Overview
overview
8Static
static
78f36dde1cc...0N.exe
windows7-x64
88f36dde1cc...0N.exe
windows10-2004-x64
8$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
7$PLUGINSDI...ll.dll
windows10-2004-x64
7$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$TEMP/$_85...pp.dll
windows7-x64
3$TEMP/$_85...pp.dll
windows10-2004-x64
3FireFox/bootstrap.js
windows7-x64
3FireFox/bootstrap.js
windows10-2004-x64
3FireFox/co...p.html
windows7-x64
3FireFox/co...p.html
windows10-2004-x64
3FireFox/co...uid.js
windows7-x64
3FireFox/co...uid.js
windows10-2004-x64
3Modules/7z.dll
windows7-x64
3Modules/7z.dll
windows10-2004-x64
3Modules/ArSp.dll
windows7-x64
3Modules/ArSp.dll
windows10-2004-x64
3Modules/BdUdr.dll
windows7-x64
3Modules/BdUdr.dll
windows10-2004-x64
3Modules/BrSp.dll
windows7-x64
3Modules/BrSp.dll
windows10-2004-x64
3Modules/CdPrc.dll
windows7-x64
3Modules/CdPrc.dll
windows10-2004-x64
3Modules/Core.dll
windows7-x64
3Modules/Core.dll
windows10-2004-x64
3Analysis
-
max time kernel
67s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 13:36
Behavioral task
behavioral1
Sample
8f36dde1cc56c41c6bf0da63a023acf0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8f36dde1cc56c41c6bf0da63a023acf0N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ShellExecAsUser.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ShellExecAsUser.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/md5dll.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/md5dll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$TEMP/$_85_/InstSupp.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$TEMP/$_85_/InstSupp.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
FireFox/bootstrap.js
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
FireFox/bootstrap.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
FireFox/content/html/popup.html
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
FireFox/content/html/popup.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
FireFox/content/js/uid.js
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
FireFox/content/js/uid.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Modules/7z.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
Modules/7z.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Modules/ArSp.dll
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
Modules/ArSp.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Modules/BdUdr.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Modules/BdUdr.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Modules/BrSp.dll
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
Modules/BrSp.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Modules/CdPrc.dll
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
Modules/CdPrc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Modules/Core.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
Modules/Core.dll
Resource
win10v2004-20240802-en
General
-
Target
FireFox/content/html/popup.html
-
Size
734B
-
MD5
c929c4ef17977667affa3fbf2308d429
-
SHA1
8981c4dedbb7446e817e20f206b5c9e174cc0074
-
SHA256
4599c1cb8c97f841d48a003f47e6ab8b7b8f720448129183c4499812468377eb
-
SHA512
1831fb44ec6c9ff32fe21386023d4f0229d85844b09ed28975b65e5aba6eb81c6a0f783a7e023f966cc90082191ea4d5df5c3f803f2764181461433ce38935ad
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000007255d621aac98e9bd9204347368ab88bb65ce3dbd264c4c4240c890aa960ded3000000000e8000000002000020000000a19a7ee004786a03b8186b6cae10ae37fb7f6e3566c6b3be8c0c186f82f304e920000000f3fe3fbd6c62ea929bb5665c19977fc0c0c1d398170811342a897fa9e60e87a54000000083d663ddaa46392a99697dfae39ae096545391292824a7d8e111aeae8b1423fb4a66cd69de476b2396247902430c5d60515c64faf7e4d092c294a1f23f1e44c5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1A8F3131-62E7-11EF-8705-5AE8573B0ABD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50930beff3f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430754887" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000e8be11d814913c88bfc90fe611334200b1289c384c1d149d94e51ae17a6d101b000000000e8000000002000020000000777d325ee9bf4b4ffc28b8caf6093534013ef83d6899f24995ed2627618952a4900000005dc5737cc9858ddba77707c6d5b4ded8ad4b17756337deaed19422d0f430fb60144b98ee8b927a9bf1bb4d7ddc271a8c1585760bf77eda7f976f32e8b192805ca5ebc48d4cbdfc6878555b7d851d3eddb23963ecb0d6bce190ee919402cfe7ff8e9c694cdc46db7eaea3751cc089ed23ec9b53f314a147260eb7f8bea4e3969e1e17fbcab66e5903508667eff00be9bc400000006f6fc386d49046ba43a355605657b09b796880b367233bd983184a80c2a7913b0f80d09b56ed3d64eb7149ebf84491dfef6a70909285e74bf9002b9b9e736580 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2624 iexplore.exe 2624 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2748 2624 iexplore.exe 30 PID 2624 wrote to memory of 2748 2624 iexplore.exe 30 PID 2624 wrote to memory of 2748 2624 iexplore.exe 30 PID 2624 wrote to memory of 2748 2624 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\FireFox\content\html\popup.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e5295631a579f54025b2ee703ee5f93
SHA134d56fcedf43c45b6dc106ac4c46d85cae78eeeb
SHA256dbaa1be7e849ee5e44a7ebe0f73b7d576eb1ec1c7cd7a0f2f7a413f517e63c9f
SHA51224a21a538b143a370dcd4d294177192c1c1e4f00d46ede229463a874446d33dc789d9d938fa94e98aa6b1386a7022c3fa75ed90df67037f936e3da79dcef2ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cc0ed3fe4ba374aff9a110b65e06fd9
SHA1f93bf39a1e0030e51dae2e3fb66cda325841dde5
SHA256cecad528c3ceab5009a127df6daf9a7ce36ed6d03e9c16ed799d17ecfed0d1bd
SHA512fd03ef7c766b4e0e2a17fc0ecdcd19caf3ab84f634b3fdfff4a64f50875862edd96e25c25613bc1ba630975107a58be0cba29d640e42506b782900a51bf9977a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f50e149a523158a9cceea2075acf916d
SHA19222e26b43658e8fc0dbf5b072cab757075e2a5c
SHA25684da3449408af0a41a6c1b0f4c351714a2b52719fb07133ed02a7196f58231ac
SHA5125b345875b420cb598b4d792c15f44b3fb0e56c8af39df18473aac15071f6197b90431d95c103518eec46ff989b1bd257a50c56c117b9d2af55e0a2af0b7591d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c839c5d2f230ab8ebc7bc5622f8dcc5d
SHA1ef0e8d2c7ca8f69bdf80fcef2ee5743f469ed0d6
SHA2568ceefab763fa687326b608a52873ca38fcbccfd3025706ea29590644829e6bcf
SHA51269657a270a20dd556844168226060f5901e3aec83dc62c44f35e1f839f57e6cc3363232c1beada5b81fa98d13f10d790de44f526b1c28814b3f7af87b6e011c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538891e14e154fcdfa1c1dba2a1f29c5c
SHA1979b0794e693d638a66e74e1a7f90c529e942807
SHA2562497a2636bf53515d01997952676126e0e90013a86df4afb974dd48f1b5201fd
SHA5129c113390a3e714c3f19dc1f83767a7dc087646aa93dd85a39834b37b1ea44b33e331e49a47861958635da697969e0c4731dc172ed276072e66e8669a598eba47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597c5271d00d28e85f7e046b3d88159bd
SHA194c270bb5c4858f63eb11e6553f0208fa963c5d2
SHA25668081f098c66f676412470b7c94be15127cfa0136350a6574323c564a08faf59
SHA512ec08ceef2dfcfd6cec2de4b1e3f5f84ff8914ae8ce56ff46aa44f53b2457b8c65b824db38471290a24d9ccd71025f3f5655291f78a1b27ad3210de89c4030d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b947b7ba15be25e8d03436a8d7db2613
SHA1e81e1b4b80703de2dfa9fb98f78dfd933c6624ab
SHA256ba544ffe585efb41395cdc0babca04438f5ac70c3204a76644f5d240509728f3
SHA5125221c5aa70d91e264ce4fdaa394dab775991a614acac61bfdb8db2b9e5dabd350ffcbdb7f30ccb7254ba0741393ac8ec8fec42a35cf5eb1a22a153be6ad023f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ffe16705a3095f8ef5bde1ed03e1d40
SHA1b8f26f93e48398bd8c1e3c3af4bb5623e7b5207c
SHA256e8bfc9a371444ae316d9efa1381e63f10f09042fe49a1596bd50be9472873bbb
SHA5123a156a255100b9e173c1b1b90c526eab05c0662200705cedde27e2b03c102bee96b948a93928165df5303088f1f0802da4b8e53aa5ec48fffa514912662f2981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5071a6e268c773e36e9a7309c1bc1c605
SHA1777071acc919f1c8ab0261ffd9d3d0f4e12b1a77
SHA2567b85681501fdc968c3b497c5b82e0e8b51f14d9e63e25c2959a9db056352aa74
SHA512b3354aaa45b0fbfe794970cf98a331255ab18c865031483910b447c5c18a70d4d0e770a9025696886dd4efe4085539d565f643da3f47bde4a4d7635ea40435a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be325acad6b9812059317a6d5f3e8908
SHA119506adc5f9b3fa7c09b66d15406d10b24b70f02
SHA256d6ae0e3b648c146530ee391369768f700b64edfd2226d81a6fc90ee2e467c1ee
SHA512bb903e122f00f07ecd5f0246235753c514d25f4f673a5f4003c089f883ebce34ccf428b38b73a509f6cf7368137ff948329d94a55a6a3b37d25d7a4303633e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51baef7e03dad8a4a1dcac585211bc603
SHA101733860b788f7669e43024bdd9695f4e0ce2dc4
SHA256e86e2e600c5930ff180c4a57c3e5b8312cfcb7d7ea1d24932c860bb915fe342d
SHA512672914455505181dc9d187e173488a9dc7c730ddf6fb22683a6782678ed22131dd31c7c22f1decd2f804a433aae40ff922bfec2bd004e376474a76fd3974c3ba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b