Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1565s -
max time network
1566s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
login.html
Resource
win7-20240215-en
General
-
Target
login.html
-
Size
26KB
-
MD5
c56e1880284cdc965af37058d3406f09
-
SHA1
e905993c77de63c4b01d9540256a1a88187c1b30
-
SHA256
cd1f7d5508a53c35e8a1ab01ae993df732a7e556566b9132fd096ff98ecab21e
-
SHA512
792a2800e8e328395ea5bd21ee67cebc328f33e68f6c2dec97239f9c5727399194fc4d882ca6abc0058d56ac5fd568085d5a16f1e5209418ba2e171ddebec840
-
SSDEEP
384:CCm5v477sGGzK+TpQn7M9cyqy/f2f/Yb6WiZFuulffGfMflmz3syZj5XCqzGX3g:+/+scm2f/Yb6Hbuul3UWlm7syZ95
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 704cbea35b9ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000b3b79fdea3648297750823e7563ac49a8e6ecc2f99cfaf9c72cfe209440f3c16000000000e800000000200002000000010c2cf01c482f19041ad78fe2b3b9f73d06a74c0898613edd3cb7b8e222442ff90000000f4dbbde16bed914e147604316412030319f261a458f419f819a0dae7b8ffe6e88b51223562efef814d95fc81ee16d3090a074ac129a279e10936180354894374089b1fcf03ed17a68b86dca30de3fc0e4cae3d3d7939c964e68cd6c4d91181fde5eb13f0b93a59d302607622f8156601631a2f15b2e4f3301f861ccd42c55a08e743924364c35175e1614fb758c8b1cb400000001a853ed2f222a031ccdda244cfac0259fbd52531ae47fbb4e21831724bc4c7a774711129e33e1a0fa151e18fa1e7038f19ea67b71408d07b972e9c4d0ea3421f iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420573969" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF123F31-064E-11EF-BC03-E626464F593A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000a0dcc7d7d974f5a86a12e15a69b4db002d5ffc9c3d4c229a50d609349278ccfe000000000e8000000002000020000000643a4486f10c129dd817c73b792ace82ac74d5a30899812a498f87f36dfd7e74200000001d13e0d5e76fae12fa2f6d0cd4688d40f0a6e035cb288648cbffe2b70445d5cd40000000ced5576717c7488e64738441d51383d7594837f8ac63ab7ac5b27781c64d67d3a1aeeb330e2d88af35120d21ce87c0540d0d09ee868f8e3f752491492d50a35f iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1888 iexplore.exe 1888 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2924 1888 iexplore.exe 28 PID 1888 wrote to memory of 2924 1888 iexplore.exe 28 PID 1888 wrote to memory of 2924 1888 iexplore.exe 28 PID 1888 wrote to memory of 2924 1888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\login.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a7fe47d62db6b09b15120b98a3779e1
SHA11d69988608693a2776f03bb995d569a71ca3d591
SHA25640427b79fb06c98a82400590a2d277ab809116c1eff94baad1f17149742b4603
SHA51253036bde17c8322edbeb15fe5094119342ec5e48ef97a62b55af639f052124a5de4ee2dbbb1ec161b9ce9de584f8fe112f03faa991af329a93c421d2247285c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596a1ddf10844039e3b02810488b5114e
SHA1f5e2f9010cd23ee7dc3d1e80dce858aac5ff621a
SHA2569216a7a73098bb2e66443c3de2eb7a3205212e2140c540d5aa9bc8625d1d1ee8
SHA51207431c37043fccdb1d923fdad6114beba705c37e81800769eb29e3e7fb2a74fa7455ddea412eb9407f3f4fd68c6370f55c562add2e05646debd93073fe1bfd58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5031105529b507e48ab2a7d4ebd6e4d5e
SHA16083a62c6bd1fbf654c96be8a12ecc63604a49f4
SHA256df1f17eb9e970c201f749f4859a206b46a9b0a56086b45f2ee9405808bcd3e58
SHA5126a3ed1033da015a77b3d6edb058dd7aea26992e307e278d575da8ce7a9774a3808e1bc3879f969250b58410aa35860a72bcb5ede47b218ae193c280875245cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500a99e179158f2c417cfff81d0e3e76e
SHA1b417220fc02ffe18e50755ef311e2a00623f4688
SHA256586f0bd7ed7eeeab595554acb817c2b837b32f5ff58d35211a68e49a8393570b
SHA5128eee5b7054090abff943d47199651b965c34372a9a0751d7c4b46ff35f1442d66a535f97a59499c26e998ba3157d52e93a547ca0d61876246fe96ae199f37f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ac2a32acdfa42e52e06c2a5f009dc30
SHA19d4db8d7d9c34ba1656c1dfb279af892aab0b429
SHA256cdeba2608579dd1cfae88e52589433128a8596dbff9059dbeac9375cd14317dc
SHA512586c0d9a5538aba1dfc0186844e20e57cdca303ca521f8e33404d2b828ccdea3676d1e28b2a2414ea8b39881885e7aeb963e744b15a15872f70b9873d23cc82a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535262f8230c8222a3dd39694a0e5d4d5
SHA132dfbd2fe0cefb1c4fa712d0179f26134087a000
SHA256f3bbd92e194fef5b8b59506c4ce8c776019c613b675cdd650607cae60f3c3742
SHA51221ee4b3cae3e17463fb35b64567830bfbb7efa45bfd524f857b27787ecd56285bb5bde0831779b1d4c0ff3de953ca4a9fb361d8f1af65eaeef9850c4946763c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5089a7bf65f1ef86cbdd358889d17c938
SHA148118257dd113ea4d9c5ecf67fb60c13f731b58c
SHA2569b909d8f314e15b7690aea8b1dba1e8fd5ef8f0c422b585e0d653ef34050841a
SHA512b40d0b54a3e8ce9c42f276b6296de5886105c62c97003b86193263c34dd04935f547941e1d1d5cea0e9fa2fc6a9b6a68dcc493a8388db693596cfe156ea1baf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a89023009772ee9a7a4b47ad36c6a7d1
SHA10f979f5c68411d048d27c156cc926fe7a560cfc0
SHA25643d98abf783d4444db4e465903d2f023c59f828e1d82546874483b5eddaaffa6
SHA5120a5016a5b0a587a3578d07be7ad51bae0f3e5702f6f511c67813016973c33596f86f919b57e404840336d68f54ef82c776add111cdd6b59c6b9c1c0031f4737d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5236be85ad45a72142ad00cab460c75a9
SHA1172e6736aa2d9c4a6d069a333f508cafe7231cfb
SHA2560b7ad7b76416deee79e0eef00f200046ef2349d5664b2d3c639935d278f8b415
SHA51231ef76d7d5cc93f615fb7535515418f27c32f2f4508e87d159ef7eade925c293f0377ca445816a7956298132d263cec03e7c83b547ce07e5b0705a745f683d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583979d69bcc1784f2a1893d2319beb4f
SHA14184e0d055a5d5b201f9c95bfb950c8e05379840
SHA25676af02fbf314ef50862336efb4bb46443c5a6dea40ae95c3d3662c12d5db36c1
SHA5122145722990f895586d4062a30ff9c9976ee0a20f1a16bebafac027f7bf82d7d356fcda0484ff335ad8972128b6f79699214f4bd088b5f06c7213e8394fabf22c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bebac97a59bc7544a3bda6280fdfd372
SHA13205cde6120d68ea8014c852d9d19828d923b779
SHA256dafab1cbbc5b2355fdf00ba32e7b03b2a47082db0261933c7e3016898349ca10
SHA51294b6d864e5f37b75622e0843f972bf87c6b2834db5f04df90b59026038b214443685a700083a8da3d949e0fe5ccbc6dec3f267e737743dcf6f2d9835f5cc7d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5115b494ede7634e8ad9e750a544c20d7
SHA1de52fb7fd72185e455b2899b1accaad2456831cb
SHA256e0c5c5980afcfa79130b3971b1a2a2f2423fe7fa6be319cf1a5054f750e82091
SHA5121fc060d10d582a54a79bbb305a04dce50ff68219acf347cd8e4c8a2feec1370eeec33241948ec121a4514662611c79ceb5eb7c62d680c5eb7930146acd8e83c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d01ab60d52034d3a32f8e9dd0c62cf58
SHA19c320b3f2e9805a6a3b9dfc3564645af01c49ef3
SHA2567d3ee72fc30d1152571163f575a5df44a855d8f7f657c2c12a7ad58322382a98
SHA51204eb9f76cb7b968774eef76bb7dec9e88208057b6e4607edddec3c02dd1db4b997db442c9429fb1669ccc17cea9e523868cf94a11afc30635cd9fdd27cc3e832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c74849ac47cf9cfb71373e929cfad37
SHA1f114836921291230c2e6135d99eade71e5e3b751
SHA2569a182e57ba2cf93fcfc02db22c9d8aa500f502d071bb4fd3401eb1f6f7a95033
SHA51215b3377139f95c7f3e26d3c38a78893dff79baaf372575a6babd42569f7fbb9c390ab7a24e4a3583793d5ccc91a0ac1e0cd07aef75fe8ae9605ee0770f2dd36d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a319be8206729e0f23786e5e628fbfd
SHA199659abc6bff6a27d06a0adc8c6bb430fa840323
SHA25685c9d0f4dc01254bc80a8658057adc01aef26922e9994751efd9b76bccaf74a3
SHA5127fd89eb71e8ef7475ab9c0ff99fcfc85fd7b5502f90e97db8b8067953255a97b447521293ca97b025ba62168754cad493605619cfbd259a618dd470ab902193a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52997bd498c7c1109a3a14594eb9edd2c
SHA1649b7ab3def989db2dff568c138a6d0670fe91f2
SHA2567c757afbfcbfeed191e3c73a19499491afc9e9fe85f0e43aa45025b33a8f6751
SHA512cccf1ea47d018a8ecec64f97cd622d40295b8498ce8b7cb84a56719a87cf6479fb7fbd3565c01f7b2918c896443add7ff34a1cf1f3b73a26f9404bdd50eaf4be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5492b7f576c0bae8b7e90636d2abfa86a
SHA1a01e6b64b9ccce647a26ab984d56ecfe1fd1581f
SHA25611c3bfff84751c5eeb4bdc218df1e72bb6a65fab559442247d711f4c2ff2e2c8
SHA512070fdfa0b9c5d0db0652cd792e94da52a9196b276a0faec7aa2b883c9cf1796e21d2e29cf80998c857b3ec1449ad162c56dcd2ffb043bd42677c8339f0f55960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c4aa7e6eae11436e28d88c1e1327852
SHA1504774c8b88f801c2775fabb01a4a28b0ea738c5
SHA256471eff7c500ac374e51aea249c986c4e0130a4f8f63a57c4e73dfd8e97e4ee2a
SHA512892c09e021d9f4af330ce4db4ebc968b0b4355b482c19ff61da6f3f538d32e5fd7f7afd88adde30f53909ccd21923e524a59808dd08eea795fd74c5ca6786940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0eb3df3b71b03c2382d9612fc6f88b6
SHA1f95cfa1b4a3ebb51d76e8038cfec5d20e9bbe666
SHA256bde294ecab0af0f1fb5c7d784b3687f34908e5e770f4ae945a0b472288f2a5cf
SHA512e2e049871dfb19b045907bc8c03199c43898c0fce0d6da49c1d06b80355950acea94b0f4e7d03df23dd25c8f1069477e3be51fde663c82cdd9272cfbcf8a8393
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a