Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 16:50
Static task
static1
Behavioral task
behavioral1
Sample
2aefde82fe05a639afe844c693fea4c3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2aefde82fe05a639afe844c693fea4c3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2aefde82fe05a639afe844c693fea4c3_JaffaCakes118.html
-
Size
31KB
-
MD5
2aefde82fe05a639afe844c693fea4c3
-
SHA1
f38ccb10ce62fad19b56fabab5fdbff5c17ba92b
-
SHA256
f06b5c6093bf9fb11d6f32bb740cdb559f0453fbae5ce0e06242b9fabbf757f3
-
SHA512
4e2361c570a00f57a735a93ddfeabe6ff4103fe400b1494f39c0f623a531e11667d614d5366a7da471c383d74cb8f127ed63421d7277089720316e80d49aaac6
-
SSDEEP
768:CyihzE9hnEZsgFDgnIegm+egmyegm/egmnegmOegmpregm3egmxegmTegm/X1P:CySuWRgnIe5+e5ye5/e5ne5Oe5pre53M
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e064bf2831a2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421435324" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4EADF6D1-0E24-11EF-AD96-EAF6CDD7B231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000c20b30172fba89e7ecb7d72cc50189212e2d16fb15ac029d27a4e9fa8b31c3f4000000000e800000000200002000000022cdcba9200262b419bfd47483b12c356fd63136518978ff98744b2f57636bc790000000301f884642cc9bf27b648f1af598e38d4a2c534f84c51724a3fd389e484abbffec9dc71ecd8f116fe794b9314cf8ced6996afe9ee50a5b733dddda7daca14749d5574fea1f33f51df6ae9ec9b733f44976b950060f14235db58fdf954c54d0b30d45f51896b38e8a969d8cf507c1568c5257169f1463be1fe8d805b6aab7cc7557a33a7bb93a8202eb99e9620bc2bfad40000000d6498178f474c77af9260b35f72a6949c6189c6cf8051fb8cd5e512c245d37147717a18e3e64e7a18b8ba8a174a421cf2d34926ac4209657ef8ebf75a9c37c51 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000082c9a5c814d527fffe75c7e4999ce16343754a1c6714bfdd2c94c10d5aedda36000000000e8000000002000020000000d6df1bea75c8a5bcaf9250c33cffc2362575f519bffbd9d8994393e1e839587d20000000a14ac211aa3a8cd87115cb34ff49b8c9cd732dbde88eb3224865d0cf9d10b63e400000007ad88999cce4d050354b7f5314028843aa3fd6d5d72351de5fbf5a3fe35508c345a0a9c17ec69f4865849e661e89005ac29b6ad58f50bb66fa7aa48ebd5329a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2728 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1772 iexplore.exe 1772 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1772 wrote to memory of 2728 1772 iexplore.exe 28 PID 1772 wrote to memory of 2728 1772 iexplore.exe 28 PID 1772 wrote to memory of 2728 1772 iexplore.exe 28 PID 1772 wrote to memory of 2728 1772 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2aefde82fe05a639afe844c693fea4c3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba487293319351ae86743f5dba360437
SHA195bb13cae24d989e0f8164232344f2f1779c5419
SHA25685722d10470bb507a613684e72337093beb9711b921b94ccccdd878c0ce44666
SHA512c4514fa597a019def922c5c16522647b20e31976d03eb31a2c29780442f7801b36e3df80e33981d8caa440aa0e32994d198e13bdd931c2e5342bb4e7a17a288b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531ae8c4e0f254631386a4096432c6286
SHA12d0db4837f41247ed1b8864f672ec3b2326b1157
SHA2563a0e03a88aa6fa61886d7cad329fb6204000cbf31ec66969837056860a5d7daf
SHA512fc475d508aaf60b07eb38f6dc144acbcd1f1218b530b8adb670e0d328296b428eb2535fac8c91eabc01f1bcdcaaca819334ccfee32e04b5a7af65076d35de9cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a7484ea160ebb51da8a31fddf9c2be0
SHA1f27eabf32b4bdc03d62f2f7e39c9109a9cb8d506
SHA2564f4bab21407b9fe7ebfda0b30841500c0e262321081b1a49b7529ec5c7524d7b
SHA512114e87ec1a5b6b796d1d80c378f4fce7a2edc786140f04dd79d75b5e96f498c9b6c511e5dc471d1a25adbb62ead1f8e6b10306889f6ca69464ac17410fa27155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ba049385ccec832d5fb67c1b7eba46e
SHA1956c5f007e0f8199a0cc72ae51081973d0dac4d9
SHA256b364648469fb78b8ab4ebb3f717b06298482a067221b241fb73b035a893df865
SHA512d45e5aad89605f9e869d751eb3a2daf4ff10782a22eaf8375134f502bfb57becaf88fb00070e1455becdf2bf4d517d9d1c6f85148c7ec06e4f2d23a72b75df0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509258f34a2de0054e3e25292f9422c9a
SHA12723ac41712323af110768c82f3973365b476bad
SHA2561f8f36ab468cdf2d20e53e6ef79d2a10035e7ef2e3eeb56fd943e756482a1201
SHA512dbd687104a34e1871d0d191f5b5205090f344d57ea780e975b340d7a7d9747d840fd40ce0db9668ad7d4def394edf690430b0a1eaf65a3af368aecf89823b450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ed3966f6531faf0667dbc38d8061635
SHA164530a7fb36d846d2e278c6dd82381462face160
SHA256dc8bc068895682e31b413c13ced3fcbd8a9766d9a2346cff0ab6e4c93f223ba4
SHA512585af65acdbad4888cf1233878c0f22f7f086fd5ae23501edd92727d0a4c161c11bb6d77e09c542a5587e0201672b1d7a31e11ee3cb10193eeb220e61df442cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590bb9844fbb729e10f120fa2e467841d
SHA179a6e1483134a371745551c667a20b8a602df9e3
SHA256cb9342fd11759a5b85ef236ff1910952db219c1f433d5093ae22939a322c1571
SHA512e72c98076d582213d0431555238ee62ea8d4a26eefacc67985e47a160862fb251af9ab47e98922f6dd1ec057f806ae62f487227291db3662011d6e29d34df5b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f69119a0ef3242d79116597d4fdf70cc
SHA1d46238168a382a3d2e9a9994f062787b9fb29c2f
SHA2564b4f41c327837fe776a3f63ab3f0c413298879190dc2439757b5664b4ef086a1
SHA512ed7fb7187bd6a1886a0393a64f5c8e1c6931d424c57a4aa401900c98bbc050e2bc0f41a28bb2a343a770760ab9059b7cf05fc5664025d279cff5e0236a3b339c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5854ef29f615a9ed273c3cc19caa6b362
SHA11a008a98bb47ee6bff8269f54b1894d4a80a5108
SHA256269504477d1b0c0a598ef48fc53572f80e75f595575a7d447d3248f9e2069b5d
SHA5123eb4ab3c63f1546aa6a5174c208bee427139aca89ec7a35afed71b90b30dd781e8cbc0cd644bfa8288ad10a7e095c1c5dd48bc9744199a762870eb932b70593a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0dedccb51a07438c1756ab6234b7281
SHA193b25507a9f4c8cf5022a4f6e3f8a84f24b5f205
SHA25628c71a19f8810208d558765c1f791739874560862ab2533200a53c9a489be542
SHA51286cceb67ff5fc85520fd4294e94063e356de17d44f63aa952b986519b071a7c61b53c30ea6a251fe595fe5451e2891beaaf5ff7ce8224180ab1937e5e78d56de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5668310d88a5ef9943b0cc26b68740910
SHA19f68a9b80bde0de0f72479f7abd6a19386138d1a
SHA256ae1d76ebb54d01a2ffc9a72ecbbd876b3dcd2e123821bdba58c4304134bf9cc8
SHA51299365d823e890418b414bb519e38f7970eb43366399ef19ab1809c2c853725f378a3298ef6034945424cfe85aecb96e20423b9115a2ac667aaa453193341ccbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d421882916ca6f9b020eb9ae1564a432
SHA15624b0f23e8f18814eb1cb418685ee73009f7c15
SHA2567447d6e104b02c601e586626d7587624d927706a45bb770c31fe2772f7ed7982
SHA5122510020c2484a7d7bb669e5c7dc0fc1dde1d9ee16f6e3c002da20b4f1b12c657a2987cd488f735e2ea4d4d9056ff66c61c88aae0b77a92b8b8e58f73e3a12c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5c4855e610e240199aec2280baf859e
SHA1fb6d978b0f7fd86beea03bb4f4fa77812229d9fd
SHA256576ed519f75c114465668b38d3ec0d36be2eec5b17cc3ebe515bb42312895045
SHA51282944a720f58623b5b45b9f3c2dbc5585aae79207bb9cd6034bf4fcc1eadef4945b709f1317be0e3c065424870af06674e49e5bcea3fd185f24257ae4c12c829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f27a5586bd0c1d0d3ff9b86bd76e9ac6
SHA1107e6a5667914a523719c5c3a9c2f78ab1f54158
SHA256e0a46c25430078b05c7663d80987a97cfa2a2fad14a62b2d3d612e964cc518bc
SHA51218a2e3cf728c089d6db9d6008d47ad81a6f6233e50abb748d76c156592f495edb00536fd9e314a279ce0f138b78c2b4d7cfa498a7fed6a0eaee74f8596342817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5196a3776db87dbbeef89388326ee6815
SHA16daf16e64047a48e280c4689e6d25391b0e1427f
SHA256563bd3206dde3e2d8953f0b8bc2ee7f1f8be958d4135a4fa4e96dd116402dd38
SHA512ae48b6439d214ea595aba7a6b59fb121d3c8c12db1a4ba501e605cb2463edb704f27070e2ec0d8d66c6b7253a484a9327a6bf68cd8bbf7565ce0c9630bec29dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53375c8c274b853d74dc77d33d74e684a
SHA17c2fa7fc9a903e57c0d6dd78bc43c2d453bf20eb
SHA256d57359ffbba71efadadbe8aad59bf3f007e9e1d35e266a04c4ff760e9415227c
SHA51268287981b3262a8ce2b3fa25a7cedb6434110662420168fa5709bed8a6ef0343c9fb7bffd0419644eb2c2f2a9012231ecee165dfc4b8532f21fe084f7b895905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f16b4708a101de8a8835084ac5d3806
SHA1baf727dd3972f423e42d04e61d64464e1fa712a5
SHA2569355ea9688b124e983874f19157d1f3ee96c953cd2d90240782a3456ace021e8
SHA5128512e4bb26e354e8d576b657d4b5b277e8f0627cb6dff300eca22d10367f449653ab230431cf4e0fbad754e44c12d9dbaa602ba61e20ed186524b8df263333e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52364a2eec479369403a91e5495bd4115
SHA1b3435a6951a849c877514e05ea33cae1224be4b7
SHA256c0b9288177ceffd50b8a79b14ef2528d73d0e66c919c90f521e9be04d5013fbd
SHA5124f258af4d93fbfb11c1e81c52da304622d05a94073d529b37e8b89a4161ee6699f2c06cf1f13e90e247c82427aa132c16d37da81efaaf06c005d733da2ebf5a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545927e6a0ac13eda40339c1b9c9d5aee
SHA14018a3406d8a61cfb6901e93bfd322038f07fb4b
SHA256a90a394f6d00c9ae58d5e61d457e12eb7f14389e3ab21519d03f47dd808e9937
SHA5128cd8dbb3abf2b06b94aa5f0400f31ab93927bf6b3c8d3bb52cab62624fca0e0c676c65be28f68e72678df3ba3571c5905467cee44cbc8ecbf7fcf21e6071ee13
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a