Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 09:00
Static task
static1
Behavioral task
behavioral1
Sample
16eec5101ca0ec6dc7f76590e146611c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16eec5101ca0ec6dc7f76590e146611c_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
16eec5101ca0ec6dc7f76590e146611c_JaffaCakes118.html
-
Size
2KB
-
MD5
16eec5101ca0ec6dc7f76590e146611c
-
SHA1
e592034e4e6a549ed1e1d53ac1e95f09f9b76ecd
-
SHA256
d9c4562143e0d2daa4ba5589b3630cc5b1e80d8c4d16dfe46c87aed00e3daf70
-
SHA512
a2640e2adbbc426c50829eb5b182d35c491563bf6ca1a73758ab097c3958e634b1560175d77277bc5811611aca8a8054ad5c9d913df2c9201a50c2893c6c5090
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000022ad90f351e57e132db07e611eca39ae8e47a7134e0afc3ddcc3c65d58ba32bd000000000e80000000020000200000005de079e2b0485e2b66280ff2830c2e4cf732128dc070527081aabd427483fa78200000009381036fb6400838f8c9a8b129a7eaa98632203bce1749cc89ba889f4bd2be654000000053848babe2d352d8cdd1e0e36d0c14e7d99d6f0bcf46e755b2bd2464170b40954309ec0ba37bffc7ed13d315af3e0a3d813630b177ed44f25f76a9e9ea574a2b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30533cc8ca9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421061509" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F38A1BD1-0ABD-11EF-B238-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1040 iexplore.exe 1040 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1040 wrote to memory of 2936 1040 iexplore.exe 28 PID 1040 wrote to memory of 2936 1040 iexplore.exe 28 PID 1040 wrote to memory of 2936 1040 iexplore.exe 28 PID 1040 wrote to memory of 2936 1040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\16eec5101ca0ec6dc7f76590e146611c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50e4753b58af890c646057357ead0d7eb
SHA106841fe9709b198968b99442773032b2fd443603
SHA2560504ef14d00650928285946d8b5b52fcdef7650ef09306626ea1e7686a1898bb
SHA512d167a7f0459168ea856a7bf4a1c9402692e5a00425bb44c4baffcc9382b62ee1e4f6ec1f3d86280d1e68ca2f7e926471e7cd051b52742f3a436e3dba9e744c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD501217080b6f78bf56271733f6b8bfac3
SHA15b8aa289c027950963eb8ca8b2ca381843777333
SHA2564bbcc2d8031dfb18b3b06a47e370428028ecd932164b1ece713f3670dce151ea
SHA512cb033fbd651cd8d83fbd21b32b452b568b4bf6bc6117c9cf3831fbadfcd94e7cd632240b08d0729231e2927db803f236b3fc0e099028636a30a625bff94a30b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD550f32e9fcdcb8a4c5b98d4c1c65994f2
SHA14f0b0b9755eb713d23cafdcf33ac4adcda4d6949
SHA256093ba2aae55469acfe6ea130bfdc68736b7f9eadd96901687ba658db2fdf4b5b
SHA512302cfaccc1266624861d0dc097d81a53575060916fd3767068c6298a44db114ab4855dc8a502fd0a5635cfb3c93892d8ff5ff54a3432db5604049871e13c8536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d6d480ca2e0308f239ba62ada965aa0e
SHA1db668775a6f5b2e006ebb771e3cca2676315ed30
SHA256e3a6c409cad8dfa3a32d02a3a230987a4c3cb9fd5218f73ac938a53b0dee31cb
SHA512c6468a41321a40618d59fb6fc392c09a8b7bd446468453ce416d050f82840300c601c2c0441d03f0d9b98c66d6f1e63a83b08b794482241a6924c3f40915cc64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5818d87d70c2b1bff84fdeef8d2c6cffb
SHA1830367c2284b010070d0d2aacf185c28140fa021
SHA2562409b46741fb33e9f155e923f5d2d44579c68f65f992c6dc1070f2aa385c4d16
SHA5128e5b7bd79c6986b9039a4974b74ee0d3fc872510fedbbf68e61f8c0e6bbc75bf679fa8c8e731ed15fa6490c9b14b0a2352e9058c2d9dbfeae3ea5a9a38c68413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f83e0d6547156481d9b4dcfc79a8da99
SHA1f4397818cdf376d3ee86db3c5f9e4a69f8d52464
SHA25682495e9221867ff1d0d0908e2886d9f567b89280f688ba213dd9f1799e31f794
SHA5121ba7787055c809cbe52479979ce5078fc7c84f17f53cf71113b234336a6592c2654abf2e89b8bfe03c0552b762b9bcd05b51b55ffd922eff30246ddfe3207ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e0f1a632cc7eec546bf4aa39652c43ca
SHA1fb5587eba116f8b25f05e1df6b5c4300142f7b87
SHA25628cf794394e7e2e976d5368617255a0cf10122a6920f4ace47571a41dfad8ee6
SHA512f59a4f058fb97dccc71cc52cb0dfe420a8bd1dbcd5c93c2b597701c6317f84c42c5eb593f1eb81ace602f0cf1b9f41b5028d80e40cece227f4970776428ef8a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5695c7b0ee5fae7e6f2ee6783dd7f3ba3
SHA1926b93d06577b251f1a449b5fb2edbdaf3676af7
SHA2563acf3b730a0c18a07d850510dbaacbc9c31659d4d2ffd897cda24da0ec8cf123
SHA5126f7f2c0989656eb03aa80a0b42d6b27cbd6f05da263ce892814cbb2781a7a4dc26d4b0322857986c21290189204140c76dfb9eb1c41a36a2c45cec5de03cf19f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bf6d733acdabe7aa2ebce901f4806c1c
SHA1075b313b4d2355d3df3de358a35819b4b103546f
SHA25633fb30d39baca7d872f97d7be60f066ffa595a6e09c797729f7c11a7be54d4c0
SHA5125a79777d1f3dc0165e53d4ca5f29a1ee8b1552e9f963a9f7c798b1391e1abe7aa1fe958c78e8b055e1283d229069d8e3e09c0bf52556556d736657391b1450e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56622926fa140def8c2e60c0e78d11b33
SHA1d9d9dddc332656a9d57734075da5561c69788498
SHA25667b4e0c77dd275d6d2a2a97f5c75216fe1d09a01b1ee45b640f317eb999b9f82
SHA51267745122d688f2bcde6f92a17dea01243a4d66d1b64a7d9cf94aa46d1c24a289c40d2c5585083ee242e061b5ac3367c5b649c38e29c78ebcd5b029757ee9867d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5528c5574327faa26ca4a0c124421f86c
SHA11d767e17ef126cebe00271e33a6fc9a2c1badc52
SHA2560fce78cef899fd040af336bf6660cacc837d7cb6bdca1ef78427cd407d14eadf
SHA512b8d952a6cd734076e933bab1a1693744b378d7a0b8a90bb1e1e2725e8e5c889f7d195454dddc0891d3d56704d4cb7c31965e5d0bf68275beb89491ebc8aee8f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56fd824276b47f357ddda8f9b7a7cf72d
SHA1734dfd4326f19c5a9b3e8c34e7aa86f72c472c1d
SHA256d3a90d6415f24dd3764df3700a1574780b7959cba7160afa0f3aad36ae920ed5
SHA5124f3a32bf1138cb661d554d694144201a467efb10be36c42aae10f394b7cbfe46a4835431094f199073894bf572ed2a32066c88a2d1433c5e1fd35ffb1ed29cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54c3b29a60bc194c65bbad8415d26956b
SHA1107ec367a304e30498425f5f5f49a4805d8c73c5
SHA25618ddf310730fe80f823b3916931fa6776d6a5a1e5932d7ed05b62a94c1d6c2da
SHA51262fe9cb57afe8c2810db4b552f3cad81eda9ba4868e410f43bf0fb45b8afac93ee1b228e3f9b7e28ad2cf572437f7f91369b36490a3695ac9303f9052222c99e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51aba475bd6cb061438a888f0752ddd25
SHA10adfa605986052104873d6cd5bbb4dd6f92f2637
SHA25664d0773d98e51342a2da39415051a93d551922cbe7e343722aa4b78b9ec18fec
SHA512c7ba6e98bc6f51a83505310daafef69bc9b87c402f90762718b6c52ca77ee1e6e795c9c3b8d7d530cc51b9d7123ea1cede97e19157e578bb86b899ccdbcbc166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cb65daad25399ae18473316b7dad31fd
SHA1291459f11dbab318065b6c54179e5e392f921d3e
SHA2561ae29f6c7fffeece96ee9625810d514c62c02931efe0ece3241145cf07532e6c
SHA51209e0d4712cd42de721c44983cb780f752d5f9ac6ef5319e43d1908ec0c1044f1b69278be56a5dcef63c40bf57f4cfd700c5fbfa9a4601d2af3e173b3ebc53204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5899fcafa10bfe9375ffa6eb0c8ea5533
SHA1b5c0a67e407a2913c106327111f295ae5884cb0c
SHA256577c008febeba6737dbb2828897eedfd519ecd5eddf553fdd7fc731370bd3262
SHA5128782ea666a600203192138488eaffb72a87c27a43a7b2521e651bccea0dd859481652475d368c438e2e13fb2023d70c930c5a1cd762854fe4a15e049b90f469d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f37f9293c0dc7a60f707d9579833acbe
SHA16e87c1bf9991df9460dde6e2e254bbdbe30a8dd9
SHA2567f3ff1d1e3519cefc0e72ea4eeeb8558aee0bd0b5495db4eea7e9e022cdcffa2
SHA5129f9fa66f24f3f97f77175d8da1eca9c195cf29d03009bc87022ea584910af5f7554323d960b447984a0dcf93b390ec8f5cab9f7dee66cc81cc238a764744a188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5772f5d1771efbcc477abbbacb4596280
SHA1e9603b290ffc38ccb4c5fb5bfade531e5f6bad5b
SHA256ef0f4f3d4459dadb467e8aa411a2e76438b71eb5534a9b9a61bc520b16af47ea
SHA5125e7c2c5dee6da48531defb372cf084a5c7e90637c54692bb49c4238299144e1d96ba7964e82fdeae5ca0ef8c7b3420ca72a76e6005093ccf5993ffd212d43432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56e49f26c52c672d381d00c21d85eb6fb
SHA15ddb858685f03ac4f780ea0582acaca026dae80b
SHA256de89b75d442dea56c7632416a19c682ab23e27849af0ec147da68557e9cefc63
SHA5121366a16b0a12e88f63dc82c302397c280709956d1efaff6d682d108919c1bc47e607382bea32a7c1d2572315510075734ca82b7c4c20749312bfdbe43bc5e91d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5849583a147431f81f4af2bc25e92494f
SHA14b6de06205c3fc4dd5a2a3508b57c34fd4553c85
SHA25661ab1b14431261d8916f4ed504ecac245e2f9c194d86daeb87743e423de4ec69
SHA512f2f113b8ac61c178461ea2656f46f65d695b7bc62ad1ea6a08c336ecd7d9cc20110582362d515947896caad690496e970cda6f3c204056fde5a52117bd74c6bd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a