Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
71d6f25cd9acb7c41e018aac50b9359f_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
71d6f25cd9acb7c41e018aac50b9359f_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
71d6f25cd9acb7c41e018aac50b9359f_JaffaCakes118.html
-
Size
53KB
-
MD5
71d6f25cd9acb7c41e018aac50b9359f
-
SHA1
bef5852bf75dde0e128a30583a2ed53165875624
-
SHA256
59113eb1d47157dcec6815813e2cca247db1beb1e18cbf2b67d7e667397a9034
-
SHA512
41dc6afb681332030e114c56299d6a8d1d6e16c53246e1b735931855ef30ff348ff91bf2bab557023508c3a299b9be9f5751e2e5f0cd1d40aad78014c173edc7
-
SSDEEP
1536:CkgUiIakTqGivi+PyUrrunlYt63Nj+q5Vy0R0w2AzTICbbRoW/t9M/dNwIUTDmD1:CkgUiIakTqGivi+PyUrrunlYt63Nj+qy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602097dcf0deda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{06794B11-4AE4-11EF-803C-6A4552514C55} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428114737" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000004fd3ae0b10908998f1a7071592bb36d1d60b10d5bec576acbb031c70f301d0c1000000000e8000000002000020000000bd2f3e2a3b01f3644728f4405400029a429853e254860aeb1152c03fe456dcd2200000005dd2e60d7449b5557ad00a7036b383f47fd3316caea205d3a031d7921e8403df40000000e85eb6f7863923e76ac1e272ed8af1d9f11b4b3f80aa5392841c080328dc01fb5a1b1486e550679608d598a654f849cdfdc4e02edc4b0cb6fc1ba9f0d614486b iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2224 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2224 iexplore.exe 2224 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2860 2224 iexplore.exe 30 PID 2224 wrote to memory of 2860 2224 iexplore.exe 30 PID 2224 wrote to memory of 2860 2224 iexplore.exe 30 PID 2224 wrote to memory of 2860 2224 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71d6f25cd9acb7c41e018aac50b9359f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ab5eae29dcf4813d883735b3fb27b8c
SHA16f7cebf1e7b0f72824a8545a2c6666b37b9ee7c4
SHA25608a49ca8687f161eceb1c1d8ae13443b986cd630cb1be1488abf94050d4684d4
SHA512cea715e736d5d4c17afde4821b32a88199bc838e85f36e7849bbdf46466f9a04ed00b9fd2ab59f147a79db5e75a3ffdb8c7d08d3a1c775c64faad2f8db0b7482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d080f81523530baeb78f5e4411748411
SHA1cd63e27151bafa7750bc176ef8c129642e8a073d
SHA2562138864d0e43c89e42c2348cebe43adbe2ec5b7b735eab4cdaef283f8bac9249
SHA51208e07a029f081cea0e86fca23a4a24d2358616d21a6f285ccc91b9147994e01d621450d03c353f8986d96d52559f8e17c0b12d540c36cafc75badc044f6c3c5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509da1385999b407298f0352466b32f73
SHA11017cb903143397d6d18c3bae96240b2d9057ce8
SHA2566e8ce4392e7d5ec4ca03280cb77a4219da18df74822e640f7e585fc9a0b4859a
SHA512ce8ea7ae72229d8104a964aeb4571d6d01911b93e636ae2b7448063721d847b3e21861e8af0d00e2c38cb3dafdd8dacdebc129f4bca2dca9020b14f47f2bef66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580fc36d362e6e109e79a9191cd7d1b9b
SHA12de77b927e8c12ef03f780d7b7d9c37350a26ba8
SHA256b9cd940df401ef576126e338a9206e81c936209a7dfe7d5de23370615ca3a08a
SHA512b2375318ca9b141433b0a931c8d52ce27cc52cbd33e77ed042e22ba2e292cb8c43066f64adfb7f5f3b96588e33e7e7a00af62753027a041d616c490a1b39c310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55638aefa65f93ca7aae9f3e020ff3c33
SHA179c77739903704c5e90ffe73e9f0ec205f42ebf0
SHA256d8b29a36106d3197977e2d5472b663bae903717965895385f41b908cfd1a7878
SHA512a60b260cdf313d7b726a1c022b039cfa074454c13538531dc7e4244dd8fa0ab77a59eee5e5fffe97e8d20c54c311274f072155b94a3b57d5b7c6321a11be7a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b8ec424ecc7d70088cca4eb0679ce6b
SHA1c6f19da8e3ab63bcd9bbec641f8e4fbf9a1bcdd3
SHA2564ccbc1230d3eb3e9d75a79ca331dba8ac14a4d3b6b5fc5c1242bc2717f00837b
SHA5121ee5a55a00a7cf9d01db5a9cb608b77542a63a2226d4d9a44615c8d7d01150ad2944b8776b22db091550ec25e87eb86771ac85bf19de02da33ae6e89592cb696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a3bf7cf0f857c01b2658bd7be07bb0f
SHA1995fa501fdcc7014610cc9f4cbc1c7751053b942
SHA25632727599a84fc7a2717aeb54816a10f90c8a60d4a12d1dd7c12b504250e8de8b
SHA512f6acde20f53cc881f0e92ada1ef9ddeea1193edcd3f9e222f6a7695c38d8a029abc193f698976bfb78561e2c64d8d90ba365cc8d513686a4e83da4ce51b82ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558446faaa31c3b79e9b0ce7240c2cdba
SHA12aaa077d5b8006047e40c69069c06e4b39dbe5ae
SHA2563975bf4fd9226634b085d359e4ed650abaedc083ea8899d29f4e80eb8a280404
SHA5125d495c0ebeb95d89014c9a8a8be8b6ac9628934fc3e64b92fd650a160adc3c1a21dcf7ce79e46ac7eb7ca1a8bd161d75ed662c4110e23df823ba5f9a40e6f087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577aaf8327a129c2feeab1160772ea169
SHA13ad05cc88c668bccea156a600b8b1db09db56d8c
SHA2564d53a180ef936b1a037ab5caed2ff84bce6bd6a6c1714152aecd44e56f6b1cb2
SHA5123c98a8cbfdbe4992a42a6da5adeb8beff456b57eccb9bd2754811928260e0b945c4a4f0e546b94dbeb6fd84f012bb5b7b87875a943cf4c3554c15ce649445503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b0d82bc23f05a5e526acc984436d21
SHA1046727db7e7009acee4a541dad09ce4e63b17588
SHA25659d71b82f4ee1ef6236f2cfd61dd562f3d5dfdc462621a6b40810bb5ae70e6b7
SHA512d73ade2b0469ecba31ff1d933e446a47414c8df14e91906cff1a271736170f063f31df1b74c7f0deb91704c1e518895df982cd25bafac4bf9fb0f5beda2dc017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f9ebc60868b5ca3aa4b7edb7e12cb85
SHA11e38afcbc0ceff480e3e44b9d46141a9dffef815
SHA2568cf116d6dd8e2f3db79c57e86f6b0f5d0bec38e75b5d4c783a9cbc194b01d9ce
SHA512e198c0d203deefb40f004550710033bc854daebea50221895791d6664ca029b8ea0c208b06da56a4d866535676e10ac311031840431e11ff237255eaab2189b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f31623e19cb5a0b749cd9ceb9c01ea
SHA1be661cb11cbf6e2eff66301b928cdde4ebc6c5a6
SHA256261ac5a86e70e913800252fef482e88ad48aacfe291190238b6a492939856842
SHA512aef3bceb059bc6231ae5e2c120803e9b6ccb57024a27b5877c606d012087e0bb02b8ab69fbbb3be3ff683b7609085fefe9516e7cdc8260ae8a0e8a3ddf096828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c13dae04a25e362b2c2c6c3ae77f0c92
SHA1641811c22befeb3197342f58fd478e5d125445d9
SHA25687c07a1f69669e06326d5364f47e6d469232208f5613e7b4096371eeb2aa82d5
SHA5123b814c4d0fad9f5cb8248f1555e71312dce72f48d4e5a3e72d70a0dffb2f528c7bcd0d8840f252444b9529d6d9b22b9fb447da386484a4cc59e4324e6fefe56a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427e70d35a8af067eff9c26d33526353
SHA19172c7be23f1b6ef49d50db67ac015275630878a
SHA256238906b2fb45a8a6d9cb5da998882d981309dc6f456f9ceed6b698af850d0d65
SHA512476f930def19b4385c4a4e1c21d69b33b38a4422e900d998904df06bfe81dbb66a530e489ffb15bcd011e0e4d3a4d8a1414dcd47c189a213d5eff45c78bce4fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597187bfc3fe13adb7f8baeba1133094d
SHA11065f4eeb304336ec7159d773fc0610297537de9
SHA2560118ee3c2ec354a9aa837a9ec09fcd8d023ae2f11f4ef4f8985df4fee27abfab
SHA512fe0cde0d142dc01b13f66fda3911dfc8a14b9f8baaf139f943d2743852a71dbdd15ac6671cb4385e21ab097cf0fbb1967111133edcbc7479a7beaa1b51ed9f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518d282e3ca61a93cda6a7b3b6e14f209
SHA1d6fd950cb201bd36c4507114bf15c0d9b8b59f25
SHA2569ed507517a8bd6296cf3a79aa9f790b1aeabf0a8f1b226214546ce563132388c
SHA512a68a048b227376fc648bb257f414d41dfd9155c4bfefd904b372bb739cc01fcec6f28d66958186eb5133e5225ccf506d316d5785c992c9a8803dd66072155314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f554d08a0e4e722e7fd36833dcafa8a
SHA1e795020f00c1b1c7e1de5ce6d1d25f18d0173a42
SHA2563955d8142642c2127af8a41ecdbb274f24f4dfdd19a9a52822bd80114408fa1d
SHA51215fb4f6fce4251eb152e69281e39baaea0d70fc9c011dfefe37039b483530b118a3a2c4471a284b67753cddca336c7c2e8018e398cbc1561c31319b7aed8e04e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efe0420f36d2dc79e3965debd21d6aa6
SHA125834b825520b694e922b01e783b7f7d43ba5f39
SHA256189bfd644e9cdf2fe1d2b4fcb77df82122966ab6817093acdd529033aff8b303
SHA5127e48f3495046e1c9ed9de724ad4daee0e99f280e9459b3b3c26133dd0470973768c57ea3a25466cfd85b9ea2d71015d219c2c959f4357b743bd264fe24680ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0b07396069c6ff4ba771f04449f0cef
SHA17ee2766d073e0bab7db51e8990203b179be0d86f
SHA2568232259f77f2b483f525896d597ad34b3983360d84e3ecc16946dc388a8ec368
SHA5122bb768210ebdcec577e9e7dd857ba3c9d71e0554223985987d27fdeb76aa108586cedbf8e6a8273932a7a0592655da2113d9b1c9df7728e4c8db24014055c48d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M7GT0RRO\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b