Analysis
-
max time kernel
121s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/08/2024, 21:17
Static task
static1
Behavioral task
behavioral1
Sample
83945d6d86d6c6f83eb6936f322f381d_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
83945d6d86d6c6f83eb6936f322f381d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
83945d6d86d6c6f83eb6936f322f381d_JaffaCakes118.html
-
Size
24KB
-
MD5
83945d6d86d6c6f83eb6936f322f381d
-
SHA1
709735dd946d0db0b1d3b592b13bee858030b582
-
SHA256
1508055644750d01e4f8c98e09313098574aa5f96b4d73b0f21b20f8bce8a7ec
-
SHA512
d078260a556753ac1eda7b16260d5fc7966dade3970598d4ebf65c113e1e5375aba47525867bfeb39c16973db77bde83e2847cd026d4526e34083ed5f0102dc8
-
SSDEEP
768:di7yXKre6CfsghDvh3tqnYy+/e2vb+yGng8aFXiiCLafCd4Xegc5xLZ:di7yXKre6Cfsghjh3tqnYy+/e2vb+yG3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000005e5ac676d906d99ed9497166a22d952af676a25b56f76b7d850da2f314a0855f000000000e8000000002000020000000a27da91e16b7d59e0f6d52d0e8fe36efe1f3c213dd4e015326fa1916e243d240200000007433c28aa234788c0bf7d75688cab532edab77cb2ac83825a792a8d5fa18768140000000544ba10ffb3776fd1191eb3be202b3a8ae957ae8e3074239c0ba32c15f9e69d20e589a478cdd3f58d746ebc3883adace552f071b140ba1339b7e59010f0072ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000fcf8ab7bba036134bd0f6726e6e762a29ffeaca2fbc921d80f062b757b624f2b000000000e8000000002000020000000ca1b25e4c0e67bf02c37dd68b2d8db28f9985ffb003d314bc44bce5ae295afe790000000eb85466331894188cf5bbbe68b1265075d8e58e557bd785891fb415d4fd0526b8c8568f7cb29b9aefef438e9ada5a03b9cdaca84e828f187a318a945216e8219f55b4828e2a473c70235bfa5589b579d39c35e0f25c18ac28803a1e1c2e8317c57d23f3843de2535a9f4f7053e56e9f8d4b7bb31d35a847f8c8bff417b1805bc3f8572067daa239f476f0e63c903ee1840000000307854767702ea4c9d7ec22c24cc81872e936a305a43938b089a6249dfa2932fcec1020a2cf0c5f9951480dfec6032042436163863ef86e3b8d8b7df590aec1b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429400108" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f03754c0a1eada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C17DC381-5694-11EF-B6C3-72D3501DAA0F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 588 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 588 iexplore.exe 588 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 588 wrote to memory of 2672 588 iexplore.exe 31 PID 588 wrote to memory of 2672 588 iexplore.exe 31 PID 588 wrote to memory of 2672 588 iexplore.exe 31 PID 588 wrote to memory of 2672 588 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\83945d6d86d6c6f83eb6936f322f381d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:588 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a7f6094c125771edadb1f64cadadb4c
SHA1483cb3ed1edd95a410af771b4885504e5be209be
SHA256eb5b901449c75d8dfc0da04402c70dfbc11aa5102ba2c43717c8e93062971508
SHA512b88db9ef02ec04dcb74671d77e7d3be320fcf35ffb0f06f43b69e818ca3b82d7e39c03337ce194cbacbcca963905ab07213614e329148903a2a9e325a4817109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e87f0f2e6326e9cf46c3ac96f0f8735a
SHA17eca94b100bdbcd4bde40ddc9bf203933fb4726b
SHA256c89819c99f52382678d4e0d260a866d8e4f34cf8ab066831ec7e7fd10b1c4d83
SHA512e8fd8d5ffe08900e171e931bfa6755434e22a687f98bf5d896d2916fb287710ea806f72aad877179e33d4ec83d4744543656c6222ea92327cb2b46f2139e84d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cacf489a6762a0e9b4f512088a6a95db
SHA1ba57d608ca9208cf3cb346f3c0a9e884274d4c2e
SHA25679c83c0f8b8668a276e1b2b11a3b93b66427130d77489324210dfc0148a32587
SHA51271f81f0abd4b8cd8f89a7691d4eb72eae35f59edf1e20b65b721f554e98abc320769742536482379ea160cefa76c37ee1c63d3ba1e7114a7cdca9f9b75823e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f9f38b7c4a2bd1856755f504bd53d99
SHA1ca5c967b695400d635bd300a55c9a04ac157913f
SHA2561c688f5ccfe2968556ad127d391070a5b19a154312ab84604cfa93e0dddf5fd0
SHA512be4b15b90381969cbceab2f3f36de746312c7f68714bde2de9652667c887637724cbfc11badd961283a402264d7f48e87722894b45bd3e516ec82a4a506f9628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9966f107952dc99f9509c3229348f75
SHA12d89e00b0e34732c7e3bc3211f6f7750248f4e25
SHA25677af284214a4983338063e3201d7a493a89e5e410a23f98a78f8e10098eae11b
SHA5124b7025b5be601bdd36c6e0beb1fbebc45dcfce492bf834423fb1ebc270630c34d808d23a50f696df8c0bacc9dc715b7a50f3af42aa6459548110189558395ab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54672ab93088b5e9ec4dbc425149673e5
SHA17b645984f5c713d2b354366f7f386b81d8e011bd
SHA256b1880faef770e819789fa1a61ec6a01e912526779b3b6d4904021e1601b29a17
SHA512f4a8674d58d3cda0d05e89210218d52f18971f4c39babd0843de2e55bd2e4f3e231651b337512f1bfcbcf3efb9c0a17bb4a6cc6c05756374f25d5d225d25b89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed579faa996ad894a6928b9d64e4d2e0
SHA19b62c975ec5340c804173f2743a2c0b13700ca80
SHA2566fe7c0115f7c9a171ee82dd887a25eab7db12768bcae1ff71661ba7518e1dc5a
SHA512021916749b6777d24fb55031d34709010c8993c70d859193693bcbd6baae6b860b885bf98efbdacd3c690f0e22dc5503ec3e85953fd6836ebb28c541a6be5f15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9ef2dbbe3ecd6dd2179a90874accd03
SHA1cd0b3585495e8de8fada982a907af8fb9b81a612
SHA256e19db356c1cec67e5c329a320e0b88dfdcec481d69b69bcd980af3ffbe209fce
SHA51237645ef2ef355d08b3645119d0a93569f665202f4d9cc2289e5ea0c605c04312c9406d6376aa9d52709a71c4164706f3a1790737f6787e3641fe7e3a841f5ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5badba0e51b062015aa1cd71aea727986
SHA1a9ac5808bc2769e9f1690d8ed6c056d2b06d90d0
SHA256977af911af59dfa9974111b9bf5d702110ee9a6ef8125ef760a6159edaea66f6
SHA512f077b8810631f624e4bf6c6de4f66a301f680c5e5503082c5671761cbecc8c4305497eb1168bad14302a2deef7937255a556a925158a99b6e3baa9def3225250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f017617a1b2b07f2c21a05b833651cc5
SHA1b35cba287e4e1fab5767ae209e48247ae4126553
SHA256818e7a1fb8959cc40527a625f6a30e92f5bcdb361ffb4b17fbd62b203c7aa58e
SHA512f924b8a1656adf20e841bf1c4089785606aded5b7a1d6bd4aca615260da1385e5fd7c311fe87480042579d3544774f4a72f426d12f87aedd3bf942e74c3f406f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e55363fe5aee0e1cc27f9002f7b40a7
SHA106320a512b7296a83878e22191f2f9fc0c7038f7
SHA2567e8ca2f88f7edeb3e9eb0eb46dfd1b92d6e353477f7b1929f54d04d5e63690b1
SHA5124dc7a8756bc5b60988cf0c3d1ff541557001b2a061982d2a0cac8f00b33a723d5a5aeb36468fdfd9c1e19abacc3708eb58d6be9a1af140a69f7c82162c76fa56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a5cd583de6be9325cc8ebb44c9bc091
SHA181c5dfbe4fdc71c3b0551b2193eb9b471b8c0c1d
SHA25602179782a78875b527e243ed5881d728fb20ae936e24265ed60c0c705f8483d3
SHA51253a29f3372cd893056a3a99347268a6caf5058189ceeac88d392dbb97c898131411cb6eacb52d164c4460bb9adbad00277a0eb54979b1043a16552851d966ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5489ba39d0e2889089fd7d9fda1847534
SHA19c0fc47f09edc184292dbfbe490d11a9646bfbe8
SHA256744a6cfb7f029d332b949273099955beedbfb76c5d7e3d1d4deb1d554d01c255
SHA5125b54c5b2b8351f2065b73071ea650e1e7f4d28a17af986fad6328f8aac45d61821b7b7132af6654c53067e78d7048873bab86324f42bf7c4c9b5f324574a69b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5928b128e9031a74a6ccb12334c934b9f
SHA15bd0e13b4fa22f5ad27b6c85d5e97a31a210b806
SHA256e5a9885d632a53413efd66010ed6e9cca1eeeed814a90f898da2bfa263ca159b
SHA512582a16981ac755f8c5cc53e53c9b82d100cb929ea1b8a06d721f733e4b57d953f5c7e0b7b22265ef5550b6d8d5ad200da563a5609111b7bbf90a0d823b46688c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b96dedc5afe5c6955f0c6b0d2a149afe
SHA17fb8f9c42b3ed8fd5d6fae0284027b2eb147ffd3
SHA256cdf94cb1f70b813e57165f0b887ae2e36b5542b4c2675df6ab8588ac59ca826f
SHA512636d66285e17b86db16ec546f182279b7a5d88534462630c427ff41ceb4d2234a383dc7eab60a88960af397142342c7bff0c6680d3581959702438d53f662db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57230feed45e3162250cb7f3ec8eb167d
SHA11d5cc67e549b22e17e3aaeabaa1597df067e254b
SHA2564169d5e0e6a6a1dd3b838eef97795e00699c687efa0b5fc092b5fc981abb59b2
SHA512e6f53bb5d15a200774065d6d0674783bf0373ea983778f6647ad5ac7cf0e493c328d11a71afcefe2b674dfeda0b121bbbe283ac316a3cd52b778f41815878c4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50262e46544079706d3db1b3a9fc9a41e
SHA1bf1027f9e6457b524cc85faf81d001dfa84114e0
SHA256be547568f17c6334cbb0f0e352d327ffcd5cebe40ce57a2b7a2f46922e3a1fbb
SHA512cca4ff654bbb278b5b9760c9cf85dcd3dc8fbf6f90004c28fb5214fba474b6be2cd8cf422d71a9f33eb249fdd0c92fe36bcae7a6d923ec56a54badef4d20547c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a4a5c040c89191023f7139584dfa9b7
SHA1dda3e83a3c763a1b2ed64335d83d35c76f80e114
SHA2564f094ffabc2d3d504fd7a80848adc8236a172d400aa903bb02a8a251dd508dea
SHA51233084c981742e474b1aff1b81825e862173f9206741298524428e62b9da0be92b106dec936eb2c1db182c2b5aec0e62069bd29e85f87e7b5959386a45b9753b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba1e2d874c18be0ff3d781ce8f9946bd
SHA1441272e531937d4acebd5cc152b714f4cbe14a28
SHA256b1304e412d5de06465a938c0b58f60a0d1f04e17d43cc968362cd73f78085473
SHA51272b66506aea37638b0f1e5d16cde866908f33f6646cc411fcfb6187a38b322e017f0809a7778be5ba28d59eca086ce9359caf9482b68b5342df5d7f0efad3e83
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b