Analysis
-
max time kernel
129s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
14615b5e2d75fec1a90a1be90c599961_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14615b5e2d75fec1a90a1be90c599961_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
14615b5e2d75fec1a90a1be90c599961_JaffaCakes118.html
-
Size
155KB
-
MD5
14615b5e2d75fec1a90a1be90c599961
-
SHA1
fec8cf1223e88a28a1b3af50d33a25cda3e2ee3f
-
SHA256
a33724a91432ab19c35dbad35ac0bdac2382626bd039938c86d337544ee415bb
-
SHA512
22f15321682d86e51d1839b4957f8a587621748f8f2834e5a56d8499c0892e99a0a9c4a1da4525f954f9005aeefa3d8cfa5ed8fd81f05dbc2692808230266f20
-
SSDEEP
1536:ieRT/GZN+RagJP7CXb6+yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:iUSbghB+yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2192 svchost.exe 1792 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2944 IEXPLORE.EXE 2192 svchost.exe -
resource yara_rule behavioral1/files/0x002b000000004ed7-476.dat upx behavioral1/memory/2192-480-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2192-484-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1792-494-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1792-490-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxFA18.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421016793" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6214811-0A55-11EF-9969-66DD11CD6629} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1792 DesktopLayer.exe 1792 DesktopLayer.exe 1792 DesktopLayer.exe 1792 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2964 iexplore.exe 2964 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2964 iexplore.exe 2964 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2964 iexplore.exe 2964 iexplore.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2944 2964 iexplore.exe 28 PID 2964 wrote to memory of 2944 2964 iexplore.exe 28 PID 2964 wrote to memory of 2944 2964 iexplore.exe 28 PID 2964 wrote to memory of 2944 2964 iexplore.exe 28 PID 2944 wrote to memory of 2192 2944 IEXPLORE.EXE 34 PID 2944 wrote to memory of 2192 2944 IEXPLORE.EXE 34 PID 2944 wrote to memory of 2192 2944 IEXPLORE.EXE 34 PID 2944 wrote to memory of 2192 2944 IEXPLORE.EXE 34 PID 2192 wrote to memory of 1792 2192 svchost.exe 35 PID 2192 wrote to memory of 1792 2192 svchost.exe 35 PID 2192 wrote to memory of 1792 2192 svchost.exe 35 PID 2192 wrote to memory of 1792 2192 svchost.exe 35 PID 1792 wrote to memory of 2824 1792 DesktopLayer.exe 36 PID 1792 wrote to memory of 2824 1792 DesktopLayer.exe 36 PID 1792 wrote to memory of 2824 1792 DesktopLayer.exe 36 PID 1792 wrote to memory of 2824 1792 DesktopLayer.exe 36 PID 2964 wrote to memory of 2096 2964 iexplore.exe 37 PID 2964 wrote to memory of 2096 2964 iexplore.exe 37 PID 2964 wrote to memory of 2096 2964 iexplore.exe 37 PID 2964 wrote to memory of 2096 2964 iexplore.exe 37
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14615b5e2d75fec1a90a1be90c599961_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2824
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275477 /prefetch:22⤵
- Modifies Internet Explorer settings
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ac6f7f0505dc4d6f084385319f6e6a0
SHA132b1e59c19b1c6fbb4886ee241bff0501010556a
SHA256619760e88db5606a6d14cc8b8926495d3482396caac9897135e283f9a8d733fe
SHA512d9458aa04d5817502858f73e8cd83df8fe47f81a6d86419b930614abf02e892be344c42dbc24e9042066c791253d6759b83fec40dea1d9494ed2cc189c940f4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548265e4cf3bf8384d3370aa263f6e5b9
SHA1e470687b03f0283831cd2d264bbb3ee300413cd7
SHA256babf3f7cf4a9d1dbd9750db80c8719cf7975db16f8d2067c2d580886e144fac9
SHA512e4792ed17c0a431abd2e6e0eaba4340b1f0102bc3293facac6b7e1c55e128361738268a87ea3e2e0075ab9957b081d5a57d5cbe724949248f2028bd91eba1266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5ab21bc08f55c5631fa138125df2869
SHA1d61decfa05a56501a25b44b516106220f50dc397
SHA2567b1c139a051bcde6143822810fc4c682f7326e5fb8409c444a70a0c1c1698741
SHA51254a6a2e92dc0f1124187c0ae4ee0f21ca1775eba1e9c102120e00d9642fc4f7f79e2e19b5d40493ebd636df44b9f2f71c62b66102bb9b256de84a49e1282bb69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549a8cfe20112c42ca8dd04e9eb92cee2
SHA13cacbcc96e8ceb14358b591bb2f2b945d7b466fe
SHA256870a921405e18d286490e5a4bd97dd10707bc7a1a66447e7b99eed02a56fa0a9
SHA5125848a79dc04345d7027508d84548cd23408956eb564c0ad99eb2599055a64a0b0b792df08e359af5ab5789e400c816b3763b595c238d826a242b7e507dcf84e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58976adc171279962f35218aeb01335d9
SHA1d5a6d68a7c96c0cd127d95b282d5749c764fd63d
SHA25655e66ef83a55f0a869f8792954ea464d787bb20f94ba1cf38500ee425383d403
SHA512ac838e30f066bfb1bb4f561c5bafbe9bf1f1da73b9cfb34bd412529a5733a296ea2b1fb4f6ca19ddb9fcf6534548dd2ea3909c37969c9846a1c61efa9e138578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bb2e34bd0ffa59991ad2c0c741a2f8f
SHA1932255fae13eebd4e57384a848092e55bffeae5a
SHA256f93f4f51723cfb88e0286c55ed410732d61c076c2bedc11f34ecf29884e261d2
SHA5120d11407ef45dee0ec0f856035268ea892bf381ead07c8071d7e04a75cd534bd375bc2341616f36e0887da7d6446a55d13864996cbbe4e60aafcc127a45ad9c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588ca7d5b18cc613089ebe691c4446ead
SHA1cbdaf34f481df4f8f3a5855bff06ae96e2cb0994
SHA2564d61a0071196d2498c944b7cf0a733d460d5aa7519858109305e995ea21282e1
SHA5125dfbfef39c18e6b27a7c808769eb46dcd2febf27e1e1139c882070afe8fad7f09b9debb6a0ac94d5143e001359f5527aabc5ee7f17b31a506c544c944f246c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de4475a6818e30e977439e0926d6a84c
SHA1ad42147c96710c1c61ef39984d724387a33d9f02
SHA2567a3757de15b554103efd14d681ec7a6582aab815475e7e83aedfce497b7868ca
SHA5122e795a9461f4cc317014cd7ead2f581ab7ec4503759e4fdbea973afbef6e7aa30acadccf9ac4b1d908b3945e536ae9b657d545f7cd4d23175f678cdbc250efa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f79907c518b081bdc99c6b6c6024865c
SHA16501f7422ce4707a53a514f33b1dfbc022cbf61c
SHA256cd9cbc71a53e42e20622bf4ad46f5a9b43525069973186f49c046db3d9345369
SHA512a8a5933e4cbee6b2bc71ba3040dbb69c806d677674bc14b0f807549fe6f5325a224254ee97f5856d025fcec5b336d53014bbf6d0607bb85cd1a1c56147debe0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2e6ae32efece16180c760be64d8e86b
SHA18c93724cdc47ea676616ff4ca63dc9e6c8d5ecbb
SHA256f798c918c5f3368d9ec4caf756c0c3f63dcdb5d9778e0787b2b2453a27ce8cd8
SHA51259014108586ace364e8cf0cc087425bf2b1df398d92a2765005e97129893f63fb91523682502240a8e5682e728b01d907bba1d58ab5c2c13c4924557a6bedfe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7fdde883e2bf94ebbee120de3708e41
SHA15c83a1febcc02972cd6bf6348bb8c777977f95e1
SHA256a9798aa14dd02d66d6655f619491404c4a1a7d8f6929681605804e9651070b64
SHA512fcef607c1cee6895fddf59de0a503918557bfbea77da080086fd6d732691c36f884f9c1e49add8c7c60fac05d995f94492c08bc1f5c3c218625abb6a8040e173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5664cef5916e6e31dd0b0fd4669c0c505
SHA17a4ea954c34b10e03f23699799faa92096d61aca
SHA256cb67530472a64155be72854ef79d466e50eb5e2628283079b70bb130ea422174
SHA51215b6bc509145a60408f17ffd0c1cb09310d941748f7ec2e5a8e432f92817d3814fcad97184fcd270084eab43d696cd7a75f299b9ed68a1d4504b8945f20d87d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec788ab0d47b62dc0d703691bc03ab58
SHA194287d6b4c3feeb7cccf5866848e573731626f98
SHA256b39bb66a8e1eb2939858ce58fd860b7c2db9dddce04d974b477cfb332d2cfeb2
SHA512879aaa9e4693e0027ca104c6a392aca7acf9281f51c74f519e44e310113492e0fd85a337e6ac9d069ef3e086bf4c4b2bf21cca471d19556cd000dbb1578a551b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b051db78b83f21de5e95110c83908c4
SHA1519e59eca1aeab1bb7347ec17cc6f306b74c70c0
SHA256140a920e052b0142a4d85b233a53aba4ceff9167c2e39e7509eb26f0f1971bdf
SHA51251c039aac4199caa7c071dbbb2f175aa454f0db8a8f8c64e856bd78f6c5735c00dd8cc4e3cb36fbdc4a7f26ba458034fc91f4ecf4ab5911a42bf9603addcf90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5467546fb7bdec7481d9f6ec4e44a2140
SHA1425a5ea9c7bc696faccd78bab7f147f4faf329e2
SHA2562b64934b5f230d31bbec6dd14289a1ca99622eef2c51bd6a6169efc751d43fb0
SHA51233b4b8ef598c811248e192e23a810d4910f8f2ebfd239a787a1a43b1341abb9e364a132aea858face7bbf381e202cf56a9a19b47b67b58a93bf4db5516e88043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff748717a094423a8a58cedf7cacaba3
SHA11fe4d0c847b24012c0a60cde17638a257bf4960b
SHA256cb4944ea21b2dc3d8f35131d5352fabc4136d736e2ff6f15deea57b0478bf584
SHA512bad3cf06c17109d4dc583295eb665a06c24ccb89246d342631ce7d083149bc0799413bdfbd746ba5a668ee2a6080f94cd2c7703c6e2c811743ece4e761669a15
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a