Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
15dce7093f8c011c2be66499909ac353_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15dce7093f8c011c2be66499909ac353_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
15dce7093f8c011c2be66499909ac353_JaffaCakes118.html
-
Size
56KB
-
MD5
15dce7093f8c011c2be66499909ac353
-
SHA1
692b7a56b83955147d6fc8f5cbf2dc251ff98e04
-
SHA256
6461c8021821a0f0d01ed89374fca7614bf6d54fa41d30f43a930235f9f1ca27
-
SHA512
09a59ac76b1a87b4bebd251c2dbe9c61b39aa2252ab7b8f1b59a2cde19bd0d988e06064a8b78fa0862b3aa4dcad264dfb4535b07d7658f81dffc10d7e50d6272
-
SSDEEP
384:Au63Krto0lNWsdg8BKNRIVDDpTGITHWWZEelBWqSNZE7GKNRwNHkXsWaGCqd68s0:nlSSyspwix3LHMzxjX0pL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 5032 msedge.exe 5032 msedge.exe 920 identity_helper.exe 920 identity_helper.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5032 wrote to memory of 4928 5032 msedge.exe 82 PID 5032 wrote to memory of 4928 5032 msedge.exe 82 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4356 5032 msedge.exe 83 PID 5032 wrote to memory of 4420 5032 msedge.exe 84 PID 5032 wrote to memory of 4420 5032 msedge.exe 84 PID 5032 wrote to memory of 5028 5032 msedge.exe 85 PID 5032 wrote to memory of 5028 5032 msedge.exe 85 PID 5032 wrote to memory of 5028 5032 msedge.exe 85 PID 5032 wrote to memory of 5028 5032 msedge.exe 85 PID 5032 wrote to memory of 5028 5032 msedge.exe 85 PID 5032 wrote to memory of 5028 5032 msedge.exe 85 PID 5032 wrote to memory of 5028 5032 msedge.exe 85 PID 5032 wrote to memory of 5028 5032 msedge.exe 85 PID 5032 wrote to memory of 5028 5032 msedge.exe 85 PID 5032 wrote to memory of 5028 5032 msedge.exe 85 PID 5032 wrote to memory of 5028 5032 msedge.exe 85 PID 5032 wrote to memory of 5028 5032 msedge.exe 85 PID 5032 wrote to memory of 5028 5032 msedge.exe 85 PID 5032 wrote to memory of 5028 5032 msedge.exe 85 PID 5032 wrote to memory of 5028 5032 msedge.exe 85 PID 5032 wrote to memory of 5028 5032 msedge.exe 85 PID 5032 wrote to memory of 5028 5032 msedge.exe 85 PID 5032 wrote to memory of 5028 5032 msedge.exe 85 PID 5032 wrote to memory of 5028 5032 msedge.exe 85 PID 5032 wrote to memory of 5028 5032 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\15dce7093f8c011c2be66499909ac353_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbe2f46f8,0x7ffdbe2f4708,0x7ffdbe2f47182⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,5573998922412089443,6723055821497981462,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,5573998922412089443,6723055821497981462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,5573998922412089443,6723055821497981462,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5573998922412089443,6723055821497981462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5573998922412089443,6723055821497981462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5573998922412089443,6723055821497981462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5573998922412089443,6723055821497981462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,5573998922412089443,6723055821497981462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6200 /prefetch:82⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,5573998922412089443,6723055821497981462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5573998922412089443,6723055821497981462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5573998922412089443,6723055821497981462,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5573998922412089443,6723055821497981462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5573998922412089443,6723055821497981462,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,5573998922412089443,6723055821497981462,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD53c875c67924569e25f882e5e12ab8336
SHA1d79ce78215dc4e6ca0b5ea113a0eb7ba485c69a8
SHA256bc9d4582f7f35a216eab176c1cb618e696157a4a4fb29b26cc1a88049ac9d3b7
SHA5123a5a124fffbf3a3728a4b19f538cb9a224a4330612e7e23c496a56a3677f0c8fc9f8d361a9364cab99867c337c2cf81077ed2e4884d0935e6d85d8c64ab7511b
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD579ef16f1009da28de7869a5e561ff1dc
SHA17979cdc197f225e4e3e1f09f20315d487d40abac
SHA256742946507370ac03f8e3604abb5a7f81776b4203d0e6534e2375b3a9c5131ba1
SHA5125837d89637482cf0b8fd51e24e92b6d1f7fb315a0487d7b897fda227a4d20f5ca18ab3f217074c9e8c966d73847a91d01574670135bffaee62e162d39d9dbeeb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD56a93b4241c4ac78a8f53485d2e9083d7
SHA1e1930ff332db7949d97b63242ca007f594b4f527
SHA256360d0071e6bed9cc39f82177a317dd622727bb327d31ab5bc054196bdb1117c8
SHA512f314ee5a48d6eddb4379c9f8ae9a802f34286c24fe0363923e54d201afc6de83dc825831cf51fd125d18b5e6de20c10c24d22b9b6458acb42733b40d47b943f7
-
Filesize
349B
MD536a14dac89893ba319aeedac99efdbfb
SHA1795e1829b8d7b0cbc51eaf1d93997eb118b8e834
SHA256a1a4c5a46800197ea1f5bacced332f17f6404c4501ad4f9040082e5bad7c6b8f
SHA512b165b7052fc25cac54db73124996f39366ca2c08fcf60ae29f67b2dc7fc52c53479f04afa4d22b309d80e4a81c1e1462f04325cbb4eb422aeb2b784a5e28b8da
-
Filesize
643B
MD5560daca6977e7e171d3cd5aeb0fc6dbf
SHA18d535e73e5ed7ce1df0bc788840438ccbd2f3a49
SHA256f84bd545ea659122bd5a6be7f85f31f3cb7322e097849c7fc57bab71826771b9
SHA512a9c35be2ad42c06d9fe49a2d49ce94e8b4ae42b87a4990ff765813b1c6bdcfdd62a53ccbfb4e640f5a1f0656795dc21fb35914d13156056b625d9497d86fb7d3
-
Filesize
5KB
MD5357efac55bc00f315dc1e58905c80f3a
SHA11eda337592d210178b6eaf1f2d1bc9d9bd920544
SHA256df3e09fbae1d5b4099d0b4e58c9a09a09c4e7de3bbc1633944f5d2f50eab0789
SHA512be65c70bcba142b8d17b65ec81e6ac0f6eb107fd892182b11423c57f1b2183628fb29ac9e182e57a541d8de01bc9ba5258da96867a56cb33c0aa1c0a3ffc0408
-
Filesize
6KB
MD50e04b0a7debaa866dfbe96d1f6457166
SHA1c3503898fcb361b421f38f8f574737d2eb550d44
SHA256e66dc044983b1f526dea0e36bdd8f285dd6d6522110149032605fad2e855add3
SHA512cf28c9f8de2f1a19567bb45de5690ad85eda09415864366ea810bf1a210f57fdb82b248c046a2e2a76345e6c47cc6f86bd7bfc9511e5772dec0ffe031f6f1481
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145