Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 12:29
Static task
static1
Behavioral task
behavioral1
Sample
71f4594b822eea6196b0a272b2600d19_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
71f4594b822eea6196b0a272b2600d19_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
71f4594b822eea6196b0a272b2600d19_JaffaCakes118.html
-
Size
803B
-
MD5
71f4594b822eea6196b0a272b2600d19
-
SHA1
a13370facd254d8c2bfbf54f9f927c96b3498b26
-
SHA256
c63869df7e962543428466b964240a30bade423c0ab7595c3c4de02561b4cfd9
-
SHA512
a638ea8d149eb1cc09ae500ea18fde6f8a7f7705fc2e661c9ac7549b795340ea274f6af8a193e24b5c8cc83600d790310fd98a7600ba3f0b498ff5de795e8f96
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{722BB0A1-1A92-11EF-9CBB-52ADCDCA366E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007577124df1da744ca96f4265b0b731cf0000000002000000000010660000000100002000000024d729964ed548850a0c37f4d30e1370c90e6d925972e30c45970cae459fd222000000000e8000000002000020000000536e440cc96b74a58eb73e30d666bc4c5587fd3d1ec40f9e84e38bdb91ebfbc5900000009089d4a330dd41321ae5feae31bcd99a78ec1491b549e36cf260be7ff3b733ce410086b5afd4471f1032c2da8dd798488dfe5a4fe9407e886f6ab7e0426968c3ffd7ae89e6d98b3787e2f5849957bb6cd3d48b18a9547945754baac53362a6937ce023f47c94d31bcc41abf08c8a0b0701934b93abb756eed4ed7344aa428ecfdb2a550a935f41ed0a0ccedd8cb3076240000000ce468cdd8db7e3f183bb69c016b7027f2c7878b3c7e5879a19c2b8431ad005c60f36d812daacf60d9ce789bb48daf4a820accd4bbb34986d064b33abcab2a6d7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007577124df1da744ca96f4265b0b731cf0000000002000000000010660000000100002000000097cf04d999d671a1dcfb8a392a71022cd238bfe74b73c960a3d261f7a8cc4a0a000000000e800000000200002000000069ddccf0bd7874828a939e5d37f076e52c0a2a5e01dd7a99543d521ad83b5db020000000648bec2421781dd60c3fa41c080da36873741f7f5f271faa1d1973ef6e00fd214000000049cfd9473c94f0b146084cf60091102b05472fa06ee01e3aa26ee3cf02e0a61d76e12916c759b26992d608f8f197390e0fbc433de1133f2bc1f0d83278a407be iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 909277369faeda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422802044" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2516 1760 iexplore.exe 28 PID 1760 wrote to memory of 2516 1760 iexplore.exe 28 PID 1760 wrote to memory of 2516 1760 iexplore.exe 28 PID 1760 wrote to memory of 2516 1760 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71f4594b822eea6196b0a272b2600d19_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597bac683449cf81c82bd75849c8a167c
SHA1190ee811037bcc7b5f73c81729f276e6788724df
SHA2561be6f7d628dde337d98a8297ba3477a9e1588d23b4b4bd64b181474736207788
SHA512c545fe3b3d4874b408034a3edac8433863ae3b43005e8eedaf5d8ec17017a10781eca8d15ce6e40d809f89bb2ea28a936a13ea33a01a936dd4de88cbaa00687f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5775e41f31029568d4c1370754b410a87
SHA1b0cbde5f0d714e2938d0e96c20eb4bc45d918fce
SHA256b825b22010dfabcb0b395d152d8ede99b67d9a13ced35ffc33a0c249c0fadf73
SHA5123cf82b01ceea222cc70b178945c4ec97a67eab6fc3252e313fe42930c53bb2f99e9f58a341d3731e3774367c3ade79524bd2ff364d1953930749ebf2af578a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb0500aea4a480fc4e36de22ce0d2415
SHA17ccaaf9567abd270bb6ac09ed5b1fb0ec04cea60
SHA256c3999f9ba769586dd622663a3be7c67939c7edaf6513dcbdd45caf8809c60c56
SHA5121e55a48b19f05811556e43da0049676c572164eedd5b807ac7724094aba37ff6b76b1cfe2891061ca8c7624f5367c2146d3572d26acce5fa55153f425eaa004e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503361e0e091c98a245e82f5d1be54920
SHA1e994f70273f33e1e55ec2703d2a512558b28cf31
SHA256bf3fcc2622cce1697748ada2a496572161b37ab98aa5fb504f26b0b274ec5616
SHA5120ee9685c716762de718a3956a6d890cd551c5320313c1ef5b25e17e8bf14ab749114f9616167f0c6e7a615cd389bd27145aad20a5102943fb81fdd65eff18612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e33fa4bc1d263e625ea172ae186fa32
SHA1b5601e372a90457908a3e5e8b4ada2a0a6b76599
SHA256650665554b295afd2825e22fe9f96333be7b9fc91515ab465bdba23e7df1c639
SHA512966a4dc2e3455a64f9bdf7e7c522369a5c06be37c4fda85e2a7c3de6bee7b6458d40c0df6ab697480e718e9715195927c2231c660a7d80e20b90d03c5c871b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5469b0eb7ba8f335a44e53777d705c62d
SHA1e555310a20db6a8acce941b5c37bdea9ac038314
SHA2563197d9393aa032e13975fa25bf44b7e7df50c19980e4eb3dc86fab935e5e27c9
SHA51287f0e0a3d8fe1a55acbbe4f98e26631753b94304e0f93fd871f88b48120bf1a323ee31223e469b26f4c8974b872dae3ed37270b49727f2a2c3b213aa7519bce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5234cb6365ad11acf2317a20dd8b9c82c
SHA14e7f4f5f52e8e9022a6caa20ca088934f99c7077
SHA256fa1f38e93cb3d90cfebd312142d6e4a2dad6a9d6c3ed6379382fd5c90fcff188
SHA51251c343e1127e2e5883f82568107eee6782822b1021002f08452eb30c224389695184357438372255a0e87a9f02db2cdb75c6cb55f24f151ff3eb64b218687e99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f6eff959d8126552444b91624a43595
SHA1bc469f1b17d6d552b479b65f185e8b440b2cc6c3
SHA25684367d136d8038b8f974ccb4ef54f65ead0c3896a535698dc362737a5a31d7a2
SHA512b9408e2d11bfedc6b09216cad8c166db5ea5452b5f41cf0bd2afd97f417ec1e4502bee6ee4d2b05e8fd75f42bdcf2e537d165e3566d851c472ff57d8fd9ee6ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7277ef2a542f3078dba84e4217e0fad
SHA174eee99a5b39b6285278b01f7b2799f5b78f2378
SHA256c5c951d86d7e5b2d08fb059c1282f0662726238bf0c2f3b7b51eedad318088b5
SHA5123a02dc429aeb75ff783be4876ed6d5c62de14dc366729e3c008f75fcdc0ceaf2fc2f91d8b62172bc1f236f5011dc5c79f843a8ef523eb996af2b8290f7ca984a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b696576413380e017e91b854a87beb53
SHA1612828892e324393a43636b528953d2ec1fd4471
SHA256d0d9ee5b84490d1e4fb5652efb832eb8a4a707e4a93f28e8643bf456507693e5
SHA512e6adfd9556e59fd5dd47f8aa642e89116cf09eaf95c99993a02eab08e2819684da9997a4770f2a73c64a372f19df80ba45bed9346e0ea7e518e8f81ea7386f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b3488950df4e20c418c276967a386e0
SHA1f627c15638e471b05c59ca9682ab5c9a1a2c6414
SHA256b5ea7e7de94df8a982519b9b6a8157c9726fccf5696bc988a0bb17afe5ab2ba1
SHA512990eb11d25088f3b4d95163974381bc4d3c94e99b514f549380f2e98d4629eef61d8f587afc9b2de356399d80ee6c50499e002b8f02c88fa316aaf376f089179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b160ccbc8d9bb9a4208c191517e578a
SHA14c6d0a25cb3b8a306b06845000bc45e916e1542b
SHA256daa490d91ea233e4f835a7d48765bfe6986330dc42302580fccb798f09ff5681
SHA512d78ccfd4a477df25f07da5e172b02d06cc2fcab46c4b27a21529060b0c636886343887a8b7a799991cfe820591a51f7fbe6b64f870a180c288d84cae2d9a4b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f4a3f2ab17daf32b669e3c7ea91a842
SHA11aa88b26a4d8d238a60f8d7b26464765a79bfc9b
SHA2560465b51e995b00579861c11f84c069c47c274f49d88307732b974482544b3a86
SHA5121f2f5c5f5f89c57aec5fc17cf4f9cc615ab3897c514dd53dabb3fd850e6e89125120a826278e8dac862dc9174887c09638a8b6181a223303e5de33db70a56896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ff2a494ee90d606f8b2ff02113a5f2b
SHA11d18e8bb0ec742c3693ac70ad271a55202b6d01c
SHA2567f8e9e0a70e80c38f0e7be5830f03637085c66794c0aa4acacbd0ef1a042433d
SHA512467927b385d2fcc946ec8a9b128c3f247a906a14d2ed9d9c1586717d6f43fad857792ee0786e3bdf6bd77ef74d2b462f5c9243af0649830bc5bb6b1e43d2f7a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e36cd35ea8eaaf9da51b7b4ce060ad3
SHA1a2900b9204b48c599e2f580e72bd85d8a6860443
SHA256288aba2d7551918956b36213136655004e608a48716ab0e1d891ccd1eac919b8
SHA512ebed6baa86fe2ae9913a69369a01c27261cba42a2da10836d19981ccf46c56489bdf2d2e3164c7aeb60f04010245e76fe4a155811e3d3a6bea7ec4e208c57db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da259ed08daca2f4b9f35de5a5575fe8
SHA195dd8bef185a5913a8f571403c80f72c93aba222
SHA256ea70cf2bf2e2e959590c13b2eb21194723d4d48b3b05fdc0ddc6214be4f55a41
SHA512a8d9f58dda8ab496591beffee5a771d4e9a3e3b30127af9a0e193fdf5e3c075016f9dd8e693904d6ef63d77f99f3492d4772d63d26fdc0ccc29a1935b438ff1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b160ee70be35e2a37309aa334ff938d
SHA1444e77e1ce98df0a98e4c71434bfa82eaa3caca2
SHA256abc3e5ca92e4c22677b8ffd41f80ed8aa57ca7e5ca7b38e410be10d7c1207e9f
SHA5123cd655c30342a96ce73b1ec298a853193d36ec38261b7bc102aeb0a0e2f99b7af42c00ea0f86ff9e9a81eefc1495e6e066c6706ba1895a7a630f47fec0428602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8c1531a7a5537e9b20d896943a4be55
SHA1c5b40b59e740c696f3fc3c3bb8800290c016fc93
SHA256ef8cedc5b82ddc8283bcea46e29553282345b354218779d0cf3e7f621defd200
SHA51250d1228dc688f06db9a913b397735df299e3d81f89d06552cbb454be920da9d1bd2a95840fa5bb4048952c193a6abcbb69a80325468da3c90e629747324bee10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fac85dc27b29c4c1d6ef6e7835f8f5e
SHA10de4bc6679d4908a90325f8b36a4029fb4fa8731
SHA256eae73a802970c55a18db540a4e121037d7817e62954423856c35f28336899213
SHA512251e77b0b08edceaf98eccaca81f5db6288be62f94bace6440b2f6271e5e63b0cb251a50decfda3c943904569ad505d5b33c25ac740d76eadbaa0023c8a1e662
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a