Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 06:21
Static task
static1
Behavioral task
behavioral1
Sample
4ec5e2a6c9d8a12a8419b150db17cec5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4ec5e2a6c9d8a12a8419b150db17cec5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4ec5e2a6c9d8a12a8419b150db17cec5_JaffaCakes118.html
-
Size
76KB
-
MD5
4ec5e2a6c9d8a12a8419b150db17cec5
-
SHA1
64a32e95f3a3007386d28a34c975b0cfca53ee27
-
SHA256
884e0f340cca2d2c5e7259f26f2adb85537ebf12d0298cf1bf46da24ddf0acd6
-
SHA512
4804ef73882c75aa98b0c8f45369d167a90090697ce3373994a4cde4520ab5e44d94bf6fa23599e8dfd86750711b5944a11edf2361163107faa6ba63908755ed
-
SSDEEP
1536:AeOZrthF0cV0jJZmOTn1GvSmhcoYa1EalkXdF5Q7L45:f2rthF7V6J5OSrdFa7L45
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422088735" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 201c797b22a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A5A7D861-1415-11EF-8178-52C7B7C5B073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000004c619e99c7db174270945f7c2c9c17f5f4566d3ff277b21fbe6da29647f2df09000000000e8000000002000020000000072122029850e36bdf7c75d90e79d7f92e14fb7029893a9047033c5bc606563e2000000034e824191454620c6575d94b3f3a53935245e24f59c1ec39556be4b2ceb179bd400000007563ad3f32a073c923bc7b888f7c5e9f66e218895cdd29fda2ce4f678f049524430562b8ed686d540f5138a54052c38674e89ed924c91f0b38b0eb6faf199586 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2920 2904 iexplore.exe 28 PID 2904 wrote to memory of 2920 2904 iexplore.exe 28 PID 2904 wrote to memory of 2920 2904 iexplore.exe 28 PID 2904 wrote to memory of 2920 2904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4ec5e2a6c9d8a12a8419b150db17cec5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a901f856faf293f12268bb1c575682e1
SHA14b3265488b51b83e7bfa4a710f28035601d78040
SHA25677948afab002297f937928321f0efd729f52b8122c41d78dc565a7631daed0e1
SHA5129d0a44737c8188e2d730eb4c749cb34e79ca42a24410b362c4b6a1a3c158fe472281eedf3ba5b86296708f7b599608acdf0f3cd2de36efa7e64daa7cd04b38a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac32d7fb1cc4f180f980dfaccb44d118
SHA1d6e3fdfa619b5e1fa204a0a9e61859951ef4ff3b
SHA256b2f1da1fb686ff2a79459a6e95001a5b34cd5360fcd9373568f75f0c0d3a3ddb
SHA51283170a03ac3ff5b7165f5137e79d477cb2a39f9e40d8c5bc8e751658ca9f438c31f9f852d972238b47badbf1df83c1fa46255ead073a49dbf38624b93dcef4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562a8176e6d642f90d21ef12770745cbb
SHA1b4b1129100a0732a69ee7301a5d03a4f7e62509d
SHA25657a55760dff4b2d37d0baf12fc1fc56f7e1996d56dacf5c65137dc00e74df274
SHA51223d3dce086377dc804dc5967cb35c7c91991b3dd3542934b866f1bc4d4d0dd3bfd0959fd8982164c52852c853e4ed66199feeaaec0fb2f11d50536138d2b9016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54042226b377a4227f38a08b942bfb5b3
SHA181ec8292bf1d743926c5638b957c7063a16c8fb1
SHA25661e2b47dc3eef6889cd2f4caadef56244f6475b64b59f0d353470d41c5c76cf2
SHA5128002c39e5ff9aa26273f5aa4f5b446d523398d7d7f27175e543822a32f3c588b2fd73486fca1c720bffe95df814af31e1248e92aea4d809a11eb1b3ccde89348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576878f3ca46f31eb4ac4718466f5d589
SHA12f3b2e10c3b943ef89024cb30ea3c8b1e6dadb47
SHA25670e119ee4ebcce98b6b87377e146f76a9b75fd917b533632a291ffabf5078b62
SHA5126e67ea6133781c304e374513c38f89952dda8f7456c5c30bd0e35e04fa159cb995066dc39e9eed60bbb9a467a952cf1e691bd3101cbb437e581a750639995666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f031a1218c6f00beff0f8a8bd40e982
SHA12bcecb1729b694a80ffe1ae8b8c32679d2f34ddf
SHA2566f5db7a0418042aa876281db44f7dcb59750b976229f982d12b0e0289bd64489
SHA5123a4b49cd31f64da7b1170694958574b16bce21250fba51f9b399c9ffe3091ff959d6b76406ccbbf5da88958cc9411334e6428025ce02dccc3baff141cf848038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2f2de679a133889e7082f7838c11d34
SHA1086f9d98e5aa75bbd906dbc9e917227d3f59209c
SHA25650c61a72d9d6d03391fd29c3a5a9d61da596427c5d63fe1d20cadeaf3fcc6505
SHA512bdec30f915985284a1551bc257c7bfaf4b88963d20bd3e463c90ae4cf76345a584d8eb9934298f541b932681cb5942387f891cfe04a4d02c1b561d13c3da7069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c776c001f66c7aff32f5d8ca4a4df373
SHA1e67633bdfdf870029bf7690380c86244e229629a
SHA2564d968dfdd797471ed6baae72c9cfd6bc6b4ec0435957e5bd4eca9b8816793b33
SHA5126a93e6159474c36994acee060c3a68de3870e0cf0c0e439b4376bd3dc68b2ed2d2c67e2dd42bc39105c214e5973e48fb890a654796fde010ee6c0d54f5c41fdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d96b1beccc436dca913f7aef00725909
SHA10f727226ad44089cf558a42de4dbd348d73146ed
SHA2563866fd08a329ae23491b5cd1d3fca6901155eb449ef795dc84573c03e74f0123
SHA5123798ee7f9643fe8f7c8cc3e4a983b2402aea3a3fed5c246180c008255a55d8fe11448d18363c404e54852db8f2789f4449a1eb1b285a0f0abbeb0a99adf912c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd30e470b52d6b4306443fb524c5167c
SHA1c32763310e0050d2e378eb4d0850ff6e07083f14
SHA25699d42366ffd8a43229a3f0e461a3004851dfe88b1e81923f363e3274923436c8
SHA512c190a86db86f1962fdfd3ab7c82b16ac7614535378eac0de2cc9729963d09e12133fd9dd110f1cf42a16fee5fe5b40d96f97cba1f1a16d21fddac57038f7c618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afdc374e51c8194dd5c60e2a04de8595
SHA10c67ca1370ac5106dbb7bc2acbe2a08d35567c94
SHA2568108b47b96aacf3928078e9f2e72c61be1ce021412441933f61480caabc6b864
SHA512fa25412d7a89c48926f4f1c9968db30f1268b23a73c6bf2b4ec2ac932865938d13199b98729ecf57ee2ef9f542e22b8d4c51a9b4677f468104eb3c5e79cc1c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbe39ce78580c34bace6d447f344d3c6
SHA13ecce94cfb24e8c51ab4c8c603c0ac5f17b2a103
SHA256aada23b4fdb40fd7be045ffa6e347c52a3bfc519505446ffcdd333cf3b5b1797
SHA51288c4cac32f8c6c3304aaf291cbd85279cf08f2b9f353a5ba1a0b0ccb223c45cefc7cdd2d031de9bdc7c0512a30c680c332796c44f1540d6f77170373b10c58fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0b2f8e4a1307589f35e7f92dfc748d5
SHA17b9044aae270c91bdf62d2315e7b23959180539a
SHA256373608dc245a35a808c55168e0077f9bbc8b82d9ffce2e9bfe78b4b970a42394
SHA512e0b6f4df44a7a7b9d9a09bbfee4b0b423b1d100c619d2a86fd7501f76a531b6d357de88547d4cb9a6cff33fe8175026167ea497729f371076a5ae542c657aebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae159a3569eb1400fd365f5fd459d9ed
SHA12ae55a3863bffa4e0b1d513a1ed426cca647212e
SHA256fb5ee07ed9b932f70758b227a365e85af327997ed8a0432039e8163a162ec2b5
SHA512dd4a050cf7f05712dc733fc1dac7471d437417a7fa2c45809e1bbde59e5734455350945ad2ff22ada04bd172300e4b9fd7bfdf815b626f3533cce236f057cad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53af7f32d5653727d89daa333359c4110
SHA13629ac34d7a2d963781a30a56db2fc550ba9b283
SHA256fb9cf1f611383276e1544e621425f885da5c8a6a20be6597dcbbdfd306b1b876
SHA512866ba98ccd5ce34b45f407ea8448e7341f14024f4fc0dbf154f5469a038fb982f45d59c598fd6adcf440374574207f814f22a6312c302c34a530d4c58f140d46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5766e4209b733eee0c88591702026d8bd
SHA16e8342a2a8994dfda3208f8fdeb51231f7c98883
SHA25625b9f927e217b6a4822877b5e30d2b0b4657801fff380894b81785af6b9c1562
SHA5123edadd9762cdf274b6b2d9f0e130ea3c17423ae0c26fd40c84784c892ce05c816d732ad1f3c9193ff2b785c88202705ca4a9e97daf7fddf6aa9ffa0da1f8bc42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5729e9c8f314c30607c358a709e4eb78f
SHA131cbe5cc8bd40c9dc02802f45a4453d6beb22426
SHA256a8127ea18e2e91daba4cadbe4722df8375b7b35bbeec3b9292116f1f472621a1
SHA512ce870f5fcb97570142e5c9fe783bbd9167385808a6ab85a13cec239886a82fb634a66954576ff2fe9908db256dca9a235b67c926954dcc75d0238860130c4aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529472337d35cafd8462cb8e5ec3cfd79
SHA1c82cd0aeb986bfb56cadf3fb133b0c1f0ac39eda
SHA256405f220f8f7f36982908711a1b1e8203d4e95d7ab16912ba6591ef903eabfa2c
SHA5128f84937ee88d480f952e4d1b3699dcf3dad7cacc8696d4b3f446348c42932251ac2748097dfda084771273bd724f1adda8c293812a38f6e80df81fbdc3be6745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53704f58248ce7d197c37513df67c8f9a
SHA12f57d5444e521f3f882cc54685df0142c875f56b
SHA25681024fe4189839c36b45942137c864bd8dd48cf3b62bd021fa9693f15d50eb65
SHA5125a35f583fd004402bfa043a2f4c1c74874f6ac221956c995fe9072144aa4efdb353333d94758d352999170ea7e9666260dc817b9e98e673a2dec37f445ff5a73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d244c78f68fa47bf14d310c1df97e7b
SHA138d36a67a7acb19ccd87cec0a34c22a2c7a26641
SHA256a0d70726aaaa9c89a80c9c6a20621b36a5d9b1cfa95d87a2d65d9ce27f6e1375
SHA5129d6ecd5b5922db8a5f29cb5de2c997908320d03d30c70c056d61cad3d11b45b071608d88b2ff5ef224beac412b09ae8f9952143485358734c919b3c1f378e2d4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a