Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 08:14
Static task
static1
Behavioral task
behavioral1
Sample
02ce5ad4c832c27ee25065ca982ced1e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02ce5ad4c832c27ee25065ca982ced1e_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
02ce5ad4c832c27ee25065ca982ced1e_JaffaCakes118.html
-
Size
41KB
-
MD5
02ce5ad4c832c27ee25065ca982ced1e
-
SHA1
3e8509ab4db86aecad64b9ba68522c11e2f062a7
-
SHA256
66674bb3e3be377bf33aef1fbee14acc149d117bbfa1381ca8f9580cd0555b4b
-
SHA512
0e9080e739af48945327a1e7c1862a84b2b326577c8b89cc5b080043b9090795e3af808657a309992e69421313eadcbab7143d0e9602938ebb7da89a3c3c53eb
-
SSDEEP
768:tV6Zc02zA5AUh0hPaAy0intAn0zIcYAM0z9MAi0jZSAn0BzJAX0/eTA80sBTAs09:toZc0nyu0hPfy0inmn0zIc1M0z9Ji0jQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b021370c7b98da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000bbd4f29a1335ff2f70deddc1f705414b76365f507d30b5b32eff6a6dacfa5f59000000000e80000000020000200000005a7b20998e76eb591efe9b54a276c0946d728e5313e51861a114a0f4bdaa4ff590000000fe8ef2e7c756ebefdf76b1d58a6fa2301ae75a157f59fc8614c74e4cc9b7a671778e4f8cc65242d03a85b201959b2e06cb0a383e68c00688a7d3f2d1b5f32cb7096fdf8d80b4a109e4d21ea100d35c67b2fd70cbb0557cc98fe225cf602d71549f48908db76b9bce8e18a592207d05b7ee16412c91da26a36916f03a9895857b2ad74f450ef15f41b055ad24cff86e8140000000d9c9168d7496f58d1e205ebe0b733cb40743f947f73f973c110ae16aecd553d10a7559a5a66dea8906e48c55bffd56a6f3c8107776a909d2c3622e2335a76e25 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34F48341-046E-11EF-922B-6E6327E9C5D7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420367553" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000b7dd640bcebb666943573c5c3e1a2ff3b2679f47f75f98a9b9e787670839567f000000000e800000000200002000000096ae5c8865e7e8f64a62fa9dc0573ad35b069bf857e79b793ad84f7dfe22d88020000000e6a1b761ab81e453fb7c9ab8f657c4ac168ac18aef02f0332aebba760c23f584400000009ad9b47d85734d8ab778dae2e286dc08d61bf2a41e82581829be7dbf8aac175f5a197f0f4a0d6f8a400910c467283d2533bfdaf2ef32406e74dea19c40b1e9be iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2272 2400 iexplore.exe 28 PID 2400 wrote to memory of 2272 2400 iexplore.exe 28 PID 2400 wrote to memory of 2272 2400 iexplore.exe 28 PID 2400 wrote to memory of 2272 2400 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02ce5ad4c832c27ee25065ca982ced1e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd795dda3b570928d02c5e9752907354
SHA1eb8ebce09dcd7806d9dacf6c36c9f8de924b5fbc
SHA25622f593da5ce4bbef0e4da7817359a57ceec3d2a46ac9a87c1d955a094069f210
SHA512065275f508026db7468316b68335fd5dc6f14b3841899989b631cc3e154f58548b848f3958a8b8bc0de2890bee1b3eaf9feb6b162b2cc59b80fb5cc5b3c25aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3ac737ca0f311bfe469f4434699b713
SHA1f80286396cc278cd3b7111e0c64a5183cf0591b5
SHA2561fbd59a40ae203949c7faef324025a978a4212deb1af4c550354a036301a6ae7
SHA512b5522c943b2bf36793bd369d2af0f1844892e7046e817481f0566d9f3fcfe9be32cc4fbba0a1b6cbfdab50693d95023110c738ef161bcd2831f2d9c108e161c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528a37eff2a7de8d7c67eaeb3fd407959
SHA17d38d87efcf6e0ea11e9215c0a4a8d269e0abbd1
SHA2563b48c4064ee36ee0288507046cc1721b471d8a5f9b660ae5f1072806853f20d4
SHA512cd2ad23742cc4667db18f11562a045b8ddec41517187831d5c774d92b118012be365d06d076f9fa2528a068da386d9f3e22197ad490011ba94b2e167a4f1d1ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af3d8849db9020b54f84caf5ce98dae6
SHA1bcca44b552d1a3421a1f17d4a28eb534b5c58708
SHA2561f7c80a1cc48b1a15da748e51e5c8171db221c2c12fe1d15c3576551910c92e6
SHA512b5a09ab331e928f23065d64e178bea26d7f5355a8caef0f9334f62c6a5d45bfbaa38e041eda0c8a1b2d1699e54f6b9b64353dcc19638a86c85b34c0d92763da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5d6727197c19a6c3676231878c041c2
SHA1ad3a414863a283b58b8fd416d0c72c0a334ce6c8
SHA256db6cb985803f07b9be6fbebf814077587f8e3d865e7e60a4a17f6412e0b48549
SHA512dc46a5c5b320312a9e22cbce422829bb1d211d0d886fd62ed089e75e10f74c77ba0e95094fd898a2736b32c3cb5625c0cd31a10e01d06c35cd81c003ab65a727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab1762d49360099fb8bde28d20db1fa9
SHA151258a0190d0879f6706559b65440e4ac8877a63
SHA25612edc32573edf0952bf5f341da5a23d5a63d1f7be0bc8adf0a3d34409cd94edb
SHA512480edf3528c65083ebbdbb33a7459941d12f4b65a618561195cdb838b3185c1ff23a24f0eca43e16d595fc1a06466a280b7e00a9a875149f6465b6f24adbd17a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d11c95f4961ca93d65d8b410ae114db6
SHA178d580f6baefa0591b940e03bc308c6c233f2801
SHA25676bcac1c82b214af6a2b3588d9b1bc7be1caee2f85b6ebaf5eba93155cef0cce
SHA51275f5b38845c2cb179556c4fc13f62507a01d49594404f60867574a9e2dd7cac13a52cf634e5091142d48f2af1859c93958e437708e14533f78c2bf5ae2a72314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586e7307831a3cb7d09c9ffa869c77480
SHA18c3041b3b3d1027cc75ba76e81e5d578691ccdbf
SHA2569e587a72c7d0d6f0e8d50a656e8a0ac4cb3873ac682ad41cc18ab47b93163fe9
SHA512587bf0c945fdc5fbcb1db62b029d15367035534a34fbf0bdd52f7ce6fb28c44056d51225e64d18f0e65ffc3b58c851541f93186ba7b5292bf73e0c569905a357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a37b84deb747eed30039a621892c166d
SHA178d553041689dfde2e8c5f075a3fafefefd8d8d9
SHA256e478dda95697d9c8bb376a7204ed4b296cc76cc3a22a76116db50182d03e72bc
SHA5127a909107c66e9d73f05e628f8a084b0982ff38a8149565811b8c38f99eedaa40b66c945561844fd43ecf71c20df9fb77dd6b43a4d684263468dc2fc1cd4ff74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d258cf29e55e6f8fc835871709a8186
SHA1250a462a4bee4a555611899fe4e0a6363ab2993a
SHA2564b17e0f9b3efd22755d6b9e68f64eadb91a2b644285ef82b55154ab53e87ee92
SHA5120555125d9a4a37836e019023558e62071a8a9f97e6666a1a15e478fe9f48a9aabe557e4940f8264a6216195b9e35e2f1de7ee79e01673d72fdd6cf39ede25cb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5a5019ed313ddc2a0def2e5111e44ad
SHA1d33f30ec38acd688e50cdcf78f7b848340979863
SHA256f1d5505dc4b0b4a9a423515337be12375428357a13ac4c776893217510810391
SHA5121c3a27276c14afd86b023ae21a435e2387c2b5628143a3297080ebd080166327f3bc029c47d72410b61fe8307ac65d2f6ec17e7769658e0057231e710632e1a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfe6a7288c401ef1dd8b74ae33e37834
SHA19fa779b2392a5425c53bbcc238732153bd25107a
SHA256e1471a0765b0e527129f272444bf122e7affb21839f58633d58c01151fc7c8d2
SHA512cfaafbe464b96b897bd531e7623a9ed18b793f2aefd681d758d1d84592800df1cad90d45e5dd79463dd07e78e15a2d03d3e7ce400c8f62badeec2c5cfeae7eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54534caf521ff0ff18b782d7e0a30f109
SHA16fb51bcdb1f725d01539bcb0bb5b56c0f17d3e04
SHA2567ba4206be905d2e0aa66e9a653a1576fbbfeb266c5b6c398a8885d4ce73197dd
SHA5121e0a7305b7bb7d030f56a9cd0e7e0997c5db5f3189c0a5d123bc72684618edcdb988738629c4ce3a7f8927f0a549c97cd9ca44f597fcb5e89452558ad8c3d522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57965b95afae1f097c6e4282e7e7d42a2
SHA1b9659e2fe0828a7f01a353d5263cfaa00eda7bb3
SHA25606454c510eb7d2755029a6bff57e3d10147abd4824a61de6a3e3123da1444a0f
SHA512f3021598bff0d0ce73d3572d20fd7aa9e2d49c89244dc82d02fb3490b4644a2f91b8ebeb378f26d373af7a3a863dd5f50c02487602998ffca3744e716734740d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53249ab1aa38d4ade9b51ca6a16f3a4b1
SHA1b254bb31fc51191ae63314fc4a946ad7cb8c6f85
SHA2566141c0bde12e3cc89cd909998eec238dc5272a280b5fbabab66cccf116bf5783
SHA5121240bac093dda151b4f1444504d39a9a7e63d1cc9205e25bf37ffc39832db102df1d23141bd51a47e9513a2c8035d0a6ca90d65c7341870589b280a28cc744d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53703b33c21e3c19db2338566746a27ee
SHA1e20dd6ae87bf7324d2854bd4802cac3b15275dec
SHA256293050b2a066919a6b031b743e6bc64eee6c893469ba9b4df3997870e81bdd83
SHA5120220050de3911a3fec120adcc82453d25c7b5ccfe8d27d28d50decfabece11e702e487e060ae7ae4fa4f8267dd72291cb1e661832a367d0b375ba0204c80bf7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ced41db8bed13f4771c31f1629b4d6e
SHA1b8ba2904da2e1b673c0d4d4d8161683ae616ecc3
SHA256cda85bb5bc7b13bd14f277fddf463abbfdc37031bdf5a4387ea9f051fd5b7d9d
SHA51271b94e847af3338d3274e269d0d2a6d02fab328b37c2022617999b212bcf2bef495dbf48698f0aa724a49c5dd61c9090c935586003c281c8736d40e449da90c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589c7233967f0a116078dc89c05971f87
SHA1f8fb6d691239c9ce493c09d4c5ef4b03f5c4b466
SHA25644824c53e5f130098bf57b759e89f71c5b6d01ed0ccc7f73cfcc1ff5a7a8d443
SHA5124d06182fbf619d94343b71d6b367ea2efb314a6b201b84ba2437a467fcacbe56001a72eca13819101b6541a8fe6e95c6c4dab2d255037520ec0bb7a8ee77910c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a