Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
4c2d102a7cc1c48221b6f3ab53b5d542_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4c2d102a7cc1c48221b6f3ab53b5d542_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4c2d102a7cc1c48221b6f3ab53b5d542_JaffaCakes118.html
-
Size
175KB
-
MD5
4c2d102a7cc1c48221b6f3ab53b5d542
-
SHA1
bde77c17c9630555d1231e91e10e747442e4fe6f
-
SHA256
a55948f76643057c5f964f1b574d168f9b66abcc7c5ff591632969d89cd5fdcb
-
SHA512
ca038408d98540d516dd0981cf230ec77677451aa2800f160223b390934c60a2db6f6cf9b454332032136d691cbaa0a334b7136395dc63eb372056619fa9d476
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3MGNkF0YfBCJiZx+aeTH+WK/Lf1/hpnVSV:S9CT3M/FhBCJiwB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2972 msedge.exe 2972 msedge.exe 2964 msedge.exe 2964 msedge.exe 1800 identity_helper.exe 1800 identity_helper.exe 516 msedge.exe 516 msedge.exe 516 msedge.exe 516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2964 wrote to memory of 1972 2964 msedge.exe 83 PID 2964 wrote to memory of 1972 2964 msedge.exe 83 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2156 2964 msedge.exe 84 PID 2964 wrote to memory of 2972 2964 msedge.exe 85 PID 2964 wrote to memory of 2972 2964 msedge.exe 85 PID 2964 wrote to memory of 1964 2964 msedge.exe 86 PID 2964 wrote to memory of 1964 2964 msedge.exe 86 PID 2964 wrote to memory of 1964 2964 msedge.exe 86 PID 2964 wrote to memory of 1964 2964 msedge.exe 86 PID 2964 wrote to memory of 1964 2964 msedge.exe 86 PID 2964 wrote to memory of 1964 2964 msedge.exe 86 PID 2964 wrote to memory of 1964 2964 msedge.exe 86 PID 2964 wrote to memory of 1964 2964 msedge.exe 86 PID 2964 wrote to memory of 1964 2964 msedge.exe 86 PID 2964 wrote to memory of 1964 2964 msedge.exe 86 PID 2964 wrote to memory of 1964 2964 msedge.exe 86 PID 2964 wrote to memory of 1964 2964 msedge.exe 86 PID 2964 wrote to memory of 1964 2964 msedge.exe 86 PID 2964 wrote to memory of 1964 2964 msedge.exe 86 PID 2964 wrote to memory of 1964 2964 msedge.exe 86 PID 2964 wrote to memory of 1964 2964 msedge.exe 86 PID 2964 wrote to memory of 1964 2964 msedge.exe 86 PID 2964 wrote to memory of 1964 2964 msedge.exe 86 PID 2964 wrote to memory of 1964 2964 msedge.exe 86 PID 2964 wrote to memory of 1964 2964 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4c2d102a7cc1c48221b6f3ab53b5d542_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a1dd46f8,0x7ff9a1dd4708,0x7ff9a1dd47182⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,3574003260570582012,10599518445542484535,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,3574003260570582012,10599518445542484535,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,3574003260570582012,10599518445542484535,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3574003260570582012,10599518445542484535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3574003260570582012,10599518445542484535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3574003260570582012,10599518445542484535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3574003260570582012,10599518445542484535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3574003260570582012,10599518445542484535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3574003260570582012,10599518445542484535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,3574003260570582012,10599518445542484535,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3356 /prefetch:82⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,3574003260570582012,10599518445542484535,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3574003260570582012,10599518445542484535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3574003260570582012,10599518445542484535,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3574003260570582012,10599518445542484535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3574003260570582012,10599518445542484535,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,3574003260570582012,10599518445542484535,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4208 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD56460025c0db22e6b12985870f7325172
SHA12dade9a794ec1844404374e6ba4d30a96dd726bd
SHA256f99e6bdca1a3985d356c7865f64bbc654e67da236ebffd43f397cd078bc46fbf
SHA5123bc19d81d135d385d9e8eee709040549ff6c71e674bf0757e4140af5a6b6fb086b6219cfe2516d06c945384015dd74ac146be8820a15a83fbcf6d0b1c0dd4680
-
Filesize
2KB
MD5de6fec59a1009cda284a105f730be64e
SHA1d781c320ab1331390b7c63eeab4d26254899b5a4
SHA25614c02f263bfee7bdacc8b5cc89ed692abc98a100df567f1a95957b21c636d45d
SHA512eb342f8d3814900bd824f2d460936b4c8a21246465546ad05b1323c7866e6a9736059e24b3eeb94df1d6e8ab6170b59023ad21dfe677ba902aa9217295a1db4b
-
Filesize
2KB
MD5ed68a42ab163831b484de537d622abdb
SHA1dc74b0ee90ee2b7c487a74c0d70fc58403698d1c
SHA256846a34cf88d7a222646e253a6311abc026574ece4d63e1e3d6c019430fed4dc9
SHA5129a321c24ae56fd5c33e7916216b33c0715c72a89f4bbf53fae483881f68f328111eb96ca7c132faa98bf3b411ed225fa9958665fdd8e72b8b7872426665c5280
-
Filesize
5KB
MD5de4a79b8450191c4671668df843eb5e9
SHA1e015fb4706818cd4b9513811e70561958127242c
SHA25664e33452bc8a15f805b8162e17541905f551b470bc0b744b2846395683f3fd79
SHA5124e656032e1341c1ccd626be07753200e864a0b0f83839582347dbf518fda4d795926ac529c6d6d54a4ddf2ad93f6f47a88060e8990a26038386da110a6edfd89
-
Filesize
7KB
MD52875beb0879e2c79d3a325d6af77dd56
SHA1a8983b089c72ddb16fa2e8512a507b07382fb8ed
SHA2566fba66cb809958b2e64107c24073c3afd71536c6a5df1d792563ea317dd7d68b
SHA512350a1999b389157153fc17c92138c6a81382641b041e254c9b62ed9ae000c1aefe989b940c3845b2b0773934a03745b69c88e073e702a29b4d2664a94f0dff5f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD503d2dfc599307af6a4a7d6dd628ebe43
SHA147f7a823f6f23c7336dd169a8eeb8229bd888baf
SHA256f46dad622f969055526fa1ef16cd8245d995c9969654f91ba8c6857af7c956d1
SHA512e2d0a104bb0c888fa10edcd8dd04cee10f927536365d6130370f4eae7f6cfdc9e010a39b0661f075a23c9533eb05d198c4863a2e4da34d4c8a9e1cd76960156c