Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:22
Static task
static1
Behavioral task
behavioral1
Sample
696ee6822af6574faa5fa4df810ef67b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
696ee6822af6574faa5fa4df810ef67b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
696ee6822af6574faa5fa4df810ef67b_JaffaCakes118.html
-
Size
2KB
-
MD5
696ee6822af6574faa5fa4df810ef67b
-
SHA1
9b55170a63f8cd9a8347b6139f6059317d3f3476
-
SHA256
ff8b12420fc04c39196c082845eed841f29da7224703beddfb1c7bc21471cf6c
-
SHA512
5267198a89c9f1cdc0ef12d20eea7c2787c440653c1fe4e30f4a8216e0ca53097f0ad5cdb1d400598d8942d361e09e33b81c4acb07b56a1f52c6b93f0b99459f
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000029e7c34401753b02dc46420a27ef3ca2ff6e996aed678749d3c98141e122359b000000000e8000000002000020000000cecd767b55b7c8e1d49fc813065c3fc852adf14e4e18857f284aab9100d65ce99000000025aa5cd99d63e2f74afc6c8666adcc044dae065c169087e16bcc1b04d5ac3be2b67b3590fabaadff9a1e5a62f14efeaebad0b364d9c29c0d0533cadab4c3a90a282e72b782005a5cb528f399d2bb8c72d4f176779229194f04645f726492cd93dc748f714fdde0374871b9e87d939dad02d559927ec2333f8bfa5a24fd3c0f78908bf22847e29b1ea9073bb640666e4340000000c2d4388cebd6fd312d86fd3e90f1c394c594996cd0826f26066f4ac567bc39ed9cb9152ced2205bbf2f20c412023c1e675ab4e457795e8c6213a84e5bc6662ed iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D8FC811-18AB-11EF-8B04-EAF6CDD7B231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000f4664ef6b3e6ffde2d519d0a3c13498459babf456956b88ad16c377c881276fe000000000e8000000002000020000000d2d7267a19950aab757c1ec68a47bcbbddbd3f14182d87597d4c06ef8433cbae2000000022f855dc14d0d5a011bb184ded782a4fc04c7137abff45e6e75d720a64c40ae840000000b8e9eaca70a1d0ebcc0841393eeab04835e7488f60e02f1bdd9867dbda890445d0c28050d802008441f0edfe852aec3324589d1b85d496309cab266ae04e6270 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a00b1512b8acda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422592789" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2364 iexplore.exe 2364 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2364 wrote to memory of 2064 2364 iexplore.exe IEXPLORE.EXE PID 2364 wrote to memory of 2064 2364 iexplore.exe IEXPLORE.EXE PID 2364 wrote to memory of 2064 2364 iexplore.exe IEXPLORE.EXE PID 2364 wrote to memory of 2064 2364 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\696ee6822af6574faa5fa4df810ef67b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a5c7528648cf305b649ec134da56792
SHA1b7ad1389327b0e846205dc8a53f93cf519e34d9a
SHA2564c04d23dabbffdf74e897d0b8cc77b10838b98fa1f3a5318e6116b560254f95a
SHA51262083d3dc21d0db8dcf9f0ebde8f237438beefb1f2567a775b6aac7f32f998700f7c02d0bda780325c3371389b5b22eb81a59e999b2545e079a97a1d3971df0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf84434ad9c442510f6b38473643792e
SHA13f7f85e5268c10f99e43e9f8bc5e4705e1490cac
SHA2567b688f14c5665c7ca1f84f8360e4b5fb6437166f71553be2d33dd443e8cc431f
SHA5120d13bea6846a18d125ceb38f882d7cbec38c6f84f1093fc61d8668434a4f9f7ab4b16822875b7e31e640436bee06c7956a412ee8a377313cb814c83c6e2d0acc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed1728f63ecb6a3c3628a3607f9b25a7
SHA134a02c3e652df327135e70acccb27b30ed519ec1
SHA2560181e7485e08e2868798172fc9dbbed7086a25618590eb60e7d80c6978e0dd17
SHA5124fc6dddd7d5b7fa69ee9f131843023a92e23c551c1265936fb14875ed4a4922a0de55f646423e5ebe2072211eaf20cdf37a8038e0dfe62f21b88b0c52827ac33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559a63c3c6d70d375a89edc2c7b6200cc
SHA1439af9822164916fc24d2ec8ca46a6a770a4e971
SHA2562d2f0b48eb3c03269b68a02aaebebacda3e1120210e92e99a5c96ef3016cff33
SHA512ed694c21cb7c9cbf938c7cb29d84b5b11a7b5d2ee44811300a2a06180b6be838bc85fe411285ef834de6f1fd333855ad8be34714ea6cff03358b8a1d8f9f9ebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a388bc8126ac2aa4e8e8895506fa501e
SHA1c0e99d8dbaec6b15c9f4ee721ac158375a2df072
SHA256302381f6a555c763a9691eec6527475075bc1e879a20ef0b81d0634a98571786
SHA512487e4dc996c334f1e3823bfd6043c2d77b33739edd34cb3300ee8ba31cc5e7fc45bf58248193d10a867be29c8effd19b83c9623e2c1200da7ab4f6fc5495a5fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ea2ea8cfad739f1228c17eb80c266fa
SHA1b6c17cf7545b9b63d95d35e50fd50768b449466e
SHA25632eda986f22444dc289c592f36570e796173fe0daf97a6e07322585db73569a9
SHA512deecd982a841de214e8c1924e2ea58019c868148bd033a0645c7eb0b800515cdcb4c6bb285e7d61b1258a98872adbbc655b0b8ab01b222422c9d39330c9bb59f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569c8ee64d498de6cae06d42b9bb55369
SHA147afa505880740d0bc83243398a26ca35a2cef35
SHA256c7a690f7331ec223f39a33e5b71ebd71f5cd12d4cdb1be80809da523639a5339
SHA512fea887bb762292f4d55f54935de8f8745396f2ef8c0d9592f30e94c9187c2664a6707c664b0483f2b6fcbf4d6b2861cbfe3f06c086a9542c4b625f5daba38599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d2bcd112e62828030848a7f38a1c9ba
SHA127e29b32996d1884fa88abc1e78d7f19077c3413
SHA256a320ac2846f0428de34ba9ceb30d49bfe52b5b41a6b3e611e81f6268a4ff5d38
SHA512d07cf3f02048db00aa08b96ca42a5ce8d00759a06ce51cab568bf234b427d71f8171c988eae3152c3e010a43a05f48b8609c22b7c83228836bf43cedf92d74e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57385aadce20077c4d4eceda52735db06
SHA1b44bca585ead3bcaf4c2e9b125370186c3c5ab23
SHA2565bf685dc1a4886b15874552cf13d64c6176e6c7e3e47820a943ddc361e5dfc4d
SHA512988bb41017f270a261b3a5e171a24109abf15510fed82b432e25d8e8a6fbe1b34389f7815e75d9632b35a819c6a3fffffafe936bb4bcd6e868651a1a595aaf69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5358309c9a922171c9c0094f29f824212
SHA156cce7f521863c6d8ad1747d447ba4fa3d3811ef
SHA256864535be9c3b1bbf7a3ee91e85b36e2c55d2de65686db59b18d21101ef28d5a9
SHA5124e133326dd487c3b1198096d93aa2f2a827c95c4ff687936548e3fbb21ad0d83d1821adef0f0978ab923888010aa01f63692fea57fc27c9e1853aacaf6de4fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541c0685eb71069092df3fecc9b827d03
SHA15e782a302b5e00a99842453e56798edaef458de8
SHA256bd7f39de5bcb4470adca77bdc59dfd2d3bdbaa415e2a593f633e8384deab5a6e
SHA5120608148e3e383123203bbc4783272aadbd2e5390c8ab80f6be488dafaf28065380cb30ae834887b33bc96c86719c80349018e512131c9c4ea466a0d85420de3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5140478618ad10a5b231e2dc908eff6bb
SHA1743c1db23c9e50a393e220f4d20a52bd459a0840
SHA25675257f749178124edf31bda15f8fa986d7ee4f4f3fe4ad07f586e87002483f37
SHA512bcc9838996894f0a7ab8a842167ffc22c572bce2b0a6a5a606454e9879c4b26af2b5d2b7fddf01b0ef066719f8146d69cee951ec70a3e5c6afd5862e2770c7ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e124ae6a03fbf56bd6081f70610218b6
SHA1259fe4c680084ff5ba286c4f677344fed1d56ed6
SHA2565c02973da8fbd90ccfccb8c0d51abfbc4cc692e2bb29f1cc5fa2edd66dd82df2
SHA512a2e80099c7b44d4977c7878a7ffe213b7130abac168784db6a684a320978b2435e05068c27002152712baada7eb3cab5f6b47094b9a81a335314937c8480e0fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bea9dd7f527b793386b678c191f5bca9
SHA18a02f4b7434b4cbe869ebe6a78963c61a431ef34
SHA2569228ab3a03f820b14aa82371429c27dfaedc76b52e35ecd96f3dbcb8fcc85efa
SHA5122281bdee43c32ea5fb8e2a12ccd37340dc51e0a3b062cd20bd7f76096a54b5bfc7a62e67097fde932e0c11205049024d1744cd7fd670983fac99c33bf7c2a36d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9631169ee659ecd6f16f51788d05074
SHA1ccb64b69752e9280c66b077dc2d967948cd16034
SHA25676a9c3d1f7101307807d082d6a9b7c2159063735d9e2b2882d7db8003a3a6198
SHA512788c7520d731b3abd821d722033cc9fe42af9258091283b115d9d7f9e09362063e88ab4815c48fcbb59de6b4c2401cb39d4edf04f47e87038e3acd2fba808102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57460b322d78f32f0401bae7fa8f18d41
SHA1300ad50b21b460aa262854c3d471cb87695400e4
SHA256feb81940d0a3a469b3dbe0ab7067e56ce2e5ba7932d98e4c097ad0f14dfdf66f
SHA512515b2396e6589d3b24d07c2471722955b5bc5153e7ab7deb34a7b1eae2ad1eba475697bfe35455d9c8f27466fa8432ad7870a535dc882046ede458015005ecc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bfa96b25b6b5a85743055a7052bcfc5
SHA13251dd8e2d24424fb3689834a869a02490c6daa1
SHA256096259af68977f28753aa3bc9f322caea47f2492433491eda2a1207af670657c
SHA51262aeb3d92cee98673a966e91b2ea493fb278a3193762ae9c82040939edd1470fb2455a7210e99624af718a283c6025e7b856ff2ee7c3d0902d50769636eda590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5beeaeda6b2b01dc702428e7ca12da086
SHA14473705810a72ee24ea32f015fa9468e35c098ee
SHA256f98788d3a5c4a72ba40f9cd381c43fbb7d49cebdf9aa679cc32ef483ca0b2482
SHA5121a2d1625094eeeec959bd7def0c623f52be8f069d77a13680b7fdbd3ebb22464f9239d81b8e6b70fe587f9732712023a62f0a283c2aa0e54125468e063cb2fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c2eb7511b1cb02f1aaa8482f6497257
SHA172e4f18ebb2f090812108845cdb27bbbcd6ff549
SHA2566d584d5ebf7e96c2a29abb1dad4a1e6cbdf49d70aa428081a8005fd19975db51
SHA51293ea98b03c9e275004e76e8e3fd2fd8b94998590e9212e2f7640c294bc2bf0fb5bfee34360618fc99de6615f14347b6416580fce47131bb331bb0620b462cac6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a