Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 03:06
Static task
static1
Behavioral task
behavioral1
Sample
4934d9c7b6dd0629fdfbeca7684f12bb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4934d9c7b6dd0629fdfbeca7684f12bb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4934d9c7b6dd0629fdfbeca7684f12bb_JaffaCakes118.html
-
Size
48KB
-
MD5
4934d9c7b6dd0629fdfbeca7684f12bb
-
SHA1
e7797f7e3c08393c745b9e23190f5c8b1cfec7d8
-
SHA256
651f9601f4a99b99f7ca0fb476ec2e4f6fc0d05366805b367af7c9446cb98b88
-
SHA512
7d1010ae8d1365a1164b7458190cebd4b0af5de3167ca0e54b3a380431a1ffc392d8447374f0499195023b5d7db73beb3c6042932b93fa216a54df4fe16db78e
-
SSDEEP
768:V/Vt97Rycy2aWzkHa3Z3M4CBTSaemAELdjqckF8SC0/ZuOU:Ht97Rycy2TD3ilZSaemAELdjqck0b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70bd052e3ea7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421990679" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000003a0e5d48fb555596faa0db835a4e97e1ea2ce0f9f3b0454d2c07c77532e5dc93000000000e80000000020000200000001be9b2ef19bd5e7749864157e8cb4cc8c9c39b4b520a4ea3b7efec48ff1924352000000043b8a2fa4f86d1f47b1a61c07f0432446bf6ed60ae18147c257da70f64a9eb3940000000e9206712b48b34e3a4a95932206c07550783e63ea1f822684e1fe7d5c0de9b7b5c997617a33a548a68205962803929237edd4584eaf8d6721e6297b46419820e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5643E4B1-1331-11EF-9891-EEF45767FDFF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2944 2080 iexplore.exe 28 PID 2080 wrote to memory of 2944 2080 iexplore.exe 28 PID 2080 wrote to memory of 2944 2080 iexplore.exe 28 PID 2080 wrote to memory of 2944 2080 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4934d9c7b6dd0629fdfbeca7684f12bb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ae343054e41f30e67cd6be035a518831
SHA14ee5e68fd1ffcf53122c9bb86af824f9869c2bde
SHA256feef4144f9186af6597aa82b0a870f7eadeeef7425cc180dd4038584da7a08c4
SHA51250c2921a1a34a8b325ac2980a2b6d2dcf2ed481c1481730ba798679a81566131f543dcc677a1497ca9ad8305e2c2493afc1a4667b62e52ef23f5180d07c39114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5162004967eb887d4e3f0a5e5d0758b7c
SHA110504a8bfac794e830438d833c40ba8c09d37ee8
SHA25645fde83bc3c41fb49d43b05e514bc2f28bc9a9dd8d38416d37dc7f5194f01785
SHA512f5141dffbb45d17f93d540f2155a93a6c7f47a74e60f3fc328fa8c63c996db5eaf9c1e759e5373cacb38bfcb4d27dd564cc5838525865884fdbc29b3c0dbf610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541d32121e4ee3b7f57cc6b2bfa091cae
SHA17c3e2ca250d8a91bd56e883563d58a244f90191a
SHA25636e089222f3c67600f2d1b1a6a329113ce966504df9af8dab49177fe99041cd9
SHA512efc4a2e30423c5b76c58db310b7efce7671bcdfb778533bf03499a1ba9b46a4920e94a2f88cdf3ddcece1f828cfce842b9606fa90b06efec132a0d4d098f8d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb14010b222e0affd50db00f6265b659
SHA1645f8885f5f42168144c31b70d9e8ac8c5ff8f3a
SHA256fa4c6fec32cc98ae54e3a54954f67e312b5cbda4e866f3e775a96db0812a967d
SHA512aa2362f740468062f8b12dd49af84d59e632496dcbeb80ae220aa81bc7e6a1abfdd1173c6ac5f4505abc7caae5769f98866a25363a94c7bf66bf2b214787258c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50019cb82b9947165efdce03c6dcd79a1
SHA18d3de1d283a017665962a8bcc81b4fb5b77ad51b
SHA256a3ec3abb4caed8623ee70b0d5cd731803b62229ec7df18688b2ebcd103373d68
SHA51274247c8205b7e605c32bec085363272d91865e908836964a6b86be3eb878fcc57a09e54de27f16e2a8de7659d98a7a9d21c0c92c05f1b1fc316f2321ee8f2a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b257789545c47fe5e92beb65a71dc24c
SHA1095ac1a7129a5e0b4a663154206e1d759f5da4fe
SHA256225285d2ac34961e09c49ba0bd51015430203c986494498e6932c6a72c52ed70
SHA512f9590d79569f659ae6b8ee936cd94ea15f951dd706d0e0d59600e4bc8813cfbc6c90c8930e580398aac3672e2473edf2fa7037b567b6b67567419aba19aa0463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a4de421f99f849d57678d4f19bb1a4c
SHA1940a2723f020c14a78d8184a38980d2dfd5cf26d
SHA256375e2298be5d7ed42c44b07d0a8a909b258570a32d659aa2db0708d12437f267
SHA5129e6ff3a6e1ebf7684a338a2f44aec84a93e40524635cae31549930974b52a69b4869205bb431d1fad2c00aadb9119a32d02d340a8d3d9f769477aef622ec41e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5bbb1a89a394f41dd40ce93d8bedd73
SHA158e0af32b726e0eabb94e5513da9829aeb7cce7a
SHA256f8290e1464190b75dd6bcbd0acc210279a96e9ffb9de75acc82cd0c25d69cd1a
SHA5128b58d2358faa9b0111326eff4243c0869e1cb50cccbccadc9e0f9f2835b0458f1100823f526fed921b38aaa3084476a308cacc67be4f8b19c4b765dd6dc12318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529c29730f071449364234415a4f73ceb
SHA150ad674910857c8b1b96b23b8411c66e133dd7a8
SHA256206ebe1f732fa9ec4f64105c2d0b5ccc5d45e3f30f778f14b80b47fa952e8171
SHA512b6f718f0f4a24a162272616fbf1cf3a942bb805f3ae4435ba237d6c9ea7778d84950ad6938546857d48ab1ce534cd3be319d0adf2146d86746271e08cf1f7e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d0d882a450123cad7d639a12ca8159e
SHA1edbab443d151de9000983936cf7725c9bf8353a0
SHA2560d66aa2fe72e36c9cc1483a0cd05668781522fe97e18ebb0e496107505041cbb
SHA51231cb78b53d1118036abefa163353f17e5ae4270c476090ee00a6e25659f445ca9133a08b733b70915c5cb8a3a61dd5822410f6a2949dcc96e40dca614654bed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7dff0ef344cdaadabb95a99c624652e
SHA182d8a95b7e1b439f4fda4730fee29178e4d22257
SHA2562b31d3635f66234e91af33d42a5a550dd050594615692b807cfdd113e13f6e43
SHA512873ab972b1e9728bdec4cc8aa3997a37c7d6e7ed79f176d7543d8547b3513348a01fa3cf1882c00da116b99922d9bf5e999bac0f4db7fd72cde2a2bb4c5d7d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f8d673691d7fea89f272bcec0b51ef2
SHA1e7cb268c521a4b808d374f2f90fe340b7719fd98
SHA25625a65ddd837c4466a359516e94274154a8e427ac782cecddff1322c6dbf9e24d
SHA51288ebd0e202457e73b454327b0722b6c6dffeaadece958b8d1fa438d9e6c83db0d7eb95bb0df05481d56438f1bd4a113e737b6a312e0376f1b9a8af7909d48f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58179c1a89ab5709006d79d7aa853447d
SHA1d2738b29d3e215d3a7f749e996596767ce06cc5a
SHA25604d0f4a3103af5bcb441cef589e188a2121f17172b20c291d824215de5803357
SHA512a5127c5b6e41c5af9559dd041b100fc45e421b377afaa5e81f949154e12503c0a4b0a8a1a34cbca509a19e92f38bd21840d1b2d59250c32045dfa0ec701d2b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505d4c4fa84ef6ea113ba76a67b95ff80
SHA16e73cacba707ec804fbcc1220298e6434268f305
SHA25603a94bc9f038a6d2fb09c93dec18d7b99f08b7accaf97bf20813947610bbf185
SHA51214d8e11a5039f4d949857332befab2b5a49583a200331c741698020dac6bf98a0e3cfe676636bdec8c066ba9ca4a86d5305bd8a9540d8c8b2d2ad2e5c4853914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509f59eaf7411261745ab2e1aa1893ca0
SHA14664b161585fd92cba8d2f0321f40b2e841648f8
SHA256a788dc2fe09281bf8e88078eabb0c2e629dd79221258a347dd70bd679f79b0ea
SHA5120cbe08939acd1cae5110ca00dd1bec6bf95b4446e7faa6fcbf40b73768e7fca72b1675a278b348575ef66c7041f207e78dc66c10e31126673a71047807b0f304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc2313392f84cc1c96233757b097f991
SHA1d982c1e5d134de65f1f8172035a58318b331aee3
SHA256f2c6ee22aed48acf5dea28b2e62ea67e259669baaa40625a96e5949b9292dd7b
SHA5128bc02ff538d5727bdbae5313a573cdcf9724013422f28fe7ee81171ee074f04c215db8cb32eaf5b75cd067fddb9df1b7f3de17c36f32cd173ec8ebe877dfa76e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD502b5bf5bef2975789593ce1d1a30d034
SHA126933ea241850efeec62113f3d10e9be307395bd
SHA256829f3f2ad10cc2719a5062c19a758898da0124f6849ded4bdadd36057200b2c4
SHA51223d6bfa40ad25228f5c2bf4000e52b578f9e82800f28ec7c13ea071817ca26a1adf98cf95cd736b314b6f5c6cf883f4abba36ddaa05cd91eb578d7fa33d0057c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\iframe_api[1].js
Filesize993B
MD5683b4d5daf30af215ab61615a2cae844
SHA1cef69fb98dbc6f10b0f642fe15ffb8bfd4d3a4b5
SHA25621611496da46783ac76e2a0dbc39bfab73f4aad4e97cc29b78bf57a7d934217c
SHA512da1934d74e3e41263d7d7650baca853810eadd1dd184d611b5406b80ac645b31a048af301a96cd72e8294db092f9908a86799893e97692fd7c5b206509c9d73a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a