Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
2a820d6c1f534eaaeb806493418616c1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2a820d6c1f534eaaeb806493418616c1_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2a820d6c1f534eaaeb806493418616c1_JaffaCakes118.exe
-
Size
204KB
-
MD5
2a820d6c1f534eaaeb806493418616c1
-
SHA1
144c5b1ef5dbf5cd88c83b580924deb872c8407e
-
SHA256
362170e04bd4e9093f37eabd6ce56c118f7692ce66c0d9c07e8fd19570f56cdc
-
SHA512
df28a9eccb64b847328038b4ba9ab723fed6bf928e661ce5e0595d58ebaf92518f05a667c4f581c1c40fde3ff9c680e40f03c3c02ae018f6bf06f7e97ab5b7c7
-
SSDEEP
1536:xXz230zZ3NMsOfXu7Ke9TG4yMSmcUk6lCbQvmSTpJwuqCNQR6nkX5SADkPY+Gdt1:Ry30ZTTG4yMZc9pJSTp63ZXB
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yoajuoh.exe -
Executes dropped EXE 1 IoCs
pid Process 3068 yoajuoh.exe -
Loads dropped DLL 2 IoCs
pid Process 2464 2a820d6c1f534eaaeb806493418616c1_JaffaCakes118.exe 2464 2a820d6c1f534eaaeb806493418616c1_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /c" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /D" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /S" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /x" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /v" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /T" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /L" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /R" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /b" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /l" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /j" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /N" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /Y" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /M" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /g" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /J" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /O" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /q" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /U" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /C" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /k" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /d" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /t" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /n" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /i" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /X" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /A" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /H" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /r" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /a" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /w" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /W" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /I" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /m" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /K" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /f" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /z" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /V" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /p" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /E" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /u" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /G" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /Z" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /P" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /h" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /F" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /y" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /o" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /Q" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /B" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /s" yoajuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoajuoh = "C:\\Users\\Admin\\yoajuoh.exe /e" yoajuoh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe 3068 yoajuoh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2464 2a820d6c1f534eaaeb806493418616c1_JaffaCakes118.exe 3068 yoajuoh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2464 wrote to memory of 3068 2464 2a820d6c1f534eaaeb806493418616c1_JaffaCakes118.exe 30 PID 2464 wrote to memory of 3068 2464 2a820d6c1f534eaaeb806493418616c1_JaffaCakes118.exe 30 PID 2464 wrote to memory of 3068 2464 2a820d6c1f534eaaeb806493418616c1_JaffaCakes118.exe 30 PID 2464 wrote to memory of 3068 2464 2a820d6c1f534eaaeb806493418616c1_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29 PID 3068 wrote to memory of 2464 3068 yoajuoh.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a820d6c1f534eaaeb806493418616c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a820d6c1f534eaaeb806493418616c1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\yoajuoh.exe"C:\Users\Admin\yoajuoh.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD55aac1b03859d48386013c6da750b8097
SHA1b5fdae19ce2f4e126367782deb409dd7ad5d2bf6
SHA256509ee0d4481c886e31fce37cecb64c169c660822a283ceed0e7dfc09b7460931
SHA5120d05216bc7ecbb5fbb32992bc132b64cb57c2402ad8744c5ee942fc1b2f76643503a9c35865327d4e074810bc6627d0fda237bcaaaf843818d6a936247bd6bdc