Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
01c12bd5b8775de4ce63e685788a8cb3_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
01c12bd5b8775de4ce63e685788a8cb3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
01c12bd5b8775de4ce63e685788a8cb3_JaffaCakes118.html
-
Size
70KB
-
MD5
01c12bd5b8775de4ce63e685788a8cb3
-
SHA1
494bae6c688c9209e08f4ecddca594c7a21f884a
-
SHA256
9998a9ddc1aea77db74b99cf3de5623bb271c0434268401296a480c91bd99787
-
SHA512
f3e2439fcda5b766491883d97554c67d5c91ce5099b48b51674de555eaf91522f320dfd84a34c23ad588699038b11cf91801d306d9ddd195627e25bdcb3add3e
-
SSDEEP
768:QYPcDg0Idv+rMNeku9RfwrYpEF200ZCagN9tE4/coXKiBsuj9A1v88/k4i8Gwoh9:QYPcDg9ntztMjPiyujc0IdosnajODkD
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000126b0a684f56ea0bd35e59982cc910f4f1c7d13a6396a1c4edbbcfbe002ac013000000000e8000000002000020000000eff5c6a6a06ea5055414e3d46d8c642bf9ccfc95044d1ad94ca376f14250bac19000000064dea76b9b7a568c5ad8e779db760176f13a49950117f1742a7522df2f1eecd137388af0de37d791888367a5596c0f24bb6450060fc95d3ceab3b566db660ae389a538e58157e2eb71bfba6526f2999837e5cdf271a77e608f3a1c7c917400488c86f5f4e0b688f97cdb0edb000f3461d57a82c6cad51f3ceaced9a7642d06f963d8a3132a5400042bf1e5a2c704b56c4000000069d3c07555f363910d3244fb42d4928ee15ec5bd006873cef93534bec2c84e354b17831f4c744a20696838280bc0ea2e4fc6271cd75b6d25fd729e58e7c91f65 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425009308" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 306c5b7ab2c2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A323D9E1-2EA5-11EF-91CF-DA79F2D4D836} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000b572d6dd20bbb5422cb57fca320d8b40f163ec01c3257b387c3f006a45b79031000000000e8000000002000020000000de7118ca123ebf0a59176595842a2b028fa246a26d2e1c9b9f2658cd1f4e5491200000003ae008073738cd6f95a8e549394cfa94106eae36df0c4e441b6c2b825f5336c640000000f16bc0e1a58fd1ca5d93a31f09929cfc9a7365fa4a5a009459421cf4948496da1ce87cee20f00c2911b8c0a3e1a76b6c03a848281438ab60220be0aa1dd8ff58 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1832 iexplore.exe 1832 iexplore.exe 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2888 1832 iexplore.exe 28 PID 1832 wrote to memory of 2888 1832 iexplore.exe 28 PID 1832 wrote to memory of 2888 1832 iexplore.exe 28 PID 1832 wrote to memory of 2888 1832 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\01c12bd5b8775de4ce63e685788a8cb3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53547ded05cffbde5029f6be6181afd88
SHA126331ceb46e6664c675da70aa6e4809ef6b26ad0
SHA256d5cab3f10fb1c5cb9e3ad10bf7d39ebec05287f947369904addbc0647051b0da
SHA512603a3a4351ed98bfb74720e6aea513132afa533fec356f4603bee459b061667c913103b4036e473c7b7bfd7e7a9ecdea83766ba7b55263b0b4a0fb2d632ce9f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f07b50badbbd40881cd9eed002dc37f
SHA10869550849d180c26ba3c04b06a37b9715f06290
SHA256f817f5e769cded3eb34e2cb13d08f83859a3df2f3e6732c2ce90af37978145dd
SHA51284e72b21964989a1ffcebd44a8394f3c8e7bfce3882f43b19786662893b4dbed4892eabd365a4ee795f6c4c375adf7e5e8fd3c38fea0b8b5926c41ff71a94ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cc437f687fd2d8d1df8af10fad0c2a7
SHA12222e0652af8908ffd52d40fc797ea112b7c6922
SHA256234da297244e8b5c8d7d279c0912a9bc648d6ea4782b647646f50ec2b539b00a
SHA5122fd1772ef215c38f7194b2bcbc2c08863203f46b60cd4a04f41e6cd0050bec9de361425efdf1f038d68572e2171af5e2067b6aa3a9feb885405f3cacd8342eab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da59106f12604786b207d6be67d39c3
SHA1ca480e0a40ece3444f601a0651846d6f6b5f608a
SHA256517d55c3888b4432990a99ff3f4fa1a320da5fd76d26ee13156537b5ebeea773
SHA51229749f04c26fd032aa19a06e4bad12cbafdff0d36d16af99ce13da86e89513668a07ad3a76ee04156f2aeb5e67d425f6d67858adbb319b548a4890237d284aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d832025f4e3a5a55e678956f0118997
SHA158749d7889a7dfceff90f2d19d703d0ec0cd9c78
SHA256be6ae776bfc8f988f98d0cac4f0b627d75268e1ee1b30dd5513ac7c07680f6e8
SHA5126dbf65f7f6c7e3aae99e2b3eeac6548c4e9101b6ca0170a274945d8e8489cb024a23aec2df94b25b4761688f8f376d704adead2dfdf0816f03026f23543bce0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5520072707023fc04cefae8cbd8a6e7dd
SHA1aea46d523f9c706a272601517cf4f6f9785cd4a9
SHA2565d2a5b39aa4b79de551fd5c3ff585633a3f35b5e39f260e20562c8eaf89e878d
SHA5122e31611967aef773cb6567ccd9694711343749dbc6c7984221f3d2cddbe84b313ee292e82f787cd952fdfebcacd79ad54ac0b8aec7a3c6c40c026f77d76c5e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552ffe7d6fa90b2fd2c3ed1ff914a0c84
SHA172472adc0338be07d319d0437928be46c22a64ab
SHA256bec9f8b0ec215c3a53edf9b6b7f975c5383bd342662e242e91e8b6c81fda56d6
SHA512c3b340020ad64905647fa46279b972a6e6343c9790f66f1bfc73273319742acc43296b2f56978da964191bc49b53fdbbbb55b6dc77677b085541772371a69ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1d546b303b423b19c06ed9d715471e3
SHA159d0a51b1c16e9c79775ad54c86cfc01e729f24d
SHA256a770f731e71a0f9e9972e4eedebaab406ea5551be1f618ce52122817538f06f7
SHA512c63bbfbc48205a24a9bb350ba872ecfe572ad6d6ba94c099df64d9b029742f1e6c20a697c4b5b0b00cd3291675f9602914cb01b915a8ffac1515b95b3a1968e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b86c45723c7a4e2e3022ffe499c222f
SHA1470fdf17d6bb65ea78c52d0ac4ca010c02392c27
SHA2568ad9e5d7f0d276e116e8cf489cf5705a673e80dd9a866828ea770de1cfa85698
SHA5128febdd4a4bff9269f90e108e3f081f5beaf0bcee3a9e4114e28a6406da37ed6089e07b5fcdc6d9137d52fd54d0d99375b94aeeb67ba526bf97bd23dc005bec47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52504adf5142f4c49f9a744587ae78546
SHA15fbe60bda4e589a5a8a596e3e33d8c02c4e922dc
SHA25674ca561f7c667d53630a0153b6ae1f6b0391d954cb785e0dbe5f82bc5556a1e2
SHA5120ec02d1bf368c4d0c5bd0d2ffdc6ae45806ebcd3983c02bcdcdc900abf54bd1b489d962fe139436e4c61de67db49879dea9c905ca5f10f392b8ae9689f2a3dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5746a2ae6f451defdd414a4af43d5a5d9
SHA17696c0772021683bf63dbfa5f6a6ad64d64f6b7b
SHA2566e0887ce213ac47c9ac84957916ba5a3a49d7b1a8901645e6e714ed8c3a46098
SHA5129f613db343d30346b84f06a6a06919989902fab766b5ec4fbc0e40ac835ca9a3aa983cd493ab4da04f173fed151da6b55ef10037adb8724231dae1a0e8f68e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c91383ed35655a1079664f5bec5f3db5
SHA1f910eac1a22a674e8b9c6a00f53b0c7f216284af
SHA256c66816a416793052e06f60d2d401d4972f5b6d9d589056c049ab80c8b6e2f503
SHA5127728c8fc5ae7092afac312cc89d0c3a42316188bd268c9b42f1e32b79f172a40287128157241ce0ca72058ede8dd181f8a720ac22483b97dc01ffa8c29624e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505eb336ff5eae35a3710e0659ffd9660
SHA1766e8844d5364ed25c70af5d2be24ccf4712b2d7
SHA256578495372cd448ecbb27fecbe6d6cea92c43a3f53f94a1a4190e3e995dc0c307
SHA512be1cf6b40270d289a93761f7d56984f7f9780fad9e662f820223e50997b5129b7734f73447252e785da6e69ae05f3797fdb16b032041e8db14e3a176bd910518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aacbe1a9fe31b84dd465418c54cd9b0
SHA1679f74814824434540055c7817c851eabc6d1b9a
SHA2562a92be8531681dc73770f5eecbfe4390baf3f99f85cf0b9324dcab01857b3edb
SHA512a1591b46ead837e9bf9f54cf6bc4c52ed8cedeec8325049e6d2209aaf79e0ff0fd3b2882bda41e95e00e58f7969b738a655c6e1898ac5ab1c3007c217343bcc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c61a1b23a82413a5a0056f7d645490a6
SHA1638276018c72186c2c90a39e2d4bc81add2c5668
SHA256e24ea739a6d422cf213af337749acd8d4912f69aa82ad0c37c67ebdc96dfb819
SHA5122548ee66d9170e28fb52d35846531f06fa251a2778a4c17807a9dec226ea6deee233973403f134a0ac862e12c6ff8ea8f3f1e5ea84c784a9a0147969df213afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520bd234e301b4e14391c8a892a7de4e0
SHA1d93b24799e5362fc74c91dd842b842e5a972d5cb
SHA256dde991283fe00e62db167e3ee694d93e126d86ae84bca435a604c29ff2c7bf5c
SHA5129c81f07cfaaa18b6806c292ddc5a21b264a96ac882fe3e0ffa61d6ba99410d229ba5a083ffa9b3d228255ca7e772262f82cec8571d1b6e7bfeb5ed886961b4d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5928ac8a53de89de175b868a0b291ed55
SHA1db1b386487e3b76719696c215f3d229e61fe2bba
SHA2563c5604a781ccf1c694610c80ed2d19b1275d4f10f514a6b71729d4dca9ecaed8
SHA51241e6617369ab25473efd280cb7083ded684c990a0155deb908600cf8e0f371dc3609b876eb4195669ab8d2afae33c7fc419f7ebbaecb56dae3bc456e3a17a14c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510f35fb8295f45c42d9fba47f3dbd965
SHA1c45b8bf96ca84ec4240cb9a629a2ad80c2c678d1
SHA256fbfae6c7167d7f95c77d1a4e0518c037427e32e99cf86187861b294be66e56a3
SHA512b04503ec01117e2588d93567a46a17e7e59170b8962a02dbd5132436cc77f351f9ef169cd91f32e22ec6ad66966a2e4d6ab851bf0d844d3fcbd8e7eeed781eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5828dac09c6dd19274b1e5dceb65c6f03
SHA14d57e4ac91a5645012b12e13e830e22fd2344d87
SHA2568d238dcbbb8dae10bd678f98d4b22d2f60cac1cc3cd2c065329e6e1e3b150fd8
SHA5124e0d2ba91514c0a3e6cb50c9cad37462d72850c2b91204cf7d6386c964da649ccc08b0fa69514888696b195f76693c14af3c45f8cb5a821fb82aa77d22ee4efd
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b