Analysis
-
max time kernel
128s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 04:45
Static task
static1
Behavioral task
behavioral1
Sample
d5ac4aabbe3a3a0d527440396bed7a62_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5ac4aabbe3a3a0d527440396bed7a62_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5ac4aabbe3a3a0d527440396bed7a62_JaffaCakes118.html
-
Size
54KB
-
MD5
d5ac4aabbe3a3a0d527440396bed7a62
-
SHA1
9eecb1c8b9e25aa86af70b1d8b9bad0a0fd765eb
-
SHA256
95cf4320412b5928664701c420ba17c87c277746d5eaed4bd6551d241a40b01b
-
SHA512
63f0494a7924dabe7062dfdec1fe6dba163ffac5aea7b02c25749dd3437c44e1ab8406b25a02481fa782826f9e664e2cf99df2aff757b9f96537231c1dc3a077
-
SSDEEP
1536:NGC3HuBnMKfHAVfK87fGEemfjgVfzB5Vfdb+fcaDfyT/ffBBk6fUaXf5SgfTTMMw:NP3HuFVfsfemgr0gXqn2HBpj8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65A6D2B1-6E66-11EF-AE85-F245C6AC432F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3070be677302db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432019022" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000c82c24cda0438873f34e629f6258e11068c3bf8c8c3efaf42b5af754849380bf000000000e800000000200002000000028948886f095d0b9e4f0b7d12da732ebffff29f804f03e8b225e594724b46e09200000002adba00e3e9de41458cabe1b1347e7b0ce2681824a16427719b880a4e1d05dd440000000a30048809e1a5d10b60b3f7df474899c1c900faaf2605440fac2595275602ce88f0a2f8856da7e8434f87eedb167011ab7efa8c76901d0ad1c5ba8e2773df539 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2892 iexplore.exe 2892 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2736 2892 iexplore.exe 30 PID 2892 wrote to memory of 2736 2892 iexplore.exe 30 PID 2892 wrote to memory of 2736 2892 iexplore.exe 30 PID 2892 wrote to memory of 2736 2892 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5ac4aabbe3a3a0d527440396bed7a62_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5859f65c5456b0ae474b2921c54060101
SHA1443ba70cef1b70d38ee86860940ca6c66e4bfb05
SHA2564a09e74d00dc9d28eb173448cb255eb66206428b866025a7eb30e2d69f5d3a1a
SHA51261d0a9bd6985a63a45e6e2e3eba70c3c36e70cba150d428379d57c9d80ab5cd7c92a6c51c73b6e18706cfdde90d04433f2dfa75e33f9a168529a1f6ac765139f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5128bdd5235e846984e8737c83004bed1
SHA185a1d1ac16783fa11caeb3db27063103f7b28964
SHA2564f0590e794980a3c765a0537ef549a3a51a1808577a8113756b2e99bf10c85f6
SHA512b0ac29ac8ae139ea355464c21ad82c32b1514cea60775001c812202c4e46038cbb9c8270fe2266c4b56fea969652664d107ce6004b143c819c9c516f44f2e040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569ae2a5f719fe909f2521278747e5734
SHA16a4c8b9b2ba2b6c7f4ee5eef85b789005c047118
SHA256eacce50ef4b03fa59157b87a04137b765caf8450dc0248995f749b8db95a4585
SHA512f6abeb69b1c33ef52732a7fd0b813d969d19370e93ca964c9fc352633d0c8c1418abe1b98280a2f86da9d75364e06b781628047db0700bd80f0710347efbc06d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5855a0fc4085002f22420dc22b15982b7
SHA19c7d392d461950de4babe85bb487a9d5bd6755a2
SHA25633c6d814255704cac4933b59f8a4940a8962bf1d69a82b7c5ed2e12c417b57c1
SHA5121bcd40217b28b0c6bb1043bc32160cbb04e2db6405a9b32974b75c3b3be8636a1b378e95878fcc2244ed7bb919cacdb14f5764bf0ed70f878b61e7922115ce0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53933fc14fed4710ee900110e7c522b97
SHA1f8a81167d45e3c4e0c927cbab027ecef6142aa91
SHA2566e90a5fc8cb7c45d3ffe370fa951407f8257aaa653dafab87632af510dbc5625
SHA5123c00743fbcfa1d379423cebbfc47cf4e37b3b029ae99ed99b2e30d6409b1513b4318093a10c6ca02401c5d412fb485fa14f602d1e9def2b93c412872c29cdfcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba45e2b8f2d8346c62f108e1b9480d7a
SHA11daaf2cf25a61ad828286020bf48a7c52d2adff5
SHA2566d0354def525d97a9f795bf024a108f0e5aea3ba3ceedc557b55a99a9bb9c879
SHA5124f736bc397deb92dd81350c5a1aa01dcda63d1655ae8a20083fbc92781d11a94240f61d99afdbf496061adfbd953367f2c488535e89ef2da28cb14d77832aa8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536169c1ed5ea7b72f7a5eb0408798767
SHA1d0c257bf6f845050aa3b80445201dddfad182736
SHA256b07082714301c8c3dfc599f00e26c4ca318e48d4ae4af603d735c0abef78fd9c
SHA512c5470cec35891cb486631bdfcaa9e7409d2c0190780eca6944f9715da21f43cbd04f08dcdb6d70d3d7ba64194e5a07bde053d342a4e1615d045aeee5d98ea326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6344f854ddf48b137b690ec7b86b36d
SHA16bf653d4df51bfd1ff4008b5e37a35df32bf12a5
SHA256d4fffb2616d53392ff03be47e28559b563de3dce2a2f1ef4eb1227f0eb69d5f7
SHA512a621e2f996ee420326680fcf1c741eb54c4396a601802e3e7d4c38ab844a66cacedbc24976636477f34493f8d8315918e226c3f8d663ef06b9eb3fb502d55f75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515cf25bcf6e2b1d47b81ffe5ee9f23e0
SHA104226c46a1b15fa7faf4384e445d92f926e4e048
SHA2565a55d1bf542936e440ad0efcae57c5afb77bccd24b1a069e2cd30c0e9a7e5a41
SHA51217ef729a8fa2b76f4a90ff178d942fdafebcaa3525e4c2b43a984abab14d91f1f7b73ee207591b51ca6a544cf8801b6f000f15faea6c8acf24b11e1815fcf77f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d718e8ffca27e827f8c25a056fcdd0a5
SHA1ea6919e0b23a0baf70f54f5fd83fe47f8a493134
SHA256deda2a3ef9d2ef6f5341eb2e27a3246329c01aa750592e152f818e0052a81a9e
SHA512de1b702aa14b28637b52bfc0e25b4f3e0de763731a76603b7c6466942bb3a803d4775d9df979825c367b41f440417dd4bf735da3a0d8bd29a6a522e18b04d6ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2974b899c21b04cf5b6ba158686a6d0
SHA19a7b8ba08d3a99330ef823a99f78ec9901980e36
SHA256d04f54470e3db7961584046793c2fe4640dbf6bf25f10eaaa4679616abc168ef
SHA5124678855e08665240907faf63a8830eff1b2e2af262d1cc1098ad77e5034a1dd91b516e0b3041a4b3cfaa09bda583e47d605fc72d7b34c7bf4b84152e4ae632e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e6a9378dfc3a4f70bfd860001ab22c0
SHA10728ef09382546ac5d5b784b8f232f49da40d09e
SHA256ea56ea7e1a913f64cce65ef1e8b8e7232e2fe9fca88c388d8feb03dc3e5d5552
SHA512d5faecd6c7a927f661ad7208a26c1cf2de67d7850638dd5e1e85945f5e46cbfddca17e4656c906a0196c4c3718a8180d54a39837a6a65cd8318f1f6f36ed6d69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e7ed33f48779138bc87f41dcc850ade
SHA16a4f1626acb2e717ce6bf5cbda5d3744a96847f3
SHA2565620414f3e0e7561c8b5b44950f2467a65bd5c53bf055215d8dcce0f656f1a15
SHA5126963681759bc1a4fb703ede6ace963dbcd1130da2fe110500e83a3ee755b1004a6fbc272ee53486367c0e98ea6a67b206a65cfb6a7cd7b0d278659c1a596c74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537c6dbc723db6583ffd55eeba3c00a85
SHA1f104a1bd0ab828b539f1aaf88ac81d53bc83c431
SHA2560e4ec3808ba082cfe99d2fb1a77be43801c36c71d7ee0e465f05e9955f284168
SHA512857d06367c3e21b60acf2c4b5546d4d07b040650f8dd4d27600b009faa82ea4643dd1446bb6202ed4976db371dd3a6c67e43b36442dec00322ed89a9ed0b2dfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58221baf351c1d4cda1dfb9ba4945661a
SHA1fb402dcf3d6209480eaeee8694c02d6e262d36a4
SHA2566e033eb49bdb316bf21bdf6bd2e4712f7aaa395bcbc2b1cf1aee80b5dd47a62c
SHA512baab8cce3b32dec086b15b94972ef4d3d414a60ffe844bc130d77f561e3b79f924b6fc56f09f2366b49372f19865724413239e3bb4b0ca12380fd1432a28ae55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fccff690b1e3a954fa4f2db76e9b83d
SHA1ebef13e98ed3ec010d152da667b8427fcafee086
SHA2563f9e09e4562bfbc3e23d729c440d21cdbbf4f6a9f09c73d4e9ff297e8e712c4e
SHA512ca5d3cfa543d76d5e6792478fc40bac769f5808142ae836f0144ee5e734de573398c358c750f3b54bd6205dd9b598bbf6f53526a7fa547631a89027efff7ab90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e065c8f9f21cc38034b803df70cbd7db
SHA184d1269fd723f557ca9b02f6ce9f76867a354337
SHA256e32641c0ad3cc3ba0ff0a0b33ca07a643ae7460052ecdf401b31ccbcfb83e0d2
SHA5123e9446978816367369b4c7ea44db1ac9930d1f5c075d6982d2889a4e9be64ba6bb7fe27d8dbd3b26ca4329fe48fce4b9d796d3940cb202c3319e608691a3de27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb37114f4956928785145315a50bbdfd
SHA10624d303720c4bcd8ffc9a0bfaac4c65bc34a7b9
SHA256b97e3742c5ea54e6c2af1a44e2e8c8f9e51a7f40fa31eeb79050d11d3d2c7ee9
SHA512a39abe234e94cf15b891aa9309549a6dcc6fdfad9f975776eb5bf102b44692544530bf62effbfdfbb783ef1ba1092012a0d5e5c5d07382467c6e1892aaf7b338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5a32c1c92f4350e2acf99dbdb233fcd
SHA15f015cc5ff9164009620afa83d1e8432162c7580
SHA2566ec990b1e56140cc02bce9c7aaca75fdd042b74b35930565785cef192fefe556
SHA512f4edc5619819a11d9c26eab6fb2ef9b501be5062c758795d67bf8d57ed00aa52195e6bc54cd37d4f97ea82cfff4cc7c2a8ea4108b1854f545df2bc02ca44cea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0217cc4f1a6585c6c58322308bc86d1
SHA1fb6e0a3e10afb0cce1e8330190c64e6e79573216
SHA256ab379c5987aa4704a003bc9a2f307d8e5ccdd5df173cec01c52f42b275524165
SHA51235d1b9474e3bbbd2b21f5e7ac78430232322071c106b9f71a6f11bd16aa5ffdcbf6ebbf67d71b323c13315b2866af27b1da1c82c59c9b46fb2d42e257ad00d30
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b