Analysis
-
max time kernel
119s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
34968ecc07e42e36eb1e9d22de3d1ca2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
34968ecc07e42e36eb1e9d22de3d1ca2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
34968ecc07e42e36eb1e9d22de3d1ca2_JaffaCakes118.html
-
Size
460KB
-
MD5
34968ecc07e42e36eb1e9d22de3d1ca2
-
SHA1
e49941c214198aa98d199af73a1714927c36be6d
-
SHA256
35ca5225f25ac97e7ca9e35408663843a6ed7b9223eea522c2f5f483ce608959
-
SHA512
26972b8ae1bbb60e0219c2d51b640475b3dfead6d510b9daf9d45dcb9585419837c5407804e4f492442cdaed8ce6300ba76b751865625a60e95137810cf99297
-
SSDEEP
6144:SisMYod+X3oI+YhsMYod+X3oI+YzjsMYod+X3oI+YLsMYod+X3oI+YQ:l5d+X3f5d+X315d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421592414" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E3F8361-0F92-11EF-8706-CEEE273A2359} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000d4d7ad943a6cf219f6a89c95bf501f8808dc80c1129a4c6b05dd45291026d71b000000000e80000000020000200000008b104d0f2d2d022a71eb746aa4cd8dd5d49aa1c907e98fcbe27e228b5d50bc7f2000000018b538abfe71bde1f33c34fa7c0013b0aa0bf4daf407f383ae3cf827d842310840000000cbe192de2f7c79efe9291b810a7a7af270c98b9e6b0e49300e1fe9981388c128abf3e6443cdfd1158a50446c57904caa752dc6922b6d4b817fd635190574f4fa iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3018f8e69ea3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2088 2168 iexplore.exe 28 PID 2168 wrote to memory of 2088 2168 iexplore.exe 28 PID 2168 wrote to memory of 2088 2168 iexplore.exe 28 PID 2168 wrote to memory of 2088 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\34968ecc07e42e36eb1e9d22de3d1ca2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fe44b1be819f7554a4a6a82d68937f9
SHA1c6bd9f566e6ecd60ea15b8fe71f53957ba3e6d4d
SHA256d07ee1788ccb8574e05c4544102896025480d4343cc15187eb8ccdf700f1be96
SHA512daf29460a04bef5f30de98d1feac47db2f6f1a70e57b65cb67d69a96c34765e0210a64e283b5711bf9b1c5bdcda2e6ed56fe7609629b66cb051b2ea02a246500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5340405afe4702ab6e408c45f071731eb
SHA12d7a4c24f54fc919b2a282ba2410d11e37e35ca5
SHA256c3fa580eb7ea1e854b8993b8b95be3dd790c82a23120195c30b1d5b5c258f050
SHA51275ea8d348ccfa31d6efc2305df8e08acaddbd80a8828aaa235efbccfd0aba91409e5a2e3d40d4156440349ee544442390de0dffd8439ca26d4bf5bffe6bb30bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4dc5850225e4d8f77aeb41dd81b6581
SHA1012cfcabcfe74d6e2df0fd3f44032ea7a3e0817b
SHA256b87d7a1850291368087b8af246e036cb748b8f5fd1aa8c532d7db17620d1a203
SHA5120a7bf11c1b135d550cadac898628ba889679521e60bf67eb1eee18b52ce41cb00fd98bf2248f415de9a6b94270f65d86fbc6879324f2491bf1e4846572dc8ff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5240532e5947f035ba7e0949423727a1b
SHA1b88c8266c401bed6cc10ecaf25d81ba55e79c449
SHA256724b6e42b8490fbd6b6bbf86398e2d5e57b3834d8234f50f76998031a8e53909
SHA512af1e20c7678a160ec464b95a3d0d18587a7f9f03e46328be46592642d9d5914b2c13b490a9ce4db035dcc9254a0b00d9694bb7e0503ef81f35a6185cd6f1b09c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586f18d9d66d61fa419077844e4ee5f42
SHA1465eaccb8665171c9f14ae09f644815737a98620
SHA256254763a4eb72b8485300a9f62dd626e618de4a9028743ab6b4ad35d8ceaf6dd9
SHA5124ae3c60ab0c993a500fc74ee10b023289a33758ea8214ba1aff0c6a3d4ae9d9c885efe0006e15dcc42860c43e0a1164c2094fc35cbcb1ce08950b1cf081a8c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a01344d24ff2bcddddc064801aa043ab
SHA15883d9495bcc1c9c836c14c609ad9818fd9b2687
SHA256e996a77143f7229462f020b85ba3a8a540a481bc22867018c4eb7d2325121e86
SHA5129b888055df7a3a1d653083783e46c58fd686b3ca60a6076b47d0b8340db46e8bafcaa0a44e726943112620eb3baa8da5473ba9de9f5b788296b975a338ad6788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c11d465798c5bd5b3187ed78ee90093b
SHA19e8b847e54a71dd886ea016f622b8348da7eea39
SHA256fd351e6f0f56d754232c8c64872d22933ff7e1b7f22c4515d250f8fd720960ca
SHA512682b659113191664da59849e7b21e23ba4012f772c5c42032ae6b7d9353dec73f1fa9fcf330415603a85183abef814906f9cf8c28e367c77522b9b62d666aeab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533e588edabb719b99afba00dd93910de
SHA1f829394cea5c77df424ed817f55a662c46a5bde0
SHA256d2abe640f7944ecb57e70663365bd993ca034efb0d24b3f2d64e1a522e2fa082
SHA51248a6048231f92d2ade63e6a802953e007810028c924f5175c2bd18d2a9911838ba8ff2c01fc0dd6e933138249e1aa8cd4819ac8de23a1b56bd4f0eb1c6a9afb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5465416de9ffdd2900062e917c1e8ba6b
SHA19354c60f653dc730bc2110643215bd2acc5cca19
SHA25625e36b1b19f9b7766e352011314bea516b2eae8a5a4afb2a4e944407c7ef958a
SHA512a3e47c3a093df2ebe6ff54cb33b57c5291758afa8d909e105c03d62cd954260b39990f41439b421585098a8f5f3a445153c3b02cf39e1201ac2d78f0a74bf14d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e71a646cee734d1945e1d96785cef473
SHA130b753ebb225de7cf058c7958877d56be4d58455
SHA25655f87805eca8efea423c8e57cd8e4e9976a5eff5fc7546f052b5248922aace51
SHA512fe1bd18c737f32a6952f30e24bfb0b4a81f5e57c2a0bb281457cb3e779e9b04e786135dd5694b90c36c439246abc50a79dfa641d9e42ecbafd4e4a240f509231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6782e83644122b05507a49d6a4baa59
SHA164b4be84721b26d75dba1b96153efa72ef8b9b86
SHA256586c885b975efc0f26c17dde0297eeff9912cf54bcb2d0f92ed83bda3a7ce6fd
SHA5120e5bacd445421744b88a9784a7316b247634bb0c18e2a6fa783951876392659b726093683a9893082b42e520f4f06d0ddb4723c21bdd0a6dcb44d37b9ec8f5f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ce91276c1e79e9e126bee6e37b56a65
SHA164b74287768ff3d8761fd2e9874fdc444e80f268
SHA256ff542cd662e92078229faa431d23c7a7564c72353f24834b86da8d0bc6f484f6
SHA5127abaa8502243c72563603a5f6a367e300d243d4a655bdcb32bba005a36c929d6ba358c4179b99c69c96bce21b73da77b2d2fd05b5368ebfc3f25f4ae793c5dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b749c1595679c74dc34cd6dee8f0736e
SHA180d1caf5e1d5d4d9b377fd3ce27e331cbee53f08
SHA256565c3bad75fdba28505a7cb49cd7c037199ef420598f6fc459985d569c086f6a
SHA51204fc65bb38cbd095f16a4cca5cf1215d7e78fd0319f13d34cd3f75e86780e608ef0cdd916d69008608fdf6c3425146ce98b6fab13f5077ef6e4e5b916e91647b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cad54dfdc476d30baea3b234c5c1849
SHA1c8bf46f7d7799ee5209198f9488f934358c57812
SHA25603966564fd4d70f4bda80d56b4e629192fb80998578075287c36a80030800d45
SHA51221cbd40ee4468fc477b7796f810c05ced0ff46cba781d3488e1bd8271b957ceafde762a373f6beac98412797c0396515c43d63d5de9b0df820212e1102a64c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510d2fcd4a1101b6e2b6316a3f0608846
SHA102f4d346ebcfda9f1066e64fb49627cd50a9e5ef
SHA256c4ed4cbb719c1c337b6bf8ec8b37417ea2bcd400cd452bf399eb2bfaf634d647
SHA5123ee1fdbec74d1d4608154ada81ccd537d6a2ab91f23c36629fd052f32f60087cd8836d29810db5fddd23906ded004ce7b0972b97073ccfc86575d16a2da3959f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c9ed46b828d98b9fdda9bca39411d0e
SHA1b59f70813a59fb7a11b468d0c51b8ab103390ba6
SHA2560f3f494d7ad2ab612962bc0642d446f91bc941864cff9d2dad55fbd126868764
SHA5125d46df75c7c0465304a2e9e1ae1b67965a90b83098c8e3fc71d1520057d1ef4038b08f2cbd859d790f6ed40d005bb5ecb7e0da3b08e4630754fe15bf1d8c1760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc42143dba79c4fb63c7cbf7a8fcba42
SHA105747a25990b7b43669d41ab32b660fe53edc631
SHA256cb77613b028ecd4c39b199723b072ad3ded2ef70905600b82b235173032abcf7
SHA5126f74c275375c8174d2e5a8e339a242d25243c26024aa070158439d8c33f318414d26b53bda580b094f5a796e6fa4d26d62d48b4a6cf1667418af76a836b7ab5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b987c56938d176700d2b5e7435e1c98e
SHA14bf9fd86b85ff1e2be8d946204d7223bc93dbf57
SHA256102042df1d39749611c716b1a977aefd87f31912273d4c0a070f496451606528
SHA51234bdb4cef0c3fecbd403d7e3d2c878e9bc119d2c9287168dd01fa63e51be99b49d14374c7c259f260c4731ac2e88224b3e8482a4ab5bde349fbe229ec299b4ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aea8e52a367930c433672e27a8872ce1
SHA1fc701bdddad3a3f29d84b4f49a9ceceaa665e189
SHA256bd8bbc50e771c465c7cd4d5d36d9a760933a79c9d80c2086063c1162243fc753
SHA512ea3876c8a762be42f7426239717db9fc1ffb288b9dc29ec271f9366b812c4e85c96eca5d8269d103cf77a4c5d1c6198da664a27f30330a9e0fe934e860e5ba95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53abd5742d3f2edc9cde8e6a2346ab4bf
SHA1170279633aba1b9b2e9f9a57d75d60d46e032af4
SHA256cf2e4008603580634a8afe14382e1cc9c94c6001b05ec459454f7a116ee31690
SHA5123f9814f25ee4580a43cc5cfe3390dc295a55f71975fcd9d1fb2fced44bac58d4dc8ed27f47e186f60317c171f6a0b36290b052f634b6b2bf9a5bcf7717e068e3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a