Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/03/2025, 11:51
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe
-
Size
517KB
-
MD5
5ef576cb49a4da0e990ba554d32e013c
-
SHA1
48674a39a9ce03134c927eeff190d4f02f0fd793
-
SHA256
385d35c25b09ab6abb48998073cec983f2b3ff49554ae44ca362a414fa194f7c
-
SHA512
42ab45b34d1e619f740004ff93eb20e0e30ff37425d97a1e390bb898b67a5dcfcaf05acb14d80765d81f2235370e655476256c60a985c69e6017432353eddb42
-
SSDEEP
12288:G5mkmvmMzBdAwLJQjEhwVpLR0zdOrs5CtuZfjEu:G+vPBa2z8rS31E
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 16 IoCs
resource yara_rule behavioral1/memory/3048-24-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral1/memory/3048-26-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral1/memory/3048-35-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral1/memory/3048-36-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral1/memory/3048-37-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral1/memory/3048-38-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral1/memory/3048-40-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral1/memory/3048-42-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral1/memory/3048-43-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral1/memory/3048-44-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral1/memory/3048-47-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral1/memory/3048-48-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral1/memory/3048-50-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral1/memory/3048-52-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral1/memory/3048-54-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral1/memory/3048-55-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\WinDefender.exe = "C:\\Users\\Admin\\AppData\\Roaming\\WinDefender.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\winamp\svhost.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\winamp\\svhost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\WinDefender.exe" svhost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DDFB8DD6-469D-2DD4-BA6F-1BBBBABF7BCC} svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DDFB8DD6-469D-2DD4-BA6F-1BBBBABF7BCC}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\WinDefender.exe" svhost.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{DDFB8DD6-469D-2DD4-BA6F-1BBBBABF7BCC} svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Active Setup\Installed Components\{DDFB8DD6-469D-2DD4-BA6F-1BBBBABF7BCC}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\WinDefender.exe" svhost.exe -
Executes dropped EXE 1 IoCs
pid Process 3048 svhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\WinDefender.exe" svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\WinDefender.exe" svhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2692 set thread context of 3048 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe 32 -
resource yara_rule behavioral1/memory/3048-13-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-22-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-24-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-26-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-23-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-19-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-15-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-35-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-36-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-37-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-38-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-40-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-42-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-43-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-44-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-47-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-48-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-50-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-52-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-54-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/3048-55-0x0000000000400000-0x0000000000471000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 1840 reg.exe 1888 reg.exe 2796 reg.exe 1116 reg.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe Token: 1 3048 svhost.exe Token: SeCreateTokenPrivilege 3048 svhost.exe Token: SeAssignPrimaryTokenPrivilege 3048 svhost.exe Token: SeLockMemoryPrivilege 3048 svhost.exe Token: SeIncreaseQuotaPrivilege 3048 svhost.exe Token: SeMachineAccountPrivilege 3048 svhost.exe Token: SeTcbPrivilege 3048 svhost.exe Token: SeSecurityPrivilege 3048 svhost.exe Token: SeTakeOwnershipPrivilege 3048 svhost.exe Token: SeLoadDriverPrivilege 3048 svhost.exe Token: SeSystemProfilePrivilege 3048 svhost.exe Token: SeSystemtimePrivilege 3048 svhost.exe Token: SeProfSingleProcessPrivilege 3048 svhost.exe Token: SeIncBasePriorityPrivilege 3048 svhost.exe Token: SeCreatePagefilePrivilege 3048 svhost.exe Token: SeCreatePermanentPrivilege 3048 svhost.exe Token: SeBackupPrivilege 3048 svhost.exe Token: SeRestorePrivilege 3048 svhost.exe Token: SeShutdownPrivilege 3048 svhost.exe Token: SeDebugPrivilege 3048 svhost.exe Token: SeAuditPrivilege 3048 svhost.exe Token: SeSystemEnvironmentPrivilege 3048 svhost.exe Token: SeChangeNotifyPrivilege 3048 svhost.exe Token: SeRemoteShutdownPrivilege 3048 svhost.exe Token: SeUndockPrivilege 3048 svhost.exe Token: SeSyncAgentPrivilege 3048 svhost.exe Token: SeEnableDelegationPrivilege 3048 svhost.exe Token: SeManageVolumePrivilege 3048 svhost.exe Token: SeImpersonatePrivilege 3048 svhost.exe Token: SeCreateGlobalPrivilege 3048 svhost.exe Token: 31 3048 svhost.exe Token: 32 3048 svhost.exe Token: 33 3048 svhost.exe Token: 34 3048 svhost.exe Token: 35 3048 svhost.exe Token: SeDebugPrivilege 3048 svhost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3048 svhost.exe 3048 svhost.exe 3048 svhost.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2764 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe 31 PID 2692 wrote to memory of 2764 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe 31 PID 2692 wrote to memory of 2764 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe 31 PID 2692 wrote to memory of 2764 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe 31 PID 2692 wrote to memory of 3048 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe 32 PID 2692 wrote to memory of 3048 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe 32 PID 2692 wrote to memory of 3048 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe 32 PID 2692 wrote to memory of 3048 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe 32 PID 2692 wrote to memory of 3048 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe 32 PID 2692 wrote to memory of 3048 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe 32 PID 2692 wrote to memory of 3048 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe 32 PID 2692 wrote to memory of 3048 2692 JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe 32 PID 3048 wrote to memory of 2564 3048 svhost.exe 33 PID 3048 wrote to memory of 2564 3048 svhost.exe 33 PID 3048 wrote to memory of 2564 3048 svhost.exe 33 PID 3048 wrote to memory of 2564 3048 svhost.exe 33 PID 3048 wrote to memory of 2592 3048 svhost.exe 34 PID 3048 wrote to memory of 2592 3048 svhost.exe 34 PID 3048 wrote to memory of 2592 3048 svhost.exe 34 PID 3048 wrote to memory of 2592 3048 svhost.exe 34 PID 3048 wrote to memory of 2352 3048 svhost.exe 36 PID 3048 wrote to memory of 2352 3048 svhost.exe 36 PID 3048 wrote to memory of 2352 3048 svhost.exe 36 PID 3048 wrote to memory of 2352 3048 svhost.exe 36 PID 3048 wrote to memory of 2496 3048 svhost.exe 37 PID 3048 wrote to memory of 2496 3048 svhost.exe 37 PID 3048 wrote to memory of 2496 3048 svhost.exe 37 PID 3048 wrote to memory of 2496 3048 svhost.exe 37 PID 2564 wrote to memory of 1116 2564 cmd.exe 42 PID 2564 wrote to memory of 1116 2564 cmd.exe 42 PID 2564 wrote to memory of 1116 2564 cmd.exe 42 PID 2564 wrote to memory of 1116 2564 cmd.exe 42 PID 2592 wrote to memory of 1840 2592 cmd.exe 41 PID 2592 wrote to memory of 1840 2592 cmd.exe 41 PID 2592 wrote to memory of 1840 2592 cmd.exe 41 PID 2592 wrote to memory of 1840 2592 cmd.exe 41 PID 2496 wrote to memory of 1888 2496 cmd.exe 43 PID 2496 wrote to memory of 1888 2496 cmd.exe 43 PID 2496 wrote to memory of 1888 2496 cmd.exe 43 PID 2496 wrote to memory of 1888 2496 cmd.exe 43 PID 2352 wrote to memory of 2796 2352 cmd.exe 44 PID 2352 wrote to memory of 2796 2352 cmd.exe 44 PID 2352 wrote to memory of 2796 2352 cmd.exe 44 PID 2352 wrote to memory of 2796 2352 cmd.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5ef576cb49a4da0e990ba554d32e013c.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\winamp\svhost.exeC:\Users\Admin\AppData\Local\Temp\\winamp\svhost.exe2⤵PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\winamp\svhost.exeC:\Users\Admin\AppData\Local\Temp\\winamp\svhost.exe2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1116
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\winamp\svhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\winamp\svhost.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\winamp\svhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\winamp\svhost.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1840
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2796
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\WinDefender.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WinDefender.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\WinDefender.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WinDefender.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1888
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98