Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
2ce00626aa71572fc4638a7ac7062324_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2ce00626aa71572fc4638a7ac7062324_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2ce00626aa71572fc4638a7ac7062324_JaffaCakes118.html
-
Size
27KB
-
MD5
2ce00626aa71572fc4638a7ac7062324
-
SHA1
bf3663063d091108b01c6827f4bfc6a636a36365
-
SHA256
26d979fc8ddbc5fa3c5d9084b67a365c4ea17192d16b624d7e006b9800308b7a
-
SHA512
4744922ed4f23ef94e65339c3ebf601315b156286973a08584e36a405284882488ac93c946a21b9ca56f2a282e250f30021359f3f90390a2481922d6d3326bfb
-
SSDEEP
192:uwWAILuAGvjib5nPHwMkYD3mX5YXDmnQjxn5Q/9GnQieJZNn2aIaRnQOkEntDwkK:8Q/QdSClid6SdON6k
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a325c680a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F1471491-0E73-11EF-87C3-6E6327E9C5D7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000073bb6ca3651255cc894acc7ad2e8c44d604e156ed16122074358c1fb900b6fea000000000e80000000020000200000004dcaa8b6ff55aea023aa663f7c3d884bba4871e3a7c9969eedd2ef4474142feb20000000b208845d9d16917e66a54a951fa838852706439299e018abb046d4bc9ef4a7ae40000000cafc2aeb236d21e8211c88085b2d46187cac82b15d33a2a7ae86683b736ae651031bb69af6e1a111323f05e45eea1ef2f9dc38065dc33f88ff00009ad8e14f9b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421469528" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1664 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1032 iexplore.exe 1032 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1664 1032 iexplore.exe 28 PID 1032 wrote to memory of 1664 1032 iexplore.exe 28 PID 1032 wrote to memory of 1664 1032 iexplore.exe 28 PID 1032 wrote to memory of 1664 1032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ce00626aa71572fc4638a7ac7062324_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58db71154699cb582b88f4b710dde52a6
SHA1c0634bd0bfff98eeb7032b90de10db7e54a667b7
SHA256d96e767aca5f6055048802f6a18954cbdc323413ac5981be9a45de094f891335
SHA512abb0dd495818a7931dcbd985fb2b229e2552662c7a46f1580c3c34b27c0d366efe54ae3bffdef63d17f2d0ce99909e454af504e585b5165521d49ce1653b51e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53307b79197a2199e856080afe9172c34
SHA1161b933e7344d3bd3f1cb004d23352d19485696b
SHA256456d76277a5061d1fdc79899cd4f30dee7f620bedd17bd5e1d4aa8753145114c
SHA512ef1e355e76477b34824d0190d1bd6b57d6eb9855a05fe79c4e372dd7d4eee22590e3fc70dca58324d6a9fb9a37d7445b504b931a7628056f1a6f972c096f1d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cb7e57a631979e0203b96ddf664e823
SHA15c1d8db194289cc90d453dec6dac0196a5ab55f2
SHA2567aab81b3441c99a142e9375e05028bfaa346e6c304330e344983ff73a4f0678a
SHA512e845322c13e6dc13565b1a90b4690c2a770cc72359b3c34a3dd81e071ba7c3493c7b5486eac62cfee7284820c51b2d0ce2c3b9fcce953134dd183abfb018237a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51159d85a789e8956c8e2b901d6db1dbd
SHA19ec071a8423710abdc6012399017da723e41efe6
SHA256184449954935b7ec8e9c56be4639e20426af56f5986286518d7faaf07ca1191a
SHA512abf4e6773db1645146725d5c1ee08d04361d31e9ec25be2c955c7a2651bb7b8a349b03396f521676e6a38647c5e7d0049e872bb917dfd64eac6d9c845601f9da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da4105c0974b1286e542fda958767e4e
SHA1ef833ac9538e45765a0e284f8d5d0afafa420486
SHA256ac0d452a5b346e114dd73c658f6c710c1a72ba3e5e1635092bd28c3b9c7e4e36
SHA51248ebeca2e9becf9cf112ab2f0f8afab98d240574abb6ed5a36aabda77086a9789c5758fb3b8c12f3dedc2533142bbba7ef1aaeb7e99b08142b1bf350c319c707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae697b0fdd0b7249d210ce556ddb5f6c
SHA17847e161e05254beb643ec77f9f735dfc0a2d214
SHA2560003f33822967ee5f6d5f147987fd5af763fd78cecbc007d22081b3551d70db9
SHA512eea96ff4c8a395fc70b26e746a44bad9b5a6bef39ab09ae864c8a162c2a2a74532e20195dffb9370fc66af0f1e584ddf1b2c0302693131aef297bbdc32cafbbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561647e5dba5aa1fe9805696ecbab11a1
SHA169e409129cb3ef67577a0336443a9344dff48ad2
SHA2560476094dfc66deff0a4bf03c3b3f77ea20bf5d39fdc304c6d8c304421cc8e11b
SHA5120c3aefb8095875a04c929523c8a77decbec989afd20972577625e9a6371e4e36ee52cdec4ae36f5f5bb1b40523f6c105c97ac5a5164230933ff2e5ae35e794dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ae4e5762adc949f50b015912d2f21de
SHA19670b4770bdfe2856b6bd4317a0e04d2cc215c6e
SHA2564b3feb97dbcafc5bb484c6688ac996b0656cf6175815e17aff83fe5acb0bc76f
SHA5129c225547aabddff1d782d887006887eeeccbe52d9057d0076c69d32d72aad56b76e94989bcff0d8a107f2f416effd25cf7e1c0dd6c48970dad9fc5d616cf80cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb83d73e884faeadb217aca856622199
SHA18073f928b1cbb5fad02aa1dbf9515f1ffa9d56fe
SHA2562a389b45ced7f18c99abdc6293067e4ab48816f14f7634230a0b9ad1edd22f9a
SHA512529775b2e02e8a974653e832605871011e9317adf078e33cc5d9ee3200d303fb2e74e733e3926ef7650eaf54dd81505f1a72bc4cc90e1d2e1730bdf54d6633d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c77efe4ca08cef1e3cadbde2f7d22985
SHA18ffaba16bfaed448069cfcd2a2e0ac90f26ca3e5
SHA25696da7783d044cd390fa4f13ee5354957b34e56866e193b24833445fd8eede921
SHA5128fbef52e6003431218faa30c8db2136d7c6c5eeb62ab20d63612937883cf74e631490ae746ee288cef505987777c2939e0b4e51d61f77281c6fc8e0b35d966bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9beaa9601f19c91284178a633cd33e8
SHA1d48db0738f08fb837843f877901958ec88f3357d
SHA2569658fd1d86f4ae15a9238309cac80331cdd70583289f9c33b63d9ca72b820f67
SHA512e8ab79aac704ce58458f4a8eb41e74d22630684c0e3896a2ff493e73d8e9b08f4be0df8a5ae6f41bba38429f6c81c2ee58b5076dfbce09881e60c9242ff5ed2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfd9d23f9328a6eaf4545dfaf1ee19a4
SHA14f30c633b538dad6c48c53616c24f72b5aa864a2
SHA256c10df04d5ddf942959f1ba60ec68b3a1146ab1341e2cbcbb8178642b55153a12
SHA5122af80690adf349e2c5ba49d6591c3dd40a9ffb3550263502ba1a0916df29ba667b65e8958dd80d039d102cacff45131c5667ac00250e2490585517f916cf3175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5297159e06be405e8c3788d0ac5a9bf3a
SHA149d320eb3860673333adc6378fe7fe4122462d68
SHA256ab778a7dba096d4691270ae50626bc28f6bcf4102343d86f2dc4ee884cd31f9a
SHA5125ddd0792e9897de261cae4cc421a9e995dd5d483a3d27b21bdf0d59a8fed42423445415291427a66cb091e5570e0536c1ca51010f8da911a433106a9e470bf78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a07649d09acfb80704dff06467bf096
SHA16ebfa1fde631449f66909a7b792c83368365e31b
SHA2566b5db56f424648560afe9721746ebf1edc534b12395f2fa7785bf0fcfdf64bd9
SHA512ab9c80f13f073ca2a07620a23840e8a63140097a60500327510b1a61fd463494302749aa1a6697d6e1fd9d66d2cf7c5ddaf4b5a0f199a38ac8329cd2f46e861f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535999904ddcbed50c8c14eb960e677c4
SHA1090f9fca3a34797deb0a92ea23545ce7edcd6d99
SHA256fea9a79670d78844e8423797ff1c0545ca27eacdcf84327aa16ad1e2063fdf25
SHA512a92e1b2fbb9a1d952d3360a22e144a5496a619b0200b9041919ab4de94b7ee9346353839f1df50f6393d9755d71fef959050cf2e49ab8e41c19c8e5f492864ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b63a9d092770028365a6eb6f1e6a291
SHA19e49037fb316aef1479e76bfaeb1440fae6c75f7
SHA2569668115d492b106c6a82d5370eb2b15966274f283e1e9e16793bd462678cc873
SHA5126fa911256e843e0525e14e6c0c56fbbf8a18f38c02d3f7ec69158eacac750eb4488c4fd6ed372be49e80cdae57b8f98efc1777bf34550ae90d16cf57871cc5e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568c836d912c2125fa434c352d24d7a24
SHA1cf5a461a2b0c82e5b11c7e74d945f998d253406c
SHA256a5eccda6e221008b708cda50373e5126e94a32a3e014b9e6bb02797cf7a51e33
SHA5129102d08b90e6100d0aa343bd3e94ec849e80c7cbc9e97ee220ac5245d6f0e25c5c6f7844bc8262a40e036ab3ff25ba9ee36ec4ac0a408c7e7f350f95b31fe01c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505679fcb7d79742316c26064780b1782
SHA17176843e2213fa206de585e935c08ec1d0a32035
SHA2568033d71920ea861363edf875cb5e714aadd685a65713faaca6bc80a838080faf
SHA512ddc1bca722aa1d2e998390a6f2435aa1a053c138cfe9f0bf7031dfa7e718266c0ad4218f7797d239900ff38ef398fa57845a512e36ac412deadaa1bd1e41cd33
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a