Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 13:50
Static task
static1
Behavioral task
behavioral1
Sample
beb91ee66d55225be47fd675ef324ffe_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
beb91ee66d55225be47fd675ef324ffe_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
beb91ee66d55225be47fd675ef324ffe_JaffaCakes118.html
-
Size
882KB
-
MD5
beb91ee66d55225be47fd675ef324ffe
-
SHA1
204c8ade5d06ffcf0f70b37aaa7f516d849fb343
-
SHA256
30afeae01f4f64d8432e4e32028380d33cc8b4206cf91ff512dc141ebfaf2aea
-
SHA512
35c9644dedc852358a151ba2c35f06ee2c7c037c9483d3f25f0f6d6271c8dbf07651174647ebda37043116b61a7cd8d278308af2b9bb65b0bd5573ce6d271956
-
SSDEEP
6144:hWFUUmMTbcGht7nUXUFawMlvHL5g2tQVP:OcQF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CE1A1211-621F-11EF-B2FE-72D30ED4C808} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000722ed95ae724b6cdf42f4778f06d48cab3eb00939542b85b2acdb484f158787e000000000e8000000002000020000000ff08a3dfdc463fc928c213dba609331106c63a6430c0767aafc79fb69061664a2000000030b01e6583a964360b003d6e590a3a5826af9b35af7f59cf8a4f755a4d079aee400000008fe051e054bd51bc1407cc3739e3077138b647202d89fed522ed73530fda8c9aad3983ac67fa1cd0e1a91d32449a3904145ae3f5214170e03eca8a8d4b01ab7e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d016b02cf6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430669289" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2436 iexplore.exe 2436 iexplore.exe 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2232 2436 iexplore.exe 30 PID 2436 wrote to memory of 2232 2436 iexplore.exe 30 PID 2436 wrote to memory of 2232 2436 iexplore.exe 30 PID 2436 wrote to memory of 2232 2436 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\beb91ee66d55225be47fd675ef324ffe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD57202e72cee5f5708334df3eaa003ab5d
SHA1ff863af6cc914b6bd47d5b731061b70d392a0ee3
SHA256f8594db0ffd950d9c2777aeeb9b5d56548523752faa79e660dcf11e2f8b685f8
SHA5129316afa205f654be73834ff0f26e6052af76f62a148dcc4b616ea84f3dc1d1b2e16a64551dcb129a6f0143d3fe72465179c955eccbed3106257190a0190d46d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56f1b58102fce1472ae303ee1afcf44ea
SHA149f033afc4b76f4ad9dea762a9f828584ae32e77
SHA256d0647b349550bac611d69642a7a0c3edbf26da9ab6847696e96f42f9c340766b
SHA512a82d2d67b735d95e85ff3880fda635d91237c76a722204f24a5784b3677823c174835bf7ec21c000db46beff7df1a0b92896f2fb63382da7ffc9f7809084c26f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5826028c98da0fce3addeb8246fd3e77e
SHA1ae744d1dac791d3ae44820be130e49f253ad37ef
SHA256ef2a72381c06845507e131efadd9aaf0f32f614532faf0eeae9f0fb31aba0dc1
SHA512d4e011712447c00eb4307c7defa69e2779db79dd7f371ccfafc86739c5a84aa23f5a074e7b618b338278c3d838b5caef8bf93d4358d047762b2c7af845af9be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51603da6d63035664d798e7a6335d2cee
SHA1584cc9b6e77d0d3d93f31d4ac328a64fafef689f
SHA256ab1f95f5e80fd5c2b250477107b323637d95791731ad0c3c9ec2a9bfb125ea65
SHA512f8c11bba2022edc2336dc4402e31b8046c1e86a4e02086970c1a1df962754d34a33d70624a8cdc8867ecfaf6e97b765367cbd676d72b74002cf343aceff9c4bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5608f8b66e91bb0f5e4858f7d78160a72
SHA1b00d75ec29d3f691df97450f6f3bbe47ed820909
SHA2565c2296f1b7913fce7e02c867af230bf6a14cf1591fe0d53ee56b32f0a1152c5f
SHA5121a20d1cba62b1ddfb2f9c2bb1edd226407c348b0f2170ed304758d8fcdf461f8cf4e5568f14a8f48f07709ecea58e43938c556d91bf326988b7adffa64f20160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55ff0ec8d453df16071bedd161b344867
SHA14260ef9d106bcfc409ead8ec5d41983ec5223592
SHA2563349e18685b2eb2089a1c50b521c9cd26a5b37ca2aee5d7422229c13db1edadb
SHA512d6317a0b7b8618a8ff2091b89bc48c7a6623f66ccaf899896d4cf802dce07701b995fa014111a4267c47c1ae987c3e50a1db30bc7ca8510f4f277371a59fa2ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD572e9185d525ca9f092054bddb8e3b494
SHA18bf665d36af4d113815a82fb42298b5a27464bf8
SHA256dbfdacb19c8016232b6a1ceb7397077294cf348f3f6590ed476d00ab245f8ee0
SHA512c218f3ce3809b1e2cda86a0332b66bf96806fb169b8349b3e5a5667480b73ee6c963e1ea01b980a08587aabb17a4d67f56f03352391ae3513274fa5f99010e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b751375a08cdd750479b3c7afba12361
SHA18919e5bba2f702f07ee470962f47d675e0162d32
SHA256acbbe2d29dc566eae07a292bc6c1fa7fda5fe9c003b232de4369361be0aecbd9
SHA51285cda0fee1d322f532c45d3b24baccf62f5025c97cb3bddcbf69255be9445f382d6404a7b967d1fec93b5e0b8761626c6f7b904df494d7aaa6df7448ae2d98dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e7f68d3673438cb33873a479565b3981
SHA1c116c2d8b79007f15d4bf71ea0ef5d8b8b5e6d8c
SHA25681573051dbd81d287cd01f1142efaa5c4a437ab993691d664b5b53d67434acf9
SHA512b55c9435e7fbfb9c803c29a7cc3e7837bfd29f6f7a11b93d19a82448bf4eb5a465a8e9868213ed0649ea550d05f223dc0f1cb04cff3c804d24067f786f414b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ff68d3d85ab3a02c009e0467c830ebd9
SHA12e8dc7dd30960a3c634bf48cc13ac35d45d3f3f0
SHA2563792a097f042808470e84fdcc479f8b7d902a36ed2df0a2e78d035fe586be2ea
SHA512b48bcc510c07f394ab8a0ddfa5cd67426f0748def9b03c9d343898a0775d8e39d52bd3a5d9072a9bae504cfe3fa12d1f0e029a2d126af0c6502f570515805af8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD590f62be5f600497b239412922d2aa031
SHA196627eb6bff02ab72f376f9d9270564e43421094
SHA256e0e5f23de6a9a10509f5b27a8191e8b553c3e72bd238956b67aeba83309b22c6
SHA512fd3f6f6c4d220ff6f5230f2a0ba805b0261820c84e0a7f347d1f893a4ec0567ddf29142709f8736abbcdf16848d153cac39af106f442e846428d7278e3968543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ce3a008dc5043972122ed41b78917ea8
SHA196716c3a7a3647a4188cb6715979910ef95a4a8b
SHA256105a0002a4f66d11d243c435335bb9534d4e24d5e0455cca54c31cb101effa5f
SHA51253c796b197da429980c5e9e54296e6a70650c694d2aa40cddafa2e85e0c19cb418af003f8ee9eb0d886d8bdb8ef3e959dc2b44e8980e48408dd7383a0b8ce8f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD537b2894e916221871a588140bd467d09
SHA1714a3f316169387fce863358463766b242962961
SHA2560fa272b1b1b66200d50c6f4fef37e9a1573cf76b1a0301b1aa72c4812790282b
SHA512088b5c5fb2c4eaf5a8eba297de78d18bd2aa4d58080b9dbb6f5b1d888811267c3aad17cf993bca3540ee3d08e0dc088ceff8d178be6d7d246adb3247e5217f28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bd930d51ce5be23237306ba6810d15f3
SHA1aab14dd1a87223dd9df003135cd71090c9c7f9eb
SHA256669d821bd82025a5f7d6464711602e87a461381effe9645087d830ead5833ce8
SHA512e24600449184135ce91448c248a8da59b672b94e5784c987a20913f01e2271b0c9cfeae907be1ed60d17235133a627f62269109914b8ab37b9b1108e9539eb04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57a63dac8a941fe7f7de4a2376ec9a60f
SHA198575f8cbe67db64f26752ea7df482170c5949a3
SHA2568b851f3b6ef72cdf940aa01155d17a4ffea6a062df7778284e55460633b60858
SHA51218e27d259b937ff894c0d4925bf5e89df467e04105438123fd72eddbf71895a497d58735b3e8f31b11484131b9c95db0797517afea46106f47db0f1b3aa7dbc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50bac4cb10fee4969c205c5e78a40de41
SHA17cfed0b185fb1180db8ce4b8f6a316661866e94b
SHA256226ddd8bd8db94f0a34ac8e1bb661b443aa793747d77c10066ba0f370d9abba3
SHA512341eae7843662937d97c18c45b40be8f5e2140275e3bb52d252bbc4fbd2be57583bbae90a996145de7a602cefd5659400d3165e9f99f72d5cdcb211675381f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e9b9f064a13cc710c4db5e30e39a9360
SHA10af5363ac66a6e2a02f71bde05af989ac06c71f3
SHA256cf38892e6c5359d3f8b74ccc4edef46536d7e6c4faa30dc45740b918d5b11c5a
SHA5124fb938731e069700cc67df0148765ae8df2e04bce4916b227d8b05af0d9dcd79b13432deb706d87947c60ac5d2cf7d005d20c1b7fd688d526b6da18cf7127ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD521115895dc75aaf6250275b1349b574b
SHA1d162bd9fbf940fd11141a2041c7d2e453dd7a884
SHA2567bb35b811ae04191465290172fa694baddc63e91fef0427e5be58723fd0c1e22
SHA512c15c51b9f324e8c62019f33ad0d7560011214c06756f3d3e08559c8db600b987f2a1487168919b477b68a3c9e473a228c1255b1e3fca8cb20daf9f876a771473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53df3662a3c76112a1637d6ee9fab9f14
SHA1e6ed7fc3a257ebd4874ef58eda92ebfeb6ded24e
SHA256dc4d4d15bc3d772361ec41570f39a0f4d24204f699eace3097393b19bad9f936
SHA51296db3a9882907f7cff58c3bbb373fba192d3097172b3a20cb46f0e816a27992c2b545e983f3f5c376a2730029c57edfd5799403b5c4c18a069b2ea6ec8b93b5b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b