Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:41
Static task
static1
Behavioral task
behavioral1
Sample
69075fdbb9b0cc52d8d6722e3e4ae3eb_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
69075fdbb9b0cc52d8d6722e3e4ae3eb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69075fdbb9b0cc52d8d6722e3e4ae3eb_JaffaCakes118.html
-
Size
21KB
-
MD5
69075fdbb9b0cc52d8d6722e3e4ae3eb
-
SHA1
c39cbc5b0901010311e645bff61ae2d3273d8fe5
-
SHA256
8268c88d1404d07a10c462234be9a4b8bd517d03dda9e8ea8a299edb868c9e52
-
SHA512
6968bfafea4f846865eac9c725b27bde27034f1e977175de11b1b5da2c9834d944d2ecf753e484aef304f4403ae112475f6a789721d908065803ba6565bdd850
-
SSDEEP
384:hcJHkC32DSoHzTFz0KiTblb51boGbY4bl4xxxxxbTw9P9GUyKZ:aHkC3loHITx7EGlZKTw5UUyC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e00fa4db0a1fb48bd700a94904cb5ed000000000200000000001066000000010000200000006c2435aff26baa81dbdf784f361fcc47e865196d1385d398964f5e0fb6c06b49000000000e8000000002000020000000ac3d4f7da3c2146ff97cf3bdd1cea635d7e6fc9f8775bf51e6d71bd68f1e8cb390000000f3b182750d952e847d7fc7d4f54ae4768db56143e449c961bfa0fffe1121bd601970631b3959bddec945af0ef7e317156f5288b2e314f743a000a4b525d11843fcce862620b948d450aa1360d633ee0e81340b731de19b9c9645e6f3d3ac5fdf5918845e04856bcebdc8d9e1e61c414b97a6170116baaabfb9e470b9e44446c76a5c64ef4e48c165dbcf15fa1f56508040000000a2bfa360eddfba2696f4d42acda703683a30947dd72081a6f330e0ce950c08f94dfa3bc8fab96119ffb958fe77e1bbb9da531a92b22259c4073c2646df36dd37 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422583177" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DBC7DE31-1894-11EF-9FEE-EA42E82B8F01} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e00fa4db0a1fb48bd700a94904cb5ed00000000020000000000106600000001000020000000ba1472ddd432694516313f08d40f622fd1dedbaa502186ea60bf44ce77a90826000000000e80000000020000200000009eeefbf238a30b1b86675104465abc28c3ce7b24b536f12da712a1822e3b586220000000f9e9c1b704565372c53d6af880fa081bef36ad518a8e0aafdddb372d89b652f340000000a752bb6e05da03c56ad97a743bdc5e3a134ce36a281026430fb83c9cd81afa2a6abf6093d2c93df75f473a9a93ffe734cdf997f60186783d3ad342b81eb54af4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300356b0a1acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2860 iexplore.exe 2860 iexplore.exe 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2860 wrote to memory of 2952 2860 iexplore.exe IEXPLORE.EXE PID 2860 wrote to memory of 2952 2860 iexplore.exe IEXPLORE.EXE PID 2860 wrote to memory of 2952 2860 iexplore.exe IEXPLORE.EXE PID 2860 wrote to memory of 2952 2860 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69075fdbb9b0cc52d8d6722e3e4ae3eb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5488fc83ddd06feeb94c60376d5763df2
SHA15f8977159ceb254a9eca72a2e3948d9992f9f942
SHA256830487ea38d80f8d74cefa211f66dddbf6e4b18a9068982ca06b06c5474d7e3a
SHA5120e23a14f24cbcbf1f5cb13fd09df6593b092bf87d16ca4f342344d49f60cdb23eff52bdf3dcdc2059e7b1e3152758eda686c23bbf2aedb0cd653dbe2e573e45d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a182b9cad2b64cecd0be3913950164f
SHA1032247676a581b531a878f377d2a38fbf0ab8043
SHA2564543b49958a0b9dcbe74addd6774005bbbe6a798dc4028258f28da53b460ed34
SHA512fd33a99138e5c5c48443b87bcc08cb5b81b1937a6ad9a126eb35bd189cfb8adaf0a5b2efe2179c51377258a55177bcf00011ba58c6c58726a61a6dd2fcedeba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552ee29fab7f079852f4df8e17d2c0147
SHA181bd99d79158616802afb3ca3ae5589d0ecfbb67
SHA2568cdf8d1d1d7095446e80713b4c0bbcdbc8cbda34fecc413ae240cbf8649d91e9
SHA512a89683e80ee07b29075fb21a2fd40cd4965c792807ea4378d1cfe81a2d5e67fe3f6fca74d37fe9f4e0c07dd8c92c973c82bbfaf06146f72251961af9b31a2ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fee6b9d583efb58fbbb06357740c2984
SHA1315df1fa10891421729a9439b0be21821801ce9a
SHA256b42bbf98579fbe02225a2dccf64e6589961a29cec4fba0b531e8368a30b9a677
SHA512a952c56ebc93dc2fb411fb837038d5087f62aee1f347293d8102da4119c6a95f56d41bd494fd84160b11cb91af91b0e7bebf51ca0acf5d537adeaa9d035ebdb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab0e26d651dce755fe0b0e1de2be3f80
SHA1dc8a1f7092de095e5b11043d296a7ac9e0f71290
SHA2569e3be7526d75cf561ef8d9d72e4bb7b4208cbb01c1e8f63b122fe13ac8206679
SHA5129ae1f9c8e5e580cf66edfd26107759e05ea98e0d758fd4c633a878f10a0adca65a577e5c394cf6832f4c434579f400d901ed1529d0f58c9899a49ea31af493e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c64f31a9a63a3e476df911000397d4d
SHA16bff3e422fe50cc419273274eee8c0c6d444632d
SHA2569176bf6e0fc20dff421ac24d9601483963a022b126e37b821ab7ceae9883ccd8
SHA512432d03ae98bc6de1400a21899b050a91ae786e98156fc725eab5318e6fe3daefeb1b99412b318411b79e22dce24af6e018b4994effd2c797cb8eea4998c10bae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5491ff2566c2c39644d3cd22380be190d
SHA10eb49793aa14d297588a8014eec291ebd09cde7e
SHA2564e799e495a7216ea6f618a7884629017343c10e8e2e8f04ffcfed75732bbf79f
SHA512bbdf39fb6f2ecb9e98e300a09faee7692796f4ec0cbef3f71a381f3bb6bc6550514edd6a1951e9c3650a7ab7060a00d017f4cf329bc3f8e8d977f217a218ed5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512a7612dfe3ec026e456b585165d6228
SHA187c0d88d313869afd068ad71a74358c9c428c9dc
SHA256c9764d9948dafb2ca701ac7d4f7fcdb5824adb656814276ddd3996c7d0d6d261
SHA51260b59967b305a0af46da26653f05ad3c4e0d4918def28708aec616b632ef4e4eba4600d82b2ebe7188cda76229ae3770ab923600cf491e2205d7ddd21307f48b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bf37e2fa223114e29c42bbdfa6c1601
SHA1ec54096a46c04450da72fb2d4d68ebf60d4b609c
SHA256e1183a59ac4b00fa8110ea61e86c849d1d47da5d40198bf6b5693d81b0828bc0
SHA51249c1be848d4769517a5797c5ecff62a2f356aacfef106168b96cc12338502b03c9ee12dbce4af941f2dd1414ae418c13de19e8cb5829f5f1145f92afa00235c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e88ac130ba18ea37e0d17bacb672e84f
SHA1d1326c717539789ffb3c429f26623604bd042afe
SHA2568e0ad4643d859c435bb4cde2a84aa79ac1ec1e10c94f2e288c68f33097c03e89
SHA512c61f02207e7cec837242ae25d788f3ed0c96422cd6e4dfde2e9565be2525c7bf714b6f3c16f75ed132404444e625f4045f180bcbc98549bc5f0b2dc9ee9a4a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587792f304efa5ab01ff4272850176dca
SHA183347001adeb398164e01c9be73a5b845416eec3
SHA256c6b75595e7a4021b5631678b120fc676da6178f7daed368889af1232347f932b
SHA5129c6ea78870d89379c1d8102c355c139a61f67b23b572caa287d043f049515d9553fe372ea384bd50df194298da795a944cde3072af7aba9a00ffb09b57e0b055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d1428544fbef885fd1f4e30431d85fb
SHA14a17853788223c726da1350cde20537f677ec851
SHA256ba0a893869df6a4fc16304625e210b19a14c0b03f4a42874d7bff53e54726cd4
SHA512a5c485934302f49889edb4594970aa7d82d81e54fd4c9e35c76e38cdb412cbac8236bf652900c73ff0f0d5bee2de958c87ee5ae15ee15d6e8f44c27b5f66c441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57691d5a9065b4c3ce7b12e7d30a5bec4
SHA1d2d8698a67bfb0da4197bfb123b56677315383d2
SHA256ad026114c666996cce62f1ccca8b7213e10ccb182f9ba10fe7e9ca7c035bd8e6
SHA512b5b56a1c0d504661ca20485325414e03034e2644a00ce59cec607e53e0ab351fd92abe3bd311323e14d7ad6b82cd0b4415293b665a7fe2d0b964555ac19b7782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55864e6a9bbfb13520179ab0bb765e7cd
SHA154896087ea687b14750e0ea457ab64dc4db29c57
SHA256cb0123e5a0eea165f49b3e443a876bd3999980fba79dcaf44f74ac6d7d0a7b45
SHA5121ae39a8558093aee799fcbbcda07a81ece19aa889b03d13cbd8dc6825e49678d1444413a8c1f62ff5ece81a12d629d94f00b7da4657ae6eae51a3e537ba82116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb4fdc7267b26bd33240ed99b35037ea
SHA109e90849d9afa35f7067a84c80d82cd0fc9c2f46
SHA2568968ac49a1275f8e0728c541d9e4f5193f955834436a6e2cdf4a218c6a5e3d8c
SHA5129a34d482911d4a00b0e486437ad1d002e9c8cb8f65d5ad56bcb3964db35dfd455dd5826342171a61cb401b33c6f8b6125e383e6f217ad4be377b8780b10706f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edf313139ba5a96c4c7a1350bbd9aca9
SHA18517e6ac4d221decba62794c701571c6365ef67b
SHA25683a6b2c5982a9bdc51ec9ead1a93a071ece7a84db236c4138933fe4171f57e99
SHA512af12360671f4ca1961e4b7299072021ec5ddfed8e852259c79b050dcf4db469bec646ddac858d753b73201f0e8f5e7d4d4fca8c8bcf29c1fffdeadd3c32d2a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a917c011a16436fc4081a4d8d504d5da
SHA14b4203604d74ca8bfb37b6b92203324e1350f4da
SHA25650716ae5aa966c2fbeaec31edfd15888e746695ca86ae921636abf68208e7e0c
SHA51202b4c4d08537a1edbbb256ec111d520d4314577761bdf8bbbab10d6153e24d1207707391f4f3e9e261a541bfa1caee06416e767e74233902c98a1ff48047e4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ef3181bad7ebc467fe01df05cb359c1
SHA1a65e95e886f5ac4ade6cd7e4120afcda5d7d4f3c
SHA256280dcc5b2ff4333a060a800c324d5a31e873e965d860416d9980064df309080b
SHA512aa642df35a34b32b73373f672ef54e9edbd318eefc9a7f52d581d4f342687bc72be40acffb4341da45a7ff298e3cc425da7343820cd8cdbf16096a5f5c2e1cf8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a