Analysis
-
max time kernel
135s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
wda-py.js
Resource
win10v2004-20240426-en
General
-
Target
wda-py.js
-
Size
9KB
-
MD5
8e8d2c69942bfca618e4ab5f96f3165c
-
SHA1
764c3bde6c021af7a7fd2bf85e3cbc0d942997ee
-
SHA256
9fac136e14c41cb7d921001bdccfa54c2e3258436417383e495c5e9c9bc1b7e6
-
SHA512
8103e5e8b45e5c41d948fc3369f160bd604f65b27568db5afe4d2a2b4ffa7ab902fb7ff0516b3d875ee03b17384022c07fc940c04f2cac5b9f98ead1ba87391d
-
SSDEEP
192:Pz6nlgOO01ZRqU4Q8mN6vermFZb+u9JaXw/EwMettECxLozGCK:mm+rYvbQa2itECxL2o
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 4 1704 wscript.exe 14 1704 wscript.exe 18 1704 wscript.exe 30 1704 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation wscript.exe -
Deletes itself 1 IoCs
pid Process 1704 wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 19 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\.tmp OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\tmp_auto_file OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\ OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\tmp_auto_file\shell\Read OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\.tmp\ = "tmp_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\삗ȕ OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\ OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\\ = "tmp_auto_file" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\\ = "tmp_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\tmp_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\삗ȕ\ = "tmp_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\㧩凋ሀ耀 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\㧩凋ሀ耀\ = "tmp_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\tmp_auto_file\shell\Read\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\tmp_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe\" \"%1\"" OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 640 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4088 OpenWith.exe 4808 OpenWith.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4088 OpenWith.exe 4368 AcroRd32.exe 4368 AcroRd32.exe 4368 AcroRd32.exe 4368 AcroRd32.exe 3172 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe 4808 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1704 wrote to memory of 4824 1704 wscript.exe 87 PID 1704 wrote to memory of 4824 1704 wscript.exe 87 PID 4088 wrote to memory of 4368 4088 OpenWith.exe 99 PID 4088 wrote to memory of 4368 4088 OpenWith.exe 99 PID 4088 wrote to memory of 4368 4088 OpenWith.exe 99 PID 4368 wrote to memory of 1552 4368 AcroRd32.exe 103 PID 4368 wrote to memory of 1552 4368 AcroRd32.exe 103 PID 4368 wrote to memory of 1552 4368 AcroRd32.exe 103 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4420 1552 RdrCEF.exe 104 PID 1552 wrote to memory of 4028 1552 RdrCEF.exe 105 PID 1552 wrote to memory of 4028 1552 RdrCEF.exe 105 PID 1552 wrote to memory of 4028 1552 RdrCEF.exe 105 PID 1552 wrote to memory of 4028 1552 RdrCEF.exe 105 PID 1552 wrote to memory of 4028 1552 RdrCEF.exe 105 PID 1552 wrote to memory of 4028 1552 RdrCEF.exe 105 PID 1552 wrote to memory of 4028 1552 RdrCEF.exe 105 PID 1552 wrote to memory of 4028 1552 RdrCEF.exe 105 PID 1552 wrote to memory of 4028 1552 RdrCEF.exe 105 PID 1552 wrote to memory of 4028 1552 RdrCEF.exe 105 PID 1552 wrote to memory of 4028 1552 RdrCEF.exe 105 PID 1552 wrote to memory of 4028 1552 RdrCEF.exe 105 PID 1552 wrote to memory of 4028 1552 RdrCEF.exe 105 PID 1552 wrote to memory of 4028 1552 RdrCEF.exe 105 PID 1552 wrote to memory of 4028 1552 RdrCEF.exe 105
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\wda-py.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\rad7B192.tmp2⤵
- Modifies registry class
PID:4824
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\rad7B192.tmp"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3466749B02A9E9F4E9B2FA9AFD1D5A84 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4420
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=AD829F5A58685FAFEE86EC23C7C2A559 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=AD829F5A58685FAFEE86EC23C7C2A559 --renderer-client-id=2 --mojo-platform-channel-handle=1700 --allow-no-sandbox-job /prefetch:14⤵PID:4028
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=439A81AC9EE17E7D9501D351407AC3B7 --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:960
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=378792A5FA53594B26CD63A0D5177D65 --mojo-platform-channel-handle=1800 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1944
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A7A14800627D724CA3F54916201956A4 --mojo-platform-channel-handle=1948 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3140
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1052
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\ResumeConvert.js"1⤵PID:1768
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3172 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\ResumeConvert.js"2⤵PID:392
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4808 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ResumeConvert.js2⤵
- Opens file in notepad (likely ransom note)
PID:640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD5f6d7043cd30a21671d366072ba536015
SHA1cc4a6c5fe917b9fb5bd1cf164c7f799f21c263f1
SHA2560d19060fc4baec29724f9a4f88bc44d0df4e3efa23e031744a8cdc0b7922febb
SHA512964f70f7ee35c88d7f4616686d1a65c48204a6a7fa968e062c548d2911c5477e374f57b7173bc24733d72de0f7fe4c075e05c92a6befbc476b68e4426a49a6b3