Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
dd740bdf1598c763883b1d92567d2ef3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd740bdf1598c763883b1d92567d2ef3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd740bdf1598c763883b1d92567d2ef3_JaffaCakes118.html
-
Size
19KB
-
MD5
dd740bdf1598c763883b1d92567d2ef3
-
SHA1
e65002331ba11f978d760ac4c9413218baf6107d
-
SHA256
473f20ea70031fc374b73fcd1467b74239646dd2c0d08db9e8e4c6f15b45d217
-
SHA512
26595e535710fdeb8ee37e391a2b8675f9c49462c5beb6c1807ae417de8b0121e38735f7e21cb8662e3a3845bc0e2529a88aa8272b3817cf0df38061668e02cb
-
SSDEEP
384:zigKhgEStVBD8csQ3RMKHuoTemLxXucfIk99hel+zVc98M:zi5Stgcv3mdmQOIk9Slwq8M
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000001db1f96a4762b29376a7f74d623f352bce2560609d438acb07defebeaf6cf483000000000e80000000020000200000002c596c2aa08221cc2115edd3993f01f23780d9eeaf4fe92a5287d0dbef8952ea200000004927a65a536e701f2152af24d877408bfd09062b0591e7b26869df1dc000d06e40000000ba6082c046b4994f7c331fa2b273dfbd4af75fe6ad32cc7cab23b89c7e8cafa8ff2ae307db04b9c9ded175764151c8612fe58c2d6af366688f1ee45990f91476 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d07a78d38105db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC97F1C1-7174-11EF-AA6F-523A95B0E536} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432355143" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1168 iexplore.exe 1168 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1168 wrote to memory of 2848 1168 iexplore.exe 31 PID 1168 wrote to memory of 2848 1168 iexplore.exe 31 PID 1168 wrote to memory of 2848 1168 iexplore.exe 31 PID 1168 wrote to memory of 2848 1168 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd740bdf1598c763883b1d92567d2ef3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1168 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c43a0298f3ab35bcd6918c0444c4f6f1
SHA177635802fe3612bd5fe1bc9dfbe2df1479e4c2f4
SHA25678be486b4b6aee8a8d86e9c0b658bbdb9168bf0ebf75b77e8e078e302130f490
SHA512e16ebb51ee4ce7092071cb6a836e45dd157aa4c0112aed048d54c55ddca79cbe6d121eac6bd56b4130692733123e5abc71bb6282bae1fb8303402fb10e210259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518686c161296d5406d9ca1fcf0d06e7b
SHA1ae8ff57071c9ef5b22cb2954467a50b71f65b371
SHA256ee3315f4e27e7b8a8b82992134e306d6af0dbcd09acc43f98a2de5fc1eea3e24
SHA512a6b376c7e6dc63362b80885b7f78f2930d422b4fa4a56c6b9c703e130c3e6e06a3a61a75e2c52c804939b65bb8657edda9bfeb219534bc251f87c15d306f4051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5334816d62fa04dc5df9432e8dd021752
SHA10e9f31fd362007b90721fe8f14c1590f6a3cf165
SHA256ff07443f8ae82d26305dab489ff65e59053c084f8aac141f90a8e1c891e44cb7
SHA512ad94203a97a339aa1d4928c088bb5e1b8a8a25e5ae0d60cef254c2ae8d104a6dc649085ee5f781c5832a17f9a99d6c9b75432b2b2f0119f8e78ccc521949bfa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59759a8746e5247805347a0eee3f64565
SHA171dca0aa80c0cd62cd191e15eb7468699cad5ea0
SHA25664ea0a71c98d3c3e6cd18cc3aeb5f8cc72e4729b8ecc9a58110937d63090721e
SHA51295b4f278869f882689d0fbfb83ece01058fd0c871903b41d16cad633248f1e71a3786e254269198494bdb8fd036468bbe6c8fbb2f2b1bfea60a077fc0cee579d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519457aab26f850bf14d35f469afa74cf
SHA18a39824a80ce733babbf1b890c8555cb2b0d6f62
SHA256fe04c5b3129aee8c31ddc2f1d7f2547d33412643e1c7a62975f8b0201e8ed081
SHA512c302440f00ab0eb3aa7174b8fd8397f714218fcbd7688438b5fd6f845605344c874fbfeedf357416449324dbfaf8da4829c7f2871859aa3afc21df056bea9324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a90127e8dfb63f4b0de309323e65487f
SHA1a536e2f9e7fe7500efe18acd56e6557c033bcd78
SHA256ceb18f0c35b41dbe515ccb9de803b8eae60c4e4b15c0acb70f63838afe7f3a7d
SHA512ff4864249c148e08449176cb838532716192d41afd82b525678a7508423120f918493345856e3af288664e1803187cfabbf9ebb9a86e9da0b603567899a567af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51befc93834b6ec6c9428903950623514
SHA15c321b0edba9fa3d90b8c13a8f41ba45a44e2cc5
SHA25686a21dc05537ee73a2d76bf5c40e8f2b80732a48a6e45d7484378ab2f8e2f248
SHA5125fe395c06b3dece5511d6d0ed68221784dc9059a8a078edfba4d46a92d9899dbf3eaba1ed4de81f1b74ee3f6a8dbfa12637056c0909ab9c393eecc83dd10253e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a67d10f15f43eb7ab42e461817bf6d53
SHA1834d6944948e8f8c852f6a81a72252dbf2fffad1
SHA256853878f424687226e8c4d9a27d9f79fce14a5f5629156239e194167a8b14475b
SHA51253c477a283f7397ce57602562a97b36ace89094cb48160a5c887c7281e7135c1aeaf5f367dc43e463b509f1bc53d1b66eee0f8314b8d9b0bfd01ba8fe6ce443e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5000127ca1835f511f29c84ba5feeb77d
SHA1c56dea7efed0b7bc20cbeda718793b6e3d1bddc9
SHA256ba7585e32a2a04d5e1fd0f0fff185b23af424fdc5e6e5eb1e71d5184244bef1d
SHA512c6d540e5778be1be0198b93bf84ad2ea17b288927bd73cfd2d7d30dd91f75c11b8c29327f3d3022338d34e20470c9614e6f9eff9c38a0d146e369633db900c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a43836f99ed6590456741b9fe53b82ef
SHA1fee80a6272a5e2f516a49a8568958854287fee0d
SHA25654e12ee8aca03d610843cd87e815b800b96ae9b619171bca5b8d1008279fe186
SHA512ea4efe3000c52727fb14c52b9c20ab2a6b3b23a56c17bc751fc8abcf8b9bd9a5d06fae5185039e89b5506d17c5606a00470a660ae5e341059da4f5a7b3ce4af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd2addf88118d78a8bab196367a44ccd
SHA117cd7828c29b946d0261efbbcd4535a11bb0c99f
SHA256d8d26dc95682ad2e4f0c8335e515e35b4b31b236803e547fe96694de2c65503c
SHA5124f436261f7019c0c4c3b43294eb5a84123c0ac9df915bc1f670e3d0a3d081da1a15f756d66379ca2b42c9b8bfa917f6b383957940b8bc448d3c0e1ec86d74af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5860f32cfd393d10bc93331a5c4055a67
SHA1d49e9ce3d39528d544777cb397bbbf9e7f48c6a0
SHA256e45f1d9768799b5f48ce37c33ee89ea77ccc3ccf1b2c5b45bd81ae693d9c188a
SHA512205bebe9e3d5f4e1a2e8e3d5282965279c9251996ce5ca6eba4342e5ab0969e3bdcd9c83c9d53b228de0b13caba284793ee1ee0c087fb08266802160696574a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dee0e5330cd3704349991feb5821db0b
SHA1f642f06efebd5ee9243715e24b1e5534166dcde9
SHA2564a93b0e8631daca57bcf346918695a7256cb462466e31a409e8b35cc7650b26b
SHA512933ce9a1e946cee595df854fb06a5c542fe7498f8d5ddf654e967da731890b98da8ad7ac267a4413d1709e69d35b3d66f582e830084db75ccd0496fbc23b9c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6ac53fab4a94a8dfb641e03ce11a8f2
SHA1e3ef14f469a17c3b497659db7f9fa5536ca92069
SHA25614e80d9614bba500ff6b1fcc4d4e5a3fb5c71ce498c91bede207b008bb1fc36f
SHA51214a8e1c3167c111414ea5504b1edd05023c52309b77c29ac7cfcaf83e32eb2777a7a0a7c5eda56f78fa3bf20054edfd746423e54ec41c2a4b5edfaf4a2a02eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f2ffea6a4139aad91a0d9e4e0dae7f5
SHA1d55b16e3f662017ae77ebcf2f047996e876a0393
SHA256cd5bf1fa9434c451c5caba25856a80845931ef9f70a76e22564e7e703b8acf80
SHA51242b17087e012d94667e28baed1f14bc3b060fa6d9363fa7e33a0dfadc74ea1b67dda8534a455f457c0cb357bd55c905d0fe31a0599b10ebcefa82d1e5b08c979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51033f02cbfaa96fb6f5c20a76e14360a
SHA13e8c3f7d93b7656a935d19798bdce31a27df761f
SHA256b1679dafddb2ba960563318c4156fc0ce4fe6bcf7f60ad5fed3b4a4860751e12
SHA5128918cc18efe495f3ab525c5e666b6af58b88660c7e011b6ebd1e18fced0afa83f931b2dda13eb51643a23fe198b18d84ce8fb13e6ddb106e1c77a5259bf8862e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56301755920b6da5bc0ac5475beb96e12
SHA1ec60fd3db853b1c0af7e671bd06c5b9a276410b5
SHA256dab38f1485a05193421b1bf4f848df6bda1ae0f33d4926c88b3efa55cbaa9b87
SHA512fa0ee9e69eb09c78f4502aeaeb30c97c9ee32f8a7df7b9bdb5121d064152fc6abfd26674406e85762260758ca19a7ed41f8256fd88367f20848ec481047bb641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9fc2e5b6e4eb190d18ba6ff87cb7a6c
SHA190ac2d792dc0d84d9e5540696c5452bc704f7c19
SHA2561c4066fd325daa0069a4bfbac7366a873024b4d1d01572fe88ed9b08cc3d0967
SHA5129c1fcc05e1bee71ef031ae3c8d4ebfdb5bd0f3151e4031f9496a170062eccb945a1501e8bdac0f6ddc5186504da2383db5443dcc9ee11ada7db56c21c7e846dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c6f519d528c3bc3902c81601e2a9878
SHA1df6a2ec051ac19aa181e288598c4cc3ecf02580f
SHA256c657fe6762e3bd5c2f091a8f512461c90b41ee72b0264a533d5e2772823f0c21
SHA512f5f573a459b5d95fc2d3311b8ae93ce79c5e21318e6de68694711f5481ce2fab644ede8189efa5397a9bfbb7d92afd1496d5c199193163272d5ea7c01ee72b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf460d35f95210e6376c7a9fa00ab757
SHA15db4390642843cbf7eb3018c2f3d495abda203b3
SHA256fcb8e48287fb6efe264cf8d430c75bd4577eeadede00ceb5c1e73c59703d6fd1
SHA5121edf2892f553c60f5b89d665dc18cca525405ca176c4d3d903b67ff959ac2e560098c534e66433c54d78e13182e40b171be3fd330a1585a035f3f7015c1e2402
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b