Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 17:53
Static task
static1
Behavioral task
behavioral1
Sample
79fd05ad5ccfe8a5d144a643f41d27c0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
79fd05ad5ccfe8a5d144a643f41d27c0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
79fd05ad5ccfe8a5d144a643f41d27c0_JaffaCakes118.html
-
Size
2KB
-
MD5
79fd05ad5ccfe8a5d144a643f41d27c0
-
SHA1
79acb9998a0a39a01bb97fb68bd427b344534e17
-
SHA256
6b169683336bec2b7870428fecb15edbbe58ce102b93ca1714e56ef3ba199e44
-
SHA512
cc47ce188447705cb4fecb2e423e13e7545600be22e0488d40738e274e070a004c1066d67151c2dbe59a267067a879279904fea77ace1c5d8c155251b334fa73
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422994268" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102fe1d55eb0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000074ea05d2d4a37c46a017572ee21d5744000000000200000000001066000000010000200000002c3dad0a492be1610449ff48243859ad962f16713efcd06d134477b14e0938e1000000000e800000000200002000000089302f2bc7e00fa15ddbc89eade2fde17eb3f1e3aa2bccd5f95eaa0f58b3437390000000940c2568bfa43a4cb76085108b482472e0abd516f4db032d875188eeaefc9057f72f54459a4d6f7c6e4bc9f9e31ab50f35961e414264cab4c850814bde09924dcb2875057a1c7bc1591c676824022eccce11881cd6046597a0310839df4a99583decdcb617340970fbc2c94ed038dd94b75e956973468304460c21fffe985bc404781e810f1f49953bb5e75a7441f7a64000000002b0da7ff6591fc2ea38ba29885e7eb69e7f04135b10d9f008daa363d5d45b392cd9af01877adb6c61676d2d7afbe2cea87c1d360657d58b258452b19f317002 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000074ea05d2d4a37c46a017572ee21d574400000000020000000000106600000001000020000000dc155fe454d66b6188900c811be90a54fa82504b569eacdc0154222b78b5d931000000000e8000000002000020000000fce7b8335ed22b8007bf36c33553283036bc108f48e91643689ef07c622ce3ba20000000bf010f86e0994ba4b7eab4d61e4412eb359dff6e74e05b74d9a338e04ded5190400000005046e0c77f578cfb091382d52f7f9d55b6d5df1210d6a9311c90d7624fefc84eb56f5e8095ff66c1ee6dd473ac676e50a82f5245fb3584e510499f377a6acc74 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0126D1C1-1C52-11EF-9F07-6E6327E9C5D7} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1984 3068 iexplore.exe 28 PID 3068 wrote to memory of 1984 3068 iexplore.exe 28 PID 3068 wrote to memory of 1984 3068 iexplore.exe 28 PID 3068 wrote to memory of 1984 3068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\79fd05ad5ccfe8a5d144a643f41d27c0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8e2c80a58dfa5c4440ac7d6ebff9f86
SHA1f6a83415ab9b8d9e2ef5e5dd1bbd4f8a9a95d7d2
SHA256aab34acb209695111d5b6d95e99134ab2157d1686e2d1cb94ff233efbaec64a2
SHA5123a3a1dfbac4a2ed57c1bdfed8121735dbc471c81e1290df84122255a819b0ac3855a559e1665f6788557dfc60ddd8708d252dcec4afe379b57e4ee5deee34954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f09d966b3dff641866dba5934eaee38
SHA190cda0b6ef1fa05aa6becc2d9d8ece13ae920e1a
SHA2566bbb9105ad63e73efde4bcfd28b2efa8157e695f91b9164261c0b32e2cf4ee7b
SHA5125a4c767cc8038858beaa9317526f13180fbfc3906a9b4a5ea3f20e0dd4d88f9691a1a7a6e0cdbdf068cc816fc7793f9dcb5462454baec947d345ed116d52462a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eab21fb888fad8deba34f02c9f6f129a
SHA1f29bdaa85eb52d124d70b69e3337a0759006596f
SHA25670de1af425f8056806611ebd7d28bbacd31a9a4ada743a17a849f968662cad63
SHA512da0a92e3130ce47044a39c52238e64e0d10415ded053b7553d014b7f9ec0d84997f2a19702afd8440938bdb032b77eb4fac6ad2607ba6e3c89046768b75a9650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cea65c6999918f5a6ea70908d9415e1
SHA1b690d0802a4b846d5ca0fb9bbf0975a6b2359cac
SHA2569aa1644cd5225b81b6739beca1f1226902053855a9d2ed5d846df8278b90ecdb
SHA512b2e8c0d7673fda64bab627efc3b1f251304a11ddd6c469a94c1d09e34d3be50b8b47cff3027d7042de3b30cc926d383da997d68f2b5f69c3fbef6879cc3ad8a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54be35e621e323bd39bd95cf11376f8c1
SHA15b0f80c15e0b40634c26437e499bbcf2b53129b5
SHA25627c0fa3a18865b537461ead6ffbe697b3624cc3326324faa8ebfdb7f49d2a6d3
SHA512bc7e98cdc9b53093f35a0866ad8ddc5d2b309bd1ec57476514e0b585a44ae11903a9fde8b3876453a4856694dff3a99efc4d052fe1b9d20b07cf1d9c8ae811c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5153acfe47d3ef11cfd48eaad8930fd58
SHA1b624f878711253f7ed51d7460d0c1be3d55134bc
SHA256b287fc9cd616f6947314ce132ec32823e020fc89836085649c2bfedf2fbf6e79
SHA5128ffd62b186c307c336ad1bb2cf9d928360434647208438f43aef2aecb1b38ef26a9bc85cd21896e8be6faa8e8cd4000e41038d1881b0852fd4f9aa93677b791a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eec8bf4df7bdc6ef1b6de6753058656c
SHA1afb55b95ee786a08eccca7bbeab955bfb911c9f5
SHA2569001b0c12db790388250735ae4b7d3c24a6a9e10184bb21828710b312d0e63db
SHA51264b90fc5aa4b183c914572eff5699a26acc466e94d9c9076891c611a4b95c543841acaf4736bcb29966044ba70144ddb17c0757470252b1ab5914af4cebf44ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f73e869feeac63cbeb43e73d6d102732
SHA1447508e5a7e06bf7bf71286952cfdea0b72b6efb
SHA2562e14b58ce23010b2c873a6e9e6aa72b6363dd1c7ba966856190d7219a4e1ee2a
SHA512ca9dfc0b5d4df6a8afd90a31d27220550e7052289fca76be497ab79cb73c7153e02053b3fb8183ab45385f03b605d46316a7aac971c5da88f485c5c70e459451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5066529478a6066f32e99c7426aeaa055
SHA135d22a0f088d337ad8d9d30cdd9fff4ea48a97bd
SHA256fb9f398dd765630ca48c8927efc0ac8407fdcee3df665fc4a7ea5894572ca7d7
SHA5121e984a5f11f693b1c1651be23690e9584c9d56b3599029d1c4e25afe4c4031e679d82fc42d4afa9a20299c99f1c05563639436167b4c5bde139189c2cb2cd0cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2017e31adb0eaae950321b1d4a45094
SHA1b5899320151e57a1111530ca4474c1b0b7a08986
SHA256057a0a54609a1f08c764c7d08b4d9bb57599263713bebe4051f00ae530a0e1c0
SHA512ffa3e4233d4bed2e7cc82703a7ad3330caf72534ca03accb0c3d6a8065a5ce62718708d33901b0efd1543d6fc67689ff1aeb32d0ddb0d5512da52e2137e6a1b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5519a72fe34d507db781db417cd2fde89
SHA17b9d3dfcc5587cda83be7f70c80b4a3409300b2d
SHA25672d601572e29c7b17893c2a6d80fdfdcc6f2df6adceabc13d2cb606b232484fc
SHA512a1b50206131c0720ba03d91d13abf2358621f2de7f2d8b79886c1eac34b99bc339b8d25a6a37951ffc47f4fe3199025ebe6994d34c4f0b9277baa3089f278412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f884874db071c94ffbef43bdc18af0f
SHA1becd4623f8830c125790277a50ee5fcc29b2ae45
SHA2568975ceef7748bc3331fe9d0b4937c3b2367692305537f2d58eaa435187e21ce7
SHA51237fdfe6b5977d5aa9649e4aec859795af4cf22bb5d03ddcf1734a98805bc0ca8f0928ac3b32e94d3f81271017b07ddfd1f722e566c51ba2039ff53cd626f8ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e81758e0bdbc0bcd7778a4031c8beb3e
SHA17ab591537b566a54d7d00e3761235f9c2b7e5f59
SHA256f7ee504f21d1806ca25baa5707f2c02dcb510ae966c94d25ddd64e11a1289bcf
SHA51243765aa1c1c15361b9ed6b77a58e617bd9400178af79dd3c865846220049ca40bfc673c4a0c4887f696edf6d638c328f19186ba3d6e224b6aaa051ea4c6dfd52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0d776e5954a429394396fdf28b8bfda
SHA14347afd64cb8debf307d5f8befde57bef939bdd1
SHA25697b8ded5af4ef52a2e1a32db9550864f971215b6a87515ff99050bca638bf968
SHA512a85bcc9acf3ba1267fcdf1a1097f952093d4547856f4902982978ea37d56bf792a99ede3e6bf78b1f2951c2a7e331e8258de60ae4307023a5c913c627c8720a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa8afbd31b1a4d15e1d18a4d991902be
SHA126a2738208dd19edf452a67e64cf085f47a8a1bd
SHA2563d83383313dffaf232a7115b82405332174d71b6780ad84f54e4318b61e59f81
SHA51208eca37668612dce8fc9e0bd538fca31c3365ded52b765eec4bd74e77d870472b7e8352b7f15b72f6af08370d4cf943e206fccab2872d589ff82b41ba3308434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529b84ca7a10e4dc37a20aa4019c4a7bc
SHA1bd7a7d5b8f6dd7f2fdbe15894e236718b5eb4f6b
SHA256e12844988109d64c747aa20cf10f33df641bb7602a99734b81e339016b2944d2
SHA51285ac19a035504f91bbf269dec07670fbbaf0a4ae80b09b22622537a03904fb52c9f44907398924dffb6b635723ce3c9015a119b2d83945e11429363e2f2c43b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfc4615ff2342a8fe96da33312efa2ec
SHA1b8fde10dde368bb0464ebc859ac58f8841dacfcf
SHA2569475f23f1138083d30b6f2532588104c4a9a33370c61ff2cee2a1ac3d1f82b5c
SHA5127e6ded05015a2c9c26dab2663c03fcd790726f3c9e1ae98db3b8b97b0b9bf3670c9a84a3bcb268b00d5e7184ae0069a24a55c4d46a6fea1825497226f1960aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d64e3dc47232438ee66240ed01a5e7a9
SHA18b077c11db0cfdf3112fb459a567d915dfc8893a
SHA256de4380203655b8c520f54054e5f1478f9fdf40f2314f4f13ea1bcc88859e5876
SHA512cb8e28c83191765d589495ce3194aca3995fbc4d3cc8720089682eee06dcb18608ef9b8dfe30acd3873dd62b2b346abc672fb3eff5e50b4ccfdeb094e2b1e8a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0da9c6749205bc7f3a6263c02b33b10
SHA1cb4047a42de42ee8976695ad60c956af06464dec
SHA256323175d27b2f87c5d20c48f38460d235a77b4b894a12bd016b1c35282a2012c5
SHA512b9798c8be142ba9f5ee3a08ee4c252c9f7666ec590bef128af26b7b4f62f70c97456ebd0e85f5fa2e72b0d27d104d07e8fbd129c03c00b5cc6a27fddf373be9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a