Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
94ccc11962f78dac2cf64a9317a1851e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
94ccc11962f78dac2cf64a9317a1851e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
94ccc11962f78dac2cf64a9317a1851e_JaffaCakes118.html
-
Size
20KB
-
MD5
94ccc11962f78dac2cf64a9317a1851e
-
SHA1
1d0817754ee93954b90e519a290b31153cc89a63
-
SHA256
e32c352fc8bfa31a383e0bb2ac8cc0bb3163d24cd63423ef6862165a9c783edc
-
SHA512
2953c46c3cba1cf38c1d9a457b79fabcc1abf9b0e15b1997f0af26712c1faedef818f233acba7dba9fe3d664d204a4ae24483048cb3ad246a4dadd00da031654
-
SSDEEP
384:kKShXfoEtPhjPHILIxvG9kXAPCJd4Xvdv20OJL:kPXfoEtPhjHJIgV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000f8316d6e52d5ba719b6424f227620d9cf74c8bb28ff3fb42acb5414ee80ec542000000000e800000000200002000000057242c66d42e2735dd9fbaa22eea6bb21208eb523ba78b1a14dd7b1938480098200000004e10546c67ed40efe136952c7ab90c3413a0bb9ab68de62c3c1ee9a7542a992a400000005399f81ff2f3a53d349191cc5a4d1d45fc2fb2e2cfdba19f22d1d4027631d9985ea382d55eaccffc10f0394e750a6962d6a30f97d9618f1680f733beb890e81f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A5D61AA1-59BA-11EF-AB0C-4605CC5911A3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60136f7cc7edda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429746232" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1732 2392 iexplore.exe 30 PID 2392 wrote to memory of 1732 2392 iexplore.exe 30 PID 2392 wrote to memory of 1732 2392 iexplore.exe 30 PID 2392 wrote to memory of 1732 2392 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\94ccc11962f78dac2cf64a9317a1851e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b24b5b9b3142ad355326c2f34d7b2ab
SHA1579af555bf1ac8518d563093089354f7c58e0bef
SHA25602eba904993e9388eead3fb3ee965f2724d26e9081fd1506b575175bd1e549f3
SHA5124a34bfd9c25a936d5f7abf3a5d95d2f174cba4ea215b0456ee828c5ba474bca2e3db825fa105d6a18628c2a92b2a7213e45e05008767be991c79ee9eec0b2e53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1988beec6d91c6f9aa29b57d35a5366
SHA148316b5da86120b5738c5182c82a9a0a2b63cc3c
SHA2566c6c7416da006e298845e6bbf51ab67177d14db1d7c6348124ffb2b156d5388f
SHA512f01431586b38c4b55e8160ffecdb6fd3ffaafbff8ebdebd72d7d4107c285ff0a966895c8e6875057b5a6066b587a34ec7a53dcd4545db18bf0acecb90495142d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7f0ec22afc5487503912292c1c66f1a
SHA194afda62814bc922debcef49904db4e949c6ccd9
SHA256d39617020b5406e6efad6106f148cfb49ccf3dd25e21f292bfa39a31068dd288
SHA512db59fd4fd4114584e01e796a5b71100cfe5d05f5e79582800895ce638b2dc7dd927f3812f9e4ab490ef0c9ad0e25dbcd79e9f040dceae300180948528d9b4c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f1bae9b2a6ca0bb7beeacc8858ea61a
SHA189795704a2aff98e235081cefd9a9e69820bd2e3
SHA256c74b2a1846a5a1efaf3cebb7b1b4dbea4907726e8e8d9d936cb6aed68ed41fea
SHA512b0d901bfefe4144bb3865e0c10822108b2cbc5e9d92b22fcf66ed93e09728d5d737fbd9f55698ac092e60a9beb19ea7b70cf86279938212bd4c75628d5323e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d12bf6ab7f36e979e4614353b8d3f01a
SHA1fba8a0da40672010d44e6d917df9ec0217a5b06d
SHA256db9a6753a761d125f744335a506b7709467e95154e4af60320a9b8b4bffaf5cf
SHA51250b2142d020b26a92dec9f300f4961ca58f5c8c43b89c52415b61417ac48634e90475ea04c2cb1a7cc814fcadf58b72d2ab63fb784203ee009ea802cf004133d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591f823a382d3d9708e9692cc2b315e0b
SHA12e4ef04f9105daa71e60bbf2d7dc87c350195015
SHA2563a19f8ed8a503ecff0f9329a92cb080eb8db360914f4aceaa89313134a9038d2
SHA512e4027e812fe4278175cad8fb45eb6bffb6c86c8b74436adb7f18ba714d0cfcdc18f001f8194bb2780a9a086f85be055785a06a9b6a2b970c3ab8731678c83709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f776edcf742a2d48f79c611ffd5f5b75
SHA197e8cc47aa4063be3c04927d73edfddab46db835
SHA256af568ea7bdc90e8c83dd3c028f97bd2d852256bc892e3aad41fe0c0685f761ba
SHA512eb47d2b6ce4a51542e1bd926d1246fefb258db3864244e0424140a231cf78159047fb05c6bc2ff0846fdf0d06ffdc96d2cd51d1a95ee9f19bdf73a6858a04972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b5b89d5aa8c628b17a108b6164889c
SHA1fb24c6697c8408efdd2d33cb25d3a6af6da1337f
SHA256b4ddd2c9ffd560501d7d9d3aea366094244560d7007da293b2eaa16e6a31ea13
SHA5122cb455188102f847180bcfe0e82346fbc98629e35b9706c616a220450b8655df0fb8e0902cf425a90a8f32fb387eeea4b3aa039303aa8f8bd61586eeb1abeb52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed8ff1e01a7f10087f237182ed3e8715
SHA19b4b6f23ef32eb672f16599277a3d6b9ebe1667b
SHA2560a451f9434c47d90e6ba3fd204920ff00fd10b35ef8baabc4db38f8ee5b7e0d9
SHA5120b28c3094fc7ff20b934d29f2078d75ec484b90f8dd8ac2fe104077a1ce34184d587afb4f6dedfc7258031f16f7a5ddc0c92857b809e9dccb54591ada080e78c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535541bdfa45c29f4ac69e33fc1175105
SHA18f9d6237472704e36173c24297da6a7074a8dfe0
SHA256d079c7035d1116fa78df5c5a68a0253ed1d25fe99619ffde7544cab6a109e4b9
SHA5125d18c2a7bfaa29a9672ece12ae6995b93f25696f05a4792d719e284c5b561d9d3e2f0aea54fa6783a31f33198fd2f12082d1333d1a041a3c263a4ef1ad5fa23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a069e3f0b3f5cf1737b38b99a358e4d
SHA1a0f6ae537862817304f8e06977546954fb6bd91a
SHA256c2c6484def2a8aaf790714457e8fd36f498af8eb14c244cd27144f448a49f054
SHA512d118113bbc9045edf41623ad1dfe8c56fee3c4ea43d3e8ef2855f6aedaee756ed0847bac845fe6a1e54fa357d297cfe9de1dac3089957f2a384708e3ec18bd82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a620b62ea17c0c35e526896b426d7013
SHA1bf17d0f1d6fe1a177ced1c7a12968a78116848ef
SHA256c72c2c593611fb20834f6bd1571496da9995ee37d602dcafbc6b6b52f3509479
SHA512e3ba2ebcaea79977c8d1647909976829a74d7b1228c25db60a75726541bea8936da779c19cbb1edf626787656ebb74a553a79e152ab0b7d8a10a23f5644339b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b910c8ccfe9df05737893c01b7370c
SHA1a5599a5967b1ff08fa20a41d47583cb3c8c69b92
SHA25651c7b0fc9510e7dd348c6a912dcacb9064e16ca4d121561d5f4f1f4788bd027a
SHA51294300160f9f3fd6d3e781e53b8d2c6bc7f05df95e741762826dacafa9d88c80ba137185d5aa6a4ab46474551f453c71d55c87c9462a0fbd0ed1a61fd958d7317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5140b5a7d6ec0313cd9681041d27b82b1
SHA1d51c21fe053f415b4b38577ea7647caf034a3d7d
SHA256f85bc389c3b8cde1cb6631fd189864641f578c9c3d861894dfd46975d7976b76
SHA5126c311d5b0808718d9673c881c85557f4f605db4b2d18f7b714c0ff0b6b3b1042e0e2af96a9b0e9fd6709d027ffb46d702a9ae557938608917633d4ff88418f43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e35793bd045481702051e809c3ce9e0
SHA15922d246ed066d22a8cb526a46191523eef09459
SHA25626b1f49e16a3bfd7e0a644891040cdb0682d9dbd710cc78d20aefc6622e3be3d
SHA512bca5c7cf838f8090b948c70c48528069791c987dab82e4c5f601e1c3e83405b7271a27c8ed805d34d89f7566ac9ff4a71869426d8a993fe523b84dece2ceba6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53826bed5d65af449b0b2f9867950d7f3
SHA12c4d38dc8ff548ddef8201bf5cffe48c2dfcb268
SHA256c3bce8e95ca96c679bac39db40beaa2713d5ecba6285f68a53d65ee34bb5eda6
SHA512e682d37ac110cebc33e0045ea56eb591399f941e4cfd0f5822a9b6e753e4624c62eb9fd833e160a9b5ae78f51d47b5a1a079a67f9dfa4dc2f351afd7babae7f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efaa180d12d046a218971c5ce14f038e
SHA182b5dba9410a012ba635ada287cd14147da88e67
SHA25655633d45d57f8143f08c41dde4da91f8a5f2a01f69428d432593adeb406fec46
SHA512ae5afa0e7a1828c34f107b31984a9b3a3b947fa12a531720edfcb3b42e0e1c8d08df383551973062551730475959e2b4367d21c58475ffb6f73a202879c0d261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a312d59d496be41243d830c3c4979a3
SHA106d77253d4325199738a8ce08276f8acd614b6a0
SHA256148f452d8fa7f5c741701aca8c99d97246bc9505c9c94659b542dc7afe41fdf9
SHA51238aaae26297ef374e3426c05c78b131a91f8a9d06e54e5f1941af0056eb81e2f5977e8f3c88c78e2bb993efa55c3835d7e080d8f5c72adeecb51cc4c5802720a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514d5a9b9d522bda25f472a17e630d8f1
SHA18a42634d3cb2899d5fb6be16b0682dc51dc7b8c1
SHA2569688c97f7ae738f1c89d7051508136737b3a12e348718f027f5c2a4b61869b55
SHA512972464d484281da0ca19e92b04ad151b9e31e081c80b045ae48bf3cb7b6d38f6b533ab60324bda79dc84f1c477ed904445931aa1848d210389057517c3d31416
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VCY0HBA7\m3[1].htm
Filesize781B
MD5b5330bf18d5f50bfebbbcaaaa0c0901c
SHA16b5876365b6ccb8a4dd03667f5ddfcca38be4186
SHA2562b32aafe38b88d72f635371df07f778e238f0294ffcfdc14bffc1e10a42fe886
SHA5128e870e37efbbc3fc656fb28099bf8193ae9f2d8409bd5e2c811ec5ea19b4341fac540084826b5c271775a6afa0a9109fd42af1169feb3397a08aa12a6e5ac1ab
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b