Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
0e883cfe5982b96d263abb7ab2b97648_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0e883cfe5982b96d263abb7ab2b97648_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0e883cfe5982b96d263abb7ab2b97648_JaffaCakes118.html
-
Size
323B
-
MD5
0e883cfe5982b96d263abb7ab2b97648
-
SHA1
a1a5003ece0a2873e605d4e09052506b108baed3
-
SHA256
cb4b6f97bc6696ce0a579ac617a3ef838482b6b21c64f7b0acdbf08e5f1ad9ad
-
SHA512
2f2037b08163f9cd0c1deab4cfe2dbaae147df33c727d479a10912078eb448790c76d7d98c8184409d620fa36f24f31b70c86705af4930a01704f7b21a7b816d
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a25b1b12c7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000235b21187e8992419b09441783fe0bd9000000000200000000001066000000010000200000003ce12113cf8cf9f297bd25a24d93db65de23218cdfca6acdfed5cb36cbf8f0a6000000000e80000000020000200000006e9509916734d7a1eb59af7a31b169b95eb67ee523461d328606f2609619ac689000000007c7a8326bdcef287ab9789168c5a4c167a0cfc2ac445ea9e8ed9ffbc1ad3a3e4f6f407855649f29c8d77a78c8fafd008ee7842073810e197a89f73c6f638bd56601a110b2bf4624e042f19e2a88f92b5547f0824907b77a27a116c14e7c957b0cd781caf149e520f7ed2fd3919b511c1ac018c31a01eda400e2f8578aa9b69ed7d55872edb05eddca1ae39449e9d5cb400000003a50a1b6543bf94fdf469e5b554d150bd8b16ae0868ce08a118801a6aa34b03edd5e6444a3ec410070cbe82e89a9c71c78767b0b1b60218ff48a76152dd5fd41 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{44256081-3305-11EF-9FEE-EA42E82B8F01} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000235b21187e8992419b09441783fe0bd900000000020000000000106600000001000020000000d9a658fd306bb4b62d7e88ab9bdc4e19b1787e297165e5226f987f281da6c4ad000000000e8000000002000020000000c59d91ea7163dfefba4b2b64b8be9b38ab8c584ec64b93103544c18d505bd86b200000008a837dad3ca5ce97890d1d176da3b907d10f902b2a6a5e85e07d5638adb084b7400000005541f940d4e70463d065d201385ec7249311adb71cc53b3dc83d80f4bb5a49f6ef6ca66af996891119403b38730a48d0e2de34e5d47e0c05e165933d09532c04 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425490185" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2952 2860 iexplore.exe 28 PID 2860 wrote to memory of 2952 2860 iexplore.exe 28 PID 2860 wrote to memory of 2952 2860 iexplore.exe 28 PID 2860 wrote to memory of 2952 2860 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e883cfe5982b96d263abb7ab2b97648_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b34b794dc0d0445589b05cf70c506365
SHA190d2a70b56f5ac186fff6a6ac427f1d001ec16d2
SHA2560a33b95d57af66e732916b6b2f7c4aa17054893e7c430365a3edc8519139dc53
SHA512fc9d44bb2dfefe758ba8f2e7a374a6460134624ce152b82ebf172322b26894ee7fe084797493b3242f643a7e9820d95d1d689a5386561db7fdc0deb98d8fc7e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597b5c71e51c64287a536ca1a35e5dae7
SHA1ca4c47f4173eadfaee73a11d40fe67b44d713a13
SHA2568e1bb04c7452e19806cccc4cb4510751f0f9abe03b2957f081628d5dc31e187e
SHA5126e6975151645415ac7a26bea87bae135b8c593ce13b6cd36f1d8d53330d2ce2aa11ff7dc3d4d72b9be21f4a732c96998003cea56259b885a3a51ac92dfa998f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3fb10d5cc5ab5e39e28069d74e4df98
SHA169afafe2c23a58403383a2917618fe61e76d9ff0
SHA256617225484ba489d07df145c9d9dfbb117c70a5d508614a8104ce521d06305446
SHA51291b68fd96b81722b835a96da89f6f2589692efa91d9fd2b7ef93fe232ca08e314eeb76e43eea27bc4539aa581fd12926344ab0e0850e96906a7b803f2e89a6b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6614a0c29b2b2b621f41ed59d57f0af
SHA1cc02523539a94ffdcd8755a60bcff65eb290eb2d
SHA256f31270da13f515e39165a31f169761c84fe7101de9e9275ff0a468c0d357c300
SHA5129b8246bafdd529ec5f662b885fedafc0ec754d7b223ac7047575692947348bc57236945659fc42bbd71ea02b86d07052b5fc12d4f201860dc271bd2c80e83d29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f749671cd8c1ee03a2370946a1b72f32
SHA1125f4d2c6126cb3b25dbeb1c60b1ea5c94a7d4cf
SHA256524d1836c172fe1a9f61e4a9b06ee978c57040f9f99afe137611a6c28bd6dd25
SHA5127531d0841474f1dff619e6906ceb66dc3ec7c29ad76516169101b0b717c6247ed824933d53d936b0b5c584b088420c488fb4d6f326e860100d2739de6a033392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5900f202f41c7cf0d941527a4fee40538
SHA1b86395e62a86af18c435c9f1b1ba227caf910f33
SHA256e9df9f301bf7dc8e4e664429e6375e841b2aa525e1b521e2a73492abb575c3db
SHA512669c19ec927fe1cb1e748ef967d84055c951c1870bc6d0343b4a0f9d64b4c6d59cc3c8b33c83c27bda4ef51a90d951a216428351324f973c13206c360010bf5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a8450ab9504ffa7449999efc532683
SHA18392d8cd4e3de2af50a24aaaf50cfff2c6e6f4c8
SHA25654bedf04d3bd1f9168b311a766960551eb872822878b7a1655e39e9543d87201
SHA512ad47cbbb16ac883e72971d4a2d916aeb8c9129970851aee5249ca46c95dc81eea3bfb3d79f574a5a39da6edd3f721da8a0279b2cc67c281f85dcf6b195de5342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cb2823cf35d06ed35d94cc60d57f928
SHA118ebcb600870c373abe71af5cd53747f4d8c6a48
SHA256eec9d64b70f65ea8e509f63ef9e4b7aca92468181cb8c5c6b70e7c494ab15e99
SHA512f36e5005f5436e4ae91d16d7a5a2d6208270dc13fafe3421a30574c82958922071b0ea33002aa5c474247a277b6a1a981a56372b687ee768b155589e3016518d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509a308a802b36c6ef319b54e892ddd25
SHA1ae2c5514bc3b3f0912e6c58df229c5614891ea0d
SHA25699c2128e5f2d3ab644afd1da79c78097c5c753ea9f8b34c3ddb8a641efd68be2
SHA51241484812a089f383fe91be0d1faba2d0ea0e8296bf33dc7081b703d60914b329d2408d8716784dd11cf8f22e105d708f3fb2144b6c7af6594dfa9944c5e92d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d57bdac1b4b60452766272a90c74e45
SHA1a8d060401fbdf1a617f21ef5589560132b44ae34
SHA2560b4356e4d116990f68b3046b05b9a19ac72b1959ce2f455bbf0a66992baccaf3
SHA512aa2a20bbf539b81b27886cdb78add9b531ae67fc22ec9210b4bd0421e7d5a51fbe5e795d38c18ae6375b9d282b177f479bce0397ea3b4a67966bb55e7decbf66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e04e4a039b0a8f31ebc27a6578bdff3
SHA19bae3c3cd1779892fe092ac511afe37861087dba
SHA256b0380afdade6dda3cc2ee5eed79d2bc8a4fc52b4d571bc4d4239404c124d107c
SHA512cee8cacb07447f0ee1179e5761a4f3311e034b0307f2933a58408ea0f9de2e5676c25dc5b4ad0a3088f70848353d789d7b179f2a48526944a191b6bcbd802681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59358fe8436258dae295fb6e6e5ca9b8b
SHA182934dd399a4f7b53aa042b361c48964cdb9d36d
SHA256af83ed5b576628f28443847395ef21c305839087e2f010f1e00768cf436b077c
SHA512bb8b5c816c5abc15abf93501fe82611778d16dd7aba461a01ca3dc1340cc6368d184d158d9b016b74dbe301a88307ae005551ea37f8d54ac8e8ea7c0011b2614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4fbb859faa938b3b405c1e04911a50c
SHA18dbc716f787bafca989949035324c80c15d01ec0
SHA256c9022314d0a7aaafbf2abd575f694a7bd053bd23bc7c151b9650c3ba93ef11f2
SHA5129bed9ba72df3d23b667e919091f7f7da133afa1457c8d12f176d755f6639386bf054a15698805b11aec4caff2e1ff922edf8e3d481da14fdaa8a5dcbff6d7547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8dffe3e2f21404ef6f4410bc101d859
SHA17622e9be648454276fce5b50beb634335b2f347a
SHA256958500cc108cb19ad97dfb70366204a960671120ab7b002a489a5760572d7d32
SHA51239976e75f44d83e9b1fa9ad042692baaa633d71ee94a36da801e2900d467db27b8803f418bccc09918a419af81d82f3bf705cb43ec8a001ad747cf73f25d8f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561c9e61a7b27811ea7fb91d4af606dcb
SHA1937c4c2959cf11c035e0ba3b7a9fd43699f6aeae
SHA25692477e001bb03172424a465bd1adb0b05cad71493502ff7168e09c0302abcc04
SHA512186c2875140263ab5a7626feaaab97c2c205d525bcd30e52119e32c39dd7cf49d85aad753b4765cbc8713f9fad62c8a6166e0783c6fabf0bee0fe29e99cc8bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541cabd156a62ad93d182eaadedf13f1a
SHA1f63fd9697fc95b1db1f47a9e7f2a8b05f9389631
SHA25631b4187261eb383a49e61cda7c62bbbc48c34ec77bf67671bd59bfa24a40dedf
SHA5124bfe9d8d9d0279f8a166184e2a7d2638551446f3cd423e2647056c8f0828bd26b2901db5ad4859249adf6a8a34461891c93464de99e29e3253ec6247e786d53c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b56a176a2a52e47ff9445a18d132cf50
SHA118f45f7cf4701339f6ca5ca127d173d8472e1863
SHA256a02220fab6d8acf63059bac10d4e2d625b0317c8c9a3a0ec66400f83cec70618
SHA51236088b9fe80c8c34845039331703c20d90348d86aef72eb71c8230e2a257d0a21303c31cb8706d9e53d3097db35af511a570c6626d3b5dbb441060c76ae10a4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3b83b11478568f80ab60c8147e669ca
SHA101823d687631b9d1dadc27be61e812fd2ffa229a
SHA256fc97a588c17449152fa84305fb164e05c05708bca7743ba660ff96228163fbc4
SHA5120e000a86e204909d799d65f9e7fd0be84aa5c4e918334d60a22f741c38058977c5b01c72a53e263d4b04ea6b3ef4a323e66590bb485650dc64659745ce1a93c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e86dda00300e7ae319b554659e1de597
SHA116080fb754e3cb91905471b8f54534d12c00d84d
SHA256fbe91304dec2dca249e0c6579bb00b895d27b079904a5ca0b3ce5b04e97e8066
SHA512a81e05583c8391a4abbf36dc94efd88729ef200f68174f1cb76a5a20ae67d7dc77100a61382a7152dfca7340845f56ab8c956ea90852bc41e63e47d952ecb1fc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b