Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 00:53
Static task
static1
Behavioral task
behavioral1
Sample
0d084df8c68f2491eaa4bd01746f2b8f_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0d084df8c68f2491eaa4bd01746f2b8f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0d084df8c68f2491eaa4bd01746f2b8f_JaffaCakes118.html
-
Size
22KB
-
MD5
0d084df8c68f2491eaa4bd01746f2b8f
-
SHA1
af8beadc928e26db29c46c991c0a495a34d66e15
-
SHA256
3ba07d78a2fea7bf2b38c3de34ec2cdd098c922b94ae9bdbc3654a5e60da17cb
-
SHA512
7822424f57e1bbca1cc45efd0537d6bc3d1f43f17624d58a7beca894977dfd13dee4b653d19e86610e12422066115b99d09ee90e69684fd2676fd59ac8aa868f
-
SSDEEP
384:HKb6n6EFxFRqAqgq9qnYB7F00H/jIBhNuT654AEDOTUEY:w66EjfqAqgq9qnYB7F00fjIlF4FDOUEY
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420773056" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4091262d2b9cda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000003d7c6e528710a5490bece4e387bf0e687ed7cf870d830358ec9a2d3ca3ad1127000000000e8000000002000020000000a6f99a95c035a37738e17c2f6b0161d0f1507bd98bd594b9a86487728c2bc2e39000000099d220c5403334dddf398108ff0e0d02d33df63c6ca03b1a366fe51c7d21d51394cad175cf6a08a4688961bb7974070c3fc97f71f6a6a8a4431b6e11a8697021f0cf08d10d054dbfba77354d7a8c7af808191efb2b7aa2145c3b19bbae9397ee3e9325343e66d41e1e5da08d65498bf783ef8d9dad7488f501c1177f2755d8dd27fd8409f571025c704b264bd606b4d24000000075aa18cef6b4ab8beb4bfce20e063dad7b67bc8e2dba19a69bc689e1a91050373f5d2bc749aa89c56e03a6299a6edefa3d25e28dbb7a5a79a4d459419982eb4b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5827FF01-081E-11EF-A0CE-F6A29408B575} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000027c31f7f8aa684a730ed93add86e9b2e7bc4590fae572f00f2df3e08226eda04000000000e8000000002000020000000219ae6780f5dc64e936b02cb8ff80f3cd0f055399ac75ead88515459824d6fe620000000073d47daa617e7c653f9c425b6a30a75838522bb6e8eb80606472b649842bec440000000fca71552cc79f58705fd2a00f40493802f1eb968dd61e47b51e3cd8516401b80dc74ec0294c17a609ca5567f6f6808d0f6e494f85e3d4cd0f38fdc384582f11d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2256 iexplore.exe 2256 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2348 2256 iexplore.exe 28 PID 2256 wrote to memory of 2348 2256 iexplore.exe 28 PID 2256 wrote to memory of 2348 2256 iexplore.exe 28 PID 2256 wrote to memory of 2348 2256 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d084df8c68f2491eaa4bd01746f2b8f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d33353bc9bae55ff4382df4220bd238b
SHA1831bcaf911e481b3041aa4369fc435ac2d0a8cbb
SHA256b15acf6efbc92ae77d85e38b9968e291a568ab6f6aa8ea19e5fdad03e4eefef9
SHA512aee71741e16dad7eab58be144b3ab15e10ec4154b202d1fbb136456b313b9c6bda152a3d7058bcf1e4c903074212ee9fb4613281cb946da381d15f57ce26bbf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4fca20d4d8d6aee0972958a2f8c437f
SHA1aabc23ae56651280095f71a95507315feac5e96a
SHA2563b686054362364d969db67c441991d492257c782a3ec55e167e47c7aef56fc45
SHA51256db2c0fbb17792927b8392aafb3d7be57e2088947e2d86b80c20b17f5554a04167645616265a3165ea7e8affd1bd5f35a45d45cb849b8977ac194e9d4e897b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce5c7d46ee9be2baa106a6a82665a74f
SHA17449c7b2c4e09afd2994b570df2dbf4823189641
SHA256d3e104e62234ed826f758e7a371613d6c96cc6b2782c970d5fbb2c9e092f98dc
SHA51232c88ead418c6e1e34a68a8651da403ff58318b46153256bf3d67b3bf1a126fa2685bfb85e39a7d2c4c2d3b64440e2d81533f4ff0705bec504c5bd83904ba7ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5614db94f5f5cc84ced3d740bbf9ee6
SHA1c322a4777e73def151f0bc8bb0b334bf7357debc
SHA2569d186dc151cd63de7d52a8466745c9e2be4b5fb40cc7fa211357470727b75979
SHA51209a8fb6c92eef039935b1a3b547d19a5ec198a25f2c7a1888a3f61bf80493cfc13722b52ad63aa1e68f8800a44f0aba4c34176a4981f272e871be41751f7f81f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ece106df6685009eeeff33a2bc27dc35
SHA13b723b3411f92da9a99639685254204b4bfa8a66
SHA256184d8edeb76ab44c7c95460c164459c91e9fae406aac4f4de35f046021d234cd
SHA512cf05ebbb5e3c4fcc89447293c51b659289c947b23b74fe452df88afcacb17910d868d40e22fa2070fc2d505e7b483bde5584225b72081dd9a4af5c8142e87da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512b40abf3b5e1e29bc2485e1eb08d2b2
SHA1ddda19fdce6eedd26b97653676cd75aea7e5c302
SHA25643b257c07896103c36bf15ab28e946b240da9bca8ed904aac89e68acb91d5ae1
SHA512cd32ba64f86753066b49a191c95dedefc27cacb1a86a8dbdfddfb0c99225653a0591675a76991c754e6a6d4ee9a49337387adae49459c5ade3901d00688ac636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3a42039ece51ea638c5a10e66743f43
SHA1619f97bd480a4db2a158b91847c7a0a011b63b6e
SHA2563277e82d0f6c60d1a7f1a87df73a5bcca04d2c95ad31ae4e4badd43a5375d8a1
SHA5123a14cde2fc05604fa73dcf8019204856a3f610f1abcbeed2cbff23f54718e293ed7bf7cf875a61f069eb10ad072cdde2027cf02455fcc29ce396fcd04808fd5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2016d4a6c1afabc75d484f344f28918
SHA12be1dcd286a76a4388453bf7d8b8cac455fa7a1a
SHA256d584afd8f674c184840736ac401d5c314525f3ccd5f23dfe0710e81adba74b88
SHA5120ecabdc010e727090d2ee28e9a2f133f80ccd7818525d7c90954870389487d61a9b01632df3f7c85c03030a1f89dfbad4237715a483291269c816e06f4782c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f2a5ba5cb0263f78db6e34495617f6b
SHA1cdfa51530ec124f75904a38a8cd2161cc8183df2
SHA256b76bc0e1b5e5a1e61b2be625e9146953f4bedcba8c00a1f31c44c1763bf9d252
SHA5120a94d0f8031f4ec9808bf2570873845a42a44c561df809190d6dc16a83f75f01243eeacb3fa3cb7be554ddae6a6a18acf6deae39f9e8443fda8c981c2a7ca221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e7e068b8e94f6b1d32b92e45d1073b1
SHA1bdb664db305753b098e4d7ce077c967c5eaac3ff
SHA2563890eeff087db216f55e8296a738dd004b5c2604efadec1b16175ceb5ead9f15
SHA5124bb8b0468e886d15310cd3ab85d2b4ee08dcc72c5795a2562bf94bff7dd827d87857581447159c5ae9a91a9ba0d04750a6faa1cb8af1f67940fdf75edceaeef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542099c95a9aa41eacf4ce23f3d806d2f
SHA1643d7620f67f176e4e21d21c8322ed626db4af0b
SHA25602eda0f3679b8c2d07f6131de2977b2367c1fef3cbbdedb803e7157b4a4c1e94
SHA512ea4cef36fa37b51ad39dce87afba7cfbc23981dd7d73d684378a1c7c27dfc37c09210a24f8152c3586d2b1f9e11028a3fa3c8fe0813800b5b89cbcc683108080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee8292c2857de4af5b92cf40acb12011
SHA185e576aa08ae58b8a4d690f78a7a14f7404da2b7
SHA256014cef50128e6e8bce911993738a67d89fd19071620d17281a8590fab21166bd
SHA512cadb4f4ffbde7c038c8c903cab3b5967001d24a189cb58e5ee7c280fc96db77731117c49de971cfa823a7d9363228df0961f1bbdb3124c36873b9b456ff9338d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57386942dd62cc735a9fb701b0ffd7777
SHA14a7e1a9402f431eb239c942bcab6a0ec7b5fe531
SHA25679d713d3c1e19eb6d2b1cf3d83e7b9276ca01f7c817e57469b145296b5e1d7ed
SHA5120fe6aa5e6dba543c85679a5c82c76cabfd121d4d6f700e2f0c7ced2861e5fab001871baf1c5fdd1449cb48678bc12ce204b6d4c16f93c2666ca7936a73cdb36d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfdfc5e13f2fd8e13d02976010e92f66
SHA14bd005f0b86e628f3e6382976ad29378bc6deb1e
SHA2568037b1d6650ae23ad1c6f918d0751c00d72f2c88dcb111628f8feb251c86eed2
SHA51294878e33e34bdb450ec98ab1740b5e7ed7e354e63cde227a5004fed55178397114bfd4f06ca4c6732695cd71462aa7b5d12a1a2493f8fa2b7dcb0f440d8f9ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f71b85003624a4aa6236ab929d30efda
SHA1bf07a81980a3924af9dbf0a26c6fc9ab3cfefdc5
SHA256a716f03e116dcf34ff8bf0352210bdda1c06c05e9183339f2de6b55f1681a3ac
SHA5129b293e5d523707a173eb5d8213eb00b484ebf2c5f312739def83ed6c89893662e630fe748b8cab9285838d06f5bf99aecd07719d769950f3b3e729e66d601dc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdc405278b3f6c8f43be03995acb1a60
SHA16fb60c5dbde7a690ce5138cd13f531a9b57ba2ca
SHA256fee2eea7eb3e28b3e110efef61eb18f77e5e448a85ea665e03eea8e733c4bdb1
SHA512a5960c93326c6128415c2719869fa03f682ef3e4ec4872d2528eeb4883f036b61318812b2e3daa2804f38fa8af0e7a69b8562002aa885edb613434cd221668d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3b5dc5316bf38e14dd837d5a66a7426
SHA1f9a59b59f35f90ef56376db446d912ca65cd25e2
SHA256083ee4bd564aecb6f2533645fb09b35020f3d6e17ad3aaee85c199c508eaf6fb
SHA5122f96243332299620099ab3d9e81f05995583c039951a5b9f313dc44ebbf6d582f24c10f8b86d8d49d31d2b50060751193b4593a4755a22fe42f203943e7a73fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bec954f4fc8f40839ed005be655aa4e
SHA120efe47752fec357ea4d6fd2ad0f3d663cde5550
SHA2560b49934b8dae175315980baf851834580ce09ee1f934e08fdc25755fd91043c6
SHA51282430c7e9935cec9191b80a0240f6d17cb82e7d2c7afeba08ca08974580104e32b334821ce3bc74be088aa8fc26286a94ac40e807d792eaea9d0d232ddde672c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fec85d8fb32e6d9f5e5744864d32adf
SHA105f2a6c649accca113cbdfb02d644c9257296413
SHA2566b26e8cd6971d5d05099cc273d6202678279c5255e952c937b208be51968292a
SHA512019ef139318d1c3c4e8abecf08eb723d9f2cca0a9f03afb04b98aa390fe556a9b7f3f5f1e7441a3968f2ea0db2d75deb5281b3b12f53ba6718ec0e87cee0c617
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a