Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 20:37
Static task
static1
Behavioral task
behavioral1
Sample
4ee6d8212c59bf658d03074b3e573ff3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4ee6d8212c59bf658d03074b3e573ff3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4ee6d8212c59bf658d03074b3e573ff3_JaffaCakes118.html
-
Size
57KB
-
MD5
4ee6d8212c59bf658d03074b3e573ff3
-
SHA1
8bbec295b2bf019d8cf33896bcf06aef81f2f0e0
-
SHA256
a96965a5f8e81f000c50ebb16b82fc9ee66bb0def614c51c920f0ded168890cc
-
SHA512
12c7f16403c4a0a8a54c460197ae36ee1a3989a40ac01be9842795c13ee6b88ceca731b9f4e6382a4c342b3c77f271c4cffa84c0546ea774957175b648797535
-
SSDEEP
768:eRYi6dPB1ffs6To+ZVLYBxLtlgAiiOG1N/ESlGpYQ90iaNa1IM9Slx:Q6dPB187+Zmo0ia4P9SP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 4820 msedge.exe 4820 msedge.exe 1604 identity_helper.exe 1604 identity_helper.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4820 wrote to memory of 2164 4820 msedge.exe 84 PID 4820 wrote to memory of 2164 4820 msedge.exe 84 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4012 4820 msedge.exe 86 PID 4820 wrote to memory of 4012 4820 msedge.exe 86 PID 4820 wrote to memory of 5056 4820 msedge.exe 87 PID 4820 wrote to memory of 5056 4820 msedge.exe 87 PID 4820 wrote to memory of 5056 4820 msedge.exe 87 PID 4820 wrote to memory of 5056 4820 msedge.exe 87 PID 4820 wrote to memory of 5056 4820 msedge.exe 87 PID 4820 wrote to memory of 5056 4820 msedge.exe 87 PID 4820 wrote to memory of 5056 4820 msedge.exe 87 PID 4820 wrote to memory of 5056 4820 msedge.exe 87 PID 4820 wrote to memory of 5056 4820 msedge.exe 87 PID 4820 wrote to memory of 5056 4820 msedge.exe 87 PID 4820 wrote to memory of 5056 4820 msedge.exe 87 PID 4820 wrote to memory of 5056 4820 msedge.exe 87 PID 4820 wrote to memory of 5056 4820 msedge.exe 87 PID 4820 wrote to memory of 5056 4820 msedge.exe 87 PID 4820 wrote to memory of 5056 4820 msedge.exe 87 PID 4820 wrote to memory of 5056 4820 msedge.exe 87 PID 4820 wrote to memory of 5056 4820 msedge.exe 87 PID 4820 wrote to memory of 5056 4820 msedge.exe 87 PID 4820 wrote to memory of 5056 4820 msedge.exe 87 PID 4820 wrote to memory of 5056 4820 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4ee6d8212c59bf658d03074b3e573ff3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb315846f8,0x7ffb31584708,0x7ffb315847182⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2288,12435646519357737558,15648383974685080451,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 /prefetch:22⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2288,12435646519357737558,15648383974685080451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2288,12435646519357737558,15648383974685080451,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,12435646519357737558,15648383974685080451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,12435646519357737558,15648383974685080451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,12435646519357737558,15648383974685080451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,12435646519357737558,15648383974685080451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,12435646519357737558,15648383974685080451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2272 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2288,12435646519357737558,15648383974685080451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:82⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2288,12435646519357737558,15648383974685080451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,12435646519357737558,15648383974685080451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,12435646519357737558,15648383974685080451,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,12435646519357737558,15648383974685080451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,12435646519357737558,15648383974685080451,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2288,12435646519357737558,15648383974685080451,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5d97c550d597440bf9bb35f9982d3e486
SHA17e7237d096f4de90960c8efda910b2dfedb55087
SHA256ea371e18fe4ff507ef65c1c7a2ff53aee6649ba2b2f6929f523c071dcb7e1259
SHA5123a261816b5e953478a3a498cfd3965fd24716def56c19c9dae4f88c8453f3ff84628d7cfe73e555c2a9fb45512dfdc3f8d327899752eb319a13d7adaf73e49be
-
Filesize
2KB
MD5195512feba45fadf5a38eaf145b62bdd
SHA1f6ed10d0079bd1bfefbdbdafd7e3c5027b833c51
SHA2562054aace7f7d6c663b955ba9dcdc363532995a47d7d23200371589a4eea4d87e
SHA512a977ec72bf37639e86a986df11ffb6665acdd9dcd8aeadf28d65fda8e3990e2e719612cb597b25f32dd2688ab20ddfb12cef55879f226b898539bce68267a277
-
Filesize
7KB
MD5b73cc75672a7b411fddaec3d7a77f79c
SHA11d548c64850a2ce26f42bc4b4eefbca87b0ae253
SHA256e999298995a90dc8aeb706fce09bcad1b32914d876683340753ed5ff18dd15f5
SHA51280d2cb47a6aa5cdbccc81787740db493f6c906c402f8d5ac5279e7a045b3efe87203a876cf3e0090900e13ab2a8bd16220ac606373a5c9e5c087d903ee346f57
-
Filesize
7KB
MD565759b72611af8e9daa44b205cd33c82
SHA1c5bb5d7c5c657b10e41b509dcf117fdefa04f112
SHA256150995d796c0880ae74063be9b47d18fb211c3b4f16f3d1681b445346b4f25e1
SHA512c6b76745ea1fd72c1fe6e97a119d64131d0d45a4c6167825abb858a6a5511a24735708c12396c3447df59b49f3f7b7d56c6d773a6df4950efa751d49a9173dcd
-
Filesize
7KB
MD53affc0c98fc922cbdf3938c0665510c7
SHA17dd0900b653b34ef303d1a0cd68da43965eccaee
SHA25661d432444daf86823841e86555efe9a6ad704afac46542af65381e21f5f28d8e
SHA512240824a57a9424411bc05e101e91d1e56020244b783c05d3ce6c5a9b0913a1a48ca7978af54ecaf4a7e75a5ee4667216d8edd017c966ed4976fa1cf094bcf447
-
Filesize
6KB
MD589e1d92ac3a4f95e57647ba40892e41d
SHA13c3e30980af80de3c048be510972dca98c4f8255
SHA256563943b666299c97444cebaeea2065cc607faf4c369e14cff122e96e9dab3ec1
SHA5127112ce1fbf64a501ccf5f90257c9eae6441414b729458516072452ecc6aa696c9e1804fc34d3f5ed62fe34d533dc51df630bec6ee4c3fef31842231930141308
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5126da153666731888cfc76955319b4b3
SHA1e1af256aa121fe2ea2040dc5178a47c4ac212edc
SHA256e3588272d3e2b72bd1a0bb77c124d970bee6cf6d81f5e942707688d09258d5cd
SHA5122cf5c31830889793e10785f25fef4827339de48f1eca5bfb4a8ccdc5ae72f0e82a26474eb9e46d12b77d548c1e8976a5a21432c13f4b8043ba15ac15a2e1a8a3