Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 11:27
Static task
static1
Behavioral task
behavioral1
Sample
73dba15105c0e3f10519a1b9645ceeff_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
73dba15105c0e3f10519a1b9645ceeff_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
73dba15105c0e3f10519a1b9645ceeff_JaffaCakes118.html
-
Size
53KB
-
MD5
73dba15105c0e3f10519a1b9645ceeff
-
SHA1
85b824726ea82f76245e98ebb6887435f06ba288
-
SHA256
19d90406cabcc3bffb95af1ead8b8e94ed920ff838169780c4d36bb088159aa8
-
SHA512
c03797cd9ed8c12f44081c2ee425daf9966286199ec68804a87458feb951e28be0d314f3b72889c7a8c4a46042be462089de15b5db9b212783f72a423bb764d1
-
SSDEEP
1536:CkgUiIakTqGivi+PyUHrunlYZ63Nj+q5VyvR0w2AzTICbbTo6/t9M/dNwIUTDmDv:CkgUiIakTqGivi+PyUHrunlYZ63Nj+qf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000e2ae02794e4a4f7a58ef9a033df9fd0688613fc22218d2079bc1cc8a6ad23654000000000e800000000200002000000004ebb940e0506f8c795f7bcfe356dc0d503f6c97e8c5b62b91161834ab00ab2c2000000073d1b459fca977738ef4b8dea430f4e9d9aae98dc90c67a03fbc8552405cfba140000000cf2c17429a6cec53f92b35908b7d0112b39787247dea327c275bae57c59d728f7bcce6ca24d4b89df1df7dfe7fc1e867456749ca02df678adb17ba89e1aaf61c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{259BF021-4B42-11EF-90B1-C20DC8CB8E9E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 808f84fc4edfda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428155161" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2632 iexplore.exe 2632 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2484 2632 iexplore.exe 31 PID 2632 wrote to memory of 2484 2632 iexplore.exe 31 PID 2632 wrote to memory of 2484 2632 iexplore.exe 31 PID 2632 wrote to memory of 2484 2632 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\73dba15105c0e3f10519a1b9645ceeff_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f69974369f380368f79b1e31b97dba78
SHA1b90ab6d82a9fa6251ccedc626da043410f3bfb9d
SHA2565b7a465022ad1d485c3fa788e4a29228690d9160b02ce1aab21d32daed9df0b6
SHA512ce3ee56b319e250883dfdb8ebe21d52b63b9d571ca3d2a3e063f7e42cab0a59c7e587694a555436180086d17ddd59bc78cb1d8717c042ca065da5c9f2bc932b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f00f1ed87487ab605dd21a10af1e91f
SHA1f3f091fa5d47a2a3aa9df19bd50141d1074ab133
SHA25675ce3cdf097285bfcfa862a1acf8500ddbd4974c8a4c215e17a98e2211d24a34
SHA512cbc9e34dfc0f713f0041ce6fbd5e566fd965dd996d661a09f5df12cc4d615b6db069206ecf92f4bdcaff8a01ba79b3b9a61fe0bc3d62a264979a902b29ccae6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51abd71d080515991af0ef1246e1bb6e9
SHA1e8551c2463a222f1d9032706e97ff9363ebdf6f9
SHA256612cb1e81ba1894595be59cec85abfc63967f42ed2f4763a39e2386b50df2c64
SHA512a0d58ef6d73992e67be766c0dcbcee7dfa507b51fef866cddf639541ded18c9bafca48d87a35dfcf010798b0943dee138290da9c2cfbbaea13c5ffaaf4fceb17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc34b1f374159d4e1714db2ab1e52b8b
SHA185d2ac1623b06a4e7e6c851ec3ee2b046b2be466
SHA2560f6e338f16040aaea121707bcc8123eaa08fa7cff2e1b965c001c93e92fdd0e3
SHA512325391e468a2ed7b191df110cd1b00f912e36e03ffdaf52a4a3cdfb1b0d3b19567fc8501e598c0e89568a389280360391fa3294e9b16df20d3979d7c6581035a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5227b67fb072aa3a790fb890086ece35f
SHA190b0b42905a37bdd4b5282d2349ac94f3a484aef
SHA25654584a31932ab9d2d6145295183fe9e69c3fdb06a138db5dda3121bbceb35e1e
SHA51232d8aa3ea5c02ded6370aaf684aefaec1e2b837dce332ca0d280512efb3228cb80d5178ca10a041eaaf3e2dd7af0045d3f1ba157032681860eafab1d18f99ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa50e95619e894e1379f0d08a56998e7
SHA1c3bb7a995413d5df4ad05d40b74a5f85270c220b
SHA256a627d0e5f746a64cee69c30e5d0de341e029ffedd094a7de3eca7fbe050078b6
SHA512985b33a999afa445c1bbbb7543455d1a7d218b668f09463f8ff0afcfb9d02e61a966ba13cd1cbc93efb34cf2ca37f3e45849d5b8e1f4a0d777234e6e9dcdb21b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55290b45aa4723a586d226b088895b2e6
SHA186aabead8172a0fbcc6935773ec8ed22e6a07c0b
SHA25618c6d5273023c73b37972d8c1f6bae31f1a36ae4c63fc0c84626047f5b6d2dd4
SHA512678ebc9c489f49e5cc19aebfae859399d3722fd9247ed01c06bcb880c37991d86045683f4dee0903afd60a82e827ef27998d22a8b0c2d357e982c91f10d6038e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501d1dbf7c90509bd272b18c7e0cc8a46
SHA134ac4c4422a84323b7a22fdc9a74ceb290fa8866
SHA256042339c4be035d02bd8c955fa120a646ce8809a2b9e51b2f77751b4442ddb578
SHA5121dc0a43125446e290f7956f22025d2fedd28944dd92076c68bb3bc99aa443042310eb7935f99799b2373617560e2700ee21b588086597a6da54163776afe3294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e3d5a62d405550f01c944f456619bfd
SHA15c5c0957dcc1d84ed5f21841c153d74b4b6ab8e1
SHA2563d40cf20a3f1d423457d505e84bb871388d719c9b4721226202dbcbbbc6e2105
SHA5123666694dd3831ebdb1a397caf261a9f2ece7755263ccd1d93c490b340073bb898e60121734b3d199e7d2866b73bbedeb2e907557b2a0d468630cf2c10d7723f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0089572f06bfe7481e5777ca10a3e73
SHA136ef9ad0ebe8f037f466a5940605dad66cad5aea
SHA25618f729a013bb2ac78463e25fead110506347a255ac5fc8247a9056e75ab6c308
SHA512dece7237f374c2d9721353465d6ab3e73049f4f527fa72b2d851a6a39636dc451653b63f9af83a0f402ba5a3b98f8708e8a9cae77f4f80a273fa8ade9bc55fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0940951a1b8236c2d1dc2048617e692
SHA1ddbe9b2d65ead3f205dfca1d947fcf97e44ea834
SHA2561ca19c50327c8c8bf67b6182a1a3842a059758063008c62674136e46f9c45d01
SHA512dbbc92a0720e560401e5e69481ada1c30d07826261b45d886d4ff751b0430a6766e1c87ba802710f1a3f7c69c70e2604af94a7ce93ca98139c2f9bbf66aa9bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514f46b0d9020a36d3927a6cf1c11af7e
SHA11631f92e31cc96227e1ddc2e71c11a19bcc3d3f3
SHA256e74c005c3ab7ef46711bb381028fa55e7a3342c2e446556b7c408392c1585f3c
SHA512cd13d37ba9a15cd633f438a79559d13c3a142992e0ce011c39591c17fc9bfda1678d9337bb75de8d7720ad78f9fbcd8de91505acbeefa4bb831176373464e470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b608762f447a4517ca18d9c671356b4
SHA1ba7b895b59242d1f89214aee27c4444aa49d3776
SHA256df918fbbddbc3f95ac4be6c48dfe50608feb6087b16e323df56ce70ab8a52cf3
SHA512d41e95bb9ba4a3129294fb79f14cc94b756ecc909436fd7de469ce41ee31ca647b6a347b148fdc50683abb48edfbc565e269d2d6677af93c9d4cee1335ec79a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebb49d0165a5d2ee56b21f3032c4f6d3
SHA1c9e910908d41bde3b43513f0155a0f6c62dfd6b3
SHA256b73e724c765ac375fbcd88ff54549d581fa6baa86a3fe873ca2a2a60c491a750
SHA51272e2f1426b697adde7faf1392f0e32fb91f97dacabd743ae7ec0f4c98ecc20588227f30126556ac32d0ccd3e28b0a947f7e02fc7de946746c6ecbb7aa5bec0aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aaa07d5ab87dc14bb7ee3fa6c2f8925
SHA1adf04d4a861b3bc5bd56bceb1d07dc8598beb9e4
SHA2562c78720c60ba290768f69d5c1cce3cbd1de07a11325dac1acdd4ac0a9cccfabf
SHA512061e323e4e951c27c5c9fc3a6b6028c2640259acb1c84cee77867ced270287d63ad04de2de0f0e5ac4c8fde6c34b7293ab4cc2e59fbf37d15b41461ada5e22d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f81200e54fad67edfecf0b3c8213f4fd
SHA1ed77ffef1ca22c2bf17cf2ac6113d3f35d9171a8
SHA25682fb5ec59e7eb4cb607e18ce65ee19d5ead60af27dad545ebdbd4989a7d9adae
SHA512264db561d13340d7d50f87d704f1cd6aef925960b97cea370566787b0aa291c38cc9289424e93970f2bfe5dfdf23c23ac5ad2a2d2de4b40d9866d12d0762964d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5531d99cf35deb8e508686caf03bfa8a2
SHA1c53101d98dd9ac17774b1f8b644bd8c9a11065e9
SHA256c417596ca0b6561f37f06df7e5afd9e636080bd42cd12d4ec733f1ef69f0c014
SHA5126b2747e1d91ffe596d8279776e1777611c7cd3a7b45c55864512747c7314f4cae4372038de4fb6f51a15a68af8a676c29b6a17220ca7b8433075d6fb8e51c4b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ce2c2ac41d9eb36d5aa2ae06f7f2fcd
SHA1f8867146060e7acbee6f33345a4a164ddec80745
SHA256375f3a6a442f71f3e0fbe6cc98048f718fd8159b56ea51424b8f7a15612fb711
SHA5123821296574290da91973915422304461758ac7e2b6a48c56afaf0e5c39380104a8cce58f398e6ffde37b71c02f4ef1b7728edd5eb2285d04ad83e5bad5196ee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574b9e8529d45601d47f781065c7e1771
SHA1009f16b2b4f7affc89119b7a4a990e842af3ad67
SHA2562379eddb9b15e9cb359fae90622d1c077906bd06c6ad414959af99d4396a24af
SHA5121195b084e8dfad33df11c42cc0b4bc962a52ee02838252c77b4f97343e5b9e7e8cb5ab23a13f8900401451b17cc70a13595a24fd27b4ae27a17e07b9f735059e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b