Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
4cb5b51bc0ee4cdc1fd0b0f01579bcdf_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4cb5b51bc0ee4cdc1fd0b0f01579bcdf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4cb5b51bc0ee4cdc1fd0b0f01579bcdf_JaffaCakes118.html
-
Size
254KB
-
MD5
4cb5b51bc0ee4cdc1fd0b0f01579bcdf
-
SHA1
bd933ef7ea883e006afd9226dfadee4d7bcd3f8a
-
SHA256
b81ee5333566b8779ba38813433816a8b5a52e049038f69990f858fdbc33b20e
-
SHA512
cbc1e889777b8ed53a07c10251c45f5c7935b370aef1e971cf191c5ccf3f16aa1115bb5f8c3e00d1f8a31d0b410cc2cd889a63b9505f2842baadf9447f9bbcc8
-
SSDEEP
3072:9HTvrUm7speL+AFDP+YV6LjPi+23A09VuGqj5xu6j78/w:9HTvrUm7DmLjPJ2V9VuGqj5xu6j78/w
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4A9FE51-13BA-11EF-B8F6-D6B84878A518} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000fcc879faae5c83185f68d5bc8013945c572ac6503561f2eb087a14159f6594c3000000000e800000000200002000000082b58400743a2c7c6d53aa2c34b43de23b515192896f44a37e7f51d78d5f164a90000000ea57e9196820a59d341a946b85059d4f4c1b57d3370b936ef69f3562a0068e66f79b68d93a804e2b19beb673c2499879e30883cd93112ba4076ce356c3802b660f185e74eac957a7cf503fe1547b1907cbedfc5eac9d3a413e987b5c484d14e2f73ad95f4c3a8150f4b3a29a6b9ac6f91fd1cd293b28e1f9e959667a757051f502b356550830051ba4c4146a0ae9808340000000dafcdab5778dd9698c4b78a655eda6183e9c17b3afde6a0b24352c790e5d3342130422fb64e7e8218b71825438942958bc3da61fa8f22e8ab0b1ef501af62fbb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000089e80b31b4871e88903b7a55cd09e691b0a3a6cf86c0718684e2234671f7ca1a000000000e8000000002000020000000bfedaf7b19f6e8d18e89d2a6809bc102a5bc697a30abfe440aa069cec20fa7cd20000000bf731f385132cdf23194b868f603b3d7f34a74bf3392fc5746584cfc7bbbdb294000000016527f626a5e9beb8bb1c2f9bb842cfd925cb5935bba1f88945e82d59191704eb484325c3475c48e2f169417e2fffc2b0f699ae6a7827f836eb6b82cc3d2eb3a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0a7c6a9c7a7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422049729" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2932 3016 iexplore.exe 28 PID 3016 wrote to memory of 2932 3016 iexplore.exe 28 PID 3016 wrote to memory of 2932 3016 iexplore.exe 28 PID 3016 wrote to memory of 2932 3016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4cb5b51bc0ee4cdc1fd0b0f01579bcdf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514da84052a91afdb9deec4fcc2622e9c
SHA1404a06eedd9fdd6bb69d9b2041dc0547d115b114
SHA2567620ca155d9a4c2273cd5a4d09e044bb7a8bd582bea5c8505d33c3972a97b707
SHA512ec612f01b113daed13fcac0cd0776468964014ccd14906fa8ee3c684a8944840d630d101bb0bf7bba79bff670efd49e1f3b6aad218d52de07a2dbbed9fcea482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6a640dbacae9763c6f9309dfa4179ee
SHA1a27ac30ce50513033240b05396c921b299d3f65c
SHA2562f99aefe82e13e7002a3d92665e3c4f81ba136797ad66265935ab5c40e4d737b
SHA51203e5f607014c00ca0041bf972ffedeb0f7342e6d1c6d81c40ea9dfe0329d670230c029426cb3c56fdbd591875ba5f51e886729220174210187ce04778de0cc3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eace5bdbb3ae00790dbec5add5821057
SHA112b688d7f3fb4ee48b8afb3db2c5cc9bcc0e262e
SHA2565c3e986a2c6f921814ce6346ee05b3b3dee9cdfe51888306a0a684b3249407cf
SHA51201fb9ecfbcbc27da6b38178cd51b65e03bc83c2f148bc3f635df6fb3b43932bcf8e96b985b5850b8cb1675cc8625210fda939e9e9ab973a44cde7f67ba2b54ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526e09beae4cc8468c9491b9edc597e37
SHA14a4ba1139ed0fac50cda3eba27490baf83969514
SHA2569b3b0ceee854843d83fb2f88b79241fae53eda0c138e81cb9bed65241e17577a
SHA5124383d0b7f8e3b1f3b58f643757e9ba2a09965efd7cbe70cea9ded37696bb100027b78cf88f8dc7b164d2641d19c27cb0597dd21bacd967d6c0bd6cce334ea3da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51df5790314d7ecfa31313e112db81c0e
SHA19de23e62ece4457b65b68ffd8589833385f77f3a
SHA25628ab5172a93e347f006380d47ce30b62fe040b843b524fb06071e44cbe3b6626
SHA5126d01fe74d176d28ea07531c7f18b70f81865bcec771889ca127ccd9801a4bcb31c95d623fb41fba0a2f951b79a8fa3805eb0547ea79105861197569d2f1885fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cc59bf8cbf1651c190707dd61086a32
SHA14c0c9371b8fab0e3dda6e12d62bb5a35a9937cfd
SHA256bb88ae1db30a3ee358d32be90731acd42d375a8cf331352a1b57602fe4626e33
SHA512b39490d50369ef8db7aa830b089d1993adc2468f926cbc35b34cff5c87328b38d801b2473c88d57d4ac7e0d4db6029826d027028171a11e663fe567dd87b6fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5daffb4bde57df760a5da26173ba93381
SHA17cecdd5851a4541c8a41f5e6c6e1693ff3cea62f
SHA25640a1ad06da376554bcf34a46a0970f9c28f843524651fed39acabddab4ef35b8
SHA51253b609d3be18af99fdfbade7a21c9df568c80e4a7448e765a9bd81640c1d53bdcc167a65bc10a2c045d00bde3fa352811b2ef014caab8b597fac603cdd4bcd37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533b2cf1f61d3f36111e7825eb9f3323d
SHA152acc256dfb8c7f3a681dc8363080b835235e788
SHA256b9a6b8833fa72e96cac8604776236b4867f2566360ca2720f547cb91bd778807
SHA5127a4f7997c8f87d9751627d65cd0c05dc6762182caf66f7b0d6311f772b681a399b49bf903b6e875dd500495d2218407b8f451bf86278e278b8222145a2056baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dba65091d04f1082db9e612d84ede13
SHA1bd71de7b958979f766ed4672d2de943547235d7a
SHA2564a86f581a7b2e4c67b47d04ba39b10582ebdf3aff7ac0b5dc6cd7c4482b7b200
SHA51272799d29b74f16e66279cfe9ff16f84c06ba17c81bb847eeb3c87807a769b51a6a38dd63be9bb96790b32679ea7075b1d2fc2067617112044b05f0c17041a781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc0472b740d01ab8f9d561ca5adf682d
SHA19f235a48d5a9c0719279fc67dd21da4d6367c6a1
SHA256749f1634fd1771e8cc35ca4fc5799acde92e1e30f4e41def8d72069169716fb0
SHA512fb7a021f0c98b5a3500af5be7df971f5c348eeed4eb6b2f77b5297a041e3af7891b98bb843fcee415aa5388ced61d6efbbaa425a43f8fd0b9b1422c43e58bc74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515c255c780992c4d35b1454d4537dac1
SHA1c0c8463701726fa25e05cecfce5088ed7dadd64e
SHA256d1600dbd93dcc8ecce9e5958b42b47c3e3ac3efc4d084fc4b86c5f81a420867d
SHA51230bb945a0713c51199865fe9f4aa79fc17c2dc0954dbca835e8eba7b7dc2bbf8826170a9bf76a1ccc6a33579b5da277dc6715995cdeb180a14c8ca540c8a7578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5759acec153fa325c290935e3e051da2e
SHA1905523b631dca2cbcd04259af996bd07d62eaa96
SHA25608ed9eced99d53b68b35001792f3993f3a0109de75b8fc52e2f06b9850506bc4
SHA512097751ccbd3f8e3269307062d617602314bbf4d4e91caf1943f8f56c33b0eb70fe09d629b52b8262a4aeb6c46c8aa57670c967d9d0c847d7dedc9b9166fa1214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54559ed168b6d5a8ed8c73fb805d80add
SHA163e2e0d1ae7815357abecc0b54f27ab2d0031e40
SHA256fad46e2725000deb0bf7675ea744887fa4c43e72951f92d68f4c846eea92ab59
SHA512503a79d3884fe0e344cc03a26e98e46aa07c705f4e03c184fb5af8c92c311ec3e9ef9785f179db42edcb466e65ee999c0e8906acf181b5f3f3ac4a69675ac718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52560bb86a355f436b5ce1981415c3b0b
SHA104a8fa365a9e19577e7b7f64b20ddc8411a657de
SHA256a3796c96080db4331afa79e96778f6fbbdd9e065d3818608cd2875f3774cbc15
SHA51291fa1b55d0ed07840ac137d7af72b8ff45a20e3809d0119d8a4d1316c73cdddbab5f5c89c978bcd2ceb7856e6e17c0f2a8ac756877d4603e317c9d9b8585dca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50eeb4a15a7f98df73e9ecbdb147c407c
SHA1c70e848cfdb86aba643d45a5b43f5365b7671337
SHA2569c72aec93e632bb484caa75efbf92a74d359fe2789e5b8b089b836dcd880f607
SHA512b997416938119d10c7afd8dbc14f61a3b8d9346e1f48eb33f393b9793c787662797e7a2fcea0820f7abe5799f5f5b2d83114e473a5884fdca4f56c68c52cdd8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fca328a29a63affe050cfc674775e28
SHA1d2fb0f55f4fccd793b4446526d54247ffc3940bd
SHA25624d7b6ab18ab07f87309e5caef66349a041b743a6cfe30e530e252d72cece326
SHA5122cbb4230cd41e59fb92d53c197b705efb7c0d58c50440e7f561d775313b8ebe855c3474e39a10c4793b72e16980271c16498b5adff5250fe2e4f0f68b32b605d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c882711d7d0b26e804ec0c04bb3ddd1
SHA12d21e4101c5231ee43a5c71d77ce84466b39e689
SHA2560d5024822135f8647cc425193159c81ec73c78d33ca97f5504bfe30cea60328e
SHA512bed5d9413a8b46ddcc0313b5d224f8b4443c43ec59ddbed984e7b0b96fa57743e6b004f60d9f654ad8f415a52123f2ebc6039733d520a84f2121189eae14e1f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5038051b532f1029792d8e89aa2a0d106
SHA1db8d30c0f62227ad3bb3b3ae9548e3c8209327ea
SHA2565b7f80dbb2d33b7dda3c420c6a2bf83132284fa1fee8743841edd62c90ed050a
SHA512f9a95a25ca1f3fd5a3f52e7c41ee8490de7ff2e27d6d5ae561a219ff458132530bd9ac6b3a7c8bb0e3f880ba6d9a5fe187e6fd62b8266fbe0dff101a91b158e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd5cfe7c4f5c90747e153a62c525996d
SHA1451a049603dd3df628ecb27c440da28e6ef92a83
SHA256080962a8aecb7bad417568142b76d7dc2290d666f870e0f93225c251400103be
SHA51215a00077f524ac95123fed2cb4f1d37c4bb2dddfeefc517e66cc170b4ead30c90a785244c0d78ab59c8e422eb3787419b7a9c8ba20b390ba0ae045a3212b734f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a