Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
45cca336c6f360e6deff6dcd8bc83045_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
45cca336c6f360e6deff6dcd8bc83045_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
45cca336c6f360e6deff6dcd8bc83045_JaffaCakes118.html
-
Size
2KB
-
MD5
45cca336c6f360e6deff6dcd8bc83045
-
SHA1
35aa65ac1a598b8ef5be2080a9cc807c9165c9ca
-
SHA256
f40d434bd2702583cbd27441e634e307231ab3e3f1c7d59738d610eb971faed3
-
SHA512
c8f6063e0760b9a44cd59c5f385318be7d3d6b56766d2a72f632420dbda79000727bc4091664b370aee5b77deaeecf6eb98fd47b6738e6f52a998d5631138b86
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4503A071-12A8-11EF-A538-5630532AF2EE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421931806" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000ee47935c610065483d254ec0a721d2b8a3ee16119d9095afed9af17393f73f5a000000000e800000000200002000000032fbc903c11a03217dfb3578c0ef41d43f7ecd753f79fc04cc36a55b6877b09d20000000caddba97fd9c30780caf7ad59352f238b353b2098fad197e066f56f6363a8be340000000c3739af098e4fc2ef4a229c34d229eef57afa577d05b98ae44706043fd36e84e0af3f6d2bbbd7e05f2ca5ee8f2e2117a49598a0c1191071ebe65b80a098e6a45 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70a88119b5a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 iexplore.exe 2164 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2712 2164 iexplore.exe 28 PID 2164 wrote to memory of 2712 2164 iexplore.exe 28 PID 2164 wrote to memory of 2712 2164 iexplore.exe 28 PID 2164 wrote to memory of 2712 2164 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45cca336c6f360e6deff6dcd8bc83045_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562b9742a6898252921d9fd7fac29a894
SHA1bbf3d0a5810bf5a44acd59c89c5bc66ed65644c1
SHA256723a6408234cb5e0c5e43e4a4290ff0a7fcefbbff39d4cb410ffeafee8242195
SHA5127374f43a7a2b40c6c6089c18cc25ccadee5069c28ab2717fd32d15e786d9219ba430fbca68b00e2c3d5bee921b4276cd5f4b3bafaa0703cce0255187c8d0dada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efd32343a9ba5d4a66df481b0808ff23
SHA1e8566c2434f8222ee4415a79e0b70b19ae0d5ea1
SHA2568cc84adfe0a9a87cad0ec490d1b6d8f1626013a38e88648b6d2fef88d4e33774
SHA5129c0c821828e757b89eb84d66a35efbdb36ba21c8a11adbc16b6f2a27541f512a6c7d267c2a65d73a905a3d20eb6178072208a8c783a1b608bf2270db7d40bd96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597c547826bcbc05d067af2054e768f3e
SHA1a8fee7866f3a590c5a5931b3777c82dced0d9bd8
SHA25693b8ff8850a3352aa1fb03e38f47a20a39591758e66cf6d7c5c707a23a3e7564
SHA512db8fb944717c4832c255f014ec1fbaac4dc01441df3f2a68273a33d6e7feb9b2c4386b93117a1a43c79ff5cceeeda564cf1b5c3b50894ff2452fd82d78d6d87a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebdd30979f2e335a67afbac5d426eb45
SHA18e10cfc81d8ec760cc02642a148f78138f53af09
SHA2568c779bacf62c9dd07e511a8dcd872bb9be53aa3410451fc3ed18167cc5876b75
SHA512c16d1f38ded92dd55b5fcd68ebdeef411a3d25bfdcba25d722f57b3cdf830c941cfb5a9fb73a2807e74b379023260cc326c7baea019b447abd6e379ee544d231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f608b09b1ce22aba2af40860f91af0c7
SHA132483297766632ff9244ac15098f8640b492798d
SHA256ee00efa8e2c64aebb086febb40ad52fb25e11428448edbfc1c5cb74161c4b7ff
SHA51295fd0d32ba106da41144564625451f655adda8922612c490744255986b4925422e39ec9b5e1b7ea1d1d0072c4c82a649057fafdb0a6e71631a45f2aef0800dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f1376146e584a71bbd1d4f106eb70b5
SHA1a903fdc395db66c700403de0c414b741657beb51
SHA2563e1db6fe874dc5d843924e57e16d3b998e068962ba617393c764e49034fc6ea0
SHA512420b1da3d5c776b8331dc8bb718153ab83b3e3b26625067f657b0372d807c497816939b280001b34eec78085e37b943362aae1a5c37fcc9d30b5ca094933e5ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8cc3013d21aad925e35fce1b8f98fbe
SHA1f0c8be114a47bd294cc64a2eaded70f85e606d4a
SHA256f1502629cb16f37825c040f8082950759ea5c092333db2165c3708d83dc52d44
SHA51274378c14657b63a52530d9b3f6457f7a7a94c071c3294da3ccc9aa957c766cf63e9c484aef93411b4a76004eecb3d645cf063038b7edefede1d41d73143874e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f41b2f40b80c71cb37f2fb2607a05fa1
SHA1b2fc98ef25d055346919b070b2d3c71b8e55dede
SHA2566f24d28d07784463bda15e18979e7fb23275a9732193f57a74e6de93528c5ac7
SHA512c3fd791a38c93fa4be3743f894b22f32dd480b65c3a7e8c84d821ac3202e71ae86776f2e192ae0b5a5e2c76de42cff0484b9d653bdf622b83737d351bb3ee483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5636b32a9d7f122c6fa462a121eef643c
SHA1da2c7c1368e7b036967e1d3f641998c61297bc3f
SHA256b02f539ba3bc45a1ee1fa4637bde7dd2f6aa2959c9d3a80c2e3cf894a21325e6
SHA5121a0fa60730ea402ca519deab6c0be102ed4e48934b63a979c7c075bede1eb8cdba10cfda6952a89b27ceaa363a3ab5274803ba6d4c2d52b105c2db4ef952d10b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5956495daa84b44ca16cb6d2ec8e8bbc1
SHA16dd2104bf4a2d7daeccc9445d697b4626bbf3123
SHA2564a13e253dcd95b30ea1ea59acd38d245279bd7913fb07a096b4aa5fca21b3af8
SHA512404e46c1eaf7e6c855560723eef058c95f59036ff17096f806b1754defe42db75f8a3633a5de823c8c021b7fe05ddfb9ce5aefe3108baf6e3845293c3302df80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562ad82d7670bb811469558152dba9791
SHA114da79a18de2311404c0f0f6e15ea9b10f11f6c1
SHA25699179f14db85d7987064216bcc63ef10d293a87f33563cbb7ae436fc89973184
SHA51289da3c89ccd4220775787f6093b0910e43c9312592526a4562bb3f3d30112bfd45fe2f361e0793d614620efddd81a64eff62f8562f76a0ceac4ea5e0f612f104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7e3e153010131efeda70e4bd1a58fd5
SHA18cc330ffe65e1465062df9e4946792108d41184f
SHA2560d311066dca3057ab44dbfa1754958698d49d341828156c83cb9576664ec15b6
SHA512d5e8229015219639503b707b07ddb99e51b81bcd90bb66ddf9b8d330ddae8648c4d4c6b74063ef64f6d91ae952cb085223fc1e74a07a341bbc04547d5cafce5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fe9f5d55f4945d26932f2c71d455c1f
SHA1b3d91d407a5b983584a8740871b3304fd6915817
SHA25660a6e61b79f0eb88a5b6860b40f35ebec19616e6af53c7dcb6784fec116a20ac
SHA512f2162ffc3a86b793c38a79524e193d0aae812de8af13ea19ca794c159716771e89cc68ebceab6ab2986196102c42de63a57d5bb7f713236a301166e99c5279df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538fac41ef85ec6622d286e682f8905d3
SHA118300cdd92d9f3355e7c7227485924fc6e75af4c
SHA2564f5b07c9309d0c45d86a448c8a545246bb78894e2a970ac7696f5f32a943b1be
SHA512b775f576ff56de315ae9ef1476f92afccd312ba96b2a95255cd7c353ff4453293147f28e893b38ffd3425cf778c8a850a158750f632b445e7e4f71213371837e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6bed6c8aeef44911e7505dc00cc304e
SHA1faf2a137eb4ecf519e5fb2850af6bd1262e21fa2
SHA256aa586f72882512b7c31cb5bb144fb4ad99146271da258b7f7711c31cb8dfef73
SHA5126d2c8ffdb264eecc9ac19ba833bb74c26bcab3d5dba915f86bd2281f86894d21f990ed1dab60572cb1820ce53c346a25e220971619a9f9d3129f73178c2dded7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51019f48c7463685f75995bd07904eafd
SHA1a633f644c7090f80bf19b34ee2fe001ff7611e69
SHA2560f5a0f669a479d782da160904e6c53173c02544c3441b4026a6808641888a184
SHA512747a866fbff3888fd2e8d490fb4a837afb93c3a0b60f1047e7fa6e881cd00b272e110ebccba94d9c8e1baf78d252beff2f0cf79c71b5fd10f136d6f0b8ee80d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e61a8470d03d86c004bd5bac1cdd9449
SHA1c3f0821e3e75e5985f0b2f80cceb094fe606d685
SHA256fa153c9ff1c9b875bd8c469b110c793c3c03a3eadb6066aad63d4aa11557f687
SHA5123bbd4856b836a0252adf98414ff8c778d66f0579b0f2fcab38220f7608ea6f02a03985666a6ee6baad77a6165b9cabab1120bc8db8ab236dcadc966e849a87d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef4999aeb8478f46f46f7756568f0109
SHA1b8917ae80f43197150d098d1bb84d36e65b43b1e
SHA256e806ec45ed2c2460f3c3950561dc43ef34e68afe52bc696daddbeccc2ff745c4
SHA5125d020fcef30287f2b4b2f29f889ee04534d50ea0e19b844c194c8d1ba3060ab86ff3c563840d77f46a40ae1e5022d467a22ee7f2579b0d6998b97403937695ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5079dae397885eb42832a6f07fb71c7f5
SHA1fdb9afbfa8cab639653b2daea2b8ccb67fa66929
SHA256b1931dc6a5e9974c3a23f0fb4b0a974002549567885827c160f29cb540fba61b
SHA512a7a52a10ff20d909b1ecfb8213d891dacaa657b407fc3b1195549c9f0948224893b269b1df7c9842a8ab00ad8662e7fee637cbee0b61be3e920420f44313f0ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df0c7f3b2bdb57dd64381d4aec8fd39e
SHA156ea121b6876ed4ca42583030a5c90bdaefc2344
SHA2567689e5d3827f218dc51ccfbce0da022ac6dbee152c7e2c7e0b89e930bd11f90b
SHA512ba20c4ddd374b82e1e8448e373480218c4c201c9a3be1ec1507ef94d9f67570910b710a3f6a0171a2d6e48c6ac5514f182691a7fb9209b63eb46ad58a3aeb189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532051654477e9b32a9bbd1acfa9b2104
SHA16e66a0072cde9703c04401a59fdcd92f6ffe2da1
SHA2568b289378a78e7b5aab04a41c9ea05b6cfd91e0bac2269c166b50930d74647e9d
SHA5126959074c00193f6040c5db762fa105a0f84baad269cc854e721bf32fbd6bfbbc9616f2dc771efbbc0b6a8b2d759348731484507e24b1340a88f0840107613ecb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a