Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
b51e64d0ac213c780a82bd02ac1f737f_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b51e64d0ac213c780a82bd02ac1f737f_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b51e64d0ac213c780a82bd02ac1f737f_JaffaCakes118.html
-
Size
34KB
-
MD5
b51e64d0ac213c780a82bd02ac1f737f
-
SHA1
64bc0549c91cc980888774fe7c23a3cd7e28ca35
-
SHA256
5a834886541e55bf4ac4531322c5fc626d0ce7f6c49ca9d205a1deba357df4e9
-
SHA512
d6e03dbb0d752a97c34d86da14a2b4b46de74d6513539885f27e26e752d2f7220e067a296507d8302133063eeb80e20fc7d69a17c4c3d6077e36d106305f4702
-
SSDEEP
768:KSFQW81D4RA+vEOjz6rdG2Gil54RZfPGnf3Gu34aji6781DdRA4vEOjq6h8aRlRV:jFQW81D4RA+vEOjz6raAhIa2C81DdRAY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80468d402ec0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424732616" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6943F921-2C21-11EF-9FC8-F6C75F509EE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a039050000000002000000000010660000000100002000000076ab502f85ef2296e5616b29d49293960bde6add3aa98d3ef34fda4acd2a1ab2000000000e8000000002000020000000ce9ec5d4200ee69432e206ad5a54cc76edf3418e67f60e3aadbb9b58e79bd82490000000f1fdc015a134f7f9a7bc8afd1e5088687b582bb47e79466e9539ce9afc3fb17dfd17dd27374fc469f3eb640aba2ef5836ffc55c2d6cc0010db9352355da913c34ad1d251c39ccd2a03a4b4e1ebc8e431f6a0a885e2b3023a7afd3fc76d729373f590fab301f4ff561c7879b8155b1d79f05d861fe7861c2e51553b687807f2ff16dadb755ea5178147863d719b2bb9a7400000003806efcb78190f6e0c5d8153d412b4d9517da08b79d27a8ada4fafc2c987d6dd435d95ac26658835a389d7dba743c963262548b7cc4f041a5331fb4f77aa3e37 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000dd4d84879f9ac584fce82bacac43ee3b513935498acf8ba04880a8137709476a000000000e800000000200002000000069afd20a93cb508f18bde24e1fd01efa31b2b94908d7cba5c0fbaf1cfd66442120000000fc8978577087202804094870504b79c34a142df6cbec8b5931de9dfc27880cb84000000051f77316ea7303df77e8cd89296f6144b4ef31ab3792ae349c94adadf136b31641593a823563625ed147b04b848562ed5fc71c51a827c180e75ea1ec6e6cff72 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 iexplore.exe 3036 iexplore.exe 636 IEXPLORE.EXE 636 IEXPLORE.EXE 636 IEXPLORE.EXE 636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 636 3036 iexplore.exe 28 PID 3036 wrote to memory of 636 3036 iexplore.exe 28 PID 3036 wrote to memory of 636 3036 iexplore.exe 28 PID 3036 wrote to memory of 636 3036 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b51e64d0ac213c780a82bd02ac1f737f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b14e3a6117534c51be5c0b23adc6bccc
SHA15fdc64b25a00bf2461994363c96c04274896cf67
SHA256933deac6544132454e64c4ad61f8b15c4e2b2bfa75194040536bde0030da66dd
SHA5128028d4105be1338da07f210d83f4219fb4e526e9aa81f64334a84fb9466f94ccd21d82bb82e9bce88ccb19d1e9e4384984f38b58d63e3ee96dc2da98812cd652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd7d5efa10cc6ce2d293d418c38927fb
SHA110008d324bb61dac76b5d1f0c049d994bfc49b58
SHA256e1ca6ab2511f0478cfffe47d1fd1a29d21fedfb1fd6783c9c1e2bc53035c29b5
SHA5125ef656b3c30b75127503e9ff9fc272d0c3a8558feb4b4d21a3ef9954cbce9118bd67514d6a2ccaa1fab35606fccafbc3a45c018bb3300cb06513e73d55f45cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fc415b4212962bd3ef2abd24afb3bb4
SHA1a5bdc6eec9936b6127fa14bd707fbee295ea3aba
SHA2565272cbbf73f7e1d84363b7afee61e88ba45cca5646b00f4c96115db4646516ee
SHA5127b3e2b17eb80c3c5291de3d4edf505c62db2d9ebe5ca44b3aa2aed0bf8f62da58a9272321f6825fcd0013b41ce11061c5f04d1481add1721fd97e283493d84f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506e32d1aaf5b4f5e6029b168188e066a
SHA1236e31469832f0bec2bb2616cabd0bba0368e418
SHA256dd6288f177b3163e6fc40e467c6e639c9636d3039db2ac47efdd21c62828ea0b
SHA512a1c2c7659323fb1a0d37517a93b4a898a8ec78004262f3a7a781b0cd2dfe75fba6af0bd2621d669783a0746fa96a2b41bb001baf8eaf08291f12c1c2961cd1ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f449219c8d96df7da0b3d5451f9cc19f
SHA19fb26ec3b36953327d6794c36bdd2d2e33952c2e
SHA2563bad06f1b202ff58e840ad4650bd64d9f0e2ea09c9fe01944fa99fad83a0313d
SHA5121117da1707008101994747770c95f6d95ec332b69cfff35dd118a4545deb523559c745e00bdb3d69733bdf7ac1e8da3d8b7e75a7e874daf02f5dd466a6db3f86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b253ba726e2684fd1456cd5c1f0048af
SHA16d1d973a9cb2f4feeb40ddc3db943fd68d9b1f28
SHA25613cfef8c724f4e6f0d80f80408d72ada686173f9ec55cf76cc0fd11aa78872f1
SHA51227512837ddfd36979ba698ff1d07cc5869da9b313a19206a878f93491a24f67ef9cf4d28926874400fb3c38fdaa7f186bf6a7ddfdb886e0af54872b884571aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55496a9763f181b2aca6d6ef4e484b311
SHA1385ce255530017ced6f4b5749f5c8e3850160ce6
SHA2567ea002a01589225ec3bb5e21a0b57b686fbc4fa704015cb170ca7d46b7ea81e4
SHA5121e4ad7ff1c262ac4b77fc98987a23a55614379ce6dff5d346e7f40634472814e6033de3fc2d0e6020cc4564b8fe75e9139415add881f3a499bb589901ff2b87d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edff441b13fb868dc429f6a3c20c5a9c
SHA1e41b953f467ac3fefcddce8dfbaf8496e6d4a6e5
SHA256de3f961daa7858671849247cd0347789200e03222b9643c72faafa03462c32b8
SHA512d7a304ead7c757eb8c5b6b4c58bb13c2c930deb55894a0b817a9fd742064e8716203f031bb063e253524b9a6e6ead74677aea621abb6065616740b4158d4507f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2a3b35e2bd145890f49165fdcd0d1a7
SHA1ead9bf9406f771fe24ce179ff1aebab696a6c4fc
SHA25617690ad5ad095f8f7085b020d6e0dc90abbd2e213c1dafb514a457c0990e4fd6
SHA51257a5fe992dd150c1bdd05f47ab370e38a9f2af6e305e29e737b314624b55b6d88143868e657e6b5e31397c2126639153311ce83c1adab54b46553878ca45a3fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b888b266d572f2c08d7c740d19ab6a4
SHA13e259f067812476be1e0c3a0dd50497f6ead5fd3
SHA25638fc13706d4d2c3b24bd87884ccfeecd1a5ba73231818b3fd99baf3e51f61606
SHA51286ffee71708937d00a15c4f893e6d02a56169d0ceae8e93e160c5f9a3338eef28555bef6f95c3962864270c7920c1530bfccb9917414f61bcea1629e4a2939ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5209a3409005320257cb6f1446470bc68
SHA17007f8b13febb87eadc34ab9dceadfb001f43397
SHA256da60707cc8666fed8dc62041c00171b763b02d3545cff62a8d6ee45ae05cc00b
SHA512edd1c1a036c5db75c92749c6673cd7fbea636d8a34eb96eeff74b0281c4c5f81a09bff003e29eb136d5545347d3e4dc434285d352edc6285bd054ddc396f73a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4855599d1ea3940089f0b2444a6daa1
SHA1eeadc728026025ffb3ec75cf4512344075dc4c38
SHA25661c4b9e07fad0a4b9822b0c63d3fad5f5ed05a2fdb979a08a0b43542ec31a1ba
SHA512b7a232064dea3643cb840b00d663583dc4d73acb675b21ede59bf400a630cdb3dc300331de4c80e775a62763595a8696f527cf2894f1c621c01d75f52e1a5ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb6695d7a3a2f42a0fb967979871e9e1
SHA15fc167db9e29f92898871664285da3c611fad113
SHA25613d871de08f4bde079863541b16e38a0172f416be3eab2e20c6173d650bb5e61
SHA512ba6e41917e4377622e66a15d38a20fcd8e0bf8b480157e42380afb9a5c7d485199836d8956462340f9b9af67ce25335760fe33fcf49b3d3cb1a3e3f2140e1299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbcbd2809ae78e702abca39f6b65d594
SHA1e67ed7fba8dbe1179ec2b5e1a7329bd4c616fa46
SHA25688c28b07bbd7eb1311b184291d69a9327e56366d739814851460353bea611feb
SHA5125a754f195b6510048876d6d92424bbd8c979e93d21286fd65dbc37c1d5902ea53ad94775fcac2094e77d2c3a475a6845e499b67cf29527041b93735d77294bee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c78a3be191939f62d6426df20f3140e0
SHA1e5fa3473ae8452717f744043d19785ecd0e9bf25
SHA256202fc02a340068d98da2e541afad1cb5dbbee4bc5bb43fa46e9e78d6a16960fd
SHA51214e2a5b13d98b2a2f7855d3a0a5d088a45ddf02e27e9c1544c365e5da5baea6d6119181decee19889cdd68c3bf1b420540840842ef9266db78f213cfc260627c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5544c0790189e922356d00d556be502c9
SHA1d9a7972bfffa7589f796bea8aeb8acd09a9aa054
SHA256d7ec6dc0a485b993bf17f206a8b5e5a2c1715645cbf691b4f76822535755310a
SHA512c45063c667dad7ffc9e6ef7719b5429d0ef1e7b483de32eb0172e1c0a749a10f83624113ac34f8996d9bf29e03cafb13bf1b791f1307f81941b6b90cb5754a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfc11ef4ae6ab3b21ccd3dfe265d34d7
SHA16ff2419f5ad6b00416ff9097fc894fa4a87c827a
SHA25600974f6a0f3af8dd8d13a67f175fe7cd00b21ea481feead0817abc2846d01084
SHA512423caec57d1782d2b6c5166c240a48404fb858fa1f0dfc0bca515e466312f76d9aad39eb69dd237a10bd7405daf6e89883a90edd140e7a41837171ae0205aa6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4be07c35e30ca535ff92ae3709af7c8
SHA1e71a359ff14beeda01cca8ddcc6a2c0e91fce0c9
SHA256da857ecd138281895c61a93902e79e5be52e57c440229060c68b1d869a5e3ac2
SHA5125234bf2398188519c22b4d798238a5c490fec41cae0d43312fe251152e8c933e4648e86594066f69c5f959dc9fd1eac7d0fbdcabdb5d0f219648617d636af76c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54113da752c71a68f5354739e77000f9f
SHA1f873902bfd164520c82503135065050228405034
SHA25686981ce76e288a8328fb3c13f03244e99d07b98f6f54b6ff5b2daa670bf54303
SHA5126994b0943cb68ed4bdbcfe261d4fc6f5b99c5d6f9218fd499f6db300ccb006dc22c85d90c434581eb15c72be486b3797f2966505af5a6d68bbbe5d2b56dccf15
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b