Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 11:55
Static task
static1
Behavioral task
behavioral1
Sample
8a666b188077fd4b8e70c106909b722f_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8a666b188077fd4b8e70c106909b722f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8a666b188077fd4b8e70c106909b722f_JaffaCakes118.html
-
Size
4KB
-
MD5
8a666b188077fd4b8e70c106909b722f
-
SHA1
1b1fb0630623959e6b29df2f3e004cc357affa5f
-
SHA256
a8a58423b284c58f818d55cd1a9b6b4a16f465c175e53f26711771eaa4bc1755
-
SHA512
a86f3e74efeec4f844fc442ae42b9f82dd8aff5a38731223f09a9e39d9a644e1db1e8c0d0ed813184738b46b1c7739b10490714af7bacec41d640fd1ff73a452
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oaLLd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423404785" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000003a8f7b7ee30c8daf468627e5d543c84fbd2ba66538faf11c975fad3d8b2ef512000000000e80000000020000200000000bde8558899c20da3a343dd8cbc7d14f4e9abc12c14e9ae183e730d7b69fd0db20000000d7d9a3aa0fbda29c28db2e879fbe6011f6c7fd394a752a411ea079e1dabdab234000000030239a2dbfcce9db887691b3df9fb0b0ec1d6cb68bd497a38f8f2c51d1da146435d77b59398e93107fe49f6256e31eda7dc7f7d09a541eaebb4a10322646a10c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0EFB201-200D-11EF-97A3-C6E8F1D2B27D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a27ea51ab4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2428 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2428 iexplore.exe 2428 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2412 2428 iexplore.exe 28 PID 2428 wrote to memory of 2412 2428 iexplore.exe 28 PID 2428 wrote to memory of 2412 2428 iexplore.exe 28 PID 2428 wrote to memory of 2412 2428 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8a666b188077fd4b8e70c106909b722f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54efdd7a6588c46a4ca190885cafd4ea5
SHA1fe713ec3f7d9cca50b70d4efe083796c6f2fc9db
SHA25618e75669ca8e32cdcdd696f8516fbc2113233ee91796637b49453091a4dcc26a
SHA5123790f10c2f39102f0ed448921ce6caa389e1872dce89ffbe548415eae3dda164864e30f78b81de473325b4603009d173b5106b8883c2c81e9c6f81fd65ef0914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52592edec595d020ee34c29c6441e43c6
SHA1d29001bc31df3627df6139b20d01b5de4fb9d81f
SHA256a99867b0bbe083d0f2f62746bdb00b00b765a75f76488b216c9b76867100ab4a
SHA512ce0766ba281345345c8fe52f9833f9e0f85c6d8fc19895a1b5706774f469daf55b296ea710fc9254bdb041a994669e00e6c005e28fd76f0a10594335a7b4ce50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdbbded4160b5156660c6994b5817ea9
SHA1f6941f7b074c464e3cb2656e69f1a628bb9154ef
SHA256e64952dfdd3cfac7deaac00d128b4561649976fa704598908f9df949dcd1654f
SHA5127d60fb04883dc520b71c55caa556deb50d6e4919ffe1e45c38b87f873aa310ce45daf9fa85abcbe9acdbdb95e2da809bf3184fe2c7cd05da9308316d638de2f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e09555376abbcce63979b4ef6178602f
SHA118322eebb98d4040761e207d60a3549d691dcb18
SHA2560cf16bcab56c3523bb03be5360c4ca0454dc955abc1bdbce9d3efd3731979172
SHA51293b62eda978f0a29e1ace2424c80fb359882d5ff9b08df9674d19636a30db6a2237d2df6a19877663857fa6ad72281c63591745c3f2ed664a8163dbed414afba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad16b6959b92de95309e748e50f62545
SHA1c6b9d3b6b4ece924b30f7d80bed193e8f33713d8
SHA2563e7a032a0460e2278e6976fc8875f1f008bf9cc4438a318e40c1cddccd78b8dd
SHA512d1394e10aaabed2f9256ab0566c48e4f6fc884c652b38526aaaf1355c9683bf57114fed164a0237f443cf0aeaaf32637850a8f1e48b0def49c85f067c40b9c8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512f14d3c26b90fcf35298f82ede5a8d1
SHA13d12e3956209a8a0b5202148138a14886c6ea9db
SHA256e7cb486be8c6daf807628637c7cf2c825b416d0c8e1d4736ab93ff827c63b53f
SHA512949f7f00dfec5211ae3805171458a36b11e22cffbc15d26975e188a401bf0d3b1169e1ba7ff2d7f403d34892ab6acda8195796b9a70c45041c12e57d1be5eac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a187db4bedcd29327c6e41fb57f833a0
SHA12d2979e86ba6028e28ff843156256bab0c0ceed9
SHA256a39b4485f9d47443b89ae2418bbeac9ff86328cdb965a553b4c5f5aae99c2564
SHA512e2e8f5147644c1936401e32b4157876f9d456ae88371f20cac4094c9af709f27a3cec16c1c049c3fa02d3a8aba7ac73389b8a73ab936a1fc74705653122310b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac8272375667ab9eb38a4e05f9503137
SHA1c8a06f9edee771a0965302888167a23836d09826
SHA25699c781c9593028b2a45b57c3b0f09702245f188e9e92b922e1ac54ed0e43aed5
SHA512e15f2a31c38420eb722d5098a647ada727161b1d423aeaa072ef49c22ed82cfc73f48c85ac9092ed56099c1bd11a523f9e359dfb15e7ba0511fcac50a5a9deb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55382b26ac3c8dc19a5a5166ae05fbb95
SHA17c84834248a1e62f899ed29247f5f07ee76275af
SHA2562b7a6cd9e38dcb6cf2cf12b494f45e185aee454191d0e84802727e70f5e4d69a
SHA512a1632897bdb13ae5fee7427fffb59d4fc41e079e9b41cddbf376bf002484dab9fd680c072db0fcde84417f53d78b1b1a26afc6d56adaf3b090725366466ba423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef484600767345601db79905b98c94b6
SHA1a2d200bc402ad20cc91928085672882db749d369
SHA2564b994e0809f83b08f9f8bd1dd749ae18eef5dcc6ac7e69864a72b630edcf6de8
SHA51252c54759a954e3112bfd8ee2cffe4f12ad22f5a7de3e67da98fbbd07cefa8d60dc2f1f79f147173debc377306a97a5ba6c7b671fbe04c583dd617c73fddb2a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565d3765f1183fa87f146ebaf1b76e31e
SHA17e85ff6f5500d3c50d8cd9213d3044bc5ec0c4dd
SHA2562d66401c93dcf67680d7e989198110e09862a2c96b203dbaeb41ceb53f2c867b
SHA512217369a96ef9d518a31f66f53e41b231f955db18b2b9cb96f47c54efdbc5c83d6365175eecd0c178b1fdb6e5a0da6743fbbe352219afc6a449c4927311a31a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585070512e5af1b85ed58c32ce50f7cbf
SHA1c84d1c101c7f3cbc3ac0ee42b08be9304bb01d31
SHA25651324632fda78984b5b6074cffe0c6077a89c5f84a463df437ecb13e1e80c96e
SHA5125d126aa53c184d476e9f5a74a7c6c39bf72ac4b80acea7d37eb76279d40d05cfe605311b5a8f2e91398891883199a86f3938fa7409f04f82be95b927d3e8a717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a9273985a67e61de2e25f4ac20246dd
SHA1293d2ad74ec6bf9243cd26ed690a93917e7d7f44
SHA256e60d27a320a3972b9ee9337798ec3c3a5012796a96f328ecd64633548417c31a
SHA5128a3d736d9fcfec97593dbe47a67f3f8593389918d58cb0ef8037fa0e1f4b2d28dc4d6b49f315fe90310227518b13e5e13e4e9dc7f9d5bac0c013b157fe502df0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1b9969e176f7b09ea3f882f94d91941
SHA1ddfb7eb5ae16d1db5f086319d44ba11ceba080cb
SHA2565b0db2962b5484a725bd74d58d16178ee074454d071d15de4e5310a12cc186ec
SHA512af447c3d63d606ad9b8a8d0c86e0678ac00d9b47279b7cd9c312c960eacd5de502b8365521a78b32f798bedeeda5af54b1f1da45ccb1ba1458383b8488db9b10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54db796cde5bc1424b3eab4490ef125fe
SHA15413e17b5df6ba9eca7ae1b17d25de85a69e9457
SHA256176192d9290c81ba22b7541263d55517859ec0ea5a69df6d01e34b23756623bb
SHA512316f09fa7ebd8943c523c743903b0ba7327559be0b00f2f401ed2c1aca3dece4149819313754751bcbb3e4ce267056c517e00192677efe08eb6795b17db7aabe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594d806c87689015a3739254e5b929e0c
SHA1951bb3521ff384951d8e19de185622bcc2d82b1d
SHA256353f46aab954930dfec8d1b2aee9a349cf9606219210fcaa2bf60b056255a0f5
SHA5128b48f8b799a2e02eb8feaa9a6dcad43b86f3b69acfa57dbbe4842de7f79d0ace4269429df2fcb731e4f4aaf680b1cab6e631e0189c27a7636c6ba8c97006c698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519ed5947376cb05b7c4fbfe70c17ec15
SHA1ef0c18a61da6368bb37eaa5b28c8ad230064d8b7
SHA256815385ff7f85d4b1f6789a69d71cf616cae70f58cf22f6e39e3209985f343673
SHA51282f451f1967441cb562a2938eb682bfdcc6dee91b29aca9d79a57692dbced7d704b53d944bfc6b33c3c0dd9a6dd01244cdbbdbe70dcc3cc99e3a71a913fd5335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cce8c6db23d5d2de106a5c9c7bb8638a
SHA19fb8163cdb0c0ba3dfcc25900e160627c1652182
SHA256d38834f5992717e125d73fa46ca7f26c85fedf00c34216ac94d73d4d266f5635
SHA5121742b412334fb168f69151e7ec3fe3455928856f433b0627e1ad9fb5c328373c8a51f11f38cc4c231a30d400bf92100028778c6a4567eaebfcd7716d09764940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd5542c0cef047122ed2af063fce06df
SHA18786da65d83ddb26ae1a9fd5312e41f5b9dbb9c2
SHA2566e62cb783167ef08ae290942d2d152d2d8fed7046e8b5b87b8a02f24d9fc4c61
SHA512f1ecb9a40b80c892421c6e82c4458e78e71cec59232d58fee08baf1cd8b6011acc3bcf6ecd5e7b106d8264b0822d8dde66e77d3253395c3c758d3b0d1bf44ed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd87246e7d0f4ed5bfb0c4efd7bf15e5
SHA10a030a9796825d90c2f03e21b81d1d8392a17582
SHA2562bde1322cd482d419901b972b5b462cc536dba875a9cb321328a813ef5c6d2ea
SHA512967126d90a625bc6e969deafd2617be67646623a7ea760d93d247add91cb4de92bfc003d1bafb15e2244df6f4a8639e7df6af7cc8ca02790fe3c3df62ba781c2
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b