Overview
overview
1Static
static
1OEBPS/00_M...A.html
windows7-x64
1OEBPS/00_M...A.html
windows10-2004-x64
1OEBPS/01_A...S.html
windows7-x64
1OEBPS/01_A...S.html
windows10-2004-x64
1OEBPS/03_M...A.html
windows7-x64
1OEBPS/03_M...A.html
windows10-2004-x64
1OEBPS/04_M...A.html
windows7-x64
1OEBPS/04_M...A.html
windows10-2004-x64
1OEBPS/05_f...1.html
windows7-x64
1OEBPS/05_f...1.html
windows10-2004-x64
1OEBPS/05_f...0.html
windows7-x64
1OEBPS/05_f...0.html
windows10-2004-x64
1OEBPS/05_f...1.html
windows7-x64
1OEBPS/05_f...1.html
windows10-2004-x64
1OEBPS/05_f...3.html
windows7-x64
1OEBPS/05_f...3.html
windows10-2004-x64
1OEBPS/05_f...4.html
windows7-x64
1OEBPS/05_f...4.html
windows10-2004-x64
1OEBPS/05_f...5.html
windows7-x64
1OEBPS/05_f...5.html
windows10-2004-x64
1OEBPS/05_f...6.html
windows7-x64
1OEBPS/05_f...6.html
windows10-2004-x64
1OEBPS/05_f...8.html
windows7-x64
1OEBPS/05_f...8.html
windows10-2004-x64
1OEBPS/05_f...9.html
windows7-x64
1OEBPS/05_f...9.html
windows10-2004-x64
1OEBPS/05_f...0.html
windows7-x64
1OEBPS/05_f...0.html
windows10-2004-x64
1OEBPS/05_f...1.html
windows7-x64
1OEBPS/05_f...1.html
windows10-2004-x64
1OEBPS/05_f...2.html
windows7-x64
1OEBPS/05_f...2.html
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-04-2024 10:01
Static task
static1
Behavioral task
behavioral1
Sample
OEBPS/00_MAQ_CUBIERTA.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
OEBPS/00_MAQ_CUBIERTA.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
OEBPS/01_A_PORT_XERAIS.html
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
OEBPS/01_A_PORT_XERAIS.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
OEBPS/03_MAQ_DEDICATORIA.html
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
OEBPS/03_MAQ_DEDICATORIA.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
OEBPS/04_MAQ_LEMA.html
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
OEBPS/04_MAQ_LEMA.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
OEBPS/05_furia00-1.html
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
OEBPS/05_furia00-1.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
OEBPS/05_furia00-10.html
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
OEBPS/05_furia00-10.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
OEBPS/05_furia00-11.html
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
OEBPS/05_furia00-11.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
OEBPS/05_furia00-13.html
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
OEBPS/05_furia00-13.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
OEBPS/05_furia00-14.html
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
OEBPS/05_furia00-14.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
OEBPS/05_furia00-15.html
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
OEBPS/05_furia00-15.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
OEBPS/05_furia00-16.html
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
OEBPS/05_furia00-16.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
OEBPS/05_furia00-18.html
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
OEBPS/05_furia00-18.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
OEBPS/05_furia00-19.html
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
OEBPS/05_furia00-19.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
OEBPS/05_furia00-20.html
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
OEBPS/05_furia00-20.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
OEBPS/05_furia00-21.html
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
OEBPS/05_furia00-21.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
OEBPS/05_furia00-22.html
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
OEBPS/05_furia00-22.html
Resource
win10v2004-20240412-en
General
-
Target
OEBPS/05_furia00-1.html
-
Size
2KB
-
MD5
df2b4091caad5d1a67b19c77640abc77
-
SHA1
d020b57cb0b1ca784d9374710560dd76c3ed46c2
-
SHA256
2271aa5923403c75e8ccfd8994151c73bdb90cafa8ad8a127a168f0ee83542cc
-
SHA512
28be558e5ac579efdad5da0a3ca6726ab53f87d3bf7bf32b90b5f4782e6b0fbca6169675cbc9ef4784ebfa40fc23106f48cd3a77486092c432dbd4d40efafa55
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420287561" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3D81A31-03B3-11EF-B85E-52C7B7C5B073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000feaeff33797f0df6745ab3e2ac0410a1d5be0490bfec1b8931ad9525a9690fd6000000000e8000000002000020000000221927726cf863069bfa1c853b2f3c18d9dd8c7f0fa3335d9c895913090a204d90000000ce6ccdcb30983a20acd760da8e1c53d57b72b6d97a1f6e75503a71078f34039b3968b07adf132b996acbb72d0190d0622590b7a516e239b9e7e04a6f5827540ce4ac22e282dbd16248d52ca65515899b329534e70ce4922ef77a0927f7abfdf926232dde21c1b275d9cbeaafcd60cabb9d7376e616efc0d5e1264baf94458d7bd5fb56ea0788ec6b14e2ca8c1672184c40000000cf2ceded89c153a7b25b13612b8d6f235b161b4e959811126af7916d0f49d23841629efac02215e6bca8afdf9268d05d8efe4f79b228e8bccfb7e34bb451a8af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000338aafa154349004db7f86f6877a49f403f15983ad2d0b8a9edbd63f87bf39c4000000000e8000000002000020000000d9340acc6119a167981b7f4623f71c8060ae0977c22d7e059d4babcebe9e750f200000002dfc9cfb5c5d3748c3f387ba77b75c18711ddaef9e359d15f228c2645fdea8c840000000d9c48cf00e4e0f0e72d04d0282b8b641d44d26fd1138b80b3a173025078e93fcf6383bb05c22cf4115e08c6f2dbffc85534d8f508b35264a419cb10aa7cd53ab iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e869c8c097da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1164 iexplore.exe 1164 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1164 wrote to memory of 2148 1164 iexplore.exe 28 PID 1164 wrote to memory of 2148 1164 iexplore.exe 28 PID 1164 wrote to memory of 2148 1164 iexplore.exe 28 PID 1164 wrote to memory of 2148 1164 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\OEBPS\05_furia00-1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1164 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9936e7408d85bc278cc99a67f6aff86
SHA127cd234223bf3797697602037dbbde1711a053c7
SHA25697137ddbff798b8077abd57db910cc2d21590ef7c5e2c7bdf8ba06ca7e28b769
SHA5123ee65b3e6336ec9ea9a73f7e77d80bf32e2f824dbc94816c8d2c1249bf5f4dff81c2d9e22aa575182f0b2e1831d9b22876a6557e48bcc688f362af5ee611b5d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e9feb01146545253e2f3dec6733cb87
SHA175a74a4bfd15de5e382ecf244a67e4c504d16254
SHA256a9ef3325d848e2bcc09fb0c5f3506906a97a7b76f129776926c406bc6934384b
SHA5125699248e83fd575aa5823de4435bebe6511520c7d852e7c38a7fc9354d786fad92072f7af217ffdc22f87cf6009db99eaa1fe8642827bffe17cac797ff3a180d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a5750b038e6ec7f58840cded5c08cab
SHA1fbe37bac2b2e00700eb9819f467b13f28f027c3d
SHA256998aaac85b05ec024952b6d71fc8fcc76d919d3090209d2f7ad7029740bec8e0
SHA51237fca8a2f6621a5f586bc9f4a0192f61ad762ddafffa989a360da0280f9bf9f4b1e0ed9a1651c3c2aa53f2f132388214127b820316ff1a0794ab89ee9c8ebea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5008d00d4fe1c006c6be7e113dddb12ae
SHA1e8f7e45a1c7f20220df21d11c8cf768289bc06a3
SHA2561c24163815e088f766533b80f0e8af4db6a857c03a78a1f9f81ca84a4f24c776
SHA512b8d0f814c9158c51bfb47d1e571cb574389e07b6b73781ef5da0a0fe3b3c9105473ccbe13909db3130fa7bfc40acba5b5d98bcd4084d3e03a3dafb1f05879578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7a401995df7034d18359c3f14bc7a85
SHA187f934fa9f8cfbfdd1d8747a183a025d0062a5ce
SHA25601a0ff5017f7e484dadbfe5b7de2177bec2b50fbe4d8d76a2927bb8e75f7ad1c
SHA5122230f82844c1cb99e09398dca95a9deda4528b686aa5e7fd197dac701d0b8a7eebb5a2499ad4f52decb83e51e5450479a43ac16b9966b719b8540461014e7965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffd858dc2aedf7e185401c7427d4e5b4
SHA112701ad22dc249c0675dc8a2213ed555a6169c8f
SHA25615c68d2170cb84a5637fe072d5bbc00e9b4d4d7358d9c7aa1679f0a57ca6a9d7
SHA512a1a24f7da5bfc41f6ad925f5b8d06882d1c5a6e1d9e5b94d8906be4173cd1ad718cbf701b3ab5262fb1f3341fc211440a2958f2cede3ada7715d24d3a2ccee49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dbd073179a22a6b00f3ddb073482b64
SHA18292322d511fce9d342fc74e18c4e25da63e644d
SHA256b8676afacf2a2b51258adf6105b835f4860af07c18dc9f0fda5593b35531d1ae
SHA512c63bb3d3c6e6119816a85c959d7ad47445312909ed3cdd6e6989a9b17b232c01fed4f3f43dac3db5fa3d93e8dd92431586ae6b29875df4cd59904cd7aceb688b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5422fdd8f40751e590f311272529d2da0
SHA1db71bfebdda3d0064db361558d32ec284f23ae23
SHA2569126831f3ef66582e4f12c920400881f124824247be5af1c4209f56f26130535
SHA5128d6fd20b1eba897b61efd3e932d2585977292b90cdb44650e2d5e80222a65981bc7daf8e4c3b3321df686bf241c01d76f8e0ff6f1d2d180aaf974fb1dc5f2af8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd67fcbacb2d81f035eb40d406e449ab
SHA12ecb93d42cd250ac6bfc061536a8c62eca041323
SHA256a6c50d96caa1eeeaee41e05290c5da733fd90d349fc604c7416efda889d40690
SHA5129f8cd55a733a1a9f9e24d97525bec1b256b00ffb07664b19bcd638b58d8ade9a02294126f30c3333fedac2b7a4d162c8aa1bb26a7357bad28f2dd894b7421fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bfa554e9845dfcd589b5b5b14cf1f7c
SHA1e49cb8252d005f001fd3693e81026488359b04c3
SHA256e9cd0d589f3074084c5d5dbdad1e008db6d25173ccba41fc79777b581a89a0b5
SHA5122ca45c85b4d166f2a5eea8f6517ac63fdae33ffaa331d3cbd74cac0337fefe2952054e18decdddee6f5944905f8d25ca64798b9583cd03907af689341fb9fd7a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a