Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 03:28
Static task
static1
Behavioral task
behavioral1
Sample
7b8b16ae2451e085a58a3a7bad419aaa_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7b8b16ae2451e085a58a3a7bad419aaa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7b8b16ae2451e085a58a3a7bad419aaa_JaffaCakes118.html
-
Size
460KB
-
MD5
7b8b16ae2451e085a58a3a7bad419aaa
-
SHA1
6bece888863db91b099eb4f2cf8526b10c147c78
-
SHA256
1fc2317399329a32526b5b6fd11a45967f630216db049139fd7c6f905d1b2abd
-
SHA512
a96d67901b8afacc7624ab17be75dc6fca82b73e350c2e5031d0682e5495c20554464c69c6973011ae8b26db3a1685c780284acb6e3ee268d3a3e10ffc0a9938
-
SSDEEP
6144:SBsMYod+X3oI+Y8sMYod+X3oI+YasMYod+X3oI+YLsMYod+X3oI+YQ:C5d+X3E5d+X3G5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e1db43afb0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423028806" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000006bb0fc38e28dadcfb0b7e7704b58bf12c5afb280206ab41e79f63f0dd88f5ec6000000000e8000000002000020000000122025d6cda179ad0ef3074963781a86dd0264d80270eff7c6c913ebeb3f2525200000004094821aac76414dfbdb242ef4f754fa8760a210a707265f4c338549bb62ba4a40000000bd5a7408f0f3fc2cdb3e14271f347c1309d09cd568da72c943026461d3540f2b4ba63eb8725a2502df7e12b486375f4e53f348410a5ddaef3a24eba151ea701b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000961123b2ac10e06c4010e762db1f9a03e0f533e6ebe2219cc7d9930059a012ac000000000e8000000002000020000000e2240c69d1c9c0d963c0024f3a4937d777f7ae9aa182d51a5394c7cf401d5e2b9000000015db2f73dd5fedd94d663d44b2b9ac25a00fbe01392b9fabaf1a9e71a541301d8deabd82b0b65ffa894c53f9e2c5d0e94d9024ec81f928f6d41bf190804f07e2f3a7350ddf7963e241a8e94497914163fee7a541013dc85955b7f5145cee3a02de28429b217677a5346f1b31ec42bfa4c63fb4358aaf86d0e9a6879dd1e0309175a9f66d39e3627cc1f271008bda1184400000003a0c9db355499298afae202dd76b17b9bfdc1b910190bca714610a383ba3385726a0df8c3b14c74ec2f134a267b1c760b85d164b52ac22fa7f91952ab5d43ce1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B5B1E21-1CA2-11EF-965F-FA9381F5F0AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 1704 2176 iexplore.exe 28 PID 2176 wrote to memory of 1704 2176 iexplore.exe 28 PID 2176 wrote to memory of 1704 2176 iexplore.exe 28 PID 2176 wrote to memory of 1704 2176 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7b8b16ae2451e085a58a3a7bad419aaa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533ec92d01130fc11b4a2cf8c295d69a6
SHA1420286a4d3ba4ad45c3356f51ae32e491fa3bd73
SHA256cef548238bebde1d4d7d35f31cb320ebe044d181d61e0d8b2789b1f4e37ca936
SHA51282e3942dca5f5a80ac7b9a4fc00b94d7ea620ceabbc094f1bf2edda5276ad8850a205070bd73ae8ecff02f58bba373b2c31aeb00991f9e8949b738894dbd65cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f18c2b6f208dc01fe16384c3d32c9d3
SHA1985eff564d019b9299eab0ca72b19c25895977cf
SHA2567308d608e6f8d21f2787ef990b3a073d427e6a5278ba257a0feb62cc8547d690
SHA512a2e2c98f1adefcea8786819ecd56ca5272905daa0773d1f7b3f7eb6e32602fc7b20818394cde993328bc44eddebbf8353ca1e3786400b79bd8a409b767a225eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a99d152d63f0d363818846396a30e798
SHA13840d16141cf1d1864a621196aee418c164b86f5
SHA256b542ddd8533253fb1f62ee779e485ca20259378e8576785022a05e9e015655bf
SHA5129ae3225c374bd396bdb37818508d0dbbe825ac11003f0e543e191ce1d9c55af446e4288c55246bed1f5f1df263ff9a37d8606e225e8958c4280817976c0753f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559f3b557740328c811ad5cde51fee041
SHA1f8df3fe7ea5677ca9b420ec5d81e28c335dc320c
SHA25668ff2d1dc33a8830ae9093f9af4bf9b0dd23eb8a138e9bec0229ffeecfc89bd6
SHA51255e4df3b7133f2b540146d2a0028a1b2754a6bef97a89e9e41aaabf8c6752090af03ee64a1e1b2172ea20899b28842cd7eb58fc9b6b04af988f3a718afa9fdc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5000ecd23e2cc230d50a3f2447072c15f
SHA13f9df4c5be33f333dc91302bfacf742d12099204
SHA256d65c09f895de3f30da4aac6bfe7b9b7a8d8dc45f6daca866280378565a6a264a
SHA5127c61c1ce5b86f25ceb6a1907dc9edf0d8cbd02e6152fd42e0b16cfc11dff0a55be85971c84c60506b00ef9f2750ac6401346f9493c01b12d7d8c6d9cead93152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f5981ae53fda82ec177f98fee907b36
SHA1374c340dad14e07ff330961720220f386469e5f0
SHA256ba45dcf510869c455e4a3c3c695cc57f704eda73e53d78d8a473a68242aeb9e7
SHA512274e452e047ea2eab41f9ebb83f27e703e155af1501c8039867adef50252e2aecada540c41ffdf35174466e7335f6f4c58d134e8fbe420e97b71b5e8bfd7af04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5597400a442af03c34c2735b4b3e8b27a
SHA1bf1ef912983a7dd0096c2f51220a3e24323cfb6b
SHA2564c9e313fd5cb1da51bc0d5b914800cf97778a2cacf131452a9c47c5103aeb5f6
SHA512348e64e58c3118ebc59bd766c60328e629d2ae938270e22e0a9072f090cf8b2e14a3519fbd627783df0ae72a194f7d8f30d1ccfe761edbff8fd7ddc6e04df1af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6fd29644e97075eb3637aa61dcfcfd2
SHA1df25b7b3b82c56fe0ccba3d9a0374c80e8cc3335
SHA2566392b7aef1576ddf8f198a24172cbf07812f8197251483b831917aa20bdf02eb
SHA512e54780c1821f849cb487858f71f192dd842f7f4b01a034bbf1cb0b71a4d7631bf5953ce398733fab7dc3e772a7ed24f30957c16098285a17858fd9d244e3215b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0b5361036ef257661c35c8ebc42c511
SHA179508e82e13170a438b133adf00675a2419592eb
SHA2561342a9fe9622b5206668c94040d02da3ada958526fe02a8085b2e36507261290
SHA51200c3626b2f7cbca98fc402992bfead24747074ed5d9d927a98a0cb78ed5b8105934efbfac767005e23e349718d11903421b01be44cbf60a695758a4446c93046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5121ae17dc5082a50d7819450d1ea8816
SHA1f98099f417e159d7107b4752d3363e31129c82df
SHA2562893a4630c1b03002ab6fcec4f8e96240cce9ef074b9525ae27804bbd88a2abb
SHA512c720ec62c0e8f2d1b68b1fa14cbdb2fe7e46e1525ed8a8babaff6e9f61c50697ffaa56a89f0e03ebe773a8fd8d45b32fe8efa732d89aa53cd2d68afbc25d2684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b1b3279e4d557dbd7bb754d2a045019
SHA131687e50380c1d1a109d9ce81359d1fd14667f03
SHA2568382dfe2f441be71308bd7e22e0c8326af98ec94fd64f53ccca32219a9a417e3
SHA51257a34a6169ae31841651d861a2fbf0ac6f90949ca1e64a5b98e4891b0f7b05ffc8fb876bbb44952f608748b84dc8ac323fd4a6adeea39e30fe1c74230c9c0634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed4c5a6ff1e3489f1128497a1351d28b
SHA1c94ee94c481f9dd841ed1ebc50722b266e0a56a4
SHA256a80a9fca962ac497126534dca987f80f9a497b8077fe85e4fac16c385c81b40a
SHA5126e72d05b04bb129fc18cca9f255bfa6c4d27aafb5a93f566f85b2fb4eb0e3b35359a1ca5e673c2e830143e62b1db8f25f1aa84a741f9a742fd8c454d319f5910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57904f105303c293bc1dcc154be859dc1
SHA15ad5049790f76409e44bec3afc77533037f50d02
SHA2567a4c3465f1e6c5acfb5401463f4a12bf74a8b5cdab0a1ea04e8a806d11b418c3
SHA5129adb262072080784f0d82eddd077df08647aa807f4681063e90d3f67547f1108b0084b4b820d525f7ce55ca7084a00c28a8096fa4dc3319fa6587b99e6076fc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51774732f42e9d5a8c17b2c6bd45bbc5b
SHA14db1dd212bd66d098760502eb3040c514812a8db
SHA25667296adb3812e930c4ce651217edfb115c2969feb1a438f922a28f10e0e16e2c
SHA512e4532cf2da8359ba82f863ec6bbc4d1948ad429af19dd32611d5800cb49dad845ad67945c53f249c9259f699badf44c39acdef4636b61923f8af3424a2b307ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577002f9282c71c2826eebe9f080c4f77
SHA1874c0cb767043144b45e539c645010365edb21ce
SHA256f2457e952159415e713628bd1edd9f8317e214a0d88c2fafc26f870691ebad36
SHA512c6ce3c98bdfdc02a9f4ccd044247db50b691029948fcce56549295b7c4454f6c943d15d08cfbe7eadfb7a70b19cf22404af24f6f59e280a7afef7eb32d823c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547682f372ad08445976e4afe6b639940
SHA1353895f601159ac4419aa9084c19e1ad5ab0babd
SHA2564ab8c46a9621f67a5f9aea8674fc439223e2ad6137c25218d4173d0a2a1287da
SHA512149683b05242127095f119ca7ff6ccd7e5dd7d021dd821752535a231fd5953e36917eea3f7f63874d7b6f6674eda9ae763ee423dea743a0e51967ba39523958e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5367841c7eb64f75b088e078760f6b2ba
SHA194bf69dfc909eba7a88fcdf183372067529e73d8
SHA256fa025bf4889aa8d3e9330cd7fe19142f5d0e744c784525879aa14e851e12c19b
SHA5128593ff10402cf75b7e2d1ca9fc5c94f1ef7b76b909b31b3aa3eebe13374590ff7e203c3102c0bd08610cfc97e2e5073302df5cf00d501c6ef492f5ed2a34b4fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce155b9f7800eb99655a5a71f55db9aa
SHA16c2731413504170709efe7d5dbf29ab2ccfb48d8
SHA2565b3b8f8233f102c44da0fef298c69530c6e87fb7fe1b6754f7cdc7d8a4d0afd9
SHA512d3405c05ddcceeada67de4ad329c6e430395bf7f4166d1fbcebf6c421d5e84408ba4803c5d1cd80b9f27b076e16f4c729c8ad95b6a7e98a69ee7499064375cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5d47232e08284fd9314d4e2ea1a9e88
SHA1dd959c47a8f712b22de77039dc93a08a63e18e58
SHA2569891a1edf32655f39243c2073a5c14544fdf3326e067a7686728b18b9da909e8
SHA5128ed556ffd8aaa6f059143ecd19fc111b47306d2f1c90fff97c696a9373e7e45d6a497c831107274e21e141642e2bc0d876abae41a5efd67d067661fc3da557ab
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a