Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 00:46
Static task
static1
Behavioral task
behavioral1
Sample
3ce3aafc58ea4300eabbada6613964d6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ce3aafc58ea4300eabbada6613964d6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3ce3aafc58ea4300eabbada6613964d6_JaffaCakes118.html
-
Size
7KB
-
MD5
3ce3aafc58ea4300eabbada6613964d6
-
SHA1
233155b6692671ca6b29cc866b5de8264387e5f4
-
SHA256
c869e1d006844a27ff26c0200c96cf9af9fd33b317605bfb0745339a33100b34
-
SHA512
9ad11c5256e2f2ef22daf511ee5809d79607ad62578d901537ab41bd1efa186b6b4fbd3874c9eb6de56bbdd339de180acb3f2e1cc73df507d750b09332839fc1
-
SSDEEP
192:ioxHN2Nrx1+9sZ6yF7oLNiq+DzNvUcGp4jm6BDoPlpMUkTL2:Y1UssATq+DpUz4jm66Pj6Tq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0dd1779091ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434942275" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000cde646f1d6cc3ee357e5087b5d504f54defc03d4b0c94c91456b57e044c3929b000000000e80000000020000200000004afdd27097e5a7d934846e7bb1a27b4e6854602157f26e34957661cfa37412db900000003bc0be41edaa541655a3c4ed4100eb175149bcbe3a2e5318f01c502ba2ddd4cd467be4da130bb963168527f6dec5d2046f1429132e43a3f57dd2e2849ad8c2244b1ae4f16c2c503657d3f3a9cb2265efb12b124d80c0cbc5496170a841a64762018ffd905ab6713810cc6d8715366181fb4c4f439ecf185fcfb4f70d822f014acf250900a6d4f6028369846cb1c11ded4000000093ba304ac45f23a78af5d13fbca7bf298af69427191265191fa7332734a7df82cd566a3b7c0edfac32ee5b9fc47dd3378310eb05461a8e7dfd23dbf2ce0a3248 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000008608359fa9681da5ee0847962a3c3280121b91fd4c568a31fb24b46b5fdb937b000000000e8000000002000020000000b373cdc9c1ca9d65019afa5d8f4212c8b4e6eb331809b4feef15277277c905be20000000523510e4785a780faa8b4d45225fe73885cfc44aee43066dfb912a990f69b48a40000000f12026d42557409b8211e411573fe78be764734975c3376c7be2e8cbcc40d8e8f349dc05e70a7180f10391f99309d16e724f6928a6dc4f1982935f595fce9b1f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0385831-88FC-11EF-AA6E-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 iexplore.exe 2164 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2412 2164 iexplore.exe 31 PID 2164 wrote to memory of 2412 2164 iexplore.exe 31 PID 2164 wrote to memory of 2412 2164 iexplore.exe 31 PID 2164 wrote to memory of 2412 2164 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ce3aafc58ea4300eabbada6613964d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c07ccc72791b6fe553ab3e1560537e6
SHA187a5fae6a519789372ed23561d62de9a006b43fb
SHA256b01a7237d22fc16792735df42467e55d0c2fbe42a338b908dfca9bd15822bce2
SHA512f7e51ea84420afc1808a58497432075d6b7ac3a2f7381e4ee30125daa6b1a676cbb42fe5d8f8f279bd51bd9e8cb0acb8acd6be500dce4f037aa475de9409acca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509bb747c40bca81e975d24ed41fb898f
SHA16bc220054b6a1f571d19c6131d76a762b8ecf18f
SHA256ca8ca754cd40165b22295ffd632b7e24635f51c87262f9743f3bdf119340e98f
SHA512ef26e86c5803299f209c516eb10783a02d15db0e8e1e30bb06b231fafdc570f0d38a6bfc0270ecdb5cccefd8515b590e52686adbb1fc38de8131a4079ebe1de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e11468c39d3164c9aad79330761f592
SHA111804a07598bc8f90eca2b9c017a822dd465fae9
SHA25694de851eacee858b8e1e852db431499fdf2922cdcee63d9ca2e45cc25856a4b4
SHA5125e964875719a594aea2fa7ab7460580b6da32ff68fa78a4105de5be0791444aad80bcd1a1957a75383ecee5ac9c27a7d80c882ec50d13d8959374e36d326a7b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de73d5141f96c51088066ace576f955b
SHA1933e71a13fe880adc4290b87cbe6bba0fab110ba
SHA256174228a7d2c64a4fca26628ffe2c0338b921ea48a2f714ff875e35a7d87bad24
SHA512278ce8ecda423cdf3fbf3a10e73220ec9a25e70c89ba43df402dde722b358664fbba27344d56dae3553a893ff8e32f2a8e4d5b59441f3fc096dc67ddd7422569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba127660d686f3b21f27e5447eded0e8
SHA123578f11e7dec9916898a7b4d869b25c6a3a3091
SHA25603bf7d2628ed9aadf2c0fa02bd73069997b5244555af011c334f435b3b5c3c26
SHA5129c6279939b128b722f0a2ac1399ed8cf571dec3fb01bd84c1428b228759b5536cea70a8f07bf7c54adb77f8d5432a7125f8d4b9e72445dc9028085c7aebae39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7d813a9642cf1b728662218d98223d4
SHA17e6e9281f42d553ce9872fc49f14ebfd08594ef5
SHA256221440a62a71dc8267e653cf2a8edefa8fc62e35eb217d58b6f9a770ff8b0ffc
SHA5129dcce179ac91e0d289de371512da5b7c40bba60092b45037d398d38daed901b56bcc914a9caa86d233a04c03b023534f79aa1edc69623fae1e1d43a89b089b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503d2e533673b6fec05378148a36ba5cc
SHA1fafc4973b98918ce3f04a4021009eac2ddc69ff1
SHA256312e99ca879034364a7615fc48ccdd95b30dab962b4db1a12cc6e5d3bb1b1748
SHA512b4b2297e9836eceefad8fdb430bcda7bb29b09814256854c879f69fb0d4e6e2017ddfd3596ca07e6d440d858942d8d0b0b65ce53ea8f0261c5d0058a97cdc49f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad2ae3b71f32b6bec5af342d7057e757
SHA1e5d6e083fcea337ff1990b91d329eab03cdce1b2
SHA2563baaadc3081338e1d8639e1932e71948ca54757d07340f358c821d2b3aa0bd99
SHA5126af93e23bbe231e6edda1b0e9a6b0c77fac0f651beae87caf25ef8ba8fbc6c3cf92dee2e04bf5b94ead79a73eb8b58e74ba57b821132217c6c1712f8b1aeabe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571ac320b72afbe5da6b81f79ec0a1e04
SHA1e8988e8e77348e5d73b68f30bf7a02a89ec11d1c
SHA25641ae2d00b0a07cc75f933dc6c1ff5fafc7f18577e302e6ada720f62faaabefbb
SHA512564d46e45124bd9c50943641749ddc0ed82b4d88e4e7bb19f0c329f67abc4398917fa018e6ef96a2627eeac470a145dda4ff4fc39b556a6ac608e3ab121ea68f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d8ba7dc13fbc1a1baad59ff6fc3707a
SHA1daf5f10ccca6e9dc4d315faacdc013f1c728e119
SHA256f837c52f35d7fa0440b2c630a28609b59253385415a58c4290bee50d2103b223
SHA5121f796290d0a3877637aef5ec627040fff3b2efde20c2d937cf170a2eeafc07871ee07fdbb94498b299b33f8cb3acb823bf1ce657f5cc44f2ff1e3e07697ab561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff5ae2aa8a1fe6966390ad0cba2aa233
SHA1bf937e5b3f58969017c2e0e6d93f9f750b6a6dda
SHA2568fafead1c788c445feb3a1301c73aaf00cc35dfdd085360c7894eae945d675b9
SHA512c0d5c8f03b4fd5115ed576e3e3378423e5192a6a4434df2fd043d02fe02b0b5c3f4421298284a0404b28e91be1cadcb87c596f4fddcb7f8b295937cda694a67e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f588dd703fc4acf6a1e0e2bae6e6f20
SHA1a0c0f943dacad0f77c2a377e74a66a822cc47275
SHA2562828f857bc4242354400c03a8b2c47f1661ac2df0cea932fe17b58ee31433559
SHA5120165f2e9c6623b262057e3c75267a4efa675abb2e0333614eb6a9da391ece2843a5d53e261e11db49fc4c982f060b775b84097abb30090be357c1646391714c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de3396a7f911e30719715304b77274ea
SHA1162b117074f78f1bc18f8c0123bbf7c7d83b2ed0
SHA2566f833c7945887d06f3bd571a95576e9f8bca8e6eae17c5e346d14a0e6fddf7cc
SHA5122d9f2d8c7cd56f7b0ca8089dd25499970af7f52b72f634be6236086a1d278972ecd487654a598f6a4fc46a31630d5a46ce6a4e6bd5b5cd529cfe4990a35aa549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e2b122774806f989c202a5a7a37412c
SHA195f3798a79b18b5427ca5067510633f06f0b1fc6
SHA256f0eeeb4297c5b810eecd904be72af2405d0e4dc6c900cbd820186f2567259d06
SHA512e764c85dffb09ae6eef6885757601f3868aa7b2440ff0fc60b90bcd13c782b23d8167213bfdd4fb945c6d188b1fae0e85078d5469cee6f498ec4b1125fc528f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5318fb14f60ad707d02b785aba1fa8f6b
SHA11c15581630cfcccdf95f4bed8055f19649958521
SHA25629500ada2a73a0758cc3cd9c87f2e07019d195833fe05e753640a55e11ee53fe
SHA512a9c1925cf84a601e6af507ccde7a156fe44afeb2debd41177940f6977826b6363bad213830bed6d26e6cc1c313f4fd608856c72bbceb159d2a80656c13f0a4ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7459b2b971d784515da47675a46a680
SHA16f44e1b89d12d74de192c71c472bea5a80f3c3dd
SHA256d5e4b416cb338e11e50dd03938f54b9da91c19342b69ee3bfacbbcddef7dd268
SHA512343f554911aa8691d4831160b926642ec8294068af7ee8fb299880dbed9defe043c44e6d229174dee90c8f8f962de542bab690243912f0b94a0141b2d209eb32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a76ffcf3b3fba1101faef95d3ff22ee
SHA16e5d9ae97addd21798599626bbd600aeb6ffdccd
SHA2569a374be70b1ea5735071f8274ddba45839697c97e92dfcfe37dbb477dc14ec3f
SHA512360c8f71a6f6bba918be11319431b763f07c1e9a4e819146e7501312a63dcc1e2f7465007d9118645b77419091d4b6cd38bbd4289879695f0ec9e7eaddfc90d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4aaa6b081f0df5c3eb01560b587d50d
SHA1a273c51250ca801d39116e51f5ce4c71c74370ab
SHA2564c136666868906fca587240701673f6fcbeaddad711629a3e789f6e4f904b32a
SHA512300db7561295ca8f6b1898fcc3ffc8dfedefb6e32f9cbdab10e57220ada1010772a0b5d9c3a8e38a3e32d174f24ed796f64b89e2df40b0bda828175cde395a38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc4699f871802d49d7e6f74a9a0ca37d
SHA1ef78fd23864844677427770cd04ed83de23af251
SHA2564238e722aad262a94dbc15f2af2ed03f3871e749c5670af7c4ebb8c34e3f52d3
SHA512213d871759ef53bc0d57d0f574cb45e6ede283a78dcade75b8a706e28fc103e1e8fabe20fcc524d460d398a81d66025f808735f2243cf4d830fd6c29369ae272
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b