Analysis
-
max time kernel
69s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 09:39
Static task
static1
Behavioral task
behavioral1
Sample
054a012e9dcf59bed041911624187ad0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
054a012e9dcf59bed041911624187ad0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
054a012e9dcf59bed041911624187ad0_JaffaCakes118.html
-
Size
9KB
-
MD5
054a012e9dcf59bed041911624187ad0
-
SHA1
a413a372db82a35e37cad64b676ae354793af34c
-
SHA256
7fe9eef15b3e7e41f7a7beb48e1b15bc089727b49bbdfda68e386601b171c45d
-
SHA512
0d13e1c4d103f7f5c4d078460d2b2a90bc8d3ba4342d9672a5ad2af0f58a799028111fa16338bf3a0860f893d9d3de439446ad7ff7c6ab7d50f4c988f9f144c8
-
SSDEEP
96:uzVs+ux7+RLLY1k9o84d12ef7CSTUHGT/kdKtpnVElVHcEZ7ru7f:csz7+RAYS/WKnKPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000018a8c8ccb3cfd08ffd53500f1cea18fa8e2dd9d19a64ea0e17a2b162cdfa65a2000000000e8000000002000020000000ade686a54bff267190a2430d037c2bc7e9232b013e9457cec50bfe406b32189390000000b625600956f9698d9523e824918ca8c9f142ebbe3cb06c4dc9f115a9f9e872c296fd1f71486e15cca6f116f9c5932ece8bdaa12c91122b33fc5a518cf8f7c15e92e8ba3a738bf1915528d76fc90abe374851cabd9513b815797a209981b24d0b4a163a73a779c35e0400dae6e2f7f6f9e8193df93ee9d6a748dc1208ee62374c6a67524fe7ac89aee3eabf09bc482cb5400000005db2d76c7301de53eacd527e45b311e76381dfafac874cd4c02ffcfe0411116c991f7f23b494852b74569b0c8a04ea283a6c106007873c7a02210a89b5cba762 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{052F7611-7FD9-11EF-8FDB-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 100da5dae513db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000540ca8302efdc5108659a3e92b8c7388b6379a99323340ab586cc1a1dff9558a000000000e8000000002000020000000807ef1eb9cfa7a514d09be46f63cb1a85c838901f1dd6468ad3914e44708b7a420000000b5ff6be7d53938d5634c928aaaed1b2e6c863c13fd0601b50750b1d46fe608b140000000f1adab20a58f48df95977cdbd0407757c85a8a9072d9a79aa3708e7f22e3aff4f1af638730e05189d866a7b6ddc7da36cef307121ef17c06de368eb6a9d19c51 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433937423" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1568 iexplore.exe 1568 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1568 wrote to memory of 1808 1568 iexplore.exe 29 PID 1568 wrote to memory of 1808 1568 iexplore.exe 29 PID 1568 wrote to memory of 1808 1568 iexplore.exe 29 PID 1568 wrote to memory of 1808 1568 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\054a012e9dcf59bed041911624187ad0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1568 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ca78614d9d4f26000a0461d72450a73
SHA1f0a680d36f45a8409b5ac83624a3531fad5c530e
SHA256d96f62760d0249a3775a90bf7c987b0e095e1fc088a7e8ebf8a4ebc829b082e6
SHA5126af8417d13a5c5c8acc7afedc585e28ddb8186777e4b0e52a0e2d484504eed680fa3f5e046a0c7eb1996e02c14d1207e18058c1fc5239ecc3704212f2e41da5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5185e6eb17d102704207f983b8f76f840
SHA199df978ff3b7bfe719cb11c90dd817b4f12ec3c0
SHA256557ea34b7624366a014fc978a1df557da8c4cb1caa48df4bebac030d93375b71
SHA512eca026c2860da03a5f4e4262760f579b7104c9b252e2aeb4ac3c19a85d5e561a6607291d45af3dbd9d28f2e0ca2a0545754c313d28fef42be3ad2d0d722df753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6d766199045281abc3b202bb4d3ed30
SHA199f36948e64ed93340dd222254335617f4041454
SHA256fb11661918ab76d961b4398cfbe68468b129c8293acc93c193c232df796a9582
SHA512fa7d531c153c28bf692a3a39680e5cc04bfb26265fe4897134132e624c0528d4287f5423ba2e5bdfeae36ba6ebdd4f6c0aff82adb32104800ffca5135c275982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3bbf760a6fc9ea0b797d2d574ba7953
SHA182b88d33dc06ff74aa095a604955804c79ba8fed
SHA2565a43638c0b71fda75006faf37a646e7ef60f14f319cd0649eab83bbb982697a7
SHA512cf71229ccc93036a126d40bb4c8c258ae1e08d3d953c8df42a1945a4940fbd676b934352efa99d1cf77404541f9128e18634825c07df96c07a8379bd6f06dedd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2a9e0ea415cd6c8baa51218e2d577bb
SHA1ecc5a3a44a969e148dc20c328086ec133005bc50
SHA256ad82c7f3f68be02ba4ba6e75eb9fe29a077435674c186ed822a53ede437f972a
SHA5129be9fc2137e1c4396109f46ae6cf755826995239853a1fc6d9d45f75dbe316ed3082c5c6f39ca56294a4385cccd9334dac0bb7f4a69bbaf4bc0fad4af95cc955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5739fe4958a83e9444c94aa486c176908
SHA14d864c828c9ab66ff608f63a88a43a8e97966400
SHA2568849b28d296b99431c4016ca11c28f50fa954af4ebeb6d7a857f7c2826f03e5e
SHA5128fca5af1857f5ff205303e704aa8911a5334f85006a7b15c867377ebae0dc9848f46e4aa04cf1a1b4de3db9ed65eb86fbb7699d2b0f7e1841bf85f78844b1c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50caa39ab64b00a40164b8999d772b6c1
SHA125d6424b0fafd484841c2458a54209329769180b
SHA2563ed50f8b784e7117f01e52ad4494f467fc191dd097f0c3c929f02eb97c799b82
SHA512ec04487bcf01dd6ae7d4fce14943dcee74d3bb3e9b06638ba7e2e695ccbea0ea7ff6325713761c464419b9592d57eae94605deb08dd2e505bc54225fb231687f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597dd5b73805c251cdd1d5cbbded020f4
SHA1856f9d958851ef1a438bcd90eb84ce17f57b3559
SHA2560facb0993ffadb13a52b0c0c90c000da957aadf6fade11285b1e19690866dbf4
SHA5123cedcdfce8e96038d9bb938a31335052277973f07db6fed098f98b2c24ba7321ceda0d0a1e932ea173900f32166a7e324684bcc62f1cbff870eed46d0d5afefe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aeb224d63f1ba899652074586c99270
SHA18db9667e999d4b0cc3321b5893eb69310d964682
SHA256dad2f4dcd7957a8a16a16d972cd2ae2bfcb296c799bf02c37ce2c16cc85b63ff
SHA5126f3bbcb860d18ac92c6da28af04f1f737d4aa0767de34eb094da28cb8e70db42f8cc5f18b53e6277e3c75edd6440cee2d8888dfef6d87ea125aac696919d9d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d163589337522c390acdc8b2957a0de
SHA16ecf334fee12f2f010d3664254eac5a7e1af4032
SHA25660b0d0578a508eea73e78a7f80263642c9f85ec0b925e8684be9cf2d98edb678
SHA512741aa2cdfbe5c9983dd63005db6e086073595d715271182325ec7f31afd515f641f7566e47b3790dc9d381959560f0f628ecd26649863976d6e4a160b5081e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562c2f6d8696a239349fead46a463f384
SHA106766d53b9b8ff4e2f9b984971f50be603268841
SHA2561af079d4d8333f71411204433d008b1f7cf817c9f14a1c79c73f98aa7b3bbdec
SHA512d37e7209429edfd74045525ce00bdaa63fb7e75a4f76d3317e5843a2ece9a630252859c4bf4ad749afb0cfad6ca71317bf248cc379dc2efbfd8025d56c3a18f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58caa2959da8ac11e790a6e5e1ae63146
SHA1b32fd151769969c3c1d4080145e1ed11152f0a29
SHA2569afaf5275c7f531ac0219428094842774d71e9292c6af3f7708ef6e937d5c5e8
SHA512b285b130b05ef85c8f836508aeb9765538afd8e2da8a8bbb98b058053770cb33aad37ec11f6d0da0f19ed193b7416e1afea6c6abd0d89c6b8b430cfdae4d2972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f8281a3cc53a348b596d372809c218f
SHA1d25341bc58995c08624c8ae7947206f0a08179a8
SHA256e9f4e091be2512810bf23a912844ee6ed7eeaade94e49e72412ac0a1400bdc49
SHA5122d0ee86789e966ce1323ea38a6a98a4f58767a37894d48840eb2c60e888bb8809efc61efd57001014ee0c34c18c1e31ec09b046f16eff4f99161572ecef96f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb7c849cea1a5407162b365f6c2694a2
SHA153e57e4128a227089bfc3ffc6284d1220f35595d
SHA2566219bbc5844376d87788ebf66afcca6ce95f3822159f913155fd3ab948a4212f
SHA5121772437b4e75f75e43e97409c5d24a725aeff3097ce56fc88ee8efcc0e1aee5e5b675100998afc622840db90ef7b3c391e4d62dce39712b53bc40dbb1d453509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568030fa2ddeb02da9e35e4a5071eb24a
SHA14e97ef19c40a7360d1f6f879f2ce113e633dae8a
SHA256b8db4a12821dc542652f73de5edc97edfb6396f75d9ec0ca713540e7a229ca4a
SHA5128d17b7e10dbb0f183a4cc9dd4dbe01db0ea92b1df792c351bdd8980f313997b3b21c84cbb11cf1866728f54a682d20daa641907695b540159957ddc616975542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ef2f56fc1a8b68f03202c3e283c5417
SHA15ecadf87d5bb541b6d6be3dd360876ff71ebf1fc
SHA25625cbdac56818823bd3c49e3312eca8588b7425179ad003e12f03cfd662fde725
SHA512936c0a84d7f6150bdf9dc857bd0b89044332f040d3235f43958b28f62970bbb25efa80db752967046cc7d04ee5a328d53c637dd6767be1c09a0277b1e3cf477c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5103eda53fa64e82900487c2f4ab141fd
SHA10094c3d8f7d6ee5d8e205479dc5fb5ebe1a24d00
SHA2561dd02fc958f9b92f2d4041bcc375ffafdb8af1068bb860822de2dbe04023502d
SHA512af8c3d2d3fc96f98a573f5b23ed41c49c7c496aeb6bcc518ff4e55de855a433cb49fe862cd770367d8d1d0f229a285cea8b2ca9f95227a5b483391ab96517f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f60dd8e39f6d170f9c3089a11004001c
SHA1baa4c1257d6896cdaa2991f151696f1ab98f7ddf
SHA256a0e49973a57a195c34b9b301f031a5d3efc361f6d9b0bad39158c0728a9930d3
SHA5123907c80086ba30f36d83d6b6603514059b41bdf331f834e23ffa6707b2cfb5a6a111c7bcb1b37cb453eb8ad111cad1b3864b893ebc24eab4a9c484a9b5409469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d458f299fa582cf1d4a214334cee1541
SHA1750f0545da1237073270e708f5be0c59053dde13
SHA256b5d93cade0ae7420bb82e08de700df4534fe952056b84b6341a77d76b3da6a2e
SHA512a1457d8042b285161e9b0b6245e978901d1759c173224413360ab35f37881aef14479cb1c15eeed7704c17f6d556b2df4dbbdeb50da47d7889b327535cb08e56
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b