Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
115b5c604a169f606ad02fb71e0c1aeb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
115b5c604a169f606ad02fb71e0c1aeb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
115b5c604a169f606ad02fb71e0c1aeb_JaffaCakes118.html
-
Size
6KB
-
MD5
115b5c604a169f606ad02fb71e0c1aeb
-
SHA1
14912cae5bd03ce02f9179a014a0b2bc62af05bb
-
SHA256
39b3a17c142641d366661552beb58db5ba293fa8fc943de43abb7544dcc2d3de
-
SHA512
ba443b3b4c2057af7268426a732ad542a995d55b02e51d6a40a6354beb1a9cd2273897ba31681434d747f6bc679fd8d2be9b101f679ac5a319caefc601953dd4
-
SSDEEP
96:XhM3sHfQirhRuCUU0777Xw0ZAwwberjtT9SGbWhWJkomEpj7MW:XhM32/NUdXB2kSGbWoFmE1MW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CD818ED1-09C5-11EF-B804-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50fe0da2d29dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000ce1a2e40d0e0ce864cafec5f3cc93837d8a6ca5ad38354534dc1ae5eca844211000000000e8000000002000020000000e1a728da10743772f926a7de97e5425f5aa5d5076ce7103014dec0d503031fe4200000006f1e733b7b9766027b1f2f97aa4459e928db6579079e67f38a6eb2d714dc8fdb40000000a3c5ea38ef4f48f336e7d960d66ccf0aeb556c191689f05afaf18dcf97d7adfbb9bd566733639497d02b36ef7f92703ae46c7b471188205dbad15342d370a553 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420954930" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2524 2844 iexplore.exe 28 PID 2844 wrote to memory of 2524 2844 iexplore.exe 28 PID 2844 wrote to memory of 2524 2844 iexplore.exe 28 PID 2844 wrote to memory of 2524 2844 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\115b5c604a169f606ad02fb71e0c1aeb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f553190b7f645a0cd26851dac0e36fae
SHA10b3758137793326cbaedfa92e91bc3f557809ec3
SHA2560f9bd258539f21a8907a0102b865b983533b76701af1287c28aa5c993b825db6
SHA512dff42b811e31202add29a6559acd380875158cc45d98d204c413b0ede6e8f54d086b74347ab3e21051682b2e67aab978eb551ff25d410c6878c067dda5962624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca8c18de3144752949b5cae2e7481644
SHA13dec4c7430f434c4928c67b25b083dcdcc2ea3de
SHA256e7ce637941acf36f6f43e2cc70129956802635e78c3b22c592dbd43d4b7d62ab
SHA512932e6c231bd6ec559b7230c21515d394438b8bf3b1843a1a6dcfe7f56b54181b3f05941ed75c2bd3b98ed33b65b48e526e2952d09dd994da00fdf578b31c7150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54329e487439dc9da520aa2904f53e0e1
SHA1f8e56c34daa2f6a6adc3be61465499b04e46aba9
SHA2566cbd7fae731f0132ad641d358867b3e345cce6e8c749a66a1c6e803ffef4abfd
SHA512db4d6d8f1ae138b760672f5ea43a1370e9d9f71e7855e9b5dc4fa6d538ea8a86eac554c028dd0abcfb32d461df6bb502d421c50a9d9e1817a92029a12d729d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b65ab07859c34b927c2a1e7dd5020480
SHA106dd0f550ed818cc36ecc5cb079d6cad0d6f309c
SHA25627a5d43b5dd5c68c78b24649216c2f23a9f44c05e30e416f323a0e0a99782656
SHA5124a5f4f6e7d26ffe4d3e968b07be958af0acd6862738d7d6d68410da02b1cc9a9293c97320271c6ee00b1d3efa9d9e65a23716b615981c234dddcc936c77df5dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5522b29f4bea3f71cfd452e9d3d5568a5
SHA1287fbc55a4deb390a64dda4c7555ea4a960685ab
SHA256f82691328d7fd1ab2b61f5d625ba4f809af8a8d431ef26d3d36e95321337bee1
SHA51292131631269643f7e21af2214ebf1b7f5cbe5d2c879c50d0ae7529d026489394baa71d11b1d07342730e1b8592933007c2ce8584a2cc8d0cf779cbacc2de5196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a63db13eb5eb84db280fccdee068698
SHA160cb93aad8a3264642a0bfc25eb4ef640c766306
SHA2562a49b52398a8d20df6ff661a4e69bd260fa15d742d67790bc0cf002496732631
SHA5126ca4ad8555bc19ba773ed088658904bc6dce34d044569b22f442ee2f891beea46433570f74276dc140273c6520e56a88fad0699e5f440b20bf1bc7b354a365d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6a7520b6bb035b3bda446987b541492
SHA159fc582ba532ffbf5df690b1a5127305b92e220c
SHA256b6940825cdab991a52a86dcbfe79151766ee9755db82fc8a48c52911c7ff3607
SHA512dfeb9197083acc43ad15200de4a0eac46a4809df0dc1372c429dc5797863a67b634a9343bbab3d8ad0e085cacbf39968052dd0dde67929b0174aca92e959292c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d78023c0132744a47534af8f560ea94
SHA102a6099e1a85ef6622ab93ee748c14636f4b8ae6
SHA256fe293a04ea1f9ab80de82d983559385d685deed0bdb3400543fad1d81eb32687
SHA51262ec7e485136d41e3e1b5f2f24101bb4633e5014761ced44495ee445a7aff53965f5aaf4f8ffc290e2b322a3c4a35b50223ad01e5dc52c1835260651566e78d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9320f4438476406a5b727a085e23c79
SHA11cefffb9243b3687516bc70a5590ea081341976c
SHA25639b18120ef1fe9b2012885451a6652ae185bb0ed376d86437a0df0e2689c6776
SHA512958560469961fa025d19a6a033a4be568d5b0e0dbeb493e2c400bdd3b8649fc6e08ca932714f42a5bd3980391f01269a046fe47d59a9dd842f5660608be4b648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d172b971fa76c35e1f2b5d5cfeb571b2
SHA1a877e4e7a4a624084df244818f78d84876aa941f
SHA256dc925a6437050754722f18d997d796c8bd4c2793a29dc9500653866db7232c20
SHA5123f2ac3b46de62e60a3472292902266179e02b54eac79a369d9066874f66308b6dfad8a0b2f098ae01eeb355e8bb594aa3bc2bf087bb6801fa03f508b2c44d5d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574ea46b3731afbbd525c02cffd9d87af
SHA10d78052abdf58612aac256ef317ae23bc66da554
SHA256f38ac735bd3d8ae1a006d4f0a09f56683b7fb1ddf5f43a95ce7b8a0be6f51ae5
SHA5124ddc4ad06923dd02d9d3d7415baf5c1342d3b0c0a89a3062af916ef4e53d3f1c12541c98826009d2b399d51521a2860d69c6d94ea63469799ec8aca6a083a90c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553a7ffda2a009af13d65806788b05d04
SHA1ff961527804ba483a8cf3884ef4509509f2c82c9
SHA2562c2c064dcbece78f2fc642e1583a68efcf0a166cf97c4c17475865051f7cc787
SHA512ea454c37e1660e2d7696ff276f10d16fff023d8b0b0ceb838a588b4e8e64c72363b406dbe21323f9e2409be8305f3facbfc4d1c901b82e23ac2fca9c3beee452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b9e193bda44ac4e0bcecbaefb165616
SHA18b76f9d3e1f04f45aef5cdc7c63659d58afee68f
SHA25664e458f90d9c22f7e13c5164ad68ee266060eaec4464dd341e5c7ddd68bbbc6e
SHA51292662bb3343448f4c70825b37fc97253d1cc065c0b2cf53a65f45f22f52c1b8e51050ea7e3cee634ff38284c9066f61e18bf67581cdb9ca16e37911e643ffad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c93a34479a08c599ebe485eb78d55b2
SHA123e686025268ae9174fc21c4bcc41f0e200ccc70
SHA2562153af1668b9b02561a7f31e8e602acdbeb68e71afabda7a8863a20f5baa20b6
SHA51259c3af585ebc320071a5f4d149c38e74a416137a5d4d7df24df04b108f046bb94a7d63d3eba3832986d5731a15119b5f26cc7ff2e793455b836c0f319f5a0f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d7045c4e77bf0e6262675f2d0f57e7b
SHA1f8c91396bd32c46c87a356111b1188c216a122b3
SHA25694a14be934f7771eeddb1ef2d151829a3a304746ef184e3381c64a5a07a74bcc
SHA51223a88d52ea47278125bdb52d023564b62554c7c102a21251eec04126ec7ab3eb3f705c1fd40b538b9e36ae0640908f8895db049f8c6f5e1698bdba4c5d2d0a5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bb2d4576c8a5663332b8478330b2506
SHA1393e826142aa7dab6e7795af76df7c3efb63b507
SHA256ec991fbca59a6f0f4a7df713633375010d57af2e973d090ab9e4313a014e2c39
SHA512de4e3449fd8d118ac189d2648ffd711fd523de0e71b8b4af9e21db2d35109363dcb387d09b5e982b045583a77b32b288e695f67de7edcfa2fe8f6bfc2c2d937a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c6d8873904f1dcd89e598169b262a2e
SHA18ee07a0c4f88824ad2afcff81147a5a04af5b6c3
SHA2561e3dd235260101e6f786c14f43f3303842d345de73b3804129066bfa3b6430fb
SHA512e18e6230315b97e2c4e97297fdc6c27fdd60bec5e165fa2b11fe4bbc972a9aff843b9856c3c167e657fa35100148bc54ea3ffa4f14f2f5da21f8506c481b1f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4ab9a5565f6c8d0103491b336476b20
SHA174924ed9d35094adb5ed88a5125721b99bf99171
SHA256865d053fce802d9e5568b01e695538c88f59552c16811ecfcb5bfcaa77cf74d1
SHA51248facc254d4b1232376e72e3f0715a781f932532a7064050d8ed24843ca8355586a14615a29db448ff5783fb988c35e26bac19e65af6bdb66f5907b96693fd97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578a2d907c17be6f040abe1f8e4ed709a
SHA14fa161f1aa4d71e9e4b3b51a4ba2af09caa41f54
SHA2565db1680a45e558d89139b783b513284e546262676070ca8bb2e675077c7b049f
SHA512b3b6cdb9c8fae2c83b907ac3ef5183057cd3123b8b33f8fa75a731c0cee6b345c8a82fbd12d412c6b049bf61f2d2b9a9954ae57f46db680f88b6dae25c6ef5ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f6f03571d1ebd34c9f410781b749685
SHA16f4af59fd0b1472f74bc58eff6c8919d8d280eb7
SHA2560913750e6f8cb54c94948fbae9b3ebb7f38970c94a5c7edcba006c1eefd2e6c2
SHA51284902dee8f59611a2d48eb1fd0f9d4354d2a9ef16da265cd44b45973b70b17245f8a933ce971a3a2367db7ce0d708d5a4763c29b9848865f1475e10744f972e1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a