Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 09:07
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1ac7ecf6408196f3cb8a0275ad336684.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1ac7ecf6408196f3cb8a0275ad336684.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1ac7ecf6408196f3cb8a0275ad336684.html
-
Size
58KB
-
MD5
1ac7ecf6408196f3cb8a0275ad336684
-
SHA1
7dd1634c446ff38f5dc5cb30fdb501cceac04c4a
-
SHA256
f4098d83b204474eb05062ace0084690249142b617bfdaa4d0544ead321d57ff
-
SHA512
f716e99e1adbce13d6bf5dbdc94e69383d10cf13f28f7867e7558680ec624790ce6beb890bafd25bfb79eabee4dc864d1055f3259b2c26fad4988faf00197536
-
SSDEEP
1536:1n4XKy4KpB3fNSXzywyE477QxV493QQ83q2zyq/q2kysZ4lZ8nNZnyBuMmn0FlSl:1nm4KpB3f0gYl/YzFBZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 452 msedge.exe 452 msedge.exe 2756 identity_helper.exe 2756 identity_helper.exe 6052 msedge.exe 6052 msedge.exe 6052 msedge.exe 6052 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 452 wrote to memory of 3424 452 msedge.exe 83 PID 452 wrote to memory of 3424 452 msedge.exe 83 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 2900 452 msedge.exe 84 PID 452 wrote to memory of 4432 452 msedge.exe 85 PID 452 wrote to memory of 4432 452 msedge.exe 85 PID 452 wrote to memory of 1372 452 msedge.exe 86 PID 452 wrote to memory of 1372 452 msedge.exe 86 PID 452 wrote to memory of 1372 452 msedge.exe 86 PID 452 wrote to memory of 1372 452 msedge.exe 86 PID 452 wrote to memory of 1372 452 msedge.exe 86 PID 452 wrote to memory of 1372 452 msedge.exe 86 PID 452 wrote to memory of 1372 452 msedge.exe 86 PID 452 wrote to memory of 1372 452 msedge.exe 86 PID 452 wrote to memory of 1372 452 msedge.exe 86 PID 452 wrote to memory of 1372 452 msedge.exe 86 PID 452 wrote to memory of 1372 452 msedge.exe 86 PID 452 wrote to memory of 1372 452 msedge.exe 86 PID 452 wrote to memory of 1372 452 msedge.exe 86 PID 452 wrote to memory of 1372 452 msedge.exe 86 PID 452 wrote to memory of 1372 452 msedge.exe 86 PID 452 wrote to memory of 1372 452 msedge.exe 86 PID 452 wrote to memory of 1372 452 msedge.exe 86 PID 452 wrote to memory of 1372 452 msedge.exe 86 PID 452 wrote to memory of 1372 452 msedge.exe 86 PID 452 wrote to memory of 1372 452 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1ac7ecf6408196f3cb8a0275ad336684.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb8,0x108,0x7ff9de8c46f8,0x7ff9de8c4708,0x7ff9de8c47182⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,9009243340254131139,10604758450590998630,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,9009243340254131139,10604758450590998630,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,9009243340254131139,10604758450590998630,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9009243340254131139,10604758450590998630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9009243340254131139,10604758450590998630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9009243340254131139,10604758450590998630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9009243340254131139,10604758450590998630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9009243340254131139,10604758450590998630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9009243340254131139,10604758450590998630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9009243340254131139,10604758450590998630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6468 /prefetch:12⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9009243340254131139,10604758450590998630,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6484 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,9009243340254131139,10604758450590998630,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6836 /prefetch:82⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,9009243340254131139,10604758450590998630,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6836 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9009243340254131139,10604758450590998630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9009243340254131139,10604758450590998630,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,9009243340254131139,10604758450590998630,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3568
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD59100546aa310a0ac6e4877ad0c7f8514
SHA12a1e9590d550d226958e2b94c8138ff59e1d8eb0
SHA25642131424811ecea1a90849cd339a7018c5ef29ee54822b9a0ab40eee83ff665d
SHA512d7512206b8da8710643c1f7e34f82e41d94ac06a23f16139c9d8ded590e5f13213c198a8fac32ffed9e602f8965e046dbfa0f855066d7da93bd4e04a839994ec
-
Filesize
2KB
MD519d19f6d16ee8b72caffff293c0425d8
SHA143dc1b05923288846a2a66caa778f42f9666140c
SHA256713c13bd7215feb56925bb8cbd24ef205858b54855c9ad006f262ad7726bcf5c
SHA512e84b98845e36847192ea7366b6f606762b087d6247b99b6394d45f21e80db5c34b06ae977097a342c6120f7d1e50b2d3ccca011e6747851aa014d81f25cdbc6a
-
Filesize
2KB
MD5f7b0f8989d8be300425d12668bf35e8d
SHA13f0c3c5073d435418505e98bc03a5e3716aa6ac8
SHA2566d909d93092b45b3e8d452e5f05eb413c6db41d9b3739e222f947f8159006642
SHA512c1e6e38123f50bc4885dd3b66e1fb8b076a7d21fc59c0dddd784c7d404aa302c6e195cd7141bd71101aac5afe2060835bd8ac6297406dedd4c9c8160c5f18cc9
-
Filesize
7KB
MD5c944fe2468226429a945795d2c88b3a9
SHA1259e4f31fce0366ca2550f64c921d30afb5783ef
SHA256ce100e3119a33cd5c2696fa55675a198aa5c509b26cf13b91797aa8f68280385
SHA512d7f94898aa92176e703ecbc8e672fe9045caa9ebeb7309c39d2e1c47ea3bf4fbea7e845b5be00e7703f226c3c147994b7fdcf601e1a39fd461894b55409037e6
-
Filesize
5KB
MD5685cc75a938f22b7a401d959f956c849
SHA10bb5a65f8b01722b1e1de0060d6a5d85db882ab0
SHA2560e3f67cd4908b43b6dca99bfd688a54f76ce4b38bd5a4cf91f9a9b678905da1f
SHA512cba19a8cdbe55343ad8edd0248dcc7282ae413bd9f32348df7a7649725f86b0462f3a2181fed36113035886c175516727085f1fb256730facd6eec40bcfa7769
-
Filesize
7KB
MD5bec7d66953d8aa0d4d27ac301e120531
SHA18b9d997444647e683375e91e47f47c857c1bd571
SHA25681e172fdeed0d8d7ce83210ad73d87c38883b3c9f4ff30586ff1ecd13a07414f
SHA5128fff05538c2639dc20556931ed9e424e82d2e13ffeed0d89e98e07df6b591eb826295d2ebe6c66680c365256eefda4ca339ad79334574d2ee5526e13c2e7cac6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD541bcba00de43bf0ef908680a7ca92077
SHA19931a8ad44718e6cbb893a5df837fc90bd8bc4c2
SHA2569d6c67be28e1f0153ba423adb8e4822d38bfb3a177aa75177243c10af006509b
SHA512ab1375ecec19160685fb1c110b91e5873a01360ddba0c6c15692a34f1e17a2266fbe73b989b1bf766ea8db4514ebcc9f984e90b3b71c45eb96d18170521dc268