Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
3159bac5fd18c02410715b2a8712647e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3159bac5fd18c02410715b2a8712647e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3159bac5fd18c02410715b2a8712647e_JaffaCakes118.html
-
Size
38KB
-
MD5
3159bac5fd18c02410715b2a8712647e
-
SHA1
c8b431549dbffeba32f443f40d28662892665591
-
SHA256
19f8b46feb5a40d8cba0b06998c44d2d99cb1e8d08635140fa6503d6c7996102
-
SHA512
3d7a557fda232bfa9e3f31367bf1fa29aa042f1a7312cc9e501a679c7b56c2d312ae045ac3485d7ffd2756cce1d315024b135680329582434baa5335328c82a6
-
SSDEEP
768:ioPY5kJa0Jw8taj3MOuDpIMa92F99CB9f0khZr63elukIP4dOuX:ioPY5kJa0Jw8taj3MOypIL9cMBPhbluW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE078701-0F1C-11EF-A002-FED6C5E8D4AB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 909fd1a029a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000d6fb380725ea4c8c3fce4ee2adab42bdad95876806d19688f1cc0b9b3c35b443000000000e8000000002000020000000fa079e15a6d5b4ecb79ddc8320952a10e118054f06f808ff3e373c7389940765200000005d85f368bc1e042adfb0c7a8e4c8c2834cd503637ccb16f261adf72989ace9344000000095bf885a8b13995cca823a560455cbc7dfc430ce3501f076d100ff97cf992da4792ffbef13e061e822982b255bb24a95c9afaf8f5db666026d8867b7228dc780 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421542026" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2224 2552 iexplore.exe 28 PID 2552 wrote to memory of 2224 2552 iexplore.exe 28 PID 2552 wrote to memory of 2224 2552 iexplore.exe 28 PID 2552 wrote to memory of 2224 2552 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3159bac5fd18c02410715b2a8712647e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac5b70f68ab4ba09551076cd8993ba36
SHA1783e5d77eac2961620cba0931af7e65c8d43338b
SHA256481c68ef709483610204fb03d1d83325ae9870e85c2e9ded9c6908249af28fed
SHA512bd095cf6c06d1edbf431fc724e38f5659c3f3e4467bcadde9b8897e4ae600f1d72a0b62f223adab78204567dd94cf3847cbf1d5d446c91e7179ee445581550e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57432ce255e579d3f0cd1d575707895c4
SHA1fbc20384cd71b25b3733de03ed0c403ddcd0f886
SHA25632dc107df44490bad6bb998a25887cb8bd5c2c53545f2cff1d1e988b9b404b1a
SHA5128a717bf2bd639877a16655c5913b6766a222be0b22a9ef2b59c27a0ec92b2cfa0bcdd10b4ddb84eb72bdd83507a83c86479d17e0c85b5f8faa07a7f2dba3ef0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580f0500ecb65702c02bd51e97fd30e4e
SHA163108519f0ad0ab766714e1fe788af0bbf5ef9a2
SHA2563dfbcc52f985a228c2528511dd77167f07b6107d172522130dd6d9037a8281d3
SHA512aedf3b070c1ffd45488bceb2c07ad46ec4cd27eb5ac122583b28891684d718501874ccf39e3d1c09a87ef9753396d3cbe5358bf92d60eeeaa15360315ae9d275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bff9158b59f3e1fd5c196257d749cbe9
SHA15962d4a3562aa99292107fa42b6a98da1ee65cca
SHA25681e90fbe37671aa375b4f3901b6cda5b73c2248dee26d4f39317318da595f69d
SHA512c2700f78c2e3f61be7f5497346be3793115a2af198d36ca2a65416fdeba2b76b7ccc4e78465322434370e2ec542c40a182398811d5e97834d3f006f07786da81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a20595656273bc25bdf09a27f12095f4
SHA1df217f21678441d9362e038224f8d41317c5fe58
SHA256ee8e9cec35a0a09ef1208a9abded626c62322d61588a67fa354e995871435349
SHA512cfb7319a8128ce8bb4b2a492366819d371aab90e0679877303ffce58a171ced119a93a89b737abe92c07285ece8af001459d9659a2e94995cf676de69dce1e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511dceb751f77372650240aa108c3e233
SHA1e5581857485a0cf276f433c892cb52792b928045
SHA2563c4c5246a4b858ab9086aec86f98105ca84cae04f3d370f7c0a417c7e4690dba
SHA512755a66cb5d13b01900a233ab52194655561fcce9feef5067e08e232791a8ca3ab32619917058497746620ed6a6bb043cd2fa91609a50d740971dee09e0557f75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5918e88fe4994f0bd5c3c9bccb74427cf
SHA14a9b5e7f080def6cb9c46cb11b415fa6f5c8039b
SHA256787d2f12e61417401f4510b73e013731c356de674b248ad98fc3b346c357c419
SHA512be45203b1a9a96a5e013fa0a4e0933d57ac1849adf45c2e928bd2d65be074f9fee05d3a8bcb009697bb7a29a8acb7f27dc50e7340f1b4505c52efefc21f630d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516f349e3d28996555b6f67e61cc2727e
SHA12544f274a7216bb00872fbec46c3e188dec0ad4a
SHA2566bcd4b1537f2ad54f8d34e6afab959cd8df00bccef0bb8263348fcce138c118a
SHA51251a8e5f59918ee6499c165b2620166e89449fd51e49fa21583350324e1ba7d4edb79a746d36a214f83440fac41aac957af1fe2e355f526643edd8f5d67a84119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb6c0b956dd78c43096179dad23e4ecd
SHA1c1fb6fcccdd1095674bf7cd9964a0969521ed5dd
SHA2561625e269909b09138345ac9645ba5aad4b3aa88b078f0f20a66e4621e16401fb
SHA5124ef199476ec621356040ac369bf4d40a40d33a86d47c955c25643769adbda335a0703c9e5a816ef06d38b2dd98eb75d374e1ecd86a6c749a108afef1b86c6e09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5980c0c61fe19863f7ac593b1248dfab0
SHA180d2a7327efe275fdc6cef27e4bbd840e0ffd393
SHA2564bd2691805da33428185d16590c3c9242ace1753e4053e2dd449f9ca0ccd2934
SHA51206c92ba0041ad526e5eaa1a5e83943c492c7318372f278f979acc5f4f6a83a3ff75c87fe8aa2698acbf032b3adf4e0cdb5b8ef93b57facc6ce480bec0b1e98b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d89de6b75b31ec7011c10dfff0eb1a5
SHA1e713cb6aacc6b60a49414c212a112455334c56b2
SHA256d991389a1b41dea33232e610dbbd58908e2303e565e3eb810559f6ed927b8eab
SHA512d1033ccad26701ecef7154c990af9255434d5347bbfa32702f34f812458cc426267f5c02dfe80da6199effe88f1568ac57c6ab097964c376838f1e67892d4c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5a370e8e99d2f031d5258f3ca44c446
SHA1d8b4c644bace8b155f65c03b7d63b86be6f8acae
SHA25631021188321adeacc5e048d1d0cc07069904c7d3ac25c12ffbe611c87109d57f
SHA51212284521ff9565b80892c7b37de8fb196bcc4dc77e610cdf0997d229264a77289029502e04b24a964714b950471f199a4ce0da5bde34424078adae6557189242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a06479e9974f495925ccc36b6aa0be76
SHA1c5dc5bb2822f0d8c2adcaabb00e85d9699090e85
SHA256bdfea5088bf38a42e4f91413c2336ba5e985e04ffec6accb843ff18895ae52ab
SHA512682ece6e5c21e8ecb9ab1f02d368a8146473cbecfefe83a16f1fe597f7bf06696d434471b64e5adb127b9c641c2beed34486bfe589d3de431ba1b89576de406a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa9c321cc4fa1ce92fbf48fa37b289e4
SHA193c2d3a815836b74f35db3bfdd0efcf8d3dca77b
SHA25669d75f03553410cba5acc1e7585263171cc0c7655ba83eba66954df574e29847
SHA512e01fb2e001f8ca63f39306e415d9fbb2e6bf82ca0e10d4b26f21ab45904a15e379f882ca055621bc0da2246d7e0a91242d49b3c18d7484e0777bb568ad68b5ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fecb6315fe7f422ab9a51a3686e7c985
SHA1c2ebc947e8c8969dca3ff9ceac1370054eb3761d
SHA256d04338e231762adae2a595ce416de6eb9d378d060b13e20f98608fb23904c908
SHA512885998f444ae13fde599baef66181ffb6d8dd867439043329150bea25296655d47d5f9e99c90a12a17651e6062da520ef121d3cbc8e839cd5c48ca386604795c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a374b3f49682f665858a0e34da719691
SHA1b639ec3526ed687570ae7d8fe2ea3117e872b01f
SHA256502ac7505c805c8ab28d2f04d67c739f806c2619f39860a6f42abbddb867c377
SHA5123fbc334816e67d381d3cb96e7c53bbba3bb84095a90bddc5618320723bcbd59669855456fa07e10134a332b39fd28f50fcbb84847e65a24b6771dac52d99e5dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58415a2da503e8de0f3c1a56c93cf2481
SHA11b594ad6ccf1080a81e78d6b17b6ba5821c11f18
SHA256d70c293f7c66de38372a39a38eeae709165dbe6387e966e35a51bf1576437550
SHA51208a9560b7cde54bd088836cebe9a2493e1a713bdca42f5bcf5056dad5955f48c0ff176aed1c5ba2e15937802795e78cf13424144b2b559c6ab1d74a04e7ef7d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0890ba5ae82d5ecfe4d9741266d4236
SHA1d9c4df405e690b73f5a16243882dacfe9ec2aa0d
SHA2561b524c7d3c012f2ae74baa48fe59cd6baa09d0f3045114c6db207803b20412fb
SHA512c625a0ed32b691630d07e2441ca554959fff80e7eb21861b7adc3e537a9c878767c6180f0cdb9260f39ddcbe3c24c3ca6fed70ff87d8a58e3f6e16dbbc504bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58db338eed36a90b3fc14999702afe0eb
SHA12a5fe5ce7902477a61231fd49ca61d355ca6e4b4
SHA256b57bc45f9b1a85611ca43f46d2a6c007e434df0697142b2275ab3b14dd151eda
SHA51262f99bbb034bfb3d5907f7474f97946fd29e15bc87caf13053bc348a90d650cc3266c53132043da729f255e6835d3d18f37b59e6d8c08f98ce00b2dbbdb7b30c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5379544bea6c31bb0b81667a29821d5c5
SHA1628a8dbe4520a7f972616f307dcb063195bc854e
SHA256ff195ab85d153a61a87100ceb781aa66b149f53d3b08133b1975eef9e87503b8
SHA5120260be2268b1dd01011c87b86c9a7d90bb0c95ef3bbc70b27780b840c48258b4636749f069e52b1b65e6ac45044b1c3eacb3516e16525ebec0f330678fb60598
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2XHJXO3H\js[1].js
Filesize46B
MD5ac946a4835a75bc54fcfe718c372176e
SHA16d1ac65e9393d5b8652d22dd72ae1d2752a4abf8
SHA256d731edc8bfb413bb22baf7f0f1bc42ccc2990b7b15b148b5a6bc8b45d29d34e5
SHA51258820c7f223036cd1e8a6837f1b2b4fb9330944730e5127ea0035fc8bb554240bd3e7835c0509fdd0f8c6cf84373f4fe8a36f242953a42dec9a81105d2133d38
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a