Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 06:56
Static task
static1
Behavioral task
behavioral1
Sample
2cd328372e7afca8ed9311c4d46704a8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2cd328372e7afca8ed9311c4d46704a8_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2cd328372e7afca8ed9311c4d46704a8_JaffaCakes118.html
-
Size
213KB
-
MD5
2cd328372e7afca8ed9311c4d46704a8
-
SHA1
5669bd6698a4990f073cc5235d2882a9fea9ff96
-
SHA256
764bf33b8547a0c69f4e85b00a7c6a7a870ba17532a4d6a04d4d7506b0d13459
-
SHA512
a1147da98e1c2502319c9c723e8259bc602494e61c1ea1f85dbba3f0c9fe59d64f39d5fe4692f056e3ecaacac43c9bc84da634ea2a511bff07048dd7994e6891
-
SSDEEP
3072:3rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJVv:bz9VxLY7iAVLTBQJlVv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000969990a06c4ecb9061734e556603a2b61a279f6a1e5edef6edb85ba6ade03653000000000e8000000002000020000000b9fa9746aa56aeb8fb5331cc630e9b75598a079bfffdf34494d208c578995cf620000000d73a40ab645871f5e8784a4dc459e22f98b16a0675c4dddfba604b93e38abefb40000000011f6fc20cabc4cb08fe86e13c8f6078333eb666b4263dc6ed300b1cd4e91c5fd61af88cce11b22a39bbe880fb59710c2b9821ee61501eedf32fc3e9729ca7c1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D159E401-8669-11EF-BA28-E699F793024F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20dae7a5761adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434659319" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1920 iexplore.exe 1920 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2320 1920 iexplore.exe 30 PID 1920 wrote to memory of 2320 1920 iexplore.exe 30 PID 1920 wrote to memory of 2320 1920 iexplore.exe 30 PID 1920 wrote to memory of 2320 1920 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2cd328372e7afca8ed9311c4d46704a8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1920 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f336b34a8b2c26437822eba385ca7dc
SHA1203329bece03a379e5586e7bf429d808504d007b
SHA256195c449522dc60f7c48e87e9848a21fd0851c3d02e0ec6f32abfac20868d40ed
SHA5129cfea44752b96d39e1d889cc42943c0c0c9bd2f3f29576653770f5fb0d8bdd0d8c009b2b4bde9a75408458b5884c2d7ec09144b416f63ea1ee9da9ea3a16dae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb7ab6bc5aa0e68463de3df36810dc1a
SHA152062082d97d14bf46a60561dfce1a6f0e389dd5
SHA2565ac030c2b6206a6ee168c663950f12f52ebfc99336eef4cb94ae1a057f149edf
SHA5127a6ef7f14fee1916fccbff88075da24828b7136f99cbca4bed737e1997b2f8d85e9c933e0b4b6259c6ea3872fdd5994059417276ed0c0f1274d371d379586c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deb5fe7f5956f98e773c56a3595087f1
SHA1346b1a4b9d4d8610febcaa7f78d213c25e59c2f4
SHA25661e5937bbd9592f6dce3506b2b9823ba046b096531c489a73306fd47ce0a2dea
SHA512110ede9785e21800bd5b512d05ad41283bd8de01bd0c0f441e8e52839ceaa5848a34ec5c1fdeb598f2e1059abd33bd710db7a5fb7a555b9c8c07713b35f6be86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53643e6d4349ea9128dc33615e11a162a
SHA1050184a347def538ef462ba3cdafd735ce89c72a
SHA256474a1c660ee52dd4fcc135482e687e2ac972994c7764a9c9a4b0cf3a823feaa4
SHA512df2ef64e85781b3c69a5f178c315d16457c2c549dc5b95bc888732c6ee5c4d75127d8404802d2e3237d8cc10a4d03fc0652cde8e9b77c0bf4d7fca0f48ae36d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ab9c4363fc852c6db7d39e6b30b292
SHA1d960efef04e789e6b7460479daf985f675c37615
SHA25628544648d266ac4bcdf157efd86390c774fbbeff48c958734fdbbdce71bb4574
SHA5127dbbf950f972c359abc2e8ddac0674811e1012ca2a88a29bbbff68df78deec9e024f0f9b0af9bec6766d9bc4ae11e18df30301ec38dcfc5b818bbd8caef7f867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab925fa64d59eaa3c243b91548764f22
SHA117dc4a486ab5eca506fe76e78504dcf22e9efdc1
SHA2561f68197f3d0410e170761650b726fa2777e903633a8a38650e93e10238762ac7
SHA512c687350d1111140d84d18c543d98aafcd899eca8b9f4ca24dd63ea5b6e2f7bd64e7bad0230ff97fff8e09b52852a6349a081972aed72c289b6ea82bd2e6db9f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b780c0276829af85242686733b85adf7
SHA12c8e7fbf8e855662aaf553daf48b6968fb8e7f41
SHA256e5a1fae31bef933e24051bcb49241965fdfc164812e636c080c38b76cd1c994c
SHA5128e424a5bd877c9467ee7ad97dca840b20d65b9a6c8931b025da755101c75029afa3461c07ec394c91d876f19c5198cb41d9d70b5db072f34b0ae2a6cbb637dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b8cfefbd4c2974437116818948789b8
SHA1068e60172ef0b7d092fa202057000a0046e49933
SHA256646fcbba327fa454e95b1963cc316ec5916a08ae579218d81847e99698e10a34
SHA512890ead70b2e45b7840c38521ef4ff8d6dc93c19b2ba162ace45ed0395c1186a626df7e842609467fc62ba6793c69f2ce30ab25c8faa81e141a7aac159b6dfc52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556c0c8fff3ae499acad1be713e9aa8c4
SHA16a7cb89beb5162c29f2ad7184c23b080cfaee4f0
SHA25643977d8215d43e0c3634f36bb08295f13a5468b1d780071538b147cfd00e353c
SHA512749764d931e71cc61dd4791b1d3b768ab29958f3706fcfdf69c1a51b1a794f486faa297f95f5fca9cd31150bd7899dbbeb1348b091b69e098b82eeb11e804f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad864ab3da9a981120f8e87d4e5c2204
SHA1e36eff946025b82e816ebd3db0dce8ae396517fb
SHA2561ecc6a9d7297235786a6991cfaffdaecfc5752062f626b3c0ffd98f6787de54f
SHA51232aaf31f95b9b0a5453fa0ab902ae8e1be55d5165a0734da6976a6a99546cedf8c7bc21a9ac5c032ad046e2381a7083613c840ab91bb6757a016ac364bf2cf3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529ddfef1f6e4c52d71b6a789cbed9fa3
SHA1d5b3d0b27e7086fbd42ba749e8627027d508c027
SHA256e6929129e75ae837a14fe1642cdc2f76c054a06132505f614b27aff8810aa297
SHA5124acec2d784fd92ef3ef4838242f6ba089c5f199c9f252c41d0a8edaa1f82450f86e3e6fbf97dceb23e1e907adf245990a9615ec5af335d62813f8fe74f5e53d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573e90f229202f09a10f90ec6147298f7
SHA153017f92822ac1bf611a2fe7c50c59d77c87086d
SHA256d438582669692c2300e61ffca0ef90309023b895832603ca2839419d66688fb6
SHA5129c8cec67e94ca6481a4fe9264251478e860ac7020647266cb55d35d6b25bcc154e8f59e17a453176a4e3e4572113f8fd7de2fa2e5bacdc44a563707b0aed36f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fca49bc91d98c2de6be3760c1716c6d
SHA1fd5fe912f4b23e77a9be8e1d02029f73a8673368
SHA25627aded78d1440c6c965f2779b701c4be2cb78651484345520988a55bffafa754
SHA512cc943fe544addc6fa111adb7f233d79cd16dc7d2aa9114aeab3cd695b60b1bd925f3d7874304f97cde135fa2f009cdf811ba8f38d2833966b3a5659a317329a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52805eee361cb5b0ef956ec5062d8b0b2
SHA113fb93bf20491c61c98d0c548cfe43976388a8fb
SHA256ae389c40374d8ccb9a9cd3e259ff2b62d4437360c53f27bb59bff5125aa1fc4b
SHA5122a807837f18e5e95beab764fade5aa1202a7070273739e6d3b3c1a5214855fca2b833c61b266753cb70ebe75800fb37651d65e887897b614b477a46c878be94b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a3393873dc2cb061c7356d27605e064
SHA1ededb6e2877de206380ef6a4e66e08ff11c8b82f
SHA256ce78f8b1c0e593970ed1690710d1cefb8ffb94b7d9d13e07a3c78daf3583bdb8
SHA512584477be4dc488e434e96e1166cdc428d7a7c08d5bbacb0960e136e0d49ec4f87b6f11c931d04f52538b7dbf4d76f4e4fc03031ad3e6e95ff4c3aeb85b027b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5accc17deb2a9a5b6f8416eca31385b5d
SHA199fd7fd81bd0ef8c37858a5e5c4d20587722ffc6
SHA256b833f24322497e52943cc0a7f5ba556d675eba8eff4135697c6703314ec6c47e
SHA51252fe664c3083b2bb30a4a8afc04f7dde85e7fa6fef6043804c6193cd011cdbdcbcfe226bfb53fae983af1336216a7131618b09222e30cf3b7e2f38a060df28e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c0f6c3e12dc198f03aebf8d362a5641
SHA16eea4f09e033dff013df67e6051c54c87a5527c2
SHA2563a5fc560f0103deed4de401ec4666bf1b364ce18707d0baf0cd1a052956b83c9
SHA512caab13718cf0323ba65aa7db86beb3b23b905a5bbb21367a8599d393abd145cb4da6522a62db298b6b0101d0017c1f54fedaf39db5a5bdcaf279d25f52e8bec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504500494ed3a400ba20652ce77fc8dd0
SHA1df15a1cd8cf8082be3d4142d936e03ecf4204cf8
SHA256f172790d18f2cc6845e2cec88f67a8a968ade455f850263ce361d70e653155ae
SHA512d1c871afc89c31673a93824d54a0207359397641bf0e01fcd9cc86c2c5916faaa6e82754e22febde0963c4f8d22e51a2602f0ad7a1b0453b222dae68447d18e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b8d507a8f14aa5a08e40563134ee863
SHA10dccf92c20d83e0b852dd3afaa3427971f6e0633
SHA2563949c2579108b41b96701c8ada564793b79138857afc5302fe1d9f1d2897a575
SHA512910102f9b647254e299f4809e2d8ccf3611b41deef4874cf28c68c61a90b7bd6b0eb73f4414054aabe4baf830e91233e4f48600a3538e5141134eab8c4ae1353
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b