Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 12:04
Static task
static1
Behavioral task
behavioral1
Sample
461a56047904a16680c4adda7c656848_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
461a56047904a16680c4adda7c656848_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
461a56047904a16680c4adda7c656848_JaffaCakes118.html
-
Size
460KB
-
MD5
461a56047904a16680c4adda7c656848
-
SHA1
72a8a190258665e420cf91d9a509f791a67626f7
-
SHA256
8bfff32de6c3c8a1112f22da78b55a9a239b32330b56522cdd8a6dfeaf7e2253
-
SHA512
b6c660b0c49f749215e1ebce69e6757a3c06f1c9e1bbb015adb103a21a112a92ac8046a3d15991f9c2155c20bc79b9c6095ae04b325c0db3d4b920fc4caa67b4
-
SSDEEP
6144:ScsMYod+X3oI+YCsMYod+X3oI+YdsMYod+X3oI+YLsMYod+X3oI+YQ:X5d+X3+5d+X3j5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421936559" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{560A99E1-12B3-11EF-89B4-66A5A0AB388F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70d68d2ec0a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000063762d9ec816a9459f68ff89088a00f92a557c3a817beda674931d9d466be58c000000000e8000000002000020000000575d381a84e537317b23d169e21f8c35d0cadce6ecaaae11ff129dc5170b882f9000000033415ff1aad83aa4c824d6bbf5f255523df713eb6438effc12b50aad10bf1d17dfbf4a0aaad27f83dcb6a8646dc9b46d1ca69aafa36b769536c558dd6e863e0e7f70305276b5ac9dcc811e9d8568c1823d4673978945073e5f7f8ceb5cf7ab3f8270c0f281083759b7de227b4ffe8a313fd46a6ea8f8ad74e35c28ff80af4c2b6c0a5f77ac735147b942c7b204506cd840000000b2c19ca0a9a85ca440261652b43d4d7d1cde5bf18d9545b261e68de1de1be54ea06208edbe362efffef52adbb453accaec11fe21cc9a112142f823affeffba8c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000001085e33e51fcf716cae94aa754ea84a669cce3dd87ad06fa2826e8df74446360000000000e80000000020000200000009c710a243e48bca17f9b67519bc164ad9e018977fc0307a415c3b7c4ec56027520000000b0502c69d84b7ab405877394ea03fd7c3475d465b0d95d0aad4caec011e2d6f640000000f12208d3f00c9def36a2b16fa076abba805a5f3363cc35c8fd076977fafdf1900c92e75b067d1915304b5c15c8d57079a37fc762958ca4abcb2dfcd54ed6464a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2964 iexplore.exe 2964 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2424 2964 iexplore.exe 28 PID 2964 wrote to memory of 2424 2964 iexplore.exe 28 PID 2964 wrote to memory of 2424 2964 iexplore.exe 28 PID 2964 wrote to memory of 2424 2964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\461a56047904a16680c4adda7c656848_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d34eab6f64279d486cf55045ba9d15a9
SHA198623e329a9926bda2bccf141120c7ac1c41ce87
SHA2563e7554a3a252a95c713804b6f828e9e4d3fc167dc8fefe67d416eae2fafcb62f
SHA5127a7c9ee1d9b2f7f49d92b3ed8488053f568e189022aca736e323d42994223df06d36db2426c2fd254de7ecdbed40db804e8ba1cb8841cc0e7fe1aca6f7ef5e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8c9e6f6a3ee72a50ceb5015f7d9a267
SHA1c409e40fac23b7866d74ff4bce29fc71b2b3bd77
SHA256fd08e9c2d67d2c5470bfb17c6e9e8462b9bebfec189d07ae6b612e6f10e74b8e
SHA512d56d7d03118c6629b7d1a62721a14888f7988e479e5a26f8778af5831f0d7f82e3297d1ea4fbdef97536e03656f53c6b950e2857c3b37957a5dcf8361d3d7310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6e42894ce557cb20b9bd6d2d836a0bc
SHA1308b22b9e7a0c125885ac51648c9c87fe9342b08
SHA25674c592cf37a9fe403c69452f5718859aa2791794446fd4b1303c5e1fa62e03bb
SHA5125c25ce75b30606414e4e7bbddca16c58dd5620752ae241a404e91c71b347f00e21107e090999c50dc11d2ea9502d92d318a02fb24e87c6b8a9fc74de1cb7c470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596a13e52c5dccd0fb3001269f9547986
SHA1b981b5308b64e30ff105e7ea06edc17982d253f5
SHA256de7d686d2fa394cf875dde849740228a28e4bb70790afb2f3b49fb6315466602
SHA512243f46d7c5f0f792637ed0dfb0fc0990eda4b709e174b2d8ddc42c1b75624acd0c5fc15c1eb4e5c758b2e0c14a62c1c7475a334aba1f6b43d24da157bca626d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6e6d7540759266f3fff07b3412b26da
SHA1badfcc1d4825031566ae218070e2a93ad5aa3fe7
SHA25680ce0fd00e6a1d38b6259b75b30255120da346b3535354f10568020e3b10c9ac
SHA512c99711651fe455c93ba6ae3618081e3c5695f80c21c189b9bc1cd385300095b885b2375374c99740baef97ae8672245b9f3008c61fc7f0af9bb88172e49eb844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540120fea95fca5ba3b5606c98749b4f6
SHA13c83fe8138f2832ee19054069c8bf03b59601fab
SHA2561a8a04f80ada8e157faaf718553e6d19f4d1a0a29dcbb8e08fc7057ac5bd5ab0
SHA51296d2e8255dc8aacdc8e8082ca52833b523defabc5e426566741ae8037c2aa5e50dffb3f4fee4fa153a6c29d32273a69a4e7417c226be19962c64a8772868d0be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e718529552b8a0d296861554218176b
SHA119a271f0f9e04a03594c36f4769f5bb9dbeadf35
SHA2562ebe0a9f72751e077497bc41ce0b9e490076a897c97e8f4110403171388e51e2
SHA5125fc9a67f96237878fb7da482e3d5a74ce24d6b4e7721ff1e68d5d2e44a17cdeb7618d3d379f0a5b6057d34d8defc3f0ea29b3020a92cfed608862ec06e69842f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5159c2730b88523b4cfeca231f4ac4960
SHA117fb082be81a473e970b527930343f8c432d0149
SHA256fac80ba11fbcee222c5dcf8d1efdb297ba7711299439349b8a5ae85990a2d48f
SHA5129b05aba2442b607c5da7dbb58cdd7d616cb5437fe44dcfe21a6a96622ba90e3c7ce1eda3e0df82271b1612c58506b19ed804e97d7c56c8b981992de13c49a7b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d88cbfc3e25791d01bcb904beaf679e1
SHA152436b9de9bd344fe454a34c17198d16c7adeccc
SHA256781495eb9ae35b55694fcb9ec06541aad26941beb9bd64f78882bcac89c9b0e3
SHA512671827613fb7b81ee36e516ff8b9b4e0e945404a24dd1e50329a9776720f70928de1e2dbdd0d9ac0e45e7d79a253a0fda55b7b58605648d391bee8dc30d57a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546ecfc6da896c586a1b7753674b881d4
SHA1ea329b9d3f21c673ce3d703781354291e7da46f4
SHA25670095efc49e28dfc6a7c41f4d4dfb2398433248512c5e78a898b6aa4a6269adf
SHA512ca263345244ca12f4c9b4da432d7960b80f687fc8070a0f4446d60664004f85b37fe19295f8d49720b2f1fe0b6e924be8c646fb60fa8c7d16e680d51003ad83b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ff40c694881b9b4cc17b52b1bc9839f
SHA14566d14412e608dd4272e5f85a756540adea1779
SHA256f8f75fe88e61b89ab07dd7246de2eec1374758d21134a55b13e24335e195da73
SHA512830f68fcd2defb9db0e9aaa326de240564215fb85ab2e4b46e3eaf322fe8ef05d6df1c49d6c71128b39eb7e2d4c1c918fe8c841cd80661c66c5149ef0dd2bdcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddaf8c0e9e9986a12683ab392e720fdf
SHA10d4e2bfb236b948075760cd2e10089e18bcf5904
SHA2562b344b7ed06714344288e47783573eeeb3cf39ba171c65074a540dd188773dca
SHA512f14d6b9f16f8abfb624bd4abf1f03896f5093ab9313ad79c86ec6f9fd641f5a2381814b8472312398d7d3a8e3f2dfd8b5e3b300144a392574ece2198fd4116b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b40ce929ccbb47bdf0c3d955dc61c8b1
SHA174eae3b060aaec6f4a9ae6dd977672832dfc2574
SHA256695b3db30747f6c42687492eff8399c2b5e1434d9ce0bdbec23cc1301e5bb9f3
SHA51251100ceb78e42f1103f32be36a8dd6a5f3513c245607b69db475c3a930c5922f4eda28e7b4daeeb8d8dde3c08ee6c246dcfc2a83c3bb6f8d3acffe08d45e21dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50316c266f5dbb1f9037309d2b6c49a8f
SHA1ffc569b91db1427ae1de7da5113f249c1ebaecd7
SHA25676d63f1cab22def958d42a781be4812c436444a4925156b9ea97abcee3fc2283
SHA512aeaf1873c6b9b8d89054dfb031078b735264cb841552fc3c2a0968608728f05176dad02c31668992bfc5116cfd0e0d6eb93fbe714f597c08bd7b9142b3e71dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeda2e428b289e7416a8d5b0949a02b1
SHA19063923fcd67eab2446674264b4b631588604b6b
SHA25638eac44b273ed72e72cbf4a930e58437929747a56a69bd9378f2348a8b85c5aa
SHA512ea039848fbb8f2bfe9249fd074dfa911ab974eb27a2052518521a7add2b8aac5638cc2fb8eac6d5f8f4dca1149d2fb9da64dc892cdb9696e4ed6519c8c52e760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e2e7141ca5b5acd5c20696784a812b8
SHA1bd3b621f55479fde5619b5af625e2294d278a4e9
SHA25607ee8ff6b4f5b8f963c33ee3045021edebdad7d632321f7574fdc238413ecef4
SHA5120f2afc8dda466cabc8b4b82f23d56df5c20f47bed08e11a2fcc50a1a5ba8d58e801f41341eeaa25ebd1bad937276bf396383c647cce52eea536c2942dc4265ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575d1f2ee8ec10a5d3a268a0451db4a96
SHA102c74e2c30541d64c71196123bc6ffd6325a2bed
SHA25686f3d1b6aaab9f5538d5fbd267707f9a374634e6cebcf72b50721c026b992c78
SHA512b3fff6c45d970f09ab3535d7056c300c75f882ec30a3e6d1f1a46296afdc109d111060e060cf6bb2cad38d6e931857e3f2c98c4aaaf2a7739731d4e43e05c6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b82dd1b499cc75dfaea1633eec743f0d
SHA1fec65102e245e1379f8fbd1483656bd1753e9f37
SHA256814bc9549a02167a7c8c5806b49047d566fa5f0ea91c735aff38d41352e3c821
SHA512fea92806ede7d09223194fd2741e8321ec0168e5d68334717654d6468a065e967a3ba720cab159be7bbc3c3a19a6bb6eec39cc9184f06ac0f1773aac01510d67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c66736549968d972ab72e092fb825cf
SHA1e5fe194fcadd45339d7aaf1c25ec5888b4594344
SHA256f3d987a6e1c8b5cb21d89e90a77e7df390b6fcca2ecd7046cc282dcc609d63c6
SHA512833a6473933fcfac71eac186ce41b02aab9ffabe50d6f4ec32b667afe2b99f11bf6661f0adb669dbc1a4994fa21131614c14ccbba8b4a7e85002657c1d40b77c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a