Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 16:13
Static task
static1
Behavioral task
behavioral1
Sample
60011b0fa8908b6d9d2f6614e63146ed_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
60011b0fa8908b6d9d2f6614e63146ed_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
60011b0fa8908b6d9d2f6614e63146ed_JaffaCakes118.html
-
Size
65KB
-
MD5
60011b0fa8908b6d9d2f6614e63146ed
-
SHA1
d268234cb85055007888c5b666234191f07d9b77
-
SHA256
923968502854d8d7ca9813762d0b8c93579da8dc1af1d56b5b73b831ee8e801f
-
SHA512
714790106860ab63036217fe30baaf21da567d55194d9ec879044b1c6ba389d3d783fba29cb7d1445fda57f6fb87d60c1c95d434d9e53fe5f1490a3da27fb845
-
SSDEEP
768:JiFhgcM0St8tN99OIs/HOtQ1/Sbm/cooTyOqhCZkoTnMdtbBnfBgN8/oycc8QFVf:Jya+4o0ZklTIgec0tbrgaCcFNnzAC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F26A3071-16C3-11EF-B21B-FA9381F5F0AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8082f7c6d0aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000001dd26f351d4220b5927efbba0d7b8c20c0c7e6b8e84e973c5e3aaca4863c0630000000000e80000000020000200000006dd73c004c704f4abadddba779899d2ae69496c109b2aec47bad7cdf24cbf4532000000053090950806e8dcf105eb1ce476ec2b4a113b3508ebe729718a3a4a4f617807040000000db9f806000ba2016a51013c204e2a26d1c47d27ac86473762b60b2c47a4995378a4c48b8062b44f1a4203aa42b080f3bbfa07fd9e5efe74a55376c0f429bd93e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422383498" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000066915f82d0a37bb4bc6df4213e81b70b3abbfb319ad843af7a3639b9cbf30e7c000000000e8000000002000020000000eda5c6c0b8fee0e63618d8764f4b5651e0f68658507a48e4fd1e7f0f53bb52ba9000000096ca3c30dfb43db1eb75511e636ab801c7fa444859764a0c8a5ca43eeb644fafdf04e7e72ff79846f1bed9b27c4971cc3a09d6332e9e5f088a0fe6fb523970dcc1c2531c4693ad5e308eb1732b1bbccc41d3b56a39ec8fdad686b26fd65c7076550ba9abfcb810ab7a3a590ab9516dcbd17d45199922f0b2669161cbc58289084824622c9ffc182eb6de6b89ae75fbca400000003c0834a7f48fa7260f4cbe0f0f1c0a23e9d1318870eee2ef382ef93edec003f5f0c23131f4cdd3a899c28be349d1b88a97bb235c83b4a1360d54b6b36e95a737 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 1676 2324 iexplore.exe 28 PID 2324 wrote to memory of 1676 2324 iexplore.exe 28 PID 2324 wrote to memory of 1676 2324 iexplore.exe 28 PID 2324 wrote to memory of 1676 2324 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\60011b0fa8908b6d9d2f6614e63146ed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f547db270547bfb6b676526c3870f38e
SHA16c4e45dbaf8a9860cae1d1f1523e898ba89bec16
SHA2565f771fdc2f88285ced7cac146ac61ba10a2e4b30fa4d3e51d71015cfb8186d60
SHA512fb4dce69e0cead992d03ab311e62221f4f919ec77c8c736f5acfc7a90b9163c5330e521748a7105dd483606f3fc3d68d493aa345731fa53dbe603bf3a147ab1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db78ee6fa66aa10e28dfbfc1686a8815
SHA197f0e3832f26e6cc86c37feca55a917a687828a6
SHA2568b0ef904b900706377e159b796e630ed6b920a8379dd7691901837b02098d5ce
SHA512157e6b2434ac56d80c15ee60a501e619abc54a25f3fd3ebfcc60b41ce2e0464ed504a71f4232d36d1748363226b7df2a93676c4c62244a5718e738ea0cdf1d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b94ebf5a0c803faa2f83a92e955b9a79
SHA1ded5ee6c499312d9c385296dbf285f912b39a269
SHA256f7db56655894d20fb4a877e4f7e64f6e7b2bb106a72e164178248ff4e2ad2225
SHA5128cfe9d0946c681e7f13c9c35064923dcf25beafcb04073b21a648d6cfc8bf5bda7548a537687598cb01d2d7316f985f23f2da2bc5b268b4c955caf8a90a7fc0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee6f3c3b9499055efd40a4ec3caf9bc9
SHA1790db457e05046c8c3c1880b657d9a055d858a2b
SHA256a4bc1c1d78ae532e7e4a157a4f3be1404433ca986431e16064eae9e1bba07c7a
SHA5120befc5ec87b0f700d6a5f9dc872f7850e7ff79521e8441086adce2f509923d82a9a2a63a56474432634664e4020e0bdced71353081ea675d9b5b0945df0521d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591e3307fe3003f93bba9794a9c2a0829
SHA17dff54189a46ae57946a5a257955bc75c0fd40f3
SHA2567f99fb66f4b545cec218c22e5a83259642364ab98faae62ae162463a6aa38c90
SHA512e7f5d478383f976ebd19732164ecf2e1ab8099baca1f1d37bae00374df253672333fe4ed3d1211975a913abd5d5452e8015a340d62bb94954b196d51da6262a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d94206d4df356e2434c6134cdd342c4a
SHA1367a348e248247dd55f08d9b76dfd2ef517a01a8
SHA2568f750ca97af7b30a74112c9a298c3e3b6a5a7f8326653ba709c6a281f9e45ac1
SHA5124d1d37f623608e7a83530ecebc405a64b75518bc198565d07badf2e3f845944f43aa02173d2a79625c75b57d1dd7b955a96be76714d756ebba2903fa945c5841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab3578e04900962e5aa877a20d126524
SHA1719a649d611682b5a01cdc8bebfd519b1c29af2c
SHA2568620292e2a59a59ddff49a23f23141c60e723425af63ceaacf1dc77625cf4a30
SHA5129709106750557799f27721d3b05e02234d3dbb98a8837c7a888e82e3a480327be9da1c99a3b00af4ca0f4d660801a4b306179844e85e28a211d71127b756f6cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5228fa19320bddb4168d85791d38ecb06
SHA1db0dcfa34be2fbdd0a908f5ee0a1eef50ff65ea4
SHA2562691eb7e6883c94e3d1b59d099465c3cc73f37e910b85b9d8f41455c0e3c1209
SHA512e6903e70678c63f65f837e24418e110626f414f4087739600ded12768c864a8a838ea9e255a8f7d855f2bca5d87e114c231cf8471d9c53d7790578fae113264e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eedcc8cbadb31818d395d13b7f16adec
SHA14163a20c5d37a907ec1607730cc45f7ce868d847
SHA256a085825fb964cdaa5d2688b14d1c06588a531dde52a2f1e99c2b58b3c972e4b7
SHA51203b3e6c76188bcda5a60e18999960b09179cf9d21d959e7598f6626973383eb5ab278086a681854f5f9bb3b8606c0b3d636d01396cf203654480459890787cf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5701e650cd0c129f74fc4b9f13ddff553
SHA11ed44f76d991f5bf1fd9d1294afbaaa7590de2d6
SHA2560da2dc3fcf5d90b1e855e57b6df1050fc065a4b08ca2991e17bbf57014d3cc19
SHA5125e11b0fa282103025c654f76bf4e4da51b1932b364888a111429e5ff33e8da4ff29110ffe36cbba9e68ff82e9cec051012e423140009ed78805e04c2c47b0856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ec615f957bc013da31ba5405a54f22c
SHA1c9c4bf08667c8bddcade6b20377c75314a4f1a07
SHA25684fda1d9a0e10b494318d123589a4349a6e286250acaa39d42b94134c8987db2
SHA512df6d615b6744fafa75de841bba494efc4e13fc528e9f75d70453576248dad16f002dbfeaa1bb896c8bf5bc799a3e2150e7b99c0afcc2a9dd5e2a782239376c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c15ff10f0f8333b0aca5a44a38b8821e
SHA18268beb4a4334093b32d489c798cd21b49ca5bc8
SHA256db145e5b9b5158c04d71ca995a492030865a75ba77a437e812aa93c8e8889795
SHA512ac188f2505173e96884eae1f153feeef1586c79e5294834fb7ccd7b78cadecf6149917b1549f9bb628dd4ff42894f31af9502c34eb312768d111a9b086787ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fd4055fc95e0a301cfcaf90a2412728
SHA1fce516bf0dcfd847a97dc3a22b60f39aa23c0e0f
SHA256f7b7bfa0c38b934fe608a8f235aa8d6790431dc955c276c61fa0ef5736df6436
SHA5123986fb891b5a6417d52be740f19f5b454e4be8f394569df3e57393cfdbd6e08f35047d079195182decbb9ca66b86533bc5258dbb94ae36d8fc2b966558e21107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57621a563c23b14950e69d0084af5ae28
SHA1179c02cc0f859482be629e81cf79e35831dd8ffe
SHA256ac1f22b6d270ae7ed78f7a925f3ee0d456cececc7a50c80818a004fc3b329422
SHA512048fa87a3b5e765dedc3ede9977dcc632f51b27c7bf3b924c0b37eca7682ed4c1c4cdee19cbeab088e0644036c0c48a2538b6fb80a44e85f8f23f129866bc0d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575b0876de5731e3d1cd3bedbf38efbde
SHA1a2612b04edc1225b05a417efbdd2eecfb1a82aac
SHA25640921ee441ca041ab1aec0594ed137fdd98e325f2e0e9e5a85fde6b0c8a3de53
SHA5122aaf11c39c3ae7e89b04f9f051e1446436e57afd534854e14b0c2303ba46de903ecf197d5792f0c34dfba10f4c1ee8e2129474bda6a1409f0e50e6c46f90ee03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563715d0a9dcbccbfa029dd449cbaf6ea
SHA199f676bffe9b3e1c6ec6c80e4435160263b1d3e4
SHA25674b20fee67c93a100623e403e6b64393dc1cf6939de6a8b7702e2565c838b0f0
SHA512874e74d6ac20f82d7c88e7b86ebeac5248a6e7a7f0a8ba10e1248521336afe61526a2fcbe4806f27acb1123799ad5d1ee98eca231c59170e5813c492fa53f71b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5720ce4204a0ff1a5597bfe7468b01e30
SHA1ab80e15ec2bbe542a986c14ebd282b69eec58057
SHA256033e4652906a53513a693400aa0290c1cf3ea1b93bbfa314b771789eccd175e9
SHA512a4d96a0cdc809823083f4b4d57ca219f4d4a98bbc56991cd71710c29da8b310a4a272b903ae06e00413c6885948f7b9aac747376dc4fae00dfd9f4543e96301d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1be7f853c0cf6ea7c42f81507abf801
SHA1d69a8f6580fdff3d56991e7d18afb28d4429e972
SHA25648e80900e5539d1b2c689032cce86d3beac990449227d991c54e4d7c5af28c98
SHA512758ff146b43b1db82d67cdc7e44b6efe541c466920e7ceb9abf6c6635c70840063a8d5acfe350660b5aefc4810ef8e0b21fc20091dc9a13f3974a679ed731222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f6e300583613ad9f55c603beb9690a3
SHA1646b7e1ecfe4f743d3d03697b6aa6304e3d47f47
SHA256a242826a1b890162298bc466dc3074ccaa97957b1f24695bfd9268033c85c577
SHA512018e26a793bfa0abc0c4c0fc0eb3e3a6eda3e316156f303cbc35ee72129d9b64acf43423f40c38d53b340bde65fa7d44dbe50dad7ef2a0db582c13e1b4657fad
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a