Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
4e34588cc1cea574ffac41bd226a758f_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4e34588cc1cea574ffac41bd226a758f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4e34588cc1cea574ffac41bd226a758f_JaffaCakes118.html
-
Size
236KB
-
MD5
4e34588cc1cea574ffac41bd226a758f
-
SHA1
70681fcd0b6e87a1d6ed444590004d42fe1fe8d0
-
SHA256
b7e4f30ae73877a0ec908e4ba4f9c6e7067c1f69ea05864db40a41ffe8a4e411
-
SHA512
62e0c5d606b3b84b0e3c1fdadd96d7bc7ee50c33e2b43f50d8f9f009d743ea960877b3902e7a89210bbd01b0ea2449003b498029eba5c4ea1bc9f36c58d1a01d
-
SSDEEP
3072:LSzyfkMY+BES09JXAnyrZalI+Y8a9Kjy0srnHHbX:LSWsMYod+X3oI+Y8ssXwnb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1062401a09a8da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000b12b990078ddb2262b1f8d597f11ca3b6726e796b324437888bea23375bae807000000000e8000000002000020000000b9d9be4112afa83b976cca960e9356d98fc8b132f174dd155c9d6933caff9135200000006cc28f47cff68e7f3ec0a47d3df2a25836729708ff979798dfe4037ded6d869c4000000024663d51c8b71e3cce8b13239170b41522a67674d6972dd42953ab2cb485993993d01352554ca72f5f5168a78a870c04e5988e0c3681794e5b0e04e43a60266d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{45A97311-13FC-11EF-88AC-F2AB90EC9A26} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422077836" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 3000 2248 iexplore.exe 28 PID 2248 wrote to memory of 3000 2248 iexplore.exe 28 PID 2248 wrote to memory of 3000 2248 iexplore.exe 28 PID 2248 wrote to memory of 3000 2248 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4e34588cc1cea574ffac41bd226a758f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540c3335c15435dd814756e9a9aafd23b
SHA1ceac1d4dd4411745cb8a96c861776d3197264129
SHA256d68feb6da7dff1ff1caa00a47ef64c2601f9e185bfa53825f8c40de0ee5e113c
SHA512a8893bd05f79ea5e214ea28ea57f12ddb37bfcf68b53ee52254be6476e0caf5cb8526d3072144bafa676673431e06fd21834bbb4c0e9cfa70496de3cc83903a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cb40e8318c58cc18c2b7792144d56c5
SHA1e85f7e688c00e3c5d8e33278ad9333cc1fc20caa
SHA2566b69fd4c9f2976fd4aa7f0d9c16e2b5221080372788676ee91fb13893f0882a1
SHA5121ec020602d21e8e03fd0ab3224fdb1dbb0fb0aa1787ea0c57c8cebd09712236c941743b85dc483613d072a8362002b73488d93ae1e901ee7f9387a69bfe91e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc43855d20a27da47343a94aeb96fd48
SHA1f8f924a11ab753c3eaad7d61348ab9d6509707e6
SHA2560e3715549ca5cd35b1bfa84758ca053a52797cb034aa510e27d603b3c5af8474
SHA512e864760cd062c93664eae729402861bd73bb0de750a0bdbc9013ed16770aaa3f3a184cceae3df76a89bff1851bfe0f75ca50cb3fdc39d2fd039ab5aa7008ec00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5305c91ff8dd19c9a1d4e1cbfc8c418e7
SHA1043bdf626acd03ab9d94462721dbd94e59cce5b3
SHA256fe532d88c474aff1c959ff6044a65b9bbea35f6f953d7470b74f8153b3a00f1c
SHA512259ce8e4a5324ff700ca3a03d61a78215edc76592c3ff7a0db31e33b673105599f1469bdef75738844c1334c1087634bc9a271183d56540f7a5141b817a2e8e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dcc307a2972d181088d3308e7567105
SHA1a7eb7f5d205a373102483f6e8d67997c793bb31e
SHA256209fc2881e05fac4ec5beebe6cfb39d0eba86812ad4f691f8f9289f10f200546
SHA51290e6fa6a269a3bf69aed1c0973cbaa7b73cca6928b24d81a96ae261b934e270e71c4c37cef1a83e2cf8489d0ab3662a624a52c69fc7f80be1a03ef80c114f289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a700de8bc509dca1d849e16eeda8bc9
SHA104a63d9a2942c60a613b261c4237f893915815b6
SHA2560d64fafdff7edfd473eb85c528130e37a9837596393940529215a7ef423c15fa
SHA512051b12b7adb82967e6cedc43f6e739488a237ea8e5cc2e5b76dceb408e61e8dd92569f385dbefafaff35f1906bbefa1615e9822c147adfce83e868165b59a415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5928a597002d4041764c15bebba4e72d8
SHA1adc27010daf730432de7ea168badfd5c0f880cfa
SHA2568fdf2485d55a2231f8e5b300a51ec397fc575033de8879a52fd35c865620827f
SHA5127a5c52558e42f6f38ed723282c1434e75688a75bad9d517cc99c88d49538409411e02589116af83239c96f38e81307f056b77702a67a94b3aa21293e98c2722d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c95d3a96fa2b6449798b3a8532867a4
SHA1e11f283b344e370f356e35ee4c04d8f584fa8176
SHA2568d03ab2e96dc6975be062faa2cddcde959223997417a6830d4367e95e6ac9681
SHA51249cb8b8a7dcc1626c701bc4541e5adeb124c606e623f7ab6719d02486d7f9d4fb49c69ec58f3a93d08ecaadae0b4f6380f169fbe6d045bf596d673c82c8cffa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5074a466d167e417607e5e3a89761f932
SHA1ee187954f04b78a9bb5aa37a1889b3b27495fb40
SHA25602f1486e99ee90ed60d00c908485f9a2379f91b1b5adacd53555811636248c12
SHA5122a131da10af490f9374b4b49c38039931461a38d808287d5258c49ccf8e2e17af03c19297b6a08ad6c7ef5b36e354d9c0c74580f66f9ff75bd93a454e7c755b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505614d08582a33b4c91dd486d6f10d0a
SHA1a8ef86c9640965fb83868e69dc40acd2fe5b1854
SHA256d85497f0c9da942aad09f29b1a2480e63f018ff8194c854d6814bd3bb002eebe
SHA51215cc92b2ef437ef608d3493bccd5bcf010291b0e0b5ffaa2d09c101e29f15a1cc5e090bda301f515dd4c2a1413515dbc17b03ef87fc485c97caf156389845ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bda34c7cde33331c1a9985e97b361473
SHA1560698bd0d99888545e2ea63dedd57b621c4482f
SHA25687ea1d36c346673d8a30eec9c398bd9162bc59b48f69df7d46142a3fddb6e1a4
SHA5128853713754a35be4b5799e8c75c2df8ced66f1ebafbbe4224fc3a548c3cb6e63aa5716e12bc04313444f452998a99b231475775af33bb97742a05898ca66078a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a9978cc4fb5f356e8fc5f48bd437ed4
SHA11507bfb74667193467b40566bee22e8ed0ab93f6
SHA256bea93a43549ad062efa506e49f664ab1852a5adc0c84337e40420c19f76808cb
SHA51295c287d34d6466218bfb628caab8a0704f19707dbed24d5efbaeb0d8f6b932c9df261e93f559f6789ffd3545aca1b1f6a66019de77becd38b7d2ee5d1babf783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da813150f2c15dea5951b35e726d830e
SHA126a9e8010af2877fca568b3fca4ad94a06db142b
SHA2566f4144d34f120d1af8ea745f406fec844e03374d879959c1852776a4b2876f0c
SHA512f9d7ac8358754a474b37365f63217b93ee8af602d132825c15615fd207f7e8b8874a4ab49e1d733f6479660abbf38a095cfb8d602af4a66ed75a236918a89291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dc613b5fb8fabe0f5dcf2801883ae1d
SHA1406eb99c9951e364cce642fcb307dec24793139b
SHA2561352ef4c46754a8b5143054723e8a109611690b426ec621252377a8a5f285710
SHA512399a460397ac5ba4f039cbdbf48cf0afa0878a05bb58d3ee958b705effebe9a08466c9893773a52df4f9672ae616857514c88076e62d147a19116000661ad576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5776011a5243e2830d48aeefdcb581ca7
SHA12a3732f1dd4a15c19e7dda2825b718ed45fb9b19
SHA256c55294d965c168490158c6365852e6f53d12dcac4b9bdc7456ab0ba8e713128b
SHA512fd9d2a521a303f5ac1b862b622e06550ba78420ca85025f6d14bee2a2dc25bf7322686a552d8c38a175f99eda84042d82c5467c9ac04ceef90dd2f6fcc7bd1dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e88592c90a4e99658aab9062a16e97a3
SHA1e5fcc8198addd4a57bb2b120fc476b8bd2e10630
SHA256cae6f4e66eb048b995c4b872e7b53309c0eb11221a729ed94ce44ac731415458
SHA51210473629dcb037bc36f7890115cecc3c53daf65a27f93bf484c962213e801c30cc45acc56673bacbf918932c776268d38a4bbd34309355c6205e7b876659feda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ed05db056367d05bf37774c7873f804
SHA16dd099f0c394cec7f685df46fb5e3fb48d775314
SHA2560cb4d276b302e7f4b7f2dcedcb6b71a1dc9d1c785b245e75c771ebc14010f575
SHA5121afbd49e2718b614346d8797880bb2df84f41c422692556e174c0eadeb2068cd36dff59006721a93576b65a588f4030ccb7da07cb540828ed8f21fcc7a5bca2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5506e9acef8928490495c61851f645a6d
SHA1b549dfd4a47d176091d1972587d5c5db50f73e8c
SHA25696637c66ec51fc76be2fd30dedf01ab54bb39d8c47734fd62a1c25c1a0b35fee
SHA5120ba7a0a23fc96898efa3ff02f1485da9c4d667c3de625d9dcd30cad3fead567a8132085edba65858e883d8697bb8cfc434d620c19041ba87474d779ce5bc37b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcbb155c311e80ea586a2e55978b927c
SHA1dafcd10afa56a7fd9594776f8c27da343132edee
SHA2567b9f9c12223546715b02e5971d4f1cfd1e5b4098ab0f1ab0313e1e871ad68a75
SHA5123609238e44065008e4cad2f1d08650e1d234cbd234e672dc1012d289b37f5fe847fe5e95d7a5318a65148e237fb1ab6bfc7ed75115035243a9c0be8bff72421c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595d11d88d53774172483df47c62bee6c
SHA19d860e839d86a367c7693add7d41f375895ea023
SHA2569e80263a54b1357985ee56222d447b528d06d9bc338ba708f3541003dabd450a
SHA51281af9b1ea2afd06d302748ce97b907cee33ee8f8cc686c8051ee7f1e51a6c841d2b88f72f5d775a1e8419af8b767580281224610c9a8a8e88ecb52fc04b6da21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cb6cb0b1692db45d3b47ea0711a1432
SHA13ff6a63931217f45141ff0422943216e0a102d6b
SHA256cce995c552095fa2a87184e7dff117a5b1afc83e4ab5d7ac01a548427ad97685
SHA512adaf10233ac42453b60b8afd8659ebeda60bbbcb031bae230fffda5a0dbacd35cdfb537f689ad15f2b4eaeb23f9c5b312f6a0d7c0ee4536ca39abbe79b76ab86
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a