Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 15:02 UTC
Static task
static1
Behavioral task
behavioral1
Sample
aa5068187fdb62cdb20ffbf5af42a4aa_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aa5068187fdb62cdb20ffbf5af42a4aa_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
aa5068187fdb62cdb20ffbf5af42a4aa_JaffaCakes118.html
-
Size
9KB
-
MD5
aa5068187fdb62cdb20ffbf5af42a4aa
-
SHA1
9f7df7b0e2e0f5cfd5d505df36ff94d6a0a90d36
-
SHA256
56e721812d82bca66f59cd79eea38dcf06426dc5aa04125bdf8df46ce4c92530
-
SHA512
329d8017cfcf17675a46ea4d0d60ad0254073567e3555587dfca66d8a6ae4ea78d40e84f4c5142c72df2ec3819fe10b93e66693dcbdf4d54571a55dcc6c08b2a
-
SSDEEP
192:/Yl6zOjLOTciZLViVvO/jIBh7ix/Cbqq+:HzOOT9ViVW/jIBRiobqf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1796 msedge.exe 1796 msedge.exe 4400 msedge.exe 4400 msedge.exe 4116 identity_helper.exe 4116 identity_helper.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4400 wrote to memory of 4276 4400 msedge.exe 83 PID 4400 wrote to memory of 4276 4400 msedge.exe 83 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 724 4400 msedge.exe 84 PID 4400 wrote to memory of 1796 4400 msedge.exe 85 PID 4400 wrote to memory of 1796 4400 msedge.exe 85 PID 4400 wrote to memory of 3688 4400 msedge.exe 86 PID 4400 wrote to memory of 3688 4400 msedge.exe 86 PID 4400 wrote to memory of 3688 4400 msedge.exe 86 PID 4400 wrote to memory of 3688 4400 msedge.exe 86 PID 4400 wrote to memory of 3688 4400 msedge.exe 86 PID 4400 wrote to memory of 3688 4400 msedge.exe 86 PID 4400 wrote to memory of 3688 4400 msedge.exe 86 PID 4400 wrote to memory of 3688 4400 msedge.exe 86 PID 4400 wrote to memory of 3688 4400 msedge.exe 86 PID 4400 wrote to memory of 3688 4400 msedge.exe 86 PID 4400 wrote to memory of 3688 4400 msedge.exe 86 PID 4400 wrote to memory of 3688 4400 msedge.exe 86 PID 4400 wrote to memory of 3688 4400 msedge.exe 86 PID 4400 wrote to memory of 3688 4400 msedge.exe 86 PID 4400 wrote to memory of 3688 4400 msedge.exe 86 PID 4400 wrote to memory of 3688 4400 msedge.exe 86 PID 4400 wrote to memory of 3688 4400 msedge.exe 86 PID 4400 wrote to memory of 3688 4400 msedge.exe 86 PID 4400 wrote to memory of 3688 4400 msedge.exe 86 PID 4400 wrote to memory of 3688 4400 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\aa5068187fdb62cdb20ffbf5af42a4aa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80fb846f8,0x7ff80fb84708,0x7ff80fb847182⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,5574916694688873941,14552578251204871733,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,5574916694688873941,14552578251204871733,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,5574916694688873941,14552578251204871733,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5574916694688873941,14552578251204871733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5574916694688873941,14552578251204871733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,5574916694688873941,14552578251204871733,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 /prefetch:82⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,5574916694688873941,14552578251204871733,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5574916694688873941,14552578251204871733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5574916694688873941,14552578251204871733,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5574916694688873941,14552578251204871733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5574916694688873941,14552578251204871733,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,5574916694688873941,14552578251204871733,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5052
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requestwww.carringtonarchitecturaljoiners.co.ukIN A
-
Remote address:8.8.8.8:53Requestwww.carringtonarchitecturaljoiners.co.ukIN A
-
Remote address:8.8.8.8:53Requestwww.carringtonarchitecturaljoiners.co.ukIN A
-
Remote address:8.8.8.8:53Requestwww.carringtonarchitecturaljoiners.co.ukIN A
-
Remote address:8.8.8.8:53Requestwww.carringtonarchitecturaljoiners.co.ukIN A
-
Remote address:8.8.8.8:53Requests.w.orgIN A
-
Remote address:8.8.8.8:53Requests.w.orgIN A
-
Remote address:8.8.8.8:53Requests.w.orgIN A
-
Remote address:8.8.8.8:53Requests.w.orgIN A
-
Remote address:8.8.8.8:53Requests.w.orgIN A
-
Remote address:8.8.8.8:53Requestwww.carringtonarchitecturaljoiners.co.ukIN A
-
Remote address:8.8.8.8:53Requestwww.carringtonarchitecturaljoiners.co.ukIN A
-
Remote address:8.8.8.8:53Requestwww.carringtonarchitecturaljoiners.co.ukIN A
-
Remote address:8.8.8.8:53Requestwww.carringtonarchitecturaljoiners.co.ukIN A
-
Remote address:8.8.8.8:53Requestwww.carringtonarchitecturaljoiners.co.ukIN A
-
Remote address:8.8.8.8:53Requestwww.carringtonarchitecturaljoiners.co.ukIN A
-
Remote address:8.8.8.8:53Requestwww.carringtonarchitecturaljoiners.co.ukIN A
-
Remote address:8.8.8.8:53Requestwww.carringtonarchitecturaljoiners.co.ukIN A
-
Remote address:8.8.8.8:53Requestwww.carringtonarchitecturaljoiners.co.ukIN A
-
Remote address:8.8.8.8:53Requestwww.carringtonarchitecturaljoiners.co.ukIN A
-
330 B 5
DNS Request
8.8.8.8.in-addr.arpa
DNS Request
8.8.8.8.in-addr.arpa
DNS Request
8.8.8.8.in-addr.arpa
DNS Request
8.8.8.8.in-addr.arpa
DNS Request
8.8.8.8.in-addr.arpa
-
430 B 5
DNS Request
www.carringtonarchitecturaljoiners.co.uk
DNS Request
www.carringtonarchitecturaljoiners.co.uk
DNS Request
www.carringtonarchitecturaljoiners.co.uk
DNS Request
www.carringtonarchitecturaljoiners.co.uk
DNS Request
www.carringtonarchitecturaljoiners.co.uk
-
265 B 5
DNS Request
s.w.org
DNS Request
s.w.org
DNS Request
s.w.org
DNS Request
s.w.org
DNS Request
s.w.org
-
526 B 8
-
430 B 5
DNS Request
www.carringtonarchitecturaljoiners.co.uk
DNS Request
www.carringtonarchitecturaljoiners.co.uk
DNS Request
www.carringtonarchitecturaljoiners.co.uk
DNS Request
www.carringtonarchitecturaljoiners.co.uk
DNS Request
www.carringtonarchitecturaljoiners.co.uk
-
430 B 5
DNS Request
www.carringtonarchitecturaljoiners.co.uk
DNS Request
www.carringtonarchitecturaljoiners.co.uk
DNS Request
www.carringtonarchitecturaljoiners.co.uk
DNS Request
www.carringtonarchitecturaljoiners.co.uk
DNS Request
www.carringtonarchitecturaljoiners.co.uk
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5d522e1ebf07d2db4661e230060f1d1ec
SHA153e91d507e3305ebb72b3cb27d4c0521232214ef
SHA256d64f079735d2e205d7b48c3e7d58c7c532b787678af3a80a24d654ddf24f0408
SHA51271a5da044f9dc528ae23e4a24a1bbcd5300492da3bbaffc5b68b656abbac9d44d10f0f062a8387434fa3a6e834072c90d7e4a827bb21df0a95fd87bcad370874
-
Filesize
6KB
MD539b8e48cd6424e39ca453fc9e7381496
SHA143851f96bddfad6864e89c34ae795a2bc0f56135
SHA256c6eb780573e91455b2684fe61fd7e46c555aed2cb9da52efee8a4feeab8d0c62
SHA512fd3c94e300659dd3c05b0a800fe5336923c24372f5fae668aa5637adf90352a0f10f9d67fc81e6f67f25ac3929c268ee0b3c1db3d6bbf250fb0d377923eb1a3d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD55ac06d0e0e02931531355966c1a0bf00
SHA1fe1b7b49d533238e078e30e110a4d3737e20e881
SHA256b8398afddc4decb9a3f7b2ab93ea89a5736297baa38ae7312ba4653c68ad46ac
SHA512d46e795100da953065c4ec78ba6f92ae4f19dbd4fa5bd206a4b8789fe5a7c5d41df9cf269a8f4da2642d82712ed6e2afc1cb63d179735abeb5b4ef382e45e782