Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 12:57
Static task
static1
Behavioral task
behavioral1
Sample
a9cb51145c33e725d6dfb215b61a332e_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a9cb51145c33e725d6dfb215b61a332e_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a9cb51145c33e725d6dfb215b61a332e_JaffaCakes118.html
-
Size
67KB
-
MD5
a9cb51145c33e725d6dfb215b61a332e
-
SHA1
c7599925d6fbb23ae1232d43f6b029563eebb45e
-
SHA256
a1d1325ada09ff2c23b93163b7dc54219d16822eaa85788d638d7349fe273d07
-
SHA512
83d2440ef74a4294397122a277886b71af04015243febc5cc1f265fbdfb4beea3e808b420b81df78af82cd6ec79a3c4b7155193f4c1bdcf56b37652a4b990949
-
SSDEEP
768:Jiggc8nX9z+rbXT15/FIaoTyCC8koTnMdzbBnfBgN8ZYyxoogQFAG/sy/Ijky/IA:JiNNzkGDTipc0zbrga5TNnGx
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000a8f65d7d417df94ce5263bf6cf49a34b6eb3afd5eacca3cb101812d83259f7c6000000000e8000000002000020000000a12b40f697153ad07243af99dcf5eb6c6d9f6a0015791480d1d637df57775d2720000000d004dae7106a15a57d9bd701c79d3218019a679b52c9ecd0fe6bdd642978588140000000e55a341669f90484c55c85ac1f1f8a53a16e48efb61eab29d323715f5d40069172e9ef790eed47a78635b0679c71404aa2c5e9f35bded6a109a7e2ad2f40c057 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 709e808a5abeda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424531740" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5D51601-2A4D-11EF-B477-E6415F422194} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000003907c608f487bfc132a85f652dfd501a4932f0e46adb3ca2e5951d2f82c35371000000000e80000000020000200000002c582c5dfa6bfed26667d2b2f639b4bd54cb73ae15674e0ebeb1b0cb104ba68a9000000092f317c1ae64811a9f6f6e379bb477ff8e05138abd29b5e5a98242d86164fa505c2177e4b9b00f3181cb9693255a685b3c92696ef7284dc3ffe69a7fee8c5cf428b21b138183b679c923c6dcbf7b66c87a725f462a0a963d08631fc1e1d4a72903923cf90470f368e4cdd70e7d4c698e9e7151268a2532491062248a7ad87495c84efa54a3c7706e077c00187260126e40000000a574ac5e0fb755a059b8dfecb70e3bb8817ff3943cb0f9be5e3cce04ff1110411e0e4567156dbc71cefce65d30325d96cd780c2b8ff938267bc2fb39095fb6ae iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1244 iexplore.exe 1244 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2352 1244 iexplore.exe 28 PID 1244 wrote to memory of 2352 1244 iexplore.exe 28 PID 1244 wrote to memory of 2352 1244 iexplore.exe 28 PID 1244 wrote to memory of 2352 1244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a9cb51145c33e725d6dfb215b61a332e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57be86951837e1ecb576acb23002e1771
SHA1916ad5574be721f2ab3f80186a09a3abf768f7e3
SHA25680a5b2c318896c64986569030d063b80ff5ace73b5ce474c91ea880f7768fa07
SHA512cdea8570a1057e26be9d0c750c3ca3bef8e06b4647f1262177190049c861ae3a8e8452da99dd58696034388dc39d281444ed9b270979534f59a9a8620e2c210e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c46f02fa217fc4b05abfa923fc0154b4
SHA1825d0e948d385cd754d3be1baa85a0362d489a32
SHA2566810561591b7e108ade7bad7a953d82b69d334f78f964230a6ee53722aab55e1
SHA512bf1e3637230eae5b7f2b2ca0bdc91d2265cc047f595665d6ef2215c52e7dbfabebff834e1b0ca14ec6a4c124dbb6129935bcc2a3baa2258440b4960d1d3b21ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5606a21f98b7df106750de389133261a7
SHA17822b4fe7d6eecffc39b9c615990e30eb6f1513c
SHA25685a85774077bd88161e2ebc50373a014c9fdd78223b4b30dd3df738e6cc2cdc4
SHA5128b1fa25eda79b7da210b1f232ac67b7147acde588385c0d4dacc2745fe48f895be07122ff30e9277a8bf2426f38bafb8087c066dd7f00e6d083c1fb0d3bed9dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534d9e052b41f9befcca933710e8ee14e
SHA1867448c255fd851254fa217eb6ac8bfc75514bbf
SHA256b59e13a0fbd3fd62d860129ea5467133832a5feec5dc45f18cf52503b0940f1b
SHA512083b3cbcd6dc59a9250b3ed2caa0e514563c23949a7a7e3cf13f846551b16b849ff0f89e22d41b946dc7619524699512eb36a9c8e78d0c42b7d352ecc75cc4d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b361911f73eb37df088b98af3b22818e
SHA1ac2877e12c4f848a6b66f365ab8ab9191f92cf2d
SHA256150886bf3ba212ad6d7adc08cf7ec337e65cf06efdbb3ba4e0e120a10862f937
SHA5126967f28050f4a0875f8f8d303df759d1cfb82a177701c34c9924fcca84123f9b9e2081b09f67264bff222ce673f0091204214805a4b9aab59796014edbe929a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cc72fcd9b515fcfa4694b722cb5790b
SHA15973ff7c6bde1237c0a76dda175e1525ac2abba1
SHA256b294f218c4059e1ca053f99de1943e37af47f9a1fdd9b39224740fc0145b263b
SHA5124378affd1f8a9053d5d97575e3f955c423f0438390466e25292324b2765a52767aacdb7273842c6eaaea8709ffdba0fceff7de79d45c50ed62c1fc05cae9ae9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533147c7076102a365961f8141519a53b
SHA1e4ac8d7d2daaed5b99594ac0a20ce7b765aa7b9b
SHA25673c06ef57bcd09d0fa6a3a09303e944d3558f0bdd9e4964e8c65ca142b24b79a
SHA5127f28e75ee6a0c7c4fc93de89538b7da7670bbf9559d2b51c6e44baa01b98fbeec1cf59c4d84cfd22f9a3c86e57c9915a0ac994b2f3b7ed4e6d582fc3c2aa8200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b654e45f9dafa130e8843987786bad69
SHA15c37c5daf41f7b195fd11e2bbebf274ce2bad820
SHA256eb36ec611d9e85d5d87c147f1ff03f79698d3dbc94466603d1aecc02d9f37895
SHA512c773bfac272dc16134c041bb2a8f0dfcf55432e8bf102a79115b3d63385fa7eeecd8232e9601f7ccf1060f533761d578072c3160b75f1a6e727b2f67a763cb40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bf4e727cffe9cba2247958338ccd0a6
SHA1e6e62bd2456ac8961a019825bcd1f56186dfc7a4
SHA2560174af000d12ffab3a350252633fd592a53d1454076b2d249f6c28f90221382c
SHA5128d50cb28456068662f6729cd48f81abc6cf5a28f9c6ab1ada73b7fe2bdb1041247729c886d69d248d30a2189a8ef487d776aca0f5a8236f8f59cd6382675751e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f482ab47a0753fa4cf7dd385c4104a63
SHA13686e5b8397ec535eaa63294b0b4be625dccfbb2
SHA25653a5785771e3049df4f4a96ed70c82a5283186fd46527ecaf4b9871a18169ee9
SHA51218566e1befddbe0caddbf990b971df2b0a5a3599a1d34ccb11febbb49d7f42ff9dc471faea39f1df55de172ddf123b7b50320c52af77caaca293c289db795afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f72665c9f30dacb29fda9bb234e07fbb
SHA1e88daa9c2e5e795bf110104a67276e8fad0c16ed
SHA25621916e835fb37e79fc16fde2527678a7e6c36a81f9924d5487c7fa21f3525545
SHA512a82c9e520c8d3fb1b26cb7748c3f7fd61b9dabfd0e5b844b44a36057b17bbaaa16aa1a0130de34573500d6136f8cc6d4081dfccb9e9f1333db7f6fa5d3020f7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557020b63711ad70f683f4947892a5506
SHA1ec808ed33ca2c81068ec8da1bc58aa97021d0c5a
SHA256fb6814f06fc02430253d4d108d95a162b64e984610b1c9db2754132ac1066fac
SHA51216b94d3b5d4bf7959f45b8b86722e3713c72bf069302c5afe29a3c63d7af075863b5a52b7888b02878706141aa29a4d6b8fdf82cb1ed97e4e97d984d54c119c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c29b84ec1db1e4547a5d09a6dd87e62
SHA1794261fb451c7a4b2ea64f770461fd6de8adc7ab
SHA25668f0ac44a7ac8556e3ff45072fe083baa53d7232bd83fcb6c84244d07846ea85
SHA51282dd94ced02cd50b6d603ec949cb09f5906dcb259fe1c80fb8e5e33d497535c7a85ca15c24f9d4ae1da989b9eec4354d6fab1b86fb4d23b3acffbaad9065c1f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8605c4a007156cbddc1371195d29602
SHA19f73fba2da6a015cae1dcb18fe495f91305af058
SHA25673ef9a063567dd1a484358ef40fa374e0bb021c8196d39a6c969552c5271afc2
SHA512e908e01785e34c3fbba8e4ba0b980fdbed296862657fadbab2ca65814c9fadbf89db0ee711c5593757c4a140dd7ca898da5f9491655ff12e087698bf64de8e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c9e9434829089d7097838c40d3c3c43
SHA15737561970e199b4602df940b11431a06145f79c
SHA25642505f9186184e1de7e0d313143c6af096a039c67df231d00e06504ca3482538
SHA512c30fffca6342de7422a1057d39302c4fbd3a3903aa21d56f4a868ec6e755ea80ad9bd495ae95ea9f74b2400cd6a7f97387a04f8855ec7efb2008c65f81627830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8e54a5d0b876ac6b7b4c57401bb8b6b
SHA1d137b6bb11a0e3e41d277639bf5b385e1b69f932
SHA2564656e5071805137a00fde5fce2d10ffed83d01e29e7ffe173d2e3057c0b08dfc
SHA5121cc145563773c4d561be3a818f322ae20b9cbb726b7a8696c6e8168a12e3a3471af5aed1b1f61f62c948733da07846676e9854357f35fbaad8f6a0fae9e78b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5aa64261510e2737291ee1cda9d06e2
SHA19457fcca1ecc3a2f6e2f75e72d9c7b6162dbf286
SHA2569224ca83cb02ba8872235aec6435a4d9eb504154a4f33c844a6b9750846d82f1
SHA512ed3419a07bb58fb3d1edcee94b096d48324d4998358ff382542e9690ab7196f41bd940b99c8ba4b3f6742e9ff50b8a4e9ff56679adc080c9796020544da0cddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52567c314985a3800a58e7aa555008094
SHA17322d3e25b3d18ff2ca5802798395df12d1ec3db
SHA256296467cfacc39a2dad5474f191db8de9e106ea408fac3e074d5db2113565cae1
SHA5125b21766b1b080551164932e14e3a38648ab3c32752df98f9aa9228217f160057e226597a7812c979f9826c4c94743b64554dacd61cdf3d1000135894bdbe704d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a11e83e4d71f5015b2f3ac146e3a81e
SHA11165bc2f6669147e0efde71b998cff66e4051ba2
SHA256b5617274effefaa5e5418e16c035df270b528b8e4b571d16b6a7d0208cd5f9c9
SHA512a8009770fdfe86ee41fd416231c6ad14e4f79923d86f70d0166cff7419eec8c5aea44fe167d5d51e6026e42f597bc85d741b9ae6a86ee140709bbd4cb9b2ecc9
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b