Analysis
-
max time kernel
139s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:45
Static task
static1
Behavioral task
behavioral1
Sample
ea865c5bbc0e93a9020962f836ea6875_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea865c5bbc0e93a9020962f836ea6875_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea865c5bbc0e93a9020962f836ea6875_JaffaCakes118.html
-
Size
218KB
-
MD5
ea865c5bbc0e93a9020962f836ea6875
-
SHA1
3c7b45c76f5cfc9a63426f13575278a24c29839a
-
SHA256
6d388610f85a4a06d52aaa2f73d48c1ccd40bdd1fc5a373a488a42ab37f32ba9
-
SHA512
41ccedcb51b666e61438c140ea86928c15a0094bdfe78232759d2f3c7b6a678574e469a66c3c6707b5dc831a675edc6c3f7471f749aa4d950d45bfb92e4e8d2a
-
SSDEEP
3072:SupI6Za2dyDSYLyfkMY+BES09JXAnyrZalI+YQ:Su20PYDRusMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432879386" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 203cc5ab460adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000aa80821d3aecec6ed30f2d18fd22fa9542746b35d07ab0c892672ab9186798fe000000000e80000000020000200000008d3f0599da252a90dc5fc2cd71df013a6df12f07e91ac7c7a51a352fe1efc5a92000000057c4aa801fce6b91750a0f3abee2daa9121128e0706a6395fdc4a0306e0403f4400000004d2fe8bc67206a7970b772b2e3dc344498958fd6536254183850aee1db91ffbce9e1971bc85cefa070c5b97fe14010f29cff8ef3932f52801ec2550184e07c18 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{969E31D1-7639-11EF-BA28-E699F793024F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 632 iexplore.exe 632 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 632 wrote to memory of 2316 632 iexplore.exe 30 PID 632 wrote to memory of 2316 632 iexplore.exe 30 PID 632 wrote to memory of 2316 632 iexplore.exe 30 PID 632 wrote to memory of 2316 632 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea865c5bbc0e93a9020962f836ea6875_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:632 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562590315e94736e7c18da77bbf07ff26
SHA1f5d1bf82ee767815e9165f7d9b197476bc893504
SHA2564b553fc7ebbca89f4c1454cae973872e0c6c4dba8129853cf739daa2159fcb67
SHA512b22143b24d806b80e549d9fed25c383c5e6b177e4ffdc02cf9f5d4a6bec7bfbb069603b04e9fa97a470d7dfa88635553705a016d6312ed324c1bc4c61f4fca0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545cd5658875d1c12814b90160f242780
SHA140d96c8ab89d9d0c66827fc2ec8f39129e3b31bf
SHA25689011b68c7fe660c297c931441759465cf3b613fd64cbce45567b5442dfd0728
SHA51215df214e002f919f1bf5109b87375232902c4029c4d600f59ee37285c9d2e375759c6198f361184ebb5554273c686a7b3e6d513f026c2165d49f11abfce643f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa62ef497b12536bdd238e5cc5847f8
SHA1d182f38a347f7c7a4fefb677b6e1222405bf3095
SHA2569280b0a9964feed28fa1a368abafcb8ed9d94d9d590e67a2be5425fa6ec80c7c
SHA512f900ec28f34673e3990f8fe9847505e3ccaf9aee7685f8e131c8b0baa88f9fd11b10c9dc8354a686e5abb6201cb9ba8af8352d4b16af761706c4987a31953bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba60ddedf9e5db4d107143d81ac6b10e
SHA154f28572d891ea1e7fcbcb0d934b9c8d7bf3cb90
SHA256233cf3cc60352355d4cc101deb385257961e9915e474e9910a8fbfabc7e67625
SHA512ba2475bf3b4010cd37fed8d4ae27fe54eac8a19e12dbb9f1f6f96bc1261c59aee897aa1fe982cca3b081b59de923dd29e2d0fe5b4a962927ec653f42ee11eb10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585453e5a7f62001c1c5840db09f07a04
SHA16000d9499e2df3a2b56b0963d6733f34ffc423f7
SHA256e28f64dae722f4e1de5989bf779e7955cbdb24fcd7c32a22cb5e80e541230c5e
SHA512eb99fe116ad6fd783aa0f63456f09ea3540c070d68b1ee9a8d0fc03e7d54748335560cf20ae5acb979a5efec135abc4a2195b54881ad2ec40471370d7178982b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5334c132670ef8b68f7c1d938e37b332c
SHA1e43db9c88505ba1e1c6d4981244b3a6d85349774
SHA25689e9f77fb1215ad07110dee7efd887c671a63ba3c3e1e4aad319f21cede0206f
SHA5124bde02e2ef7594e739d6f4921133e6d86f482f3fd6c155ca342b5d43da6b9ececd74dee31b4470f12fc66567ee9288a22d4921212478cf8091649835ef058cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9824a10a8b10b77c6625b1e864310e3
SHA1b09522fbf003b1e50dda3b5bca75934da2b9ac5a
SHA2567957f454244c51404b5e8b1af73356102b43482c2f9816b24cc43ed36eae8a50
SHA512a84d8976893a23f95e3fc25d12a468124280248ccccb51d71ff5a1bb861e7c80fa3dda01bef7fc58ca9154c607f36bc637f52297a67216b6701c03f7b2e1a807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5457b462bc501e04323e4ad7c7544a512
SHA1989e1e237f5f5e423a9be09df6b576a09747aae9
SHA25644ae4ae41b8b208dcf0eee3aae38c476b15e186513428c309b890cb15030c362
SHA51292eea5275cc335806d6a11b2ef7d9b38f60ac43451abde9ac74827aa53b8f0b9f4f7fb9394c2e7f5a8ade05c854d56960cfd00632d6bb4b5a4748c943a43722b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5522557e3c71b46efceaa0f00f6c50274
SHA14487378e2af745a74e829c68354c067ef02b3a5c
SHA256020e5f81638524c70cc00d7e8d7c20cd5e2ece498fe07cc800adf5b4e2aa4a64
SHA512e4d64f35316e32009ac85eeee07b852cc9618b59dfcd779e7ebaf7f3d63004f5a4041fe3fb8aa0af93a3e020e5400fad362a9de32064f060765dcca04dbcdcc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51607e44f0c3e0c8007c6f1bc52b72641
SHA12fc3b09165e3b861e97945eab5c6361d62caeb77
SHA256175d07fad6dabbaa9dac11b993c5f56a566d57239504919e7e37adf4266742f7
SHA5129e5aa24964082e91c97efb0e044e294596178b5d399fec6715080a06b2366f72ddd963dbaafaf99410b2be9b39b6dbbe121b0e73c16df1aa1d0a586c6323e9ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579837d8ea06b4cdf100b23b215eb02d8
SHA14f8c9a37ecc62de9e17e0b03382d21b0875c0ac6
SHA25659080270372173986e43d4de602e0a98578ce2f1ce11efb11753c96d1c02f120
SHA512d18a9ad11cc13aca7cb5c7bb5008e0732fb0d335e79048b1addd08b324d8be7389a809f4be6c5c024cebfc0c1182052a8a5c3a16a7b0d3b99fce72e232be3959
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6ef7b005bc42bd92cd02f5b338624a6
SHA17f9a02865938b0567838b953bb6c898e6e5fa9f4
SHA256e468f58368dc657b92bb7a001ca21551f950231f1386df1d8afa5f46802d6500
SHA51209c87962fc83060278ed622db04a10d21e5bf2baf7e3ec2655aa08d46768eeb52bb469656d0a4b72cfebb517d5af52902d028ae4e0c5d2c18a66352459a3f92d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5911d24ec1d3e341323c4bdba6ffd5d14
SHA15f3cdd6d81782b15876014430cf00b6908b1aa3b
SHA25622c80755b7667ef2176d54d5ba8bf4e18333998d843eb14a394117c8852530c8
SHA512d5f43e164b7208a100bff0ad36cb9e065e4593f759c6ba004618f8af5cad17341168b979d1c142fef50d39bf081c9007a1b1c6d05e3539c699224e125393f797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2de8faaa147c0ba379aebd63523cb6
SHA131891965071ce647f5613a17c5da1a1a256a401d
SHA2568817872a1d488ea886cbb413212bbc7d8e0f4f27911d4570e432b664d551d50a
SHA51256c498787e4c001513c26ed03c17d43132026726d3a988a4b22a6c9dc641160acea9abaebb1f58f4f5e165c18414384ffda5657806905b7e632de1e1d31255fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ad6aaa73709ae7a15c592b6716b9650
SHA177bed299c947dd62630cd5064a3ef6fa8f4952ae
SHA2562712cfde8940ec770e93884dfa762cebbc07e2f62c4b2939e6f58f935289acb0
SHA512cb2e9bda549422686c63dc78e2b2e7af928ac2fbac00e42959ae3214324db2ae57702526511c048d7d818ce3d25382cb072c6d36c5120d160e2b7d56f6afdfd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba5701d9c210bc6b2c2a4edc6ba1a00b
SHA1f8254811827f73e3ab31954faf98ea9b8343a2e0
SHA2561fcdfd6bc22ba31cbefc055461a5f856c33b214f2f2ad412af614cb7426af790
SHA5127b197e3f3c0e2b4d2cd4c1eeb7639ae07543e639856d69c52efe8a030448a5e1f6785ab78320a4f8b0c784c08ca8090db4278909d8c151495417c2fd66753eef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56aa864643e0e93459492dd46832aadf8
SHA1b38212eb13e6fb676d6cb968290d5c4474663625
SHA256a9190332e13a75c267e910bc42f5e5b897e2986acd5939107747e685b2b0484f
SHA5122e751babbe07208c9d6396d9f570e1d86de5a2fa59433195a9c091d9acf10288c74289decd03cf47014035930d79ec11af6d14cc71bf6ef9029a948a702bc6ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fca8eeac14e75870f98de824a0b3764
SHA14bc2b0066f6b51f275d09d73a52691d6e9eb497c
SHA256cfb0bce54a02c8c32b9f58afcda5fc07f72b1fe4f04d7de00f1597eb7a1502c0
SHA512bf0800e684b52f2f34e5f28abe0e8a77892cf52c588276bb8e90364c26b081d3e837ce9ecf4c71151c87f98eae0fadf0a33adeffbf0835874db7a4c423c1df93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acdefffb9d9aac42c7efe50000c74c2e
SHA1c5d75584db670fa602135ff41f68d5965d1a533f
SHA25626e4475f9fd84b8797943ac7b1623313ec204d47b65f79b6f30df11a102ebceb
SHA5128b351547af940bb7fdff638ccdf9ac96cd95c43f0c03fc946421401886de281da3b3854e7b7a4d5ec35055b7a94dd4245ee9139c4c6c4ccb8cee80b3d710f09b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b