Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 22:42
Static task
static1
Behavioral task
behavioral1
Sample
612c0acba46312f73d73401b9537e1ca_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
612c0acba46312f73d73401b9537e1ca_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
612c0acba46312f73d73401b9537e1ca_JaffaCakes118.html
-
Size
17KB
-
MD5
612c0acba46312f73d73401b9537e1ca
-
SHA1
6408a934b6562a61b4b9060b3d6297a7105f72d2
-
SHA256
371f9c9ec0f6d527add315ca5397a8a32f70c2332ae773c95dbb1cfd2a03c98f
-
SHA512
dc906194b47751fca5eda5e5509b242323d20985cb84c8eaaa562565ffa3d28f3bbde4a06bca039709fc790d50f8b602d8cac36cb091577c1b9066e095235bc5
-
SSDEEP
384:WU1cyKD2c3FS46WDCCHSgAdR8S6NgumZnP6V:WU1M3oDI3Ca+nK
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422406808" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60f6b80c07abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000e9e11385de5491fa4ff3c710ba03417c898ff74ec74b6cb19c5854022033bf30000000000e8000000002000020000000e637113dac8491cb69aa246fab8696ba69ed873473d39f5ac2b644093125c7c790000000a9c9e4e71591b18cc782c4ba0d1802fd11442991cbd0c1817a0394e529a5680b436e224eb0b0f47149521db5f7cd0a545206fd180ea833832f414c4356cdd7273b5f35c04b49c7e931c9222aee635972f38d4bc9aa96b2bfeec74d6d3ab6f02e3c12ab275fd1e81ebec52a4479e7728519a3d9d8c62e7292c27c0605ae2487dc3382d09d3e18e64523331c9c55f1a502400000003fe13c2a3a52fa3301b91ae3c643535ff17e0e634da9ace251aca5d76fe06d71e654c2de681be4818416629e1c6dbc0e69963d2efd02a465fd7a8ada3e66a879 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38434B01-16FA-11EF-9BF1-5630532AF2EE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000000e4a9463436d02fc68ab9fcf77a412f5abe6397ffdc4638d3ac8961db5bf0ce4000000000e80000000020000200000001a81a93a3e9eebf1c428d8a18bc96ec421384d057b3bb37bca8cc61c99a5dec9200000007e487b4b92d26f8cdc2f1be6b9b9de073617afd9452375d80f6d2600c496fcbf40000000e86b5e02f6ba2324a275285be9c03be31bd7c93ea708eaf4c0039aabab141a3be7c72d09ee8e2478c67154e899fc1091c62081313fa8ea781130a1b17dd05cac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2108 iexplore.exe 2108 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2108 wrote to memory of 2140 2108 iexplore.exe IEXPLORE.EXE PID 2108 wrote to memory of 2140 2108 iexplore.exe IEXPLORE.EXE PID 2108 wrote to memory of 2140 2108 iexplore.exe IEXPLORE.EXE PID 2108 wrote to memory of 2140 2108 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\612c0acba46312f73d73401b9537e1ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7edde97d8401c04ec0988038037463f
SHA13cc70fc4a434273d5ca70e2764b7e55005ac6407
SHA256d29f858ce9cf84e50032add5f3f5b77982b4706582f71e0a59296be8064820ac
SHA5128019712721477a71ee30471457a5c2c1f73ea74584a5d1ec671b58074131771da849f222643ada352ae53b9dae9367580f8f167b3b1077a599ee04d76add1399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eef6a7e984bc0973fc019ee5c98e3ce
SHA1d29603c992a951e6b9599053e69cb37437ef3954
SHA256dfce5640d2faab4799a57183f3fe3a51136483fe50ebeffd86ccddc1c4597901
SHA51207696a35cc063d1f8f2e1f9f68876ce1f45d11b4470788b1cc3badbd0d25d286b4d1bd0e4da40f9a0af1185a7501c81b18e99dce5b11c42e3a1e6dbffcc7d0d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5829292dd626216b3b97a996df0055466
SHA1b4eb6c3f1bc9bbbc2ee4e82c4b0850fd8b13fc14
SHA25686562a3bf657351bc4dae1c5519bdc13bf9b4564bdd27d8aed971a75ff2e6a70
SHA512c83162964d7813c5feae98ecdfe41dbc31f2c5ff17ecc08064d34d95af9cde6d035c6221218d05ed02139e0e20eada6dbfee4a50fb36f21e6d41b810d78e24b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569817d33670ad141ddb30c833127fb92
SHA13bb356c8923d6f7f718408a9d5550ca9d66bed94
SHA256b4b6bb9549d46c87acc0e639d51c77e65680299151076223c4278fa1ff78bd07
SHA512eec21d64aabb53c4537392bd3ea7ec554db136c83e97f698e1dc6a48b6d9921a0081d076163048c10fa85f84d666567ca20f3db3c1496aff498b71034c8ef270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a9aeb69e5e57ee5bfbe831960236176
SHA13f41380874a497aee7fabe7fc5cdb3b51c143759
SHA256e7e3b48e22712251a96413a8175b530024f7f7c2a0527ba42a758ef6b8521f99
SHA5127266f7aeabeac55811599cceb60c706b08d3f2984819348178ead477d66f773816baafcfde04c5cd41473ae22458b393df20fbb0c12526e59db15f8ead2415c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f449006c75ba06a5986ee4e6fc8526d
SHA1da8e91698664c2c45076d7185792a2df252c4bc1
SHA256598da2eb34338b264898b4bf89288cdf9ad28cd9f72bcf96844a7863af05a167
SHA5120d9f0a9ba2607522ec97742546fa3694fdc2a609351386c6d566abfbf678c474a81d7e15b1989cec0b88e3f8f9b67eb970ee209af4cfd7927305d8006e587c0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564053556fa19424d2b251c3f8d1e40c0
SHA10af60e852ca32eb42719a309c80bb49a0a385c5c
SHA256e1a887c1a776e26c25aad91050a7e6ea2f26c145efffdcee0988ba20fc91cadb
SHA512a1b75821002812bbf5491d7e158bfafa54fac6160f7e210c587b53fe8304b0f6bf367984d26ec5cf866a14d08416faf71e551ea761544e77bd5946ee16c559d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b4f934ca29622ae6fc7ead3a091c867
SHA1eb75bbe23a029f01e8370574e715a3db37d22817
SHA256f14dd7ba7502d195bf4e88c05a273e3993bcf351f6f6a3c40478992a673236fc
SHA51287377476aa89c8242d483db74bd5a5a22ab7403a1fa3e98a1cafd258860ae5bc84e727f7765fb92d6f9aa4db8358b48afca83c43edeb401cbb52c3f25d09f970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a32eb7f152985cd459bcc4be1568c20
SHA195b1a34a116b04d33495ad159540e9b8475455f2
SHA25666ba6df2e074dd94fb647fd154af7ecd1ad75cd49a01bcc6b3194c2d2ad13193
SHA512ab6bb4cc0db2dcb4303c988b4ff89675d628b2a32570c010cc9fd7342c51e8907ba6911ccf29c9fa2bca1a49c731f311c0e883f7bae1ffcb2dbef7a5dbc6dd78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590fccd1a8e5bf0050f4215cf3278402f
SHA1c03c7da272b61a4cb32497bf168d90e844e06f8f
SHA2566e31dd7d51aebc08eb409836d1efeb4aab8badc06a33baf90a4568ed69d703b3
SHA512afc3d38b4067a2ef4bb749c0a9106afa7b80932be3de303ebabf0dc8eab54e26d2479708f397d73a5e5be565bf2a26bd7e52d7ca03e027f7771005ab35383228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ff60b73e5a6569f3d753585c1480d35
SHA1222de2840a41fc4453aa724e314fe2e1752ed6df
SHA2564ccb7b35ae439fad5ddedbe6b18eff50dcc93724d0b0ad1fd7a7e4208d558131
SHA512d88636126cc6f16f5276bc263010c8861e307e002e149f68eb6d2914b7584d87e430a91cfb5c0c3ccde95034d4da28e2df33575746fc217d1a756e910b3d2fde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5463677c3a06c67a6d716014d85636a8e
SHA1cd21381a1e44ebff7c55390190d58bc4e0f6e7d6
SHA25631356cf88763ec380b6d282460ecf72c9026a659ee00113eb74c2264763146f1
SHA51270e10d3116db62d4036c5678cd139e03b1dfaed7a5c5d204178eb4642220c8c2eafa77b69bee3a3b548fbfd9f68fe5db33724dbc17d9855e3c65a48a0cab2ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529855a7befd9fe3f36fd882598cc6703
SHA1fc472ef143a498897947b5e5b70e126026aa7881
SHA256a75022a059a21f2a15349050be1c007ce6f4af6e326505237ea80ed27a2b490a
SHA5128614b09009b65e5ad1a31d4dbd4511475609af1ac3b91a92347893134974cb05661e52b135f9247bd9dcbab8acce97cf569c6737e6713e95dabb27b3ed8b9977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549e35aedb1b9265f217a3774e6cc9dc1
SHA12dae218e5d26f61d91ad7c672a9617ccb1f0276b
SHA256d2ded3cf30d246c773f1d70cd280c42bf32830a3c4694795da69324000f38c7d
SHA512a396f5589dcfaeb44c244b2bb124ee464eecba9b3f7d5ca4e71de11649475c484c581ab7105446ab6d33f7f915c38fa2737a9b48a0836010020c5cd67e87827f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5617411adc415dd83593f54c00ea2fc
SHA100c17b33bce15394ab4b0eeb9b891969de25caad
SHA2560e28067590cdb1edfb251bef0b873a82e166ef7ece6fd23f36e87ef9ba797c7a
SHA512a10ab9f4fc8d34b7a35b58185fbc85615a8a9f86722be420a4a7bb3ef78e258ed7be0b749a80cf4b6e9495b9a5f9130ba8b67c3a84e46a942cab5ea7fcd05019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5241d43f2cbbd0803d2b5d83ebb42a766
SHA1039cfcb23f0cb28629a70e4c9f092c2c5ef4bf13
SHA2565aa3b32d270ea95c470a00d3274de629d273316032e8aa56f2c84429bb41e208
SHA5120c06eda4eaa518ef2e2c206beca4767194709b001f4e54ab5210825b761334632d4c93143368c8b1d99e47b42fa73b7944648b42cabcdad44a8166c33bc8967e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd070f32c8198a416fe878e60c5e0b55
SHA1e74c617b015462a07d0da2f66cab5115bfc7e37d
SHA256c347c5221b06c2ac7b7e8122d2ca85624d2a24bc82a370dd4d5aa6325d8e683f
SHA512accf9edf496ba69fcd6817e453442bf0ec2df7ba51f98e256e2d27b7b05fc0e4c0f67fd8f1f9bf10c5fb8358a524e898b67b43c07875d7d8c2b34a86d4685e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5650bb754c039bb8c0790903dd06eb3a3
SHA141ef91119ce241298814d60718af50e23f87462f
SHA2564c562417404ad1c4359f71d886d0890befe9bfc0bf0dd1f77267b9bce7447e65
SHA512069e84dcf62434ca5f682e99baaa8de745bc544edc33669150a602aeccb8b662b0829463666abf457b3f75d247fc1276fd30486dfb1f3e335c6adde15d7cac65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545b7e4dbd6f26a1372a2cd3765d31ff9
SHA1f560924ec55cf333b94162c056494019a911a32d
SHA256c5a2ed14a8918147af25b15b97febadae3fac722a18514a141d44da2cbad2404
SHA5122276da528de16478a5b5741f3c83ca69a3efed63c23f771a10233d4d4299a06f1aefdfe8aac74df8d5acb2ef259131b6d90ea71a07411888cfd05841f000f924
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a