Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 19:14
Static task
static1
Behavioral task
behavioral1
Sample
68526df9e3f2e608e0ecdcd66e354383_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68526df9e3f2e608e0ecdcd66e354383_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
68526df9e3f2e608e0ecdcd66e354383_JaffaCakes118.html
-
Size
68KB
-
MD5
68526df9e3f2e608e0ecdcd66e354383
-
SHA1
41665d5a257148af37780f611cf2fd7f8dbb81ff
-
SHA256
063df82f97dab508913e076cab5bef433dd1b18c016a15898f2323240f82d637
-
SHA512
fe5d555b94ce51ea26572f3af354497969058293510572ed796fe9816f8c564cc00e76d92dd1b7a7ff6bdf769810dc25417ef372bda08c5d13d75515f74bf548
-
SSDEEP
1536:2Gb/1+/1JvL8W0SdWYi231BZGhqN3wtVSBUnrXNvP0T8wH5zpAmtlAgE:2Gb/s8W0Sn1BZGMUnrXN3AtBAgE
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000eaa7a7a10650f6ce2997b946dff55224977e3c0ea313cabe1d8a2781d199e2cb000000000e80000000020000200000001c2e998693b4b2e85acd62bed349ccc9854dc9da0f4f3240464b23a7072ec89b20000000c4a384ff333b3f967a9c19e52146960fefa909a9e6aa7e1ef84d979ada906c11400000002dbea04ccc74b490b21f73e055f60a8d1f2f6a3564f6d4159b34ab04cbdb313bf2373ecaf34db97941a029ed202cec03c02fdf0e8b60497768db8d2140e35e0e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422567146" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{875FE561-186F-11EF-B023-6200E4292AD7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0677c5c7cacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2252 iexplore.exe 2252 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2252 wrote to memory of 2848 2252 iexplore.exe IEXPLORE.EXE PID 2252 wrote to memory of 2848 2252 iexplore.exe IEXPLORE.EXE PID 2252 wrote to memory of 2848 2252 iexplore.exe IEXPLORE.EXE PID 2252 wrote to memory of 2848 2252 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68526df9e3f2e608e0ecdcd66e354383_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c355b94c9a46dbc4484f90f80cac6531
SHA1fc9d0b56ec9e54e4657c1ef6bb7a8dbbd07b3785
SHA256da1a77d3d266fa909f18e01d155a764446f3b0ac76fed8a8a2ff94e4482a297b
SHA512c0f9576dc0832bdeb11b88e03441405d4a7f61e3e6f93cf7c06aa2d84b15fefa623e03f9da22c747f98cf8744f4d18ee4b0818a0b71165092880cd9df6caa34d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1155bbba9cd30e178132b5012a0f3d0
SHA173a28c4804f091164b2d176e304f381e6480fb06
SHA256b1c23cdf181a33a109a30b45f66050f90d751a615e83595c19136324532ffb0b
SHA51223d7f3971ba3c9b5ff0ee94794d1531fdb5aa66e4f9e01d07e3d4adf23ecdcab25abe2f6e81a4a15cbb2012e7421a19f01221ad2414756368701cbd420dfecdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572b192469f931e868a6dd8af23a4b2e7
SHA157e65ce7e08d64999bf247537663a78b1fc0f553
SHA256a14c689e72dd3453d89fc3d308b64a1ad6248dcb15f410bb6f0eb5b0be20f3d1
SHA5126ad60b7f8ad77e0cc75ecaf8b2c31066db95e0ec4b585e001fd0d0afbe34b7fb764c853bd0cd2990536fea72f0eecf96a8625c460b35d67a16f2c19668d48784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff491e6dc51d18ee7054cbb16aa7f502
SHA1ba43931fa2e17aacde03586afd885713e0b90327
SHA256a5a8b555d0176321e3b6eca3636020c2e4242b8084145c20d2b013f4fd7f3cfb
SHA51249daff9747c3189417a0e5784b3164e3e4f11cb2cc2483a7a4eab96228dae06fb9411f05839a823b34cb53ca4900b7db430db4e2b124010e66069f88fa796980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f91cc01f7ef2dccbcaadc84b6bde746
SHA1f2b2c27618216c2c651b23e553dd134da199e6f7
SHA25688bd7a2bc0ef6fe5563be3a106f9b4d1ed618bd68f03a0a3aabc2c49e8d15bdf
SHA51287d306ec428c16cb337b0239f71052263f56343d289bbdeeb9f492a3f8b9526a94361f91e64248d19ddfb56d4b9697b6fe32c9e0ba5c7b09faf15a27f128865b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579686f9848b763ed808db35ea44525c1
SHA1ce19ba9a69fafadca6f9bdc3ba3716c218d46cc7
SHA25696a6bc8e940f187b4b203b07be579a723a22cee6619db9f4f9540c2086ce9bbb
SHA512a1154ec3b093703d9bb2c703485a2f696f38abf94dcae7a411fe7305278fb3e19e5b96ce2c01efcd48cc3c2799ded71a979f785d4b85174ed104b525a1bb80c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c214c67be338de5593c5f305b3a65eb5
SHA1250d08e603997d25a63695b68cf88309adfb6244
SHA2561ed7282122840e3c2db03e16b364b88e2eb7fed34a391f52a0ba2473265101bc
SHA512575173bea83ffe09a33eb58239e4ab92b92b88c1771856f6dfcb96b76566deb1d669f550c4a904146eea6591b8fca02e99924f554e5cdf9b2ad911ea2b03340c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5067a2b8998af949ce1af4dc554d08aa0
SHA1efb0948263c5b6193ab0b1a6d5d72077442b4313
SHA2564c16657e76892911936135a9bbf406142733eabdfec9d814ba1cebb23479167d
SHA51248ca408e50ceef2b783d5d4b6d938882b6f470ad22f275ad783bc53f087e500340c71017bf525dadec1cb0c2cfb979c0546344a52a52db1d861a00240d22a42f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f20aa7be27b5d0abe7339a1b1fef07ed
SHA1c73ca6ad9e57c154c1e8ba44fea75c519c5e3107
SHA256b69356d670acb00a9b52eb48f270aac87a5b39394313e743141292cdac42712f
SHA512a9934e0a0ce634a6e2f2c78974730d84f393a445a8f3d391b39f879b2af1ba8558d441be1cf5f46f3601ffa29b6e615997d093cf1a3fbb48cd9ab0aca3978e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c97e3c0b73d5c3d6b0836796441c5761
SHA113ee4c2ac51cad2aaffb0110c5e7726d8471449f
SHA2568d96814c0924144cee3acc4912c5eb526d3da73293f695b531b1908a3c8ba328
SHA512c5e65a65c66a83b9d9578c7eea878a4c709234640b95430d11ac460ffd74a7fb0c0009c725a63370680b67cb2aadcc6e15e99bd34609667facb8923fa5dfb8c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec276259e81fd26471cd375048c4f33c
SHA116c8a84ccb575b093456c6172e91e68501bcbe0c
SHA256ec3e55f2716c2a83e44fe4750376231ab86308020ced595078695ba60c26bb56
SHA5129ffbeafba3ee239e395c3af13bc55a178c92ed5f05f74f21d221af902ca2ebd58814bc86e8765f57a7069ebe7d7c8b6e5fc086b5dbad69c86ff9efa4656a4ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5996384f3e3dbca94451cfb2d2d006cc2
SHA140e2f0d947215a4aeaa25971c5f7038060de019d
SHA256605faab9f5f6b56f6f745b16df9bf7db55997072e3be520276783162e877e9ac
SHA512ab75e4f1e61f39bc633e60e2cf06c88d3cc264fd5ce12c25414bcb5508056cdabeb03b2c78b8856a1d320db79596be70262fcabd2cdd34296e306ea203f38f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f2194834f2dbf07ca948ad73375d06a
SHA1119b127e03aa9d0cab420cd282c33cf5f631393e
SHA25605dfcb065ca46c627e8aa06c443b0320d1812d528ecdf804160f29bcb4aac85a
SHA512d1018303349efc6203152a6453feb30d4ccf86352f99537281c465068ec98305268dc80f700cb278a4fd7d6a7439510b30e1572bd1c7b7df0f1d8b9a37239bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b8df542d235b3eaac185a6bc362d889
SHA164226761626be01344e17e9c561ccf53956bba1f
SHA256e46c60375f434b536e0027092bf2e592d6e575f56bd33d8c060eb72ecf6ccb78
SHA51205f2a4e3868fe48186f430c388b4e61df75dabf07fa701b289173d792b5e7e0a39a89d344d03d51d7f39f87c0f4e06401e2f735f863116f79a73bc603d21f849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc0afbf6aa2416134fdcc0d8a1bfcc39
SHA1aa157ff81064cf22022154e6c84f292a37773a80
SHA25674aa1501b0e231bc5521df6da2e762b4aeb6e39cc0f2776d3be3dfdd6a89135d
SHA512f3386ce9f8b753f5cc4b5ddb362c1d0fe4aec6e1feac3200f0121dca1334f1ebdf48c9fefe235efa7a7ce6409bd6e57ada937ce3d5e1e3c9a9283ea5d7a0f8b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f27906f75dfddacb9dd0a315397008ad
SHA1decf6a0f85a2d1c22ba128e32b68dbadff90129a
SHA2564322ce900df06b72120b9c350a4a50f9a34ce148784dca8aae60e2e207b949a9
SHA5120b90df25bba38f89a2ef2f04d5ac0831287448e64f56307e98b2de0044f1a9605125c18a0cb58757cc85c4856f265d27350a64903bd89ee3d53aecb2b251d4c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9d47b76e8cfdcf279d6e913236e2f06
SHA1845421eb5cde3741613e01b49d285a9d0ca165d7
SHA256f486f00c6c33671a740a880fd686a9ee2cdbae4c2fdc24e253f96906dba9fe8b
SHA512cb15fa2f1726e42d3d99bdeae41cc74cfc14a1997a5a4292dcdc6e97988a66f6ae57f30d3b446d127d579b4f2cfeb194d3d423e38d77b28aa1a640bca6d49bbd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2XHJXO3H\dnserrordiagoff[1]
Filesize1KB
MD547f581b112d58eda23ea8b2e08cf0ff0
SHA16ec1df5eaec1439573aef0fb96dabfc953305e5b
SHA256b1c947d00db5fce43314c56c663dbeae0ffa13407c9c16225c17ccefc3afa928
SHA512187383eef3d646091e9f68eff680a11c7947b3d9b54a78cc6de4a04629d7037e9c97673ac054a6f1cf591235c110ca181a6b69ecba0e5032168f56f4486fff92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H09CVCL3\errorPageStrings[1]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NVDR4C1U\httpErrorPagesScripts[2]
Filesize8KB
MD53f57b781cb3ef114dd0b665151571b7b
SHA1ce6a63f996df3a1cccb81720e21204b825e0238c
SHA25646e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA5128cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a