Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
5b7de1ca7f6f0ad1f786f9bbb3e8df79_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5b7de1ca7f6f0ad1f786f9bbb3e8df79_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5b7de1ca7f6f0ad1f786f9bbb3e8df79_JaffaCakes118.html
-
Size
53KB
-
MD5
5b7de1ca7f6f0ad1f786f9bbb3e8df79
-
SHA1
c2490ef8826083c130163e69b155f523283487f8
-
SHA256
19d9c7a5b522e8e1b55e759d44c3019be192cece460f0f0fda2376ae1a3362f1
-
SHA512
76170d6c51d714af233be58bcfacdeb14c3c053efb1217306f163ae479c571f243e42794f93a4943b978b75aeb2cabd42f7c8dac76e791e7667f6cd1dcf97825
-
SSDEEP
1536:CkgUiIakTqGivi+PyUkrunlYe63Nj+q5VyvR0w2AzTICbbsoL/t9M/dNwIUTDmDL:CkgUiIakTqGivi+PyUkrunlYe63Nj+qd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000c413233e51ab7a3bd7b094c993a854a1f3a7e3c56d76861825c59a4ed81e8bb2000000000e80000000020000200000006d31153dd0c42137a00a4d660735853e5d18385ca22578a893a1258a8b08a48e900000006f44e9212e62af1ca6d343852c7d6ea1b1ee33a0b29091d1d896cec8b7fb0ebfba665e0a62e499168657da19f42de32014ac5ed3244b7e0e826c145833ccb0e477e292ddb372e116a92583f7ec7a46671790a97caf0ed81ccd0533aec4a9f32069d65662d2aaca70ceb6e671b40d50af39a9dcda80da7b69488859305fdb77591b504755034e3f97685123cda8edea5140000000fe184c3052591a60a8e00beae56015ca32f49963605088b65fbb9267ffb246d23197f1f7fa8f95e9db57b4653dcb5d2f164038ef4cc88b3b58226f9c78097c7a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427545731" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000dc03f40e00fc131928e99edae7df0903cc49e869c2c5188bce97ddae9470cf2f000000000e8000000002000020000000cc77141454eb292401a6788f42dc8f8c581327c6451a0e059886e65566906e042000000054d4030b3b374e232ff3cce8f86a5c144fc4b12a3036bcffa818f75c8d9978dc40000000e7fbb1e9dc14735f16f232182e27775b3d3ad50cf78859c8cf05592b66416c2138a50aae2a93a8c8e9d974929a7c390698e080e9aeaf44d3626a619e2fb89e9c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70492533c4d9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E77BED1-45B7-11EF-99AF-7ED57E6FAC85} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2124 iexplore.exe 2124 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2336 2124 iexplore.exe 30 PID 2124 wrote to memory of 2336 2124 iexplore.exe 30 PID 2124 wrote to memory of 2336 2124 iexplore.exe 30 PID 2124 wrote to memory of 2336 2124 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5b7de1ca7f6f0ad1f786f9bbb3e8df79_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518890d3103d5077057b94617f7a2d1ac
SHA13f4ba1d531f3a09b4b00543bf7cd58637e7d10b5
SHA2564c0847eda79db888cd641f342fd959b3cfe76363eebf602255ec2ae66c9949ca
SHA512478161be553baac6ecbd39cec94c77a2416c21df8202bdd705cc11c3a9bddc3dbac8a6b8bc6320de0fe9235fd2b496fbe5609da002c7741bf707ddffdb449134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d747a59ccca56b3ddeb59d3a9b6ecc1
SHA190a9ba267efe2322a3f8793ac75f6dd0e6d30052
SHA256f3fa0aad0807744a29fca53996a1fdf66ee1b28b29dc8b1e9b365ab48e4f444a
SHA512165568f8ff4336c6a24fa797e20f4f865e5d85c74b40dc1169e9f161a4f29fd51d73ce787d64e9b5696955a6d4041389781f4bd3b5bdf674b22ad19c0cfeda42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd7ca7d2662d9fbfad63491bdb0a670b
SHA1eb672ce66887a13d221244bb016a64d8a727b078
SHA25656ae52f8a5f87f1f6bedafa7d6c104e14bf184f130a7a4b98583d7b8573d672c
SHA512d6076216d18c0f828a19c0d0e86e91aa226b849754ed2b9ef9fa93c70a8df8401ade1a2e0184dbc0ac7ef77fbaaaefbef2699b731fe2a3a18462f07f2f793a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec1269c69200ac1f436f7cc4895de51b
SHA121c03ac2d6bc1de8651b9b8bc63143bbd3e894d1
SHA2564a981656a010e1a53b978134ca03e9a54c8250baa4e2d51b9b16c9f7b56dc388
SHA512a56553360664f968f87274a7ecbe04726792b601412787a8a0e25f7f5641c3ac3dda29318bec9e2cd2d90eb8217c3867e5a9947eefd976a965df5dff6651b93f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542ed1baa5e74a8c464080e1e46aa51a0
SHA10de8a60de95107bf3a850ee7512715b81bda25a4
SHA25661b6c9acf8e2ca8602051ff1693efa09f2a34cc9e5614decb32a7e6e6ee288cf
SHA5121254e400d987681f2c249b6d76a6174dc17971aac2ad51df59db836c046cfd8bb242077e0b2ee75a87b14b03f987afcae60a283bbcf87077dab6817ad331922b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c0cfa6179f651d166e788de13562784
SHA121f6870aa5ae459c28a6d5d1253f95566066a489
SHA256792b7188d3b9d6b4cb2d10998c341bb64074092c8c030b22ed9bf3d63e4a479d
SHA512f16903df1c282d437456d80bd3e393144691c7ed7b30ef44b8c5809166790ac6e3af3d0c22bc07246ee00c4b2a4910d4abeb718e8d9752144d9d4e0fcfdc0537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efc4c8e9d4fa1123ea8f92cb48a2c44a
SHA11e2e4ed9d4db9a5d9858d6432423d9ce0a3efd89
SHA25650a365f6a45b4c3769625f77c9bd359429412b86cfec4238c9898f1a29d0067a
SHA5129d699e969d87ffb11ee118035a32bf4d479c99c6395078939c282115e2862277c2f90ed7a830a674f4a3be92b9f47900549937109c656c37653ecaea8a955bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500ff90d529b4fe0e0463023fa19973fa
SHA111fd12e8fd644a22261ce7102103abc643957280
SHA25676563f92f259914a9e64f31bb7e7ca40e5031c67c361c7049b1cb8f2fc799540
SHA51248b02df9bd996ef8de97e583cc81098915bb127db04b816d8952ad98b701024ce5fe4488968b039826ae927251c9b5b35ba910cc0b8cfde8a1c1d798270c7eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4fd7444eff97b77335785f96bffe277
SHA1f4b09e9336d7e33d19a4371847e11ffdf3072857
SHA256bf4957e8d41e96491137e4a188374e8f6b48a097e4928d43f203fb11477cf163
SHA5123a59b0c64b99e61e491aceac947d6b57fcbddd8ffb244ee5be7b216b453024a7aa142751ba4924104015661419418ebb9bf89a58101974d1a6f6b238febb7384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57504258150bb66ef3460c4a951c0b11c
SHA1380507987114078b84782d57aeb918671588474c
SHA2562b615c641983ddd87a971cfa87aaaa775aa3bc97fb08bbb082613b214169d210
SHA512dad561c2634f70b688401810f7550e402ad0bec85957ca36f7464ecf94a8b26d6a5bba0be732d4605c7c5cb68dff0ebfe81a9dd55038e7c693f9acdc0e9c81a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517a8872897cc5a30f2196ddf2460c002
SHA1f32429638ea07c7d817e964ddc9bf77ae78458b0
SHA256cbb581b088b066e383c4b11eae8cfc3f1c2f63e7bd98681b557ae2ec95ec58c7
SHA512ba4852c932fc54e5ba9b20c743f59617b2f426163bd31dc00139d2cd46cf59719d0588a9b07097e5b4f946bfbb94442e22abb641fc7ef948006ecc001775c76a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc111c876c2aa3d42f53417153c1d016
SHA165fa0bed509953ac6b6e5cabceab1d75448dd6fd
SHA25682e28122f7cf1d05e209b9db782c54f726dd9287b79a5e0ef49f21c9357f9a68
SHA512dced6bfb22afc436491244a3861ea231f178b1b808a2bbd9c1d87f0dedd8671fa97fb4e579df19ad3910635b0a1a0618d3f7510bc1dcf9c18dc699b8acf196a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564cc91a90bc5db773174996eeb1abed1
SHA11902abfc410c86bbfd2fc8f390104eb23ab025ee
SHA2561aebab9eb22e4b4b324a79e6d3ef836ccae3676b8144b1a41c5633e91cba74cf
SHA512fd69068820cd9b8a66fd2ace67958efa62c773b71def16a435194af696179d2a2344e89aba3b82fa78e66f79da4e1926e31451c0a059bb6a2f4939d6e74f855a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515a406511dc161dc4c86069ae5d5b82f
SHA105f76460adea6e82f53edfb5dd71cb0a3f71e4c7
SHA256f529099b42da9b5df524d06ef6320843a20ce1050791c18ad187b9849c9e05ad
SHA512714542b4f56a3c820bda8447f1cf8d488d6e4823069dc1b39f225e928a52f1fecf70542df14498fa66723db01b5faeaae574b292f0aab6fa219d6d695a2e26a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597bafba44a1663400d76eb2edb5ad968
SHA18a90a686a873bac1cb1424b4235d5e5addcf46d0
SHA256a5f9b8f1feaff0a97afdd1bbd7c416cc32f3d04dcc1dd6ff1d22b33ff2ae1fdb
SHA5128cab3b97416221707b3205631ce7c32f252635a880289fc172d7be3c720f056d85b70e6f154cd08ab63e50955f9e5811f5c6312ba7e64867754ace46502d4afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5793c56532e417dd1f009aa315a22d217
SHA1a718c8045fafc950cf7e9af278f70ea1910ffb99
SHA2566058c086d1d3837ffaccddb38e2059aa1cfbbbd753683b9601d890605da94946
SHA512e84545a0f27c01f61b4db0104f8db1512367a6c2acb1940a800f6962d61624db199853891321263436d034848468bb6bc52a3b19e211d24e5144cb31dac00944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553caa23fb4cfacd0563abcd0dc1a90df
SHA1ceade0e888baf429b35b4cb4d70e36114a0128ff
SHA256d0fa0d59ea147d4df849a1bcb01b525fa11b478e4368a3b7173af85749784fdf
SHA5123cdae3d2073c63cd52e77437b450004674d499ab1552efedd854b79cc0dfdb27dfc02010740eb2b1f50fa4919f0c813811499aa9163f22efcf40106da01d49b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d0178fc4b9333d3fe77f907db8d42d7
SHA1f5079c8bb09844efa5c10b2df7e3d44227540f82
SHA25686870a314881537688a0810fa172cc33992aebaf054e1727b9c98ce80f5d2041
SHA512b2441b5f833da92b36d7ceb5c37840dd966df570ea5bdbde24bdbd08ed30a0938c491e36274f15e7788d6ac1810b756c6af5136703d80ef8a3d652e713cb8019
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M7GT0RRO\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b