Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
aae503ff45e7353270c4b4f9d8a910d0_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aae503ff45e7353270c4b4f9d8a910d0_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
aae503ff45e7353270c4b4f9d8a910d0_JaffaCakes118.html
-
Size
141KB
-
MD5
aae503ff45e7353270c4b4f9d8a910d0
-
SHA1
e96e258bdb5de16a2dbf06709d53dcedbcc2fbef
-
SHA256
9a1bbafd76f1e561e6dd95f78a81fa084bfcd9e09945df73e29d59e1f59114e2
-
SHA512
08a05acecaad10e900095a468b994c5a407c018c7e0c9db5d5ddb536e513da5ffdba6037d406c73fc71d6fe0d7efca67a80a51c33292a2b7c9b085145f903225
-
SSDEEP
3072:ST11lvRIMyfkMY+BES09JXAnyrZalI+YQ:ST11lvRksMYod+X3oI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1228 svchost.exe 1568 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2908 IEXPLORE.EXE 1228 svchost.exe -
resource yara_rule behavioral1/files/0x0032000000004ed7-434.dat upx behavioral1/memory/1228-436-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1568-443-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1568-446-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1568-448-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxBA98.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40f1b4f97fbeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000b9f2f8bad538dde3c56faaef8034f260cb40f57f0caf4a32145cb16b4b963f52000000000e8000000002000020000000787c5b988064a7b3d620d980367b290642aaeef9f151c170608d5e3a2840cf00200000001df32b3b5c7aeb2e50ab07088216e0982460c11c4a13f731ecee94489d8e30904000000033fd50590389299951b6132c0263b90cf676affb441ff90deadf86ca7cfc531d9cb354c4c875d5e4e6a9f5552a8fa972ccc546c4fac9d6cd1785780c761c5964 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424547712" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E37D9FD1-2A72-11EF-AB3F-D2DB9F9EC2A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1568 DesktopLayer.exe 1568 DesktopLayer.exe 1568 DesktopLayer.exe 1568 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2208 iexplore.exe 2208 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2908 2208 iexplore.exe 28 PID 2208 wrote to memory of 2908 2208 iexplore.exe 28 PID 2208 wrote to memory of 2908 2208 iexplore.exe 28 PID 2208 wrote to memory of 2908 2208 iexplore.exe 28 PID 2908 wrote to memory of 1228 2908 IEXPLORE.EXE 32 PID 2908 wrote to memory of 1228 2908 IEXPLORE.EXE 32 PID 2908 wrote to memory of 1228 2908 IEXPLORE.EXE 32 PID 2908 wrote to memory of 1228 2908 IEXPLORE.EXE 32 PID 1228 wrote to memory of 1568 1228 svchost.exe 33 PID 1228 wrote to memory of 1568 1228 svchost.exe 33 PID 1228 wrote to memory of 1568 1228 svchost.exe 33 PID 1228 wrote to memory of 1568 1228 svchost.exe 33 PID 1568 wrote to memory of 340 1568 DesktopLayer.exe 34 PID 1568 wrote to memory of 340 1568 DesktopLayer.exe 34 PID 1568 wrote to memory of 340 1568 DesktopLayer.exe 34 PID 1568 wrote to memory of 340 1568 DesktopLayer.exe 34 PID 2208 wrote to memory of 2944 2208 iexplore.exe 35 PID 2208 wrote to memory of 2944 2208 iexplore.exe 35 PID 2208 wrote to memory of 2944 2208 iexplore.exe 35 PID 2208 wrote to memory of 2944 2208 iexplore.exe 35
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aae503ff45e7353270c4b4f9d8a910d0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:340
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275465 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5685cea414d918f4e72197eb5e3b14d2e
SHA13a769d8eb7f2320231594497883eefd509c46960
SHA256f58e4926de35320271d2c4f349649ebc067b84f60e98b10b1381016eb5472e80
SHA5129eac6a193b4a8275fba6ced5e8625e5be50379aa3611227510af683d38e51dfa715cbac33747bc86eb511972f8c195eef0627618624830f8d4125e88bd439e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a032a9a6aa954d85ef79a07563239c6a
SHA1550c3a2d2580fe8bc4f5fdcadd80c744f9705d54
SHA256d29ce8d52c039239c27183c6151c86aefff5d428a8af78bb43bc83c6cc85b22b
SHA512950dc2368ff1a18e41f23892eb2650755f3f10f86314f3cd9ec9bc56fc37a164a1b1feb9815cdce5dd31c27882cea00da90d0ddbcccf01e68628275564a02271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d594e6c603530794ac7f161f04d96555
SHA1e3dacd9ea0e7fe0dd8a8e538ba87cdd533a529e7
SHA256c36cd7f5edb5fcef032a2d97a960073dece43cb0729a5d9ddd7b2786a41ae193
SHA5126d67a8ec8a13f30970b29e349127d67cde0b0e0322df329596537bc7984746204a3098afae73681026279741b278f77a905727e25bbe02f48ce0dc18cb1a18d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55948179d49794f2637f88f1961346d74
SHA1398b23a3d70bb84be5bdf7089d3358149ad558ce
SHA256f880c0fa758d7c4d8db56c328ef7d04de3a3e0fe6d77d73baafff695b8505c25
SHA5122d3081e179eaeecae6f2b760bfb51486dd161e2308c69ae7104a7fe7af71f76733a620b7a318beb11a82f3c152d29d10c3fba23e9e3fac19f0a3959a19d2f14d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3c6716a56aec5395eda0cfcfa2d8484
SHA18e29a21f9ac9b69be8dbf1d81f70e74dd25c2428
SHA25620dc4ee7753a1b7cd8e5dc3105658e2bf866b7d5ed86d45cebfd69b6059c05c6
SHA51254bcbf2d94099625bfa72e29825b23eca1e2aa5929d20119cbdde48d410d53b796254eecdb4f89e1f22f92990cc8e9acfdb5778b1b4c14d10d65864f54bedfb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507427fea609b0bf9fe8e7fa7b16a9069
SHA109f21e3105edf3ae15eed27510ff1ddec33fe73d
SHA256e0363580da650a2292a2759e5d7f8753fa9343fdd9100856f1745daf3e27dc27
SHA5124407d3436f3b012587c71049932847f295a8aee9027cca8df5bc2542f277df3b4a627599b302e42a3020563d06a94c6f7dd926de4466d8a5fbfcae9fe9984a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c649620573e1d1281a91e22fc56d1316
SHA14c890063f4cce0f838c0b854cdb109e7dd69e9e9
SHA2561dabcc53cb29cb095ec382677eac5a30e16871ca7b957721ae359150d6b6f43e
SHA5128d3afa14eda54e92e817eeca1dc4f07896859f3952ca50efa6633273b615fc3cebf162e349a45e224a547d35b9e34581555f397ad43cc10ea4ec9a39df61b8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510270b6b79942a2452205878c60a843f
SHA1f264affc31ba248a6e4a80f5b774f7edac1a0ca7
SHA2568cb7dae2628e01727c2ac684c01f1b983939a0ff0715194722c98f230830676c
SHA512d0bbeb2b9cfb99a72eb979e8dbeb48b45ee934ea52caf547f68d40b6c20d93c65b6e32da3ee6aa9409a92421e7213a436961243d813a42a15dc0610098aca23b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65db57950d2d39c186f9a9c3c93038b
SHA12ff1217af696e424f4a8e2ad1d6ce8581a27d3e9
SHA256659bed2fd0fc1ecd8d4ab2d6132eb4e28334e2f940b74941ed8351f50f91c619
SHA5124d1296b13cd36a4e1212e7ab94165259775e8267970d49accaf6496c3ae6c73cb7ce8a5eed9b0c909ea1738d8480169ada8ef566dfe33820457af7601b511cea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5bae5c8add28d25a97c9955b097f9aa
SHA1c2259aa9cca7a2cdbe619b7882f369a72b3dd22c
SHA256dfcf27897552ecc2eaf1baf287791f767e4618fae0a5ccc90335f9608d0b8bc6
SHA5125b0eca2de6a12450409d53fdbbf0fac6b913eb8ffc5eaf41148ca3cebe52202b73ba5f5c445c064dba592e0857fc64ef25b537d5b4f72e8372cc754f9870c8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e6e710b064fbe152ee7f856df1db04d
SHA119651c0259cd34e9e1788226a97c271f687f5afe
SHA256addecc32cd426e96552bc3ef217fd0cb1d3b286ea46a818ba386c3481298507e
SHA51256aa2b510102f601ee131965bc6a68fcb7dbea4449096606d9eb80b10a935dabc1027660cba5a30856c5ecbc20469df12940f8ac9900f6643d6ce1c48f7ff005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56612a4b11eae438205675cebeb9eee57
SHA16045d986328952d203d0864dbdc20610177ffc36
SHA2561aa3ad0c0549a07681eaeabbc9ef8bb63d1e37c41922010cf84d2854ded3d387
SHA51206fb122be3d981112a0c6b0bc1d89a3b929acb59e8847ff9ea313e7a327d6eed73124538fd65572d118160e78fb5b208192385da7216a020df1fa2f2e5d4c356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc15cecc39ba369e0ed67585e7e6c4cd
SHA1ae143180f20debe7462f18e7e3b5319ebceef450
SHA256601d14f61265fdab0d44e377f66ad4718e76f39e0e4c584b7a48924bc3af9f76
SHA5121f4de9a5deb1d0193b453cb5d89e96d08fba978b54c1c7c7e3ecc9ea2ddbbbd9aaa53f00c564dfd51fb34dcfbd5ee62cac027dd5ae5b15dfe5d6a90c41d32a9d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a