Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 11:41
Behavioral task
behavioral1
Sample
958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe
Resource
win10v2004-20240508-en
General
-
Target
958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe
-
Size
2.7MB
-
MD5
69cc2e20ea7a51666b8c14be90441073
-
SHA1
6a3c7d3267c5c2a679f5f41dff36c091dccfb337
-
SHA256
958ccd8e8dcce5e7bac5f891e8edc42ad6c5497d9385c8ae26c328c5f7beda24
-
SHA512
de565813d0ddfe491c367e78b2a11891a73859a04efd83d8f35a4a6f6a028a29c873750dc863d1dfca9c40f9b4778cb1882bf8c07b9609f8463db22ac912922a
-
SSDEEP
49152:nsul/s9YiZYGuT/s9YEQtQRTMYIMi7ztf33cSywWyFoEgn9uw:nJVsG+YRzsG1tQRjdih8rwcr
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/1728-1-0x0000000000980000-0x0000000000C2E000-memory.dmp family_zgrat_v1 -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/1728-1-0x0000000000980000-0x0000000000C2E000-memory.dmp net_reactor -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MVI6MT0qPLmQhQ6j.exe 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MVI6MT0qPLmQhQ6j.exe 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com 7 api.ipify.org 8 api.ipify.org 9 icanhazip.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Cash.img" 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main.xml.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrdeulm.dat.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsptb.xml.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_heb.xml.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\msadcor.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\System\msadc\ja-JP\msadcfr.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrdeush.dat.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\TipTsf.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\IpsMigrationPlugin.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\sqlxmlx.rll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsdan.xml.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\rtscom.dll.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base.xml.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\tipresx.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\tipresx.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\IpsPlugin.dll.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\tipresx.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Tanspecks.jpg.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\To_Do_List.emf.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\System\ado\msado15.dll.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\msadcer.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\msdasqlr.dll.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-delete.avi.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu.xml.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppobjs-spp-plugin-manifest-signed.xrm-ms.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\sqlxmlx.rll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsen.xml.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\tipresx.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\delete.avi.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\oskmenubase.xml.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPC.DLL.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\MSTTSLoc.dll.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\msdaprsr.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mraut.dll.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsjpn.xml.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsnor.xml.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Blue_Gradient.jpg.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Tiki.gif.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOMessageProvider.dll.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\msadcor.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwruklm.dat.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\ja-jp-sym.xml.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\mshwLatin.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\mip.exe.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\tipresx.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\msinfo32.exe.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\msaddsr.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\IpsMigrationPlugin.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\System\ado\msado26.tlb.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\msdaprsr.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\InputPersonalization.exe.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\msoshext.dll.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\tipresx.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\System\en-US\wab32res.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msadcer.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\sqloledb.rll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\oledb32r.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\tipresx.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\VGX.dll.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.config.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\TipBand.dll.mui.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tabskb.dll.CashRansomware 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1728 958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe Token: SeBackupPrivilege 2924 vssvc.exe Token: SeRestorePrivilege 2924 vssvc.exe Token: SeAuditPrivilege 2924 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe"C:\Users\Admin\AppData\Local\Temp\958CCD8E8DCCE5E7BAC5F891E8EDC42AD6C5497D9385C8AE26C328C5F7BEDA24.exe"1⤵
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\CURRENT.CashRansomware
Filesize32B
MD5157bbb6155b63871103e6b0fd6e4c3b4
SHA1f082e794b70121d2588d2e4407da2c965f0bff4c
SHA256a85c123d0f066ec0a7ce1fada36931854f8a0b973e0f84789be5f1d5e7001c03
SHA512b148a00b71058bc739f38cd798f611bc7847d8aad4e142d0d1b0f124d88abc0d9334d5514c445729079d4188ba02309a6eccd6294ef4f373af8cf25b96ce76eb
-
Filesize
8KB
MD5379da2a4de0e2e77ad89ad915e117c43
SHA1879e113dbd23c5b1e9cfd536b44be1f3057f5fb5
SHA25602f3c0cc2c988ec9a82f36cd4979f2b070396ef4dcaa56c979dbf109a18764c2
SHA5125c40bfc1dd4277c7de92dd5fef61195c56f24bace758a422afcc7483ce92e7f8ecde389f85e72fb09b001b4171a4d013064742160d5556c1390a43d90ee9cca9
-
Filesize
80B
MD58bda30cb7b6b2e934a402a588e0f8b45
SHA1dadd4be2c582eb326de40f0a66a9925e5361d82a
SHA256f08b8b75decb1c724946f9b26f339b7e728f031c5c9b760388d3beb04d6e9e8b
SHA51275174fb024ac5a6c2c575a2b6e9723a17db409a24bdd9cfdaaead165d0b65f24d2c4dfdd1f59817655e2b6114a8b5dd3ef716233737fa7d0bec2e44d3d1df7a4
-
Filesize
28KB
MD544ac5145ee73cdde9c0fab00ecc79b6f
SHA1a2857ef5aab4447e834b4fc65e52da86ed66849a
SHA2567645d9d56bba0f59ce135be7ec359493ec5a05b2b414ad83e348eb41c3cba9d7
SHA512ed58ae5980ac582eb7a5129c2960db2935a76550897d4a04b47f49b54d7deaa09abd6d7520c078dabd527b53cfa307cbe213fdf097a9028a083dc8bd3a9a5d68
-
Filesize
16B
MD5d9441266eaefad9edf5566736386a68e
SHA11c9a4bb41035505fec0fe0904f1dd43abf548a8a
SHA25682f4409e2a7771207b31545c26227051df54588049233531564def261dd7a13e
SHA5123559285a538f6357108ace5eadcd4f5877157d1a01613b1052b4ac089c3c94fdad72e2925a399e5474e1497189a61b9e9029ef0a4f07335022126f450769d05a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gdoevwuq.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.CashRansomware
Filesize48KB
MD51aabd523b87fd31e5ccd45b7e54521b0
SHA14f60bf13ebb3619b4e02c08d62127685d9a42688
SHA2567774c48a4da251e90c71354c34521efb165491f0f7ea15711629f7279844cdbb
SHA5121996440ef7a2b893bb2d142bd23b894972a32dec7b274e6f86aa3a63b9e17195d68606b032d4cae25a727d520e8d22874588f71f8736a4aadeb4764e303207d2