to memory of 4192 3356 msedge.exe 87 PID 3356 wrote to memory of 4192 3356 msedge.exe 87 PID 3356 wrote to memory of 4192 3356 msedge.exe 87 PID 3356 wrote to memory of 4192 3356 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\47ff615f00d99b05016ae73717242758_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffa2a4e46f8,0x7ffa2a4e4708,0x7ffa2a4e47182⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,17559314024068243351,17270235506673004131,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,17559314024068243351,17270235506673004131,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2528 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,17559314024068243351,17270235506673004131,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17559314024068243351,17270235506673004131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17559314024068243351,17270235506673004131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17559314024068243351,17270235506673004131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17559314024068243351,17270235506673004131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17559314024068243351,17270235506673004131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,17559314024068243351,17270235506673004131,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6700 /prefetch:82⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,17559314024068243351,17270235506673004131,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6700 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17559314024068243351,17270235506673004131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17559314024068243351,17270235506673004131,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17559314024068243351,17270235506673004131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17559314024068243351,17270235506673004131,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1256 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,17559314024068243351,17270235506673004131,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5af0c805209e6e8202b4117c9b74587a1
SHA1573e85bfe16197c2c4c91992feabea481ca519c9
SHA256c01865b7f86b6789f6e629662c1dd656cabcd69fad9e8dabcd2718320a0d5054
SHA512db24da71d263ad2dd6ba165e9876079f04925b91aead2bbfa4eed5bf6870fb8505d1921208280d2d14653d4ec9f3b0a589fd7a952cc4dcee5554f1d753947053
-
Filesize
1KB
MD574f8b6b611a36dfb37a38ffbe32c9219
SHA1a2aa155e5e2b66dfd9e988af3f69ee70d4915754
SHA256fc1b9f1de566e5bfff2e7b9325d57d15d2c74807ef55454845f0456a2b4dda13
SHA5124770c94ae4e61f1cb6bb6bf9ca6dec08f07ff32c656cc07de7cac26bbbfac4914c9d898e981b601c50f6e65970eed7323222c3c42d4e59da3cee9629af65f19a
-
Filesize
1KB
MD58312846fc463f21bf3866fec89c6a70f
SHA140c3d05e92ba9f0fd8fa07f08b74690f259b11d9
SHA256202378881db3cc55a861882c358afea6e5ca399c45e1e3e4155037d04f2fd9e1
SHA5124b42ef69ed88241b0bbd1b86cee26be502d408295520c3d7fb822a54588beb8a5c9167f0fb93da3c3acb45d2005a394e0e442a6e538e242cbff2a55e934fd52b
-
Filesize
7KB
MD557a13e1c956892f1692b53ca4051dd61
SHA13334ca3267833e24a1e30410ac94a28536ac33db
SHA25615809fb8df49d1583d1771bd6f911334cf97c45e93eccf4c80c918c219afa30c
SHA5122e20f22e42ecfe6215ac89d81dbba743a608b9e17bd23a670c68ee242229018010ce6e2f23d554e22f00d6a1c4014442cd5f79621658521a203c5dd46d74e27b
-
Filesize
6KB
MD5268ed62230c3ccf2ad5711e9d184c85b
SHA17f150e99081e69b9e00515c15eaf976e2670478b
SHA256f5c469b679ffd41b2f0af07969d2269ed2a6a315448a9c73f1e1b71590ac619c
SHA5120511c44385feb3846f26a3c3e1ee40af58f51261281ed6bd588718a65b7fbf780e8f1a60c6a52d9e7fda2115b0e437a45c1391a1134a44a7f300e980ab27c95d
-
Filesize
1KB
MD5ea91974436c02d440617b80ea2d0c37f
SHA1af2246b417f7fae761a86da83aebdf607290511c
SHA2569a9839a9e76944be30af1df3657079724c864c6aa18f49b56c9afc9ef0ee3989
SHA51276d5da00a09777c29b0284844e01707c577f19fec231be0cb32864f0b65c19c51bfa51da9784b77c3dd4efb187a54dac39523d403d259332947042d486bed26b
-
Filesize
874B
MD546f3aa48c869d33723bd184b4dbcd993
SHA15154a88928efeb2788ca12b1bc6e198be4ae8bab
SHA256298938d4dab4b7cd070b2f90229a35277019b23ed09f2fc488d7291d0878e401
SHA512fda31951a96501c6402d4a39873efbc8bd5357627bd3cffc25fa507d192379f8efe319bdafbeb06d14a5ea89dd7b4bd3ac340dbe2403536ab9981693d24e7584
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e0b2f2da244ae27f8fec613c4ebe44c0
SHA107605049a352e0bfdcc71258e6d6af723785ea8a
SHA256f3bd01c146faad1ba662e0d0462b760393b868f2258845b2485ae7507049b64d
SHA512688f9e3368a385c9604b906a7d63667ad48588d7ec8c3ba462457f830c25f27705f03a72abda609255ba5ecc84d9e0a1f58fe8cef1ca5e72b43cad0642084f24