Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 02:28 UTC
Static task
static1
Behavioral task
behavioral1
Sample
37c5fe96844b729485d84654144b22d9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
37c5fe96844b729485d84654144b22d9_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
37c5fe96844b729485d84654144b22d9_JaffaCakes118.html
-
Size
30KB
-
MD5
37c5fe96844b729485d84654144b22d9
-
SHA1
78cd7b48ec0483c1b73d9fa988690403a52390a3
-
SHA256
538c8ae6acaef87bcaa191c3cd824b564e92bdea5817a8b0349fe3096f625164
-
SHA512
525fa9a5eb53baeebfeb49f9ee6af98249d2fdafeab11d812e6a0ccaf97c20ce641172db2856e0e426989bfb38ae7c6a85f40b4a46dac8b7db032f908623f2bd
-
SSDEEP
384:UKpUVj3w1Ek0xSbPX9CljUgnCgvPo5XSlNleVqtsjp8oh262DPvR2tcDfmrBWKQq:UKpURA12nlwoBY/26UjmrBNQyuVHBhI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000009d236a054c96a7b023b71ff15936c01c50b9b787bae02bf8c4a9f8bfeab6519b000000000e8000000002000020000000a3b5e6a73b5f14772489ebefa213c25bfcc0a65d3c350cb7a04836c8892a795e2000000085af0fd0cb19da2bf125c931f7bef7ffe7080eff9ac87c865e5cdd75ae5c92cc400000000f10c6f937c6dae857c7858c3d7e142bbb12e1c8aa80a9e0e8763bdc888b75b01b683688677a4a30b1a56661e4c37861ac34066b7d4091e27c5ac1d06c970229 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54168C11-1007-11EF-B393-E64BF8A7A69F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0036b22814a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421642780" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1444 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1444 iexplore.exe 1444 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2028 1444 iexplore.exe 28 PID 1444 wrote to memory of 2028 1444 iexplore.exe 28 PID 1444 wrote to memory of 2028 1444 iexplore.exe 28 PID 1444 wrote to memory of 2028 1444 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37c5fe96844b729485d84654144b22d9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f2359b9ecb96a2649b325520376482d
SHA120d414b602ed86e0be8e58e6b56ea48f9b16f849
SHA256b6cb66c649ea977eddd8d5741d1c21eea70e0d6860699226c54ea0b2a96cf144
SHA5120afa8ebc74de280e9e72e1d825511d1ce6a5125cff09aabad3783f922b18cf005f488db59cc8a8eec3a5f21ac169be4063f23a9785c34c02b845d377acc64374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e816e65e392ce47946673120246108f6
SHA1df491dd4ec558968a7ecffab98221a9372a8e646
SHA2561e8adf7a6666c30527bb055d0361e79b0a859a9d0f9f4ecfc0b3d04f1e832a49
SHA5123d8ce1e518a2c20fbc591516c818c98cc4e9e48bbf3e1f98d2d65e447e74a80826967fbad34479c1f640e6aa4ab774fbfde5782001fba4bfbb74901c3dca76d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5369a1473329ea90520b41b3a60a463b4
SHA15419a625c49ed14d1045a9d7b130ddbfeeb62f61
SHA256ff28b3bdfecc3356a7ed6b0895cf370ad40cdfc846cc58659378bf01b83d1a7f
SHA512c1c8f6f4c49a7f944c4d3fa436fd75c15e23cd3d7a8203b848531d9ec94e53c507e5cb639282fcb335b0bf09dbe1d0816ecfadf76a3e95390393024552a56a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539b2a5290b2fd6ddb818923039400af6
SHA1a07538affb6fa04736c9995c4a68d6375bf8a6d4
SHA256b2c9fd7a77ef403e3188502fa4b527bd9e24e1c0142118e5719d6130e86e1f62
SHA512a33c7a61a7df5cf7e6b989e5aa27ef7ba557d093050b81cde94ca3bcf2228da7cece0323303d0c3f17cf7ee0ff54f950e3cb657fe6dc6035832cde363342f2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577e8b868cb1c5cd4c36ead12d5ac0ddf
SHA1ed3732734c598d88bf17ce6b9bb06ae591b02d79
SHA2561b1e82a03749b9ad834969b8a655aec11cd65378cbe61097fce3a268a06c84ec
SHA5124e6584b52a2cd0616bff5dd2c3774f9809d93bdbb03a68c3133e38a7aa4dcbef1322159e93794e5b6e7f192403bb901ad54bed0851edd6305c0f10fe3281f0ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b96f143dc83552219b83924856341d2
SHA181e2c6cb4318f9a95135bf1e2a09a6111ad97e17
SHA25662135bbb51a8feaa97e480839e45e24d4228a1eba973a7dfb8dc6c495aa34ed5
SHA5124912bed5f84bb1bbc75aade69810a970cf50ce77f3077f29821fc406602c551b2f97d525eb048e03f22ca826fa24976340299751b4516e0b9e44e1b6e6bc370d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b17fc8dfbcbe28d81fb473ca74dc31d9
SHA17239c38b108d5a963d531138cb86909a3687ed7f
SHA2564ceea5d46d693522c3b8d18d1c1d6ec419f78956e05c6c8c51f0a6476335e886
SHA5128c1c9bbe3c1b9e1f92698883485d850b5100a447ba63449100c399c5a03e1061ced5a5505c50341fad5769a3fe8bb608274d9306dd551a7fa9367b05960d9658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5738bfa758c1a2cdef4ce07c957d18f20
SHA1d1d0e01135461a7048f3168cbeea24991a436d14
SHA2561756c5b2be3da375b615016a870fc4cf169cd8a6dac77bcedcc085daf233f638
SHA512fab0f73a213e5ddcd0ceb5088151f83fa0ad34a966da1beedd5fa8b5ca481d28d46079b77c91c7555876ad89bc8ceb5254ecf8a74700cce8a3d685d96b30a07e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbc9e3748e794eaad554a08ff7a37171
SHA1f039ef8c8144d4adb53cce6bd69f7ca19ac3ccf1
SHA256e77ed31ea6be9ae34d86f437bd0c1537a366cb704d8138d82b6b367d57d5221a
SHA5128d94d2de3defbd16fa0cd925ea36ed3aebf86997a0665fc2a585840daa8570876f24ad4e77ccd367979844dfaec366dedf010f01521aafb4b7de334c105b403d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dce78cc12dd66b0ad47e2454f738a3d
SHA102ad1e0265e92dd50d91bacf09476e8742ada2c0
SHA25642e0bba1121c72ee667f274778e008db413e726f3126d4e1390e2d2ea29083f6
SHA5121c9583cf5357ca61456fe116e5b38acef2abd687076928b66ea2ac4ae502909ef00f3b5f5d86499c586f34b76cdad630f88394aa904d57fcc90d9b43b4396402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6a776b5d515120327f0badd0e0189da
SHA1a1d163adc025f85b20122480a8fd9637a63a9de4
SHA256f12c8a3d7a19187bde66cd8129c2c93534fd7d9cda6b482aa92c2df359d10883
SHA5120e8e171beb18a32adb411f75b36754332a80dd2862f37338fa463b7d75f9f71a39c73cd2197c015102946d801c52faac26b074d0bfd146a1de66e1c2de496d8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e96a196273cdf5431f1a2cdc78f381a
SHA1f5bbd42be33d148061fa537ad9bcb41dae561d71
SHA2567e46a46c728c4dd6be7d6723cf082015247f03573e7894e7a6533c6eabe350c8
SHA512daf6e8b613565664a4eb4bd2db732e8d614e0448183b382dabb8fdafcec1866fc4173abd55aeb6cc052160a96758492e93708eaa13cd31e04009f362e3b61e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcece18c90818a21b54107319877fc34
SHA186d7d8931e2bb9f1cec5317a55531ace6d7cfaa2
SHA25604ccdf947b8d74c17f4b3f0e9276d04efcb83d695d3525d6ecff0637609a6f81
SHA51266cb0f2403efeb3753c2e11c12c8bacb977f55c0848637a8bb4d2877ce19638c958988cd669560ab713dc236535ac274886e80502b50ab80dd2816638bf846c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59593daccfe218e877dbc4053776cd66e
SHA11853b98e2cb15b4bec32e1f580c123be506915a7
SHA25656a14c3da6c02db18aea92bfafc244a5732d435d3ebd25ed433c4bd8037b3af8
SHA51244909c1e10906523578ceee2c04c02c25b5b79dfc9523a4d983367ebb411d7a893efe432994766f3486c0656c415e16a9764477673deedb2d3198d4a562763ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521bbb0c8a9a25a16364f09f4bf8bf93c
SHA11220330db156c362d6e25ab482787f078db619d8
SHA25612a7de111db95b7148c6ec15c9617f14348bfacf723068788ddef13b2aaecf94
SHA51229d955f456e0099fb4beff00bb0d99fc830b0190b93c57bbe24339868b07442815d40fe076ad28a14c51e1b665ade72e04d956b0900253fdc16d953ec0fcc838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5831c15b01e7fb39e7d2f90bdb29e8548
SHA13480d7448ed1045a4c91eea9d87e70cabd1e175b
SHA256650bc5778c678c8ca3a76448d4ee6f99ab6a49355fc3f2dc62f32e9420e3ee24
SHA512867387dd3667a081e05e5cc3edf5d8b6c8fcbcf29e3f033fc8a3359ba682ca1e774e52bed8d3d44eddb56775ab690d8b170503b917cf773bab870e1659b805e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e996d4cbebed515fb118c3ec1d593b6
SHA10dfb3a9889dcc342b426fde45bf1c4190d701d27
SHA25684e559802a643ba5a9a53643e501e6faf1407374c74f92171e74397b420006a8
SHA512d729dda0b97fe601ebc2938a0ac30b5fcd99072751f063f7b460e1f306593c78092ecc2da850072414800fe2066e5e4a5345879ac8ca50dbea504aedfc0f9ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa8adf22c594e97ae77adcd32a13a508
SHA17c404ebf35f555b4649b8beda46980b42fda9600
SHA256adecda616e1b41e4e4ea9aef247cd1d30dd86e0a20585db917b27635bbd4b912
SHA5121c789da11a327fe559796c6db45a0df2f77858cf11d3386f04d7768af8160a2d818cad290a5bd0a66186f1e862e159da3c6360922019f6c91df6595222c85a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56193f09adf8993fc872f1959b7ca0bba
SHA1dfa0d124bb01edad7a515e8a5312088a20e7dcc4
SHA2569670114dc85afdf5d41013fd58e7c584d589a75f51a6d593ed81de81da160f03
SHA5127ee5d76a06140a40701e05b3029dac2388f014e7f8b07683f624d20ca91f115a3525392300d61b90b2560ac6680e17f255a72fc1e6b14d8998a1ee78c6044c8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540be448a3d32c40517cbb5291816455a
SHA161b313252181c61676c14aa5573eb94ed2cacf9d
SHA256ccea3bde50d71a15ef4d6964c7f1d2534b8b7ccae23dcbb646efb658e9e5ad42
SHA512e7b050500fe526c3e7865e5c7e617e210c0408c536045b65895aa6e706980133f0a703542968b3b83bdae3f39c26a75b8697b6467eb2614a4dc237ac0b3d8834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5866eae917db9c74c8b2a9f7f82c7767e
SHA11b59f26ec83256d8cea63864bcf9c99bfd098960
SHA25686b8c132dde85a4370d99920742e171c344ea24e5552c1495f383e7b65ecb32b
SHA5121e68ce4915d33756c6b12efb7fb11c76e93ea11081c105a9547f883fd5da3ee5cfb07fad2b03d6dd0d62127147b4f9731a9806a1b7206150f567730e6fa0c1bb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a