Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
d564c640c9c5d31052dba0e0802952b9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d564c640c9c5d31052dba0e0802952b9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d564c640c9c5d31052dba0e0802952b9_JaffaCakes118.html
-
Size
57KB
-
MD5
d564c640c9c5d31052dba0e0802952b9
-
SHA1
03fe5602a78e40220d07139a5042a0b36e67e737
-
SHA256
42038514c91753cacba655303b7d2afaefe56fee750b8b5b1982bd44da047c99
-
SHA512
359a717479b14e794d8a32e58a6914b3e2b8479dfa44a81fb7b7c98ad2488599714864efd69f88f7f6030abcf5a808bad6790ff4c906ef33feb440cf99ce1e02
-
SSDEEP
1536:ijEQvK8OPHdsA1o2vgyHJv0owbd6zKD6CDK2RVrozwwpDK2RVy:ijnOPHdsR2vgyHJutDK2RVrozwwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1304 msedge.exe 1304 msedge.exe 3256 msedge.exe 3256 msedge.exe 552 identity_helper.exe 552 identity_helper.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3256 wrote to memory of 4708 3256 msedge.exe 83 PID 3256 wrote to memory of 4708 3256 msedge.exe 83 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 3280 3256 msedge.exe 85 PID 3256 wrote to memory of 1304 3256 msedge.exe 86 PID 3256 wrote to memory of 1304 3256 msedge.exe 86 PID 3256 wrote to memory of 384 3256 msedge.exe 87 PID 3256 wrote to memory of 384 3256 msedge.exe 87 PID 3256 wrote to memory of 384 3256 msedge.exe 87 PID 3256 wrote to memory of 384 3256 msedge.exe 87 PID 3256 wrote to memory of 384 3256 msedge.exe 87 PID 3256 wrote to memory of 384 3256 msedge.exe 87 PID 3256 wrote to memory of 384 3256 msedge.exe 87 PID 3256 wrote to memory of 384 3256 msedge.exe 87 PID 3256 wrote to memory of 384 3256 msedge.exe 87 PID 3256 wrote to memory of 384 3256 msedge.exe 87 PID 3256 wrote to memory of 384 3256 msedge.exe 87 PID 3256 wrote to memory of 384 3256 msedge.exe 87 PID 3256 wrote to memory of 384 3256 msedge.exe 87 PID 3256 wrote to memory of 384 3256 msedge.exe 87 PID 3256 wrote to memory of 384 3256 msedge.exe 87 PID 3256 wrote to memory of 384 3256 msedge.exe 87 PID 3256 wrote to memory of 384 3256 msedge.exe 87 PID 3256 wrote to memory of 384 3256 msedge.exe 87 PID 3256 wrote to memory of 384 3256 msedge.exe 87 PID 3256 wrote to memory of 384 3256 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d564c640c9c5d31052dba0e0802952b9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa08db46f8,0x7ffa08db4708,0x7ffa08db47182⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,2156256309691520038,11061409285853077339,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,2156256309691520038,11061409285853077339,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,2156256309691520038,11061409285853077339,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2156256309691520038,11061409285853077339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2156256309691520038,11061409285853077339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2156256309691520038,11061409285853077339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2156256309691520038,11061409285853077339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2156256309691520038,11061409285853077339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2156256309691520038,11061409285853077339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,2156256309691520038,11061409285853077339,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5928 /prefetch:82⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,2156256309691520038,11061409285853077339,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5928 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2156256309691520038,11061409285853077339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2156256309691520038,11061409285853077339,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2156256309691520038,11061409285853077339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2156256309691520038,11061409285853077339,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6364 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,2156256309691520038,11061409285853077339,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD50e22599270ed11a78b42a53f0d5a15b3
SHA1977c198af9363e42cd5a5627b1cd8c7dd9af1285
SHA256ff4dbe7ef24980743bf155e966c341c9bc6d63486676023935d548c90f81076d
SHA512968bf43f077620763158c725a97772a178de288930e0eff20c111cc1d6d6bd69f1b52699a2f1350c5ad3366e208447712c342c196279c00d48240cef0b71628c
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD58d65de43475530539d28ee4b1e10aaa2
SHA1b28d1e6ebd1fad55f267e4267f4cc9da1970fe37
SHA25677f4de33c8fb19e497e90416bcc7e609f282ae23d7963a50b1a921de83c6f6c2
SHA512702276ef3689da979331cdcd7c6b7503b76952c083c2eb44906c6e50755cc2024d67623633448e42535faad346bf1e10d67dba18b75a59f730d9d86e05ccab62
-
Filesize
1KB
MD5378cfa660d458687ae5f25c15e3d5995
SHA1532202b136b51ebd0062a7c419531bbf80189c8a
SHA2569b26e00ffe05c9cd5d94869af8f8c6ea0489003ecda035a94eee45dc2c3547c3
SHA512cbe79c216e78e08746028b6ef8cbfe9d3e5521405e1f3b9425016ecade2d3634a0ed25a0954774bd1a933cdc1e017cf6c8ccd02900cf6d5cf1cb4c547b2047c8
-
Filesize
5KB
MD5ba963856a019541aac1be65391cc8311
SHA1cc55cb17fc8947553d396ae779902dffda171dec
SHA2566c3eb8bf8b0b24353cdb6255a5cb813054659b697c9a93a7f29ea07967e88382
SHA5125c7e3e7b054d43042a19c1d3029f66595f967fe18af18369a74a087cb41df67154b0eb6ddd280b4f32e4655e425567ede253d844b82f8971dc116daec1bb5d6c
-
Filesize
6KB
MD586668a5ed37f5daf54c777edade0c918
SHA1cb916ed3b252fe4f07469102f02eb68a850512ca
SHA256277d04e4ce8f2c461a1a69267cc057b1221e4757de7aec0a1ef745c8fcb5fdae
SHA512bac3b0854cf90bb222d38368b1948e8f66729e2d8d1ffd15fcf4ad3950a350bade752675cc046ed282a411d5fc80f45eed266cd2a975767ee3ad027f3d336ac4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56c8f8045297eb416a2ddca014cf214ab
SHA1a9f6eabfa4193dd909e42edd9c12bb2681efeca2
SHA25637e707ef9e743a70d222410979944c90e14abe5d7cea47f3d3266cbc0b5f68ba
SHA512b347b24dc3e4c9f492a36ff090cf1f61516c80f045e97c01628041a6c655d257e44c01de775bbe1f0f0e18199bb0e3cf4dbebc640b3465e942f752f0a799a7ad