Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 08:04
Behavioral task
behavioral1
Sample
fbdad675229a8725b267a9e57c5a7b7b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fbdad675229a8725b267a9e57c5a7b7b_JaffaCakes118.exe
-
Size
13KB
-
MD5
fbdad675229a8725b267a9e57c5a7b7b
-
SHA1
17e632d510e2b8611fa224f91752ae25c70881b0
-
SHA256
9fa960230b97f89599ed06ab935fcb1d67bed7635a902498ef8a3fe5275b9bf1
-
SHA512
9bef40dcc4d6f11d2f28af7a029bbeafcd2747dce3459486ebe4500c702473e51070d1217cfc491e3ffa298ca018ccd57d17148e1f1aef66e7c5eff71e258253
-
SSDEEP
192:Lxy9dBH9j/sAac4aVSxjQen27LDyzbqjAr9ZCspE+TMwrRmK+vhOrP:2zac4aVSxkr7HyzGVeM4mK
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1764-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1764-1-0x0000000000400000-0x0000000000408000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbdad675229a8725b267a9e57c5a7b7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000003b1b91debb5b050c917913be6bf534078245ed9c8509483ccadc0a2c0c6fd270000000000e80000000020000200000003c8e5585cae9e7728a9b224832e9bf9f85b1eda18d0daa418bb5fa4fc084605620000000a788261080b82eb5a4ecc0df6b3d8e5ef3a1ef31363162ba7372a846679436bb400000000953ec3bf9af227306850609c26e7139c6090e077c422b9dde9dd1426ea97e71873949d4f65f12e3da74d004de1459c282801e2fbae2fdd8c29a96ad2d315879 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433672546" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 502289257d11db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F678C11-7D70-11EF-94CC-EE9D5ADBD8E3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1764 fbdad675229a8725b267a9e57c5a7b7b_JaffaCakes118.exe 2176 iexplore.exe 2176 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1764 wrote to memory of 2176 1764 fbdad675229a8725b267a9e57c5a7b7b_JaffaCakes118.exe 30 PID 1764 wrote to memory of 2176 1764 fbdad675229a8725b267a9e57c5a7b7b_JaffaCakes118.exe 30 PID 1764 wrote to memory of 2176 1764 fbdad675229a8725b267a9e57c5a7b7b_JaffaCakes118.exe 30 PID 1764 wrote to memory of 2176 1764 fbdad675229a8725b267a9e57c5a7b7b_JaffaCakes118.exe 30 PID 2176 wrote to memory of 2064 2176 iexplore.exe 31 PID 2176 wrote to memory of 2064 2176 iexplore.exe 31 PID 2176 wrote to memory of 2064 2176 iexplore.exe 31 PID 2176 wrote to memory of 2064 2176 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbdad675229a8725b267a9e57c5a7b7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbdad675229a8725b267a9e57c5a7b7b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://ads.alpha00001.com/cgi-bin/advert/getads?did=4332⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5226143513c10a5edac55dc03f8648950
SHA127fc4cdde7c523bc539e5128c99c92dc526e8ff5
SHA2566b150fb5365968d7c76eb9707ef60da3432351c67258fe6e81ac59119dacb763
SHA5127abe8c0e444095d51f5062f292572057f5b5f8c399a11054c29a3b68f8bb2be11f2edf8928d25b131338c1fe35c095d036f347650a0b1cfc8fbfac65d942feb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c69898fa943c0765e1c719413814cf3
SHA1ebfca52ae4415e7084e388152eb207b2b38f740b
SHA256b4ff7f0e321c7bd98e92054d352f9047905763836f3f561a3f4dffc0c1f00131
SHA512c9cc5588ff23b46274f1ad7b76e7077e28aa2a60d387160608fde5a0f57b49324ea8ad91b3339ce4d19d8a3b74e7157913564479c0a72e26c2c7ff275a6532f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513104348b4105e3000e5433a5966568b
SHA1a9c150ca4d119a54f9d3a077a54c4bd318027ed5
SHA2560a59a0fe5281b2279eb44e09983a9e911f3a872824ef6d6e119d4c6a806b3d89
SHA512d04fa4bce4fff961599b2b823b7bad7a8c1306383ac8bb23318dbe04a27afe433e1c486efffe1a6b31175410dd7d6f0f999384b2239af2856487c048307fdf09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550a1ffe1cfce3e329bcc30accf10473d
SHA17787633e70b723ca0f3a32b43fc823556dafadf2
SHA256e8d6ec44294ab94b7f81c120a44f426d809aa2c9e44c31a5fb69921261bf35a5
SHA5124bf8f42b0a9d688d264b0427fed6437c16a47842a6bfa19f93a230f79033216ed901d61100141c902605fe7d86a04544eae61b3e4659285c5172f0588a96d7f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502bf87aaebe015efa1e0709035a75b2a
SHA1e496d932d2ee771197fc01144d9b4210e0b9ae66
SHA256dbc4a2bf504d5dfbdade9a58c68ba5f1ac07e62cad8429abfc682ac7277dfc71
SHA512d7a104e154b4838b2e132c33ac1d332f1e5646a6db3518965316678a8cf1321d3289c4d65f187ec06af1349a5230c9a042381f71c82723cc7bc574288506162e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50acce4a439f3427f9477f2b0d112ebc9
SHA1469f3176579419ff1e2917a7e60c2c6d646135c1
SHA25604a4f33ac9db69022102eb81df156c62393b6aa27ea552e4693359642202dceb
SHA51213b79a2a4858351f501746617e8b7033f6255745e10ba1702897f5dc9b5989825ef23bd32a21fd6601a3bc6250595df0d6dfaa4bb524846eea15641cd8669658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b5b830a738ae2ef2375a3974a811f8f
SHA1e8544e2ce41dc74d05e6c562afdea2af2894f352
SHA2564bdf6b7360716fe0d0bedaa860a7013e64d83ac597912c7ec1c70729a1a7240c
SHA5120828fca71ee628e966e782dba095f2a82a5c73e89760f0e556c1bdf20e9b676c3e9cc47c35a34d5105d7e08896497b2566aa0fc64d7d6d46d7c50e2398c3e0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bfcb7f857f2279aece7a34bc4a3f270
SHA1d6978fec27088caed2600cf6b3025caf502e74fc
SHA256a5df3b338cd437dba369b1790a1320c38c43de0a2d268055b90f415b54799c8f
SHA51213f4a8785deeaf9d4c09ce6fda1917f88cc3bcb5d336bdfeb3ee79138d1d94b74ab25dbd0685a95b81da871d662aef9d4f825e6480b9272dd1db6470944c8117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa3f50418380c211dcc3a8b582fcca6
SHA1ad894dcc93593085240e335702b1f426b9c14164
SHA256654d05d3084c586b88d730438bd326b159f6349492d7f2f6636584fae3f3d750
SHA512e28e3201a895bb64452bb303679aacce41659d2f4c1189ebc54dee6a1b5e766768899a5c543e842c1efca88dca3a3a4fa1da520e1179bef9021abdd9a6457d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d2552e3717ce159a764fbc8b4c26d57
SHA18102d29bd37a78a6022726a7346b58354a651b60
SHA2561384fcfb04491c6afea435eb2d8fab6a3fd4361e449beb0891b56f25f28e237b
SHA5127353283cfee25d3911e2ea1f24b51e39f7c3c2fdbb95133c300b1693bb16840b2ef3d0f71999bef63e8ab7e61f1ed2a6243c48806c52a37bf1dd2aa46e5d349f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c1a86344a8296b431030add3b694240
SHA1672c59fa4800ace7fa01169c6b3019622f4bdb7e
SHA2564f7c6555f0ec90b918219bafc0a89b068d9ab34e5935d04520835bda6851cd5f
SHA512a077cc9915cb72fc29b204140ed9b5fa094d7573fc80904f810d79e060acc92b22a0b77de8742fbf5e80943cedfc446d3a5669d10eeba1240b16a59a0fa40f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4a8b964ed83131a625c3a9446256367
SHA1418fab429db335625950cfcfe92f38f80c38a496
SHA256c20619341c4a0f929a643967c59508894c7dd3ef4be8695175e69d15152164f3
SHA51283db6c13df10edb73ebe20d838da6987336db3df189f1499899f57ba3fc075fdf5879271f920709ae3db51819859a584af5184b4d7ebf33b54e5a6484add586e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fa085ca20e2578f66ae83af090e610f
SHA1fedcb4add53d0440f2d514a6774e937477575015
SHA2565786e02032c94e46efbf6eaaf1f338e1977d2eea45cd933cc53dddda7eac9f19
SHA5129373c652ff1a9b179528918d7f460a520992c8c1ab09794caaf22db1023fba5dc314ca71153ccc2a7ce3295d93be86df0f93daa53292c305acebe8ceebffeb39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a8a70bd13ecff0a3d88200d5c2a315b
SHA15b90a74cb048f164d0045f5dab9077f922721a64
SHA256d79d72a65413279c5dee61c5738ba1961c3f4a0d7851b408b9cc6018fd7509f1
SHA51260efdb8efd1f90d76e55534b27d314f16c49c69b287d059069314232d68c9ebb1bb8cf874860b4702f79e0f518e4d06da11dc0cf43186a222a5f4010f08302b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5d228968135d5eb87e07e0fb4da56ae
SHA12b6c2ec78029053eac8760617b8a974a4aa45eb0
SHA256e04b11f0a01408f3261c2e716a19aba293cf055a9f5616fd5de4dca45f52bceb
SHA512e28e1fcbabe819598c89e07c25e56a43329428dd67fa628f49623ee295427be70d9a20e2aaf80899b904166b5b35c6565e9ba9007aacd790bb1bf24d95265a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf6ef39a7e5efbc37d894e22b937a2c8
SHA15dc5f3eb16c0b8ff5edc53c8b6415b2d57352d8c
SHA2569e7858df789f7b2f6fa3fc535d13cff94c6bd886d46fc7348bdad1a06290d2ad
SHA5124c0d2616eb8e120a5ff7075d91ee804e661bd9403dba85d5f64c135d36ead12736be5a358f2177919ca66d11e79fab4ed43cde909c1d30050334392fe3887e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596552cd7936852e3a53acd68aa0a1ad0
SHA143367b45ad9783cde58da000958a5dd2dc6ddc4b
SHA256bdea603947c48c1abb1506d39d3c1436081ab4a1c54e103e2b4e252c0c9efc89
SHA512f5ad4a84611b2bcba628390e8babe58be9f7c8cbf733cf627ea0cac2550c7b542fc1340f21e6d6c61893af7163749ca0ae7153a35d9db26eacbd0214ee91fb79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5cc7bc69d061c609fa57457d7e94403
SHA10b4ecd53b80f94c73f2cc1e695674cbbfa1cff91
SHA2566f5ece78e9ef2cc18bbc5f44fe9ccf3bf6a39f20b14dd536401f118c8092e4ad
SHA5126e9da8d83be69c01e3a93fdcc068394c1f7dcf318e4d71cafb90bfd9a100eae6fe25cf4d1aef4fe1d5b7d866eab7f7c0a16dd847e54634fcbde5b06a57929969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe85c554176602d7d306e0fd37d608c0
SHA18663539427f2ebcb216234b99802aea1bdd9f9e5
SHA256d58543806c0e7f89c24e2e88ca02e78c68e8503a9a48d11c4e582edce6ffbce0
SHA5124df7155e09f2112ad983bf17e762c80318f1eea294affca3768ffe2a1f3112245984b137cee75cce8130a24584318c12913e720efa215756da1f0c3e9e54ec0d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b