Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 03:23
Static task
static1
Behavioral task
behavioral1
Sample
3bd26e6a4e96dc3053cc8074ce2772e3_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3bd26e6a4e96dc3053cc8074ce2772e3_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3bd26e6a4e96dc3053cc8074ce2772e3_JaffaCakes118.html
-
Size
6KB
-
MD5
3bd26e6a4e96dc3053cc8074ce2772e3
-
SHA1
c05fd33338bdedc58817ec2e160be8b1799bb06b
-
SHA256
7b271cecc2035e011d80d19ea7554ea23424baec42aef41498b1302e65ee70fc
-
SHA512
59b6763d7ed0c4dcdb59cf71540c890570d1eac89c85f2a02d07731eb7152752b0a0dafe3200859f6fd40a672a7c8e9e1b2e19b23337b4fdba3ce458caaf7ac2
-
SSDEEP
96:uzVs+ux7MtLLY1k9o84d12ef7CSTUBt/6/NcEZ7ru7f:csz7MtAYS/Q4Nb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b0000000002000000000010660000000100002000000019bb5ee168a72bf2872389b3f129afff4dfa81d109cf74fb9162336de8e66cd9000000000e80000000020000200000008c024362f4b1236bba1a227534939bf150bbf8e9bbcc4865be31a6f3821a4eb2900000003ac80ad00a4b9db993e4bbda35692a9e10e245866e4bfd03909d656602a424387fb9308829ee3ae2a6b013187236f5f5478bdc3998aa3ba06cab871e5684c33a7134388fc1f16e5ae07ababd0618bab33acce3d27228e917266596805130c47d2e380f011cd1c8f563fd3f442b1888e5ced3d55ebeedc75a8edd16d653740760047e69468bc04731b5a119c76b79a6dd4000000012c6d01d676e57bb5e8c3890144b49ece4606e3c61af9e491b26ad59fe14384ac0b4aa4948cd2e3ed7647981376de8b44932e28181a3d612142a4ab6cf854ed2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E4D9C41-3FFE-11EF-82EC-E297BF49BD91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426916507" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1044641d0bd4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b000000000200000000001066000000010000200000006c496f52c0229fbcc9ea31c5ce1f70333ba13a1208c389341aed9ffd26da494d000000000e80000000020000200000007a633d5f690a916421ac469b77bb2f23fb0e8e42ad0cd06abdb241fbcee466f62000000091637a5308c4a1841dc741120d730bf74ecfede37bff78e50d8fc8dafab102094000000068accb956f33ae82e1f9131115c4e1ee9aa394501fecc7b3bf3d84c835761a326fd92fd384db853a987304573d7fe206c70c7a23fea8ce284cd9cc580d9a0785 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1356 iexplore.exe 1356 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1356 wrote to memory of 3008 1356 iexplore.exe 31 PID 1356 wrote to memory of 3008 1356 iexplore.exe 31 PID 1356 wrote to memory of 3008 1356 iexplore.exe 31 PID 1356 wrote to memory of 3008 1356 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3bd26e6a4e96dc3053cc8074ce2772e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1356 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd0d7fc4a10dc0a1b51bf013560a9242
SHA18b4b59a71b7ed36a935d365450265629ffd4ba4d
SHA256eafc5ec73daa7ab425625ca5dbee587806488132a58b3006ca9beb8d6d5a925b
SHA5124f38ccc9c4375748f27da09e09a1cbc043e7f235f1cbb456aae141a9064f54e7c629a1daebed3fc532673a31ccf7cbd1e2d93ec7b43b851332a8af3baa489e40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5789ef21859f757fa85107f1465a6caa0
SHA16b732c242b56c30f3a93a04e8816e119b5273a97
SHA25641f31f1b2b87a10cf648294a7ac273f5671c511481c23f967aa3791f166f3442
SHA5128b8c77d00402c75e115a8f7e4c8b95a849799fec0303d68d13481df307d8fdf72ebbcb67cd23e67e22e3fcf200255a4bcc5e8d87b5882cff62c113ee68e29b20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ea05071cb1b9d3cece29a8e8b35ca8f
SHA1e436ac387bab70c2fa5667f7434487e7c4df40f3
SHA256e5cc5a8e66b41ddc28429a7603d3e6b26f7e0602f6a22e0f22f7c1fc4a27ac6e
SHA512e90d59475adf82033703a2b67fee0f65bdf5da7752a21ac49a2d1147bb57caad2d4f90670450282fad79bd185e13d2e7fe515424cc8d6df09d34a92349625db7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b47440b30d04af0ed4916b77786792
SHA1913a71a7fd4285e38fa0f60620acf0aa57a9f924
SHA25619660877df795271abcf027aed71a4ff1f61d730d906cabefba336bfeb09f460
SHA5126cc4c3f8664470e039fa0a05a7bf616e7c6d66a13d4639e6f11a4cbb3a5d8be0014fbcfa77d259a8dfabc07a135cfc04f83625bee6ccbbe76ab9571906300eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554faf499b8570c354797034f149eec58
SHA17ac225a8df5cce2fc418680bc531876f22ce0a6a
SHA256b1ee4aa64ec89e22fd431dfdccd4f6d120091b51db3b79e1f5a5794ddffaba26
SHA51212380e5d87f45ab0ce04d6afe127fdfad2a8610696d537f01477ad77eec72d98f7cf4b09b9363f08950e45090f20b3e9fa5bbf98af0823bc2cc7c4ef319e90bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594abcfb85d2c9b521392e74eae031b0e
SHA18b9ab0d935e969a8252c9ba03564e4be330a7cd3
SHA256b94a65a4a652e7b8500c270739aa05943c00e14da622aba2c9f9094746fdc232
SHA5129b808dfbb7c7f525af4a7c07e93bf9bdad71f42839ade19601411d2c9356e8df3403d5ab35468a43b374700ebb24d0fa3fe768b54a0a72020141d0983891ad44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fc5b3f7f3ddc478122638824ccdd3dc
SHA135caeb9cf1e95015f7a82bb0ec37b48773c93404
SHA25667fbda13d80c83ca2ca2c3f76b1c38e95ae61a1418d405278bfe9dccdb738b3c
SHA5126be935451df99209a28f38f7a5cf8a97eb5eaabe582e73918b39ac5a1f881e7312688fb253da480bc4fd18c0b46aeab03172d9339d27ab2f45a9bac5aeaf5756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd157591ba0b10a20d872f35dc09ae70
SHA1cbc82c0c2147b4675699cc18cc05163e5dd103d5
SHA256f9ceef94e0edb53607dfd020d5fa7caddb594346be8335dc836e93af4f097ffd
SHA512bf28d22c4fa565194d430f8bc0f38a650fc026519917e3f61ae4fde985e76c09f613655064455e7b037762575bedd85bf3feac5575349d963e8d4b9481c99f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0a9098ede4f2baf7b11e00e2a3655c9
SHA11e66d342b384c33747e5c3ce35f2fefa44acaf39
SHA25687f12d31db7e30aa105374cb3d25e3c9b4a10fc317fea8b8193923fede197c23
SHA5124ded7340f6b69bfceb638538789db4c19be6b215704a49d7cb298a600b6700ade45ab8370db4e61f316a5e8bd50338a4aa13bb89d5d4c8c44ec7f8ae4f566dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d1582b18141a885d2a64fda5e9aa005
SHA18a945fb03f8679d5999fe8c062d6d9f056d47b1b
SHA256e5260e7e66959b731ff06149e5e2b6ecd61962bc9f614327e484e9e076709dc0
SHA512ced04f8c31126f9ce4e9d33a7e86b6e939e39a9828c80f714cf7324b3d1d3455f33f0f322163988e6d860d2b3db5c3cea027131d6c770decb1194df4fe3dd5e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bda776df128ee851a4ff23868139ca4
SHA11f98e08ce9de04342b97758975331c404df77548
SHA2561ca8cba2f969dc5ff511076d1fdefa6b153173f10fb74ddfbacf4f6dfd75cad1
SHA512293a4abf3e02fbb5775a76d208aaa47a5ff4d712e6445c2ba4f6e5b5e04d081df9f30f9d981ed6362883daa8fe9d5e2da53f331b0ad273ff88782a965a1da7b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0e447bbd5e6da6bf18bd9e4b87188ae
SHA1db4c6e53d463c4f75523b0838f004092d68e6eff
SHA256bc1bb03e93328ae1373ff74b89fed1d21ab66ab1ceb25df76ee8822057145c3c
SHA512ff3fe519943a4c559ec2545ba96cea22b14740e5681edb453dc8cc6eb4e9bd4cb9f53366ae3c6dade1fda2b9c99af61b82821308a154f215c4006af5018c143d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f941e5c6544690ef8e69dbc01f74d729
SHA1014d5cccdae40b485faf8b2cc7a71607b511fbc4
SHA256cda4c2de9a61ee262735d522a7c5730a367739f6cd5f0ed6120a8a398be7998f
SHA5120bc60ed0a1ae675bd6bc78cf1033ad099d63c05d793f245d84bdad816cef849f5e530f7655b419da7706ff811175d1493255c409bc27158722c4c6b3bae3e749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1a405e0e6798b273eefd831d3c7259f
SHA15eb8a19d975e2ad0c3e8273b7905cf33d2997708
SHA256557663d9186ebcbc7100a80610dec1e62cbdf1a11b6474076f1bf5a73f4619d2
SHA512b6fd2c36d3285deb84d56ad7674d3dc744fc620d9ad6be41dcf516fdfc47e1b563011477b077038cc1a48c20349f5f1558b8be23868db9151edde0cc83d25a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528df302ddfa2cf67df94468a72c36568
SHA13bc1f1bb753b95c903a02e08ea56e3c3f0026dda
SHA2561eac467e9bd2c6eb020804621e77f6cf46217079a47308c925f625808c520174
SHA512fca9017541e14bcc0931a88f3819cb3c3f044f7ab88b963db69076b34689ba2486a02b0cdca7232c8e75c5f9ca01cfde2b036d7c0b0111be85faa86808ba3b45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b7aa19de4a66153df944b5a2ca7b1e5
SHA12db59c9e0327ac39cf7aa3b29d1dd62c6b52f953
SHA2567c8b5fe71222b67d24ca8de61cda93c51e9fac9b0ffc5519d798a3d9c786e2a3
SHA51226af0261ba502098132207fb32da7cf4284aabc7f33bc97193c79a7bf9b747dd124e7d981a1b7baa1911889e6bf2bc87bc0a4e2fc6c9f0be57f067ecc17b03a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9ce8bcb5d9d88d3fd482a9bca6ee74f
SHA163f127acd128008965de19c81e7e417d145b30d0
SHA256374967bf24d373ea29717f7f58e32d9838a2069a4c933a87b99d5542afb06c70
SHA512a4a6440788786912f871d3984800f2804c12c56bff3efd18e895c36642adb09ae4e2b1ef5300e71f14cfa68134672b078a64e0bee1092cdc895a0c8d76cd8a80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9ffb888436878da582c99f275daaf83
SHA16475a1fc01e668aecc4f2c35b7596b53df38a5ac
SHA256ac7a6c6b34c81b203a80f1ad8ec1e40e6e6c56524db7449498e249dbdce6229d
SHA512b4b1b6f998231ea7a6df0d963315e250f7dc974a6d031120ed6acd10ee9dbaf2b04c303ff778a6a3133ed87d0d6c80f474de4d4aadb32ec02f33dd9c616cf77b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550a44784ec9d6a01996bdecccbf7d5a8
SHA10d748682f130c167df437f6c36683f87c6571d05
SHA2560d5b5791c2862b9de7bdb84edb386e0ba526860cdb1dfcd90b8721c009bab4f8
SHA5122eb0bf837dfc1368293093325f3c2aaa157adc85cc03a16e9b5c433aff7b6d2d443a1d5589670665119fb8d588439a6c5b7f6a5ac7e7380e25b437acdeb2ef8b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b