Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 17:12
Static task
static1
Behavioral task
behavioral1
Sample
302afeeb962a9db227edf8b089c40a1f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
302afeeb962a9db227edf8b089c40a1f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
302afeeb962a9db227edf8b089c40a1f_JaffaCakes118.html
-
Size
75KB
-
MD5
302afeeb962a9db227edf8b089c40a1f
-
SHA1
121584a64a3fe1ad52721859d011ace47496e4b9
-
SHA256
7d8164a30a9a9d5e95650bca80457d03a82310b9c8b1e8c6662703efd27124b7
-
SHA512
a61063293c20341bd662aa7c23c5ea4ceed7c8767317dd492ab271b8abfffd1a39e044f43ffdc9b42f389ddb7d09aa61e9ffd9c51402b9a346a49d57e5e98368
-
SSDEEP
768:JiBgcMiR3sI2PDDnX0g6sN16nR+87J3kqy5M3ROoTyS1wCZkoTyMdtbBnfBgN8/C:JxKTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C5A66F1-0EF0-11EF-BF06-56D57A935C49} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70fd1253fda2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000d0edfed3c17c4a975c227ec25a90e71e20e7795463475f521c622f742d376b2c000000000e8000000002000020000000d30b9b12d09a1700e09774ca791968c13693728674d89f85234962abdab2fc2e20000000a90767fecd4f84be25e6feb9557d3a61ed5d0cc37462d3696e7ecfc3aa70f1c840000000bf877211a1d1c925822d04bf97c576c070dfeb49f1d81f8cc32130d21bdfdffeac8f4aa173eb1dfba3ad099eb1bc368d30081dbd48f2aa30d511403ad5b53c57 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421523019" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1252 iexplore.exe 1252 iexplore.exe 1904 IEXPLORE.EXE 1904 IEXPLORE.EXE 1904 IEXPLORE.EXE 1904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1252 wrote to memory of 1904 1252 iexplore.exe 28 PID 1252 wrote to memory of 1904 1252 iexplore.exe 28 PID 1252 wrote to memory of 1904 1252 iexplore.exe 28 PID 1252 wrote to memory of 1904 1252 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\302afeeb962a9db227edf8b089c40a1f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b93ffa6e345fba4287a98f289b604f41
SHA1f7fe367f43db7bd2520e7754a80cb49a11a86e7d
SHA256dffc8d26fd6ac30a0316fc6cc9c151a64178617633d8a8afee043997a4f7afb8
SHA512b78da211e4d099612a3404823d844d843b1a6b83db8cf5d1631147435a5978ccce69d88cd27b7aa3d96f8335d4870b3ce633cf891487f71c7ad212cb44afe8bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb6dfd2e1eabebe23db6aa1f8f0d3134
SHA13c56daf02a09f3bd64845acac45365ffd6eca941
SHA256cf963ccded781d26cd9ab4941bea289889eecd10c898d49691be844ca565baa1
SHA5126568ebe071d744317858517b1eaf8c2345dffde36efae0ee6c89e9f967fada217dd5e113e8a92d793e122d230c5bd753ca0eeff562f2d82703fd0a11386367e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5516fb8d06936d454b3e4b52c358ef8f3
SHA110f4baa29cd9764287548b25fd0ec48659e5d3b9
SHA2564b9e6b15e3b2c8f3acefdf3226c1b3a321637c4c889a74942a7176e102f41594
SHA5127d02df63b47fcfd0fe5f9e1de3ace80bb75f2292e59e76e28c4eeac0aec1dacc224fa9aa5b982a7da104b3606a7453143ad105b7b617469fda0d135efcaca982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5327250321525592d53365660dad0a6d1
SHA15d36240318508739019885b9e06b534c12817dcb
SHA256bbc28b5f2c8ebb264ae5250df148fec0963b9d70d6d0598c42fc22b75965a662
SHA5128d0d71bdd35c0a3cc2276e259b0128304fed18613fc7e2058adf62e67dd890f5259f290e968ed4b8f97585e4fc696c52d763545121ffdead5f5f145039118271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52174a688bc0b3da7c7dd03ad705c4b41
SHA1916b89462314d4b58f28bdb992ba0f815d8d754b
SHA256be83376ff684bf3e207775249298d1bc4af2f637043147a0808eb0bd6807cc3b
SHA5122d92e455811b0fc6b952fa1c2bd03901a79d010e7a10efceb7a780bf0854d3310c3f792840c57b7870fda87bbfd9d2c4d341414a2d188a53ff10db6c9d9b116c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54be6624f2400c79aa8acf0a7ebba4b11
SHA19705ff470f5ac1b35849495b7d09d0a7cff90c81
SHA2560fa37be327b4d621cb377aacf3106902ac2b744f3c2c231e544260bee6554f7c
SHA512ba86e942cd7a2a795f6e2f758bec018dd72d11af7e6fe58df7ea208f63b6da89bf366ef8cfbaa35ea45013e2701bd75df140fede5df6ff6149fb40f1630a12e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576d0943d6bd7a15225b6465e6e134977
SHA164e4fa9c1a5cf8aaecb06d9e84aa6ee025654de6
SHA2563b18ee5d25bcf1b0d8c19d19d70e3951f4271538b7d9dec07ac28250cba9b1a6
SHA5121d63c920f6631a0c94d5676c13292a1f1ae3043ed9cf93bfc610a128a2742fed4767d64b1053ef369a2a606e93a322c7c5758dfc6fb71f4b4ac6d51c4eba13e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e524cef201f5b0a400242bf8fad35de8
SHA1be22f0811441bc622478285226580f990713066b
SHA256521d6edab9eb5db102c0f794bdb5972b84eb93455f4b1eebc80b40ee95f4737e
SHA51297edcce068c14ac632738e2dfbddc7b26fe58a860db1d37940066fc71f6ccf9cd5075c9798624b0d6a40c74a353a31f4eda0bc75c9dce89435e45933806d6480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6192c9ab1cf3e1cecd1612dcab35acb
SHA1facd514237724b1d36007ef5db01aad3e7732e06
SHA256dd9b969acc84c0bbd10d7bd8790f3dc49d85e26ecd390211b0a89e33e9d6d858
SHA5122864d1d63bc7dd92e7556e1b6f23ea7662079c71b3a910624166775005b3470a3bca36e6b02ab4ee8ac4f204fe9327d495fc2298213f14c5990a411a8b22b9cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc87dda8592519ab356c28e8811d6166
SHA1d233cbd3d15bc3956fdcfc1d2f57d020a33cd2a4
SHA2567761812d2e2648ca81bed15fd12e3ee288b7f04b74694a54b1aed40b934c750b
SHA512c76a4a014c201bcc95fda11800229542ac6e476b6b53dde51a2772d2de9bd37530649859ce8f40e380bdf8d7b86af59e3a81b5b577c6ea702f03bb52de6f2296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af9e4a62b232435283c9dfe8d8365b85
SHA19ea849c3d94928dd2baaeb82c1b3bbdc4a4875fd
SHA256fe9e9f7c9e87e8a7f30afce042565ec75a7c579b65a0fff0a5a02e3f90f86ec1
SHA51231481ec076e7c11151ca70ebe057469933a6b85a84305a5c0ea2d59a41ca093caf2758dfe0e3723dc3cbb3307a673694928f0d6e06641ed827b207780b63ca37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566243846390e98b89d7094ca08184d9a
SHA1b7be79b8ba3dd6e2260fb4ffa5f40ceeed5d1dab
SHA256afed6d270053993cdf22a500a6fad2b090647d4db2fa0b704622d1001f2d8a17
SHA512c513cf3c738d3ee9b25b0995865001836b42c0382dcbd2c0336fca366ff9f5517abcd80996f0e7b9c6990898eff59bdce770b25ecdb22fc3f01e1d81dd31a20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55015aad258248cb452b639b3b499cae4
SHA1565c0a61c9ab5ac70abafa21eb9fb281b94b9fb8
SHA256224e4c62e8e55e03b70644c973fc9715e124354a56d7b2349dde5c8a56219804
SHA5125d4730a5883731b12fd93712989e28abf25fb2a5b4c1aed0a33f583e549819adc91b78982d3e35bf9c6ecb40b9c530fb9d6beef409e47871624104a17314c975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa271b17a4abcf3b81514451febc1eb4
SHA1fb206765601d2eba8a26f207d99c0d7e480e2816
SHA2564d973b2b4c830f8abc4f52863101140dba438af24701af4abb4582827cf43f95
SHA512fa5fa52efc1e736c3f23acef3043584b212bed37a2606c14140736fed9ab3c4e76ccf9c914a57f3f91feeb3e0d567f0142d203ec22f65504e6d06d48d502fcb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d636d930c9e5587510854bbb8933e729
SHA1e2f9f40719ae168f08c9a5fe912bdd7138f99b9e
SHA256a7bc6f3d53fe8f5b0b1e0076247043a784e90f188fef820f0ac3719c3c3ee2d0
SHA512b254c5dbf2e30ca34db7c1b0409ab4424667d0b4aae535b2151b16a1103d547f078dd1d33cc47af8be91d528a528c7c57e3b710f61b7660a95dea40bcbda527c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bcc1549bfc199ba953792a7d9ceefcc
SHA14c33c7257f1fad4061e3bc3212f1d748b0b8ce1d
SHA256a2f15490cee8a4051a7330a981bda2ba4470b118eb3661a0babee7c145135455
SHA512430738d99ea70d9beca23b28d72fe63b2d6988b193d83461d6809e73e0a92a01c634f8e82e67642af0e15a2cd29d2eaef8d3eb0844a4dbba461f516f99bd7773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f6ddff42ac3e9831ab25040ca4d31a6
SHA19ba628d95f5f1d412ac2085c30f8f38685795532
SHA25663cfba1c233c2438836377d08f1d7acac40952aa2a45d8e408768c44c91a03a0
SHA5125fa01dd5590b92f445c0d9cedfe6f2943618ea7bbfdad0eacf286d01bef070146492db656f0080c27017c7be60ddcabfb3a6c7e606e211bd64e1df362b4dbbc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dad8a81f2cedf5228fbbc658668381d
SHA10d5524240fc528316e1723f20e682cba06719575
SHA2567dd8cd5a5489144144d3eadb1942fc1d7dc5870506e7431e8c3b0babc19ac678
SHA512a102d3ed92fef61217c070adec54c34fd071f165c454de1abaed8cb549bb80337bf17ebeedddb866b214fe2195c02d4d92e2782fe682defea8e88b72763f70a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5047fd0e3774b02d8bf729cda2b352b10
SHA12e90d48dd04abf2425ed7a750ab5ecd6cad4f883
SHA25662fa6afb7c342c51748414d6da4123f18253bf372eaa9e310abd377cbdbe50e3
SHA5128012f501105c117b058421dca3431facd759efe54291498d4db2fcabe7868a12e5426711bfb472ce6e0cefb944592b92045bb7bee8924e2b090746a815e076ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f50aae98fd9a933ba396bab33514745
SHA16b4cf4b016fc7f0edc23afbc02d2b6c9046f9925
SHA256e60c13be12e564a7a27a2dbe7ba3d6d73ac1579c9f3778ff5b1137213a5855bf
SHA5128a152391f3174738026d6f749274a06c8e2695a3d6eb85ef2f7a5df08654af2a94bed5a0c8063a17b3588bc925d2f0efd411cd21c618f799e2f00f42e7482c38
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a