Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 06:44
Static task
static1
Behavioral task
behavioral1
Sample
71288374cb7379a64d0f57a4707936d2_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
71288374cb7379a64d0f57a4707936d2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
71288374cb7379a64d0f57a4707936d2_JaffaCakes118.html
-
Size
460KB
-
MD5
71288374cb7379a64d0f57a4707936d2
-
SHA1
f3a533edfaff21b14b49f7a7567629ace5d81da2
-
SHA256
1511d902184107616f5e3f65a6715cc3db71357c4246fc00063fafeb0fbd2c5f
-
SHA512
355f7ac15864fb34066fb481a90615798799997f8b134328e27314c1d61046d16713a79dcfe097d28fe4f2c474eab28131bee6d19ac9b1a737d4bd7cce429a3b
-
SSDEEP
6144:SYsMYod+X3oI+YlsMYod+X3oI+Y9sMYod+X3oI+YLsMYod+X3oI+YQ:55d+X3j5d+X335d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F449661-1A62-11EF-8A5C-CE787CD1CA6F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 306347086faeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ec8b4a7a19e63545b5d0558588a28225000000000200000000001066000000010000200000008255b280a07311dfdfc4ab30ed7f16f1ae482306706f6857bab173b7cae77699000000000e80000000020000200000008598746a23e5b63339b7583de8ea6fa65dfa50ba377e963530bc736fa4d3849b20000000750e9b57b76296202a96be0fb2ea2c6ee97f63417968d5b28468b5d0bab1202040000000494c73ec0e2219a28231eb16292356299722129bea4a1f082c425d2150bde375d5ebc2dda122e8033569c6adf157014fc2708329a346024fb201562524212002 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422781315" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2508 2080 iexplore.exe 28 PID 2080 wrote to memory of 2508 2080 iexplore.exe 28 PID 2080 wrote to memory of 2508 2080 iexplore.exe 28 PID 2080 wrote to memory of 2508 2080 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71288374cb7379a64d0f57a4707936d2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5babfd2b3a11080293cce495c4e321b82
SHA1f6f6b5e9e9debcf5351ac94d5ea17156749c88fb
SHA256a33997e071f8e948c06b510c61c3442bc835401d59a9d2bcfa848e62abf5c5cd
SHA5127fff9b395bd6f7bd93324138fe0d9c802a4b9faa462509ae3ed003bafb791dca0f4e680ccb4e2c2cf418403120be307bfbce5beb6ea9ce0f64f7c78fc0f58d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5763f6f0ab3ed376da1101889d172f5e6
SHA1e13ad4005a966d25bff43b5f2dca8d8529584501
SHA25617d256920d16a7b7dbc55ff56d2652a85da859f71d97544e298ee86c47e0ae41
SHA512bc1e73c26c08f79e809242f1cf8de6417832c2b4f3cdfd91eeed7180216cddd60160f650b2db4eaeb4f286e4a76a3b88d1ff6cd193d7a370642dbee99e9937b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bf283165506524e88b465480586232e
SHA1bb640a371034dc65ba59cffd5f33247cdff8fabf
SHA25685d94c8384149c87f47b2b65e0763b7eb7cabd887d145af518ec6a8cc1db1b01
SHA512104f6e996f55de4ffe9f9a0f8ef2ab4a846577dee32ae02ce200997c07f6e3bb1511334468e7f1c1433796c355c88e8a6ba9b1e9e68be38c26783de66a4da469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c52163779324cd88d3378a7d68817b99
SHA10e25f01ef9e1dd4a71ab86181e1755271bec877d
SHA2564ed6c6c64dd0ef542deb3b6cd46e0c369fd64bc98f85239b0a4d2a40f7fc5887
SHA5125b5d80e6cc9e4f79279cbfa3ac849a69df40b3ca262f8d745bd3767c3434745369450f0440057a8bcfeb3e1353d6ecebd78abf6a2aaad2c41d4222bb3be3079d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558c96a32f3c13f8e05b6ac3796f73ac1
SHA15ab0d110455b17f94d9f0c2e26d4d92b5107e683
SHA256e8c11218d635c2d6778e07391ac2904606418bc7cb00e12fc500390185dff0b9
SHA5125b93a7f5bea5ac33a98a2912fc85aaa65f308d225852fc49ebef37fbcfebf0ee0a22dfce703674a6925a7d8dd80e20f0cce2db674adcbe7e7b8742d155556277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5092a2274925c2efc19fd439eb60773ff
SHA1c934877e2191c9276eb6c06557f6e6ac4af7a8a3
SHA256abdaae0af56084aaa713fafb8d95871ca000f0f5164c3427d55ab0add9c32180
SHA512f7adef89c4521cb9ed556126157dfec22395ae3e517dd471ed8c35c987f27d09cd9ffb691ec87d3065f7a146894acc2a8a375e8b3800d3f3633a25593310e2c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c1b433acc9ade8124113851998b178a
SHA130404a528c5f797e707d26cb6880b0767e614f56
SHA256e16b1f7596eaf196c5b4b4897c5bfed910e521f3b4d8204692617b4fa6de6011
SHA512493e0bd1ee10e9c77554435d30fa70d6b3210f97edd40f45ce95e8f28a63b93e553855ad65ad582472d035bff9e08514f635b385ddf48e9a89e891fbe4db9057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56449b0e916bc4199357c44ab75dda59a
SHA1e42ee6e5d3161b24eee6267ea858cc8bace7b40c
SHA25655268512d17dc0b23b4d64db9bae12c281f907c8d5f90eb97d580f36596cb6d1
SHA5125d6ff4f1ce5b1bb3cbee174d1b31498abac06dbdd5ff6fc1d0c178472bb8539257070fb698b5589a791d36aeaad7d7603d28e431a33680643fa6091bcb49b9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5effe53ab07d9dbc9a220c7ad05c1c1f6
SHA15f86a1369aa7945ef209c5f7423e78a3fa1897c0
SHA25683e15d075a922b99998a6dc7ec2bd7012e550c9e93800f2061d2b1afda7f63d4
SHA512bd2d66c1c5fa2cfe1484aecb2b828dbedf12295922b9863de5624dd5cd98fff6c9ef7fb2a0098452cbd33c2788862512ced067617518e59ffc79faa69bd80e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595d67fcd735a07f7347968a8903b25ca
SHA13ec9906151f3bec72b73b62b2cc61dffd0692af8
SHA2561c3841ee9a4a64635f6d4130d81826bf4318fbb6072c75223427cf449659e895
SHA5129bf55955c285ea9c8c3f41c36518cf9665d854c36772b5ecca8bbd27891c45744e30e9d3aa33a9a8fdd4d69c9aa07caa43c6cf09696a675d4c53c52523a40b85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516c2a15a016e723b6cd3233c6ac1f505
SHA1aec08bb23f5b6a0f02686f464c87a027fcb2fe80
SHA2562501a0ce4253206ea0931017fc70e40ce031c9c0c534f76cc73a485bf6ed62b8
SHA5129a8c27846650d5503ef71a9d9dc3e977af8a099579b321211237686b980cd15555a83bbcdc34e000de66df58f31728615bc8f2738d29c76956ebcbe7e94b690e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb0e32fd337485683cf61f56b4028f77
SHA19443c21d81ddec246987913c70769ecbbe7490b6
SHA2566cc5639a68dc6e1dea541f1ab34e32623ea2c2a3f07afeb9efe34e8bfb774af9
SHA512a23eef2fae3d33d5e73b626574a5f7462ef11d1bc94608103b48b68a2ae9542e54ce3cac5973bdcf45a36e7c321da087c8cace3be9498d39a3fcd2b82d8d5ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbf3f3e3bc92004763b30a518b863025
SHA14dda86a592846033ab58c74a171840fb9e699b1c
SHA256131c8be4853307621937da134a2510d36947922bbfbfb731f76b991afb1b2013
SHA512993101a8a13a9abb1a0c5486f10ec7f8d597172d2f42265454c4ef6909a978f9540f4400f2557de626fee14364170d42ade1686ac7f5083c22c26945680a4c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5512d2f63e2ed2cf10e6e778d4e3fda52
SHA1d9734824f9efa29b4e166dbc0dcb1aebb238d822
SHA2562ebf610e205a7c38177ffd29ffdbc63b429fe1a20b64e16425e142f7230b9495
SHA5126f951d423488cc446f2799bedf6c6493a9217f8d6ed2277c0c1fe54d55b61e6892df9eebaabf3c2fd7becabd8c10a49826309c625f1f55ce055496be4c20f3bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59928e5c4543513c8cc70ba3be6bbe243
SHA155dfe753c7ad16bd615106594933ba1b7e3fa6f8
SHA256fcbc50746b5a44dd1abb59ed03202eb8d6690f2eb0524b636aafb535c80cd230
SHA5127370754dab837fbe4b9a9708bfb803fc38fba97c5d21fe8237861917211a840845d08d97bcd169e43159b09da514975c8915f5f1b6fa668ad874960fc051219b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be10e821dd3115a143cb41d4c479acc9
SHA1ba03d252a7303f6b330d499954ba7125bce40b44
SHA2562c0492751e0f95bb7b4ce59a621f7e4664fcd189b906856e0fd32a1ae078d3e9
SHA512d96005a88bf9232a6b1d4e58e35eba80cf38cc9e7c3811ed479a55dea8716d882d868e12e5fa7d6b422011b9cbd9ea8a286923cfe86ee03268569c35dec86009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da6d174354806827899b798f6906c236
SHA14790bee924a6eea4f4fae561ccd9d96861982988
SHA2568462c5201d552052f812d31556597991a40ad95abfc70558ed42ddd393ab9d9a
SHA5121748ff6daf05ccafe5f75ce36a3799c114c6231e7ba13784b01032089dffc03fa42dff1d8f8d211db418a8b2cc1ece6034c0930d3a50e07dacf356903442df52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58759277d58ee9c30a89c31c0e98201f3
SHA184857036059573f5ea816a567e8a6c58d788f6f0
SHA256a635bdb48a7e01bf374d616678a19a45e45954ddaa09e0916a341b71e8b84bba
SHA512a9aa6fae69463755b2625449ad27dc4866bc1317476f3c4356df3109a88933bb58d48fdd09901ba3749a0df6ba3e1a821799e98804dbf4ae2bb1f45b390e1398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568389f528be6d74faa2d07ed7486bfbf
SHA13b259a68d4f1a26e14b80707417fa7d2b5774948
SHA256614ac356a2ecf88ae7123be262e4c952b6473c558e77b7a465db9455ecd17166
SHA5120497043a6f36f0b9c4fa77eac427f5da73c62af22f9e7d617842898b66936cc17186c95cfce2095fbbb7e742c189f1903db6fdce5edfa0e5a8a775eee4c1a505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d15c689be6068b14cff991189daa82e
SHA16d11607556e15d9ebbf5181bf9de180909f43bbd
SHA25683abfeb0a4b563d43489243e41e1f6ad60a9fa3baa6aa0112be244ec550f5150
SHA5124bdd6282da84718bd946d28c420802d90c876acfe983edf5e471bea4db8852e1affd448b1ea452e22ab1eea734b3fa89feb5d2a2b3992164c4ee0b3e18c1af41
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a