Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 09:13
Static task
static1
Behavioral task
behavioral1
Sample
5b4f120c10e6bc8eb68faf7d213995b3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5b4f120c10e6bc8eb68faf7d213995b3_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5b4f120c10e6bc8eb68faf7d213995b3_JaffaCakes118.html
-
Size
10KB
-
MD5
5b4f120c10e6bc8eb68faf7d213995b3
-
SHA1
b4e53531bcedec2fcced3959c6b2334c93a5a2a2
-
SHA256
f4e2f4449a13cf7510081a297b818913531b2de34563568f8846f026692d1b51
-
SHA512
8d28cfc7c2630060e8ecc845647d7e246aac09501865f9a367e4b4570d514ccb70b36ce26681a793227be013782ec44af12b6a604f70958add4f0aa35cd71211
-
SSDEEP
192:csz7d0AYS/mqBJ0IaRX9/cZ1JxV0PHb76f:cS0AY8mqScoHS
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38039941-45AF-11EF-B170-4E66A3E0FBF8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000028ae7b72c275f96e5ad4d344b9cce4b2508e72a6cbe6ce715b1e627750c81d18000000000e8000000002000020000000dd25960594b061a10580694fc40ca8f63ec652e512f91b667df8ba4c3dbf92542000000084fb87c0462366ef70f07a2fb2a001cb841893c8ae02ad621e10401a29aaa90d40000000edf915930441f6d0f1bb52d376ef4dcc5b3b33416c74ca9149ecaf2d63c8e3566aaf5e3ccfc9fb9209f0959d4ff793901bfd58736df048e728f9b4576a7e126b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1014020dbcd9da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427542300" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2808 2180 iexplore.exe 30 PID 2180 wrote to memory of 2808 2180 iexplore.exe 30 PID 2180 wrote to memory of 2808 2180 iexplore.exe 30 PID 2180 wrote to memory of 2808 2180 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5b4f120c10e6bc8eb68faf7d213995b3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5704bd54e5a46600758eb29fa193a6c3a
SHA1ee85ae5f830175cfe34b7394ec8901f135cd636d
SHA25687eb504a6da02022b97eb06b81bbc4e96ba9fa12c11b74bf448567b6b2806d65
SHA5122396bdf8c49492e659a3fe035a39300dea5ef819c00bef5c1e40ba8816e3cb81d5f58d8a772fe2966c83b481f04c82935d25260bf1ddb1784fca893054f99043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a86fb39635ce99559119aca4779eb1f
SHA10555192dee52a9f67ab583eb86d8f74f2b75c01c
SHA256b30fff40c09318c6b1990b535688abd835c764633ec4e240b41f56dea59f796e
SHA512d93f044af208677f9b013fdf4afff98f1b289324ced85337b1ba6e16e405439dcd1772578907a46d23b66eb5c04ba69b1d9229f721138af8b91439d003db2af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578105d705df5d022f67b4eb051cdf025
SHA1a2b01b0e1fa44e2070284ab934c33f15740a307c
SHA25688254a8551ffb8a1ac918dd2559daad08f8c3f732ff6604916bc80b4bfeacedb
SHA51234606d4ed2e422e3545ef2c543e630eb47e543e5396422639c5870e9e948828e0b862a6b0e3eeb47b58084d25ad3b65e14b69f70d03112485d175b074ef05e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e55618d6b476db36ef4653be027e6e9a
SHA12c97895224c61c267b314bb5261034998bc28ce1
SHA256d5e1b0f6522caae462119093206acc0f1bf017420a09778c3dd169f9ae5669fd
SHA5126bb3c63dc30106a961e1f7bd4144caff6bf0875b6fd09bd3b8328d3dfdd287feb411e80674d725caf3a497e4879dad1b7b98c203ab0743e1412799283c70c3db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507c7c841fd2a27be3acefa19af4b588f
SHA13aa460184e97b4c0952333e33a8b9d3a04643194
SHA256e117477d0d08961d875cce9fdf81f114bad9559718bef37ca9a6a48877c3d4eb
SHA51202f4c9ee8b5dedb2a06d1a90f1eda9937d62c93bcc4b7e5a83d471ae9216b536611d5d71198aebd380bee6e12791793132ac268ea7087fbaf7cee1d309ca88dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bbb5b8225b67da5c08297919cbcfbc7
SHA166248c733c9d34e225f742609f2ef9fc8ec03997
SHA256129ddc14dede66e6bdf9943d23d128893b6cc3d6f1bb193ef89169655e03405f
SHA512cad3f9aa51fbf9093c3714b883c171918027402c78cd603bad7c06aef02b875d2de7bedfb64c4e161a992089819088185401a1dbb60fcb886f0dd396097ab4e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535a0c51cfcfb039e587005ef056a9e37
SHA1114958f5e2e65d2a5c219387d5a04b41fbf90c57
SHA2569ebdafeb41075f95e0af5828cbbe3c5fe3b2c07eafe3a0ce43fc8bf7e8cc365d
SHA51234538520226fe4161d96ebdc4ed4d5811ed95eb5b9a83b34add6a207efd6d217b8c047ee4021a1cab843bd64a42e788d481bcd486991bb399f592a5214572e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f71340d7e1813961cca34581f57a4947
SHA12f07c9e52db81b95729f89ce422aa7beb5138a0d
SHA2569757ddf5647eac562f66ad927d454ae0adeecdf460ddf455bccfdb916b1a1438
SHA5124ed461befb0012f7d95e1e50ccea04ac62bf2a6c97e906de1f87cf58539cf69d7ccda1e7ba3b0185df0cdb8da472dbc761b3fbe59ecf4f4a0ded05ccc28f5622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b8f265a8790ec51d6ca702ecaead4cb
SHA13cd64b1dcdbeb76f619bae265c180e21aacf70df
SHA256fe2988a81eeb6c28ab7758ffa00b3d8653f615b70964f4b425dc5fc33f2cceff
SHA512bc3b475490c6fd5c9673ac3554ea74297ede86b4bfc7dd9ac7184613608a9980c8ed87aad3a586861a6aac086f8a696e4297b1e14c31f1a5c6d971cffd264a41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c236dcb7b63b707a4a5752a1ead3dd93
SHA16d6e714d63008f54d402a993cad0edebd7fdcc1c
SHA2566740cf3398bbcd8ef9270847fcf18af0a5fc526710d0542b04864507415fd28d
SHA512d87fc42d64d59b9df7febd29cd713aef8cb94492cff65978afc49e09cd650419e851e62884cb4ff545f6b34ffdc2fbd6a2cb37a5139eb7001535a4dbb02c548e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501ab669d7e5faedae92eb5aed6cf96ad
SHA189979c3bfb2eb013d46fe08726f2268dd0ae526b
SHA25616e2e0cad33a1d035af92b7ae138de1cf1ab310dfa24fd7bb486ab7ed067ae57
SHA512b0f71fd8a1d3788f95d5dd45922d3c7847ae90bc0dfcf6d0c9f75adfc77176c18cdefb8d3e2c45bc0eb1a1c54217df807c81523054d5ccd0848d4537d6eddece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c1f714159c6306d60d60633b2f9cbb4
SHA1566790d40b778d925d693bbc27b838ae6fa8b250
SHA25650876aef8863537728aef5e06691b6867f6f2ee1632d5407fbfffedcbe826a8d
SHA512fbb0db9307ca20bce6ddef1e926034f5404a38c461a43ea8723d6df336a7b2e8e74167889eb73aedbf757e83ca75bf8470e8ccd96e2e76ee77919c0fd9ad1f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593107303794932b48c22a4b385fa5f8a
SHA14b6da3666ba8150cf0060a22e60dff0625672799
SHA256bf44834f172c3c50e5e52e71fede187a412b4056a9582522417c566701d19eeb
SHA5123a1bd33e55f0f3de22eb1f8fe15afe70b077f3318e5cf25dfa048bc2fe58f91196fa8f21ce12649f6939b5f3229b6929d0934ce2d3fd159c2084dc3d3bdcc5f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fa3e592482e1468a0561da75b6d637c
SHA1d984f7cc377eb73e7db9830d2993c56b21eca16d
SHA25645f85edc490bf389ae275216a7b1fbb0d0d094acf6829b6b1f20298c400c88d8
SHA5128ceff39120ac9ad17df918c8a0ccee9bb84561e94581049949aaa93984e9967ca883de3441fcfcb2a285390baea1e06a87e19cdb492013d3d9aab1fb263dfd48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f2f9cacd53341fb4a4de112f0753d16
SHA12de0c414809077871b915ca834bffb0c46a59d14
SHA256fde947d1bcab248e56f3d61815028f8017e325a2736984f428a6362f74665357
SHA512e410a81275e52fa8cec76a92cd47751b95420ccda248f2b78820ea8d2b67e6048c3b7feef9027c3cebc886a3ee1c32e93d399b05899bcbd99ba7926e19764f2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f74ed138635d2ae29d3ed47c75061943
SHA1054d4f14380d0696288aa10ad1d773e577b640eb
SHA2564ee138a1728b42f2d8a420b2e07b467f8bee19d34e919d104629e8a234c9caf2
SHA512477348d4fc9c26821ce1f65a77f36850124b3723e5ca93f33f926e8da177463aeb11bb26ce6ce69923302c462f00a741a3178c4ac2954a7c868bd6e02687699d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f1166b5c7db9d9fdc99587663441ba1
SHA155942afe46a4803d96067aebddf8854e8273f084
SHA2564360e66782d2ba192a0f366b230659755eda02f3203ffcfec45bb70526b3a493
SHA512c003ecece08cd62d1e243f88d61623de069f890adecaf93a0caacfbaae116ed050c981107b782580f32f5bc0269576d70f27c49836125f5265f4cbf7a2d977b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d4f6c75e71deb5837f0aff6a1224565
SHA1e20d306d8d5cfb29d513b4dfecdb47f8e408c416
SHA256f6231465aab697ee3ba4071e565bea0833f66a6e7502db42e02b136db20fec9b
SHA512a06836dcd0e2f2b6d4f7ec149051c5fc095657a1262581dc8f631203b7460f9e82f16a9bbee93723369cc8a2771f3a434eb76d55a3ed4c05952d2637a7aff9b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7b844707f56316fa7fbdb324214ef02
SHA1559ada9beccadc98a79e826e30f6c75e0e523c77
SHA2565d11f38d231d2c60d242333b4470998c81d0d2e2b0f2e94c9481c4d16ba12d34
SHA51249bdd060cd04b1ed5d36c966f8477d5c23cfde959da7ee3954b4bc6fcfa96ad0c9b5960e8b5bbd9c7f2c618357ac0831e4d1f2747526a3996f7540e3192ed761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555c9a018ba7e6ec2d9cc528e384f2220
SHA104232655097755ce6d0f896884aa9ecb59a2cf85
SHA256ba1a60a9ef89ae92e1f846d023a88ea480c5e3dcb60c903b579019e2be5a8356
SHA51228c437343be8a6d31429dcdc81ba2e2058aee1d24c085a34ae8a370c7b6f6b59efb63cff193f5173c21f29f438416d9601201e062d4b66fe0ec948b6ad505236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589f1c6f7afcd58f0b30fcbf1c56fa099
SHA10e8185a529e350bbd4aade14738fbdf229f76aea
SHA256b1dc13be307cd15f903c43bb21c417b6abb878aa104c828b715914b09ea07a78
SHA51297731988eb827315063b8ceecd4ffdfc57375e2aa21fc479fc7909157cb9453759337d6d0e5a586e8079a55bc78b024daa38422d76e12c444c485947182b4dc6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b