Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 09:16
Static task
static1
Behavioral task
behavioral1
Sample
3ec18a9871fd2917f3285be0786cbb18_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3ec18a9871fd2917f3285be0786cbb18_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3ec18a9871fd2917f3285be0786cbb18_JaffaCakes118.html
-
Size
461KB
-
MD5
3ec18a9871fd2917f3285be0786cbb18
-
SHA1
7f4af8064eac9925c5ddc12fc35230bc0121efca
-
SHA256
95e4b4b5521d3a84b6e4879a67b1adf0e2195b64648dbeeaf0c01be009d675d1
-
SHA512
3e04f45d01af59f2900cf132dba0ad042338b7e949e0d9dc51c12886bbd106a459cf171ce51bf0c07b488d1ce49931c04cc0c0dc5a123aa7e4fcc595d86d82a0
-
SSDEEP
6144:S/sMYod+X3oI+Y/sMYod+X3oI+YrsMYod+X3oI+YLsMYod+X3oI+YQ:K5d+X3d5d+X3R5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000004b8b959cb24966e5f1977f9129e7da2730cd85cd7cc656a34bd4c6e5d0df2a37000000000e8000000002000020000000fa56df79dbfcbc31266a4082b1c04ebb9b16242d62a59f56d06d2f9e9d12623d900000004775e955fa696941f3621e8f2fb61b3e1ef1542441d8a1c0a6d330104b59f26e4bb3f9a5ec7c38ae3fd30b4d6c6c41c7762f8021894560828fba48431f23f262b1e226758f92c58b9b1c328d9d3517eaa3a4f2bc6f88b5af0f8d41e586e48be3d660cd0a9b9027930d750fac8b99b6c4507bb63cbfee6fa26ea8a3bfc74535f9f89cfa5b5d42030551322c23b2066c5a40000000c697b5c3ac99311308d79e2971ea7af05f0db4fbefef4ef07645a021469efef524e787166ff2e7a88dbf7fd3c7ede96bf0719ec64b3240ff084949b46880bb13 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000005a18d83bd1253952f203d34975a9826c17e7b80f71b0657cfb05a34d9de1319d000000000e80000000020000200000003854d98949b220e142a644a55703c58c54cbce4fc91c48b5c3020cdc3dadea27200000007530d33fae99a3cb419ad95fadbe9fef9e0b9fbbe36b01bd0020876e4ae9db4b40000000dab13cf324407281a50b7c6e2a763a55f33033322cffac3b5645ceadfbd7cf088ceb4564b0626190ffdce49015c07ea02c1f945a4ffb3936435f9934acd80fce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7136CF51-1109-11EF-9449-6200E4292AD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7098f24916a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421753640" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1520 iexplore.exe 1520 iexplore.exe 1532 IEXPLORE.EXE 1532 IEXPLORE.EXE 1532 IEXPLORE.EXE 1532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1532 1520 iexplore.exe 28 PID 1520 wrote to memory of 1532 1520 iexplore.exe 28 PID 1520 wrote to memory of 1532 1520 iexplore.exe 28 PID 1520 wrote to memory of 1532 1520 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ec18a9871fd2917f3285be0786cbb18_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1520 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576c7e871f2cfabe2b4bff43c42c732f2
SHA1b8c71c1c6d297a29fd570a99ab8066149c143b18
SHA256c2c8c70927bb9470fd6f11cc445fd1e213d54aba283f8040f6c38686f8aa3c04
SHA5126697a0eb5c37d83b28231b2e4d4cb7db57705a8c4fa0f05b94b7502372aa7f96f39ab134c4c09af856fd75e7c34c023d3a851babd646fc9d6f3b7f401f10dc21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaf0a4a8b688edefdbbe166bba385780
SHA1d346a191990f29874ed39cbc8a90c164d390a9b3
SHA256eb843a3049186f32baa885f02b1f062f20eca72af2e3420d7558aa1b55c61468
SHA512dfc5d9dedf9f40da411778e5e9ef4594c370cb60f9411068da57f738103ccb008e890f5ea27109b33a42e8903946897060a296812f9eb5cbc25df31fb49c4294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567dd0c7c75194f6e675e2c097de15693
SHA14ff4306fd1cad40bea266d5a55536ccdd6a2ca12
SHA256488e42085524ee7fb2a0acfb62f9d0e8c64e7ab9f7363cff099652584a153b80
SHA512de8574f82d1a84b4f8b0d97d32fb465be53d0dadb0320072579ab27ccfa734dae0439959ebfb90268c2c3eb35ea5535e72a662e7f3097e4f7a9702b93e3334ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3b34bdaac669d959a3ad7b82c8df402
SHA1bcd6138721188675b4b00d08e7033eadea2a32bd
SHA25644dac7ba1c36ad9ff3b151279f27f4317a2dd35c113c779e2583f1eca9f097a1
SHA5127eb399c4885deedaa384caff632fd235eeb2991ad0b227648629451fa52657d9f5070a6c27310b3b0312444bb395bb83af72158d0c9617aec62006ca7ad591df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576211432fd838116780c0490055d65cb
SHA1c02d262eae194c580e8bb8935235ed9073f9412f
SHA256da9c18676cdb094124a6d462bb14529547a3cedbccdc10a73e88d799b8430755
SHA512fec6ce5b70f80513492177e9aaec7cc8fadb2430c9c53e4f7905bb122c195ee351683886dadb749fa7930b4c722739f3b2a897e5a3771594e0d51f4341ac8d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bba0757c2007189dfcd8482cab389d33
SHA1430a400a72c5804591e966ae801c10df3e49e2dc
SHA2562b7935248c3c301704a8d6ce3ad3ee33e73ab48047863193e9dc86bf1a31a30f
SHA5126f0dd3ae6e1cad9d8a81b8bc33822ba66d7ac7ee6d4412df4e3f9f4a06f2bca1cdf751219a512b86b4776507e7e921752542fc9c6400cb35af5176d0796d67b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c872426405cb89a44ee96c2e95185642
SHA1d1a8c66641c72f2245edb682e816c8d6770c434f
SHA25658a759f0e781808a58ea5613c99e22bf84d54d32c168f7ddafd62aaec8ed7c6a
SHA51222bf0020574f68ad819d355e53d42729feced61428a17ff985df4b03ef6ad7a1d11dc5f7ee507f94b03ec30c3bbe90fccf01b4a066adb0d150e08d4a1ad51b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5badd683cee29ea0dee7be1ad66c648b4
SHA1c6214a002e9985e4ab77845755cc96369792aee8
SHA25637e16bc4251271e1f6d29ef04b0bf3e126e442f3c9e1197359958779be037685
SHA51231c4d90b3b626ea2ad23193c75cf79c30e69945cbd705efdae859332516d10b615020848c8ab5a20c396c8edbd2dd8580328c15100ceed285d91d4315a1aa151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51381c077997f8e7753fd11baf25cd9f9
SHA1a481eb07f2939664a5e5dd7425bd9ba435c76bf8
SHA2569301623b723890ba93a61dab2f047f3e2cc8f851a37571b5df85694647c4ffa4
SHA5129087990318ee2ec1a0549de822da8d79f0618e8bdcee2086819132d8ff950f3c1483105b3069a2594d9475719d0e0dd606c2aa1c68011980be3fcc31134d75a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5307af21ce2128df8a7409595405fdfea
SHA16900dae96c21ca6415805526abda0dfacd7c39ba
SHA256b649c579bd889e9861cc06f834e2b96e29aec996fc84a4c400f489b9f286dff9
SHA512406e196bc19170395fc587a5ca83c6978fb39ffc127226d625c2c8536c985a305dde3c73d8b0362d202e3aa52168dd0ef86b21a3e915f8cc7924eb8b0dde9946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dc6459335efc08a06d8d4eb299927ac
SHA1bd324cfb51777d798ff944da87763a732c906540
SHA25661db8b554c8aafdac469b8c6a83373d23bd0911961a388b65c286087257a63c6
SHA512145d9c89bd676721c3c47df7f2ebc6b77a999f2463e721892d772080279addfa651c8382493459c3b3a7ceb9e8ad806d8fa7379e463050b2bea32fbefa18859e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f6d1058d22f17b5f74699bb52539e17
SHA1ffe6daaf7d2a745b4cd9926ea716a74f7eefd9b7
SHA256ae3632fed092132473bc968717b9a7ec63f08b68c279e0f7c028cb0e4f235c4c
SHA51234341ae60e70d2638c5395cb2f8dbcf8d9aca2b5f538aed716cd3ac6dd6289f7e5b206a78eda9ab6f9003c0cbb430c05c682d210baa986b3a6c52eed2a6dba5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f34cc577e4353734ccb8329207056d21
SHA1192daccfe57615174dde79dab100b198ceb73bfa
SHA2560a7bb9074c3ced839422d13370b2a8c776e0cad32d90766757212de9b2cfb78f
SHA512f6690a8cecda248f557dcffe80f2acc5d87dcfcb98642e994df913577641001884afa4f7f885de96a59a36851a39b962b8ab2e788f544923136001112798397e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fae8cde4be32e391c690d3fef7c83b9b
SHA1ed115ba0a1958b98a3ce6680116ea192920d8078
SHA25642da0516208f5cec124e7ad416714c2ba4d0dd2669188161df55e7122a99f6b7
SHA51222cbc4d3eb2b3d09e4021accc446f81cd8bfe4819fdccbc80ac7c817c6b5913b85bbdbbb4599b28b7cc9b388d78bf466268a2e3cce42fcafd89b730dd70ca302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbf275104996f1db815cd4d7c08b46a0
SHA1fdc38191a64621ffee4eac4ac5cb6ff95130097c
SHA256eeeb7f55e4d53a6a7a78f13606d16ce76472392539fc70aa75edd1a445bbafe2
SHA51233c048360a642fd034f9e7f1f5f8faf513ee2453dead0fbac50cda48e5be5aae5af67ae6d646fb2310b3d10d510f3ffef84e80cfe3bb788e45e69c77770353eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e69ba6d61268714cde6fe1a3cd3c283d
SHA103db5aa6875a94b88c20d28921e94bee26302594
SHA256a7384fe1ae6a79c4055444bdc5a2a89e02770f1e9fbfbce2b3046749ef077843
SHA5129812901473cb07acee8c80b51fdaa7b086dc640f261e119224241836b5fc32f77cf67e3c0d9250d6c0ea4b231d9a96ad0454a3aa25d2ca8ba03a1103551876a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bac98289b880eed30c374946cbce610
SHA19afba432fa4155c7276eadd37d50510547c4e7a5
SHA256f1fdb41984eaed01bc8dacf672dad41019fd04a33b00bbb3140af2ae66a9b370
SHA5120502f8068a5a268a50830ad8e96c41167161580cbc1dfeed8c27c7734f4543432ebd504f9bc679690037635b8dbe8ee684b839db5e428dc75e6f62ae6cf4e8be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59584ef33fe9cc75f3e28b631f1a0a057
SHA144dbc848cfb1b8d16137b0883f784abba48ee822
SHA2566b0b242a2fc9a0889a4fcf35e122ca814c8edabad084a2bb162359e98e81ce6b
SHA512180222b00164d9bb670d975ad86e08c1b9ed2b772468cd25c3d873b6730e2d5bbcc1d72653aff6af5c7cd6db852d46b94d18ff95517d1dc16329f61ddbf9fc94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f55f0944593274cddaa2d8ea58c59b5
SHA1c92df6aceb91ef4448c11971ad209df1ae965d6d
SHA2564a8d20885bb446e6035903bad402f61732a62051b97808fb1034f5c9c619807d
SHA512a7457afcd1d36ae06cbabcf21a79ad064ab4edf237754412c3d39d216fe21cca5add22acba50e9e7a79ca992580ea37271e143ef9f752560aac704904ac6ef2d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a