Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 12:40
Static task
static1
Behavioral task
behavioral1
Sample
34a10549621ccfd7a055d2da5c710014_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
34a10549621ccfd7a055d2da5c710014_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
34a10549621ccfd7a055d2da5c710014_JaffaCakes118.html
-
Size
461KB
-
MD5
34a10549621ccfd7a055d2da5c710014
-
SHA1
0df139ebb074b4d52239e53f5423cd57dc489781
-
SHA256
e0b515459154016b3823e1c33be16b68972fafaeaa31cb29dff6d5867cd2a3e2
-
SHA512
3501ccdac624cee07a0e8f4e39e2d1a7c644999f813a02eb82f35ec138a5c6380c7f1e6a391dfbb5db0f40c1b1f4d4d1a494907295b26d31c54dedaa30606ded
-
SSDEEP
6144:SCsMYod+X3oI+YxyQfsMYod+X3oI+YVsMYod+X3oI+YLsMYod+X3oI+YQ:V5d+X395d+X3L5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000cf22be492acc45def0ff0e5bbf4776ecf0ed2e9c3ea648677c36c3bb1b707a81000000000e8000000002000020000000e7ce8c551abe5fd271cd8398a2c145dde6db10138e272668a49773733e378b6920000000e63df8a860499800aab1d2b032fe90b2203c949b387f88227e2d1f3dd225ce3c40000000a76bb60a9b5583e5304c5f604fdcc8c1aa167255e805c235f11ff6cfcbd83be4edfa03598cdf94e6c6edbe762d29ee1c136da10b7a2e9c04fc1f8e107099bd82 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421593072" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{97C95511-0F93-11EF-85B9-4A8427BA3DB8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10016870a0a3da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2396 2356 iexplore.exe 28 PID 2356 wrote to memory of 2396 2356 iexplore.exe 28 PID 2356 wrote to memory of 2396 2356 iexplore.exe 28 PID 2356 wrote to memory of 2396 2356 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\34a10549621ccfd7a055d2da5c710014_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e08bbb614e9970985ab650271a0fa56a
SHA18a92ec83f35a70c7da9228043f9ad3ebe1dc7859
SHA25613a255b57d2ac929bc64f18a219f48328fa2576c631d2e4a133dfffb41a47a4e
SHA5126f2b611337f38e75cee6bb516067042b3b06442e3f80107eb9f1464441381fe8a9797493cc6523d36d2dd59af70d265ebcc62c154cb7aa0da736bb75e3fb9e6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ced482b3657a286fb98bc77271a3518
SHA1bd440922959e7826f86b862fb28aa5bb5bec9b61
SHA2561c27f69fa0749fdc38c8198cdcb3e661201692166eb4f1542550f4357f2cc752
SHA51268307403bf4de73c5a039be3602957d2602e98f65008293b24d50810b0247ca6b57b5c6ae51863ff04fb8bb8dec7d5ef5aecee4956ddbbdf10dc20320721f51e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7294238d2214263178464ad327ec30a
SHA1c51118429e3b6e9685e60158b0ae750012a63905
SHA2567afd3ce47e09df1694135fee8c02d5a56cd23cf364979143acef7d7456b0e0a9
SHA5127f3398c1a2ae3b4b894ceb6adb4aeccb6cbb5ef06297c2b96ef560263d466955793d24ba606bc59754996243b9939dfe09afd188fe3d96f597148b0c27d3d568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596c8f19ec35d078a11a2fb186bba58b2
SHA14a30ed1265d4cf6bed45781e1d046f9c6bf68fcf
SHA2566ee2c379954b62a877d50ee92ab27757ebdda393aa6ead786fb9988416f3c253
SHA512bdebd7435d5d286b015476e66153019256d3e9ed819ad76a7985569e3c97ed911c4b0130ea5b35a92e2644d5de8c03c2bb0c80f186b13224d2b3e573229dd7a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dd619fc4411dd562307f10121e54135
SHA105e2d6bfeccd38639dfbfbd681ddc3fce1c96765
SHA256464271da90f9807e5f42a5d1c6cb033159fe4cab68ee1fba91f7bde5e0923b5b
SHA512dec162481da44f15169d139425a0de46cfd48f5c135bd0fe030427e5b89b94fb5f5bd27d36174f568840ad1412304b0b8637f8042e61657394343732095a552d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8a56e0ff962cf5b172106fd51203c8c
SHA107e1ce010ec729daef18619e438ec24eb84af8d8
SHA2565c173bc2930987925315818efd38db8394d58d180dbd0d72f1cd579d0f809d80
SHA5123282dd72b76155a846a3533e8c0e52f6afa053897035febf993b31ea78f6fad4dccf60396093ed733899097250dde25faa47b344c8315043d6466643640f7dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54337f14d65effb4e0345aa8c10f2f9f6
SHA13d578b3012458af02fe4342e906b468b09f7800e
SHA25648d4bdd08960db8eae0a6c06258319423cebaf9dd2f25fb71b5407ecdd3137cd
SHA5128fa649d33687f6df46aad0eea94e4ef3792dda08379446b2bb3b7fac600768f09fcf8ca3e674ad5f1546dfe3ba9745fe7552c4cd5c16fda2a60be935a6a6701f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b2f6cd018690bb8b87f36f786429007
SHA197aec7396be4eb953f10216da9f2a9946877ee2b
SHA2566f016c6f975a02d6db123c03dc68009fd8ae67fb366fa1875048391f62c5f0e5
SHA5127584b6a1fe46ebc3593ead7a55daaffd296c51a74f7f42b04261a46ad9e76e6134f34665e65268d170d0a917df07ddf5db7324aac0aef8b7f04e7d896247bb22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b9a90c7efde12687e70ca589e45928c
SHA1f4f5a3b159cd05adeef8dbe40a7cc881b5cd6ebc
SHA256b9ee535239bc1881b073ee5b51f414770f99d015f6af476c6e7c736f7f74af9f
SHA512cb383c78cfa4e4d0f9bcf1f7b8d23a62ff43bc74e1c67ae3e6adddc3f398b77115f8ffbd1362daacbdcb633b48cb586677e61b3b66cf9547c06ecc76a4c01203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b07cff8cac8406967d8a2951ed1a7b9
SHA1d9a0aec77557486ffd757178fe5ecf85085a8238
SHA256aa98e69ad5c915bccbf3a9422ed2a4f6b172e06e9de754d3d2151ed54e1ef0f6
SHA5122f5dbe9261e26e068cb5b25e291163fbece8049540cf539e05e5c9dd1c77012dc2dc5a821b060a406c9a21c38628ec4ffc31b656ce9d8824b275888074893d7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e87951e06dcc26abbc4a96d0120a0b74
SHA11b7d828a999bbaa7ff5014e792ab66daa05bbde7
SHA25601b5f7be152653039b3f003f7dcbd3671de68d5e69b9ee196babf0d01fe9c776
SHA512e84750de0d250f8c8544646c98fd9535e0177f6ddd3c0bacc2dbb2f9f7e84ef6034e377688e99f87be5b9179672d3e747a605b50cc0d605de12f436ae3c83bf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5070abd4815495b53e8a929d15c6a868e
SHA12b804f5bea42a79839be79edff6518df388731c0
SHA2564fc1b4c6bf3f7fda9bde532e964149bbc15249f16c0c9344ceedec68382827b6
SHA512cacbd4fc498ba7768fc63426c55bfed7974b6ceb9d2ab509c25a4972d8b5e65ab7532367e39fb96d9593f833430b3c7cc3fbc4227a488c3f8b4613164ad47a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8b04dc37383e61963c18fde33804a13
SHA122189f31ffa0f70d349f9cf152dea74e974ab3d0
SHA256aabd314f3766a73e4234c6ea49fd98897a05e8a63ecac907135f2f9476246b3b
SHA512fbe137e621109b1792ac4936dad9a8291fc991921cae2c928e221fe25018e56ad8a46d025c71ff43e80f68f23e0b7e204ae494fb7e0299f3db4defdae61d6e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ce99a80da08635cfdd194b7e2ebebdf
SHA19ad5384a038ea3303f6561d98dbb4782a4035a00
SHA2568b362375160c57fcabd5ba15726ed6985e6c68ec6d4f601eab1aeeb421dafc1e
SHA5123c8124f911cf293742370a4d42a260a750b364347fb5e9074614a346ab3d5aa2e69828ddc26ddf8fd8cd5bd7e0d38d11c7bc97d28e91f19a864223181d5f6450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f23fc8e291dd65ef9185f0fb63bb9b88
SHA13011e14efcae462e2aaf9bd5929eedb295e72b5c
SHA256031058461204e1beecc4d887ab0c5a14b9757c5099c4f4f8f8687e1fc3aedde0
SHA512e10b236438d11484f3d5863b34c8490dd28993b22ae1100fae332a27c0b0785c4c8052318094941a4cac6c4752e4954766054e4f021b638a39cf15f45c62a904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51eea929302ac2de944d025b70d9b265a
SHA1e607d56f3547d17563bdcc8a1cc4c2c6da142459
SHA256dd672a01e961030390c6e8c79c3ce7830cfdf1fe6d5b2072f50d27684bd993ee
SHA5128a58261ed153b3fdce07cd7a468fa685752d183e515de685125bb71f70dddf621a71eebc0ad2b8f4b042cae33c5a9f516a8e1d22d7fe8eb03ba339920b76ced9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3ab2971aedf1409e1f3af4f79af468d
SHA15a8e771712daee3648d21afb18e8bc50d2d98e6e
SHA25607b748e577e09ab488f6270942a432bde70e1d0f2461361480e9a1fa5d55e06d
SHA512445eb274b3b4b850c82d4e61dd2c05072daf0eb254bb13daf64aaf15833eeb94267328930cfc2d80a221d0d8a795ffa12492003b0a0cdfedc16f8d87b77bee54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b22337eec1a48c7c727d9220a293888f
SHA1bf0c391eef66032a868a0aec3444957efec5e237
SHA25674698e982e657967f4d625a0f0042d900e339eed8467f601c95dfa1056fb7785
SHA512863090a918288d2a5ee255283c7a9e26b5eea02343a179926572fcfbd1c6bee5ec70b33e202b113d442960a38c56f7ced44b6f9f97c783314fcbeb4fefc0936e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3130ed45228af181f7d2283968a8284
SHA1ad422259b00cbc574e18c911f8fc3da634d60961
SHA256396104b2f968216a38be7dd7c43c26f4418dc2730081503fcf4d6c9b6ddabc27
SHA512b46ac52668c4cb5c4d8a7d631f97f223f95379595c403d95720adc3a41f5ab2ef7ec15739587837ea9cb1cda59eb5b3872748605637a54be294915e1f8d8658f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cb3c46da14332a032da437584951871
SHA18bd0901d2c23a8992eb1c853be5290f8fd39d87d
SHA25625b08a4a39c4f4aff7861d769774a84384bfecb0fb90da82ecdf4b2efc9f9137
SHA512c35d9e44cc13afcdec8a37f67a5742c024c61dd9d89f77b2102bae7a979767afd7da53873bf275676e1f8e3b67321896857f260d9f29845c101c5947e9e9c7de
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a