Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
26/02/2025, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_27dc34502ddd2b8fc2a33592154f4a54.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_27dc34502ddd2b8fc2a33592154f4a54.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_27dc34502ddd2b8fc2a33592154f4a54.exe
-
Size
714KB
-
MD5
27dc34502ddd2b8fc2a33592154f4a54
-
SHA1
08b89cd4607dd9c3832c9678fa8f5ab50b089dbd
-
SHA256
902dd6c3f7d699ae5fe651e9e5889ca2574bfc765f559ced1eb44553dfb92d44
-
SHA512
5bf3fc950a3ec3baabb636c92be09cf42e760fb32b1d501bba46eadc32f3fe171d3fc914f32db4e72bc703efea0cc4068fb9227d03f658b39abf8a4669b19c56
-
SSDEEP
12288:lwaGGmMtAONTKIKv3kYpDm2gh+EAck42ueKb1wGOyTx7yXH49N4rcWLqB:2aGGmifKBkYBm2Ek42BK4OzN4rcWg
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 12 IoCs
resource yara_rule behavioral2/memory/3348-54-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/3348-61-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/3348-62-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/3348-64-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/3348-65-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/3348-66-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/3348-68-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/3348-69-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/3348-70-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/3348-72-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/3348-73-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/3348-74-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Microsoft\dllhost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\dllhost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\dllhost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\dllhost.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation JaffaCakes118_27dc34502ddd2b8fc2a33592154f4a54.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation dllhost.exe -
Executes dropped EXE 4 IoCs
pid Process 3132 MeTube.exe 2424 dllhost.exe 2028 dllhost.exe 3348 dllhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dynamic Link Library Host Application = "C:\\Users\\Admin\\AppData\\Roaming\\dllhost.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2028 set thread context of 3348 2028 dllhost.exe 98 -
resource yara_rule behavioral2/memory/3348-50-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/3348-53-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/3348-54-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/3348-61-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/3348-62-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/3348-64-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/3348-65-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/3348-66-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/3348-68-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/3348-69-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/3348-70-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/3348-72-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/3348-73-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/3348-74-0x0000000000400000-0x0000000000471000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeTube.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_27dc34502ddd2b8fc2a33592154f4a54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 4572 reg.exe 4988 reg.exe 3764 reg.exe 2856 reg.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 3348 dllhost.exe Token: SeCreateTokenPrivilege 3348 dllhost.exe Token: SeAssignPrimaryTokenPrivilege 3348 dllhost.exe Token: SeLockMemoryPrivilege 3348 dllhost.exe Token: SeIncreaseQuotaPrivilege 3348 dllhost.exe Token: SeMachineAccountPrivilege 3348 dllhost.exe Token: SeTcbPrivilege 3348 dllhost.exe Token: SeSecurityPrivilege 3348 dllhost.exe Token: SeTakeOwnershipPrivilege 3348 dllhost.exe Token: SeLoadDriverPrivilege 3348 dllhost.exe Token: SeSystemProfilePrivilege 3348 dllhost.exe Token: SeSystemtimePrivilege 3348 dllhost.exe Token: SeProfSingleProcessPrivilege 3348 dllhost.exe Token: SeIncBasePriorityPrivilege 3348 dllhost.exe Token: SeCreatePagefilePrivilege 3348 dllhost.exe Token: SeCreatePermanentPrivilege 3348 dllhost.exe Token: SeBackupPrivilege 3348 dllhost.exe Token: SeRestorePrivilege 3348 dllhost.exe Token: SeShutdownPrivilege 3348 dllhost.exe Token: SeDebugPrivilege 3348 dllhost.exe Token: SeAuditPrivilege 3348 dllhost.exe Token: SeSystemEnvironmentPrivilege 3348 dllhost.exe Token: SeChangeNotifyPrivilege 3348 dllhost.exe Token: SeRemoteShutdownPrivilege 3348 dllhost.exe Token: SeUndockPrivilege 3348 dllhost.exe Token: SeSyncAgentPrivilege 3348 dllhost.exe Token: SeEnableDelegationPrivilege 3348 dllhost.exe Token: SeManageVolumePrivilege 3348 dllhost.exe Token: SeImpersonatePrivilege 3348 dllhost.exe Token: SeCreateGlobalPrivilege 3348 dllhost.exe Token: 31 3348 dllhost.exe Token: 32 3348 dllhost.exe Token: 33 3348 dllhost.exe Token: 34 3348 dllhost.exe Token: 35 3348 dllhost.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2424 dllhost.exe 2028 dllhost.exe 3348 dllhost.exe 3348 dllhost.exe 3348 dllhost.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 464 wrote to memory of 3132 464 JaffaCakes118_27dc34502ddd2b8fc2a33592154f4a54.exe 88 PID 464 wrote to memory of 3132 464 JaffaCakes118_27dc34502ddd2b8fc2a33592154f4a54.exe 88 PID 464 wrote to memory of 3132 464 JaffaCakes118_27dc34502ddd2b8fc2a33592154f4a54.exe 88 PID 464 wrote to memory of 2424 464 JaffaCakes118_27dc34502ddd2b8fc2a33592154f4a54.exe 89 PID 464 wrote to memory of 2424 464 JaffaCakes118_27dc34502ddd2b8fc2a33592154f4a54.exe 89 PID 464 wrote to memory of 2424 464 JaffaCakes118_27dc34502ddd2b8fc2a33592154f4a54.exe 89 PID 2424 wrote to memory of 2708 2424 dllhost.exe 92 PID 2424 wrote to memory of 2708 2424 dllhost.exe 92 PID 2424 wrote to memory of 2708 2424 dllhost.exe 92 PID 2708 wrote to memory of 2252 2708 cmd.exe 95 PID 2708 wrote to memory of 2252 2708 cmd.exe 95 PID 2708 wrote to memory of 2252 2708 cmd.exe 95 PID 2424 wrote to memory of 2028 2424 dllhost.exe 96 PID 2424 wrote to memory of 2028 2424 dllhost.exe 96 PID 2424 wrote to memory of 2028 2424 dllhost.exe 96 PID 2028 wrote to memory of 3348 2028 dllhost.exe 98 PID 2028 wrote to memory of 3348 2028 dllhost.exe 98 PID 2028 wrote to memory of 3348 2028 dllhost.exe 98 PID 2028 wrote to memory of 3348 2028 dllhost.exe 98 PID 2028 wrote to memory of 3348 2028 dllhost.exe 98 PID 2028 wrote to memory of 3348 2028 dllhost.exe 98 PID 2028 wrote to memory of 3348 2028 dllhost.exe 98 PID 2028 wrote to memory of 3348 2028 dllhost.exe 98 PID 3348 wrote to memory of 4440 3348 dllhost.exe 99 PID 3348 wrote to memory of 4440 3348 dllhost.exe 99 PID 3348 wrote to memory of 4440 3348 dllhost.exe 99 PID 3348 wrote to memory of 4752 3348 dllhost.exe 100 PID 3348 wrote to memory of 4752 3348 dllhost.exe 100 PID 3348 wrote to memory of 4752 3348 dllhost.exe 100 PID 3348 wrote to memory of 3188 3348 dllhost.exe 101 PID 3348 wrote to memory of 3188 3348 dllhost.exe 101 PID 3348 wrote to memory of 3188 3348 dllhost.exe 101 PID 3348 wrote to memory of 1700 3348 dllhost.exe 103 PID 3348 wrote to memory of 1700 3348 dllhost.exe 103 PID 3348 wrote to memory of 1700 3348 dllhost.exe 103 PID 4440 wrote to memory of 4572 4440 cmd.exe 107 PID 4440 wrote to memory of 4572 4440 cmd.exe 107 PID 4440 wrote to memory of 4572 4440 cmd.exe 107 PID 1700 wrote to memory of 3764 1700 cmd.exe 108 PID 1700 wrote to memory of 3764 1700 cmd.exe 108 PID 1700 wrote to memory of 3764 1700 cmd.exe 108 PID 3188 wrote to memory of 4988 3188 cmd.exe 109 PID 3188 wrote to memory of 4988 3188 cmd.exe 109 PID 3188 wrote to memory of 4988 3188 cmd.exe 109 PID 4752 wrote to memory of 2856 4752 cmd.exe 110 PID 4752 wrote to memory of 2856 4752 cmd.exe 110 PID 4752 wrote to memory of 2856 4752 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_27dc34502ddd2b8fc2a33592154f4a54.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_27dc34502ddd2b8fc2a33592154f4a54.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\MeTube.exe"C:\Users\Admin\AppData\Local\Temp\MeTube.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3132
-
-
C:\Users\Admin\AppData\Local\Temp\dllhost.exe"C:\Users\Admin\AppData\Local\Temp\dllhost.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240685078.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Dynamic Link Library Host Application" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\dllhost.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2252
-
-
-
C:\Users\Admin\AppData\Roaming\dllhost.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Roaming\dllhost.exeC:\Users\Admin\AppData\Roaming\dllhost.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4572
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\dllhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\dllhost.exe:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\dllhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\dllhost.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2856
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4988
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Microsoft\dllhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\dllhost.exe:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Microsoft\dllhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\dllhost.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3764
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164B
MD5b9704bf428b27bd87e5ae473a01b74c5
SHA17c866d6ab4b427e3a98a02c393bcece54330948f
SHA25688cc264bb711f3b783e5a77e907470ac068806a6e8b893a3ed1191bd32a45ba6
SHA512b7eba47bef65b06d09fcfb7bf9a6a0b7080b2e231edd9b45ad2ace29aafeeae2129f488a01ac140ea1434788fdd804a316b69bfa45a575fa10748a4ea98418a8
-
Filesize
832KB
MD5b0950b5dfa21732d042c41c539f00e95
SHA10a16d588b930380d03b8d04df1047430c6b5e589
SHA256b95db549a97977f4ef413d5ce66e25e12328bd8cb807400eaefa3619b32a1f8d
SHA512b5d2b2edb41604cddd7001fba16d75801dffa0bda63cbf6fe7ca0ed28355637d6facec372dfbea2b8b929d8417f034896d332bc1ee6ac8e6e7630584c150e166
-
Filesize
260KB
MD5ebd4d45d8e851f771e036dd04e7d7fba
SHA10c3ab59a6cae1a5a69f87dcd545a72ed81446bee
SHA256dc70917774ea5f98d9f8ee7b8a7e5d4a62827ff042f9c656d68cc8d71fbd1128
SHA512861820282abc758f7f7fb599bdddf8f97ae0c9f211f4b978c9e607f66862f89e17b75b36ec806a54cdbca7c3cd72801d5283d6f17d0209808745f0164b7b0176
-
Filesize
260KB
MD5a805b839564f87cf4df5bb412bdddf33
SHA1897aaaefce07e64c4178b792b941b6578c8d5a7d
SHA2567cc48825f8bce1350b1f10f231c921234d2ecfdf917fd65b8de60742665df004
SHA51228a64177af601f7d7bc56952ccc91733115adc4ba2a9a9884a73281652a02f41c400a736dc91af8236581fcc96ba7432ce96ce4965b964e9b4ad3da984647309