Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:25
Static task
static1
Behavioral task
behavioral1
Sample
eaaa929f7593a7feefee5db71a05ce07_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaaa929f7593a7feefee5db71a05ce07_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaaa929f7593a7feefee5db71a05ce07_JaffaCakes118.html
-
Size
26KB
-
MD5
eaaa929f7593a7feefee5db71a05ce07
-
SHA1
2aa479e0e84f7dc905489a5ad3697f5deebe3b8d
-
SHA256
e3c403ff0dc0ee971cee0611b01fe3f5c2d94258910fdec55ff92ecad01f51bf
-
SHA512
cf5cc1ab732513b740db897ad27c45c092344649d3720b6bafa575faa6a3a25e1dd4ef907fc0576682aa35aff994799bf308c30b9acfea6c23b772f1fa5491c8
-
SSDEEP
192:uqqLjsb5nOWnQjxn5Q/JnQieENnbnQOkEntnTnQTbnxnQWCJVevo7Nt7Fo+NzQ4O:ncQ/yygcAyuB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000e32b2be09196c1f6ead9d506efdc9f4a17389b5e696b6c40d557118844daf854000000000e80000000020000200000002bcfe742893269b8ab2a6879879dbacf12bef007b8654604f85d8806b26f14c820000000bc6994e8e5590414b6eb5451ba0a30e7d434649964e813673fa360299d2dafe44000000003ed3bd09decb756ad1e1bd1c1c1e4c767d3afb7e4dabc228802cf1a5965897b00cfa460e81b3f4893cebbf49a91858087c43841459f4ef39bf81f00f1365550 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432885396" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{94C5BFF1-7647-11EF-B1BD-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e008fd6a540adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 852 IEXPLORE.EXE 852 IEXPLORE.EXE 852 IEXPLORE.EXE 852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 852 2528 iexplore.exe 30 PID 2528 wrote to memory of 852 2528 iexplore.exe 30 PID 2528 wrote to memory of 852 2528 iexplore.exe 30 PID 2528 wrote to memory of 852 2528 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaaa929f7593a7feefee5db71a05ce07_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565f7c475c94dabf1af252f4656ad022d
SHA1b514c4cf5820548d9603dd48176b3b205f16c601
SHA25660ec4bec5e0c7be39cdf5cbabf5860b55821a78a6ae2b7d8011286ee1d212f14
SHA512c133583ff316318df3bf58eebaf2fd0ada6419806958e2569a9be9ced3f8eeb7a6c66708d137d8ad76ac046b4dcb5e23c2b011ffec1b15f7e151bec1d469c7bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f745b15927ab7089ad98ec4f047e80
SHA118f1de9cf34402978bcb0a0019da5ff4a86ceb61
SHA2561c5f60412e461b76ba5dc6fbccd9fb73d03b63dbd186402f6abfb87d52ca1967
SHA5128737c9fa4f435c73839f28a3e56a84593d70159b5edc6710f1fa72dabe488382f375ea908c5f06fd066457b759eee35a2a7ac3dc01977ca18c0703aa1fbc3330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5955927923dccc91efa1f5812fac56601
SHA17d6a91d2dd9624dd642a96df938023ed754648c0
SHA256401cef54864e268a890bd1ce00a6551d0a8d77a894d08cf99b20b98413295f5e
SHA512f9705722c6e0e2f361a2fc4f0114adb910dca34b2843763664425b785253a3f83aed7015ca1e5919d54ae74b6f6450717ae2dbd106a52ddd349e290a7b66a7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ab67e8e143fbdfc56f1a4c8a25abe8
SHA1f4e03d8b9537c8471ac0db9bf158010b3b9d15e7
SHA256752018127048f0bdd7b9d7c16b2e374dabec1a5bad8e8562b0585ad3d86a8a9b
SHA5121e38f555bfb85039fd898ec9d90e61cd2f4475eecd6af3b3d0abd702ec17f01837efa5d5b1146058675ca9e8685b5502d98d9a268951ef73e101be376c5c85f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5774c28398db0b3fd606d9b44a39b0724
SHA16c19070d1bbc813b527c22012ea4d35fe2601f46
SHA2569f7d78038aeb6b694fb5a539f4cf988236d4e8d297fadc273af42a67eefe2e9c
SHA51271b8a425185a02c873994cf8f338d5a95ee9dc064621243483584e575521852ff7399298b9021177a153d4be8d3942de5b23a9e26d857fcaa1a21382ba8bcf7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571f5bc4a79ebf154d6b468dbb25e9ad3
SHA15c58ee19686ed7782fd0ad3b701cddcd16c462ad
SHA25612d9be3620d28893fb57428ff9bf45a631e443d6378753961d47aed40189c163
SHA512dd8635110c20016a064868b6db34f7bd67e35d4e4fad479b8dfae58512988b146a5392694fa49c9b09fe370dab5ee95a5767263ee21cc642b1c017172f3b8189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58006875ea4e2f7e66a22d35a69a4c753
SHA1280ec82f9e62f326816ea4d6646e82640f0bea0b
SHA256b37a5f5ba305889ce030e5d1830e3ff96178cb4693e310532b7b4332d45106e2
SHA5127f1c0b97c06994a750d1d6809b634afae9c9ce7c938f98f5d7f5aa09322b244d372901d59b187e7238b6be94723244a7d13eb9aa9be0525d29b7548fe4ac3207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da1a97e1ccda8e10bcad03bac2baebe9
SHA1715baf9a98d19f7a91f5ca270de6013e7838e549
SHA25661fc1825c36a052e53637d8f982614a74813a42ce2def564b67d9ae7f21e9d23
SHA512a1676730ed464e9f4a52b5df4f16ffc35e76d1004f350401209f79bb2ac423aee172dfba81b9250fe9cd9137d1e1b901356abb8fa95614f3c18504da567b5b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56779a9152f787e6e98920f59e68de7a2
SHA1a81cd1b8cd170568fca79849637e9564a4721593
SHA25656afa511088af45c06a00382f31fd0326352839d38b44c6c7ada256f594f2062
SHA512f4d6abeeb85590242eebf98941e1dca62863eacea703744b1a0c2ddee6f465d3ab823de1a007a4da9940cede7d7ee691f9db0bc70940ef96460219ef0c3def24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57263bb7e11b8aae47847cd48fadb39be
SHA13d018f2881688319edc6f634247931b436259c2c
SHA2561a5a5cbe401bac4ab90f3bf69581129c4bb303e4534569751d35ad2cb873ff71
SHA51270c2ee82685f8ff6ffcaee2ccba3ec8cb361d7586efcfd63cdd663ca645cc2d37a86dbf50f161549e85e72ef00ecb1a468feedabc7f7b017f7cbb4d568939fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdb8509a2bf36cb9c5267d349c49730f
SHA14238a1f1545c4d5ae954f0ebe460f2994b12a925
SHA256853d2bd3038ce3a33906a0ab135ff0b398143695df590ee4291ff02ca28e55c2
SHA512efecb72afa716068afdceff24649b1d111ec89e0d942d9ce19e8d7c2173f9f0d4b5a7297b09e1d14004209eb7e9a884d5f5331a9030f0eac5a961e10a9114751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a755ede82fa1d7cf15c69ec33402b58
SHA130afc86316c8c6af1daa0516f47e48db52eade86
SHA256bff41f76bf53025f607400533bbedd3656ff34994fff766a01b83e461609ea56
SHA51230bb0d1df6438434c321223ac5f03915a6189d88303bb645358d93350b6fae5f4fdda979b56924af4b328ba55e5ec851bd5dcb45fbdd7eed36ce1f0c943bf905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588831fb43fb562d487e9eb15bf8d836e
SHA13375ea4904c94568152d6eb7af352afb808d8de3
SHA256a2de6fd3160e66a660cdf7aae8bc87c19fafd125cfc974d75192fc5f2371fada
SHA512bdda152c3e3770d98e869d3a7f62c2eb16416da0115788d652bf71811bc7503d5daa65a16d6c313f66745f11741975c9a74bd5b9002eb0bc400bd7b181b8b4d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbfa93772d4fa1f412f441475aa298af
SHA176faf4047ea4d122125b26b7b8377b55f4647481
SHA256880271acaee25581d534d9516c5d5cbfae05442284154c04c9692d36f27c2030
SHA512c1ee249ce8b7a5af40bcdd75e63a432162f33b614e1f64c16bb86e68503f74a1747d057b30e91875c3ea371d7eb564a6a857af3e23e43b437e3805df665099c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b235e809927afa8ba4ec14ab240706c
SHA11ab58e55cc3564cac477956e054b8811faa18faf
SHA2561f35fd0e4eaf757d9d0884005aabd84c48caf189fbdb5c7eb11ecbc9065308c1
SHA512f1c88b562be2e62f58dc743c88b2a2dc2bea79538b5dbfe5bd35dc50ac41496817effd9af9ae1a5622f8c264111a8118aca795881a804e0484f3b1283c683db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b86bb7c18ad983880a2bb28e6786dd0
SHA1e5a86192251af1d306aaac15657c3e1d9b269229
SHA2565ab7c690b5988b81f035ce77e9b88a36479d9cc34b8ec055228e9a929edf4d3a
SHA512838fff09fac6655d2981017704e34486b2b88e93f6e9c802e6006851e35147dc095d62e9681846416a475bd6f2fbb313dd6cf0608ff058108bb5a060d1c75d3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520531332bb72df9cb58d6326c7c1d315
SHA1c0e9bcdad984cce6e0aaa453822091d4d7ffc881
SHA2565d704e4c3519e65e742e8e54a7ed33566b64ab7d94458a08da3c06a575677fa3
SHA512adb66a46acc7e83bffc6b014099624a38e6ce27a15722a2758e2504913320084a1d2f09ca158df1faeb861afe9f8f9c4cf14f10d80468e01ec1b35e8b677c6bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d48a43bd1718e2e4bb25aba96dbacd44
SHA172f68ad8b90f11b44b98e3acd5e4b237ea6d1853
SHA2560ed67453b99d8dde8c32ea3c390b7251906f6d410e46c9c9f1dc8e9b8509a456
SHA512e909eab68aa8aa8e2c3d18c90b6b09c5f01ca4bae839bf1a11f5d00f3a3a461e6681c6a21ca73efa3d973c4014cef2958f3d654ef8a69d0303862e754e4c57ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55acb476c51b602943fbb5f0114dcb591
SHA126e2d28a633f9222c37fefb8c950858511119642
SHA256f5ba2c6f9674842d11601810a7be57efaf43025fe9394a0056c1587947e7b622
SHA5121c89df75b52a44db883fd7e48e33f700c32dae2b4366d6c955985df6b2b2d38cce70fb53c837a81cb7c4b75a08b0e73f33748a611494122fb903bf3da3f6f46e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b