Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 00:23
Static task
static1
Behavioral task
behavioral1
Sample
5e4f292e82298381d53d470da6d750f3_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5e4f292e82298381d53d470da6d750f3_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5e4f292e82298381d53d470da6d750f3_JaffaCakes118.html
-
Size
10KB
-
MD5
5e4f292e82298381d53d470da6d750f3
-
SHA1
e1eb5eabad17228ff85592e4241eb1cb6548220a
-
SHA256
95c969a193a71b30ce5e46a205e59d07a1a65089c5e3d11cfdf325fb1c416684
-
SHA512
9b16dca16bc39d5a5792a32e15afc3006094031c2898a6bdf26a955bf7981ae5f99a20c766052f1449a2881fe58d7df9c51b6184a4d17caef6cae2ada3939dfa
-
SSDEEP
96:uzVs+ux7I2fLLY1k9o84d12ef7CSTUjwGT/kEppSOR8lYR8dlR8cyblVHcEZ7rur:csz7IWAYS/qg+LSCSfS1PHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427596881" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4BAF5B31-462E-11EF-BAC8-6205450442D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000009f69d57bd5c2254565dc6d33c3fa7b7cbfc9523e3e738aaca21d0723976fde88000000000e80000000020000200000007a1d0c684b6c0433c1b06145f631eacab1fa810a0e7122884c3350fafc3951b020000000d6e7817ff2420aa7a5d3097e225b16cfe7e6830fdee458df8265e9bf57854d68400000001e067335262001c7f0599b96069ea75d5fe664c34e3fa7da3a8a6cf9fd9b5002d763c7b49c470ddc26e0074003ede9de9e5b275efd77ab61ac93a00760dc9205 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ca4d223bdada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000006e9166d22d25ed8abebe051279656df74f19c4c8548d98a8adb5df0a9fb43816000000000e80000000020000200000001e6883f15f02deed99b5f426a8799c4d5715819e9db50759dadba982446012549000000074631fa6c9229fbbbe303de2a148d0837054e57d6f9834081e8e57c8523f9c57a99c98e30634ff94d4e584dcaafed936de2b5dd2f0570bcec8416468e82e445fc83f1a2c59f83acebe2f1e3961c969a5fbf301c7877dbd975128dc43ad08a9bd010214993bc71872b4254845af542eebde7907b0a1bd5381085e6d95d0b1ffacd561c6757c5e1488eaf130daae4c114f40000000c8cceb5449e8728b00fde39525acd38a9a1d7728eb92f7e3b07b5c75f3c0f2b45c760bc1c636594ad7581d2a130280b72c6ecfc2ff53eecb694ca3d3b6930cad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2528 2552 iexplore.exe 31 PID 2552 wrote to memory of 2528 2552 iexplore.exe 31 PID 2552 wrote to memory of 2528 2552 iexplore.exe 31 PID 2552 wrote to memory of 2528 2552 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5e4f292e82298381d53d470da6d750f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a5eecef61f5d5b85fa8503995bdf409
SHA19be8f3384d18e8bd5a9d15e0e8cca41352808029
SHA25616024f199cc0889da117c0dbc2c493d8db67732dcbbcaf97575ea9c116d129c3
SHA5122f7b2ad15f2e3fa37c1e4d070ae4a332f745a97b2750744294e7482a470d560e5fb04f14892cd23e2ef68b7bd36711f1abfa9f2ca7a4784c365186b644910a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cd96c843e518e167a8b5a3c35b3ced9
SHA118da04349241d6e4c700b0adf7aca70b6c52ad1b
SHA25607e79e6d5fe675d099f9ffb0f7f16d29997c1658a297f91a0bda19b29d3d75fb
SHA512168dfe4302f34ca7413de0ac59204de3b207eeaee7e09a4babb68519c4839d6cce69c3deda05452ece1af5570a5d5c000ac48b84901971b49192c61a611a9fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d78a9c3867149b438f09bea534ebc79e
SHA1f720f2e760f15fab3cf37b13a8f8e48dc738792d
SHA25606ead79215092c0181ec3017318f2ed1b651cf707aaaf541c9c7375b4cf05e18
SHA5129ec5df11ddde624e94747154c098917fc4a0dfaeda26efe1ba7306e5b4801f7905af4dac14919078a061bf277d7c8d6d06eb0e323be3df151efd892c01170e05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5289d89a65351bed3eb59d053376606e4
SHA15c31b5dac8132c708f6689dc7a1af4df28b2c4b0
SHA256aa3e084f8676b09e690f07b3a1ff89369eb577b2433f8b38cd79b31e18bdfe8d
SHA512daa13cd60e85b3b82438e359bd5b522c4ef99650adda8932906f2d6676d7ba73bd5303d44738b4503ba9a62638f702a195716beab3b8e2e2619f193e83cf38a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa3dfd4662ee28b118726a7a4278b48d
SHA169fc4deeb3c7c61473b2e985e71c0ad184bb1fe6
SHA256fd2da7badcd888ebf6609aa987efc77bc794137a48054cf8b1b765af2f66a4be
SHA512183c824101433a4f32c8d233c5c3da460ba9db3b67556a8562d61bad72f91a79b03f6c1a42f517032d9a5689c79dc57ea06d3c1c02be513319d53e8a5140a155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a4abdfb5cdf60ce5a07f095bcd3cc1a
SHA1de24800f6381bb2aa2c9af1a8b2aeff60ef34081
SHA2564b3985c3f3fdf5a64b0bd7753f49a6f4ea293d4c1e92b64526de2bd2eb7fb4b1
SHA51285c60deda90fdfa210ae73e8eeb41f2df1c56620b841afc3a001fbfd67e3140694c00abc160a3de48b44fe25a95bcaeef7cdb6c28ce185ff217400ea4e43c5e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a92d3ae1183ef50c3ca6340aaf2edbb6
SHA168695b640159f1e3b7986722c389cb9a84fff074
SHA256aac5ed0bbbda15c9ace6bddad2d569153351a01e08faddf5d5862e84acd826e0
SHA512905c73e82e829785c5c50609ebc0614492036c09e6fc8a2bead07eb275165f4fa76921d67d235bba362828f265106d6a3431ab7e8cc0ff207bb191173fade318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e254397027f788e8e7cb13e76772e8bb
SHA171d3b06d9b0eb9c4cf1e0aa1cf0636c823a0901f
SHA256feefd8631b765bacc3f40e7d63b8ca51ee717e84f977b3680e8f4d4dc7f3ffd1
SHA512d5a682c188ccbd7ad0030f6453cde731ea0031e20243540979b45d656b4446cbb6d58e8537021700600980df6f461d8ffa2e68fd4e0a763176e6505e1651cc24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eedf1c2221ab03001012392b29513940
SHA1384bab7dc797a9b2aa98d3b5663599fe0097f3c0
SHA256908892cdb65ee7d520cc974de5896fe01c3d3d46ff08f2e598cd50790bb1d47b
SHA5129d46569a2f004549202e2db590d4ea763a7e482e04bd78624537b55bbb207583a57ab45b162ae5118fa9312e90b8ead4e497196b092ce4f484a631ecb992bac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5e1bbf2d7d7c8a595a3cdf4f01f5ad5
SHA10debee953c670719675dabfc3ae44e2e812f239f
SHA2561aecc3ed522c7a69472ed90170bd078afd919a1ce2ed227035018930bd130608
SHA512c665913ae706fe13264557aeccf867c6456025dbe5409d22424ebc84745ef92a98358c9da51837eefd2fe243f9fc67889e4f0f6e45cad9b346bf9e5cc5f1c4ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e26adcb901b21af9def473c7627dc47a
SHA171b09faecabe431606e66d3d3b1d1c8ffd61d9a3
SHA256f30e991da21c6c6126fde217ad32d3d08f7c715701d36633bd927c18dc6b7903
SHA5122443ba17b83155718f44f3d3abad56004ae4f37dace2bcfa388a3d4c58482e83133d199f08ac814e75163556680e7d1dde71110348ef267ecdf0490819f92ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590e2576136b5f44073d1be347e093dc0
SHA10addfeebb27174e5ef39cf04cc91e36e3a1ca7f2
SHA2567b5147a1ca50d7cb80b658ab6d039ba11900172134cdb728828bac2f7e6c8ee4
SHA5127b01c1d8d9d1029027dfc9cbd3068a1b625100076c4acb7fc07b3a6f3c472da36f2105cafa26cbc311ae03ed1ead4da27414e5ade41e97f3a109049791e93af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f01dc98fc5b70ae0cf625fbbbd2c703
SHA1564b08803703eee0c452c5a3dc0c74b8a949c747
SHA256e6812e97e1bd65029add9f80afc6dae7f107f1cf5ad7b186f307f9762e68f6b6
SHA51236b7359105772ffd4d8f2aff51a1b360f26161fe883f29acaa24ccd6970bcbde7208f39455038a155c473eb1db36026996c86a7a9b99b4eb66e36b6c4ddc59a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d520c98836cd67d7f0595ceea02f0e94
SHA1814bde9a5453ac61d87c882e9bb83191e99be2e6
SHA2568d7b3c0a4a5fff39c81b24953f8130edbbb6df36056ab2a05367b83cb051ced6
SHA512d6f7ff92603741fefa4af3d1a26965405035abd3c18b9c227b731e7da8d2d5669784f46a18f4caf6b34738949f563aa7444aba4c36ffc3da4f96d5cef2c6a002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75cd82ddff9e6d45899067af5946828
SHA1d5239becf34226d7f4d42cac836c7a7dfb6b7a8c
SHA2569be859e04d7700513dbb67cef46257b3a8bdd18e6906923c3a43f605ae9afe77
SHA5126edb34fb37c8066424b9b9be598804d5d480537515f9fb7a1da23c9c8f8b49e6519e42f8a8b5eac46d7d8a1c9ac4115e49df6231bae0bc90e5957cca33dc5ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c455cc98b872985a87cbb93bae017f13
SHA1c41733d42e2cd49483f85a9d688c57d62929a7d4
SHA2566dda9a973589f3d5c813a0ceba8bcfc74c84c282da46c8ffc8d0a70cfaf56e20
SHA51217a7c6532cefe2e2b2289a769503d34ee6d55a3ee6fd40cb82e4c58ceaacf3d33424d46ee11ddc2f9ca11b749db82874611fc9b4bde41bd9882dfd8b763e41dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524962433444ffbe51efe1fa67a3643ef
SHA151b1fa1d8c72cf89ef946b6bdd7d38a763362240
SHA2568566221fa7a5dc173108b97518e194a6ea357f78618a41cd52cef6262aa23d7a
SHA5126851fd28f727614c1c5acb83e72c5d7e4ba22840970e3e8a661ef1e9688e4633454a64fd02f070ce9826a9aa0f24920fec3f84d0ae1ef6f621c7f383af7b0b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9461e7f8851835e7d799a280cf58990
SHA1029f9f8d54f537193f4d4f6f616254783ef39cd5
SHA25667feb5ec62d32f509eb4d87c704d8a20d489714ebb886b8af022180fdcc74eca
SHA512a4a1adcb92cf64f6ed781fb5a1b99cf846085030b5a5f37cbdd4c69eb549ee9a9b9e2fdc953167f551d6f6bd3e883a597230427109e5fd02e60e3c5625a1dd99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f921bc90b110a8ce62a225cca760b29e
SHA1c9f9aeadeea11eec4566eb42de1ce421e4d58298
SHA256dfe1896d2af3eb21289241b04e1c987ba2349d584d204266139705e63ec232e4
SHA512f1e8a16b19c6aa78c12da7e4573a460e23848555f7642ae4b63bde9428575e0fd2fa09138c4e86c5acb610081f8045bae8ddb2b0b1ec353575e315d6d2ed5976
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b