Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 08:57
Static task
static1
Behavioral task
behavioral1
Sample
aa5fc20b6c2508bdce09b8d0a1708a44_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aa5fc20b6c2508bdce09b8d0a1708a44_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aa5fc20b6c2508bdce09b8d0a1708a44_JaffaCakes118.html
-
Size
29KB
-
MD5
aa5fc20b6c2508bdce09b8d0a1708a44
-
SHA1
d366e2cef781068be8955f0221bca1efbfd13c31
-
SHA256
63aa588a09847bd6ea745b65e92482e069f756bd2cb7960ab7a01144f11852a8
-
SHA512
817530a4df1390acb64a2f008edeb5d403830025d1636e3d74c98c78d779573199f58c5b7d64086e9b8a520a13bba747ab67abbedc71e847b2d0b8a06190373a
-
SSDEEP
384:MLTeNiUQ41pCrcFON6OsX4RG9MqDNA/14kUqi6:8UoEpCI1P4RGeqDNA/14kUqi6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430219718" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000015bd8375981eecc75db85f5a854314cf79ade4a781c97f942785913f32349300000000000e8000000002000020000000a247060b4132790853497bd6fc06b6701bde205683129f463ce1c04d546650802000000051f80fc05099395951548c54489199ad8692ab57870ed52ab4209629240cd2f34000000093345fc24fa243a20fd58b36fbcd693dae2fbcee5a6cb5422f7135ff689f30d6286da2814208c345b35fd0292818504dbaa4b69c0a15acbc6b4ee3f012dc245c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00c156ea15f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{118944A1-5E09-11EF-B6F1-C644C3EA32BD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2292 2088 iexplore.exe 30 PID 2088 wrote to memory of 2292 2088 iexplore.exe 30 PID 2088 wrote to memory of 2292 2088 iexplore.exe 30 PID 2088 wrote to memory of 2292 2088 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aa5fc20b6c2508bdce09b8d0a1708a44_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb5097002cc6d1fc3e3fb0fc6b41ac45
SHA1004a84fd282df4e12777d7e0538c8fe5e3c076c1
SHA2565bb651941adabf4cd053649e0a24c6ed7f81ee6766b86fb147aea33232e4fa92
SHA5123c892594b5e83ad0c87ea1990973f0eb65ded799668387394e3622db382ee958aa3005758ba85b519ae76eda91a522d5f492c854c64235d33499c1f052f9913e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e532313c9b36368fd9821db74518ce00
SHA1dd44ed80bac09a0635105ba5c49d8b6e7e32bcfa
SHA256d8c1145a1319a9669171c1c73a6c68284b91bb0dee458364f1bfbdb5109e3e8b
SHA5122ee8eeb70579846586ab0a5c52803d1de09b9f5b6cebff13a6d8ca3500aebe7b625f995066030c572b60c5a248b659985d3942957148a993394db96efb264e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a932fc11b205586197ada7ec1b5f6e15
SHA101e9fdae04e9b1257ed1cdbdfc8e77fd9bbd84c9
SHA2565cbfd066eabe77236b644be9d87f1b086d96b7ccf839e9c7bdf91885f58bfb2d
SHA5127ac2686e930e3c7eed7d7850f4f7bfc46d2ee47b8b3636eab9b56780af43f5626ad430f0d43e9ad26e45e7a2805c09649054b61803cd820e1c7fd80c8af39708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad074223d14961411947633d856b663
SHA1a279809ac67869671c36e039934d9068feff1619
SHA256a54a32aabc7040f007d899f3066a6c7f314ca9a3404f078ebbac410ce3d4a678
SHA51282886da6f7c1f9c10e4121289e27f8920343eba153f70f7f763da29eb09b5201f35dc2145538910e236e279eef65f2811a216c12f207c0ab96010408879908f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c748cbadbc6f03e4eedbffdaca795a3
SHA1d0cee69482081d00ad77d869ba3a2af9ee269294
SHA25606ac56a0340a64a06b3bd9b76b04281c3e761bbbda93e83c6794a125154d09de
SHA5128bb62b66fdcfc9f28e2d45e98411562129ea9c220ed522e78c7f9c612166c067cf666b0880502ad1150b18fe221fc97b9313f0d4758d8e729b3a05cc1e8c2f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524ffdd9bc6473d823bfa73a773fa3be9
SHA1a79e071d6c73c4b3524a2be9c7199110b900a75b
SHA256766c7bb3abe9aa240001fb47217f0b7bbb400a99554045917594297975f573a8
SHA512998464b8080e9bea1fccac1ef2388f1834811a206159cc4549a1aa1cb05056ad8b0eddd08db9ad8e2299f78804cbed3386f757587e85a2dee0eb06916d5a13da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521aaa23c9739211aaedc8a9db8c83fca
SHA1df8a96203f40d655c2658f0889ce0c7f3290aa0b
SHA256d757904fe172f63bd17cb6162f7c111efb00d25570500163b708f2aa0d1bb7c2
SHA512de72ed1041b2b82eb292d9dca3990ed0323c10f1f7e2f6d66362e9e33eaa953d52b92ad3b293f3f51d2a9891b57a99d022edb65aab13757e48f5dc1972a71de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58641b4f1c1ee59f86bfd173da7421789
SHA1c6bd3a3c078809e1c6cc6f6aebfb8fa6514ea82a
SHA256368656797e090718a570f838256c97fbd3af3c0365f970967f8e1c3ebe5f8bf9
SHA51291af4bc999ed00ec9aab02f5ad9114d3e284940e6e77424d195868d3377c5b49e13e703ab977353049da5e14106cbae7f7444585a5aa7f9f493513daa0945e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abf30119ceb8fda1afa30c1589a25d67
SHA1a677c885dc04e5b24d15a4e7d778399b75b667b4
SHA256b4902b332983a2065c5297d089ba967104d66478f72253b3a83468d59dba42db
SHA5120e42ad556de0416c15e1cf2e5cabbe90e9b7c31117408ab5ca1821cb0e37c943b79a3358d472767065d378ebd16d26c0eb893d07817628021783eada0734ca0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524aa0c0173e6481e512824bafaa205b4
SHA1ff991802c2401cbee6af928453cbdfded93682cb
SHA256322cac0b9624d577da94508922a7280b3913b2d1ba85c17b76cf6706308c4975
SHA5123a8672ae7d8fb625d1327001980cad980f1ffcbbe4a276814bcf3f79702a5e71687742c4e38600bedcc01f6777a9a5a872d91c18ddc68bd3d84320bda701be15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5944c58bea8bbcb50d855fa91a3230051
SHA199a6143b0b1d70423ccb56df80fe968b53dfc404
SHA25613854e61a14eec96fea973bcb2318ce1368816be7687fa757ca1f22ec5e8c48e
SHA51229b2b3229973568557b9a98c9b3d95828ad3e759676a5ccbf34c9729d0755f31db62355db16bf16caa93260cede3a8d9e0a472eff09286e283769852de2e4183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb4b8735b48d7449f58fb49a18749f49
SHA18efdcd79d90050370f7bcf5d4138cc8b13c373ed
SHA256f4c8319855466ac1afc74ea166f94278fc0ea58842b6369172db65e466ba390a
SHA51280d7ea91edb42d8f378092174fac40ab5b00e7a897d20b89f94c6d0d4bbaeb0cc479b6e54e5123503baf3a1ef0cff1b04a0796b30a5bcaf354eb943f7f1d6e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5249c0e03e35fb4b86d00f1dbbccf0873
SHA10d05585b472b8231f0d5090a9c5b094961921deb
SHA25660e2a7eb06b543937a8990b24ca2fe5719a4f931e6eac093049cf05dcb662d29
SHA512054664dc309c3f0c9a47ef3840b3111701e0fb88fe78c6db7373f1ef9bcbb7b8b72e8d2060c00ee4057b1c20f5b82bed546fe22b454c265c160da4a32c1ecd38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567ccec578477abdb82c5906f1d0f8990
SHA1253e30193764d98bffad6e7a8fc0709d18ab7e85
SHA2569e1f0a3a211c74a1a318a2287dadd917f9391069de529424768ff13859aa6bb2
SHA512432f4881f4b25c63916e66c36fb0857f44ec08d20c01c770a487719f9966fe07dccc21f2399c7e0178ed8057e9ae1ac3af1ee463a923efbf6c05f511385d5ea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2a22dbdf8953d8ef27ebf650bebde9c
SHA1ee72050cf9e3167110d5ce806d649353139d7b85
SHA256a2ee92c28250c35fe7028ed7daafbc2b3b375632352cbe9fa1df1229cc99c576
SHA5120d58e879b3d747f25055221c779269cbbbf180c0ff96e6a1daf3999d22000203d9185759e38fd9ea2c85bf6f034ca2a8354311faa4881fd7ac794073f217fe9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59be5f63c602fc6dfa077edb025a9d9ab
SHA10d3e635801cfb748360f41f06a2ac4186726deff
SHA25607ce83b7c53206205a4635310666b280fe3a3593d62ef495d649d2d2a93405ec
SHA5125b3ccbca6298809ceb7c622fa5f7183317c330c90db1deff48ef65d19b639c9bb330d432212ac8f76204a488faf39e1d25d547caf0373e46f1b71fc187e0907b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53679ff3ee709b3096f426a59da5fd09d
SHA16df4500fa54c84005288311715ef16fa09e67456
SHA2563dc31ce2cd037e1660787544b4994615e770fcc16021b15243f0efaa2c32bc39
SHA51245585b0eb5bdc15c77ee68c33aefbb38b598acda48d8bf4f3176a314af6eabbebe1b6c5fcd8c694afed4d092096c563f6dae34223a7e29d60fa99570670fc13d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c5153cbbafa4ec7b6371be7b39d12e4
SHA14c3850d26326a252f8c8cb66215a4e479103e9f3
SHA256107460b373123daf200a17e4950d7f4d188e2b1143142c873f61b6e0b8a59f5e
SHA512df7ee5d1c0a812d6d25abe55b248cfb050743b75c1e48ff24d6b210b5a08e65eafefae552a9e81cc0b5e55ed710c57ed6740b509c36152e9c1727dbaf3cfad52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3f95ad4d678c6118df3d51bf48eae94
SHA1b6126a0c5680909a5481cc65833003b814cf3009
SHA25684f2c93d4441439a41aa849755a59e601ead7656d7e3ddc565b4f8d711e5cea1
SHA512dce65dc8d17a8a928ede396606c3a8888b4a627f9391e240ac092862bdaa8e9fffaff4a59270e7d95018308cc3151c818255cea55a50159ec3af1b9209403100
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b