Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-10_49736562f838b77d4965801d98452def_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-10_49736562f838b77d4965801d98452def_mafia.exe
Resource
win10v2004-20250217-en
General
-
Target
2025-03-10_49736562f838b77d4965801d98452def_mafia.exe
-
Size
3.1MB
-
MD5
49736562f838b77d4965801d98452def
-
SHA1
5a6fed8a35c91f02672bc5b29f833d4e6ad53a89
-
SHA256
82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2
-
SHA512
bea46fe161a992419ecbe5754bf294f18a229e36d88fb8ee99c888b8d57c247a53b180a4e620b1b93043868535fdd8dcddb5f822486110ed37e6c9a8c82484f4
-
SSDEEP
49152:euWJCbWiLqRTNXYkier+1tgM68B1ECYJgkIlma2sx05tE:eugCSiwIPer+1tR68B+5JAmAxStE
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe -
Modifies registry class 61 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\EcygfbkoKvsdo\ = "]pez|nMCzX^\x7fx{dHpieTRTzn" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\icTxRn 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\AppID = "{03837503-098b-11d8-9414-505054503030}" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\vbTo 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\PiPpcySwP 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\vbTo 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\vbTo\ = "vwGwWhCZpTmOc\\~l]J]" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\PiPpcySwP\ = "MInsEBurKrHgUWwoFByIGr" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\pdnqpop 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\PiPpcySwP\ = "szWK~[vnySMdwqKtBzkjBq" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\pdnqpop\ = "Q|DtBzIMjW@Ob`" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\InprocServer32 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\VersionIndependentProgID\ = "PLA.TraceDataProvider" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\kjaz 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\EcygfbkoKvsdo\ = "]pez|nMCzX^\x7fx{dHpieTRTz^" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\PiPpcySwP\ = "MInsEBurKrHgUWvoFByIGr" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\ProgID\ = "PLA.TraceDataProvider.1" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\pdnqpop\ = "~jdZtIun}TTyz@" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\kjaz\ = "jocuFTXDbbTCe|oDQnM\x7fboyW^hfh{@`" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\vmbVk\ = "{fLw_sHxlMsZ]\\c}RVO\x7fu|m|F" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\ppbyaxdlmsrp\ = "d{ten^QVNdEOR_`CPaEyiT]Wn{Et" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\icTxRn\ = "GPQSkALttNQgiqSC^LTEXcX" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\icTxRn\ = "x{ix\\m_\x7fepoNbbzO]QxzRA\x7f" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\pdnqpop\ = "~jhZtIunW~Nuwp" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\vbTo\ = "vyyzrsdbCCNyoZDRMZ\\" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\EcygfbkoKvsdo 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\PiPpcySwP\ = "szWK~[v^ySMdwqKtBzkjBq" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\pdnqpop\ = "~jlZtIungwdRE@" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\ = "TraceDataProvider" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\Version 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\icTxRn 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\pdnqpop\ = "Q|HtBzIM@}ZCoP" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\vmbVk\ = "zjr|n~mhIOyGnMu@rn{G{WjYD" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\kjaz 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\pdnqpop\ = "Q|@tBzIMZ^jhPP" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\pdnqpop\ = "Q|LtBzIMnY@HA`" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\vmbVk 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC} 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\ProgID 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\Version\ = "1.0" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\VersionIndependentProgID 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\EcygfbkoKvsdo\ = "xOvQup^XdkzQv[a{TuH|eZdk" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649} 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\ppbyaxdlmsrp 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\EcygfbkoKvsdo 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\LocalServer32\ = "%SystemRoot%\\SysWow64\\plasrv.exe" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\ppbyaxdlmsrp\ = "dj\x7fdzhKuXpYgzEJG`FTe`QtokQRD" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\PiPpcySwP 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\vmbVk 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\pdnqpop 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\EcygfbkoKvsdo\ = "xOvQup^XdkzQv[a{TuH|eZd[" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\InprocServer32\ = "%SystemRoot%\\SysWow64\\pla.dll" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\LocalServer32 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\TypeLib 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\PiPpcySwP\ = "MInsEBuBKrHgUWvoFByIGr" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\InprocServer32\ThreadingModel = "both" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\TypeLib\ = "{03837500-098B-11D8-9414-505054503030}" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\PiPpcySwP\ = "szWK~[v^ySMdwqJtBzkjBq" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\ppbyaxdlmsrp 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\kjaz\ = "nWiCBhVTlsUz@XUohT\x7fzIh{IsyL}Q^]" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\pdnqpop\ = "~j`ZtIunSpNrTp" 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\ProgramData\TEMP:BC2EA88B 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe File opened for modification C:\ProgramData\TEMP:BC2EA88B 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 400 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Token: SeIncBasePriorityPrivilege 400 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Token: 33 4160 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe Token: SeIncBasePriorityPrivilege 4160 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 400 wrote to memory of 4160 400 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe 93 PID 400 wrote to memory of 4160 400 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe 93 PID 400 wrote to memory of 4160 400 2025-03-10_49736562f838b77d4965801d98452def_mafia.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-10_49736562f838b77d4965801d98452def_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-10_49736562f838b77d4965801d98452def_mafia.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\2025-03-10_49736562f838b77d4965801d98452def_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-10_49736562f838b77d4965801d98452def_mafia.exe"2⤵
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138B
MD54c6b32488e4f85f3587be86201d02080
SHA11abedf1c7b5daa0eabe5f6f621c4b05fdd5461df
SHA256849252a427999346e063b00f877665a4f532bcf1b43980a2dc713ef3fcaa03e2
SHA512adc9874b772bbba9d12e7cf45112de897c0bcf6a316e3b21cd510993a48020308fcb642b5edd8781ec7cf86e1bdd61cd1f1e9f92b3e9cdee1bb0acec16507f7b