Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 23:40
Static task
static1
Behavioral task
behavioral1
Sample
1555b1e0245fab78aca2ace6ac2aab88_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1555b1e0245fab78aca2ace6ac2aab88_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1555b1e0245fab78aca2ace6ac2aab88_JaffaCakes118.html
-
Size
53KB
-
MD5
1555b1e0245fab78aca2ace6ac2aab88
-
SHA1
f6fcada387a08ef194ac30626fe41087556625d1
-
SHA256
629b7209f715423c8cf6b50dbab3ac3fbf397310063704b0ed32d5d12cd59c03
-
SHA512
e84d583d529dfacc088e4903514dc854f19e915cb60f3592ace1f0321ddd9fba4580077abbf5992fa65e44f332704d3c7d57556b6b20540f58c6f6a257554ffd
-
SSDEEP
1536:CkgUiIakTqGivi+PyUjrunlYv63Nj+q5Vy0R0w2AzTICbbqoc/t9M/dNwIUTDmDS:CkgUiIakTqGivi+PyUjrunlYv63Nj+qm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434247071" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA568201-82A9-11EF-BBA4-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000090f4aaa2e642468725d19a84a7acf8ecb5ba41c4f5df3265948cebe8e5ee7304000000000e80000000020000200000002f99d170c80527f7ed7cd81e29d6a4b9b9b009eddbd8b382d35a1f5189da801420000000d86b6e774b8b606036b49621e78d78622c1d0fd039b74ecb37c8cb155243e9e5400000002d9094f90b8405227aa6802ffeeb77739cf9244d9b28b37a3fce0173d0b017dcb45d0a48c515e5b572d4e2947dc426e35742d08a2640db7fdc525b677822cbde iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0afbccfb616db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2780 2188 iexplore.exe 30 PID 2188 wrote to memory of 2780 2188 iexplore.exe 30 PID 2188 wrote to memory of 2780 2188 iexplore.exe 30 PID 2188 wrote to memory of 2780 2188 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1555b1e0245fab78aca2ace6ac2aab88_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b755768b59ebc035de978b2ed5d755d
SHA1abb83c745e0d3e98c15413e9f6ec3d3d8fb5e6a0
SHA25607d0452861e422f20acdca0ea838c88d5d584dee7bbe88c772ebfe5c27a3c763
SHA51253bfea69a9fb8ab66bb2a09743f337d0da58e7a5bcafcc5034bd493be2fdd6c9feb1f9ec11f0dc02d89c0e67c464858c3553f2765f740cf777c197e413b1ee3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c2889662caeea5dcc89c164c479f856
SHA18929f8a805a5dcdaef8330ca3ba14fef32cebbf0
SHA256b828b9db6ac3b83d13d21c115023278d326d67ee0d30dc31d14704128cd9bad3
SHA512ca175e21683a9c23fa035724603461eacc55ce708c1a138e7f2a145a7db174a904b0635a509a48079cfd660a6100b9c720a883d146c449db4025b9754df33b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af672fb88532aa1dca3b49c753d4ef4d
SHA1203232bc8d99104791f0443ed83327be576a08f2
SHA2567720e2dc2969422d6103634a521149ea498a637909e76ee9575f43b50f44e262
SHA512b0a687164793d3d495035aaf19aefd3bfb930cd43ae7d4b0430ba30a64ef515e78523c7ac33c7449dbf9cb184f8584dd622e118e6c6212e515d535fb214a557e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf95ccfc8f36c9bd8142070ec3fe46d9
SHA1f2ce21b0f73c3209542744dcef546202931ce630
SHA256f76a8f22df711af40b0ab7dda64c174161e5fb8636613db6540034e09815d5e5
SHA512347b3dc4755cb9985942cb44d60800d34c9c596fa4cc2edbbc0d449cb3337ce81812b4d42e4e341f4b7f6e7da983302b48ba13c9f966e5db4ebfa8d68fcc9d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532adbf83f048878f0dbb4c6d91b197a2
SHA169c5a056b0ec7a9f7726d1ea1ed917a5d88d4c45
SHA256b195b24a603d9c1b516ecb9374ec8576f6e46df6371055fe6426ecbf84ce7c62
SHA512e6d190449d57906ae21116a3ff2a1170075d6812980779f28ecbfc3504d395176faeb746919c3114da5cbace1bb720aa30972056bca18b97441118206a66b4d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e032de5d1f1963a3fffb20a65339155
SHA1b758aeb9a4798d5c78f059e930c28c38df1104af
SHA256de1b0a28019bdb45049aa2119b8b52107100bf066a012e821415b660b96e72e3
SHA5122a61b7168b52914b954ce94fc5f50a2d5c8d984c5d1414fd99c8228622477e632df201211656fee9daabf2c7e7b2caffe467d32d96d6e1c41a66c382c5ea58ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514a0b0f6504b811569a8f1098dc0c9a0
SHA1807d86d8fdd2373220092854e2930e7d2e860fe5
SHA2561a7e7596a8ea5b0ff823e91941271433c77a89368b9dc2d2c894a1ae8fd9a4b0
SHA512b50f9e146df1a25cff8d3985eb72c0bb18bd8899df2056563b11a611cc209eef4b0a3fa6d4572e486b50bfa46686887314414142b1556a671ca4ed3908f6f082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573928827de78bab31557ca974495915b
SHA113f864b08d45d4ab74c51425e388d769d5f9d7d1
SHA256ff64e6644b4dd025877281c36f9cf90a02f0ddf3f5781ededfcdf2d7333d12ac
SHA5126bcd93c8ce423f29c7d1732d53feaf4112a88800ba5fe2e44c019a057bd5db9096d0f7fe5abf0aac286b828f4f9ad9423c8a56a75f813c6c2c89597a5c1e423f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d427be1de6011007f32582b0c7d772d2
SHA1992bab7ab0ef3936a1dd5a13621e7d6e66085833
SHA2566638f142e3ad17ca629955068ebc68b41d45cb89c45769f2da8c0791e082132d
SHA512c4ad3709d2f2f220da53d3993f31965670de3eba28ba9c7aa86f8eb60f2a7ed1dccf75758b5988de8b1ca5b4a7fc0f1f221c4b9362cc3e0c4dcab6a85feb8d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5348ece430c902b1e4760682aac9f2e64
SHA12f9514e2f418c3ef91c6fd003875aac4e17c676f
SHA2568512193af8f91f50f5baad42a68a92e736fc5b74ae247e83138c3d51dd7ea66a
SHA512bd5bc29b013f193ac8578e7fb7782ad605a4f557fc348dd8f114a1ff438f1e4a7a75517d3e21263d8d0654caeb99349567ac4ee3f13973608285669cb59afbf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1a5c2cb0922b3f1888950846182b152
SHA1e77bb800dce29765cc0a99a545a034bd3f458b7a
SHA25679161bde66ebf921123003ec4bd897228f41841a9efdc50ae8b375c094e3f630
SHA512e7b79294c1b3029b95514dbd28bbdbf75691b3bd5a1e1c5b622a6395289362145fc4f2a4dbf595f1dffb2eee7fbf00affdfcdb7a360a6fd67ebb352e7865e80d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e8d53e24cf71381800e2bb2efffda9d
SHA1ca15b758314482cda4cbbd747d73b07c7f765110
SHA2566c0d6f144e57c8c3a1b605dd80beea67bfc529020afec8e73cb816291fb18c8a
SHA512216c5cb5cabccc76734a9df10be2307a9143d53529ee8d71e9f65f0d309b47773360dc47904141ceb17bc6477a6ed584cbd6b130ba80053b1fbbd8c67fa34acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51992a79d247fc0420fd18909d803c30c
SHA18ebb6694188b9f16c9af9a78cd828ca8c1ed4f2e
SHA256d190abe6835bbdef8d7b02dbdad8d1166e2be90dfa8a807467ff9c6feaad980f
SHA5126acd9a5e652790f66098239b81aa26ccea3ff5bbc774de8137663a48378e1007e24c62fbf871eb1d530984700935df6ea2b44ea1af3e03e696c32f48b9b25919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc3b279a9fe5d98a47fd68262e51b113
SHA168c35db6ecac7780358b99336c1c7c2587880fb8
SHA256b4407ea6d69c21a6ba5a491cb852f2757c954f13be1669fc864ddf057812a090
SHA512b072ec4f0cccc0dec10f6d0c4f1d334038a452df5772f6367b1b60a1ec7147880399a13455700776d7da04db4f6dbc6f07604c6b4a4e0a4a5e26d0343030d786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512582f62fa9b67368ad40e39c222b32c
SHA13e74200bf98ed0adedc1843bb06379642b6a6a12
SHA256cd0f4d879ecd8369e8790c61ec0bde3883b50e60ea0faa3a0ad0fec1d2cc1aed
SHA5125e5cc872c42babcfe0f9cb998e3b3bbc8dded523d818ff64f89cf73c183fdf5f6a262cc1946cb36af023d19d819b3a70de38a8cdd0396e4afac441ff770a6ac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509fc2d5fb2ce82f332d823fcab6d5404
SHA1e535d968a2f8d97fcd4e4d95e2971452a494d067
SHA256876e70038049e43eacfe12e53c76a0a04c8faeea3be8f3bd6abd1da7ae9146f9
SHA512fc75a2140323da0f9c596e830c88afe889cbef9d4c3a1b6bc1dd4c82591b18a7a9bd7dcb4f3c4f34f3cab57ccf1c4c40f44a19ee3ecb5a3d7aa02c24730beb0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587718002d45fc5aead16979adefe6ae5
SHA17dcd33ff67a76a97ae28e8be9f77e76821cebe5d
SHA256f55cf737ce5af4628a834296eb82a7c8ffe07e6b4460cbbfc9209147521d7ad9
SHA512e7ea7ed9fe639974801e8034d13bd386b715caee16af5022b59485435fd6cc4c9456c90d265edb6ebd87629b3695713824173999fe489ea8ff9b0784f8d5872a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ad1f3d969964323cf0e5c2221de7999
SHA16948658b40f8c9bb951a9f42b1331487867176e6
SHA25640401c7aeed95032922e9f15c93063dc691b02a84109047e8c7f43c68ca113d1
SHA5129527209f690f4bc1b71726429ce86c5f58905a08583d89ceb31c7534fa44b44a847b3d0c4f4b9085200b089efa0aacc49e54893a7e0122963b6e03d8c366f9a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e49a83aa10e34fac0de526f8fd8032d3
SHA1c564c6a260f280e301ec9b944763db3f0dc66bb5
SHA2568499deb7855ec7c1c3cbea23b3d5a2c45afb724dc5e0fd22f0218a2b4759b8fc
SHA512c89d9570ae1dbd63178556c0fcf5f36208e72aa11268717c273ba5cbfb2937dd3245f7f402a2dee7690942f16949a7fa3c56a80b282b73d7695862a77a780bb6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b