Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 10:03
Static task
static1
Behavioral task
behavioral1
Sample
62c9566446522e3f26c1eb1df0e74e8d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
62c9566446522e3f26c1eb1df0e74e8d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
62c9566446522e3f26c1eb1df0e74e8d_JaffaCakes118.html
-
Size
21KB
-
MD5
62c9566446522e3f26c1eb1df0e74e8d
-
SHA1
23ba4d3bfa25105909aa3c9e6dabe22d27680c9f
-
SHA256
4edcc7800a3b6622369aa6346d2bc4e2dbd6eb05c6311673418d29d3fce2d7a9
-
SHA512
e775e50bac958fbe1de6436677ed50fbfc8a96801a1a75476ec2bc3383b7b27581098af8c740b2cbb4dae3cea5bcb66055f516c6e9869f029a2b7eb69b2cbd0d
-
SSDEEP
384:ZOjfpvuwlTcRpGX6oR1KJYufr+awcbYKS3To:ZOjfhuPGQnbY1M
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4046a3901edcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000ca931ead2d35922ac26399939b27b2e2efe88a1b6c2c1575c943745b7ef1f357000000000e8000000002000020000000ba7a60b75e67d5c71c4b98b7ad7e8e080851894dfab1b3676d57d677db2c27be20000000580c47cec9bb8d4cbf71537478cc93e83f7dafe194879545448c52c6cbb24502400000004a613640b931d8f149a7eea6117d04a03e4e81ae9495df8033bbd0984925206c5fdb1801604e130539ba04e393372d9af4d18001ff42a93d079b1fa57843ab62 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B82C6D91-4811-11EF-BCCD-5E235017FF15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000005f413d04837fd50431c3666ba28cf41b8dde4afc9c8b15665fc25865f9d7c533000000000e8000000002000020000000bfcfbe0b6f5b648a0fdfdb04ea96013bfaa1ba2f6d750db685ad8a793bbf2112900000009a65de0deabd1a3603941ac9da2ab234456286a292c63206c41e7e157dfb3b6fe659bcea334d2f1a5f099daaa2a253160c6b7e81b1af6eb838446ee24dfb0b7cf9e454fd78ba56f47ec60ed0d2557d3dc0599dbd47f26081e6b632ae1170fbb8213b7bc07c7928ab799e5e5eadfc77850d6850c57077932e8a046e8266be65737706ee5e40a40c7d36269c8e2c5b7cdc40000000e43bb9a7e80b3a99ed361257dc00f72debf5761c76782444afafe5ed4f89739f389e5d64c5ebff26323aa92f86b58eec28af67699a08f1b0cb66b249c8102500 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427804508" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2476 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2476 iexplore.exe 2476 iexplore.exe 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2160 2476 iexplore.exe 30 PID 2476 wrote to memory of 2160 2476 iexplore.exe 30 PID 2476 wrote to memory of 2160 2476 iexplore.exe 30 PID 2476 wrote to memory of 2160 2476 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\62c9566446522e3f26c1eb1df0e74e8d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a5228e78f33d9dbb6492c182d6d05f0
SHA1e710df96e5fbce88b41ccd652b6caab3b542cfb8
SHA256423432eeb3ba37894f99d3417a20281ba9bdf8f91e312639a83f776cf6cc521a
SHA512e3e67b8494e99d9151bf9b62a68f18050c93c502db1c83eb6ab4da2ee26317d64959306b7f68ed3dd05f0c41c2bc5134751506a070ba60a7118ca9b9d8360879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a195eaa3e69a98598b520eaebc9871
SHA141af3bf400e4f99b5fbe18a2ccde54656c794359
SHA2567340c7d7f445aacdeaa6a012081fa28bfc2266f14ae008c99153f9c9d5407ca7
SHA51254a8ef2e49337274ae26ce2476a54bf0dd39d55ba4e23082106f0c1441f091e4614ba4f39aa45ce801ebfaa66b84825c68bb60bce769733f831dd1b56bf07687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e1994e4026fb2ffd603bd5534e16075
SHA135b73539824b835be838662d1c5d9723024c616a
SHA2562456b35c1b02c13a242c1f1bee15f965af7643dee845f39983f324e77af6b213
SHA5124eb72aa924c2b5bc47696204e11edd2a3355c3f41e3ca13b2d4b22897ab39c2bc20e39d3ca65b40f3a978a3a371648e106a8e488375e16cbc7687a1a6eed1c2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bcadcb9c27beef93f287f8c99b5b23f
SHA125f84f9a28a1c458b726253fecda0c712a433b4b
SHA2567f0ce11dd347cde31a933546bb811c371079b71f6620492dbec515ae36a3aa9d
SHA512650a203600ffb218f6c7b6224012638ebdd0c25bf2eae073514a9e22b26d313a0d12ce71c86398ee7b58d29a792d202b7e0dfb86f630c5ae213932c1a1db5fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6232c712e14c6b72b057141f51014af
SHA12dfe949e96763edeaaf3df0c67f8ad4f0130aeb5
SHA25693c98245bf8c75c70a54e498a5f1a966e9fe4ff35df394e80533fe52bd1c3fa1
SHA51229d1ccdb693430c4e690763d68f567eb4369d93114c1849a2828e8f9ab80b0731c6c522f7542ffe5e1c3edd827498af3c5bf85352f559b8defa0159e9c278f54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518c99935de80f22299db9b3c92fa607c
SHA17a8814c30c417978c3d20b273473875fd9f86b2f
SHA256ff26bff71c6724fe5467dcc6892ddb5da219838363f2467f6b1ca9241f193738
SHA5122ff1293539b6e4853d275ce45b06282edaff0ae726c3df6053a4b8e97cb0f93bdfcd010bb1aef1ffc56fc363cc5a7cb6515ecb31bae3b17acb23d35ff229061a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a8425e5de216402ee0c69558a461f96
SHA1054349d2e96a8214f3152acbb05662bce036f6e5
SHA25628a4fbd2945d655c07b79b63f62c19add223baa835e6a3d16b7683501960de50
SHA5122cc619685b157c6399d9b2293d850756b5a71824184cc31928c3027d7ff06601a59a6c89dcfe75ef2c64536fa801c68b79a1fc64d77c5728eea399842cf331af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb9dbc17503475fdad062b55d9fbebbc
SHA1d45a910042400eeefff330a92ef7697b9458cfa5
SHA2569fb1afee1f94e5abccfbc8b0b0318c44bcf604726efd589739713c5c82a22019
SHA51240eb830059544343a983824668c6eb1fae13ce390a7467d9c9f4d27b37bd0a6b0dfd73fb7dced7bb4fab97fcaaab6b09356d40529844f5e1e691b2eed7625f02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec555f1c6bca79cc2b13874eceae5b2c
SHA1481e82b8149f84f2e74de8629127f3f3eda3d652
SHA256295d2c8eefc0cc120794361f869a67f4f309999b78c36417d3cfc199493f181e
SHA51214669cd54ce86b7cb31f005a07133d79b134576f3651c1f2a06e0614f05a8baf7c8022f40004384ee6f4c094efeaac76b221efa198e728dfee7dfc010d074671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5789b3623becc26eb7329860ad892cfbc
SHA1bcb963c9726ee13cb622ed14d24b51b6d2d9ad43
SHA2565e7e0884ce9146af268f615bf7b4d0b32ac6650625e49976368e2f4333ba0a4d
SHA51285964353f36105d1aadba96ff88d9250efe0bf0f447c87a3b1359a8d7a78d4f9be4c51745a07daae1a87c9b792b500041f94586f5a24e1ee0a24f90cb94b2883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e451e7311759995d8e60047e3a3aa6cc
SHA16c36e9dbd84e363c7240c94f38cdafa6ff34b65b
SHA256d773d014c04fee0535b45857480547c928ed40b8b802f74e6f928a03706fa0e5
SHA512f473aebaf3c1a8bfe5369caff7f924e42eabbec1a5889af05b0f9e8f26095c478a0eb15fa62b5b4049a6edd7b78c69b83a7d599b2df9c7d92143d12b0b28ad3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b58e1c32bb523b671d9c59f4790815e
SHA138662ba00110207f07888d40b2f9eba7b3874d0c
SHA256c9577c7ec8efafa5e984cb44af668554a8c1953e746ab0d37505453a3ab77271
SHA5126b77acd23e23aee2eeb65097f438c75eaf41da306fd3d8fb1dad5bedc721e36f467e3d0756dacda39fd0be0065d3e56a0f052d4d8594eefab3f40feda19629c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e50d9b3271f109bd8fca850b4082e3e
SHA12c50fdb4f23850ccd82074b49c6747af7915d52b
SHA256fb53585757ff6251bdfbc62ef814fd9bd09e6dae0d7150d2829f8843a7607cfa
SHA512d09025a6cffa5bf31412bb25eeb8467a3bb9341840c423741a8e24d3f47a8a53bc5f2db06736f1ef73eb213f79a6a0dc30628b11975a41b56de391b776867463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb98baf3fc76f24a5f32d9cec4859c30
SHA16a8ab97d44739eb446b173bc8a9bc01e8fdb007e
SHA2565e84b44850def30b603c4056857a58be755fea72e0d5c90d8936e0ae6f38288d
SHA512d68fbbf89599e62134b3a31b363642c79f9576367dd9a78e42637abe3a029d0b3663ee78a055af5e9dd86aec4cce6e2331ed2be29a01814b44fe42326900f4b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5514ef2969069bd64d20ab93a586a4b3d
SHA12ee65728ff72eb1dfdfbefdceddc7f9d52bcc431
SHA2564891a74ca1e0fec6645eb6fbe5b6fd47172b767ab023abf131095734d3afa981
SHA5126726218239b6ad481ab743e2c839bd6c1c16f97a5f657f0e72a5bee6638139a7e616a77a7eef26aaabbddc8025374e3161a07ff6736a82cab4393694c9195b31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec28c9893aaf6bad3af4a7a356d0200c
SHA1c9b3b439e91d5b71dbc66134d6a8ab5f3efd374a
SHA2568968c5cc95135c845206793a204c0fa08aed0664d5791cf9a604e4dbb8fc84f4
SHA5127b83d21958d97a9d9ab7e0abec869b79c1991d7273e4ad7caa32ab9b5c6621e6587fee9aba9ec66228d20b058226c69823c98b68ee1f8f2d0f88c0eaf2f0deee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c08c27bc2bffe1d6effd89aa6dc8b63b
SHA1ef02fbdec94756f0480575813d8972ce7a569c3c
SHA2566b045b1b75a91996aa6dd71c4bbad84186c32772627d16e9023cf403a9d00910
SHA512ac5977e50b98bf574c82b58bae1e92083f324fb97d96d1df35e0e88250550f8545ad5f128824a0f3dc8da17c5abe98c36a3272597f66b640b546ad0dbdef4741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d58551a5bf4b149204e547b43896169
SHA1042368e98a56ce83ab98d489e6d7cb7469abce43
SHA256f1780fcb60e4cea3870cadaea012f1a07918e4b16bcf04e0f26b48f7e6597494
SHA512e1c870e4b2015b339248eb79dc25e317e91a3c1d84a663114558111073c68b0f107ef5b62264d5085951ca98bec54094754159d9770548637b41747bf1d8ec95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537930ebe89497eab5b867ff64b206b73
SHA13e8d4ec16930605d1abdf9c6c2276b475d3c50de
SHA256f5fd8e7dc02b72769c3cdbd6bb22992a74bbc3a84e2684cea194860bbae54e20
SHA512fd8cb17b744ed069152d8befe0a5c2a9ed915ce09a6b4ded9aab7502ed61dd7b327826b3aadd8c2832cd5df2960d79ff20fbaea86d59d58295a1e45dfad91f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657b04a89a51cce5fe5fa8451d884445
SHA1c1b76401665f1f5f9280edc706772735892f5349
SHA25647c778781eb5b9280102df1a23c38f16e396166eba3603344888c580e1a98a40
SHA51211deec6d0924352dc55efb3adf8c432e2fd763413dbbcc8daa926a3c849baa9b2fbe0bc9dfce5f389840e15833f129815d5e72ff4d50d039ab4de3c7ca818bf3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b