Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 12:44
Static task
static1
Behavioral task
behavioral1
Sample
00ccd35fe6549783682618e0086a0a3c_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
00ccd35fe6549783682618e0086a0a3c_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
00ccd35fe6549783682618e0086a0a3c_JaffaCakes118.html
-
Size
67KB
-
MD5
00ccd35fe6549783682618e0086a0a3c
-
SHA1
f96a9812cfb6ba7af8e4ebd4ea7422d41138e725
-
SHA256
2351b19f5dfdd8923b7335176aabf1ab4d5978ec379a1d279c38a2e8f5cfad54
-
SHA512
402c133e3971ee4777e5d378892098f37128a0830a694f104456973e8b628865bc7ef9b89cd9ca147b1be1512d628c50e1354e17172b26ef9771f3675010e195
-
SSDEEP
384:vU7JYUMdmBfGOqwJUwPUAmZMR46VRh48z:vU7+3QBfGOqwJUq46h48z
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C14B9581-03CA-11EF-A68A-46FC6C3D459E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420297350" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2780 2188 iexplore.exe 28 PID 2188 wrote to memory of 2780 2188 iexplore.exe 28 PID 2188 wrote to memory of 2780 2188 iexplore.exe 28 PID 2188 wrote to memory of 2780 2188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00ccd35fe6549783682618e0086a0a3c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e144c188b5b2ff02fb51dddef4b58173
SHA1362bfcc78adba985cd706e692c37111cf28aaec7
SHA2564e07664a0193eeeff7933c542f27f96d4ee394f6ed3a7167fc2b5c0a33edc504
SHA512c78d58aa0c8664651a47db30fe3a43762babfd794311694e8dcd2a636084c61553bf81ce93407715f15760525e981abee3fa2847c651a7111dc831d65e13d699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5e03103edf859032447af081c086bbe
SHA1b43b8800a38e5918e06b10bfd17afd167c8298d9
SHA2562b02f80a8c89d873002246183b9f5c6c2299010b6c410f3b6d3dcab87ebd0e3b
SHA512825865b31f4286b0c9d49e993ea9c33146511e8be9ac5ec08154988a4cd647bd6d5ed9730749a35200be0a43769cb4d49547e736ab0b60bdfeb1e3ee6655a9aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5501f703943e73f56e251f1df83760c38
SHA18a63650087382f31672883f5c0daa59836313a44
SHA256ca5d43e30220abe14781ebffc0a4c6f71ceca95d36a4b629ba882846d776f6ae
SHA51270f85880dca94d3464be120f27c6974373aa25d6e28588518073ac716355e4183a57e387170def0b8d35e13eab6b232118d9cfce65246313977859d0c8f32503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdf49feea3102de2571f724995f1cb3c
SHA1013fb8050556a1ac19f1335c7e2b344f7069872f
SHA2565a8b1d0eb9351a996030eced252678b2deacf5f2b81b8ae18f2f8814679179e7
SHA5121a1eebb245b547eeac633750be4e8b628fa6dddc66816344a309e558e9e253ce31e04252f899474f76ed60d977b54cf5534b8a067f2fd07eb9c104845dd65cdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521f0ae1f82af0aef17ebbc22cd0a974a
SHA1c7001fec9954d33c930d44999fee64c77f0226e5
SHA256e155d8793d5271968975d3ae41b3d59da97391b6081f8aa88fc0d5599f4a2f0a
SHA512a5998c7024023da1918e2991276f19f82a4726bb1709f376d9b27ac342566874deb64550f827e78d9d2151e20e025722b2eb8ede86d67b47a56c2116f5730c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8805cce617f92fbe4b6dce1887a1207
SHA1e18bc2885391f3c0ee86d3ecf51bbd8f842bfaf9
SHA2562f1b4f214524de87adc113cacb705db0c878c73319e572a32c23890fd0b87ed0
SHA51214ec8592a05294faf2c659ef9918638cd0ca43b1fb9b81223a4d9e9e9d267513ed24e82d9e54cf4282293ee77e5fb4cb62a3d913863626d66cb494e23f0d8f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fdd2edd4e2353d73db1e62bdeb4fbb6
SHA12fea960f4b888c686e6814aaaf5681b43900f6ca
SHA2568a3e06066707f566544d597a1395e39ba812d09a88b298712bbb4229bd4c90e4
SHA512e051126c9d33dc7c70ba4f980de0492646b1d9f533a939658de63a69e1703054802268b612e70e8815775855922f2b58b45ddf82845d1911453625059b522b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549fc3ec08ed0c73453b4f820b353b9a4
SHA10fa06c43495598f898621dbb351fff9a370bc74e
SHA25652885a49a1f1d26d562db7d2513d2bfc9e0730f2ce60be2eef03a21e589c01d1
SHA5124ddefef8dc7329a5b1af1be277297cd8241bbcea8d06549cdad2da3751103390c5da64639eefff8703179f07ce0d31b920972f871e4ccdfee80766de88f4f0d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a05978feb43c28454dc378b1a72dce0e
SHA1fe571bf8d9e5a7e8385892ffb44b31bce32fc491
SHA256bedceecab6892918ae7466e720a4411e675e10fec6c3c5770673fc4e4e0d70db
SHA512c6b8e05fd578bfc396ffd320778238a90e6247f310326e26dc6c72c65a8b69660e1b3ad4a2983e7e25f90d21ff93fa8f91a4bfa4eec002b46bd3a6db42738699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531a23948fca68e4fadb9caf441a59a00
SHA1f403500075f0e08a33f8f3f9d3eebbe83b66a37a
SHA256a093a132d2da32cbbb75304412ca7d5c30b4f8f72abfd2c37bfe6daf9f95f7c1
SHA5121cbde48383244983c243029c3e2d2f5adba3d613cda620256fb15957e88eefb4f23d483635362a48de7307618cb7778c3e73ddeaeecdc60d6c4b5da1b3c90567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a1a9cf31428863a4d53bf4667361048
SHA1c2e70c746cd41329319a9c3fa53f2019ebb22dea
SHA256483ccd2ae9f7544e50a839a4a7c17e7c7e24d99a193ba4411640a00541ea6000
SHA512b762d72579450b51d5a36210f04c8c5f10ca80945f3533d93a64d7daf0f4075b6273f1face2a09ef923dfe14e3e5225fa3d76a00ed10038dd769d9b4a48c2a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6e0e37b8827bcbdf98ad11bdb0bce2d
SHA180211aa546a70f2382ab976443144a7ec1d9a889
SHA2561faff084f1c6ad9427adb2072a1f6ea02786d81883b457f58f37fe73bcd51ed4
SHA5121f5c283a6bd9e832167eeb82bdce21ce1d172cd794da9f75ca3e94cbe3d447bf80a41c130913a73a6de01db2cb8de187e3d851a909c61df72a05f13fb83a4143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7208d261b922b6395cba1e8e40c68f1
SHA16ca683c729abad16ab591acfe256e970a36dc7b4
SHA2568ce32c38d9beeb5312210cffc13694106919881a4f980d4f4f4caff6cfee93f2
SHA51294f4947ae24d80ca2de31c0cc7193cd5d8a11f06ee7692a18ad44b245be2ad186373edc77e0b91162b9769dcb429927bdb0f0fa373cc990507d8d80fa7ac2b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4390625f8e3d62b83abaab350d85d5a
SHA12092cd40e01021e5b4a3e9767397001c80beb4fc
SHA2567998956dc73540461bf93eb9f56c5da0b6ff1d7054af7c24db10436f6f600363
SHA512ab538126615cd96214c9ee4fbc2309f8646e18ac197614694c22831173a16858f0cbe7e3bd69f1536aa16b47e92c45939737d36737ba9cab70ffea0034d8e68c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3e5b3c3ba86853855eef3f9dca91c2c
SHA10201c555af109724e278f68fbf58778e324d54a4
SHA2568232275137fd941eaf20935a2b047e561d326b44faad18e9de75a909401d94bd
SHA512f4f57e895d37b808c730af55e6663d61050f0b82c6384e3892821cc77ff5e54e9c1f57f8a793238443520d06d3494fd26a8f041db1c5dcc92b3cea14f453e140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1f16b5241592587e2139dd3524cdc04
SHA1d2d673fe396f4ab4a2cb119345b03778d8c88849
SHA25684e60bdc6a1ddaf3c0a2d268c1f3c91bc67cd155174f1f68711ba838e5e218d4
SHA512ec4093ec5aa12203809696e6364b5c430e0a8b8aa6e968d57f1ac280bb2a87be185669b3994f7ff8c69e335cd083187f7bf3c73d605d7c8430d4be32ee1c22f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5286f8d7ad89c5765dab798e7f87241e9
SHA129eb940006b77244519d71d9a002440b2850c7c8
SHA25636583a43ba382d9f8b1dbc7711838172b3517352904dd78f3a05d4f9788356ff
SHA512487c11cf1e9092f286f989ebf78614ff34982005cb1c5f771449236fa855a67343b6e722f24340a0fb07b0e0ac0fa59b67c59b47495ada2092f274ac1bbde98f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523efb0cab7b37f7f155ef095141d0532
SHA17d17f612cfa4e6a74c7786516861c64da05f0e35
SHA256db60a3eaa6a2a6be6ad6e8eab18a06322d64585ed2b076b4aadbb04833327822
SHA512a0f77a1a6215d235c6e38c9be8f1da0e06f7d6bdbfd3c6a4b861f315479a93c671d033b457feb046e0b41bd68ab269e49a159b8bc16c494915500ab0879f9b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a118c93dbc39f66099074fd07cc49d6
SHA19e0b4bd6d744c8d90e92006f3383ce8b7d3ec75f
SHA256d8267507f128e6f3c6f42426495566e5cc5a79a411158b3d07b39ad80226ff79
SHA5124e977ef15edf8fd66ce41a406bb3d58f0ec669efa98ed1c6b42ced0cc1cd3dc2e58a13f0066cbf71725667573fe64cbd459566529c3f217b8a9a9882b72a6af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a9661b6ba4c23208837b79b41389aea
SHA1c41efdee2c8e72c1f51f3cf41f785d258bbe7c8c
SHA256f8174253b0858a71746b9536b2c4295460f600cfec0af325a512ed3c65b99845
SHA5129d3fcbc576dc6dd6153814cc02f716f75e44803cacc07d70d1cb361342cb1f9c1dc37501a93b806536f8103da817b7be8ebadabd21f3fbc6df8b3a584723f09f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5feb95127cc276c4e1650195aa8d5c0e6
SHA1f4eb618165b8f9f527f93916f3b7691906af2feb
SHA2561e0a08fd485bd9aa223456bff2cb935788324e4b1a76d565124734ef2655c3b1
SHA512f58614dc1f4f005185d98e99c7a2a0ce4932771f5491516057ad2315a26c7cdcb8ec2566c801e589775bd0b6d1724ca41a48f5a54ad1a13d2ed879cbd83723ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD572fb62e72f0b0881dfce879a43651d10
SHA1ce87083d34d24059e4aa2cc974ff34b5b27af8af
SHA256aa769c17483e07c3daadfe1f9d75a79b95eb84755dd3f55cf94501ad178ae71f
SHA512d492953c4238a519d65e4f809d22f8bcd49f0e73260f76c168c8f7a6d8cacd77393946431686786157793f5f4664ea504d5c9c5dd735436ce5793be563c0f18a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a