Resubmissions
29-09-2024 17:00
240929-vjc3rasdkj 10Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 17:00
Static task
static1
Behavioral task
behavioral1
Sample
fef9306d079d108ba67c999310684406_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fef9306d079d108ba67c999310684406_JaffaCakes118.exe
-
Size
672KB
-
MD5
fef9306d079d108ba67c999310684406
-
SHA1
5d681af45a247cfc4b55861cb869bfaca917e628
-
SHA256
afb0d03f8eea2f222c5eb4ed3779d976180e4d9bb4f75063988336488f3d38a8
-
SHA512
5ee074b8e780d04305306514ea5756601f4878327fdbbe9dd2f4dfb6ea6864c416c447e85da8d9fbcfaecf37dc19378fa6e4436da4e3e1acaa48b0dbac075e65
-
SSDEEP
12288:3zN59L8WRxStFP48gnXfp/YurF3X5mRi32tZxw:3R0UxStZ48gnXfVB3Jmj
Malware Config
Extracted
latentbot
nyandcompany.zapto.org
1nyandcompany.zapto.org
2nyandcompany.zapto.org
3nyandcompany.zapto.org
4nyandcompany.zapto.org
5nyandcompany.zapto.org
6nyandcompany.zapto.org
7nyandcompany.zapto.org
8nyandcompany.zapto.org
Signatures
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\fef9306d079d108ba67c999310684406_JaffaCakes118.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fef9306d079d108ba67c999310684406_JaffaCakes118.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\A113.exe = "C:\\Users\\Admin\\AppData\\Roaming\\A113.exe:*:Enabled:Windows Messanger" reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run fef9306d079d108ba67c999310684406_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Microsoft Intell Management = "C:\\Users\\Admin\\AppData\\Roaming\\A113.exe" fef9306d079d108ba67c999310684406_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F06C3DCF-17BB-AAFB-DC7A-BC92FCDEBDCB}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\A113.exe" fef9306d079d108ba67c999310684406_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{F06C3DCF-17BB-AAFB-DC7A-BC92FCDEBDCB} fef9306d079d108ba67c999310684406_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Active Setup\Installed Components\{F06C3DCF-17BB-AAFB-DC7A-BC92FCDEBDCB}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\A113.exe" fef9306d079d108ba67c999310684406_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F06C3DCF-17BB-AAFB-DC7A-BC92FCDEBDCB} fef9306d079d108ba67c999310684406_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Intell Management = "C:\\Users\\Admin\\AppData\\Roaming\\A113.exe" fef9306d079d108ba67c999310684406_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Intell Management = "C:\\Users\\Admin\\AppData\\Roaming\\A113.exe" fef9306d079d108ba67c999310684406_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 fef9306d079d108ba67c999310684406_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2308 set thread context of 1812 2308 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 31 PID 1812 set thread context of 1780 1812 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fef9306d079d108ba67c999310684406_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fef9306d079d108ba67c999310684406_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fef9306d079d108ba67c999310684406_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2552 reg.exe 2556 reg.exe 2668 reg.exe 2572 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeCreateTokenPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeAssignPrimaryTokenPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeLockMemoryPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeMachineAccountPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeTcbPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeSecurityPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeLoadDriverPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeSystemProfilePrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeSystemtimePrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeCreatePermanentPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeBackupPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeRestorePrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeShutdownPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeDebugPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeAuditPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeUndockPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeSyncAgentPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeEnableDelegationPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeManageVolumePrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeImpersonatePrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: 31 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: 32 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: 33 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: 34 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: 35 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe Token: SeDebugPrivilege 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2308 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 1812 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1812 2308 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 31 PID 2308 wrote to memory of 1812 2308 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 31 PID 2308 wrote to memory of 1812 2308 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 31 PID 2308 wrote to memory of 1812 2308 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 31 PID 2308 wrote to memory of 1812 2308 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 31 PID 2308 wrote to memory of 1812 2308 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 31 PID 2308 wrote to memory of 1812 2308 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 31 PID 2308 wrote to memory of 1812 2308 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 31 PID 2308 wrote to memory of 1812 2308 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 31 PID 1812 wrote to memory of 1780 1812 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 32 PID 1812 wrote to memory of 1780 1812 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 32 PID 1812 wrote to memory of 1780 1812 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 32 PID 1812 wrote to memory of 1780 1812 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 32 PID 1812 wrote to memory of 1780 1812 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 32 PID 1812 wrote to memory of 1780 1812 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 32 PID 1812 wrote to memory of 1780 1812 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 32 PID 1812 wrote to memory of 1780 1812 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 32 PID 1780 wrote to memory of 2824 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 33 PID 1780 wrote to memory of 2824 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 33 PID 1780 wrote to memory of 2824 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 33 PID 1780 wrote to memory of 2824 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 33 PID 1780 wrote to memory of 2672 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 34 PID 1780 wrote to memory of 2672 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 34 PID 1780 wrote to memory of 2672 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 34 PID 1780 wrote to memory of 2672 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 34 PID 1780 wrote to memory of 2748 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 36 PID 1780 wrote to memory of 2748 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 36 PID 1780 wrote to memory of 2748 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 36 PID 1780 wrote to memory of 2748 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 36 PID 1780 wrote to memory of 2796 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 37 PID 1780 wrote to memory of 2796 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 37 PID 1780 wrote to memory of 2796 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 37 PID 1780 wrote to memory of 2796 1780 fef9306d079d108ba67c999310684406_JaffaCakes118.exe 37 PID 2748 wrote to memory of 2552 2748 cmd.exe 43 PID 2748 wrote to memory of 2552 2748 cmd.exe 43 PID 2748 wrote to memory of 2552 2748 cmd.exe 43 PID 2748 wrote to memory of 2552 2748 cmd.exe 43 PID 2672 wrote to memory of 2556 2672 cmd.exe 42 PID 2672 wrote to memory of 2556 2672 cmd.exe 42 PID 2672 wrote to memory of 2556 2672 cmd.exe 42 PID 2672 wrote to memory of 2556 2672 cmd.exe 42 PID 2824 wrote to memory of 2668 2824 cmd.exe 41 PID 2824 wrote to memory of 2668 2824 cmd.exe 41 PID 2824 wrote to memory of 2668 2824 cmd.exe 41 PID 2824 wrote to memory of 2668 2824 cmd.exe 41 PID 2796 wrote to memory of 2572 2796 cmd.exe 44 PID 2796 wrote to memory of 2572 2796 cmd.exe 44 PID 2796 wrote to memory of 2572 2796 cmd.exe 44 PID 2796 wrote to memory of 2572 2796 cmd.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\fef9306d079d108ba67c999310684406_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fef9306d079d108ba67c999310684406_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\fef9306d079d108ba67c999310684406_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fef9306d079d108ba67c999310684406_JaffaCakes118.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\fef9306d079d108ba67c999310684406_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fef9306d079d108ba67c999310684406_JaffaCakes118.exe"3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\fef9306d079d108ba67c999310684406_JaffaCakes118.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\fef9306d079d108ba67c999310684406_JaffaCakes118.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\fef9306d079d108ba67c999310684406_JaffaCakes118.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\fef9306d079d108ba67c999310684406_JaffaCakes118.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2556
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2552
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\A113.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\A113.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\A113.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\A113.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2572
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672KB
MD5fef9306d079d108ba67c999310684406
SHA15d681af45a247cfc4b55861cb869bfaca917e628
SHA256afb0d03f8eea2f222c5eb4ed3779d976180e4d9bb4f75063988336488f3d38a8
SHA5125ee074b8e780d04305306514ea5756601f4878327fdbbe9dd2f4dfb6ea6864c416c447e85da8d9fbcfaecf37dc19378fa6e4436da4e3e1acaa48b0dbac075e65