Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
11b9c1035abf50452fd3b64527a7879a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
11b9c1035abf50452fd3b64527a7879a_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
11b9c1035abf50452fd3b64527a7879a_JaffaCakes118.html
-
Size
42KB
-
MD5
11b9c1035abf50452fd3b64527a7879a
-
SHA1
b6c4350867625b7421c9e946c7c9be734f69e88f
-
SHA256
4007de674a722208e2ef7eb1b187e273890d091a5b7dbebd28b07810852e8431
-
SHA512
d29f71fbc32d1a27833e4fa956fb3ffec4b6b145f97298fe93037bf565b73d983c814a392b583e40cf0baea3581aab01db9f259354e09cdc61dce136d564b539
-
SSDEEP
384:AA9YE1l0/exMqpdvZiYPmOecstH8ed5hN3R6XiXioME/9Yn8YH5ctvc4eDJeEZqH:7YE1l02thZE3LhN3qERKoufMb/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B52A02D1-09E9-11EF-8E7B-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420970352" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00356a8bf69dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000bcde6773ab7901e40ed950077e642f678893312fedd1698b32b285f80cf41002000000000e800000000200002000000038d773d9a493ee40aa24a00ab724930fe76665455f7811d8b3a1b87d6a10591920000000e98612c82d9e0f2d4da6febd3b3b0d3489ad9cf61927814f077c0290986ee9414000000002c1059501626423fdc138405ecd5c161a0a5a323b3fc0acf70c3bd8129eba0daf2c8914e70eced392b44698ca245455e4b91d930a3274b82adf18aaf5a2280d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2228 iexplore.exe 2228 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2112 2228 iexplore.exe 28 PID 2228 wrote to memory of 2112 2228 iexplore.exe 28 PID 2228 wrote to memory of 2112 2228 iexplore.exe 28 PID 2228 wrote to memory of 2112 2228 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\11b9c1035abf50452fd3b64527a7879a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f40c8fea36986e030e4c74f378b8662
SHA1df4814fc7e90dc6544a1aee26c08050b57a32776
SHA256ec62a300fa07b7450c27a9f7c17d2178b0ed852defd5184a634d0b24dfb45283
SHA512bc5f80c73b200976ed601fd3825bf0d259ec616137ae148d33de0be9780d49a4b3f65b5b93792bf863f1f4415b6e204e75dbaade40e699f4b157a2c5755fb260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dfd88d48c81f455bff76b66a118feca
SHA1e8c5a9e6da8544607a26a62ec9bb5e570106e8d4
SHA256021b26b0d4bcebc48c17a0ff53535eee584bce927eacdabbd53e7d7288c65030
SHA512fe5e94cc585846daeb1690ee4e30f65379f052b9caa16254e0ec71e1e7d5708885046f3290dd65955f411821f5bd0ce403e726c09cc370a52df1e53987b1c665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5139885c4ca4d7da3d241066cfe6d69cf
SHA1dd5b9b435f735113ec8d25bd64d75da75aaa0fbf
SHA2561ab4a36362aba0974e01bf54101db93cab6cca1e1407958a2b11a30ae2e5be26
SHA51209fde5dc3750c70ee36e5f1ddef7a57083d9990fc7c921e00c9a972da7aa6c5af6671c04bb2d7df988e9cdf3f28b75164bd27982e1b6755240890c9693e9982e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5977caf285995cde601c4fc330cc8e030
SHA1b4d52541b55d875f9f40cd67e207bdf8aa4c50ff
SHA256c4fd5bc383d12f0ed6a06c8b269905e80eb8e21df23075297a96bb723ba0a241
SHA51211a7a3c0bf665696715eea8f5f1c833a943cc549c1be6cc504c615ed24edc0506998ec60c578ceb4d3dc928cf19cde96cf19a7b30479e1c3e7747b663c1f83f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522582537281d158514ff0dcbaf825c54
SHA10a9a443cd9cbf3bfd46639ead5f612249a423abd
SHA2564d3d5ded6e4a3b2a1829d4e5702813bd348093e3c9a847cce653d58507066d0b
SHA5123b6436e49c6dafd35dd77084866a6d83a5940b3c97b122707d75f501dba5f693945b0181421ce11c7537ee40a567760d23063a9ba184980c3a5283e1c064d153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57318306a87752b1b04d7783356d6e0f1
SHA13b86daea9025c7122ad69797bd4a97001f583284
SHA2568e9dd9fa110be164e3c7f9283b825446ac1ffb4f06957729112d2eaa1e3a7880
SHA512b5fb47fad4efe00b2792aa9696cf32907cd85f2937657c4f9f48899b658a9416a3156b1a51e60433a7b7111665d1f49b17287b82e946c4b1c0ef4d9286dfb486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ca2254c0cdc198f43dae1b172265604
SHA1797f85e336156164a6994ff1f5125f7f577a2890
SHA2563aeb51b647c6a1c0f32f097aaeb7df31913edc7e8e7149c5a2f5ea5aa00cdb40
SHA512d93c197dd58995d9a4678ec062626d9717a98e907657090905db56923f2cbedc81a9364d567f9cfd5a6c2262e461a27b844d53519b174476a6c33bdef25a8b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a44a6bbc9756dd28dae90f9ac4b5acc
SHA114ed8e3f95e5ea9cd8674f2c81922bb44fc34a0c
SHA2561f42449a654682ce0e764c922fe7320023d721cefa800286cfef25d4b15c7cba
SHA512956c6338688aadbc244907070e4de99987953ea1d2d0c43565457a3d52c145ac4ae86a8b40248d85b96fb11608358f35a0ea5f381c055ae7dc9cc7cd3601be6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdfbf63585c9e8740c3a3a7f94ad8e8b
SHA1420578b289a63c23cb20f339cc545d3a174cd3bb
SHA25639bb6fa71000865ed102082148bfa238e4768bcc4e30aafde745f9c474210e17
SHA512a58689c988a744a9a16505efdebec7dc33a8416d44c1afc1535eba2ed233853d92ebce873c5615d752055bfff25a5930dc9057bd92203cb3cb85891236a03095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ba44fe1057b78d185c78a12dc1a808a
SHA18d5e7a4ace7bb4469e5f1361c18aac7f6c97ec3e
SHA256e897c4976ea685571edbe6baf342005ed62272451197ca978949ecaf832a6b45
SHA51270bb2b505159cce03568c390f2d5a3c4b511822b98c88502aa6cf6e639257b315bbcbd0620f829a89d2caeee230d1bdeee8dab54fecf1d97d20e6a6cfc99f336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b70fa2dd7554a78abc6d9fc43df9a18
SHA14e0527c12eb7eab8d4ab9de11c9dae3ff67c696f
SHA256d270994c03324c2460c16c4b212a614db6d2495e88bac29a07e63c281ca3f66f
SHA51216c66816d6ae777b6ac4a01aa0f640d30fd40312238f65403bbf80b6cebf5b0028f38861cea6833abc4632f2fd43235e466ed29d715a6ffe728a22a417f45631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a32c437f59d213ad2b32d98ea03093d6
SHA17d9df89bbcad01ea155e9d0f18689c98739671c6
SHA2569c8b7da0ad64b2c8549c0b70a20a1b280ae5400d4bf3febf34a1a13292c8017b
SHA512c761b6d303ee2b8bd2203ab0341e81153e39718369de424f81c356f429036c5512164b51c81cd28807d3ff6ac18cfa3c328f40771089eced6c7fa2db55b33f67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a853f0d909a7cf3191de4ed96bc210f
SHA11d488e4a2fcb89a28493c0a1e741e7b3358a9753
SHA256f5be9098748bac10e52a740bfa1a107a2be94ef462b9848d2f2c66f6a68952f8
SHA51218f0e66403b3c2119866d97096229674ca197f7cf43460cf38fac0d4a00066ec518531b71baf79db400b508c1d617a291c11c73e391d6f957101511d39d1f169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557af5755dd0d01b3fcbbd75f0ed5d7ce
SHA1660e9888da50f2affaa790e0b10889aa651b446c
SHA256836159a03c780e52ce01b9f3c834d78f285ac771cc7b75171199962541a30612
SHA512321961ac2ed9fab4794d5b0084208dbd7ebf8ebec173bca9f8a85edecd8644e52dded40fef9a4075506aacc8a184b19dd08a4dc668d7f3c476aaf598b59863e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a56b2c000f4435f426cb166ab11809d
SHA197423c2a2dd959b89f6fba527aa488a7bb0d3a08
SHA256a2371d3ffb263da74e786750d6b4f22a5ab7a6d0748fbb761227f25fe7af570f
SHA512436731380aa5749e8b3b6d0f1825f0c2e2db426a3aae58e975bce22942534bd3eb58906d3c44ad72921d2fea61fd0baf7d409f52599da07c3fcd29963c7b352c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edae75c8ac5590720e8c735a05d33c69
SHA14e4ae6bbd3c077605fd2f81b706494d20e3dd77b
SHA256bff94d96050a15e9b01a77df599d01de2c279892399589ec8ce7598473306663
SHA5121940e5ab3633f00fd5323d4f2e04804bd333a1c4eaca133b5203a3e4231cc062890a0fd5b3157eae609e335ef509c50180432bf151c7df4bfb0c3ed2ae90ee0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f74acadb69dbce49a19f689006f8bab5
SHA100640aa72239eec89828693ee9fce76ba259540b
SHA2569c7ecd82e2acc1e5fab7eae9090f89bdced1253a8a0410256cc95b282fec986a
SHA5121b87a9fa1959a651deb5202cb6f745dad64830e18a6fe829ecf6044110e6e2b19f625c1d419b6d375da3ec02ac57689884bb6a40790b2fa0b304b1d699dd8b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8ecb18c6971f20005e70b3262f8eab7
SHA1f515a7398eb3e89253e27899c7a95c75df91b71c
SHA25619c8d4c4e4ae2e47bfde7ba0aa1ed9e0a9e00f2c2a2c3b87fede8ebe50ddb705
SHA512613745235dd50b00c0a78462bb60c6848c1e76e66a37b457b7d7efb21aeeb958638891e0d7c3f1a022dcedc53b55f2f4dcbf5fe167dee37ef3891cc09c30e09c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5668cc39443b57067a21df1e85f1a0b00
SHA1b782e46346d6f00614642abe25a836807210f983
SHA256a8765941a41b74cdc3e9f203e0f0bfeba2cdbb3491dbe97560ff6a11744f753e
SHA512bc629578b37ab79893f7f74e9c467ba588e7eac1853582d18b56f064d485447ebde806608930042186afda9f0a497a8209704d1becb28ee3367094b880f02078
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\cufon-yui[1].htm
Filesize805B
MD592dad8f5cf9205ec194315ea384fdc8b
SHA17dd06de49d0487cdd19bc7045d871b9ced2050d9
SHA25678184823a1fbad08c26075ee3e2d26a34c9264e39ba359f05490733f9540bea3
SHA512e3d605338895f8f54f7e2ca8da99d5c616fb21c4460a0046af00a4eaa492d52c6b4fc8c6f9115dbd65898ab407bcc60ea319e1e68d6bf37b17318235cf815b0a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a