Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-02-2025 00:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe
-
Size
1020KB
-
MD5
99c377c6e1d03d1d748eb2db3372fa3c
-
SHA1
ca53f8b9d678246cf65c184049544323a6be459e
-
SHA256
1cf7dfe87e6ef73ab5b21e1292750449c806862b966f5c3edeb609501ffb3faa
-
SHA512
b0e90e50659b26d0aa6943bf9d11ef81c4092a96bb9aa92e11cbe72961869bb52016af037e6e2efa9d433d42c1476af91d2f9824f515b50397dfb2d63516137f
-
SSDEEP
24576:jIgF5uTsEwKJq2lHpmsqYASpF2V7nrZ6MxbfMXaPs3fv68kj:8giTW2dpRjf21hxb0XaKfv6Hj
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 4 IoCs
resource yara_rule behavioral1/memory/1644-23-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral1/memory/1644-34-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral1/memory/1644-35-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral1/memory/1644-37-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Loads dropped DLL 1 IoCs
pid Process 3068 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\EtNDuISBB.dll JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe File opened for modification C:\Windows\SysWOW64\EtNDuISBB.dll JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3068 set thread context of 2228 3068 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 30 PID 2228 set thread context of 1644 2228 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 31 -
resource yara_rule behavioral1/memory/1644-23-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/1644-22-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/1644-17-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/1644-34-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/1644-35-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/1644-37-0x0000000000400000-0x0000000000474000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2812 reg.exe 2624 reg.exe 2632 reg.exe 2864 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeCreateTokenPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeAssignPrimaryTokenPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeLockMemoryPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeIncreaseQuotaPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeMachineAccountPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeTcbPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeSecurityPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeTakeOwnershipPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeLoadDriverPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeSystemProfilePrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeSystemtimePrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeProfSingleProcessPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeIncBasePriorityPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeCreatePagefilePrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeCreatePermanentPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeBackupPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeRestorePrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeShutdownPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeDebugPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeAuditPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeSystemEnvironmentPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeChangeNotifyPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeRemoteShutdownPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeUndockPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeSyncAgentPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeEnableDelegationPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeManageVolumePrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeImpersonatePrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeCreateGlobalPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: 31 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: 32 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: 33 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: 34 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: 35 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe Token: SeDebugPrivilege 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3068 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2228 3068 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 30 PID 3068 wrote to memory of 2228 3068 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 30 PID 3068 wrote to memory of 2228 3068 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 30 PID 3068 wrote to memory of 2228 3068 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 30 PID 3068 wrote to memory of 2228 3068 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 30 PID 3068 wrote to memory of 2228 3068 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 30 PID 3068 wrote to memory of 2228 3068 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 30 PID 3068 wrote to memory of 2228 3068 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 30 PID 3068 wrote to memory of 2228 3068 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 30 PID 3068 wrote to memory of 2228 3068 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 30 PID 2228 wrote to memory of 1644 2228 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 31 PID 2228 wrote to memory of 1644 2228 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 31 PID 2228 wrote to memory of 1644 2228 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 31 PID 2228 wrote to memory of 1644 2228 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 31 PID 2228 wrote to memory of 1644 2228 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 31 PID 2228 wrote to memory of 1644 2228 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 31 PID 2228 wrote to memory of 1644 2228 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 31 PID 2228 wrote to memory of 1644 2228 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 31 PID 2228 wrote to memory of 1644 2228 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 31 PID 2228 wrote to memory of 1644 2228 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 31 PID 2228 wrote to memory of 1644 2228 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 31 PID 1644 wrote to memory of 3028 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 32 PID 1644 wrote to memory of 3028 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 32 PID 1644 wrote to memory of 3028 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 32 PID 1644 wrote to memory of 3028 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 32 PID 1644 wrote to memory of 2740 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 33 PID 1644 wrote to memory of 2740 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 33 PID 1644 wrote to memory of 2740 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 33 PID 1644 wrote to memory of 2740 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 33 PID 1644 wrote to memory of 2852 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 35 PID 1644 wrote to memory of 2852 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 35 PID 1644 wrote to memory of 2852 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 35 PID 1644 wrote to memory of 2852 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 35 PID 1644 wrote to memory of 2832 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 36 PID 1644 wrote to memory of 2832 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 36 PID 1644 wrote to memory of 2832 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 36 PID 1644 wrote to memory of 2832 1644 JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe 36 PID 2740 wrote to memory of 2812 2740 cmd.exe 40 PID 2740 wrote to memory of 2812 2740 cmd.exe 40 PID 2740 wrote to memory of 2812 2740 cmd.exe 40 PID 2740 wrote to memory of 2812 2740 cmd.exe 40 PID 3028 wrote to memory of 2632 3028 cmd.exe 41 PID 3028 wrote to memory of 2632 3028 cmd.exe 41 PID 3028 wrote to memory of 2632 3028 cmd.exe 41 PID 3028 wrote to memory of 2632 3028 cmd.exe 41 PID 2852 wrote to memory of 2624 2852 cmd.exe 42 PID 2852 wrote to memory of 2624 2852 cmd.exe 42 PID 2852 wrote to memory of 2624 2852 cmd.exe 42 PID 2852 wrote to memory of 2624 2852 cmd.exe 42 PID 2832 wrote to memory of 2864 2832 cmd.exe 43 PID 2832 wrote to memory of 2864 2832 cmd.exe 43 PID 2832 wrote to memory of 2864 2832 cmd.exe 43 PID 2832 wrote to memory of 2864 2832 cmd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe2⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2632
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99c377c6e1d03d1d748eb2db3372fa3c.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2812
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2624
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2864
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33B
MD520a666cb9c6b1e4fdc799163a4b0d8d5
SHA13941cb72e163cf295b4438f74cfafa3cd7332845
SHA25618bb564ef938c0afe95caa561e5b22429c1f3ea81a9edd100e2fdd1c16d2ddf7
SHA5127e3c53e1ed2e832eb00dbceedace89789ac0eb9ed17c67465263bff0878d34b43dc09c79ad25a61c2606894fc9ebd6bbe74580239f97c7789f679fb80d12d52a
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606