Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
6c09230dd6acaf22a2a9ec6f5c2234dd_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6c09230dd6acaf22a2a9ec6f5c2234dd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6c09230dd6acaf22a2a9ec6f5c2234dd_JaffaCakes118.html
-
Size
94KB
-
MD5
6c09230dd6acaf22a2a9ec6f5c2234dd
-
SHA1
f909ec085ecaa52ec7b5a4d489232bfbfdfda036
-
SHA256
64b605d10a04fbd0e5473b533aa57d1e81f6f62fb534a82732240395cc3c4ef4
-
SHA512
6aa4364b46f745b2fa735f38a1b4256818edf50e231e07496f5878ed68d16f055e526fb0fd8d83331f25d8713402e01ceed873fdcd1d07b5053d39aca22f0ff1
-
SSDEEP
1536:WMLiNnUGf1+83t3RU7LCFpr340FLWdT0bZqyzyBBdkrY8mgHC+qpEyW:WAiJdcBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5BAAA691-193B-11EF-B0F7-6EC840ECE01E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000152751a32e28a4f907518dc45dc2556000000000200000000001066000000010000200000003af529867001eee67339dbb0a8e096ba43e1ef122ac81544c45c01083c962961000000000e80000000020000200000007ab463687e8484ed93978e35c0934c0de86ca1aa219d6053b97edef5fbb1149020000000b1021556df68325e0a4c34da854e13fa9878257f343bd5117331b634daeec7a54000000053d7bc3cb896fa16b62c3bdbc613eaae3a12d5587af0e129788dc203d6a69cd8add5e2b48dfd6cbff361acff4f80fcf88feae87244d38954b671248714e3011b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f8b93248adda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422654689" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2204 2328 iexplore.exe 28 PID 2328 wrote to memory of 2204 2328 iexplore.exe 28 PID 2328 wrote to memory of 2204 2328 iexplore.exe 28 PID 2328 wrote to memory of 2204 2328 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6c09230dd6acaf22a2a9ec6f5c2234dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a271eeb7f217a0383ef0d8dd19f4f10
SHA1dd97d942adab9882cb78c86a8a387f2951d39354
SHA25601e970cfb780a17f2cce9130e132111c6ce09c70b919fde3cfba7a75766ba682
SHA512b481604b02fe3f2c675f715f0ab5cf43d14c68d88138c95a063b9dfb3739872be20697d05dd794adc18b52d24bcd1256c23f9db87732d1cda7881ad722e505f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ada3bd3d6ef1b058c7f618cf8b28b1bc
SHA165cedbdd213b1b49fe03808ef4f27010841ef9d3
SHA256ca031ebdb4126f9660afa02d8b7bc4f3f97d2a0ff839b8f20740f4c9d14fac5f
SHA5125b41399274a38af972681bba35a354f91e26d1d7bd92cffa3238e52678dfb9afffded082b4ec70968fea5b9c7e5f604f0822252bdc15f90d2c433d6b7348a3c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585735e640f27c104430d01e1c941b613
SHA1139557699e3936b00cdb14f45edd36ead57c79af
SHA256873c2c40ff9ce78cbe7bd99917157e2acb083b24886a61f9fd960c095a154336
SHA5122c7ce6ec4b03df2f618b281efd6d72c82aed113101a327f608298b8e51000e920c8500dba2bef5b6f93aad27953203412603a45de73c8df9fa803ae343ebb1e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed12799e87d98b3e4df187c14ca7041a
SHA10ef929d43318eb29c9baa0c1fadb8ddc6830c981
SHA256f10718bd99d9aea697f05e17cbdbc3ed2bbf287d682eba9f2e26874a26632f0c
SHA51246c07f69ffe3cd0e71b56d7e1116a19c21320af7e15e2f708a404fb618493caacdc26985f1258fcdba1838651d5890d041fed5fe9c0c9a9b7c9d12b01edee9c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bee104333cb55f85857b07d7a6fb4384
SHA1d98c1402d83501b38a517f410b1d2a38ebb2e1b8
SHA25621d44c9900428090e4206cb4b81e38657bc9c61c46bd6ba5b087a30287492899
SHA5120d69db4747d603ca0c787a1b2a53a740adc7c0b8aa50a8cd8656c2125634671abe47e6658c8f457b48e32759e58dd9ce17e8de5b4e251c51336062ae18799656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e26ee00034aab83db87566e9eaf2777
SHA1ee55432cd9027558e9935b31daaed793da9edaeb
SHA2569e16ee3ca5b7a2624000e024290b4ea745f47036d988f7da2adb3a2ed90423be
SHA512b0e7f66d807c38c973d4c9e4e11081e0fd612d479891b5ebaae1fcfe0110d6cbea6c2ef0e9b4e7e76ea2898f72593f931e728a7ba384c5099e584ea34e8ecabc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd6054742aebac9585ca996e8a072a19
SHA1c9873d17912fc1e57927a9cd0e548a2fc7b1393a
SHA256cda9e0a57d4cc127af73dbcf3c50cabcfefe19d6f31758318f607c8d0c7d7f03
SHA51271814c49a2ea650c1f994c8157d55d67343dca46295951b8627802580c7d44b382c2527ed42f9e882fef67025dcd38822cd00b6dbfc01a5ca940259b460ea485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9b10377c0509c2b490e3088b3073991
SHA1b4a391410909ca4396c80eace2de80833505c528
SHA25680842efc4c92787c082d96083f2bf20fe8c7cdf3daff0478cc931834493a96ca
SHA5127a651347c900d112d8e78f5c6041d98b585eac3fddc49e2eaec6378da7f99e1349939ea447ca60598b46039e087a1fe8474e11eac3d540b10f73b1d7f97425bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cd8e322759aa310db82cdffd3400c2b
SHA18702cd3b3f79611cc38b7af5131fa8192135109f
SHA25625a14018023029e2bb7396f8e73519cb6a192d88cd61ece32aa5ab58428838b9
SHA512c42854c8bd0bfe0217ce1d1f2989127a4d727630b578046db567b1ddbe1e7e69c428de5055d2f6957634aa52b7f7a56f271b1e75c3e7b3e39b8141a677cd56f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521a0adcf6030b00df70186da1f6d28e1
SHA1d93c264533732307399c78b816943999f28936e6
SHA25683bfc6f51f5facc37106ce0e2b82f67f57749d0ae9f0ec40882f3751fc89fc69
SHA51247d428f97989867e12a55635438a8e334194168169eee6beb524d65e4faef70a6113b48f91bce90efcff27121f066e07ae3d6e885f706e8b23ae3883b59f6081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56261abefea885a21b96e6a9aaecd0517
SHA14536bb4c31f18b66ee69d5d07a9d0ef5baa0d419
SHA256694cfa9b77a7a963118cc47aa39f45b31ca57ff16d264fc0b059fd572ec3a461
SHA5126ea1a9a5951eaba7d56c7e17d43b0b62cea1969e070b61804f4b056a1582077d7afd8d66c4bc69d64d9b21954c57ba6d63067db6a943ecf780aca80f8a9ca4b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e055be619c69b3e17ff688a9dc39b99
SHA1109b665f5bcd89372a7e2af84d40b8add5e8d614
SHA2565c59207ca9656c40ecc2f9641bfdfe67d6892a60c59778a425dae55634375c30
SHA5124f110f01f35ceb8395ab672577e2da2b43d48e8158f8cba228f9dca46f50100b0232721c6e574e68d52e1fc65c9ed9130667f39270b443544fbeab2a65c5574d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523b4f6cd5ebbd2baf35ecd860c96a73a
SHA13120be120007a8dc44c09f2da79ab3c55db75178
SHA25656d7e52194fb4c793fcfb82366239ef7d2695da3ee04b77802d95b07e3291328
SHA512490056b14e4b612bf603aebce08da5c20d9f20a6f79942afcd58ed3765460f647a3aaf82f94e89cf7924b65ba3c7330c898b13688c751d01732a327f9c0c5719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527c57c2bbd60e4d696239ff21a083690
SHA124465c31400181302136eac690abb18e7eeb2113
SHA25659e66eb51205374ff3003177f2d939e9a6f181be687a5df691edfadc852d9f9b
SHA512bdc6c5f446ec38dfa76c535ebb084392539e8e9901becb971298a77e766047a8e1dbd0c1b83e597f862b3f8855902fc874f2277ec066417cf20e17033d29da0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56869103861e0a54611897cd50d3a69d3
SHA1ef142e24275c6f8d649d4032677ea2c6fb3019cc
SHA256e259dbf11ad0a05a7e141767cd0992f1e666a8af8a1342b46532cd25be37bed4
SHA5120440cfe9e13b822782560c7b1646ba7ce58c8b71b195e975e252ebcd5a7f7d5a5cfd4da54d76a3c8fc5efbba3103bf1f29633dd9b95623fa9c461c10691916b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5879104fef9251c2d498aabe0d3496475
SHA1c6190141a436bcc741ef18df23a568a37b549e24
SHA256b13889a522a0a3b39a2d4840e299a50c0515db83f09cfcdf7f48657fbb221882
SHA512d54006e04b60a7cc10613b7a63250f597bd772b997ce606309fa8f16d378935b089ee8863f44f2cbcd84e2e2f30b420b5043dff8ca5b34626039d2d9564e1618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573fa95ec0547b4c7490114006b2097a6
SHA12da8f8682ecc9f14991ecc8274a9561d38118c76
SHA25601a43d383eab9553903dd2e8b9e1cb0326b41ea917f86c99af425dec0baba21f
SHA5128e54d47699e2a2f5072df1bcc40c957e040852f24dcf8f54909e58984936babbc722772827a4c7ed38af132b16e372fa2a86663665bb46b8eaabc8932037eda9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556dcd3fb75e7d0cc4158dead08d9e7b3
SHA1a44cfe6f4a218af233be02ba42c4bb374d713e55
SHA25648f25cfa7ced166fc83cc70b25ce81eb31100d53ebd67faf059d0058284366fe
SHA512a14222150490c9e43d9779b7b5a54629f4a943ecf98bb00159c593044fd821d34c0a19594fce02ae92527f64c5a2cef50856f222bd9482f47a3958faf99624e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc97a9d1e4826781fed54ccb921f0445
SHA13834abfd0c3d5d566e4907611dd8298c11a6bd7e
SHA256d164c7dbeec62fae8a21a0db02bf01a030343e58e5e2649d3352ff9b6dbf98f6
SHA512569df6ac7d6b5d3aed6d232de46c731bd2ee0752469a53b4b2d78391ae0a2b0bce61e96bf972bd3e318eddf439142f60c9c502625cab9858fe766461b9cbc1d0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\902LKC6A\coming-soon[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a