Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 07:01
Static task
static1
Behavioral task
behavioral1
Sample
23b9161d64e8f3fe82ba0a4fd6fc85b5_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
23b9161d64e8f3fe82ba0a4fd6fc85b5_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
23b9161d64e8f3fe82ba0a4fd6fc85b5_JaffaCakes118.html
-
Size
67KB
-
MD5
23b9161d64e8f3fe82ba0a4fd6fc85b5
-
SHA1
ddb2802904a1759eee31baa6c7f6e47362a91629
-
SHA256
c0038ba084f419d00de98576a898562358bf6257d103961f790a155506ded2b5
-
SHA512
5166929ee08db2c138a7dacecc2d0b0a4b52ca369bb02df2e059e5b3dfa5d3c9c994c45bf4acfcc2f123327fa4e2fbdce8c7305f9e451f094b5c06e2d449ec63
-
SSDEEP
768:JiQgcMsSZ8tN99OIsN47Q+R5doT2fQCZkoTnMdtbBnfBgN8/oygcRWQFVGys//IU:JoWDaT6Pec0tbrga6crNnz8PJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421313554" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000be8bd4bc2167e66cd63fec63ea8fa81e4764e7e31b80b487897c14ac079921c3000000000e8000000002000020000000a68b4f7df2d458cabee539ae1c7cb33b024f0e4980a88f50e1019cc5369dcf6b9000000043c3f9b5534e9e705da74a9b64003afb031dec360c1a9ef395224db19da4461aa4bfe880a337a00c3a57bc94b46cfbd6c9308ecc2d955520533817b26b96031d37a47ec20771a6248bdfc759bcb30987ac3f0673dbc91d5ee5f82a2d3f0871d74de3628dfe9d4a0c20ef76b2a8394e65b64e4ba072a649307878e6d249365a9c6ec5bcf29e3076a4fe99d952c9c555c440000000df1cd173566807d598a5dbfd40c6de54a302f122a9a46e0846d4355584450d2a620dd0341161306f0db4e2cd87aab14d9331690a721ab738510ac2ac92968eed iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA139091-0D08-11EF-AD12-DE87C8C490F0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5089b89e15a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000decc567560053634c8bedc1bc1aa673330c565490e2976b0eae8dcd66e2806f7000000000e80000000020000200000000a853bb903ae3f07accd841dbf27c38b6c7218fb69495f21107403bcc3599ffc20000000fc91048e48babb3b57d1349c40047ffcca714bf853486f1da912d99f11dabe6440000000a87fb51fccb58bff60add5504f85e3ab32831eaa71e9dd690f52de348ff2a432f5fac8e850bf79cc5e9f49b051b7bb3e4278d8fc09699422ea4cbfdb3b4312d6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2908 2192 iexplore.exe 29 PID 2192 wrote to memory of 2908 2192 iexplore.exe 29 PID 2192 wrote to memory of 2908 2192 iexplore.exe 29 PID 2192 wrote to memory of 2908 2192 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\23b9161d64e8f3fe82ba0a4fd6fc85b5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f842e53b1d59835fa4f2030c836617d3
SHA10409823f444ffefc9f2c5b6c02cfa31fa7a0bfc3
SHA25663dd4625874e55bacce9776a17c8ae3acd32940fd341da37d6bc08131f3dfe25
SHA512f79ece31bd46a6a2e1b12ac4809b1c4b42ba1502f93fa9fc9aaa2bb7a5c50ff723d222b51c4e6cdc69b0f355ba6bb1477434921bffd8985917f58983c64cec4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52383e81492f70f9d431fc87136b4a4b5
SHA1e6b787c182f088e7a2df970e895d2e26361361ce
SHA25676fe4bef9a3761728cc85bbea1b9f360610fe9104aa99be1cafa521ac8768e6c
SHA512bfb4448a78b4c8d2e08c8769af7cba09fd2581eb1d31a279a634087ba9dbcd619fd68f4450f7bd3ef2f2372d9db9a40b4227783b80b6827b1e6b9a64524a35db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5354a3102c22ec27800ca0d14ceffc504
SHA15a055a09b4c78412867cbb1aed82e94179993257
SHA256b8a344f3b072fd292a45906ba03f6e825586d950c65789eaab0e72a554adfd34
SHA5125271b6999eef9b29deebb6ece63741baa9c5f02b3ef07df36b34d6d86c4378a10c1bdb76f57801b378ef3f839a173a86571e95bb3d91bc5c7138396895e9f1f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dbe434f04520cf85841b6e9510c8707
SHA1bdb955f12f96af5f41449e5104c0a7b9c8765cfd
SHA25686d22594e1a25fff750ef322e9602af36a8f82feb0403b61a2e59a44217c71e2
SHA512b80e17da0cd95387e1b4b37626989d2f6bcc1591dbc8d82d5114049e5dcd0f36402914e2c91c17863ffbfdeb26286aea40d8e459556c8c99c3443c8c9fa892c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b8de1f0ed530291308dc6f85f7f9e07
SHA121f8f4483c7789367e39833903577a973c437c28
SHA2561bd72ad6eecd3cecf71699867c12cd040cac4c95c09c357baa9cc255ce1faaae
SHA512567ebf9d88e1dcda8e6e52145d3f6b0b2260e93a960b7d421bb1a5d7681fd8b01a5e1eae968aded3dda1c47b14ac85fb0f1c5ad4bbd5f5aabfcb1105d75b537a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517bf41d69af4c9a1bc22ba9985503516
SHA13d085906ca54d7b19268d67e0ec139c5d85ab4ad
SHA256fd49722e1d391e0ea0b62d03ad3e50b28e09f1b8d50617fd4a6b7e243b8ecb2e
SHA512dd1e3bdf5c471d36939a8131f636502e1ff7450e133a5fcb3248a8a0ce4dca44ec11010682e0c501c47d3a5672590b73f41a21316bfa4aa1790c41d38e0bf143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d247be0f1d06b1b06bdb460914bd0f40
SHA1039e7e73bc9f3f8c1ff7c665931b9aa53886c483
SHA2561f8d255017d6f6dbc314f118cb4e7730145e2556d1a92c31eb22d4d4c5427420
SHA51238b644374e5afa13d431986dea2fdb2d8f256724657333a336bf91b827900fe96bde5398ca2feb8a1976cec66ed321dbff03e121546d5312c1c0d8a246364ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569c0a71cc532bc05dd2b3a24cdc43a2d
SHA18af665ddb8c8e56cc2338c59b8546f7841584628
SHA2564f36ba641a479b85d1a994cdb01dbcda0bee3fcf2b9601c98154156323430926
SHA512657b5e54709b0ce7776744adc0a00e502c24721b293a6f728fbd2a7327e5136be3d4556f38a4104fe3b8209de822d630a1c63e11c6a89bf84d9bcdab81977a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca0247fa4d08713853aa20e293e2258b
SHA1c59ae82c8f112ad4e2492ca55b1dccab49b04241
SHA256fbdeac5eac91cd761d00cc7aec57498bc286039b20006ee648f6239bf091c1d0
SHA512cb669f5be5c17d13acad635ec9fa37f2ad14b38c44e43efbcd9e6e89e4eb1abca45d8621ca767a38f78a19d9ca710a0be469452ddea61b3962feadeb4bc7a2d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593de5f18230638c3ffeaae3fad8c9441
SHA1a96f547de62ec9fa8d4af9d59feb674394cf4e74
SHA256188dd2d637d176b53468bd741fa0704598f66d77970692de5f57b6573f0a2e39
SHA5120b29b3f9ab71f82ba7269feb456cc94e4b22a46aaec409de4c3c36589e1d4b3c8f2825000fc6623bc66b38d414038490d94e87a0fe30d4d7a48adbafb6a37a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5beb105e07a80fca2037fecff6880348c
SHA169a66c0febbc17ccc699f71bb220514c88cc20f7
SHA256bdae02c5b2d8f005a94255b4be57e57b39d0da09b583345f04ee3649b220054c
SHA512be10d2512d952a88e3283030ccc8854ac5f1574a3112c1a9e778fc2ac68bf7303afb7d9b06c5c878c63f99eaffd6646d9dde77b8cd84aa16b93c29fad8c2d815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5316d8e7ad1cf13e466268814c1f503ca
SHA1757c28b31f751d16a53e99d2872fd286264da3d9
SHA256f956c6dfd7312d8b07a5ef0231cdbe8e3c62321aed3e7d88ee4fb252d901baa0
SHA5123005feb5e84479c08b60bf4a4a867021c426af0db7952b173a25be0d04090b3ee23d6549cdf7b64dca70336a1c1bc1a9c2d9b78940d7833266142d57543162e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559c352a8f5f7b098d78f40fba0939556
SHA1de6d59c7647bbf41caa3139726e77be288a25091
SHA2569eb5a61ee760e72d2c827b0b4ae23700c987a3aee1e3ea0daa76daf713a74d57
SHA512a6369abbb6f8fc4736eb43976d2189ddad4c27382be7a94e40c334f4f44cd81eeb9492244422171982093c9d43c506297f80d730c60bed2f96f10fa8e10d829c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b01ffc2d379b12c1f56ce6eb8e6a84f7
SHA1867fcb01204ab8d9e060a3ebb04d274e155630d3
SHA25617012aab2bbe113f73bee0b7045168b676d7ccd02b85d2276496bc46bf4a95b7
SHA51260018913ba33f9034818073aa16defadaa6ba816ef1f5902cefd2721440e304e8551e282a7f80ed119e2e79d638f99ca40cff8b3430b27f959c00f7b9fdb3e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52413d8868841e73808c201adc93ee44a
SHA143c5e700be05be90f1a040d391903a267926e037
SHA25674f357b0b2386d51555bb5836748cf0fe19dc4a8d1f2fd20deea83063a61bcec
SHA51297ba72396d943b112224377586b5f9ae3fce7190fa7159cf9446aed1df69581ace07a8903aaac887720fe95ff65b104560229ec8c06bacc10a64d30006a17352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddb3003991e9365730ce6249fefe2afd
SHA1b6123e17e2149213ebac1fe335f010ea7fd403b5
SHA256b353ff1eb6c9eb325c04062de3295576e415ba81e9e5d5a0736f5396918d358f
SHA512269e993c7861bf54957d4e28b9a9a961b68e3dfc898775afe5331e8c92daebace9c4b0674b2ea6ad72cc0c1e0c60dcd3e38148780c23423d6e0c51a53f0b2c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c0c5a0853b77c42120fe40a94d9c4e5
SHA17a14417c5cfdd8e4eda20f16aeeb79a9516e3632
SHA25651e879123517f0994e87f463394d5a029347faf841f556832f46a2a11d9f3271
SHA5129c88fd9dc9426f1a90de6065b78b96e2977463d1473d7b0b49c770df3c2762b1aaaa4c3be7d5fad4dfda4d29bcc1722ead931d4a1d700731107029649b6607ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e4eaf41ee465f1d19b3993ebfe2ca02
SHA10ed518becae2c689f9e9b4897d5fe8432b9bab9e
SHA256d96bc6815defad6af31c3b99fd8d282d8268ca33caa5e52d979a4b091ee37e39
SHA5125fdc931cef064eb0fe3a29f4c4baa5de10f68c2b35fc7716cda1c1ba558f89d2b9f0ad4dd32152b92a6caf37a0951862e64ca60d12a8479e010387b06bac69ae
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a