Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 07:53
Static task
static1
Behavioral task
behavioral1
Sample
2d8f724cd2121797b8d946d777c45cdd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d8f724cd2121797b8d946d777c45cdd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2d8f724cd2121797b8d946d777c45cdd_JaffaCakes118.exe
-
Size
60KB
-
MD5
2d8f724cd2121797b8d946d777c45cdd
-
SHA1
13980133389661a7406516b9b21a9f9bd3a4e14f
-
SHA256
c9da30fe56fbd1179f4d1139830fa9a1fdf046b9a176964253d26f7abbb06169
-
SHA512
fcd74aeba82902647c662cefaa3ae9a62f245fde9726be9ad16f8bfafae0b3d5b735a378642c6d315905b325496faaa11aaf564a34640fa62bb7ac8a54e02441
-
SSDEEP
768:xj9QSoeh5LU0dcxmJUMncu/VLHpFIkid+JFIkNcr9fLkWEUYn6sNpcspj6W8Lx4b:xj9QRe/vgM/AQmSNFONMlszAjUkx1D
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lvpoy.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2d8f724cd2121797b8d946d777c45cdd_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 980 lvpoy.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /F" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /C" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /J" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /m" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /v" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /L" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /e" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /W" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /Q" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /a" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /x" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /g" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /z" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /d" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /f" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /P" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /H" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /V" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /o" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /s" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /r" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /A" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /T" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /K" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /u" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /i" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /q" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /k" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /c" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /U" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /Y" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /t" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /M" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /B" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /R" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /w" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /O" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /Z" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /n" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /E" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /j" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /y" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /X" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /I" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /S" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /N" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /D" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /l" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /h" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /b" lvpoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lvpoy = "C:\\Users\\Admin\\lvpoy.exe /p" lvpoy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d8f724cd2121797b8d946d777c45cdd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvpoy.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe 980 lvpoy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 728 2d8f724cd2121797b8d946d777c45cdd_JaffaCakes118.exe 980 lvpoy.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 728 wrote to memory of 980 728 2d8f724cd2121797b8d946d777c45cdd_JaffaCakes118.exe 86 PID 728 wrote to memory of 980 728 2d8f724cd2121797b8d946d777c45cdd_JaffaCakes118.exe 86 PID 728 wrote to memory of 980 728 2d8f724cd2121797b8d946d777c45cdd_JaffaCakes118.exe 86 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82 PID 980 wrote to memory of 728 980 lvpoy.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d8f724cd2121797b8d946d777c45cdd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d8f724cd2121797b8d946d777c45cdd_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Users\Admin\lvpoy.exe"C:\Users\Admin\lvpoy.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:980
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD57b6b582524b2db105c45d2320d056c85
SHA1389e96a6b216598b7143ecefd2cfeb027ec3ee66
SHA256da7c187a1d8c3100ee41419db0d430b4d6712f13b40e11cad20e92a7234aee9a
SHA5125c702dcd1fa3c6d67b41ea2e9805d859746cbaa62f4d03a0e1cc3f8eb5987e89ecb30e7c534b75cfaa7ac5457c4bd99c13cbecaf2657b6515df687a268b36724