Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
dc1b155066b9ae383767d13b872168bc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc1b155066b9ae383767d13b872168bc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc1b155066b9ae383767d13b872168bc_JaffaCakes118.html
-
Size
232KB
-
MD5
dc1b155066b9ae383767d13b872168bc
-
SHA1
a6b5349003db4d74e5449025cf078af532e3090a
-
SHA256
dfe9a21de1612eaf016a2fa27f8ab1abb88be6258e6041234968b8e4e777ad7d
-
SHA512
aa04522f6a4171ea5560d62dddbee5d2f70bb94b7c621185db9d9c73130b16e4b99d2e263689739e04df9953a772ca4698a9ab8cfb82188bb32f243f0f7c6a52
-
SSDEEP
3072:/jyfkMY+BES09JXAnyrZalI+Y+WxyfkMY+BES09JXAnyrZalI+YQ:/GsMYod+X3oI+Y+W0sMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C268E41-70DE-11EF-9081-4A174794FC88} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307d534beb04db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432290447" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000c7b2a0d83fbe3dcb9b715f6c2efb9591dc72c925e2b162bdc0f85d4c37f90a77000000000e80000000020000200000001e9a71f506aa7bc8fe99366712fe2643c334e058ac4d69806bc6547f80d9b2e32000000057242ab21cb36c194956940b527a9c9c70bdbb666a898fb54e0f0478e0dad125400000003daf7803e210820467901597c0181936f884594551284a73f51bc3bbd416b43060a2965e31d037c24f0d2de9f5191f4a81a45edc6f894aa15df1f527dea2c25c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2092 2268 iexplore.exe 30 PID 2268 wrote to memory of 2092 2268 iexplore.exe 30 PID 2268 wrote to memory of 2092 2268 iexplore.exe 30 PID 2268 wrote to memory of 2092 2268 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc1b155066b9ae383767d13b872168bc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59147104425899c88af9b8247dbdf1c2c
SHA164b3a68c8cecafa5d68711d34668080e06c0d2de
SHA256deddf92552e9fe67e9217987fdfdf93d5eff8605d529411d51b70ddbb8adb5a1
SHA51292fdb3d3b04440dccbdeb9c0a1aaf2c408c4ced8d50cdcf39c4d94f2853094be37af4f93913dfc371024c69fc04794355539b1b912bc95942ff7eae0bafaccfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c583986b0125650f36d33f76da878d4f
SHA1198104d545ae850a0a1b1d547cd1f223573daf38
SHA2567f3a8cb7262929b2fcba5b5502ad6a277a46fc434b1374e0788ec0d5b4947dc6
SHA51252da0c45e243b751357892afa6f5204e0ffafe9e26edf2695fffc1a1b9600fbbae18ef210cc7d2e144c4070bc4dbe567ac7f2739bdac4c7aa26baa9976538946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5476f2bb776c1857af9215e3b81ec4cb4
SHA19b074f3885ba93f79423fcea325f0545abed4a0e
SHA256397b2d6109c7908eed3cc9111010dfa9cf9f9bc571f665e4de47c9327de2dbe6
SHA512ee6cb42cfe5968a7eadcde0c482fcdfbb9a5419d91f2f21c9be9736c8e0b63e281e2e9fbcf403fabf77a4b15c1e27f78d1c37a4d055b369d5ea07739ddb0cbd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56155d080037cece5d08ecc01fbf4c6fe
SHA120b5e8b3f93e7ff881ccf3ab89494f711f076127
SHA2568b81609a44d45a9b655b10b4fa328550e8cbf580dd5279d1ad0146f608de1e99
SHA512fd45e8d5d8a9384d76cfc436a82b06258d8a509409e12a157011f4dddf43143bae659972f05ff438cdb98b0a0cf0a614edb56e46e934a0780445ced436c106f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a75832a12bac3e1c70b08375e7de8aa
SHA1095263b8b3763c4dfcbf11d6b8d22481412bcc64
SHA256cf8d9670994de6a59e86dd9e872b15d774b6dbe243751136eb8db0ea8c0ced16
SHA5123c501998f40a19f9f23dc2fbc1f4f4f0250ca600c823608de515f64d80bac7918436583f4008d50ac492684e622aa074a195c40ec6f0beb7eb3ec12fedb8d992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5668a99cc6e46eff31cd21e3407a65499
SHA139cfb96980ecc7351eca4ca26994937060f0fb81
SHA256b391d66b8361b47fe2ed24706805a43928d10cfb2a5f6b1f480e716b79f8d3a1
SHA512b4ff3f9fad9ab688d1fc541ab0ec9153275845b538fdad3319f581c853ef1c09fbdc5acd6edd64942ae15d282d98ca7940178e6d35dce5911292fc3869b4f596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb00dbafe7f7c79f1540f638f9971c49
SHA1d749e08a3689d331f382b29cc47d6bd21af72b90
SHA256d2ea4ca33f7b8d73b44dc6786a5dc5a623a1d68be4dfd6e9205c7786f489cc7d
SHA512422381b53933dffd6ee192e8d807092f6c1d53e6af3c8c9593fa24c8700478444b9a1677e720009306e3ae3644437c7bdc02c0d4d467f87264b08500349d3ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6a8b332bab80f9eff5c5394cced05ed
SHA1aa9ad1151248ee309b9e93e32ab3b3e35436c1c7
SHA25622477a6d013c5938d3c65e252bb1845342482375ded57217ba9e337c893302a2
SHA512da781d8cb09f21f1dfa8ca188cf1bb93553ca7a54ae7a8806e2d1a2349f400d758507d11cff386f1a1079e4ad15497e6e7c034bba8122170e1adc45b1c39bc65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dae8561fad83dff9967ae366fbf5e5a8
SHA1ddcd6b8db95e48438bc8b85c173cd00d3d283abe
SHA256299c69d92b979c0fbaac190133b556463e8ba053c392360ed6709eabd4e67225
SHA512148198167a7c50881cd0b516d2a2726fef36ec3baff781f3098aa65235dfb3ce46f114293c7695df2d42f1f474dbb2bc378cb6dd4c6181a6019b01f5276ab7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc8d4971e304ba6beb34bbcf39bc7cff
SHA1a5497309ace2f3e44574a6a8c1f140eec6d74bd2
SHA25654453e976b0eb5e153b00262e90c29e3a15e1e69b89449c584aa5ac2b9983e1e
SHA5121442199476d5bda31079ee19e851a0b869b49eb0a11f7a295d859100d042bb56b8cf2ed02abb76062fdcfd0fcd80c067c5decc9832555452f12a88cc38dd4ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b82354e7c7e2eae3f34bc6960406aff0
SHA16fad524f3ec826665bb1dc12fd31d4d0d3238446
SHA256ba2c9b68c2028d8887e6d26ca95fc1a31f93d0b0db3c6680d7296bd3c38d3e97
SHA51279adc4435e03a9cc67065240dedbf83bbc89a754c4b8980641041fd25eb6c68eaca13a8991401be1b39069f826336199e512821f4bdbbef0e3c190bd1537221b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516e98419360c938bb4565c558a71284f
SHA1aedfad32cf8a793148bf33ebbbc99f7a58fb3b7b
SHA25626d10f4ed92ca926b7766a41153b6d75aed2131d358623b4a75d067dd5140116
SHA512a39cca69ebc28726e448bb578882fa0a4577585fbe60cdaca66605eba0e9be3ecf777eee7afcf8ed2baf81faa3c3e1f5747f669657f591acdde0a1c7f2dc33bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502a6f4fbcf3ea42248eca8158f3f929a
SHA1a90f497b5aa4e38e90b057a6626489907af5eecb
SHA256306114ce771066a8cad80fe1278f954bc2c587b9ac12e1feceaf7df7c6ea7dcb
SHA512be1110cc8063f1223e755ffcf1ff138b938bbf69e6917902364edd7e23bf0e563b700435853022556db5cfcd28b25a2c491ba771dbb52e247e95d9b50ad039a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52380a9f2aa395546756180128cd68e66
SHA19e3d3a7f0d003f95f4795336b3ebc9a119c1bcae
SHA25688dd10b5dd92926f402db8242ae2a202c05fb582b426e0ee9ca6311278a90673
SHA5127f715e752a6f2b0894adce296d240e2e198b7f098a7db9c665bb81a945b59833f573efa47109f362b14f30aba998ec79656edb14912db5dc84cfb87f7d1f2bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58157b9ea2c39100de16bf4690712dfb8
SHA1653e26138ecc6f8c61f9dde6154d35ee563f8f23
SHA256eed0dafefda363ab68492c31bfe2d1299fbb5c7efed27a86142f85179b944833
SHA512b3c69abc17f6ccf4bf57ded18baf14e8242b3e8d7705bfe4afcf6028daa9ba6f0342a3a35a61783bac7d65313278fd469428f8005246d77b4dfbc39bd7b379b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509c0ce743b368ce80dfe516830d42cae
SHA114de55b2a26eb06e18a174044ee1ec47751130d1
SHA2562d62eedd49a692366fe802e3180e5edef4fe300d9ffc401654ac7ca9c7a8115a
SHA512298a029cf5a86880700260dc4f5b28ff8bf6864a5b88046ec8bfc5d3af26e50df9572ae83b1fcb091b0f98853557a4a19adbf2c2dc9dc93968b34817c923acb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521256dea1040008ff1f24051af204321
SHA18d818b88e59e41458d023ca030dc103e3a2da074
SHA256fb72863fff74ad7f8b6204116db04083cc52cb9daba2a277952e0cb8b9bf15e9
SHA5120968419d42d555b5e46d79b0779b03df297ed449bf6c07079db8caefe0326833018f935ef109a27583f24268d60dcceb8439da455ebd830017be1d3e46168c03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6f92ca40aab2cd458dea88dee1a7b8c
SHA1c953498882adee4b776746e81b805a2f2f3ccfff
SHA25661ba9ed2640d4e61fd19a579400a8c0d660479ce32ad4375d483b1e3f63ad482
SHA5125276131adb6c6b9a57052fadac542b1af140ff55c30e0281260f1c48a53f8045648c74510d0f08eccf88c3802266f4028fa81b59a3399f6e234ea38d889e0e47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5716a67bf74c8dc020543494ff986ea38
SHA17d1dcab1ccd382c9bf7610506727e8ffe29c0742
SHA256e27d9ad9e0ce4d79329d51fc98fb36331d6ef94a423937c772eccdcbd464e0ea
SHA5129681320acd597eac183959f4c4ab26c678e055d0097db0fa36db6b8a5e6d8d4047139ec563ecfab465d178d2f14f129d9c6e73ca39fb5e8e4c418fbd0303231f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c79e017a447e3f8da072ba6b17fe8d6
SHA12f3b07fb8bb19809077cc9ee92c4c9f4b3c69e45
SHA256ec978f42163cc508dcdc3e2e1c18f80408d021fc7a5ea0282e1ec68e23839694
SHA512da762f8a5df95c58a39f1c7b376afd456c278ea8dd89d8b1330df5ef975a68f960af487ed5086ee0f4843d8d5a902053d19a3ff34a89c751d1bd0e60bbe9606f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b