Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
4TeraBox_sl....1.exe
windows7-x64
6TeraBox_sl....1.exe
windows10-2004-x64
6$PLUGINSDI...UI.dll
windows7-x64
3$PLUGINSDI...UI.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sW.dll
windows7-x64
3$PLUGINSDI...sW.dll
windows10-2004-x64
3$TEMP/kernel.dll
windows7-x64
1$TEMP/kernel.dll
windows10-2004-x64
1AppUtil.dll
windows7-x64
1AppUtil.dll
windows10-2004-x64
1AutoUpdate...il.dll
windows7-x64
3AutoUpdate...il.dll
windows10-2004-x64
3AutoUpdate...te.exe
windows7-x64
1AutoUpdate...te.exe
windows10-2004-x64
1BugReport.exe
windows7-x64
3BugReport.exe
windows10-2004-x64
5Bull140U.dll
windows7-x64
1Bull140U.dll
windows10-2004-x64
1ChromeNati...st.exe
windows7-x64
1ChromeNati...st.exe
windows10-2004-x64
1HelpUtility.exe
windows7-x64
1HelpUtility.exe
windows10-2004-x64
1TeraBox.exe
windows7-x64
5TeraBox.exe
windows10-2004-x64
5TeraBoxHost.exe
windows7-x64
1TeraBoxHost.exe
windows10-2004-x64
1TeraBoxRender.exe
windows7-x64
1TeraBoxRender.exe
windows10-2004-x64
1TeraBoxWebService.exe
windows7-x64
1TeraBoxWebService.exe
windows10-2004-x64
1Analysis
-
max time kernel
543s -
max time network
422s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 09:35
Behavioral task
behavioral1
Sample
TeraBox_sl_b_1.31.0.1.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
TeraBox_sl_b_1.31.0.1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NsisInstallUI.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NsisInstallUI.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsProcessW.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsProcessW.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$TEMP/kernel.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$TEMP/kernel.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
AppUtil.dll
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
AppUtil.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
AutoUpdate/AutoUpdateUtil.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
AutoUpdate/AutoUpdateUtil.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
AutoUpdate/Autoupdate.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
AutoUpdate/Autoupdate.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
BugReport.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
BugReport.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
Bull140U.dll
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
Bull140U.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
ChromeNativeMessagingHost.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
ChromeNativeMessagingHost.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
HelpUtility.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
HelpUtility.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
TeraBox.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
TeraBox.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
TeraBoxHost.exe
Resource
win7-20240419-en
Behavioral task
behavioral28
Sample
TeraBoxHost.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
TeraBoxRender.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
TeraBoxRender.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
TeraBoxWebService.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
TeraBoxWebService.exe
Resource
win10v2004-20240508-en
General
-
Target
AutoUpdate/Autoupdate.exe
-
Size
2.8MB
-
MD5
94c5b0443f1c39b71b22931509bf1985
-
SHA1
35cb27275187b8c0da72d00b8551aaf2c1059794
-
SHA256
7260c2623c4277b045d97e87a677d41bbfd11647109a4d648c311310889cebfb
-
SHA512
a08a897095239f367c51b36724f54aa961420e07f76185075902efd7ee023eb8f0a6c8b49769158fbf9372377028182515995b0ac0b7277e12a2640a3e6a3721
-
SSDEEP
49152:57L6oPOReVwkTVcXj/SZTLvIkP4qgh7Xufw58hG7UB:57NQeZVcX7aIFqgtX8S
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Autoupdate.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Autoupdate.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1744 Autoupdate.exe 2652 TeraBox.exe 2652 TeraBox.exe 2652 TeraBox.exe 1084 TeraBoxRender.exe 240 TeraBoxRender.exe 2500 TeraBoxRender.exe 2720 TeraBoxRender.exe 2380 TeraBoxRender.exe 1168 TeraBoxHost.exe 1168 TeraBoxHost.exe 1168 TeraBoxHost.exe 2652 TeraBox.exe 2652 TeraBox.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1744 Autoupdate.exe Token: SeIncreaseQuotaPrivilege 1744 Autoupdate.exe Token: SeAssignPrimaryTokenPrivilege 1744 Autoupdate.exe Token: SeManageVolumePrivilege 1168 TeraBoxHost.exe Token: SeBackupPrivilege 1168 TeraBoxHost.exe Token: SeSecurityPrivilege 1168 TeraBoxHost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 TeraBox.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2652 TeraBox.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2652 wrote to memory of 1084 2652 TeraBox.exe 30 PID 2652 wrote to memory of 1084 2652 TeraBox.exe 30 PID 2652 wrote to memory of 1084 2652 TeraBox.exe 30 PID 2652 wrote to memory of 1084 2652 TeraBox.exe 30 PID 2652 wrote to memory of 240 2652 TeraBox.exe 31 PID 2652 wrote to memory of 240 2652 TeraBox.exe 31 PID 2652 wrote to memory of 240 2652 TeraBox.exe 31 PID 2652 wrote to memory of 240 2652 TeraBox.exe 31 PID 2652 wrote to memory of 2500 2652 TeraBox.exe 32 PID 2652 wrote to memory of 2500 2652 TeraBox.exe 32 PID 2652 wrote to memory of 2500 2652 TeraBox.exe 32 PID 2652 wrote to memory of 2500 2652 TeraBox.exe 32 PID 2652 wrote to memory of 2720 2652 TeraBox.exe 33 PID 2652 wrote to memory of 2720 2652 TeraBox.exe 33 PID 2652 wrote to memory of 2720 2652 TeraBox.exe 33 PID 2652 wrote to memory of 2720 2652 TeraBox.exe 33 PID 2652 wrote to memory of 2948 2652 TeraBox.exe 34 PID 2652 wrote to memory of 2948 2652 TeraBox.exe 34 PID 2652 wrote to memory of 2948 2652 TeraBox.exe 34 PID 2652 wrote to memory of 2948 2652 TeraBox.exe 34 PID 2652 wrote to memory of 2380 2652 TeraBox.exe 35 PID 2652 wrote to memory of 2380 2652 TeraBox.exe 35 PID 2652 wrote to memory of 2380 2652 TeraBox.exe 35 PID 2652 wrote to memory of 2380 2652 TeraBox.exe 35 PID 2652 wrote to memory of 1068 2652 TeraBox.exe 40 PID 2652 wrote to memory of 1068 2652 TeraBox.exe 40 PID 2652 wrote to memory of 1068 2652 TeraBox.exe 40 PID 2652 wrote to memory of 1068 2652 TeraBox.exe 40 PID 2652 wrote to memory of 1168 2652 TeraBox.exe 41 PID 2652 wrote to memory of 1168 2652 TeraBox.exe 41 PID 2652 wrote to memory of 1168 2652 TeraBox.exe 41 PID 2652 wrote to memory of 1168 2652 TeraBox.exe 41 PID 2652 wrote to memory of 2488 2652 TeraBox.exe 42 PID 2652 wrote to memory of 2488 2652 TeraBox.exe 42 PID 2652 wrote to memory of 2488 2652 TeraBox.exe 42 PID 2652 wrote to memory of 2488 2652 TeraBox.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\AutoUpdate\Autoupdate.exe"C:\Users\Admin\AppData\Local\Temp\AutoUpdate\Autoupdate.exe"1⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\TeraBox.exeC:\Users\Admin\AppData\Local\Temp\TeraBox.exe NoUpdate2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2052,8749483569415440134,11520858399055917377,131072 --enable-features=CastMediaRouteProvider --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 6.1; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;6.1.7601;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=2008 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,8749483569415440134,11520858399055917377,131072 --enable-features=CastMediaRouteProvider --lang=en-US --service-sandbox-type=network --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 6.1; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;6.1.7601;WindowsTeraBox" --lang=en-US --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=2852 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:240
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2052,8749483569415440134,11520858399055917377,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 6.1; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;6.1.7601;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2980 /prefetch:13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2052,8749483569415440134,11520858399055917377,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 6.1; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;6.1.7601;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2988 /prefetch:13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe"3⤵PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2052,8749483569415440134,11520858399055917377,131072 --enable-features=CastMediaRouteProvider --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 6.1; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;6.1.7601;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=2128 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe-PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.2652.0.683903513\1096455799 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.142" -PcGuid "TBIMXV2-O_2E05A6D73DB1431F9EAABA9C6178052E-C_0-D_4d51303031302033202020202020202020202020-M_E25BC60B6402-V_61893B8A" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 13⤵PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.2652.0.683903513\1096455799 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.142" -PcGuid "TBIMXV2-O_2E05A6D73DB1431F9EAABA9C6178052E-C_0-D_4d51303031302033202020202020202020202020-M_E25BC60B6402-V_61893B8A" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1501 -PluginPath "C:\Users\Admin\AppData\Local\Temp\module\VastPlayer\VastPlayer.dll" -ChannelName terabox.2652.1.84632228\1403976391 -QuitEventName TERABOX_VIDEO_PLAY_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.142" -PcGuid "TBIMXV2-O_2E05A6D73DB1431F9EAABA9C6178052E-C_0-D_4d51303031302033202020202020202020202020-M_E25BC60B6402-V_61893B8A" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 13⤵PID:2488
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
959B
MD5d5e98140c51869fc462c8975620faa78
SHA107e032e020b72c3f192f0628a2593a19a70f069e
SHA2565c58468d55f58e497e743982d2b50010b6d165374acf83a7d4a32db768c4408e
SHA5129bd164cc4b9ef07386762d3775c6d9528b82d4a9dc508c3040104b8d41cfec52eb0b7e6f8dc47c5021ce2fe3ca542c4ae2b54fd02d76b0eabd9724484621a105
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6525274CBC2077D43D7D17A33C868C4F
Filesize192B
MD53bfcf2c53dae8430576c8af860f917cb
SHA1f1c5b322419302f152794712d4483b6f131db814
SHA2561ddf814eedb9ed9bb1a48482e0eea0d48ce69b59da37608861e5c8fc5ed2c7c6
SHA5120f597521fb06f32161a17a6cb9ba34414bb879924e393eaca9fd3a14fd4362abaa50fad82af1555d97f667fddff92fa0c4b8cda4bfe6b39e3773ff5c28f52a82
-
Filesize
164B
MD512ed702735b9f98eccbc28feff98f861
SHA12dcf6fdf91631c48d5ddaf898e9b8a4980e4f1d9
SHA25667b81c563e75f0284bc28b7b1637f779b24777e5ae0498b179d183f5d208f29f
SHA512f724f3cd46d49b4c827013d269c13ef5634f18806438f1dbf9aaa80c12542a3ba7f8f238f7d5a3b64b853886cc7455843db09d785f3a950c2df5396df5bc002c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a