Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 08:04
Static task
static1
Behavioral task
behavioral1
Sample
d5ebb158460796d4b4589cd619aac3e8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5ebb158460796d4b4589cd619aac3e8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5ebb158460796d4b4589cd619aac3e8_JaffaCakes118.html
-
Size
39KB
-
MD5
d5ebb158460796d4b4589cd619aac3e8
-
SHA1
3fc52a5fc983ae2233c40185bb039102fec6a450
-
SHA256
50c4d28c45f53ba404d73fa5cd04f79b09c4e11fa9a900a62ee6778be328a1ea
-
SHA512
fcd478aea71b52c266485a0cc0a1ccbafd9b333ca24b5a3ddb8ea69afd76a93d2a025172ad1a02d89f28e8ac1e5ddb1fc9c10a13ed0be7df7047d33f9d705116
-
SSDEEP
384:3eLc4SXR2T/cgVhj88UPW9coWSfBGXo66jRT0tv011VwxrtMtn9M2Mwn:uLc4SXRC8P65G47t4osRM9M2Mwn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f092f1088f02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2122A081-6E82-11EF-854E-7ED3796B1EC0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432030933" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000bc84c28bd01af72e44fe636960acc1c28d09ae573ad8bec1d98fdeffbd280a02000000000e8000000002000020000000c0316f48aafd53b04a807eb96892911d2b6d2470c16001adf5b6d0e5a93d2bea20000000f5aa1cf119dc78470ed456c4e8f0dac929aa4ebf734b690cc3db4608a83f4cb940000000f9bb3429ab9e215eaeb701910360210bd0fbe272715e10d56d43be9c84de935a0cccf5dcbafed3fd1c9261b8fd652a06b561a0b0408b5316f35b0d0134aa3d1e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1668 iexplore.exe 1668 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2356 1668 iexplore.exe 31 PID 1668 wrote to memory of 2356 1668 iexplore.exe 31 PID 1668 wrote to memory of 2356 1668 iexplore.exe 31 PID 1668 wrote to memory of 2356 1668 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5ebb158460796d4b4589cd619aac3e8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585a5ce9ab0576853454f8978f59ae7ad
SHA1d564a6791b0e4f430e651eac211d5b9e83d53891
SHA256a1eafaabf696f0726586633d69d1bc2e2589c2313635822541e82ee43618c371
SHA51280dcea256f2d7941b4fadacf0d57f5347d6819f5804c81dd3a6c0183e38fc863fc4b136f51536dd5a7ff4955b15d0a2c7a94dd7520eb90afebf590f804391279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5837189d3edb2532cf80da6eefa6f232f
SHA1583be418650744d9f5e87af8b929f56b5c6c4c05
SHA2569b0841c8cc69003a7916ca1c0cba0856e15036cb3cfabd99817864814af8a5d0
SHA512b9e9d9b63f6764a203701029779b68067d6805af25e109b413c2137564b6da60ecd89e6705bddf53ec04f1020f0e8e4bab71db5604af954c1da130a076e1030a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550fc02dda5c9cdc74fce3a0f382f7bb9
SHA140dc1e6bc3e4064da1b20eb32af34f1ae82d2eeb
SHA256f5b3af90993677447944bcc98aeb515ad622d58f69eb45322006553f53223603
SHA512c71c6b50daab38ae6d2cc6b93b14da4b0d79dd22d9140e458ed3463680eef5a1d3eb0b0d63fbe04074eddf87fc9b7982b8316f955c014d1a6f051e9a090c767b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518899477f6cd8957a1907f8028ffec36
SHA16519e81bac0b8f64f3c9c780738539f110e4eb6c
SHA256fc042f5074a374dd08f4715667bed9e892a81c672b47af21bb9999c8bbb71719
SHA51228fe7e9985c174705373f863aa782c559a9867d0ead2d7c40d882ddfed4923f43f4fd1c3b7b42370c2cb2e61c094a6655395e83385f83090c4bb0725933f687e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c69fd4cdb03bd61cd73d1682735342d
SHA12ae271e4b5fa0a193110eea8387223c671d00fc5
SHA2567d8377814fcc7c1a5cb98a980642975513b1bb7e116506c4056f77844477a256
SHA5122eaa98fa177aef03d4b40f20d68449e33fdb50d77156d26cf881f29f048da5e3b76bc11c2687879f8e5159fa24ce559846b8d6c2d0bbec65fa8aab613bed534a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506cafa498b5f7bb29b330ecf281de219
SHA10b3aaa7f11bf7c77a336ef0a7eccf09445ed7dc4
SHA256dd77d5b44d92da02932acca149561950584f8fb01dc2c2dc27166a2256d26e9c
SHA5129d7ad25066605030172a56876f27eaf404789a01bd20fde90e73451d557975258cbb8edbae5862604bba98f88d1ec9f16e2917d88362aa3b77958e6e23dcc10f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad2a86d2dbaf721fb9dcfefc9f13f049
SHA1a1266013c98bfc8a47880f59aae527aedd543eeb
SHA25680f4f1a3618a086aea17480ad52e50ae5195b8a17117d3a05bbd856b633203ab
SHA512176aacc9ac051031f24ac1a06dcd5da5777578914a24dbd2313de324775bcafef1ba03f59219a7d44d56287db52d389a02c40902752da11c4148566a10cbcb14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e82d56d6aa9d1e95e085e87e8b221681
SHA1abd535b8fbf6654512960d1cca054856f898af79
SHA256d1cf9b4cff986d5af32c3f4b451b3eec310203b328eeb7153c3d09f85ce36140
SHA5121be66536056909063d67a91ce762e8281d0000e3ecf561a201169041f6f43e076d5e7c8887a816e568777b28393b907249060fbb63bd85606de4dd9a9822d303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513250ff0bd0a2051b91a5a24d74311f7
SHA12aa2e24a5745e5c85116f706ea9cc76cce2f9e2d
SHA2565d54a907f4cfd91d4011b95491c94756167303d043ffdd54a010c4640bff2142
SHA5124a6bc670a00822613d53ef15d2bf21fa3760dd58621ae079c653c73a7a1820c2c1e0c7795022e6b0e6c5a95fee58418991097014822ad36a70f07d3abe12337a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b462b578c5e092329e8f08a38c187376
SHA18391bc67327e102fd13bd252ecd13438971ac710
SHA256c0219166195929d5ce43003008386d7fdd95ecd804be333bd5cb7c4a969c83d7
SHA512e3eb3e679b68f8c207ec6387d639bcd93b3d7c4467436ccb6a8cf2b8ef76bd0301253fc8318ef8c35975ea68eb88e1fbfacd7c721d4b60cb34312f60d3b4bd57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a26aada2bf084071882a4db72765cf81
SHA130dbbf217a3fcc876443273d67ba0c46fad168e0
SHA256c3144c7fb18ba009d01880f6402ee630d2a9506b8076daafe32f588baebe7e8d
SHA512d9160ffee440cd8ead05dbc79f163f30bdc8641730b445906308a8dead1b1878f3e5744290a06e81d5f977aaf5205681cf99b7e4b8068a03bf478f880de842e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a19245314b5bd92f122261d08b416d7
SHA1dc9d1d3d45e2a3fbe6d9641165046d8734fe3747
SHA25673f3f0631600e89fb5bcc31008e4aae06534afd7ecfb9342a330105167eb68b2
SHA51228f91c952a49687265e1af7d36e4705cd1672b26be6418713a67dad89ae3a96dbf50e064e1872089058724a5baa3eec97b17cc07aca845dfd51e38976c64be5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f686422c224eb1b4bf2abd88461cc4f6
SHA1cd5d48884a7515fc233517a9934f83519c7814d7
SHA2568fb27ed239a5bce67f97c6ae7b804c0b9f6fb24fcb726cf56f37d1939ded085d
SHA5120bf46abc50acc87f0b284ad30157b0d1f1c6d1bbb5b39845d41356761fc01e28c519afc94983ca38620cf00914600555cfd772ca210659d7dfddf2a0426d31fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559f247a519b38b86e48a0c3f6b44eadd
SHA1da75b333cd82c316354caf50bda9b0ebf8ce79c6
SHA256e081709939011e693c73414749df42289e8c1d9097990487c6a915a85ccae915
SHA512ff721c097531b9ac9c89e2318458933cfb6a38103e69525c309112394e7b1b9ac058fd86308fc1937a637ff7629c711e3a2d4bade7e752fb57f38f63a90e8aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cc7f97988fba60031211c7f787dd9f8
SHA1786fe7386b1501ee21a207127fe8209a8f34133d
SHA256b7c9b039a9a88e7a17519bf481ff1da383d59ce46a7a87167949a08393a656c6
SHA512142f2f310c3dc85ded00ae2eed09ca122a352a55a92c0f3b081d567ffabe793f5b7c607aa7ec9a72e5631ae7c1d9702ef0d121280f5a1c059bddd63c55eaeef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7805b9391e9e44220a594a3cc49bae8
SHA1ca2afc01a7173f2e8a5b42c0e832ae2d91aba252
SHA2568c31b0d0a2ca7cabec91302a8f2588eb6a116591938e005d1bb39b2c7e3007cc
SHA51249f582aff323c6333f5ee37d48f7c0fdffff6762f4bf869704c41f6ca3ecd521b89ee0e784621fed75ecbed823f8d0f1c74b21c87ec1075486295ebd2697cd03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531c337def0aa9b765435210e5aa45490
SHA11ae96845f4ba2db3a9bb33911246e383ccfdbbec
SHA256f4d9167e0111950c385410d80aa5f835aed438730d89b8de3ee4fe3f67a4fb9c
SHA5124dd40aeb95107a06a8ac212996c04fd98b5fb4209357fa303a55c7fc9b76514ce2247155118062e081cd71050ed9cbf3f5352b2a5742024246636cd3a05f4d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5d4cc0caea70913f95a9f323feda238
SHA1f2f3f54191d611763a32282a489364c712da1e5e
SHA25673eae50dcc4ff9555ad45232af8f07d72baf42a593c1b9f87ec9ed1c5d62aae8
SHA512b84aa54b9ef1dfcbc980b9e5fcf978b7d261bc546ef55417b8b9c32b54f6c461fa4c75c6262e07a68ed044f69880fd837d2de563e98240a1e27036338634eebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6c7715ed2041576ea3a64ca63c6db26
SHA1e5384765e589739a23ea1483139dc95748647aa7
SHA256824fbcde71982572389a0a3b07360013d9be2e02f205dec778a46d33510055c3
SHA5127f30a34d49b36af67f0b557442f1f051bd448904fb052055816fc48fd371760b9d44a7c6d69013b1c4ac02ad4642db21f95f4eef62f3b5c2d7e3e04c85354235
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b