Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 21:32
Static task
static1
Behavioral task
behavioral1
Sample
436c3fd834c2b97759dd3ac7893da57e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
436c3fd834c2b97759dd3ac7893da57e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
436c3fd834c2b97759dd3ac7893da57e_JaffaCakes118.html
-
Size
73KB
-
MD5
436c3fd834c2b97759dd3ac7893da57e
-
SHA1
5fe167ab0f7a6219689f677dc218c9710c4a229c
-
SHA256
5eb2b48cf77c50d3614ffa4fd7644bee37a23bfae6fbb1455c649b6c9ef9c24c
-
SHA512
565ab5afbeacc5e2f9c746f509e6fd974e2cf0b70044fc0d252975701c28fb50ca09e7d5500fd6a190ba7c3d3a2c88326b32f12ae3b6de3aa5c4a2fd76d8bf2d
-
SSDEEP
768:iIE8A8A0yjUs5bMh7n1jldaszJHixJSrLlS2t5Qirt9c6hXWhlZfg9OoXzpQnEr3:Gj9juiDOJzWhYEoJrlAMyUisl4N9qI/+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427068227" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6DDFF0D1-415F-11EF-8FDD-526E148F5AD5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000d354b9f615f700e13878ce0a7578644cf02db1c82469b7748d7b60e5251bda43000000000e800000000200002000000004ffa1a25c5467d57485444345cc83e7e4344a7b6b484052409522ac1a357ee720000000e5e10b8587a451ada71ca2c47bb02b0b7c53debace8188b058d610140f6ad11f400000006a5a635296f88f45401bec0f7e5f1d7fdfcb23221a57958f3ec2d53eac4a594e3ce660a2deefb6c82e9ba15b429be3fbdb2a1412267314f5769fbd88bb7dc992 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e07265426cd5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000714da2e59a92e8d4a3b016d572d112cf0630b494f8d5f3bba77d34f26b6ccd6e000000000e8000000002000020000000e2f2dc5d98e3a7e6fd5c67da95b29c53620684056587f42840bff52ad194c61b9000000058a33c5b0ba0eabcc1183acb5105a0949172dc63dcd44731e8e72f39bd59d43806fcb27c9e8bb92789f5ad72e50842ec403b2597a6938642c68ea9680a107162ee8d8c366db66af575cf63f03be1f58a286b1ce48cd73ce3c9eff6a42cbf314878057fcad8fbff91a73954c5a86cd4fe52232eda4f7615c419a675a9ad1870974bd22b52b059fc9072a22c1dbb4b19514000000045564cf28e1a6558e4ffda24c4e8ced07b10431546fa655fffb898d6f67cdcafc00c96c238834f4c12cf4d425920e38663f590ca92ddd4aed4c7a034a4ec0db2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2060 2092 iexplore.exe 30 PID 2092 wrote to memory of 2060 2092 iexplore.exe 30 PID 2092 wrote to memory of 2060 2092 iexplore.exe 30 PID 2092 wrote to memory of 2060 2092 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\436c3fd834c2b97759dd3ac7893da57e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f915f8bebeb1e20aa402e7d118b01c02
SHA1964e4a16dcb173572c9acfd725cc7439154c8165
SHA2562aeeff175f76cca7205d0332cb2dd3e3ed75e569133cf55a82aba86e06896c5e
SHA512c0903d8da1a138c1e09b10a23fe86927434d77440b7d37b8cca6307464632fad63be0cae2bca1bc9dc35ba23949a6856f5190a170a3e0a3028e3892b3e8da211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0959e4e9b98eace82c90501d1da448e
SHA144395aaad3d8f2fa87e04a531f284fa797800512
SHA256268d982b71ee3ce58379d0bd16f52a72dd02bfd39caa1aec2837eb5d15e9ea55
SHA512cb28f3a9572eae291e4540cec20bf6ba8d5dccc6a9cde62b2b83bf3edc268cdcdb004c5a233e2e28bd9e4824b0ea55d210a9077ea1014edb0829db9e64b1236e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dca9a0e2d5b190d77c61c752067a444c
SHA1c301bd0760d53e0efcb33e57cbfea864f0ac5c5d
SHA25638242a096b2b754dc0bac002e4ccc8b027feb906686ec255d7e3105a02a91f46
SHA51232230edb291f68f4e5707cc89c05f9546df8d056c6d448a1276888099d49fa947a4c3fe7aeaf1f8c2c74a2a1e0512b68de7620ffb02440735510aefd31b94d98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5719c5ccad19b81f5be1862f1f8bd7d94
SHA1ef031da4ea6557b97f30c8465c510481ddaba9ba
SHA2562c04f0d6d8b26b73c00409b750b04ddcf4eac86c9a547f202fb39aca713f9608
SHA512203c0630dac904f91347e0721cc58273771f60f28952482e483fe92ef29cb95bb0d988ede26ba8844ad0c099424f1c83b708a8a4a29e4da0a264458127e4dd3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d5b0dce731ca04120ab810a55f9ecbd
SHA1f06b0e2d6085b7775e6c71fe7a3accd5a88b9017
SHA256265ed41168d697ae83857a327f5bc0796ffacc76f11467881b1ef30a7665db9b
SHA512db53c96348fe6931a8557e11bb3a247565c3deeefc09ddab0f8e40d3b71894bbe350fcf13743d42e2877503d179ad70299b8f4f03d49490ac97904b35e6feb14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5084df38ccf3878fb0bb3036d7cbc4781
SHA18bf3f5d076eedb7b13e522ae9d10f08700cca20f
SHA256270a35fcf79ab6f41068d195b88bf5d4024a7e5f6a5047abfc15368c44380520
SHA512d1544013a42f3b58941484d53daef6666ef64202b1fe66f26276b01812897e841df4a0f3c88953c5840c5523ab8ea44464dc67a5cb4497929a73b3124252f110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fe4636e77406e100f7bccd53557fff3
SHA1d77fa9a9aafabc60bbe373d80fc957c61a30e1cc
SHA25625ab30f6c55d4b0d01a6570fa824e9f15d06f86f9880f8b2aaecbe42ce4a0df3
SHA512820dec72834f289af7147b1fd8027dd53ad3d9232e582bebe374cf576818019899e02c3c89e5ef9dd751d4ddfeefe874ac170bdfb2d98fee519869a67927431f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cb67410184bc269aee32c8ca76c2ae8
SHA11291efd2e303590a78d0c6846356f8083b4c305d
SHA2567878e1ad6bcddedad451b5080651782799dc9f1fdb63615243fc0660ebcbbec6
SHA512915d7cf182587ed48a02bc3ee81ac32ea59f6090f96ea73192bb3cc9deac1171ebd455b8df9d6b56b86c455cc92c0d9e716836e455b01334802e4df49b26abcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56419ae87182dbcfe66222626d380dec7
SHA172b3fc7daa07e8fb0f36f8565aedacd170313c5e
SHA25650d27ecae6ef3248d84e595250e1ef9b66acce1bd548077de96a355220051aa5
SHA512d9d20383a99aaa83ad9cf164e402c44b8087dce746b5126a6018bd9a85c79b46413882b3e65483b48af59aa070a23f33fef504e19b4f3db89b53c5a7f046415b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d4a6b4aa8ee256e2ea84bf5a7433524
SHA1b710c2f7eabfa9235a00da0b33f09577c1b87f42
SHA2562ec476998a366aa97e518d85db9ed9b5d5a9431bf7efe35ed15ea7ef660df7e1
SHA5125456f6a919a343f55349dee35164ae2fc9696d193e00e7fbaa8b5674859358646de8f682cd0d7f0264d616c8fa910943506d93b6a42ce7dcd1950e8c5b3ac06b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ed784594fca7b3f1a8458cdb3ac3312
SHA1afe9e3260a7290d2b53c078e8cb4440b4862b0d2
SHA256adee43b994183fb2558529dad7bf1436806dc41224f3a01086e174b0133116d2
SHA512088f04f123ba815e798946e45b294172fd6f4599efe17098bfaaf627ed1660a299feb7c49be338ac6f7d004b5741b7d4989d8a5f3c3a60c6e0ef62db697f2e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2eb6afdbb3f26da9b7de34ef9486adb
SHA12e78ba9c3f873105e310a9e92bda6b87fba1d40b
SHA256150a08e6f2effc73770ec7492186d8bc4ef2395c760e3f5dbe08546f5d86a81f
SHA5121806f5dffcad3de1676968bc5885308dae5b061cabcd8857cb156c8632df5484e5819338138fe0a2550ff0e16564e8e7c2aec26f62b25950519524ff82890f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5635daf21bce47d7befec679ba5b00ea0
SHA123b7666ee8d4714a56cba3973f2f2a8d5ec30bc4
SHA25607eae8b5d81fad6e05366d203f5456a561fbfa420967ff98c5a5d88eb0fc439a
SHA512f48d677884a86c129766901c6082f2171320117e6f40686cce28028b615a9aad9df1fe9ebec1022bd525dd9f60ab3bbdd7b95f90fe22b081188187c68a312a94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7116899db74cf098d34e5223482b5bd
SHA19d9838803f132ca534678b630c4ffafc3b251cea
SHA2564dbd24f6337087c7391d7a22a01c86a37e38a052f672ea6f8e1500eb9fea24c0
SHA512c961f1613a97b0cd9d941ab7a74a6bdb470952160485049bfdacd10b2b53c71ca8f48fb5df55228053e029abfd1c50f1b38f69e09343f0a9ddea3903d92f5c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da838c3ae574eef066b49ed17026a7ab
SHA10981a9013fc19b68e46551810b22b162a793ee91
SHA25688fae04187351ed8008c174c57fef3df4eb6a7d7b3406193cdd9e6825a4efb6b
SHA51260fd12c214e7bd575d24bfccbdb083639214cb3c9b1c29e4a6db9ce3058fe410cce5afd2811511d2a2828c4250d193f5afdf15a5ef128a1381450724640f180d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b209166b57e693cfbe5f1fb16fc4286
SHA17edca5d9f41378440b17bf73de5fd3d536dd1015
SHA25673a2d604f8aa3e4a1391ec9529c4de84e71ee84b46b95256d4e3f77345e3ecda
SHA512278fcd9a55c655dda99c528d96ad56f3fdfb6c75846694f9fde035840087edd65b112a409c5b3f0f95f2eaa4e758a61cae43911493922a9bc900dac72b6381f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c9ee704ce0cfcfef863df72ed54bfe6
SHA18490477ca3b544b6775a194fe146d0ceab54e55c
SHA2561903d47b7838176970b23cd1450b7c0733863b680a7aab2f8190c2f1026d22d4
SHA5129fb99c3fdc9234acdc41e6b46dfa8f1971488ca7aef3d51c05eaaaaeecb77cdcbe098527dbbc1f44b31c389fba37b8b284650960d14fa05557f5cc5757cc7c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5063ce549e8c627ee82897b18197fc5af
SHA14df336ce10b44d5fad34cba85e1d77ecae9d1c99
SHA256be923a5bef0da1d8da6498ac9ad19e6e761d5c3c97c935d2b765fea7b32af935
SHA5122fba74c01332620dc14fdd2f4d5ecd4ae2587e40c54439c9bf15615fc551f5b4c48c13890e9836bbba89cb853f79dc4f09540d368aa0452f1fd62854be460cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b72505fd2b3a51e6eaa5db29f7cdce4
SHA1fae8ab4adeafff13fde92806796e5b3cac0b53b4
SHA25655e9445f5ff5b049a58e46d37c38bf8387128862df9bc02796f886fbb71807a7
SHA512e5ff40dfce1bee350f78356170f5833f4a037d0fdfa04832a545a635ba45cf6f63d22c077c49c51355399eaa0125c9fce65a6d5598356347915bbc214b2fbc1c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b