Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 02:33
Static task
static1
Behavioral task
behavioral1
Sample
4c71fb33ac694031e4e1c5ef09fa4578_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4c71fb33ac694031e4e1c5ef09fa4578_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4c71fb33ac694031e4e1c5ef09fa4578_JaffaCakes118.exe
-
Size
30KB
-
MD5
4c71fb33ac694031e4e1c5ef09fa4578
-
SHA1
4f5375388479fbf9ba5851bc5b3565e0abc67111
-
SHA256
f2d2aff9b441c6dd54180d1431bd241a56367ac1940ab62ad96047e4625d1a28
-
SHA512
e50916fd9f37f359624dfb96fdf26aea611dc59603b4fd4c946520cf53bd37ac09b7ab933adb24599fbff03612aab54c70fb95649df0b82716709713e7e6a672
-
SSDEEP
768:8mvGIG2gMVRZ58JSGxE+VOWJEDvwjtQGQEX1nyN+gK:M7MoEyOWyD4Oi1yQg
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2736 rundll32.exe 2736 rundll32.exe 2736 rundll32.exe 2736 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\acrobat.dll 4c71fb33ac694031e4e1c5ef09fa4578_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\acrobat.dll 4c71fb33ac694031e4e1c5ef09fa4578_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427259058" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE132B41-431B-11EF-8FC1-C2666C5B6023} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2840 4c71fb33ac694031e4e1c5ef09fa4578_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2736 2840 4c71fb33ac694031e4e1c5ef09fa4578_JaffaCakes118.exe 30 PID 2840 wrote to memory of 2736 2840 4c71fb33ac694031e4e1c5ef09fa4578_JaffaCakes118.exe 30 PID 2840 wrote to memory of 2736 2840 4c71fb33ac694031e4e1c5ef09fa4578_JaffaCakes118.exe 30 PID 2840 wrote to memory of 2736 2840 4c71fb33ac694031e4e1c5ef09fa4578_JaffaCakes118.exe 30 PID 2840 wrote to memory of 2736 2840 4c71fb33ac694031e4e1c5ef09fa4578_JaffaCakes118.exe 30 PID 2840 wrote to memory of 2736 2840 4c71fb33ac694031e4e1c5ef09fa4578_JaffaCakes118.exe 30 PID 2840 wrote to memory of 2736 2840 4c71fb33ac694031e4e1c5ef09fa4578_JaffaCakes118.exe 30 PID 2736 wrote to memory of 2784 2736 rundll32.exe 31 PID 2736 wrote to memory of 2784 2736 rundll32.exe 31 PID 2736 wrote to memory of 2784 2736 rundll32.exe 31 PID 2736 wrote to memory of 2784 2736 rundll32.exe 31 PID 2784 wrote to memory of 2668 2784 iexplore.exe 32 PID 2784 wrote to memory of 2668 2784 iexplore.exe 32 PID 2784 wrote to memory of 2668 2784 iexplore.exe 32 PID 2784 wrote to memory of 2668 2784 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c71fb33ac694031e4e1c5ef09fa4578_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4c71fb33ac694031e4e1c5ef09fa4578_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe acrobat.dll,AInit2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55035247d51d8d4e26772620d9e2cd4a1
SHA177ad209d2e06d99fa0a5be5d69086a4b7441462f
SHA256b1bc37b2a0cb99447a391b69e79ed2f68e3dbaa31e379f5f43dd4f76e1b32ebd
SHA512cda4e0abfdc0b4c9c44b9c558cc97d89f007083cada3a865f121ca0a1b93f494a10d568264d9880b7cd0177db6736b34a1a96e8216e1d0ea9637ce96625d65ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5caf557c0247bee1ec02d5dcb2d06e03f
SHA121f31972ffa9819b284a363e36f1d5900f7b2a4f
SHA25612b7160a73110bcc4b8e943c7e205e13be76636464d37dd5c3fdf7afa3e6da7e
SHA5126ba3ff7b5a78153d148b07581d83ec0306f319b9fade9be7493aff4ca2584f58098056a3e67576660ed794a42219d0020ac127a0bd68e520c1f4a9e8e302e695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bb23c4f96bff8b3087513cc62c257af3
SHA1d9433e5261d22aad4d00d36a0186de3aefcff08a
SHA25661ae79cd605bcba394ea36013245579d03a511d338987e7e7f736283eb007f1d
SHA512caa3d317378ce936c0a094ecfdfe4ca1bf457d743f52e279e02dfa712cfb01dde30079469b528c595fd292ec1291644a254771d5c595616f0b9178b276a783cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5787fcbbc0e2971bbe4b5ddb12ecf625c
SHA151e9d6adfc81e83b45b4b4805536cd874f8cdaa8
SHA256555bcd84358c4a9b4a49aad3939c8356d721719e1eadff475cd50f5bbaa87f57
SHA5122b351024717efb10e4d356353ea4a847b9bccdfb0f31259d4e9af23b9e7b180f6137f103a334ed338b82f2efe44fc04bc971c94d312b1d43e0b8649cdfd34785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55a4c885f496d946cf0ba4467087f62f5
SHA152247d2eaff06a8b83eaf0e4362d2306b91e0e60
SHA2567e81d4220656bdf5efe7fef293a166131ff7b9dbce953d58f63f3b6ebe14bfaa
SHA512a5f6f9f7b22751a28ee864537e19bb7f1f8d26a6a33bb63e070fe183b3813410a4eece98de2fd02cf20f6ca7c53e2c955dbb18edf3078223938711544968ac38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55858e893b5f4c6fb3a5ce88a524cb661
SHA104f4e8429b9a6648c0719c72795959796f765c8a
SHA25615a7761a9db84b00629f5637462e9aa0cc25e6e30b2cb7a01a93f51a3b3cc380
SHA512a75cbaf7114a7dd6415420012c8e9809b94348d75121215f9105900e80c9c3c0a52ae1d43e55e9fb22ab1cdcf109dc613857c0b30b9b8111058e351f6ca09f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d71d03716f59ca982834d71d0a69da75
SHA11374e5d7ae1d6eadc2f4e2d4808b26508becc35e
SHA2564abb1d1698fab2c3713b750d9034d605d48c444ac9595b230275384355537594
SHA5120cda6539a9ed8112c857b4f022cb61ef6ffae83edbb6a4ac6a4bf3e7a7eb025aa006f6ee7794e3a70dda2de462735214547270de92c7af3de231217c0e49643c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a72a936ac2fbc4a26a61becbce76d856
SHA13b968b005441ba45b59fec7784d75f6ad75767d5
SHA256b103fa49368c969dbdf9e3a5bf156db4cea55e0cd8d0cbf6e70e22e9a3a3a8f6
SHA512806fc6f4a49109515336eb6482d4d54bdf41f8844f089c6ff3984f1ee3c8b2b26e4e864ea9b913ffea93f2f5dc4c96f771657ea75702bffe45979e5bc66bdde7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59fd119bef70afc762dc2f8885d5982a4
SHA11778ae0e408c20bc277835949d314aefcb394203
SHA25664fd5b7e2016f62f8ccbdcd62b2db7eb98a453f91d8f4fc82291676758bd86ca
SHA51258821c2a97ea5abc9085ff86aa03f4497ba96ee4bf90e30aad2007f91e921298f9f535da835bd3b5191909f4205b46ae45d8839dfebfd4d3c46564dc41380832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD594274fb508eda649666f288d6ceedcde
SHA1e01ba1728fb1264eacd5c9686621afee5456e5b1
SHA256333e438cd3883aa37c4413d70e2c6d6fc82134ed42616855309ca83119cee74e
SHA512738b6dd66ff8b443054d92e286361f24c4f28f7c11fab3fc84a983414629e024db1ae85bea48017ce17fc98374c8bf5914bb5a6627f478fd525d93d14cbf3b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53ea862ad6d4440b0a3f8d6f4f370d2f4
SHA1ae1ae4116643a024157738789c258eefadd597cd
SHA256fa94adf20f926fac2284674206bc98502b09291ab8bc928d92babf8a28d7e630
SHA512a42884be65b0483d884e5ab1984f179726d72a21c0d7c212b90bbcad908a047c672378c97b9fba6d3377eab4fcfca70bf4a17197007253fce00637b664ba216a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f74c4072a4af65dbfd68fb87b15497cb
SHA14c5fe339cd8b4b5f379b85f71548ac7726b2339c
SHA2563889c253eb3a42b62e9897496b7dc7f9ad566a3325f91e3595d1f7f3a39143c7
SHA512563681264f9e5ec78e979e3f310f42224aa57b278d8ae653adcaacde322cf8b4eb92c616e3135fe8fb579999bbd3914ae139bc9af6fa81ad075cb2a1e1ab2a97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f1acad0472246984fe5258c89f7a319d
SHA1bdca0e43023b12dd5aedeb557c72daa1acf84027
SHA256ecb6ec1724e62dcb2f34294d89fde81249a161d69d9cca272550799f1ccbf1cd
SHA512c23afb27f22a0eab6e8dc92115a4caa257ff82534677ed6e09acac6c38d53e33822ef278a7d067b4cbace6ed038d0de2e3b49fcb80df87d7ce553eaf4953b605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a4acf413147a63cde6cbf5bae235871d
SHA16eda093a97cf87af0d23646513da8b2d649f6895
SHA256d27ccb43988225707b98d42f0eeddd7e5d5ce661260b541cc888e4242b92d67b
SHA51256de2124f991a1208c1c99267ba1acfa9adc5039fe90126c3f90b34ef687ad7d3c0ca3c5a2655c8810c9fbd4b7875f76acdda379d8c2a945d835f60303707c32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52ac8489491b1231babfd42951fe851df
SHA1229c8b04a2b21445614c48fe96958f57b136512f
SHA256067ee2435a33d6d2b5e5d2e502426ca3e7f34fe9169103a7338ea335fe5dfce5
SHA512411b3d51c3482b468dec9cabfd98264643edc7e63454efd8f789373a1c8d61850e0ce80b19a2f787e8a24462779aa2761f9b1af351b0bb3939c68db6e121550f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD597409efbaeb7bf8303154fc2dadc370a
SHA1145a3324a500c6b8a62bf4891ef8e7f15b1dda42
SHA25673b89dafbfa0ac58d69fead65a581e1b9fa76cb6d3faa352bc1010218971c680
SHA512140dc71870da2a7a9fcb758959a48a5034432efc943697274d4e485782bcc7a27dc62702c2c9d09cce276948522ba20adfcf612f9b7e5a408330dceeb8cdd619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58aade2cfdc77f3914551077084011b9e
SHA1c2ad228c67867939d500302962f0df21b3f3032a
SHA256e24e3f90a742efd0095422012d1df8180741d97fdce546106654fd110275979a
SHA512570911bb1e474c2e25db86c610aeaf19d24252be2275f4ff7b9452fcce9f6b3bc76f5876aba39e5311304745eb221c4fb165f61996f0dc3b086c2d7fed07cf50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58fe7406609c570c034aa50d8a1463f72
SHA1e3a8a8f6ca603309f2f79bc4dc51675d2969258e
SHA2563552ae7a7b6249971f8388a13eee152042666da124230d47769aac69fe2196af
SHA512a94a9012d9871cbf78889feea9afd98c8e53c3c461d00d65ab3eb8d2e8f48516f02f7d8abd170997b60604d445b5e87b33e60d0ee4ecaa5bdcd94f452bace1b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59b7f7b754db52204ec36c05de038df31
SHA171fb1dfaaeb6448625bd0593001a34e4afbab707
SHA256470ef42cd57e7ac5b38466ba8959c50376fc50b45ec589c5b6b0e04ee74478bb
SHA512edee923bf6aae5bd7df1fced1b24ca4f37058c72646dbe75a855f75d3b775a54726ee7289a0963ea6259848ee7b391ca50e58a023c0278aa1207a1705517a041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5066c7a2a06f93c7094499655d73ea263
SHA11377a35702043671d2f4d6b6a3451b41a138688f
SHA2565161156c9ef58e6f9983f5e30df80e342b60ddfaefd60b146e488ef9f92a2123
SHA5122d7059dc32359742b3f43a15fc1a8134b1d837794ab26c05018efa123365f08030e44aed0a3e2c2c936c7bdc1145a6a5fd30b350882fc95a377a38891182a34f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
50KB
MD5d6cb8d33bf731f25f1d24a6f4fd6e5ef
SHA18f5926417a1f36d44a9b8a89dc5106c6a0de5b9a
SHA2563b2c0341528da4e2e129e80e4b57aef63c6b307587fab96528cf00e1b1dd034a
SHA512441aafb617f55310621f9d92c8dc6d680ed752a576dd53cee9eb814fb7ab7d22114aac8fe17a759fbbc51f9aaeaccadb93f78f5564ba6110db209bfb9bdb01c0