Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 06:41
Static task
static1
Behavioral task
behavioral1
Sample
7126bcafd44ae6bfbba0bac1c82d4a83_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7126bcafd44ae6bfbba0bac1c82d4a83_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7126bcafd44ae6bfbba0bac1c82d4a83_JaffaCakes118.html
-
Size
118KB
-
MD5
7126bcafd44ae6bfbba0bac1c82d4a83
-
SHA1
63eaf6129e0e2ddbab26c3b9ad4ddef595bd708a
-
SHA256
d7b06b44ce09aebbe816dbc74a3a57d2413d47b733069f33bf28e7fe81229366
-
SHA512
2e36ec56fc58c012937a8231ee36944ddfa6023a75ff16a23e77fb71d1de784cd5127968c521f7eebfeb544a250e5d2e5ef1031358c55199e9742250d53cc8fa
-
SSDEEP
1536:S/kyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsn:ScyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CCE498D1-1A61-11EF-ACD5-DECBF2EBC4E5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000020352eab8eb17dab3f3d0422404beee00d728a7cf39a77e0376841b6385cd4cf000000000e8000000002000020000000332bec529eb28f3d5133f384b6469898bba2a62444b0497e2a435eb8d4763a922000000069fa8b716bfd0aa473aa1f6842e1e0c7dfef159b1cfb318d0d47f1618e34494340000000b45bc9a0fe5d794a171e25e0b29c62b5cf2a5d2985530b0abb69c496db43d3681b1d05a253e9b60a63c24ffdad1d444ac412cbd43bc702f479adc46919f37cb2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422781149" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e76ba16eaeda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000f61a48a345e5488862f1b9938ae850cc16520a1f92edb6f1ada737abe9ae7888000000000e8000000002000020000000ce5331d0024cc0d9fd0b07c096ee97f4f7e487ba7de140bf26d92e5722fbdf4e90000000de47d959e03c1ecf1ffe9b9056a540e4c0f9ec30e9c924dcd667283d20bbd654c279b9d58ca94e9d5db9d6021f0cc997a8754d68f98a5368888578a24c82d5138b525887940b6482b5057d335530d974eea8412d3e488309b7f7b3c39e3e0c3dc25b5640777ca7c944d0efd585297442829e9d0c87bfb3a5a54aabb8c3fcdc63cadf0a527a64914d92bfab2cceb50d3e4000000047ec6e2f622f038ebd0b12d0a010a3b42442b66b8c7427e504a1347506d61db4d17a57e99d6a0e9ab73118cd04fd91c207fbafb636383e5f7e422e51fcc95af6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2468 iexplore.exe 2468 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2336 2468 iexplore.exe 28 PID 2468 wrote to memory of 2336 2468 iexplore.exe 28 PID 2468 wrote to memory of 2336 2468 iexplore.exe 28 PID 2468 wrote to memory of 2336 2468 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7126bcafd44ae6bfbba0bac1c82d4a83_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1293f5610d7d28faadb2fcd90bb5f08
SHA138aab3a43600dfd76205c1a1d2df49f1ba108f39
SHA2569ca46fcbe606da3f49ae19da46840f437c329682f52a13a2b65cb0a0e29818a4
SHA5127a8baed41e32a337972555893b97d252c9747efe2a7479e3bc42dfbffb4ed2577e27407fef83353bad3a6260a61d346c2929bfdc13715868d07d9cee1056cb8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac56b84a995a4414688ee266ad0e5002
SHA160bfa7ab1ceddea63ba8d7133167f95489202d32
SHA256c99367211851e1a10659bff42f71958908608e49d9f88822a94fd26dc488f18a
SHA51215d94a44bcc8bda56effa4eb065c39a507d7e094435beb8ad25caabe4e86db38641918fbc3ef1813b857746dc0aeccf795e0d0b5c669eb1a7d6c4b3b5581b644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529756c4a8a0a8458997a28c1cdf355e8
SHA16c290ce9e198d169d621bb7cc3b715d86d85d229
SHA256394fb24334a45e5de047a5c4aab1d6832840fd1933a770bf75235d2c1a059d15
SHA512cc68819dff4cb51973fcd9b46d69dc2b9b7ec7fe3534a9f2ebac58e12f2e4d7174487dad72af4f44835f463e6359e0cdcd6e0e1da244c34518d59057137d4c4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae10ad955311fecdbbde4f39a8e04b41
SHA1dcd72d0899fd52fc1ba28e6e4a0d6f1007e63d8d
SHA25610bb988b89d34addba96d85c8b49452c3718332624a153adf58b98b18d030e22
SHA5125543bfe739d3bd7b00e22b231e5fdcd1d7fbd552b30c392ed44d6b20c8a663cfc48b9252eef4f8236c41d28973932cdfdd73cdea974759d614dd8f5bce8e1870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecf757b24a57d9b3d438129fca0f8325
SHA16ad6e0fbc74d90735577aba7d89f7298ff73aaeb
SHA256312ec22c9355b058b6a1baed675a568b739fb744daaa73399152db58f56ddd4d
SHA512fc1d3c4b70620f462a3da04e68908a2c6ca516ba39761a6658dc8c35f74cb697d93e9eec8b5f7da30dfd26ead4bf4528f04d0f966a3b27cda944890cf401842a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523e7b29eab1f328db08a18fcf8e49ece
SHA1166c77efc021e262bd4aeeba1d4c74bec20b1ea0
SHA256ecf4ee1553f8274bfa400dc9e6fcdb87a71eed10e208deae7f81317e4f0401e1
SHA51212585c43cf71b686269b6adbc5af045c088fcce32e2b73a9030b43179a8580e653d3ed0d71e562a0daecbf4053432c14f5c709878fb437e68147867ad965ea18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52715cc63752f2910b2f775973b1ece17
SHA198fa7b5701f6f1a8dea8bc14a2a2aed43af150cc
SHA25655f917d62cb567090ba87fda2f77c3d13ed3916a293ad746c1418b639dfcab16
SHA5125b02af935507ca2557127000b1f6cd6639924a02770f2015c37acd8f0ec325c64af078cf0bbfddc71b7079e625f5686acbe361919e0e837d9d992bec487a413c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5194a1dc6a7a8a7559b9a453c4943853a
SHA10e5cb04d734537ac3134d1182bdb1064cb66bffe
SHA2562d2e44f4f03b689ef6fd6d8b0e2abb034f5fd5c5d337cc13e3ead70104c03ce9
SHA51203a16852dfa221badc976117033ef72871cd9b51a1e3491b08a72b93fa0b08d36d80a61559dd64fca6f2ac63506ef165b8ba5c71d7f646fd8ae88b0af5c7cfe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba434b4c0c6b15b7c9d30d73ab5dfed8
SHA189c05ccd610b04e98f1d87aed009d6d5eb46de48
SHA256e82ebccd734636fbcb14f1d17522f8c31c5780b3df4d71f94218a527e6d55f1d
SHA512f2f873904c4e9e71ae142d51367fac0f72b61238b720107427c391f5835a33d345f80b1cbfaa1cd8fb5e78dcb31cdb83dc3e086fb4ee54764e1beba1df5befe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589764dc836b06ac5ee026433b7dab0bf
SHA1ec2765a280929053083f3f69bda428104a376cae
SHA256ac3e7e0f190b5d9073a1cd20b34b5ff3673c5b6094142e6e50e8025e86dd455a
SHA512489333b72c0cc716bc95d10b404293f1a2fbbe579a66679a41868f1dcfc8a438adc0253e0090756c46591137bdd1a60d1423151452c33c3b695aa12fce3b361f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5879e80167d6619d85c482ae20b290f02
SHA104ebd4570a09d689c60bd876a3373cbd814e8248
SHA2562ac6262b837f2fa02bc6e7cb844d561a9c3ad9eb03049d3eb11671cac28a787b
SHA512ed80e7addc9b8fc17dfefec393a2e0ee670bc2b7d1edf56ace92c52d7acb1db79f6847a5abc397109d1a748449f3a361a3cf906e01e6d64eb92581ed708350c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e110f5ec2590032cde1971294e9a7b1
SHA1636ff6e830825a38e400c3ebfd54dbedb72de0ab
SHA256c9aefe0f9ce24b344e438491a5b19a54a5a64c4cb96ec1b656c174de61851c17
SHA512604e9d4a90adc14428a71005dfb3dce7a5a1fb2640749a070e75b09cc605926b343f19de58b71a314c600aaac3f52eecfda2e9b651eb0f030274750cd4b98cba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5721b28ba13aa86ffacb8efe2f2d6bfdb
SHA1fdc8ee0baef4980307ef6cd9dfd9dd06fef0dfd5
SHA256507b3014d0b4423d32a6b315284efb25406d364176d40cfad9fb68e45cd33777
SHA512de2d9e4b0c8eb8e48b863956243f6b371647fee5d4ad7364e49ef1766ca8105d380492d36a530fe5620b8e0ba362c6a8c36b16e8c5ef5403ebefae808ee47669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a2c0ad405eff550a7df2d67e0d7f2db
SHA12f3c3bd7e887a8be3f7eed317774b80e18714358
SHA25608ae51ec8fe9b05ff5e43d6d467a21dd1fb2901ef9c4c39f9b55e3784bf47ada
SHA512bcc9969d08128fd46217257fce745256c63bc111c1d4679d80dab80fa9ccb5583654436bae48e037e25274ff74e3038d7512ce715ebdecde52d43dafe9a63641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a7fd8e015cad56bf0b8b9acd4137844
SHA1b74d2636fa4088d42b254f0dc854e8d1f21676f1
SHA256e5376c4c2044fb049dca6d42bf6c8f17db4bbca46d393f6486a8932e02ab4732
SHA5121aa2b6a44104467d4c3d1c2fbef03aa1eeefe2fecc60d733a7918fe256a13af751ffb64adba4a3fa19c7cccc97ef3b60262a6387941061ebe76601479bfde378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5568d57779c94646c34bd8173ef56b724
SHA110f385a744c4d03821fe291c4e1f0cf3d737c0d7
SHA256abb35c00af6b4341d437a733263dc38a8b44546f00ce4c7c972d1201823314cc
SHA5125aa4ab76d10344346ac6dec76f211be50f7d0622bd433b95574135ecf3814dfa15b9ad14e1a899708341a0a5cdae87de75560534fc9c7d4739bb88547ea18c40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5309141355eb2bbfea47ecb55482267a1
SHA1d434c699e156cbbbb44348849624746ca3f5d675
SHA256973f5941a7f3ff018bcaab0b98c867cd5ded105716159f1b1d0ed1cfa61ca4ca
SHA512a441b9459d3e44291cd0d36b59776468f9fba1855d261ff3fd142dad2378596177795faf44d92d4cecab862a7bf04b3ca8445d0d96d9ac683333057de54d10b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5425db9450066269258b9230647a5fc85
SHA18bdac9252b39214480b3798c99c6165cebdcd81a
SHA2562c2de8e00b888e79ad081edc1221d34ab7fa8365312e8bc8feb2bb222e50d57e
SHA512f0b499f3e5f9438db55fc7d2243850918764938d9e785e1c84bedc3235d23701369a3703dd5461d1fd618e915838af8a73f6afa26cde12598ecd77b3f0988060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c50d0a208416b415bbd43a80f840df3
SHA18a3552ca749d17e9e4f09e85748857da15f33100
SHA2563d46834bfbc45979867f6ba498c118ad4530a7502c69a73bcc2ad531217a7ff1
SHA51255f1aa278f9b50f09928f3495a260359d0a483ec167c825a02aa3b5e7c3cebb4e125917f2835878edeffba717a882ecb3a965695b7f199f3f49fe2f41bd97194
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a