Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 15:16
Static task
static1
Behavioral task
behavioral1
Sample
41f6dcf13e0330bb39892a041d93b5a8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
41f6dcf13e0330bb39892a041d93b5a8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
41f6dcf13e0330bb39892a041d93b5a8_JaffaCakes118.html
-
Size
7KB
-
MD5
41f6dcf13e0330bb39892a041d93b5a8
-
SHA1
fadd26db204274ae01c17b4c017fed65fc8ecd47
-
SHA256
e06afcfb140478a73e1bfea4e3736cef4f6f2db5d72d99728eb7099532e5e99a
-
SHA512
2c14e1ac92d21eedea338095283d55fc2a66f8a1e1eabcc6ee09f2f3836f42ae7051a0724697f8c0049d342be06c0be9de005ad21edb9e782575361e8703d866
-
SSDEEP
96:SIwMeAhOt9z6ZTnK90/uBJs58CB9sZc8sZjj/5RzZ9QgtWoG3EXo+JAXKOWwe/mN:SIwMeA0tp6ZbKF9CBkctj7QaGVxIK9
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0f234d611a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000005d2738776de70c62b817da25617bb4b8425c893801ef59925cff4d18c9fa3abe000000000e80000000020000200000005810c2461475bb78815f55e2c60fdee9dedddf55ac94b63eb221d410c2674f9f900000000f584bffa9202f5e5c9864df3771cb9b92b8de6e31e42fa4cd2eda1672c7adcbd3bd48f8eb96cc0a836ee9e714647318304cc3d62a8763b7c3e3a6cbe67f0bf24c26d4baba4cba0a2111f4176fd54fa4d7df4c8a04a44856dc21218efc8c323f090cff47ed98fe8fbecbedd99a39ee6a7955fc6b8d7c58875227847a2959cf9d966e059cd8f128ecab1c27e78e35a9f8400000004e69528a4e802773ab25ee7f5eccbfa2868e9de24cbdf6981c8d7b2411a7130afa85b9e02850e9545e564df40e53e33ed0c5f10e46b7815b812e1d8270d6ceef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421861685" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000873f51af70524668e1c1678244e6fdfc6866c3f9b42d1b10e3d8170f0e07e588000000000e8000000002000020000000fda7c21a63db40f138707aa62204cabac955b1551f5eb90980fd52d32cb927502000000097a83912a480c660052038964e19d7b8b00f67e8abc65c9fa91d38319f938f114000000042031b08d8b4a562b3c365e64a5ddd9f4e60cc4f198f8d6c42fd27a910389962dfd45800d800261d8b6f9f346f11257646f5e5057f51a959cb4c2a1197c54d8c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01A00F11-1205-11EF-AD44-52AF0AAB4D51} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2276 1964 iexplore.exe 28 PID 1964 wrote to memory of 2276 1964 iexplore.exe 28 PID 1964 wrote to memory of 2276 1964 iexplore.exe 28 PID 1964 wrote to memory of 2276 1964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\41f6dcf13e0330bb39892a041d93b5a8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d7cc4437f67533d1babed03dce329ec
SHA1c02330a4565f4686c6cfb9f2041c65a8d5be3854
SHA2561fa35e5d2d6b7b63e1492f721b867c7483e2305c3fe168634aad136406d6bcf8
SHA512ec4cca94c1e9a94189f13117d5f607e04340932a036053beb6573653f03775a6abd6f8bf87771ab614c8bfb7b049152f605a6a3fcd1efd9b79fd2fdd0926483c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556382bf7127ce4438f80cba11ec5011d
SHA1c4b5b2cc0f6e3a8630145cd62ec75044f5f08b68
SHA256fd4a99e4c4fa8c09dcd3c775af50186561c319f909365430c74ff52fbfade55b
SHA5126dc1eae4a3d49200eb9b8b4b7459c8eb06996899c77a3ccabeda09ddcfa8fcc918159e3158e32eb2becb1fa65d9f56a77fcc701a819514bf3561148daad1aed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bf519d2c1097772d458be5d8bc9184c
SHA106150355e27ef3d5272a81957340bd0559f9d07b
SHA256e56f3aac47ca27b2c15068df9ee616b893e2f027e1efc4d56c188ac436c93b21
SHA512bd7252b946a9119d39c4b8948f8167228f9982c4b0fcf87bf4b4c6f070f25ecbb5b01c3fbf4ba0907286ce1da947777bc0ca68ad5aea129f7343ca7c8c6e2388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597abcb7b3bd2b250cfdbb2906748cb1e
SHA1e883ada8c8399a14fcee71d4848e8bb17fb4bfba
SHA256fd305177da13bebe3ba558b8c945fbc9c515ca39ec19ccb6111c375129e35f08
SHA51205ea3c04c9c48d9aef13c1f359bcc22019e757a8c2e9963b8ae658523e5ea30b59a6b34cbc0dd25cb9b9a17421ae7716d558695812cd33590a16c505cb468c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5578c71cd325a077b13757224147f3e98
SHA1860717b4ebc9531106ff17519a2254db278afc7d
SHA256e021ef234258c200a38b1c32a8a39f01831015bd7aa753254f85b5db5f68dac0
SHA512fa2ebabc9827ab13fe9c32cd0fcddb5c27cc63b5be9cbd793dee3317e368fee1a36ea9b9da849b34b12742c564eaa96e9785b6e25bca4501673d812f765e3c52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d16ad9e868e552a885df6bdaacb45705
SHA1cc264d67c0eb15cfda0c4bc2087b1388a43274db
SHA2567eddcadd3a7af9fd105c84f6f698360038b1a2e3d7b103c8c8e055f19d9abb2a
SHA512cd86a0f6ab857d4f6690c945d3b32d5f53a9c3f091047a4db5c605029714444462b36c437915c73eca70ab77242acc051a83ce1ebe2a763234afd7a1eefb1be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54db6315ca2a72d1d388543fd6747ea0e
SHA1863004c85e33b862e841285ea43397d344fe4a10
SHA25666d24d056e2e2d1b3850dbfc1f63bee896929504d736fe5112d299233bf99dc3
SHA5124221ccbf253444c7e4e0dda92e41656e39fe54899a261d38599d7e7cbf4913d5486472cfbed5f8d3a659784153df1e7c2cfea8f95725cd9de45c2d8c797977dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5196db3a337d3ce9f44657e0dab50ef3f
SHA1aa9ba37c612b9e8fab4620f79ced8811c8a7f20a
SHA2567ce58def28f4c58863bab04b7bd6644e17c3b99a3651ee98434bd9b13c4c5292
SHA51268504047972d9bca622974232bb44b51d635eed407c5b7614d2dc643c7753c0c4845782a89895367a470a3a1250acc1ac31aa4e7f68017efe4dd7a81b23dd514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6d2bf57b5156ca300ccfb7c9292868c
SHA1246605bed872ef0db21f1d612577aae75f25800f
SHA2563752d1cfabd68f88f71082f8466f1834204341310b465a20e32c2e57ba35780c
SHA51287690f5d2a4efeab4b9fa948c1e21e0e8fda528793838677ac3415d94ed2581a673beecbdd76771da3aa2b97ba1ffc31b339ab6655c734f5f7155d62bd924b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558da2c772df0b9074472eee9d7b1bcad
SHA1980e8d14ad5a6f9d56f76dbb045b5be6a931aa1e
SHA256ce1b04106821fa396b2c8ef21a53f635ed41fce9ab6c729cf354913371d019cf
SHA51222605715f8bf31df2d62f16701df4fa074a3707ba71e6211f7916ccfe0cc00b741a25f0afa0031722d676f25d0bc0cb0f5ed28b23e8459b5af6b34aa2661885f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bb90ab8bbfa61f85b8108444e6e31c3
SHA1b0c390ea4d9374d96a8c9707c351ed3586479cb1
SHA2562a7e70ccb154325743e4ec31007d6b7da96d724442ea0d71422ad1ddff4c30e5
SHA512fcf1f4c3754a928e3036143eafdd7a86323aa9d996a852c49b6aed9c836c608bf03bc9213a3b025b74c2a7ace5e0dde45b06f2e1e5bf5c81c7707f347792be4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa245694a8d205162fd86a33617ad7ac
SHA115414acaea1a64da18d7f58b833eeecb159b23ed
SHA2560931c08671a16b30fe18d17c699360e6fb0be127b88b83097d90405c634b3e8f
SHA512c666ebe4406ea2c229c6debcaf2f915f046dad439c87956facdb595cc4330cb8eba754bc2c5d5493ba2c3b8954795eacc6cb0dd60a4d09ebfcea38d74556c193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bb63afb203024c4bad7e4d57e53a6b4
SHA1caf79716039503edffcbe23b5dffd194c5342cc4
SHA256da710107ff31a2c58a4daa8c7ac34d81a26ba9c123c36aa61362047bf04c5c11
SHA512fd96072356f236eef3126e9ba224552a6f0bd73c535936345ecab0ab52fff6c36221ba06f36a3e720e25b09b774875db289b96d54c1f34b62719512d6a1ee806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a504a33fd85d3bb587a721488fc32d53
SHA1a71c955234e2b46f18695ca0e6b7e8430498cd82
SHA256ba4cbc5e9cae9d5510ee27de6fe1a3b1a05e72ca754d6812dc302fd731597829
SHA5129f61bfa79a5ea986c947a3eff4c053eea89b20fdd4f63fd94200ccce8ebf943e45d2dc150fc3ea46b7511ffde11125f08a78d8fd736c177b8dd8f03622a32b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cba5c04ea6202645362ccba3ff70149a
SHA1fc3c329c01c3e7d9158b1a77c0bd8dca69458758
SHA256e34dd4b4bfff80aaa3f97e104da996a80926014fa050077a06ebbfb0d918cc2f
SHA5128aca3b083345151ecc6009e43c585ff62f2c52e0ca410bde9554a9f43b59eef75d58f0f2ffacff36c3d6d36f89f492537f34e22920e342fa3d76f72c86596dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4ca131c6d1a1c3f49f00a51e679d2a6
SHA1609d476d8e5fdaadf4df858deb570e95f8719cc9
SHA25685177238b54767d285752f562aa3a63863bdef3b5b83a35c0d7999b6e9a1f43a
SHA512ef7343763a244d4cc5ec5cbbf9a98f48efe8324b466aaf060d2660b90633e94d057f38d6536c4a9a72d53058a8f7e8f849830af652f12f0c3619b0adf1b445f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8ba91352ca206d2b9cb7ace6a6be1f3
SHA1df615fa1add137617648457998495ce638b9fc4d
SHA25603e3ee9b6d32068b7d555c9c1638f109c6efc8617af71e9b425119b6bc0524ec
SHA51287d4da4281d6397194ae6e89d764aef1b11dc7c3234f7ba18c560796f551d1866d9e811cbcc8b5dd85544cc72712436be44782b5f0caa48bcc7cc5fd4fed8e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5192f9c9301643c8789912e319c7df69d
SHA18ff7a9268b252c446c065a5ec6a93bee172cd634
SHA25620041245b44c407394dbb2da129a3d04a9feeebc8dc117df19b6c77c432183ed
SHA512a771aa6289325e6f3983abb2b59c79905d8c4be21ce383594c3404f6d5daa31206a675a0d177baec1dc43c3c1b0ad3d3c232d777f2481727fa9315da1861cc54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b36c781a007aaa72f06cec011275ad0f
SHA1dfeff88d5ce34129f3ddbee93683630b931a8eef
SHA256267b8a4c1ea09f7af91227cd317d72a1915968a73574674884975c578ed88fe6
SHA5121e91c600d58632115f45b2ec130d548fa4dd765f0e8bcbe3e7681b3b536ba9941ff4cd1df46641ddbee27ffe1cd3117ab6f88f99e513385a4a58a6c642be4b4e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a