Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 10:17
Static task
static1
Behavioral task
behavioral1
Sample
4a95c01c9c1b6526b7e01c26341e15ae_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4a95c01c9c1b6526b7e01c26341e15ae_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4a95c01c9c1b6526b7e01c26341e15ae_JaffaCakes118.html
-
Size
12KB
-
MD5
4a95c01c9c1b6526b7e01c26341e15ae
-
SHA1
8162a3cd8323602fb9cced138a9d748c09c4c884
-
SHA256
0c7721d4df55bb819f38e62a9025678daabf1c05c0afdd950393cce2eb80ad61
-
SHA512
169a1704b14504550b73d2dff67f0f9891d3a2089d03893eadbef35bfec0d0dd2a470c3f64b5406b917379a32f7d30efc0aa56030253cbd37e1f098913e28522
-
SSDEEP
192:CCRsnNSnNQY3kBkFn/NJYkNJY1lMYzYqcx4zIgmPJjEux:1Rs81kBkBwlcyzILPJjEux
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000004e70dc2f947c80156ba6a10e43a4051fbc0927a73765dbc48b5b11da74748f49000000000e8000000002000020000000917dd63c0a4d6677a5742c94a6decd96a21fd875ad965e1d9d7a2aa07f9eee1420000000367d21e59fe9ef1828bd2c9620afe164a60f5f11197ade1700ad98a6fc7594ad40000000da460f801893162aead52cbd04717925bd0a7800f836cf6eb6fb06a44843bbf13bb514d8dbdd090b96f1d78692fddc10b09aab1366854362d627e1c249f01473 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{712E3781-136D-11EF-8004-DAAF2542C58D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 901e2f477aa7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422016492" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 632 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1148 iexplore.exe 1148 iexplore.exe 632 IEXPLORE.EXE 632 IEXPLORE.EXE 632 IEXPLORE.EXE 632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1148 wrote to memory of 632 1148 iexplore.exe 28 PID 1148 wrote to memory of 632 1148 iexplore.exe 28 PID 1148 wrote to memory of 632 1148 iexplore.exe 28 PID 1148 wrote to memory of 632 1148 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4a95c01c9c1b6526b7e01c26341e15ae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1148 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f72666c3d79825e0e7f7719f91bbf60
SHA1f0942b08f7164d79c2c96817c842c73e4c4abbde
SHA256d7a562b69e77ca4f17fd9c308a906d5e052a6abb4e11125ae871b9b711739991
SHA512abfb4dbf33faa8c4407a36da54cb43086e1dd81275e4d05db5fc80b50c38628c47a1f6ee5212e65ec68bae57aa22f3114dcc14905ff2d14b5be0016c111015a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5190e32b6357268eddb67b774ba813ece
SHA151034edb97da370b1545b079d75414456ea1e59f
SHA256f5669c3dd0903e8fcb68c3d53e0a1677f0c49e09cd6df701b02581153562b360
SHA512750983ab46857cfe1971ca7748c6ddc1d8eb20b8ee4d61bac22ffbf54b5565a00b163200b002e4117b3be81101489f0daf064903cfa1275a659fe8baeb1d200f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549138e067bfc035074dfcbc68602cce0
SHA1eb5b5aa52835cc2aff192ea7d0fad8f2d47e9505
SHA2567b9e1e7d0012fe654a71ac6fb48eb5f748126f2e8f08922d1797e80398992bee
SHA512ad00c551afb49e01d278fae6c784fd475a37c46b4dd2a92578af69d224a7032beb5037a5d94edcb223603a16b4d4ede3368032aa49eaab42a6eaa8c339ef1a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc4b3ea42a13d7de5459bb1187859a3e
SHA12b128fa28cdb49b5f5a2e6db0d99d14326e7f84d
SHA25669e9696d427eeaa51d849040a76d5fe999074c2bbb870fe6d2cf0a02aa3e1990
SHA5122a0e6c7e85c3a6acc03323f625d18fbfeff201579b65cacbd313e33631d196c53e30e9e51183eeb063223778429b96d17712ebcdd7381f8cbf6492069781d263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596923c987b11edf76a5faeaa04f8566a
SHA1b66fbac783487f306eff3bcd02717c3bbd185c7e
SHA2567082ed55d4442bb0d54dceeed33f48038c88d0c7ce12c58657825ba61ba7c40e
SHA512d0ce737f9a2c669f7b8e7e158541e8f47948812a13dd075e5b39419718463a527ebc95bcdf1f2c047304278f5a570873cf103ede995126c9888a91d78ec2e86d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d26f7b0b7aaaea814d300b63f9dc084
SHA105ee6b13c0f8fc808bba526159de10881e2f0f3c
SHA2563d3c0ab96b4fe9f6a4146bb3e7077474534b133eac52236c7426a3773dcbd229
SHA512d60524f857e95b7f15ec9cef08da8b6afa71e3da81f2347ecb75cac9810e0f92d7e1d0e56ce6fe8e2f8b728f1eed3256a736b24a4c643ab365ddbbb0e8b995b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588efc9d23af16e4b44dbfd4dba47d700
SHA1ab23e0d3e546db40a73242072f2164d0f4a5246c
SHA25682e506e532e38f7c001659d9c8dd1db6a1a8a9cdf0e3429c63bab57e5c416257
SHA512bed86d027c8454099299f7673145c0f3ab76a8c61a5cdd4b366d6ebbade78c4d5e489dc62078e949ac4985ffcfd91ebebacd79fa1e937aa830d6515eb1e409df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539861ceb9563f2dece11bbba7714e74f
SHA12fbdc97a4e9758ea786f16abf7f9e51ca0a54c63
SHA2566c20bdabac611d1199344af67ac61f8a41f29d5872251998f048ace160602f80
SHA512ed2ce74144814e5d9fb6fe4bc5afa1ee7fe62d0584cca33691c28287c02058bdb8adc8f19588abc267c0736f2e6822536226d19f793aed33ec5420f3c20aa4c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a47442e640feabada447fd66f3b36c9
SHA1de00d1572012807af6ab5346a3973b692e739061
SHA256c71d30d8eba0b21f250169fefa46b61ca2cb0075fed5e129de123cadfc4135cb
SHA512bcac0186c0b6aafc7ae753496f4215cc7e617e1b4a8f782ed6ba7f0d2dbf17b40c10b545029b0d8513da70442e312c3b19b09c03304471079cecf120f3003f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5332c5ea2d6feb6f43fee4a08a9a3fef3
SHA15a633b0ab00b864dcf2b45800ebcd6e46e5b0660
SHA256dd0a808088588600e95b3663d8b3f27c45b77d7b9a739a85f7eea82abc18e2ab
SHA5128aa3a0f46d0f50c79271ff1840893c0d77b3736fc7c6c6e7c6bc4aa601a7d62b7193a1dd845f11bd3cd6d501701fc556821dc98b3e1cc6e3e255cf02f206d573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578b1f5839edb4312309aa91b6f275116
SHA184e2026bc0306253546bd4f11107e408cf7dd0b7
SHA2566a24de30c90210a4139a018ed0a391bfe6cc274f59bce8ad22f4e6005f2f1095
SHA5126fc377f691e06ad9a0513436ec470d9221d0cab40e58db9d051683623d4b53b39199e405f589319fbc0b67219b7216276b07e6f9b14173d15dd5b4a1e3fd3407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cab558ab6e1c0f1962074f846ef45b3
SHA1eb14626c13da25bd7ccfcc75eb1304105d28c483
SHA25656117c84c710e470dcf6d760ff4566146d3e7c9f3a09f34e75cd181a1fa9aada
SHA512ba437da791f586d2c97320530ca1a20a12d9124dea020a20d70c28ed4fab70e13a762d4beba3366d9b0c9e5dd4711a9c7641b2f31a4a7fd65c35e6c6a09f7958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51955fbb65655c68adcd2aa71e59acd6e
SHA114f15504a063aab6a9c0c2b67cfc47529196b47a
SHA25692c40ea38d41733682adace14ac6b928e27bbb384fa0a43ffab1a5dbc9de1869
SHA512e57b50a6d3def884a74f059fa5f549c593a68e647fc120815dc8d865bad31249248b72ea5d4d042c0c2bb215f584a8820b647ce66ff7fbf25804d6c0e0e74209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59390225eacda5babf4b07a9d73d291d1
SHA1fa89d40ec67add9a0159230e594d04b0d62d2a5e
SHA256984e168ac61fb5aaa8a6dde2cc5e2082a94f091f45fae17fe85de5070baefe83
SHA512a92236cf3f90da7cc40fb6ac4995a3e1377c78eff06526b7ce08d5b105fea60a812d79f6a111973bb1fe3406908db1d6a47359692e05265d30eed4837d4003a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5131509ffdcd6d8675aacbf75588be2f2
SHA138e411f1691af0c4473f04b84e2f2d9a6095802a
SHA256d46cc3c16f96ed38b49e8a0f6223f870ddc87ef3e8c03d73d04e7e3b0d23a16f
SHA5128505edf13c1f589f15af6c044a41593bf88b459d0c13bb025c4fd59862d5790702f7ee17cc816300f1ce6a238575b68e6743089907e9b37124cb87a624a4bac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5989a31b76a0b564ad747887d5b08663f
SHA103079973799e550c8e5e9c3dab619d81d1bf61cb
SHA25647283a5d20bb57a312e554242096006e012beb8927eb463e6950fde5600286fc
SHA512ec191c19e1dccf397e66daa204a1145bc434244630caf5e4021441c9a1c9425273f8a0833175304c00f4eec6082f5e75bd0bdaf0bcf00c8e5b2c2f9c47d25075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570fd9cb0018ab99429bbbbc4b377cac1
SHA17a5c814092579bc7438dc6e4ea134f53d98dd53d
SHA256d901581ca2e0f0ff2ae8baaf6ae5d85be5caa16650d7b930e3887962ad1e6c48
SHA5126bdd975763af76595d9c0e74b822d7fd67aec171e8072f2cb1ee157df3d64bbe3993c92eee80792d3e06c3400ce43c6456fbce3343f390def3ffb4a6a97c7479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3cf05b08b3039b8b947d5603a804fe1
SHA1149b02eb3739ea81a178e9507f6b2b3400d2be51
SHA256aa6a7e0bb64f1701d26ab7a2bbe8fb1aed827407b5dae51635a8629100cd6c7d
SHA5129c1faab131a716802e61eee15d0ad4fa25ace98c3774c37ef51684bc5213b61be320574328974cd2577429ae152cd385b04d0bf5079c225a2a9bc83651f14e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fa18ae433404f804e00592601dc71f1
SHA12dd7c512f6ccfa4071f3bcb2ecdac872a5885649
SHA256bb9c822a2f027c507141ca9b1dff1bd4d01fa361c2240c0f1d0e3fd953263348
SHA512a6d0349a7fa51cb6ea1de1f271a458c97e1c0c7237f15fbb44ca559e30a285de10013b20e230dd5f044442beb135dee7d3f1e641d201ad9e7e172c24a5883bc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580db6e4473731d0f197d1f7da613d341
SHA19f7cdf42cc11d2c34929738dbc646d4113385767
SHA2564f3c3ff3618207a1731891f1c8b97a9f7238d9972d82398e7faae8d954927bcf
SHA512a23ce83d00dcec08df687daef3fdfa1fa737344bd515613a80ac86ac4d503b4ea32217963ff734a7449c8cc95560e90127b1997fcdedd18133f705c3634e0603
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\528EVS6A\f[1].txt
Filesize35KB
MD57237af9b8732413c1d643af65ebde210
SHA102d92264ad73b8e8510cb0ecfa08d657f6e8bde4
SHA256d58bfba2adb7d857a9b38674270cbc943106265fe3b82b950426c9798b6d4b1a
SHA5126cd15f39dd52a5d9d73e2c1d72dd0fa7885a73f8449bd71ff45d2650bd3f848d8e0ec1af3632495bbdc066cd4a0bbf60230cd1b9cb2a0985eb66f47295b223a9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a