Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 10:46
Static task
static1
Behavioral task
behavioral1
Sample
librv32_plugin.dll.svn-base?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
librv32_plugin.dll.svn-base?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
Resource
win10v2004-20240412-en
General
-
Target
librv32_plugin.dll.svn-base?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
-
Size
7KB
-
MD5
8d1af6c198f5c9a6d41c4c22dbdce9f8
-
SHA1
d19cb46f960d0712149f73d07efe7b0b786fd948
-
SHA256
3d7c35d66de24c591e1bbca6a1dbcfb0970a8e4b3b140136b3af866791aba1d3
-
SHA512
8925dc0760416c8ec64ce7e2c6572245b5bb20fc9da6521da8d293266806730b64b71928a179167d98f60ada59cc6fef7e765faaf3ce5e7fde4ed918079abfab
-
SSDEEP
192:ZQvTPMcMHyTvevJviOvevCjvMXVvBhv5B/lo3IvYv/vnUvvvYTv/vdUQE8uI:ZoPMcMHyTBXN/IE8uI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000f5533f7e0f2818493d970fc438a472ba31e6c28c9b1d2aa4ed809c22c7aa7951000000000e8000000002000020000000bb602ad044c1de45b2f9334e67f789e110bceee03a65e1a30800f5f954d4974120000000ae6ee842c9d958419bea018ec8d86528d8977cc360754f424274c611ba1bcd3a4000000062edee9c12bfdbb7dba3a5e090b84b5807dec9ccb4d2e4ab69eeb1e7ee37a7a2f0933a4ced35ad778ea6cd02943c934530ce7a15f32116468fa81d7b96dcad89 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000092dd1edddc0028346dacaadf135165911a20016369d3432df6fb207d739429c3000000000e8000000002000020000000baa6ddce86cc8057addf9513139c7c7e051002eaaf47667c3e6176e96182da6b9000000001ac07e06d471aeccbe20cc23da55384509305f6d13789b6c457e2247f22ab800f6c5b7dc8fa6ec53055b2deb8f8cc51f206b9806aca4c0e97ec5163489fc5fba1491cc66155538cce530104cd6c0996c88af580924a24c6b6a0c229447ddb3904a6666bbe0163cf9c18a845405408f9aa6529eac7169923f5c5241c9a89fd552d1c2c234dc805030772c3327a9f09ad40000000bb303c5632e5c6a8dfa49b4f820ee7e36219d88bd4986f3b3db1cf6df2ce2af16bd4c3cb9f379622a6aaa79902a9c39972bc012ed425a8603894cc2c65605715 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5A5E6CC1-FE3A-11EE-AAE3-46DB0C2B2B48} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f1ed2e4792da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419685574" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 1976 2860 iexplore.exe 28 PID 2860 wrote to memory of 1976 2860 iexplore.exe 28 PID 2860 wrote to memory of 1976 2860 iexplore.exe 28 PID 2860 wrote to memory of 1976 2860 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\librv32_plugin.dll.svn-base_id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e5d2f4875b97639d955256807c6ab3a
SHA1d7391a999e62031a5e1394dbefa0ec5e4cd3d828
SHA2565e2fd48bc41b757e713812d22e544bbc44870e753c855b4eb9a32a67d04ca5a4
SHA5129de88b99149335c40d6dc97cd8c1a674cedbfe0112b67868de1b29052219adc46f406eb88cb2ad4d00caa445b92a9aa36d857a6cded6d827dcc7ffd938f6fc58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1568f989029e7260ba513ad0f9b3d6b
SHA1c873b7fba1d69d2cee511d820e92869345111a8a
SHA256507dbae2863cd12133c4a676ef55651deef3ef94a084c8dc4c26ce3a81ad8fac
SHA512ec82a091a92fec2718fdf1768c4a0a2b2559ce182c6a81ee3d492b138e1f5360af5bf0e20ae3fbe7f834f1e80304c1fcf1eec478ccdb2c7926959c0a7c5a769e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d9b9803f30ea65e3c38b7eb6fc929be
SHA13a21b5bb616f08535c10dd16e55c4500ee192439
SHA256a40c5fcad9d60500070b15344d8993314ea606e83f1e3c0ee70acbcc627e6a50
SHA5128ae880a901e15e7ea798b74e682bd6edff5e85eed9c6964310afb6ea3068a4dca60571d5e3d10b8b3b663ee1395d9d8623dc45a739763448a161dd2c2a31c9ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a467b98357694cb571892c0b04135fd
SHA16ca9c5b8a72c5b4ac598b32e3c52b4835f2e25c4
SHA25623f954daaef3f5af2f2f75c87c8f49b47d9a0a23d8a23c2f42cf8a907b3115db
SHA5125fd0bad8b4fa3a279322f9085d5ab468a00f3014149457d7d08b73b902869e884a3c3c39f5d781e03a2ed7bd68cf9be3ab33fcd5202a247f54cc847a55f6ccba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfd7d782d7ac1f500e6da7e076b4ed71
SHA187d2002c53719c6006517fafc2a244759f2dd70a
SHA256e24b97064489b0f9b7ccafc14ac50a09a75a4aae2d3d9826646b8fded526436e
SHA51281e4ff2d9c95d1ba5bfe184cfd9fcdbf688c098b5145ca68cc52834c8c3d4207c3845ae335021709e647697076e0d1372ad4f80fca40aecb49aff1dc850249c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4b7e1aea49f36254d0eb0bdd5cb4258
SHA14e8d2c847f3f9c097631b5804526eb65a79cd578
SHA256c2c607852496c898600a30bad74fe690b1c19a8d22a5c85dee1d5119e7194481
SHA5128d97f46f898a2f3b2a621b0c3853cf7f7570962ba3e63c8c132d85b31416a7c0653d31d237be4e0e2865ec1b5e9de2ceddd1edcf4b3cae4173e433b1207ca0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6051e068c116dd20de4999f9c9a5615
SHA11bd8d563f49877237f421c780fe9e4b633ed65f0
SHA2561229ab9ec8c00941f42d3f1717e39de84ebe6b762f8e8e96095666c40c71a061
SHA5120b0781d06c9f90da28d1803fd6235b80a60c947609a85be7720997550f528476a059f5b8357827b4033495e6135a95e8aada63d8a4a24f51a248c8dfca03d483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528e266a4254c3dfee648863d2ce473ba
SHA1663dba16b84012439524ad3bc1dd85eb71137a2b
SHA25659b0961a85b2d509ecd3ec64e9c4b80a1d5eb6261c2bac981129f86f49bf418c
SHA512990bec20b0f9f0b10b2931d58d31c7a1ea04b605ed72ca94d6d50375bde65d7db8face4badd406c749d1f31019e9650e75400a89a9fb963d2b3456ead7834f50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dda4da4d16db0e2f09ed6033c85c93fb
SHA150529d9754b58c940b05b528ddfb69dd6368e534
SHA25640ccc922106f6f93cbd4fc307eebbe5d944c3a1736d02e8f643f01f76816dd14
SHA512de5343f77546a32ccd119fdbf558419e569427ed09a489e85ab6491b6a08f37a4d79ddfa4e3e98a80ea4dbd67aae39b7c369524825076dea0dabe01c8d5f3fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520425cbd376d23a4e5a3cac410f0c4cc
SHA17e89cfabc11e5a235a5a2853c58bd40498df0353
SHA256efffa18007b39438a14472760fa5031c7fdeb66dbd5c4f90fdd6562fcb434557
SHA5125789a9bc19885c70bc45db0a47951a7f6ccee7bb3cb35e949995670133f719e0f11202ca66bbf69d371aa8c31edfa0fb80a3e167153640a264c828e31a886e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fd40cf7d0f7db5fa3b85da6bb43d139
SHA12d6d830f7754590a383148c3b34085911a597744
SHA25681db8617758d3deae5ae55efa65b15671d1eb1b5042616b31a2936f85dc0e2bf
SHA512ff835da9e97977360614fabe4c54fd3e9d99bae4506ec6677dfaab502f6e3cbd682af82f2fd9c6dbf66440c3d2910a795cfbee4bbd043ec6037f94a92836a5f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5102e7020bd58d0ef51b019a5557a4829
SHA112f61b6edadafa7427bfc98d431cde64cb29c36e
SHA25649912a2ae883c2c69e5bf0eaa05b2290db704a9e05c9aac5b022ae1bbbcc9f0c
SHA512347d45e10b6e09507721180379aa133f8a69b1293929747c70ac345429cc05210270f44452a092a90261def6daead87051a19e7e7f0ce07f0c90f92d70a2d83a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a27996924bf6f0f7f65a7e6803277c98
SHA1d68a21deeaf5c137dc60e1d4ef4d1cecafa8eb95
SHA256c420799fa0371421b4c9c92722f09c4f3c2c325c0239e31a89f1d6c229d7c5e1
SHA512840549572024280f26ad210217e3398698aa97fa8fd9a01a485c04c0e6ac8c9f70f2136faf3a77dcb7877c3e720de1d8b616c680411597ae0326959ca39185a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d83db04dc9270e74bc7713fdce8287bf
SHA11cb18d22678858b4068892f99b20ee586a2efe66
SHA2564e824087f938ffa572ef03b24e90c9faa114a2d9b1fb9222de7e44cb670e797a
SHA512d1ae56702df293946c6a2a7ec7a6c81e6eec9085434c392a78190ecdee7f93e8ed6d55f6a707bfc806b5c011feffcf1062d6884241b3790b6f9a1e9b778671fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5669e6a92574b4dae49f8254446e023b5
SHA15cd271a603410b9f5e64a90e837dc31cc3bc4c3b
SHA256d0ec030511e07bff4de8020955e31ce048349423b8982f2e863cfe69fd7a0688
SHA51218dcd1cd7bc697ed4d4986ea0592bae692973ac2e9575a81cbebc0f65fefb0cb11063fcc5bc866a9494c493d7c4edeab7bf6bcedb34deb65718ddb885d0fd639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c23425b6d8937c39324a17f1e480a9b
SHA1af110a6f1508a2d109eed6dbbafb29ca12a746ad
SHA2569633aae304db8f314c381605028ac0e91e262dc10e65d049808533f06913d8dd
SHA512f473151869082e588186995503b87c36a4947d697d37c22fa2e01c897b2ba8203cd5b8a31d6eb68518ffccefb48f73fafc8e729d13953f3947db46b9a6ae1f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b624445a2339c6074eab8e01d314e31b
SHA1e3a556f9abd7985f9349891adc286bdca6b8c39b
SHA25670eb61df0e55de2348168b8bfe34a863f7495fe82d9ac3c8e8f43639d9fe0ef2
SHA512487e4f2b7cfe6c5d7e72e512160a8fd1d48c57398e0968a0c9a43383d125dbe2de3b0f8098a16899b894fd9e33758306e42b1b0f853ac3c610ba976e001b633a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccb0c1c3b08d663a405e8c580d293986
SHA1e56f24718ffb3a605f662a9f6645fde8c7887b17
SHA256402a3dd74e08d6a046b6124b6c1709e40ae66074c3565cfe8b8d4e9630e551ec
SHA51223042ce8712d2b10953d21e63a5258c815a8c0a2b6cbda17b0bf59a3cf753e2dc6e17ddb818c91d9c2399fb7df6224ae28419b691480b0b41e76698484b18242
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a